Skip to main content

Home/ Socialism and the End of the American Dream/ Group items matching "normalization" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
2More

World's Largest Barrier Reef to Disappear in 5 Years | News | teleSUR English - 0 views

  • .ng-hide:not(.ng-hide-animate){display:none !important}.shr-debug{font-weight:bolder;cursor:pointer;color:#008000}.shareaholic-canvas{clear:both}.shareaholic-ui button,.shareaholic-ui .shareaholic-ui-button{border:0;box-shadow:none;text-shadow:none;font-size:12px;padding:6px 10px !important;border-radius:3px;background:transparent;display:inline-block;margin:2px;border:1px solid transparent;line-height:16px;color:#555;cursor:pointer;height:initial;text-transform:initial;}.shareaholic-ui button:hover,.shareaholic-ui .shareaholic-ui-button:hover{color:#000;font-weight:inherit}.shareaholic-ui button.button-primary,.shareaholic-ui .shareaholic-ui-button.button-primary{background-color:#52a8e8;background-image:-webkit-linear-gradient(top,#52a8e8,#377ad0);border:1px solid #3f81ae;border-color:#3f81ae #2e68a1 #1f5496;box-shadow:inset 0 1px 0 0 #72baeb,0 1px 2px 0 #c3c3c3;color:#fff;font-weight:bold;text-shadow:0 -1px 1px #3275bb;-webkit-appearance:none}.shareaholic-ui button.ui-disabled,.shareaholic-ui .shareaholic-ui-button.ui-disabled{background-color:#ccc;background-image:none;border-color:#bbb;box-shadow:none;color:#999;cursor:default;opacity:.5;text-shadow:none}.shareaholic-ui button.icon-only,.shareaholic-ui .shareaholic-ui-button.icon-only{padding:0;}.shareaholic-ui button.icon-only.icon-16,.shareaholic-ui .shareaholic-ui-button.icon-only.icon-16{padding:4px;}.shareaholic-ui button.icon-only.icon-16 i,.shareaholic-ui .shareaholic-ui-button.icon-only.icon-16 i{height:16px;width:16px}.shareaholic-ui button.icon-only.icon-24,.shareaholic-ui .shareaholic-ui-button.icon-only.icon-24{padding:0;}.shareaholic-ui button.icon-only.icon-24 i,.shareaholic-ui .shareaholic-ui-button.icon-only.icon-24 i{height:24px;width:24px}.s
  • According to the report published in the journal Estuarine, Coastal and Shelf Science, saving the reef will take a huge amount of work and money. Poor water quality was seen as the major threat as well as global warming which is causing significant coral bleaching. Chief researcher of the report, John Brodie, told the Guardian, “The current spending is totally inadequate ... You either do it properly or you give up on the reef. It’s that bad.”
4More

M of A - "Dramatic Rescue! Man With Kid Runs Towards Camera!" - 44 Staged Pictures - 0 views

  • A man with a kid in arm runs towards the camera. The kid's face is heavily colored, but it looks otherwise fine. On the lower left we see the back of a man with a "White Helmets" logo on his vest. Dust in the background. Always dust or smoke. A bunch of men looking very busy but are they actually doing anything? That would be a lucky by-chance photo shot for any normal photographer. Even in country where rubble from a fresh bombing may be around some near corner. But this is a typical "White Helmets rescue kid" propaganda picture. The photo above is, except for maybe the old rubble, likely completely staged. There the 43 similar pictures below the fold to demonstrate that. Just ask yourself: Could all these very similar by-chance pics, taken within about a year, be real? Really?
  • The pictures above all look astonishingly similar: rubble, dust or rather haze from a smoke grenade in the background, dusted/greasepaint bloody kids who have no visible trauma, the rescuer with the kid moving towards the camera. Dramatic, high quality scenes which do get distributed by news agencies and published again and again by major "western" media. Isn't it an amazing fortune that so many kids get rescued alive by the "White Helmets", without any serious wounds visible, just moments after bomb impacts? This week after week? With all the same attributes in each picture? No photo editor at any of the big media ever wondered about that? These staged photos are part of the war propaganda against the Syrian people and their government. The "White Helmets" take and distribute these photos. They also distribute lots of "kids rescued from rubble" videos. We wrote about those a month ago: Other typical features of these movies, see this one, are smoke (grenades) in the streets, dramatic but small open fires nearby, dust or some red color on the children's face or arms. The camera is often used in a hectic, intentionally amateurish first person view, a style extensively developed in the 1999 horror clip Blair Witch Project. Sometimes sounds of additional "bomb impact" bangs or screaming/wailing women are added. The "White Helmets" are part of the (anti-)Syria Campaign. "Kid rescued from rubble" is their standard shtick. They are financed with some $60+ million from your taxes by the U.S., the UK and other governments. Such money will buy a lot of good cameras and props and will pay for many actors and extras.
  • The Syria Campaign was created by Purpose Campaigns LLC. The company fabricates and runs for you any world-wide "grass root" movement you would like. With Purpose LLC or other such companies involved, big dollars will buy you big effects. How about an automated Twitter campaign to spread anti-Shia sectarianism? Someone paid for it and here it is. The "White Helmets" campaign demonstrates the amazing manipulation potential such companies and their high paying customers have.
  •  
    A U.S.-U.K. propaganda front operating behind ISIL and al-Nusrah lines. See also: http://www.moonofalabama.org/2016/06/gallery-dramatic-rescue-man-with-kid-runs-towards-camera-43-staged-pictures.html#c6a00d8341c640e53ef01b8d1fb87c3970c amd https://www.youtube.com/watch?v=5k6hSS6xBTw&feature=youtu.be The U.S. State Department admits to providing $23 million to this group operating behind al-Nusrah and ISIL lines. 
48More

The Daily Bell - Richard Ebeling on Libertarianism, Anarchism and the Truth of Austrian... - 0 views

  • These are at least two conceivable methods of compelling the government to stop, or limit, its abuse of the monetary printing press.
    • Gary Edwards
       
