Skip to main content

Home/ Socialism and the End of the American Dream/ Group items matching "Company" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
5More

Customer proprietary network information - Wikipedia, the free encyclopedia - 0 views

  • Customer proprietary network information (CPNI) is the data collected by telecommunications companies about a consumer's telephone calls. It includes the time, date, duration and destination number of each call, the type of network a consumer subscribes to, and any other information that appears on the consumer's telephone bill. Telemarketers working on behalf of telephone companies, attempting to either win back a customer or upsell a customer with more services, must ask the customer's consent before accessing the billing information or before using that information to offer an upsell or any change of services. Usually this is done at the beginning of a call from the telemarketer to the telephone subscriber.
  • Note that as long as an affiliate is "communications" related, the FCC has ruled that CPNI is under an opt-out approach (can be shared without your explicit permission). A phone company is permitted to sell all information on you, such as numbers you call, when you called them, where you were when you called them, or any other personally identifying information. CPNI would normally require a warrant for law enforcement agencies, but it can be freely sold to "communications" related companies. One can verify this by checking rule 64.2007(b)(1) and footnote 137 in the 2007 CPNI order. One can call up a phone company and opt out by requesting that they do not share CPNI information. In the case of
  • The U.S. Telecommunications Act of 1996 granted the Federal Communications Commission (FCC) authority to regulate how customer proprietary network information (CPNI) can be used and to enforce related consumer information privacy provisions. The rules in the 2007 FCC CPNI Order further restrict CPNI use and create new notification and reporting requirements. The rules in the 2007 CPNI Order include: Limits the information which carriers may provide to third-party marketing firms without first securing the affirmative consent of their customers Defines when and how customer service representatives may share call details Creates new notification and reporting obligations for carriers (including identity verification procedures) Verification process must MATCH what is shown with the company placing the call.
  • ...1 more annotation...
  • The 2007 CPNI Order does not revise all CPNI rules. For example, the rule revisions adopted in the Order do not limit a carrier's ability to use CPNI to perform billing and collections functions, restrict CPNI use to effect maintenance and repair activity, or impact responses to lawful subpoenas. Fines for failure to comply with CPNI rules can be substantial. Since 2006, the FCC, focusing on one rule regarding internal annual compliance certificates, proposed over $1 million in fines and those fines are not necessarily indicative of the fines the FCC could propose. The FCC is authorized to impose fines of up to $150,000 for each rule violation or each day of a continuing violation up to a maximum of $1.5 million for each continuing violation.[1] The rules adopted in the Order are effective either six months after the Order is published in the Federal Register or on receipt of Office of Management and Budget approval of the new rules depending on which event is later. (Order at ¶61)
  •  
    A term that may become controversial in the context of pending cases under the 4th Amendment against NSA surveillance, going to the "reasonableness" of a customer's expectation of privacy in call metadata.
4More

REVEALED: GCHQ's BEYOND TOP SECRET Middle Eastern INTERNET SPY BASE * The Register - 0 views

  • Exclusive Above-top-secret details of Britain’s covert surveillance programme - including the location of a clandestine British base tapping undersea cables in the Middle East - have so far remained secret, despite being leaked by fugitive NSA sysadmin Edward Snowden. Government pressure has meant that some media organisations, despite being in possession of these facts, have declined to reveal them. Today, however, the Register publishes them in full.The secret British spy base is part of a programme codenamed “CIRCUIT” and also referred to as Overseas Processing Centre 1 (OPC-1). It is located at Seeb, on the northern coast of Oman, where it taps in to various undersea cables passing through the Strait of Hormuz into the Persian/Arabian Gulf. Seeb is one of a three site GCHQ network in Oman, at locations codenamed “TIMPANI”, “GUITAR” and “CLARINET”. TIMPANI, near the Strait of Hormuz, can monitor Iraqi communications. CLARINET, in the south of Oman, is strategically close to Yemen. British national telco BT, referred to within GCHQ and the American NSA under the ultra-classified codename “REMEDY”, and Vodafone Cable (which owns the former Cable & Wireless company, aka “GERONTIC”) are the two top earners of secret GCHQ payments running into tens of millions of pounds annually.
  • The actual locations of such codenamed “access points” into the worldwide cable backbone are classified 3 levels above Top Secret and labelled “Strap 3”. The true identities of the companies hidden behind codenames such as “REMEDY”, “GERONTIC”, “STREETCAR” or “PINNAGE” are classified one level below this, at “Strap 2”.After these details were withheld, the government opted not to move against the Guardian newspaper last year for publishing above-top-secret information at the lower level designated “Strap 1”. This included details of the billion-pound interception storage system, Project TEMPORA, which were revealed in 2013 and which have triggered Parliamentary enquiries in Britain and Europe, and cases at the European Court of Human Rights. The Guardian was forced to destroy hard drives of leaked information to prevent political embarrassment over extensive commercial arrangements with these and other telecommunications companies who have secretly agreed to tap their own and their customers’ or partners’ overseas cables for the intelligence agency GCHQ. Intelligence chiefs also wished to conceal the identities of countries helping GCHQ and its US partner the NSA by sharing information or providing facilities
  • According to documents revealed by Edward Snowden to journalists including Glenn Greenwald among others, the intelligence agency annually pays selected companies tens of millions of pounds to run secret teams which install hidden connections which copy customers' data and messages to the spooks’ processing centres. The GCHQ-contracted companies also install optical fibre taps or “probes” into equipment belonging to other companies without their knowledge or consent. Within GCHQ, each company has a special section called a “Sensitive Relationship Team” or SRT.BT and Vodafone/C&W also operate extensive long distance optical fibre communications networks throughout the UK, installed and paid for by GCHQ, NSA, or by a third and little known UK intelligence support organization called the National Technical Assistance Centre (NTAC).
  •  
    Report on GCHQ documents that The Guardian had agreed not to write about. Nice picture of the secret Seeb base.
4More

The Digital Hunt for Duqu, a Dangerous and Cunning U.S.-Israeli Spy Virus - The Intercept - 0 views