      Ebeling proposes two methods of reining in out of control government printing of paper money.  There is a third method; one used by Lincoln and Kennedy.  This is the issuance of gold/silver/oil backed reserve notes.  The notes represent gold or silver being held on deposit, and are fully redeemable.   The value of the gold/silver or another commodity represented floats in the marketplace against goods and services.  Nor is there a fixed exchange rate for converting fiat (paper) dollars.  The market will figure those things out if left free to do so.  And that's one big big "if".
  • So the normal market pressures of downward price and wage adjustments in the recession are partly counter-acted by a new monetary expansion that is delaying the necessary re-coordination of market activities. Thus, given these two pressures, prices do not fall as much as a post-recession adjustment may require and they do not rise as much or as fast as might otherwise occur due to the renewed monetary expansion.
  • At the same time, as you correctly ask, the Federal Reserve has been paying banks a relatively low rate of interest to keep large excessive reserves in their accounts at the Federal Reserve, rather than to fully lend those excessive reserves to private borrowers. And given the low market rates of interest that Federal Reserve policy has generated, even the low rate of interest on unlent excess reserves offered to banks by the Federal Reserve appears the relatively more profitable way to use their available funds.
  • ...44 more annotations...
  • Why has the Federal Reserve done this? They infused these two trillion dollars into the financial markets back in 2008-2010 because they feared that an economy-wide bank collapse was possible. They are afraid to reverse this monetary expansion because to do so would reduce potential bank-lending capacity and put upward pressure on interest rates at a time when the Federal Reserve wants to prevent the sluggish recovery from slowing down even more and also raise the cost of the US government's financing of its trillion dollar a year deficits. So, instead, they leave this excess bank lending power sloshing around in the system, while keeping it off the market and from causing significant new price inflationary pressures, by paying banks not to lend those vast sums.
  • Austrians argue that economics is fundamentally a science and study of "human action." It attempts to trace out the logic and implications of man's intentional conduct in selecting among ends desired and applying perceived means to try to attain them. Austrians emphasize that all human action and the social and market interactions among men occur in a setting of imperfect knowledge, inescapable degrees of uncertainty and always through the passage of time.
  • They try to explain the market processes by which men discover mutual gains from trade.
  • They emphasize that the networks of social institutions in which and through which men discover ways to coordinate their interdependent actions in complex systems of division of labor are not the creations of government edict or command; but are most often among those unintended consequences of multitudes of self-interested individual actions and interactions.
  • They have developed theories of market competition and the role of the entrepreneur as the individuals always alert to market opportunities, and whose actions tend to bring about coordination between market supplies and demands.
  • The Austrian analysis of markets, competition and prices, led them to devastating critiques of the unworkability of all forms of socialist central planning, the inherent contradictions and inconsistencies in virtually all forms of government intervention and regulation, and a theory of money and the business cycle that points the finger of responsibility for inflations and recessions at the doorstep of government monetary and fiscal policies.
  • The philosophy of liberty proclaims that each individual is unique and possessing inherent rights to his life, liberty and honestly acquired property.
  • It is not surprising that classical liberal and libertarian ideas are often attacked. After all they are the ideas that consistently oppose the current political systems of plunder, privilege and power lusting.
  • That government, if it is to exist, is to serve as the protector and guardian of our distinct individual rights, and not the master of men who are obligated to sacrifice themselves for some asserted "national interest," "general welfare," or "common good."
  • The only reasonable meaning to the "common good" or the "general welfare" is when each individual is free to peacefully live his life as he chooses and is at liberty to voluntarily associate and interact with his fellow men for mutually beneficial improvements to their lives.
  • It is virtually inevitable that those who use political power for their own gain at their neighbor's expense will vehemently resist and oppose any attempt to stop them from feeding at the government trough.
  • there is everywhere a class of plundering peoples – politicians, bureaucrats, special interest groups – receiving tax-based income redistributions and subsidies and benefiting from anti-competitive regulations and protections against and at the expense of their fellow human beings.
  • This is the great battle of the twenty-first century;
  • Austrian Economics, not surprisingly, has been attacked precisely because of its insightful and cogent analysis of how it was government intervention and central bank monetary manipulation that generated the unsustainable boom in the last decade that set the stage for the inescapable bust, which the world is still suffering from.
  • There are "natural rights" libertarians
  • "utilitarian" or "consequentialist" libertarians.
  • most convincing case for human liberty
  • Because libertarians have not agreed about this among themselves, nor have they been able to persuade enough others in society to move the world further away from the collectivist premises and the interventionist-welfare state policies that guide so much that goes on in the world.
  • I happen to have been most strongly influenced by the "natural rights" defense of liberty, and especially as formulated by Ayn Rand in her philosophy of Objectivism.
  • First, it is argued that if one believes that the use of any and all forms of coercion are morally unacceptable in human relationships, then this should also imply that any compulsory taxation, even when for the funding of defense and legal justice, is unjustifiable. And, second, it is argued that the private sector could provide such admittedly essential services far more efficiently and cost-effectively than the monopoly agency of government. Murray Rothbard and David Friedman probably have been among the most well-known and articulate proponents of the anarcho-capitalist position over the last 50 years.
  • Others like the Ayn Rand, Robert Nozick and Ludwig von Mises have made the case for constitutionally limited government. Their counter arguments have centered on the ideas that conflicts over jurisdiction, disputes among private defense agencies contracted by different individuals who have disagreements, and the likelihood that "defense" would turn out to be a "natural monopoly" anyway – that is, a tendency for one agency to end up being the single provider of defense and judicial services over a wide geographical area – raise questions about the long-run workability and sustainability of competing defense companies in society.
  • From a moral perspective, I am in sympathy with the anarcho-capitalist position, in that I find the compulsory taking of people's income and wealth without their consent for whatever reason to be ethically repugnant.
  • We should focus on what we all agree upon:
  • This means that the Supreme Court has said that you are the slave of "society" and the government that represents "the people," since, in principle, anything that you do or not do can be argued to have some affect, positive or negative, on others.
  • Think about this Court decision. It is saying that if you do not buy health insurance the government will tax you to pay for it. If you refuse to pay the tax, the government will end up attempting to seize financial assets or real property you own in lieu of failure to pay. If you try to prevent this taking of your property, you are subject to arrest and imprisonment. If you resist arrest or imprisonment, the police have the authority to force you to comply – up to and including lethal force to subdue you into obedience.
  • the freedom and dignity of the individual human being; and the attempt whenever and wherever on our part to reduce, repeal and abolish all forms of regulation, control, restriction, prohibition on the peaceful and honest affairs of our fellow men.
  • Once you accept this premise, there is no end to the minutest detail and content of your life and actions the government cannot claim jurisdiction over to regulate, control or prohibit.
  • Here is that end-of-the-road of the notion of unlimited democratic rule by "the people" and those who claim to speak for "the people" and rule on their behalf.
  • Ayn Rand, of course, rejected any connection or compatibility with libertarianism. She argued this on two grounds. First, she felt that too frequently libertarians spoke of individual freedom, free markets and limited government, but failed to explicitly and clearly ground their political-economic ideas in a demonstrable philosophy of man, nature and society.
  • Government control of money is the potentially most dangerous and damaging form of government power short of outright socialism.
  • Rand's political philosophy arises out of the "natural rights" tradition, that rights are inherent in the nature of man and precede government.
  • Mises believed that rights were, in a sense, "social conventions" that had evolved out of the discovery that certain social institutional arrangements were more conducive to the mutual betterment of all members of society for achieving their individual goals and values
  • What they did agree upon was that, given their respective conceptions of the basis of individual rights, there was no social and economic system more consistent with the protection of those rights and more likely to generate the material and cultural achievements that are potentially possible than laissez-faire capitalism.
  • And in the twentieth century, Rand and Mises were two of the most principled and uncompromising advocates for the completely free market society
  • Second, she rejected the anarchist elements in the libertarian movement, believing that any reasonable analysis of the reality of man and the human condition strongly suggested the inescapable need for a single legal standard for defining and enforcing individual rights and a single authority to as impartially and "objectively" as possible enforce laws defending each individual's rights to his life, liberty and honestly acquired property.
  • "Hardly ever do the advocates of free capitalism realize how utterly their ideal was frustrated at the moment the state assumed control of the monetary system . . .
  • A 'free' capitalism with government responsibility for money and credit has lost its innocence.
  • From that point on it is no longer a matter of principle but one of expediency how far one wishes or permits government interference to go.
  • Money control is the supreme and most comprehensive of all governmental controls short of expropriation."
  • Government basically has three ways to acquire the income and wealth of its citizens: taxation, borrowing and printing money
  • So, governments throughout history have turned to the monetary printing press to fund the expenditures not covered by taxes or borrowed money
  • This "non-neutral," or uneven, impact on prices and wages in the economy during the inflationary process brings in its wake distorted profit margins, misallocations of resources and labor and various mal-investments of capital. Here are the seeds for the artificial and unsustainable "booms" that invariably come crashing down in the "bust" once the monetary expansion that has set it all in motion is stopped or slowed down.
  • I believe that the choice and use of money should be left to the market, that is, to the free and voluntary interactive decisions of those buying and selling in the market.
  • I consider a private, competitive free banking system to be the only one consistent with a truly free market society.
4More

Iraq, Afghanistan Veterans Filing For Disability Benefits At Historic Rate - 0 views

  • A staggering 45 percent of the 1.6 million veterans from the wars in Iraq and Afghanistan are now seeking compensation for injuries they say are service-related. That is more than double the estimate of 21 percent who filed such claims after the Gulf War in the early 1990s, top government officials told The Associated Press. What's more, these new veterans are claiming eight to nine ailments on average, and the most recent ones over the last year are claiming 11 to 14. By comparison, Vietnam veterans are currently receiving compensation for fewer than four, on average, and those from World War II and Korea, just two.
  • The new veterans have different types of injuries than previous veterans did. That's partly because improvised bombs have been the main weapon and because body armor and improved battlefield care allowed many of them to survive wounds that in past wars proved fatal. "They're being kept alive at unprecedented rates," said Dr. David Cifu, the VA's medical rehabilitation chief. More than 95 percent of troops wounded in Iraq and Afghanistan have survived.
  • "You just can't keep sending people into war five, six or seven times and expect that they're going to come home just fine," he said. For taxpayers, the ordeal is just beginning. With any war, the cost of caring for veterans rises for several decades and peaks 30 to 40 years later, when diseases of aging are more common, said Harvard economist Linda Bilmes. She estimates the health care and disability costs of the recent wars at $600 billion to $900 billion.
  •  
    The earlier Gulf War lasted only 100 hours, but still resulted in 21% compensable disabilities among its veterans, not counting those who are still in active military service. But the Iraq and Afghanistan wars still continue after 10 years, albeit we're now fighting the Iraq War with mercenaries only. And thus far, 45 per cent of those who served in Iraq and Aghanistan have applied for VA disability compensation, with far more still in service and thus ineligible for VA disability comp until they are discharged from the military. That's how badly the U.S. government treated its military in these latter wars, with many of them serving as many as seven combat tours of duty. That compares with the Viet Nam war where a 3-year enlistee normally saw only a single combat tour. The incidence of injury increases along with time spent in combat. And some types of injuries, e.g., posttraumatic stress disorder ("PTSD"), result from cumulative time spent in combat. Virtually everyone has their breaking point and the more time spent in combat the more likely that PTSD will result. Likewise, the more time spent handling projectiles weighted with depleted Uranium or walking through areas where such rounds have exploded, the more likely that radiation sickness or cancer will result. And a huge range of injuries may only result in disabilities well after the aggravating factor of aging has worked its magic. As Prof. Bilmes said in 2008, "in World War II and Vietnam and Korea, the number of wounded troops per fatality was about two-to-one or three-to-one. And now, the number of wounded troops per fatality is seven-to-one in combat, and if you include all of those wounded in non-combat and diseased seriously enough to have to be medevaced home, it's fifteen-to-one. So it's a very significant difference. And this difference compared to previous wars is, of course, you know, a great tribute to the medical care that they receive on the field and the enormous advance
5More

Push for New Sanctions on Iran Stalls Amid Growing Resistance | The Nation - 0 views