  • “Is this related to what we talked about before?” Bencsáth said, referring to a previous discussion they’d had about testing new services the company planned to offer customers. “No, something else,” Bartos said. “Can you come now? It’s important. But don’t tell anyone where you’re going.” Bencsáth wolfed down the rest of his lunch and told his colleagues in the lab that he had a “red alert” and had to go. “Don’t ask,” he said as he ran out the door. A while later, he was at Bartos’ office, where a triage team had been assembled to address the problem they wanted to discuss. “We think we’ve been hacked,” Bartos said.
  • They found a suspicious file on a developer’s machine that had been created late at night when no one was working. The file was encrypted and compressed so they had no idea what was inside, but they suspected it was data the attackers had copied from the machine and planned to retrieve later. A search of the company’s network found a few more machines that had been infected as well. The triage team felt confident they had contained the attack but wanted Bencsáth’s help determining how the intruders had broken in and what they were after. The company had all the right protections in place—firewalls, antivirus, intrusion-detection and -prevention systems—and still the attackers got in.
  • Bencsáth was a teacher, not a malware hunter, and had never done such forensic work before. At the CrySyS Lab, where he was one of four advisers working with a handful of grad students, he did academic research for the European Union and occasional hands-on consulting work for other clients, but the latter was mostly run-of-the-mill cleanup work—mopping up and restoring systems after random virus infections. He’d never investigated a targeted hack before, let alone one that was still live, and was thrilled to have the chance. The only catch was, he couldn’t tell anyone what he was doing. Bartos’ company depended on the trust of customers, and if word got out that the company had been hacked, they could lose clients. The triage team had taken mirror images of the infected hard drives, so they and Bencsáth spent the rest of the afternoon poring over the copies in search of anything suspicious. By the end of the day, they’d found what they were looking for—an “infostealer” string of code that was designed to record passwords and other keystrokes on infected machines, as well as steal documents and take screenshots. It also catalogued any devices or systems that were connected to the machines so the attackers could build a blueprint of the company’s network architecture. The malware didn’t immediately siphon the stolen data from infected machines but instead stored it in a temporary file, like the one the triage team had found. The file grew fatter each time the infostealer sucked up data, until at some point the attackers would reach out to the machine to retrieve it from a server in India that served as a command-and-control node for the malware.
  • ...1 more annotation...
  • Bencsáth took the mirror images and the company’s system logs with him, after they had been scrubbed of any sensitive customer data, and over the next few days scoured them for more malicious files, all the while being coy to his colleagues back at the lab about what he was doing. The triage team worked in parallel, and after several more days they had uncovered three additional suspicious files. When Bencsáth examined one of them—a kernel-mode driver, a program that helps the computer communicate with devices such as printers—his heart quickened. It was signed with a valid digital certificate from a company in Taiwan (digital certificates are documents ensuring that a piece of software is legitimate). Wait a minute, he thought. Stuxnet—the cyberweapon that was unleashed on Iran’s uranium-enrichment program—also used a driver that was signed with a certificate from a company in Taiwan. That one came from RealTek Semiconductor, but this certificate belonged to a different company, C-Media Electronics. The driver had been signed with the certificate in August 2009, around the same time Stuxnet had been unleashed on machines in Iran.
6More

CISA Security Bill: An F for Security But an A+ for Spying | WIRED - 0 views

  • When the Senate Intelligence Committee passed the Cybersecurity Information Sharing Act by a vote of 14 to 1, committee chairman Senator Richard Burr argued that it successfully balanced security and privacy. Fifteen new amendments to the bill, he said, were designed to protect internet users’ personal information while enabling new ways for companies and federal agencies to coordinate responses to cyberattacks. But critics within the security and privacy communities still have two fundamental problems with the legislation: First, they say, the proposed cybersecurity act won’t actually boost security. And second, the “information sharing” it describes sounds more than ever like a backchannel for surveillance.
  • On Tuesday the bill’s authors released the full, updated text of the CISA legislation passed last week, and critics say the changes have done little to assuage their fears about wanton sharing of Americans’ private data. In fact, legal analysts say the changes actually widen the backdoor leading from private firms to intelligence agencies. “It’s a complete failure to strengthen the privacy protections of the bill,” says Robyn Greene, a policy lawyer for the Open Technology Institute, which joined a coalition of dozens of non-profits and cybersecurity experts criticizing the bill in an open letter earlier this month. “None of the [privacy-related] points we raised in our coalition letter to the committee was effectively addressed.” The central concern of that letter was how the same data sharing meant to bolster cybersecurity for companies and the government opens massive surveillance loopholes. The bill, as worded, lets a private company share with the Department of Homeland Security any information construed as a cybersecurity threat “notwithstanding any other provision of law.” That means CISA trumps privacy laws like the Electronic Communication Privacy Act of 1986 and the Privacy Act of 1974, which restrict eavesdropping and sharing of users’ communications. And once the DHS obtains the information, it would automatically be shared with the NSA, the Department of Defense (including Cyber Command), and the Office of the Director of National Intelligence.
  • In a statement posted to his website yesterday, Senator Burr wrote that “Information sharing is purely voluntary and companies can only share cyber-threat information and the government may only use shared data for cybersecurity purposes.” But in fact, the bill’s data sharing isn’t limited to cybersecurity “threat indicators”—warnings of incoming hacker attacks, which is the central data CISA is meant to disseminate among companies and three-letter agencies. OTI’s Greene says it also gives companies a mandate to share with the government any data related to imminent terrorist attacks, weapons of mass destruction, or even other information related to violent crimes like robbery and carjacking. 
  • ...2 more annotations...
  • The latest update to the bill tacks on yet another kind of information, anything related to impending “serious economic harm.” All of those vague terms, Greene argues, widen the pipe of data that companies can send the government, expanding CISA into a surveillance system for the intelligence community and domestic law enforcement. If information-sharing legislation does not include adequate privacy protections, then...It’s a surveillance bill by another name. Senator Ron Wyden
  • “CISA goes far beyond [cybersecurity], and permits law enforcement to use information it receives for investigations and prosecutions of a wide range of crimes involving any level of physical force,” reads the letter from the coalition opposing CISA. “The lack of use limitations creates yet another loophole for law enforcement to conduct backdoor searches on Americans—including searches of digital communications that would otherwise require law enforcement to obtain a warrant based on probable cause. This undermines Fourth Amendment protections and constitutional principles.”
  •  
    I read the legislation. It's as bad for privacy as described in the aritcle. And its drafting is incredibly sloppy.
2More

Clinton Tops List of Arms Company Donations | News | teleSUR English - 0 views

  • Hillary Clinton has received more money from arms and military service companies than any other candidate during the 2016 presidential campaign, data from Open Secrets shows. All but one of the world’s 10 biggest arms producers have contributed to Clinton’s previous campaigns, giving her — along with the top Republican receiver Ted Cruz — a significant margin over the other candidates. The numbers, collected by the Federal Election Commission and compiled by Open Secrets, also reveal that Rand Paul and Bernie Sanders make the list of top 20 senators and top six presidential candidates to receive money from arms and defense companies. Most of the funding is channeled through Political Action Committees, which have no limits to how much they donate. About 18 percent comes from individual contributions, totaling almost US$10 million between all of the companies.
  • A report released Sunday by the Stockholm International Peace Research Institute showed that while U.S. arms sales have slowed, U.S.-based Lockheed Martin’s profits soared in 2014. Overall sales rose steadily until the financial crisis of 2008, when they mostly stabilized. Sunday’s report also indicates that the U.S. accounts for a staggering 54 percent market share of the global arms market. The United Kingdom has the second largest market share, with 10.4 percent. Russia has a market share of 10.2 percent, while France has a market share of 5.6 percent. The world’s top 10 arms companies are based in the U.S. and Western Europe, according to the report. Among these are Lockheed Martin, Boeing and BAE Systems, who make up the top three companies in terms of global market share.
4More

No Slap On The Wrist: Wells Fargo Plunges After Federal Reserve Bars Lender's Growth - 0 views

  • Wells Fargo WFC -9.22%Wells FargoWFC$58.16$-5.91(-9.22%)As of 02/06/2018, 01:01am EST is facing far more than a fine for its fake accounts scandal, in which employees at the lender's branches across the country opened over a million fraudulent checking and credit card accounts to hit their numbers. Late on Friday, the Federal Reserve decided to restrict growth at America's third-largest bank by assets until its risk and governance is improved. The order, which also called for a revamp of Wells Fargo's board of directors, sent the bank reeling in early trading Monday. Wells Fargo shares plunged 9% lower in Monday trading, erasing most of its gains over the past 12 months. For its top shareholder, Warren Buffett's Berkshire Hathaway, the Fed-inspired stock slide meant its Wells Fargo holdings lost over $2.7 billion in value. "We cannot tolerate pervasive and persistent misconduct at any bank and the consumers harmed by Wells Fargo expect that robust and comprehensive reforms will be put in place to make certain that the abuses do not occur again," said chair Janet L. Yellen on Friday. The order was her last as head of the Federal Reserve. On Monday, successor Jerome Powell was sworn in. Added Yellen, "the enforcement action we are taking today will ensure that Wells Fargo will not expand until it is able to do so safely and with the protections needed to manage all of its risks and protect its customers." In September 2016, Wells Fargo paid a $185 million fine to the Consumer Financial Protection Bureau after the agency found branch bankers had opened well over a million fake accounts, which generated millions of dollars in fees to the lender. When the scandal, which occurred over almost a decade, was first revealed, Wells Fargo and its board didn't immediately overhaul their leadership, or sanction top executives in the divisions where fake accounts were created. Only after significant public outcry, in addition to a widening scope of the scandal, did Wells Fargo begin a revamp, firing CEO John Stumpf and clawing back bonuses for numerous executives. Backer Warren Buffett later said in an appearance on CNBC the bank and its leadership had misjudged the severity of the problem.
  • In addition to harsh words, the Fed is ordering a sanction of almost unprecedented severity. It will restrict the bank's growth until its governance and risk management improve, though it will allow Wells to continue current operations from taking deposits to offering loans.
  • Three Wells Fargo long-standing board directors, John Chen, Lloyd Dean and Enrique Hernandez, will likely retire at the firm's annual meeting as part of the Fed's additional order for a refreshment of four board directors. Analysts did not brush off the Fed's move, as they have large fines coming out of the crisis.
  • ...1 more annotation...
  • The bottom line is that the consent and decree order will mean Wells will have a harder time maintaining market share and will have to compete more on price or credit terms versus peers, in our view. Wells will also have to maintain the balance sheet while other banks are growing, and we view this as defensive versus peers," Kleinhanzl added.
4More

MoA - Gas From Israel And The Flynn Wiretapping - Behind The Deep-State Infighting Over... - 0 views