  • A bid to slap Iran with a new round of economic sanctions appears to have stalled in the Senate, after leading Democrats amplified concern about the threat such a move poses to a fragile diplomatic process. Early in the week, reports that a bill introduced by Republican Mark Kirk and Democrat Robert Menendez was within striking distance of a veto-proof majority cast a shadow over news that negotiators had finalized a temporary agreement to freeze Iran’s nuclear program, beginning Monday. New sanctions would likely kill negotiations for a final deal, the White House warned lawmakers, and increase the chances of an armed conflict with Iran. But Senate majority leader Harry Reid has given no indication that he will bring the bill up for a vote, and the pressure to do so is falling now that top Democrats have intensified opposition to the proposed legislation. The Kirk-Menendez bill gained no new endorsements this week, and even one supportive senator admitted Wednesday to a break in momentum.
  • The gorilla in the room is the American Israeli Public Affairs Committee, which has been calling for new sanctions for months. Of the 16 Democrats who have endorsed the Kirk-Menendez legislation, several are up for re-election in closely contested states; Senator Kirk himself suggested Tuesday that a vote for new sanctions would be an opportunity for lawmakers to shore up support from the powerful lobby. “The great thing, since we represent a nationwide community — the pro-Israel community is going to be heavily present in most states — this is a chance for senators to go back and tell them, ‘I’m with you,’” Kirk said. Other Democrats pushing for the bill have close ties with the group, particularly Chuck Schumer and Cory Booker. Tellingly, the Kirk-Menendez bill states that if Israel takes "military action in legitimate self-defense against Iran's nuclear weapons program,” the US "should stand with Israel and provide…diplomatic, military, and economic support to the Government of Israel in its defense of its territory, people, and existence." The language is nonbinding, but it raises flags about whose interests the legislation would truly serve.
  • Dianne Feinstein addressed this point more directly than perhaps any other politician so far. “While I recognize and share Israel’s concern, we cannot let Israel determine when and where the US goes to war,” she said. “By stating that the US should provide military support to Israel should it attack Iran, I fear that is exactly what this bill will do.” Such outspokenness about the relationship between US policymaking in the Middle East and Israeli interests is remarkable. But other lawmakers are signalling that they too are shrugging off the lobby: Democratic Representative Debbie Wasserman-Shultz, normally a high-profile ally for AIPAC, reportedly argued against the Kirk-Menendez bill at a White House meeting attended by several dozen of her colleagues on Wednesday night. How things play out in the next week, and in the duration of the talks with Iran, will be a good test of AIPAC’s influence, which seemed diminished when Congress considered military strikes in Syria last year. Progressives claimed a victory when diplomacy prevailed then; as Peter Beinart points out, the current debate presents a real opportunity for the anti-war left to reassert itself, not only to punish lawmakers who start wars, but to set new expectations for a diplomacy-first approach.
  • ...1 more annotation...
  • Read Next: Robert Scheer on the 1953 CIA-supported coup in Iran.
  •  
    More signs that the power of the Israel Lobby in Congress is on the wane and that it is now a fit topic for open discussion. Might we yet again see the day when members of the Israel Lobby will be required to register as agents of a foreign power, as required by law?  (That bit about "Progressives claimed a victory when diplomacy prevailed then" is in my opinion off the wall. There are exceedingly few true "progressives" in Congress; they can be counted on the fingers of one hand. The statement ignores that members of Congress in both parties came out in opposition to war on Syria, as did the Pentagon. The precipitating sarin gas attack was quickly exposed as a false flag  attack cooperatively mounted by the Saudis and U.S. government officials to justify the planned U.S missile strikes. Public opinion was overwhelmingly against war on Syria and Russian diplomats offered Obama a face-saving path of retreat. Oh, yeah. Mid-term elections are coming up this year, and no Congressman up for reelection relished the thought of facing voter wrath on this issue.     it was public opinion against war with Syria, Russia capitalizing on John Kerry's hoof-in-mouth disease, 
6More

​Syria and the Geneva 2 charade - RT Op-Edge - 0 views

  • In the summertime, people flock to Montreux, Switzerland, to follow the jazz festival. This week, though, the 'performance' is by a positively un-swinging lot, part of the (in theory) very serious Geneva 2 conference on Syria. What is Geneva 2 for? It has nothing to do with 'peace' . It won't yield an international deal to end the Syrian tragedy. The horrible war facts on the ground will remain facts, and horrible; many perpetrators won't be gathering in Montreux. Syrian civil society has not even been invited. And then the whole charade degenerated into pitiful parody even before it started.
  • Meet 'good' and 'bad' Al-Qaeda Time to break it down. Washington ruled that Iran cannot be in Montreux because it supports Assad. It's as simple as that. Washington dictating to the UN is the norm. Washington dictating to the Exiled Syrian 'Opposition' is Also the norm. Everyone is a puppet in this lethal comedy. As for Western spin doctors, they are dizzier than flies over corpses. As Part of the New Western Myth That the Saudi Arabia-Sponsored Islamic Front - Last September Formed Against the US-backed Supreme Military Council - are nothing but 'Al-Qaeda good' , now we have TOP 'Rebels' routinely acknowledging to Western corporate media they are, well, Al-Qaeda. Tens of thousands of foreign jihadis using Al-Qaeda's network of safe houses in Turkey - well, that's not such a big deal. As the Narrative Goes, 'our New friends' in the Islamic Front are just 'conservative Salafi Muslims' . What if they are fond of the odd torture binge and will think nothing of slaying the odd Shiite or Christian? Not such a big deal. As for the 'bad' Al-Qaeda gang - from Al-Nusra Front and Ahrar al-Sham to the Islamic State of Iraq and the Levant (ISIL) - They are on A roll. After all, they are the ones with fighting experience / leverage on the ground. And when push comes to shove, they just run yet another ring around clueless Western necks. Take Ahrar al-Sham. They now lead the Islamic Front - and talk to the Americans. And guess what; they're going to Montreux! The icing on this cake is Takfiri That, Ultimately, Their "interests" are Being Defended by no less than US Secretary of State John Kerry. Washington promoting al-Qaeda? Well, we've seen that movie before.
  • Washington is the Selling Fiction it is 'leading' Geneva 2 to 'reconstruct' Syria. This is utter nonsense. Theoretically - and even that is still extremely debatable - the Obama administration's core interest in Southwest Asia is to negotiate a very complex deal with Iran, which will take most of 2014. Ultimately, this whole charade is between Washington and Tehran. The US Navy will not make Assad 'go' Anytime soon - or Ever; everything so, in Theory, Remains on the table.
  • ...2 more annotations...
  • And everyone else, the UN, the Holy See, the House of Saud, are just onlookers, even as several players, from the EU to India, China and Japan, can think of nothing but finally normalizing everything with Iran. The Syrian government, for its part, will be in Montreux; it had agreed to the conference long ago. Yet President Assad Laid down ; he will not 'Leave' , as President Barack Obama US demanded The. He will not Let the foreign-Sponsored 'Opposition' Take over. And he may even contest the next presidential elections. Assad went for the jugular when he said Geneva 2 Should be About His own 'War on Terror' . Terror, incidentally, widely supported by the West. So under this perspective, even Washington needs Assad not to go. The bottom line is that the only players who really want Assad to go are the House of Saud and the House of Thani in Qatar. Many in the West have now Realized Assad must Fight to Stay 'the Terrorists' .
  • What's even more farcical is what Ford may have told the SNC stalwarts - still subject to much debate across the Middle East. If Ford really Said That Bandar Bush's Strategy has Been A Total Failure (in Fact turning Syria into an Al-Qaeda Hub) then this points to the Obama Administration, for All Practical Purposes, Sharing the Same Objective as Assad's: Fighting 'Terror' . Still, Geneva 2 will not 'Solve' anything. Iran and Russia will keep supporting Damascus. The desert wasteland from Syria to Iraq will keep being occupied by Bandar Bush-supported and Gulf-supported hardcore sectarian jihadis. The war will keep spreading deeper into Lebanon. The government in Damascus won't collapse. The refugee crisis will soar. And the West Will Keep Striking A pose of Being Concerned with 'Terror' .
  •  
    What a hoot! Hillary's Free Syrian Army defected to the jihadis after the missile strikes on Syria did not happen. Now Obama and Kerry are trying to sell the spin of "good" vs. "bad" Al Qaeda, a fact that in itself underscores that Al Qaeda are a bunch of mercenaries whose services go to the highest bidder.  
12More

N.S.A. Devises Radio Pathway Into Computers - NYTimes.com - 1 views

  • The National Security Agency has implanted software in nearly 100,000 computers around the world that allows the United States to conduct surveillance on those machines and can also create a digital highway for launching cyberattacks.While most of the software is inserted by gaining access to computer networks, the N.S.A. has increasingly made use of a secret technology that enables it to enter and alter data in computers even if they are not connected to the Internet, according to N.S.A. documents, computer experts and American officials.The technology, which the agency has used since at least 2008, relies on a covert channel of radio waves that can be transmitted from tiny circuit boards and USB cards inserted surreptitiously into the computers. In some cases, they are sent to a briefcase-size relay station that intelligence agencies can set up miles away from the target.
  • The radio frequency technology has helped solve one of the biggest problems facing American intelligence agencies for years: getting into computers that adversaries, and some American partners, have tried to make impervious to spying or cyberattack. In most cases, the radio frequency hardware must be physically inserted by a spy, a manufacturer or an unwitting user.
  • The N.S.A. and the Pentagon’s Cyber Command have implanted nearly 100,000 “computer network exploits” around the world, but the hardest problem is getting inside machines isolated from outside communications.
  • ...8 more annotations...
  • the program, code-named Quantum, has also been successful in inserting software into Russian military networks and systems used by the Mexican police and drug cartels, trade institutions inside the European Union, and sometime partners against terrorism like Saudi Arabia, India and Pakistan, according to officials and an N.S.A. map that indicates sites of what the agency calls “computer network exploitation.”“What’s new here is the scale and the sophistication of the intelligence agency’s ability to get into computers and networks to which no one has ever had access before,” said James Andrew Lewis, the cybersecurity expert at the Center for Strategic and International Studies in Washington. “Some of these capabilities have been around for a while, but the combination of learning how to penetrate systems to insert software and learning how to do that using radio frequencies has given the U.S. a window it’s never had before.”
  • A program named Treasure Map tried to identify nearly every node and corner of the web, so that any computer or mobile device that touched it could be located.
  • Over the past two months, parts of the program have been disclosed in documents from the trove leaked by Edward J. Snowden, the former N.S.A. contractor. A Dutch newspaper published the map of areas where the United States has inserted spy software, sometimes in cooperation with local authorities, often covertly. Der Spiegel, a German newsmagazine, published the N.S.A.'s catalog of hardware products that can secretly transmit and receive digital signals from computers, a program called ANT. The New York Times withheld some of those details, at the request of American intelligence officials, when it reported, in the summer of 2012, on American cyberattacks on Iran.
  • A 2008 map, part of the Snowden trove, notes 20 programs to gain access to big fiber-optic cables — it calls them “covert, clandestine or cooperative large accesses” — not only in the United States but also in places like Hong Kong, Indonesia and the Middle East. The same map indicates that the United States had already conducted “more than 50,000 worldwide implants,” and a more recent budget document said that by the end of last year that figure would rise to about 85,000. A senior official, who spoke on the condition of anonymity, said the actual figure was most likely closer to 100,000.
  • The N.S.A.'s efforts to reach computers unconnected to a network have relied on a century-old technology updated for modern times: radio transmissions.In a catalog produced by the agency that was part of the Snowden documents released in Europe, there are page after page of devices using technology that would have brought a smile to Q, James Bond’s technology supplier.
  • One, called Cottonmouth I, looks like a normal USB plug but has a tiny transceiver buried in it. According to the catalog, it transmits information swept from the computer “through a covert channel” that allows “data infiltration and exfiltration.” Another variant of the technology involves tiny circuit boards that can be inserted in a laptop computer — either in the field or when they are shipped from manufacturers — so that the computer is broadcasting to the N.S.A. even while the computer’s user enjoys the false confidence that being walled off from the Internet constitutes real protection.The relay station it communicates with, called Nightstand, fits in an oversize briefcase, and the system can attack a computer “from as far away as eight miles under ideal environmental conditions.” It can also insert packets of data in milliseconds, meaning that a false message or piece of programming can outrace a real one to a target computer. Similar stations create a link between the target computers and the N.S.A., even if the machines are isolated from the Internet.
  • Computers are not the only targets. Dropoutjeep attacks iPhones. Other hardware and software are designed to infect large network servers, including those made by the Chinese.Most of those code names and products are now at least five years old, and they have been updated, some experts say, to make the United States less dependent on physically getting hardware into adversaries’ computer systems.
  • But the Stuxnet strike does not appear to be the last time the technology was used in Iran. In 2012, a unit of the Islamic Revolutionary Guards Corps moved a rock near the country’s underground Fordo nuclear enrichment plant. The rock exploded and spewed broken circuit boards that the Iranian news media described as “the remains of a device capable of intercepting data from computers at the plant.” The origins of that device have never been determined.
  •  
    Even radio transceivers emplanted in USB jacks. So now to be truly secure, we need not only an air gap but also a Faraday cage protecting the air gap. 
9More

IPS - Obama's Case for Syria Didn't Reflect Intel Consensus | Inter Press Service - 0 views

  • Contrary to the general impression in Congress and the news media, the Syria chemical warfare intelligence summary released by the Barack Obama administration Aug. 30 did not represent an intelligence community assessment, an IPS analysis and interviews with former intelligence officials reveals. The evidence indicates that Director of National Intelligence James Clapper culled intelligence analyses from various agencies and by the White House itself, but that the White House itself had the final say in the contents of the document. Leading members of Congress to believe that the document was an intelligence community assessment and thus represents a credible picture of the intelligence on the alleged chemical attack of Aug. 21 has been a central element in the Obama administration’s case for war in Syria. That part of the strategy, at least, has been successful. Despite strong opposition in Congress to the proposed military strike in Syria, no one in either chamber has yet challenged the administration’s characterisation of the intelligence. But the administration is vulnerable to the charge that it has put out an intelligence document that does not fully and accurately reflect the views of intelligence analysts. Former intelligence officials told IPS that that the paper does not represent a genuine intelligence community assessment but rather one reflecting a predominantly Obama administration influence.
  • In essence, the White House selected those elements of the intelligence community assessments that supported the administration’s policy of planning a strike against the Syrian government force and omitted those that didn’t. In a radical departure from normal practice involving summaries or excerpts of intelligence documents that are made public, the Syria chemical weapons intelligence summary document was not released by the Office of the Director of National Intelligence but by the White House Office of the Press Secretary. It was titled “Government Assessment of the Syrian Government’s Use of Chemical Weapons on August 21, 2013.” The first sentence begins, “The United States government assesses,” and the second sentence begins, “We assess”. The introductory paragraph refers to the main body of the text as a summary of “the intelligence community’s analysis” of the issue, rather than as an “intelligence community assessment”, which would have been used had the entire intelligence community endorsed the document.
  • A former senior intelligence official who asked not to be identified told IPS in an e-mail Friday that the language used by the White House “means that this is not an intelligence community document”. The former senior official, who held dozens of security classifications over a decades-long intelligence career, said he had “never seen a document about an international crisis at any classification described/slugged as a U.S. government assessment.” The document further indicates that the administration “decided on a position and cherry-picked the intelligence to fit it,” he said. “The result is not a balanced assessment of the intelligence.” Greg Thielmann, whose last position before retiring from the State Department was director of the Strategic, Proliferation and Military Affairs Office in the Bureau of Intelligence and Research, told IPS he has never seen a government document labeled “Government Assessment” either. “If it’s an intelligence assessment,” Thielmann said, “why didn’t they label it as such?”
  • ...5 more annotations...
  • Former National Intelligence Officer Paul Pillar, who has participated in drafting national intelligence estimates, said the intelligence assessment summary released by the White House “is evidently an administration document, and the working master copy may have been in someone’s computer at the White House or National Security Council.” Pillar suggested that senior intelligence officials might have signed off on the administration paper, but that the White House may have drafted its own paper to “avoid attention to analytic differences within the intelligence community.” Comparable intelligence community assessments in the past, he observed – including the 2002 Iraq WMD estimate – include indications of differences in assessment among elements of the community. An unnamed “senior administration official” briefing the news media on the intelligence paper on Aug. 30 said that the paper was “fully vetted within the intelligence community,” and that, ”All members of the intelligence community participated in its development.”
  • But that statement fell far short of asserting that all the elements of the intelligence community had approved the paper in question, or even that it had gone through anything resembling consultations between the primary drafters and other analysts, and opportunities for agencies to register dissent that typically accompany intelligence community assessments. The same “senior administration official” indicated that DNI Clapper had “approved” submissions from various agencies for what the official called “the process”. The anonymous speaker did not explain further to journalists what that process preceding the issuance of the White House paper had involved. However, an Associated Press story on Aug. 29 referred to “a report by the Office of the Director of National Intelligence outlining the evidence against Syria”, citing two intelligence officials and two other administration officials as sources. That article suggests that the administration had originally planned for the report on intelligence to be issued by Clapper rather than the White House, apparently after reaching agreement with the White House on the contents of the paper. But Clapper’s name was not on the final document issued by the White House, and the document is nowhere to be found on the ODNI website. All previous intelligence community assessments were posted on that site.
  • The issuance of the document by the White House rather than by Clapper, as had been apparently planned, points to a refusal by Clapper to put his name on the document as revised by the White House. Clapper’s refusal to endorse it – presumably because it was too obviously an exercise in “cherry picking” intelligence to support a decision for war – would explain why the document had to be issued by the White House. Efforts by IPS to get a comment from the Office of the Director of National Intelligence suggest strongly that Clapper is embarrassed by the way the Obama White House misrepresented the Aug. 30 document.
  • An e-mail query by IPS to the media relations staff of ODNI requesting clarification of the status of the Aug. 30 document in relation to the intelligence community was never answered. In follow-up phone calls, ODNI personnel said someone would respond to the query. After failing to respond for two days, despite promising that someone would call back, however, ODNI’s media relations office apparently decided to refuse any further contact with IPS on the subject. A clear indication that the White House, rather than Clapper, had the final say on the content of the document is that it includes a statement that a “preliminary U.S. government assessment determined that 1,429 people were killed in the chemical weapons attack, including at least 426 children.” That figure, for which no source was indicated, was several times larger than the estimates given by British and French intelligence. The document issued by the White House cites intelligence that is either obviously ambiguous at best or is of doubtful authenticity, or both, as firm evidence that the Syrian government carried out a chemical weapons attack. It claims that Syrian chemical weapons specialists were preparing for such an attack merely on the basis of signals intelligence indicating the presence of one or more individuals in a particular location. The same intelligence had been regarded prior to Aug. 21 as indicating nothing out of the ordinary, as was reported by CBS news Aug. 23.
  • he paper also cites a purported intercept by U.S intelligence of conversations between Syrian officials in which a “senior official” supposedly “confirmed” that the government had carried out the chemical weapons attack. But the evidence appears to indicate that the alleged intercept was actually passed on to the United States by Israeli intelligence. U.S. intelligence officials have long been doubtful about intelligence from Israeli sources that is clearly in line with Israeli interests. Opponents of the proposed U.S. strike against Syria could argue that the Obama administration’s presentation of the intelligence supporting war is far more politicised than the flawed 2002 Iraq WMD estimate that the George W. Bush administration cited as part of the justification for the invasion of Iraq.
  •  
    If you vote for either a Democrat or Republican for President, you are in reality voting for the War Party and it will use the same dirty tricks to start the dirty wars. Bush Administration lied to make war against Iraq. Obama lies to get us into Syria. Maybe it's time to launch a "Peace Party" that calls Dems and Repubs out for what they really are, loyal servants of the War Party.  A single issue party aimed at peeling off the the Republican and Democrat disguises from the War Partiers.    Just daydreaming. Homo sapiens have been a vicious lot as far back as archaeology can take us.  We just enhance our destructiveness as the time line moves forward. 
3More