  • What is really behind the deep-state infighting over the U.S. elections and the "wire tapping" of the Trump campaign? Why was the CIA-Neocon axis vehemently lobbying against Trump? What foreign interests and what money is involved in this? Answers to these questions are now emerging. The former director of the CIA under Clinton, James Woolsey, went to the Wall Street Journal and offered some information (likely some true and some false) on the retired General Flynn and the lobbying businesses he was involved in. Woolsey is an arch-neoconservative. He had worked on the transition team of Trump but got fired over "growing tensions over Trump’s vision for intelligence agencies." Flynn is the former National Security Advisor of Trump who later also got fired. Woolsey was a board member of Flynn's former lobbying company FIG. Woolsey claims: In September 2016 he took part in a meeting between Flynn and high level Turkish officials, including the Turkish foreign minister and the energy minister who is the son-in-law of the Turkish president Erdogan. During the meeting, Woolsey claims, a brainstorming took place over how the Turkish cult leader Fethullah Gülen could -probably by illegal means- be removed from the U.S. and handed over to Turkey. Gülen is accused by the Erdogan mafia of initiating a coup attempt against it. The U.S. claims officially that there is no evidence for such an accusation and that Gülen can therefore not be rendered to Turkey. Gülen is an old CIA asset that helped the U.S. deep state to control Turkey.  Erdogan divorced from the Gülen organization after it became useless for his neo-Ottoman project. Here is the WSJ report on the Woolsey claims and a video clip with parts of his WSJ interview. Woolsey also went on CNN where he repeated his WSJ story. Flynn was accused by the anti-Trump campaign to have worked for Russia. He had taken several $10,000 for speeches he gave in Moscow. He also, at times, had argued for better U.S. relations with Russia. But Flynn's pro-Russia stand was probably honest. (Or the bribes involved were just smaller than the ones paid by others.) The money he got on the speaker circus was rather small for a man in his position. Flynn's real corruption was on another issue. After having been fired from the Trump administration, Flynn retroactively filed under the Foreign Agent Registration Act (FARA). His lobbying firm had a contract over $530,000 to work for a company near to the Turkish president Erdogan: In its filing, Mr. Flynn’s firm said its work from August to November “could be construed to have principally benefited the Republic of Turkey.” The filing said his firm’s fee, $530,000, wasn’t paid by the government but by Inovo BV, a Dutch firm owned by a Turkish businessman, Ekim Alptekin.
  • This lobbying, not the alleged Flynn-Putin relation, is the real scandal and part of the Trump/CIA/Clinton deep-state in-fighting. The meeting Woolsey described was under the "Turkish" Flynn contract. The Turkish business man, and owner of Inovo, Ekim Alptekin is a member of the Erdogan gang. But hidden at the very end of the WSJ story is the real key to understand the shady network: Inovo hired Mr. Flynn on behalf of an Israeli company seeking to export natural gas to Turkey, the filing said, and Mr. Alptekin wanted information on the U.S.-Turkey political climate to advise the gas company about its Turkish investments. It was the Israeli gas company, not the Alptekin outlet, that drove the issue. The Leviatan (and Tamar) gas fields in the Mediterranean along the Israeli coast are a huge energy and profit resource IF the gas from them can be exported to Europe. Several companies are involved in the exploration and all are looking for ways to connect the fields to the European gas network. There are (likely true) rumors that huge bribes have been payed in Israel, Jordan and elsewhere to win exploration contracts and to sell the gas. Negotiations between Israel and Turkey over the pipeline have been on and off. They depend on a positive climate towards Israel in the Turkish government which again depends on the often changing political position of the Erdogan gang.
  • The picture evolving here (lots of sleuthing and sources) is this: An Israeli company (or whoever is behind it) wants a gas pipeline to Turkey. It hires Flynn and Alptekin to arrange a positive climate for the Leviathan pipeline within the Turkish government. It offers Flynn more than half a million for a little (4-month long) influence work. His job is to create a "friendly atmosphere" for the deal by using his influence in the U.S. to accommodate Erdogan. A major point that is expected from Flynn is to arrange the handover of Gülen, by whatever means, from the U.S. to Erdogan. After accepting the (lobbying) bribe Flynn-the-whore suddenly changes his former anti-Turkish, pro-Russian, pro-Kurdish political position into a pro-Turkish, neutral-Russian and anti-Kurdish one. (His lobbying firm also makes some smaller payments related to the Clinton email-server scandal. This may be related to links between the Clinton family and the Gülen school empire.) He has a meeting with the Turkish government/Erdogan officials part of which is a discussion of a removal of Gülen to Turkey. He pens a pro Erdogan anti-Gülen op-ed which is published on the day of the election and he denigrates the Pentagon plan to work with the Kurds in Syria. The NSA, CIA and the FBI are listening to Flynn's conversations with Turkish and Israeli interests. (For the old and long history of such "wiretapping" of Turkish and Israeli connections and various dirty and criminal deals they revealed read and ask Sibel Edmonds.) The projects which Flynn is involved in, especially removing Gülen, are against the long term interests of the (neoconservative-driven) CIA. Selected tapes of his talks are transcribed and distributed within the anti-Trump campaign. This is the origin of the "wiretapping" of the Trump Tower the U.S. president lamented about. The stuff the CIA dug up about Flynn's dealing was and is used against Trump. Woolsey is caught up in this as he also worked for Flynn's lobbying firm. (His neocon-pro-Zionist history suggests that he is the senior Israeli watchdog over Flynn in all this.) He is now engaged in damage control and is "coming clean" and selectively leaking his anti-Flynn stuff to exculpate himself. (There is probably also some new, better deal involved that will pay off from him.) The Israeli-Turkish pipeline and the related deep-state fight are not the only issue involved in the campaign against Trump. There are also British interests and British intelligence involvement especially with the accusations against Russia of "hacking" of the DNC. If and how these fit in with above has not yet been revealed.
2More

Offshore Cash Hoard Expands by $183 Billion at Companies - Bloomberg - 0 views

  • The largest U.S.-based companies expanded their untaxed offshore stockpiles by $183 billion in the past year, increasing such holdings by 14.4 percent, according to data compiled by Bloomberg.
  • A report last year by analysts at JPMorgan Chase & Co. (JPM) estimated that all U.S.-based companies had $1.7 trillion in accumulated offshore profits. In the data compiled by Bloomberg, 83 companies had about 75 percent of last year’s total, which suggests that the total for all companies now exceeds $1.9 trillion.
5More

Federal Judge Finds National Security Letters Unconstitutional, Bans Them | Threat Leve... - 0 views

  • Ultra-secret national security letters that come with a gag order on the recipient are an unconstitutional impingement on free speech, a federal judge in California ruled in a decision released Friday. U.S. District Judge Susan Illston ordered the government to stop issuing so-called NSLs across the board, in a stunning defeat for the Obama administration’s surveillance practices. She also ordered the government to cease enforcing the gag provision in any other cases. However, she stayed her order for 90 days to give the government a chance to appeal to the Ninth Circuit Court of Appeals.
  • “We are very pleased that the Court recognized the fatal constitutional shortcomings of the NSL statute,” said Matt Zimmerman, senior staff attorney for the Electronic Frontier Foundation, which filed a challenge to NSLs on behalf of an unknown telecom that received an NSL in 2011. “The government’s gags have truncated the public debate on these controversial surveillance tools. Our client looks forward to the day when it can publicly discuss its experience.” The telecommunications company received the ultra-secret demand letter in 2011 from the FBI seeking information about a customer or customers. The company took the extraordinary and rare step of challenging the underlying authority of the National Security Letter, as well as the legitimacy of the gag order that came with it.
  • Illston found that although the government made a strong argument for prohibiting the recipients of NSLs from disclosing to the target of an investigation or the public the specific information being sought by an NSL, the government did not provide compelling argument that the mere fact of disclosing that an NSL was received harmed national security interests. A blanket prohibition on disclosure, she found, was overly broad and “creates too large a danger that speech is being unnecessarily restricted.” She noted that 97 percent of the more than 200,000 NSLs that have been issued by the government were issued with nondisclosure orders.
  • ...2 more annotations...
  • Both challenges are allowed under a federal law that governs NSLs, a power greatly expanded under the Patriot Act that allows the government to get detailed information on Americans’ finances and communications without oversight from a judge. The FBI has issued hundreds of thousands of NSLs over the years and has been reprimanded for abusing them — though almost none of the requests have been challenged by the recipients. After the telecom challenged the NSL, the Justice Department took its own extraordinary measure and sued the company, arguing in court documents that the company was violating the law by challenging its authority. The move stunned EFF at the time.
  • NSLs are written demands from the FBI that compel internet service providers, credit companies, financial institutions and others to hand over confidential records about their customers, such as subscriber information, phone numbers and e-mail addresses, websites visited and more. NSLs are a powerful tool because they do not require court approval, and they come with a built-in gag order, preventing recipients from disclosing to anyone that they have even received an NSL. An FBI agent looking into a possible anti-terrorism case can self-issue an NSL to a credit bureau, ISP or phone company with only the sign-off of the Special Agent in Charge of their office. The FBI has to merely assert that the information is “relevant” to an investigation into international terrorism or clandestine intelligence activities.
1More