Has the NSA Wiretapping Violated Attorney-Client Privilege? | The Nation - 0 views

  • The first time Adis Medunjanin tried to call Robert C. Gottlieb in mid-2009, Gottlieb was out of the office. Medunjanin was agitated. He had to speak to an attorney. Gottlieb’s assistant told him Gottlieb would be back soon. When Medunjanin spoke to the lawyer a little later, he was told he might need legal representation. He thought he might be under investigation. Over the next six months and in forty-two phone calls, Medunjanin sought legal advice from Gottlieb. When he was arrested in January 2010 on charges that he tried to bomb the New York subway, it was Gottlieb who defended him, receiving security clearance to review government documents pertinent to the case in the process. Gottlieb was preparing Medunjanin’s defense when a federal officer in charge of information distribution e-mailed him that there was new classified information he needed to review at the US Eastern District Court in Brooklyn. “I went over to the Brooklyn Federal courthouse, went up to the secured room, gained entry with the secret security codes, opened the file cabinet that is also secure and in the second drawer was a CD,” Gottlieb told me. On that CD were recordings of every single one of his forty-two phone calls with Medunjanin before he was taken into custody and indicted on January 7, 2010.
  • Such calls are normally sacrosanct under the principle of attorney-client privilege, the ability to speak confidentially with your lawyer. But a leak to The Guardian last summer of National Security Agency (NSA) procedures that are supposed to protect privileged calls showed that some attorney-client privileged calls are not subject to internal rules that detail the instances when a wiretap should be turned off. A later version of the procedures declassified by the NSA last August contains the same language. These “minimization” procedures, as they are known, are the rules and regulations for wiretaps under the Foreign Intelligence Surveillance Act (FISA). They tell NSA agents when they can listen, and when they have to turn the tap off, when they can record and when they should not be recording. There are rules for which kinds of communications can be monitored—for example, domestic communications are off limits, although communications from agents of foreign powers and suspected terrorists don’t count as domestic—and there is a section that provides for the protection of attorney-client calls.
  • Section four of the declassified 2011 guidelines is the part of that document that governs wiretapping attorney-client calls. At first glance, it seems quite clear: when the agent realizes that he or she is monitoring an attorney-client communication, “monitoring of that communication will cease and the communication will be identified as an attorney-client communication in a log maintained for that purpose.” But given a second reading, section four doesn’t apply to all attorney-client calls. It provides only for the minimization (and protection) of the calls of “a person who is known to be under criminal indictment in the United States”—someone who has already been charged under US law. This is because indicted persons have a Sixth Amendment right to counsel. People who aren’t indicted don’t have this right, and so their calls are not minimized. When I asked an NSA press officer, Vanee’ M. Vines, how attorney-client privilege was protected, she referred me to the Department of Justice. I left several messages, but the DOJ never contacted me back.
5More

DARPA seeks the Holy Grail of search engines - 0 views

  • The scientists at DARPA say the current methods of searching the Internet for all manner of information just won't cut it in the future. Today the agency announced a program that would aim to totally revamp Internet search and "revolutionize the discovery, organization and presentation of search results." Specifically, the goal of DARPA's Memex program is to develop software that will enable domain-specific indexing of public web content and domain-specific search capabilities. According to the agency the technologies developed in the program will also provide the mechanisms for content discovery, information extraction, information retrieval, user collaboration, and other areas needed to address distributed aggregation, analysis, and presentation of web content.
  • Memex also aims to produce search results that are more immediately useful to specific domains and tasks, and to improve the ability of military, government and commercial enterprises to find and organize mission-critical publically available information on the Internet. "The current one-size-fits-all approach to indexing and search of web content limits use to the business case of web-scale commercial providers," the agency stated. 
  • The Memex program will address the need to move beyond a largely manual process of searching for exact text in a centralized index, including overcoming shortcomings such as: Limited scope and richness of indexed content, which may not include relevant components of the deep web such as temporary pages, pages behind forms, etc.; an impoverished index, which may not include shared content across pages, normalized content, automatic annotations, content aggregation, analysis, etc. Basic search interfaces, where every session is independent, there is no collaboration or history beyond the search term, and nearly exact text input is required; standard practice for interacting with the majority of web content, which remains one-at-a-time manual queries that return federated lists of results. Memex would ultimately apply to any public domain content; initially, DARPA  said it intends to develop Memex to address a key Defense Department mission: fighting human trafficking. Human trafficking is a factor in many types of military, law enforcement and intelligence investigations and has a significant web presence to attract customers. The use of forums, chats, advertisements, job postings, hidden services, etc., continues to enable a growing industry of modern slavery. An index curated for the counter-trafficking domain, along with configurable interfaces for search and analysis, would enable new opportunities to uncover and defeat trafficking enterprises.
  • ...1 more annotation...
  • DARPA said the Memex program gets its name and inspiration from a hypothetical device described in "As We May Think," a 1945 article for The Atlantic Monthly written by Vannevar Bush, director of the U.S. Office of Scientific Research and Development (OSRD) during World War II. Envisioned as an analog computer to supplement human memory, the memex (a combination of "memory" and "index") would store and automatically cross-reference all of the user's books, records and other information. This cross-referencing, which Bush called associative indexing, would enable users to quickly and flexibly search huge amounts of information and more efficiently gain insights from it. The memex presaged and encouraged scientists and engineers to create hypertext, the Internet, personal computers, online encyclopedias and other major IT advances of the last seven decades, DARPA stated.
  •  
    DoD announces that they want to go beyond Google. Lots more detail in the proposal description linked from the article. Interesting tidbits: [i] the dark web is a specific target; [ii] they want the ability to crawl web pages blocked by robots.txt; [iii] they want to be able to search page source code and comments. 
7More

Obama Pins Fate of Nuclear Pact on Documents From an Iranian "Curveball" - 0 views

  • Obama administration officials insist "possible military dimensions" of Iran’s nuclear program must be resolved to the satisfaction of the IAEA to complete a nuclear agreement. But the term refers to discredited intelligence from suspect sources. One of the issues Obama administration officials are insisting must be resolved to the satisfaction of the International Atomic Energy Agency (IAEA) before any nuclear agreement may be concluded involves "possible military dimensions." That term refers to documents long discredited by German intelligence but which the United States and the IAEA have maintained came from a covert Iranian nuclear weapons program. A former senior German official has now revealed that the biggest collection of documents cited as evidence of such a covert Iran program actually came from a member of the Iranian terrorist organization Mujihedin-E-Khalq (MEK) and that German intelligence sought to warn the George W. Bush administration that the source of the documents was not trustworthy.
  • The use of those documents to make a case for action against Iran closely parallels the Bush administration's use of the testimony of the now-discredited Iraqi exile called "Curveball" to convince the US public to support war against Iraq. The parallel between the two episodes was recognized explicitly by the German intelligence service, the Bundesnachrichtendienst (BND), according to Karsten Voigt, who was the German Foreign Office's coordinator of North American-German relations. Voigt provided details of the story behind the appearance of the mysterious Iran nuclear documents in an interview with this writer last March for a book on the false narrative surrounding Iran's nuclear program that is newly published, Manufactured Crisis. 
  • In 2004, Powell and his State Department team still regarded the MEK as a disreputable terrorist organization, but the neoconservatives in the administration viewed it as useful as an anti-regime tool. The MEK was known to have served the interests of Israel's Mossad by providing a way to "launder" intelligence claims that Israel wanted to get out to the public but didn't want identified as having come from Israel. In the best-known case, the group's political front organization, the National Council of Resistance in Iran, had revealed the location of the Iranian uranium enrichment facility at Natanz in an August 2002 press conference, but it had been given the coordinates of the construction site by Israeli intelligence, according to both a senior IAEA official and an Iranian opposition group source, cited by Seymour Hersh and New Yorker writer Connie Bruck, respectively. The purported Iranian documents conveyed by the MEK to Western intelligence also displayed multiple indications of having been fabricated by an outside actor. The clearest and most significant anomaly was that the drawings of efforts to redesign the Shahab-3 missile to accommodate a nuclear weapons showed a missile that had already been abandoned by Iran's Defense Ministry by the time the drawings were said to have been made, as was confirmed by former IAEA deputy director general for safeguards, Olli Heinonen, in an interview with this writer. The Iranian abandonment of the earlier missile design became known to foreign analysts, however, only after Iran flight-tested a completely new missile design in August 2004 - after the "laptop documents" had already been conveyed to the BND by its MEK source. Whoever ordered those drawings was unaware of the switch to the new missile design, which would rule out a genuine Iranian Defense Ministry or military program.
  • ...3 more annotations...
  • A former IAEA official familiar with those documents recalled in interview with Truthout that senior officials at the IAEA were immediately suspicious of the entire collection of documents given to the agency in 2005. "The documents were never really convincing," said the former official. The creators of the documents had taken publicly available information about people, organizations and location and had "woven their own narrative" around them, he said. Furthermore, he recalled finding anomalies in the stamps and signature blocs of documents. The fabricated documents, depicting Iran as redesigning their missile reentry vehicle to accommodate a nuclear weapon, among other things, fit into a Bush administration strategy - coordinated with Israel - that was aimed at justifying a military confrontation with Iran. The working assumption, as was revealed by David Wurmser, special assistant to Bolton and then to Cheney, in October 2007, was that the United States would probably need to use force to bring about that change once Iraq was brought under control. Bolton recalls in his memoirs that his aim was to move the Iran nuclear issue out of the IAEA to the United Nations Security Council, where the Bush administration would call for international action against Iran, and failing that, take unilateral action.
  • The IAEA got more documents and intelligence directly from Israel in 2008 and 2009 claiming Iranian work on nuclear weapons, according to then-IAEA Director-General Mohamed ElBaradei. The intelligence passed on by Israel included the claim that Iran had installed a large metal cylinder for high explosives tests at its Parchin military facility in 2000, which it intended to use for hydrodynamic tests of nuclear weapons designs. But the IAEA never revealed the information had come from Israel, covering up the primary fact relevant to its reliability and authenticity. The Safeguards Department had been prepared as early as 2009 to publish a dossier on what it called the "possible military dimensions" of the Iranian nuclear program that would accept all the intelligence reports and documents provided by Israel as genuine and accurate. But ElBaradei's successor, Yukiya Amano, waited to do so until November 2011, when the Obama administration was ready to organize an international coalition for harsh sanctions against Iran's oil export sector. The Obama administration returned to the "possible military dimensions" last November, insisting on a provision in the interim Iran nuclear agreement that required Iran to "resolve" all the "concerns" about that issue. A "senior administration official" briefing the press on the agreement November 24 said there would be no final agreement unless Iran showed that it had "come into compliance with its obligations under the NPT and its obligations to the IAEA."
  • In response to a request from Truthout for a confirmation or denial of the revelation by Karsten Voigt of the MEK role in transmitting the purported Iranian documents to the BND in 2004, NSC officials declined to comment on the matter, according to NSC spokesperson Bernadette Meehan. Some observers believe US negotiators hope to get Iran to admit to having had a nuclear weapons program. However, Iran is certainly not going to admit that the documents and intelligence reports it knows to be fabrications are true. But the Obama administration may well believe so strongly in the Iran nuclear narrative it inherited from the Bush administration and in the idea that the sanctions against Iran confer ultimate negotiating leverage on the United States that it sees an Iranian confession as a realistic goal. In any case, the decision to introduce the falsified evidence of the past into the final negotiations is bound to bring them to an impasse unless the United States is prepared to back down.
  •  
    Neocons in the Obama administration are at it again, fueling the Iranian nukes myth with fabricated intelligence on behalf of Israel. 
6More

Your Computer May Already be Hacked - NSA Inside? | Steve Blank - 1 views

  • But while the interviewer focused on the Skype revelation, I thought the most interesting part was the other claim, “that the National Security Agency already had pre-encryption stage access to email on Outlook.”  Say what??  They can see the plaintext on my computer before I encrypt it? That defeats any/all encryption methods. How could they do that? Bypass Encryption While most outside observers think the NSA’s job is cracking encrypted messages, as the Prism disclosures have shown, the actual mission is simply to read all communications. Cracking codes is a last resort.
  • The NSA has a history of figuring out how to get to messages before or after they are encrypted. Whether it was by putting keyloggers on keyboards and recording the keystrokes or detecting the images of the characters as they were being drawn on a CRT. Today every desktop and laptop computer has another way for the NSA to get inside. Intel Inside It’s inevitable that complex microprocessors have bugs in them when they ship. When the first microprocessors shipped the only thing you could hope is that the bug didn’t crash your computer. The only way the chip vendor could fix the problem was to physically revise the chip and put out a new version. But computer manufacturers and users were stuck if you had an old chip. After a particularly embarrassing math bug in 1994 that cost Intel $475 million, the company decided to fix the problem by allowing it’s microprocessors to load fixes automatically when your computer starts.
  • Starting in 1996 with the Intel P6 (Pentium Pro) to today’s P7 chips (Core i7) these processors contain instructions that are reprogrammable in what is called microcode. Intel can fix bugs on the chips by reprogramming a microprocessors microcode with a patch. This patch, called a microcode update, can be loaded into a processor by using special CPU instructions reserved for this purpose. These updates are not permanent, which means each time you turn the computer on, its microprocessor is reset to its built-in microcode, and the update needs to be applied again (through a computer’s BIOS.). Since 2000, Intel has put out 29 microcode updates to their processors. The microcode is distributed by 1) Intel or by 2) Microsoft integrated into a BIOS or 3) as part of a Windows update. Unfortunately, the microcode update format is undocumented and the code is encrypted. This allows Intel to make sure that 3rd parties can’t make unauthorized add-ons to their chips. But it also means that no one can look inside to understand the microcode, which makes it is impossible to know whether anyone is loading a backdoor into your computer.
  • ...3 more annotations...
  • Or perhaps the NSA, working with Intel and/or Microsoft, have wittingly have put backdoors in the microcode updates. A backdoor is is a way of gaining illegal remote access to a computer by getting around the normal security built-in to the computer. Typically someone trying to sneak malicious software on to a computer would try to install a rootkit (software that tries to conceal the malicious code.) A rootkit tries to hide itself and its code, but security conscious sites can discover rootkits by tools that check kernel code and data for changes. But what if you could use the configuration and state of microprocessor hardware in order to hide? You’d be invisible to all rootkit detection techniques that checks the operating system. Or what if you can make the microprocessor random number generator (the basis of encryption) not so random for a particular machine? (The NSA’s biggest coup was inserting backdoors in crypto equipment the Swiss sold to other countries.) Rather than risk getting caught messing with everyone’s updates, my bet is that the NSA has compromised the microcode update signing keys  giving the NSA the ability to selectively target specific computers. (Your operating system ensures security of updates by checking downloaded update packages against the signing key.) The NSA then can send out backdoors disguised as a Windows update for “security.” (Ironic but possible.) That means you don’t need backdoors baked in the hardware, don’t need Intel’s buy-in, don’t have discoverable rootkits, and you can target specific systems without impacting the public at large.
  • A few months ago these kind of discussions would have been theory at best, if not paranoia.
  • The Prism disclosures prove otherwise – the National Security Agency has decided it needs the ability to capture all communications in all forms. Getting inside of a target computer and weakening its encryption or having access to the plaintext of encrypted communication seems likely. Given the technical sophistication of the other parts of their surveillance net, the surprise would be if they haven’t implemented a microcode backdoor. The downside is that 1) backdoors can be hijacked by others with even worse intent. So if NSA has a microcode backdoor – who else is using it? and 2) What other pieces of our infrastructure, (routers, smartphones, military computers, satellites, etc) use processors with uploadable microcode? —— And that may be why the Russian president is now using a typewriter rather than a personal computer.
11More

The truth is out: money is just an IOU, and the banks are rolling in it | David Graeber... - 0 views