We Call a Top NSA Whistleblower … And Get the REAL SCOOP on Spying | Washingt... - 0 views

  •  
    "NSA whistleblower Thomas Drake corroborated Klein's assertions, testifying that while the NSA is using Israeli-made NARUS hardware to "seize and save all personal electronic communications." ..................... I then asked the NSA veteran Binney if the government's claim that it is only spying on metadata - and not content - was correct. We have extensively documented that the government is likely recording content as well. (And the government has previously admitted to "accidentally" collecting more information on Americans than was legal, and then gagged the judges so they couldn't disclose the nature or extent of the violations.) Binney said that was not true; the government is gathering everything, including content. Binney explained - as he has many times before - that the government is storing everything, and creating a searchable database … to be used whenever it wants, for any purpose it wants (even just going after someone it doesn't like). ..................... Binney said that former FBI counter-terrorism agent Tim Clemente is correct when he says that no digital data is safe (Clemente says that all digital communications are being recorded). Both Verint and Narus were founded in Israel in the 1990s. *** Binney next confirmed the statement of the author of the Patriot Act - Congressman Jim Sensenbrenner - that the NSA spying programs violate the Patriot Act. After all, the Patriot Act is focused on spying on external threats … not on Americans. Binney asked rhetorically: "How can an American court [FISA or otherwise] tell telecoms to cough up all domestic data?!" Update: Binney sent the following clarifying email about content collection: It's clear to me that they are collecting most e-mail in full plus other text type data on the web. As for phone calls, I don't think they would record/transcribe the approximately 3 billion US-to-US calls every day. It's more likely that they are reco
1More

CHILDREN KILLED OF KEVIN KRIM, CHIEF EXECUTIVE OF CNBC DIGITAL, AFTER RELEASING INFORMA... - 0 views

  •  
    Incredible article about the behind-the-scenes story of the nanny murder of two small children in NYC.   First, it's a staged murder meant to send a clear message to ALL media.  The children were the offspring of Kevin Krim, CEO of CNBC digital.  His website had published a story about the Spire Law Group suing an entire class of bigshot BANKSTERS for the theft of $43 TRILLION dollars of tax payer money.  Second, this involves the US Government.  The Spire allegation is that the Feds actively helped and assisted the Bankster theft. Third, the story describes the historical background of these Bankster hits, assassination and threats.  Although not covered in the article, Presidential assassinations in particular have an unmistakable link to Executive Orders that the Treasury print Silver Certificates that would compete against Bankster notes.  In one way or another, it's all about control of the money system.  This list of Presidents includes Jackson, Lincoln, Garfield, McKinley, Kennedy and Reagan. Original Press Release from the Spire Law Group:  ... http://goo.gl/ynV6O .... Wow! ................................... excerpt:: "On 10/25/2012 two corporate financial media bastions,  MarketWatch  (an affiliate of the Wall Street Journal) and CNBC, presented their readers with a bombshell.  In a too-good-to-be-true lawsuit, the top echelons of the USA's banking and civilian government had been sued for "racketeering and money laundering."  The suit requested "the return of $43 trillion to the United States Treasury."  Yes, you've read that right: 43 trillion-roughly 3 years worth of America's GDP or 3 times America's underestimate of its own national debt. The suit characterizes itself, according to these two corporate media tabloids, as the largest money laundering and racketeering lawsuit in United States History.  [It identifies] $43 trillion ($43,000,000,000,000.00) of laundered money by the 'Banksters' and their U.S. r
7More

A Choice For Corporate America: Are You With America Or The Cayman Islands - 0 views

  • When the greed, recklessness, and illegal behavior on Wall Street drove this country into the deepest recession since the 1930s, the largest financial institutions in the United States took every advantage of being American. They just loved their country - and the willingness of the American people to provide them with the largest bailout in world history. In 2008, Congress approved a $700 billion gift to Wall Street. Another $16 trillion in virtually zero interest loans and other financial assistance came from the Federal Reserve. America. What a great country. But just two years later, as soon as these giant financial institutions started making record-breaking profits again, they suddenly lost their love for their native country. At a time when the nation was suffering from a huge deficit, largely created by the recession that Wall Street caused, the major financial institutions did everything they could to avoid paying American taxes by establishing shell corporations in the Cayman Islands and other tax havens.
  • In 2010, Bank of America set up more than 200 subsidiaries in the Cayman Islands (which has a corporate tax rate of 0.0 percent) to avoid paying U.S. taxes. It worked. Not only did Bank of America pay nothing in federal income taxes, but it received a rebate from the IRS worth $1.9 billion that year. They are not alone. In 2010, JP Morgan Chase operated 83 subsidiaries incorporated in offshore tax havens to avoid paying some $4.9 billion in U.S. taxes. That same year Goldman Sachs operated 39 subsidiaries in offshore tax havens to avoid an estimated $3.3 billion in U.S. taxes. Citigroup has paid no federal income taxes for the last four years after receiving a total of $2.5 trillion in financial assistance from the Federal Reserve during the financial crisis. On and on it goes. Wall Street banks and large companies love America when they need corporate welfare. But when it comes to paying American taxes or American wages, they want nothing to do with this country. That has got to change.
  • Offshore tax abuse is not just limited to Wall Street. Each and every year corporations and the wealthy are avoiding more than $100 billion in U.S. taxes by sheltering their income offshore. Pharmaceutical companies like Eli Lilly and Pfizer have fought to make it illegal for the American people to buy cheaper prescription drugs from Canada and Europe. But, during tax season, Eli Lilly and Pfizer shift drug patents and profits to the Netherlands and other offshore tax havens to avoid paying U.S. taxes.
  • ...3 more annotations...
  • Apple wants all of the advantages of being an American company, but it doesn't want to pay American taxes or American wages. It creates the iPad, the iPhone, the iPod, and iTunes in the United States, but manufactures most of its products in China so it doesn't have to pay American wages. Then it shifts most of its profits to Ireland, Luxembourg, the British Virgin Islands and other tax havens to avoid paying U.S. taxes. Without such maneuvers, Apple's federal tax bill in the United States would have been $2.4 billion higher in 2011.
  • This tax avoidance does not just reduce the revenue that we need to pay for education, healthcare, roads, and environmental protection, it is also costing us millions of American jobs. Today, companies are using these same tax schemes to lower their tax bills by shipping American jobs and factories abroad. These tax breaks have contributed to the loss of more than 5 million U.S. manufacturing jobs and the closure of more than 56,000 factories since 2000. That also has got to change. At a time when we have a $16.5 trillion national debt; at a time when roughly one-quarter of the largest corporations in America are paying no federal income taxes; and at a time when corporate profits are at an all-time high; it is past time for Wall Street and corporate America to pay their fair share. That's what the Corporate Tax Dodging Prevention Act (S.250) that I have introduced with Rep. Jan Schakowsky (D-Ill.) is all about.
  • We have a much better idea. Wall Street and the largest corporations in the country must begin to pay their fair share of taxes. They must not be able to continue hiding their profits offshore and shipping American jobs overseas to avoid taxes. Here's the simple truth. You can't be an American company only when you want a massive bailout from the American people. You have also got to be an American company, and pay your fair share of taxes, as we struggle with the deficit and adequate funding for the needs of the American people. If Wall Street and corporate America don't agree, the next time they need a bailout let them go to the Cayman Islands, let them go to Bermuda, let them go to the Bahamas and let them ask those countries for corporate welfare.
  •  
    Gotta love Bernie Sanders.
5More

Lawmaker Says There More To NSA Spying - Business Insider - 0 views

  • A House Democrat said information revealed about the National Security Agency's secret surveillance programs are "the tip of the iceberg," Daniel Strauss of The Hill reports. "I think it's just broader than most people even realize, and I think that's, in one way, what astounded most of us, too," Rep. Loretta Sanchez (D-Calif.) told C-SPAN's "Washington Journal" after a classified briefing with national security officials. Rep. Joe Barton (R-Texas), who also attended the meeting, said that the NSA "violated the spirit of the law when it started collecting data from everyone in the country just because technology now makes that possible.” Barton added that "in America ... You don’t target everyone and violate their 4th Amendment rights just because of a handful of threats. But that is exactly what is happening at the NSA ... it is wrong and it needs to stop now.” More from Sanchez: "I don't know if there are other leaks, if there's more information somewhere, if somebody else is going to step up, but I will tell you that I believe it's the tip of the iceberg."
  • A House Democrat said information revealed about the National Security Agency's secret surveillance programs are "the tip of the iceberg," Daniel Strauss of The Hill reports. "I think it's just broader than most people even realize, and I think that's, in one way, what astounded most of us, too," Rep. Loretta Sanchez (D-Calif.) told C-SPAN's "Washington Journal" after a classified briefing with national security officials. Rep. Joe Barton (R-Texas), who also attended the meeting, said that the NSA "violated the spirit of the law when it started collecting data from everyone in the country just because technology now makes that possible.” Barton added that "in America ... You don’t target everyone and violate their 4th Amendment rights just because of a handful of threats. But that is exactly what is happening at the NSA ... it is wrong and it needs to stop now.”
  • Glenn Greenwald of the Guardian, who has served as a conduit for Snowden's leaks, recently said that there will me many more "significant revelations that have not yet been heard." Greenwald told The New York Times that he received “thousands” of classified documents — “dozens” of which are newsworthy — from the the 29-year-old ex-Booz Allen employee who was contracted by the NSA. Sanchez said that what lawmakers learned "is significantly more than what is out in the media today," which is interesting when considering previous reports by journalists and whistleblowers.
  • ...2 more annotations...
  • Here's a rundown of the reports and the allegations: In 2006 NSA insiders told Leslie Cauley of USA Today that the NSA has been collecting almost all U.S. phone records since shortly after 9/11. In 2010 Dana Priest and William Arkin of The Washington Post reported that "collection systems at the [NSA] intercept and store 1.7 billion emails, phone calls, and other types of communications" every day. According to a 2007 lawsuit, Verizon built a fiber optic cable to give the "access to all communications flowing through the carrier’s operations center." In April 2012 Wired's James Bamford reported how the U.S. government hired two secretive Israeli companies to wiretap AT&T. AT&T engineer Mark Klein discovered the "secret room" at AT&T central office in San Francisco, through which the NSA actively "vacuumed up Internet and phone-call data from ordinary Americans with the cooperation of AT&T" through the wiretapping rooms, emphasizing that "much of the data sent through AT&T to the NSA was purely domestic." Former NSA executive and whistleblower Thomas Drake testified that the NSA is using Israeli-made hardware to "seize and save all personal electronic communications."
  • A classified program called Prism, leaked by Snowden, appears to acquire information from the servers of nine of the biggest internet companies. The Washington Post reported that the government's orders "serve as one-time blanket approvals for data acquisition and surveillance on selected foreign targets for periods of as long as a year." NSA Whistleblower William Binney that the NSA began using the program he built (i.e. ThinThread) to use communications data for creating, in real time, profiles of nearly all Americans so that the government is "able to monitor what people are doing" and who they are doing it with. In July the Foreign Intelligence Surveillance Court (FISC), established to "hear applications for and grant orders approving electronic surveillance," found that the NSA violated the Fourth Amendment's restriction against unreasonable searches and seizures "on at least one occasion." BONUS: In March CIA Chief Technology Officer Ira "Gus" Hunt said: "It is really very nearly within our grasp to be able to compute on all human generated information." If there is "significantly more" to the NSA's domestic snooping, then we're all ears and eyes.
2More

Oil And Gas Sector Troubles Drive Corporate Default Rate To Highest Level In Seven Year... - 0 views

  • The troubled oil and gas industry has been a big factor in driving global corporate defaults to their highest rate in seven years.Four more companies defaulted this week, bringing the overall tally to 40 so far this year, the ratings agency Standard & Poor’s said Friday in a research note. The last time defaults hit such heights was in the depths of the global recession in 2009.About one-third of that total, or 14 defaults, came from oil and gas companies, which are struggling to pay off debt acquired when oil prices were higher. U.S. crude prices are down more than 60 percent from their June 2014 peak of $105 a barrel, trading at around $39 a barrel Friday. Investors now face tens of billions of dollars in energy defaults as the worst oil crash in decades leaves drillers struggling to stay afloat.
  •  
    In related news, the nation's largest coal company, Peabody Coal, just filed for bankruptcy. Several other coal companies already have, indicative of plummeting markets and prices for coal. 
14More