  • To get a sense of how radical the Bank's new position is, consider the conventional view, which continues to be the basis of all respectable debate on public policy. People put their money in banks. Banks then lend that money out at interest – either to consumers, or to entrepreneurs willing to invest it in some profitable enterprise. True, the fractional reserve system does allow banks to lend out considerably more than they hold in reserve, and true, if savings don't suffice, private banks can seek to borrow more from the central bank.
  • The central bank can print as much money as it wishes. But it is also careful not to print too much. In fact, we are often told this is why independent central banks exist in the first place. If governments could print money themselves, they would surely put out too much of it, and the resulting inflation would throw the economy into chaos. Institutions such as the Bank of England or US Federal Reserve were created to carefully regulate the money supply to prevent inflation. This is why they are forbidden to directly fund the government, say, by buying treasury bonds, but instead fund private economic activity that the government merely taxes.
  • It's this understanding that allows us to continue to talk about money as if it were a limited resource like bauxite or petroleum, to say "there's just not enough money" to fund social programmes, to speak of the immorality of government debt or of public spending "crowding out" the private sector. What the Bank of England admitted this week is that none of this is really true. To quote from its own initial summary: "Rather than banks receiving deposits when households save and then lending them out, bank lending creates deposits" … "In normal times, the central bank does not fix the amount of money in circulation, nor is central bank money 'multiplied up' into more loans and deposits."
  • ...7 more annotations...
  • When banks make loans, they create money. This is because money is really just an IOU.
  • What this means is that the real limit on the amount of money in circulation is not how much the central bank is willing to lend, but how much government, firms, and ordinary citizens, are willing to borrow. Government spending is the main driver in all this (and the paper does admit, if you read it carefully, that the central bank does fund the government after all). So there's no question of public spending "crowding out" private investment. It's exactly the opposite.
  • In other words, everything we know is not just wrong – it's backwards.
  • So for the banking system as a whole, every loan just becomes another deposit. What's more, insofar as banks do need to acquire funds from the central bank, they can borrow as much as they like; all the latter really does is set the rate of interest, the cost of money, not its quantity.
  • The role of the central bank is to preside over a legal order that effectively grants banks the exclusive right to create IOUs of a certain kind, ones that the government will recognise as legal tender by its willingness to accept them in payment of taxes. There's really no limit on how much banks could create, provided they can find someone willing to borrow it. They will never get caught short, for the simple reason that borrowers do not, generally speaking, take the cash and put it under their mattresses; ultimately, any money a bank loans out will just end up back in some bank again.
  • Last week, something remarkable happened. The Bank of England let the cat out of the bag. In a paper called "Money Creation in the Modern Economy", co-authored by three economists from the Bank's Monetary Analysis Directorate, they stated outright that most common assumptions of how banking works are simply wrong, and that the kind of populist, heterodox positions more ordinarily associated with groups such as Occupy Wall Street are correct. In doing so, they have effectively thrown the entire theoretical basis for austerity out of the window.To get a sense of how radical the Bank's new position is, consider the conventional view, which continues to be the basis of all respectable debate on public policy. People put their money in banks. Banks then lend that money out at interest – either to consumers, or to entrepreneurs willing to invest it in some profitable enterprise. True, the fractional reserve system does allow banks to lend out considerably more than they hold in reserve, and true, if savings don't suffice, private banks can seek to borrow more from the central bank.
  • Why did the Bank of England suddenly admit all this? Well, one reason is because it's obviously true. The Bank's job is to actually run the system, and of late, the system has not been running especially well. It's possible that it decided that maintaining the fantasy-land version of economics that has proved so convenient to the rich is simply a luxury it can no longer afford.
  •  
    Okay. The Bank of England finally fesses up and tells the truth about banking and government. Incredible!
2More

US drug agency gets intel from NSA, then lies about its origins to build cases | Ars Te... - 0 views

  • On Monday, Reuters reported on previously undisclosed documents showing that a secret Drug Enforcement Administration (DEA) unit uses information collected by intelligence agencies—including the National Security Agency (NSA)—to build evidence for criminal cases. The true origin of this information is usually concealed from defense lawyers—and sometimes even prosecutors and judges—to seemingly do an end-run around the normal court procedures for a criminal defendant’s right to discovery.
  • “There’s nothing that allows lying to judges about the source of information in a criminal case,” Jennifer Granick, an attorney and the director of Civil Liberties at Stanford University’s Center for Internet and Society, told Ars. Similarly, others have already started to speak out against the practice. The American Civil Liberties Union (ACLU) issued a statement. "When law enforcement agents and prosecutors conceal the role of intelligence surveillance in criminal investigations, they violate the constitutional rights of the accused and insulate controversial intelligence programs from judicial review," wrote ACLU Deputy Legal Director Jameel Jaffer. "Effectively, these intelligence programs are placed beyond the reach of the Constitution, where they develop and expand without any court ever weighing in on their lawfulness. This is inappropriate, dangerous, and contrary to the rule of law."
5More

Exclusive: U.S. directs agents to cover up program used to investigate Americans - chic... - 0 views

  • WASHINGTON (Reuters) - A secretive U.S. Drug Enforcement Administration unit is funneling information from intelligence intercepts, wiretaps, informants and a massive database of telephone records to authorities across the nation to help them launch criminal investigations of Americans. Although these cases rarely involve national security issues, documents reviewed by Reuters show that law enforcement agents have been directed to conceal how such investigations truly begin - not only from defense lawyers but also sometimes from prosecutors and judges. The undated documents show that federal agents are trained to "recreate" the investigative trail to effectively cover up where the information originated, a practice that some experts say violates a defendant's Constitutional right to a fair trial. If defendants don't know how an investigation began, they cannot know to ask to review potential sources of exculpatory evidence - information that could reveal entrapment, mistakes or biased witnesses.
  • The unit of the DEA that distributes the information is called the Special Operations Division, or SOD. Two dozen partner agencies comprise the unit, including the FBI, CIA, NSA, Internal Revenue Service and the Department of Homeland Security. It was created in 1994 to combat Latin American drug cartels and has grown from several dozen employees to several hundred. Today, much of the SOD's work is classified, and officials asked that its precise location in Virginia not be revealed. The documents reviewed by Reuters are marked "Law Enforcement Sensitive," a government categorization that is meant to keep them confidential. "Remember that the utilization of SOD cannot be revealed or discussed in any investigative function," a document presented to agents reads. The document specifically directs agents to omit the SOD's involvement from investigative reports, affidavits, discussions with prosecutors and courtroom testimony. Agents are instructed to then use "normal investigative techniques to recreate the information provided by SOD."
  • A spokesman with the Department of Justice, which oversees the DEA, declined to comment. But two senior DEA officials defended the program, and said trying to "recreate" an investigative trail is not only legal but a technique that is used almost daily.
  • ...2 more annotations...
  • A former federal agent in the northeastern United States who received such tips from SOD described the process. "You'd be told only, ‘Be at a certain truck stop at a certain time and look for a certain vehicle.' And so we'd alert the state police to find an excuse to stop that vehicle, and then have a drug dog search it," the agent said. "PARALLEL CONSTRUCTION" After an arrest was made, agents then pretended that their investigation began with the traffic stop, not with the SOD tip, the former agent said. The training document reviewed by Reuters refers to this process as "parallel construction." The two senior DEA officials, who spoke on behalf of the agency but only on condition of anonymity, said the process is kept secret to protect sources and investigative methods. "Parallel construction is a law enforcement technique we use every day," one official said. "It's decades old, a bedrock concept." A dozen current or former federal agents interviewed by Reuters confirmed they had used parallel construction during their careers. Most defended the practice; some said they understood why those outside law enforcement might be concerned.
  • Today, the SOD offers at least three services to federal, state and local law enforcement agents: coordinating international investigations such as the Bout case; distributing tips from overseas NSA intercepts, informants, foreign law enforcement partners and domestic wiretaps; and circulating tips from a massive database known as DICE. The DICE database contains about 1 billion records, the senior DEA officials said. The majority of the records consist of phone log and Internet data gathered legally by the DEA through subpoenas, arrests and search warrants nationwide. Records are kept for about a year and then purged, the DEA officials said. About 10,000 federal, state and local law enforcement agents have access to the DICE database, records show. They can query it to try to link otherwise disparate clues. Recently, one of the DEA officials said, DICE linked a man who tried to smuggle $100,000 over the U.S. southwest border to a major drug case on the East Coast.
9More