The Roberts Jizya and the Art of War - 0 views

  • he is violating his oath of office in doing so, and that is the only sensible explanation because the Constitution is fairly clear; the United States Constitution expressly grants all powers not specifically enumerated in the document to the states and the People, and nowhere is this particular tax authorized.
  • this is rather like Jizya, the Muslim concept of taxation on non-Muslims.
  • The purpose of the Islamic Jizya is to compel approved behavior, and as such has been a powerful tool used by Islamic societies to compel conversion to Islam
  • ...10 more annotations...
  • In this instance the United States government is using it to compel conversion to socialist medicine, forcing us to either buy expensive private insurance or go on the government plan.
  • In short, they are abridging our freedom of religion, a constitutionally protected category.
  • What is clear is that this is an abridgement of the Establishment clause, and of the First Amendment.
  • The argument that this saves us from a super-stretching of the Commerce Clause is immaterial; we have simply replaced it with a super-stretching of the power of taxation. In the end, dead is just as dead.
  • What is really needed is a Constitutional Amendment, and the individual states need to spearhead that.
  • We have allowed the United States to move from a representative democratic republic to an empire, a system dominated by a ruling elite, an oligarchy.
  • We must return to the Federalism that was at the core of the Republic.
  • He is a traitor to his oath, a Benedict Arnold in a black robe
  • He has placed his desire for self-aggrandizement over his duty, and so has affirmed the power of government and the ruling elite to do anything to the public they please.
  • It’s time we take this country back. That can only happen at the state level.
  •  
    Another well written article describing in full what that treasonous backstabbing bastard chief justice John Roberts has done to shred and destroy our Constitution.  Thanks to the Canadian Free Press and Timothy Birdnow. excerpt: So, why is this so important to our discussion of the ruling by the Roberts Court? Because many on our side seem to believe that John Roberts did us a favor in his decision upholding the Affordable Healthcare Act, or as it is known colloquially, Obamacare. The argument in conservative circles for a silver lining to this dark cloud of human bodily excretions is that this ends the debate over the right to use the Commerce Clause to justify any action of Congress and that it hangs this around Osama's neck, a huge tax increase, for the November elections. While a little soothing may be in order we are making a terrible mistake here, because, A.) an eggplant could see this is unconstitutional and, B.) it simply kicks the can down the road, forcing us to fight yet another unnecessary battle. We should have declared victory here. First, this is not a mere political move on Roberts part. He is Chief Justice of the Supreme Court, and as such is not going to tie his name to a partisan decision that will be read about in American textbooks. If he is to violate his oath it will be for personal reasons, such as upholding this law against all expectations. What will he gain personally from doing the right thing and striking it down? Upholding such a crazy law guarantees him a spot in the history books. But he is violating his oath of office in doing so, and that is the only sensible explanation because the Constitution is fairly clear; the United States Constitution expressly grants all powers not specifically enumerated in the document to the states and the People, and nowhere is this particular tax authorized. Furthermore, it violates the principle of equality under the law as only some of the public is actually paying a tax; the rest are buyin
1More

David Skeel: A Nation Adrift From the Rule of Law - WSJ.com - 1 views

  •  
    "No one doubts that the coming election will be the most important referendum on the size and nature of government in a generation. But another issue is nearly as important and has gotten far less attention: our crumbling commitment to the rule of law. The notion that we are governed by rules that are transparent and enacted through the legislative process-not by the whims of our leaders-is at the heart of that commitment. If legislators exceed their authority under the Constitution, or if otherwise legitimate laws are misused, courts must step in to prevent or remedy the potential harm. During the 2008 financial crisis, the government repeatedly violated these principles. When regulators bailed out Bear Stearns by engineering its sale to J.P. Morgan Chase, they flagrantly disregarded basic corporate law by "locking up" the transaction so that no other bidder could intervene. When the government bailed out AIG six months later, the Federal Reserve funded the bailout by invoking extraordinary loan powers for what was clearly an acquisition rather than a loan. (The government acquired nearly 80% of AIG's stock.) Two months later, the Treasury Department used money from the $700-billion Troubled Asset Relief Program fund to bail out the car companies. This was dubious. Under the statute, the funds were to be used for financial institutions. But the real violation came a few months later, when the government used a sham bankruptcy sale to transfer Chrysler to Fiat while almost certainly stiffing Chrysler's senior creditors. According to two leading legal scholars, Eric Posner and Adrian Vermeule, rule-of-law violations are inevitable during a crisis. The executive branch takes all necessary steps, even if that means violating the law, until the crisis has passed. The argument is powerful, and its advocates are correct that presidents and other executive-branch officials often push the envelope during a crisis. Yet pushing the envelope isn't the same thing as f
1More

The US government has betrayed the internet. We need to take it back | Bruce Schneier |... - 0 views

  •  
    "The USA Government has betrayed the Internet. We need to take it back. The NSA has undermined a fundamental social contract. We engineers built the Internet - and now we have to fix it and take it back." "Government and industry have betrayed the internet, and us. By subverting the internet at every level to make it a vast, multi-layered and robust surveillance platform, the NSA has undermined a fundamental social contract. The companies that build and manage our internet infrastructure, the companies that create and sell us our hardware and software, or the companies that host our data: we can no longer trust them to be ethical internet stewards. This is not the internet the world needs, or the internet its creators envisioned. We need to take it back. And by we, I mean the engineering community. Yes, this is primarily a political problem, a policy matter that requires political intervention. But this is also an engineering problem, and there are several things engineers can - and should - do."
5More

Tech giants reach White House deal on NSA surveillance of customer data | World news | ... - 0 views

  • The Obama administration has reached a deal with a number of technology giants, allowing the companies to disclose more information on customer data they are compelled to share with the government.Announced on Monday, the transparency arrangement ends months of legal wrangling between the companies and US intelligence agencies before a secret surveillance court, to compel the disclosures.The disclosures are to be nonspecific, listed by the thousand and subject in some cases to a six-month delay – speaking to the large quantities of data that the government still plans on collecting from its technology partners. In order to be more specific about the amount of data turned over, the companies must be less specific about the type of data it is.The deal also explicitly points to a delay of up to two years on revealing information on data collected under surveillance programs the National Security Agency may yet develop.
  • But the deal also purports to shed far more light than ever on a question the intelligence agencies have been extremely reluctant to address – the number of people affected by NSA surveillance.The Justice Department said the transparency deal also applies to phone companies that turn over, on a daily basis, the records of every phone call made in the US. The phone companies have not exhibited the same agitation for transparency in the wake of the Edward Snowden revelations as have tech firms.
  • The new arrangement addresses a major grievance held by Google, Yahoo, Microsoft, Facebook and LinkedIn, which all joined a coalition called Reform Government Surveillance in order to pressure the administration into reassuring their customers about the propriety and legality of giving vast amounts of data to the NSA, FBI and other government agencies. It does not curtail the amount of data demanded, which is another demand of the coalition. 
  • ...2 more annotations...
  • Additionally, once the NSA or other government agency develops a surveillance effort on “a platform, product or service (whether developed or acquired) for which the company has not previously received such an order”, the firms must wait two years before disclosure of its existence. Such “new capability orders” would subsequently be subject to the same biannual reporting requirements after the two-year period expires.
  • The five firms that were party to the Fisa court transparency suit agreed to drop their case, according to a document released by the court on Monday. Civil libertarians were optimistic about the deal. 
11More

LAPD scopes out Israeli drones, 'Big Data' solutions | Nation | Jewish Journal - 0 views

  • For the first nine days of February, eight of the Los Angeles Police Department’s top brass were 7,500 miles away from home, being shuttled around Israel in a minibus.
  • LAPD Deputy Chief Jose Perez, a good-natured 30-year veteran of the department who oversees its central bureau, tweeted updates at nearly every stop. On Feb. 2, he shared a group photo of the Los Angeles delegation visiting the corporate headquarters of Nice Systems, an Israeli security and cyber intelligence company that can intercept and instantly analyze video, audio and text-based communications. (A seemingly tongue-in-cheek inspirational poster on the wall behind them reads: “Every voice deserves to be heard.”)
  • The group visited private security firms and drone manufacturers, as well as the terror-prone Ashdod Port, a museum in Sderot full of old rockets shot from nearby Gaza (the same one United States President Barack Obama visited on his 2008 campaign trip to Israel), and a “safe city” underground control center in the large suburb of Rishon LeZion, which receives live streams from more than 1,000 cameras with license plate recognition installed throughout the city.
  • ...8 more annotations...
  • Frank was joined by seven of his fellow command staff at the Big Data Intelligence Conference hosted by i-HLS in the beach town of Herzliya, Israel, on Feb. 6. “On behalf of my chief of police, Chief Charlie Beck, and the 13,000-plus sworn and non-sworn members of the Los Angeles Police Department, a very heartfelt thanks to all of you for having me here,” Frank said in an opening statement for the conference, which brought together some of Israel’s — and the world’s — top cyber security and intelligence experts.
  • Frank said he was especially impressed by what he saw while visiting Israeli companies Nice Systems (as tweeted by Perez) and Verint, one of the companies whose services the National Security Administration (NSA) reportedly used in the infamous United States wiretapping scandal. Both companies already count the LAPD as a client. But, Frank said, “we’re looking at some of their additional solutions … They have a lot of new technologies that we are very much interested in.” Nice System’s  president of security, Yaron Tchwella, spoke at the conference about the company’s ability to help government agencies capture and store the billions of calls, emails, messages and social media posts that their populations generate each day, then analyze it in real time to detect potential threats.
  • Perez said he hoped the LAPD, too, would eventually be able to “use technology to incorporate all the systems that we have. That’s the wave of the future. We’re definitely looking at the ability to get that information out to the officers on the beat with a handheld. Something happens, and you’re looking at the handheld — almost like ‘The Bourne Supremacy’ — here’s a picture of the guy you’re looking for.”
  • Also in Khan’s crosshairs is Special Order 1, an LAPD policy that allows officers to document any otherwise lawful activity that they, or other members of the community, deem suspicious. (Including, for example, the photographing of certain government sites.) And new LAPD intel collection methods or surveillance drones, said Khan, would only be “adding more to their toolbox of being highly militarized in counterinsurgency forces” against protesters and movements such as Occupy. “Yet it is wrapped in this whole language of community policing.” Two separate L.A. Weekly investigations in 2012 found that the LAPD uses expensive StingRay devices, which can locate cellphones (and their users) by acting like cellphone towers, and license-plate recognition cameras that track millions of drivers. Although both devices technically require a warrant to be used in a police investigation, there is little way to know whether police are always complying with the rules.
  • Surveillance drones manufactured by Israel Aerospace Industries (IAI) and Sky Sapience were also hot items on the LAPD tour. Both Frank and Perez lit up when talking about the HoverMast, a new tethered drone from Sky Sapience that was just released to the IDF late last year. “There are several things on the wish list, but we did like Sky Sapience — that was incredible,” Perez said. “For me personally, just for my command, which is five stations, and all the special events that I have, crowd control and being able to see everything would be some technology that is needed immediately.” However, Frank added, the HoverMast “has its challenges: from a political standpoint, convincing our political leaders, and from a community standpoint, convincing the community that it’s not Big Brother watching over you.”
  • A spokeswoman for Sky Sapience said the HoverMast can intercept wireless communications, and its cameras are capable of facial recognition. A spokeswoman for IAI said that while showing LAPD officers their drones, the company “wanted to emphasize the fact that drones can be very helpful in giving intelligence in urban scenarios… you need it now, you need it quick, you need to see what’s inside a window, and what’s behind this building.”
  • Many of the companies attracting LAPD interest have one thing in common: They were formed by veterans of the IDF’s elite, top-secret 8200 Unit, better known as Israel’s version of the NSA.
  • Perez emphasized that as a local police agency, the LAPD has much tighter legal constraints than federal agencies to adhere to when adopting army-born surveillance and “big data” technologies.
2More

Gramm-Leach-Bliley Act - Wikipedia, the free encyclopedia - 0 views

  • The Gramm–Leach–Bliley Act (GLB), also known as the Financial Services Modernization Act of 1999, (Pub.L. 106–102, 113 Stat. 1338, enacted November 12, 1999) is an act of the 106th United States Congress (1999–2001). It repealed part of the Glass–Steagall Act of 1933, removing barriers in the market among banking companies, securities companies and insurance companies that prohibited any one institution from acting as any combination of an investment bank, a commercial bank, and an insurance company. With the passage of the Gramm–Leach–Bliley Act, commercial banks, investment banks, securities firms, and insurance companies were allowed to consolidate. The legislation was signed into law by President Bill Clinton.
  • Contents  [hide]  1 Legislative history 2 Changes caused by the Act 3 Remaining restrictions 4 Privacy 5 Financial Privacy Rule 5.1 Financial institutions 5.2 Consumer vs. customer defined 5.3 Consumer/client privacy rights 6 Safeguards Rule 7 Pretexting protection 8 Effect on usury law 9 Controversy 9.1 Criticisms 9.2 Defense 10 Amendments 10.1 Proposed 11 See also 12 Notes 13 References 14 Sources 15 External links 15.1 Compliance information 15.2 Consumer/client rights information 15.3 History of the GLB 15.4 Congressional voting records on Gramm–Leach–Bliley Act
« First ‹ Previous 81 - 100 of 880 Next › Last »
Showing 20 items per page