BBC - Blogs - Adam Curtis - Bugger - 1 views

  • The recent revelations by the whistleblower Edward Snowden were fascinating. But they - and all the reactions to them - had one enormous assumption at their heart.That the spies know what they are doing.It is a belief that has been central to much of the journalism about spying and spies over the past fifty years. That the anonymous figures in the intelligence world have a dark omniscience. That they know what's going on in ways that we don't.It doesn't matter whether you hate the spies and believe they are corroding democracy, or if you think they are the noble guardians of the state. In both cases the assumption is that the secret agents know more than we do.
  • But the strange fact is that often when you look into the history of spies what you discover is something very different.It is not the story of men and women who have a better and deeper understanding of the world than we do. In fact in many cases it is the story of weirdos who have created a completely mad version of the world that they then impose on the rest of us.I want to tell some stories about MI5 - and the very strange people who worked there. They are often funny, sometimes rather sad - but always very odd.The stories also show how elites in Britain have used the aura of secret knowledge as a way of maintaining their power. But as their power waned the "secrets" became weirder and weirder.They were helped in this by another group who also felt their power was waning - journalists. And together the journalists and spies concocted a strange, dark world of treachery and deceit which bore very little relationship to what was really going on. And still doesn't.
  • Here is Chapman Pincher being interviewed on the Wogan programme about what then happened. Up to this point Pincher had been the Defence correspondent on the Daily Express. He was successful for getting "scoops" from "inside sources" - although the historian EP Thompson said that really Chapman Pincher was:"A kind of official urinal in which ministers and intelligence and defence chiefs could stand patiently leaking."What the dissident MI5 agents now told Pincher was like super high-grade piss. Or, as he puts it in the Wogan interview, "it was like walking into an Aladdin's Cave". But what Pincher wrote was going to open the floodgates to a new kind of conspiracy journalism that still holds sway over large parts of the media imagination.Have a look at him and decide yourself - high grade toilet or investigative journalist? Or maybe often they are the same thing?
  • ...5 more annotations...
  • But something else happened to all the intelligence agencies during the war - MI6 as well as MI5. As they grew massively in size they became riddled with factions and infighting. And because all this happened behind a wall of secrecy, there was little to stop things becoming vicious and poisonous.The journalist Phillip Knightley has written a really good history of spies - called The Second Oldest Profession. In it he quotes an agent describing what happened during the war years:"The whole organisation was riddled with nepotism - dim, dreary people of utter unmemorability; sub-men who were doubled up with other sub-men to create an illusion of strength and only doubled the weakness; others made memorable only by poisonous, corrupt malevolence or crass, mulish stupidity; the whole run by a chain of command remarkable for its feebleness. The entire service was decrepit and incompetent."
  • The case that really shocked Mrs Thatcher was the traitor Geoffrey Prime. In the 1970s he had worked at the top secret listening centre GCHQ and had been selling all it's secrets to the Russians.
  • And yet again it wasn't MI5 who uncovered his treachery - it was the local police in Cheltenham.In 1982 a policeman came to his house enquiring about his car - a rather distinct two-tone brown and white Mk IV Cortina - a which had been seen in the vicinity of an assault on a young girl.Prime told the policeman that he had been at home all day. But that evening he and his wife Rhona went for a drive to the top of Cleeve Hill. As they sat in the twilight Prime told Rhona that he was the man the police were looking for. And not only that, he was also a Russian spy.
  • Prime was a paedophile - and had used spying techniques to monitor the activities of thousands of young girls around Cheltenham. He had created a vast set of index cards which showed when the girls were most likely to be alone at home. He then went round to their houses in his two tone Cortina and sexually assaulted them.Despite this Prime had been positively vetted six times. Even the Russians got worried about his paedophile activities and seemed to want to dump him. In 1980 Prime had gone to Vienna to meet the KGB. Instead of meeting him secretly as they normally did, the Russians took him openly to the best restaurants where they knew Western intelligence agents would recognise them as KGB agents.But even then noone noticed them - or Prime.Prime's wife Rhona wrestled with her conscience - and in the end went to the police and told them everything about Prime. He was sent to jail for 35 years for spying and 3 years for the assaults on young girls - which says a lot about the priorities of the British establishment at that time.
  • The cases of Bettaney and Prime revealed not only just how incompetent MI5 was - but also how sad and seedy the secret world of spies really was.
  •  
    Fascinating in-depth article on the history of British spy agencies' incompetence. From the great MI5 media hoax during World War I that the agency's reputation was built upon through the failures to foresee the collapse of the Soviet Union and the false report of WMDs in Iraq, the author builds a compelling case that the excessive secrecy and incompetence of the British Security Service staff has resulted in a marvelous collection of wackos mired in fantasies of conspiracies within conspiracies who feed gullible journalists lie after lie. Very well-written, Interspersed with spot-on historical videos. Well worth the read and watch. I've highlighted only small tidbits to avoid playing the part of a spoiler.      
3More

Brazilian president Rousseff: US surveillance a 'breach of international law' | World n... - 0 views

  • Brazil's president, Dilma Rousseff, has launched a blistering attack on US espionage at the UN general assembly, accusing the NSA of violating international law by its indiscriminate collection of personal information of Brazilian citizens and economic espionage targeted on the country's strategic industries.Rousseff's angry speech was a direct challenge to President Barack Obama, who was waiting in the wings to deliver his own address to the UN general assembly, and represented the most serious diplomatic fallout to date from the revelations by former NSA contractor Edward Snowden.
  • Washington's efforts to smooth over Brazilian outrage over NSA espionage have so far been rebuffed by Rousseff, who has proposed that Brazil build its own internet infrastructure."Friendly governments and societies that seek to build a true strategic partnership, as in our case, cannot allow recurring illegal actions to take place as if they were normal. They are unacceptable," she said."The arguments that the illegal interception of information and data aims at protecting nations against terrorism cannot be sustained. Brazil, Mr President, knows how to protect itself. We reject, fight and do not harbour terrorist groups," Rousseff said."As many other Latin Americans, I fought against authoritarianism and censorship and I cannot but defend, in an uncompromising fashion, the right to privacy of individuals and the sovereignty of my country," the Brazilian president said. She was imprisoned and tortured for her role in a guerilla movement opposed to Brazil's military dictatorship in the 1970s."In the absence of the right to privacy, there can be no true freedom of expression and opinion, and therefore no effective democracy. In the absence of the respect for sovereignty, there is no basis for the relationship among nations."
  •  
    We should never lose sight of the fact that every time the NSA intercepts a message from a foreign nation, it violates the civil and criminal laws of that nation. The NSA and its staff are serial criminals, not patriots. The Balkanization of the Internet into a non-net of local area networks to protect nations' citizen rights from NSA voyeurs is all too predictable. This will be their legacy unless we can stop them.
1More

China sends jets into air zone as Japan, South Korea defy it - Yahoo News - 0 views

  • China sent fighter jets and an early warning aircraft into its newly declared air defence zone, state media said Friday, as Japan and South Korea stated they had defied the zone with military overflights.The Chinese planes had conducted normal air patrols on Thursday as "a defensive measure and in line with international common practices," said Shen Jinke, spokesman for the People's Liberation Army (PLA) Air Force, according to state news agency Xinhua. Shen said China's air force would remain on high alert and take measures to protect the security of the country's airspace, Xinhua reported.Japan and South Korea said Thursday they had defied the air defence identification zone (ADIZ) declared by Beijing last weekend, showing a united front after US B-52 bombers did the same.Chinese authorities are coming under domestic pressure to toughen their response to incursions into the zone that includes disputed islands claimed by China, which knows them as the Diaoyus, but controlled by Japan, which calls them the Senkakus.
4More

Dutch intelligence agency AIVD hacks internet forums - nrc.nl - 0 views

  • The Dutch intelligence service - AIVD - hacks internet web forums to collect the data of all users. The majority of these people are unknown to the intelligence services and are not specified as targets when the hacking and data-collection process starts. A secret document of former NSA-contractor Edward Snowden shows that the AIVD use a technology called Computer Network Exploitation – CNE – to hack the web forums and collect the data.
  • Nico van Eijk, a Dutch professor in Information Law, is of the opinion that the Dutch intelligence service has crossed the boundaries of Dutch legislation. “They use sweeps to collect data from all users of web forums. The use of these techniques could easily lead to mass surveillance by the government.” IT specialist Matthijs Koot says that the exploitation of this technology can lead to a blurring of the lines between normal citizens and legitimate targets of the intelligence services. The document summarizes a meeting held on February 14, 2013 between officials of the NSA and the Dutch intelligence services - AIVD and MIVD. During this meeting Dutch officials briefed their American counterparts on the way they target web forums with the CNE technique. “They acquire MySQL databases via CNE access”, the document reads. MySQL is free open source software used to build databases for web forums. These databases contain all the posts of all the users of the forum and their personal data. During the meeting Dutch intelligence officers explained how they use the information in the database. In order to identify targets. According to the document the Dutch “are looking at marrying the forum data with other social network info, and trying to figure out good ways to mine the data that they have.”
  • A group of Dutch members of parliament have called for a parliamentary inquiry into the way the secret services are collecting and using data. The Dutch intelligence services have been previously criticised by an oversight committee for the way in which they have used legally intercepted data. According to this committee the search queries the intelligence services used to filter the data, were not specific enough. The use of generic queries, the committee concluded, was “not in accordance with Dutch law”. A spokesperson for the Dutch government refused to comment on the use of data from web forums by the AIVD, but stated that the intelligence services are allowed to hack computers. A spokesperson for the American government stated that the publication of classified information is a threat to US national security.
  •  
    Oooh ... Entire social media SQL databases. Content, user security stuff, the works. Big, big, big haystacks.
2More

OpEdNews - Article: The Golden Age of US Capitalism - 0 views

    • Joseph Skues
       
      Wow-can not be allowed to remain the new normal.
  •  
    "According to a recent study, from 2009 to 2012, 95 percent of all new income went to the top 1 percent. Meanwhile, since 1999, median family income declined by more than $5,000 after adjusting for inflation. Today, a record-breaking 46.5 million people live in poverty in the United States. At 21.8 percent, we have the highest rate of childhood poverty in the industrialized world. One out of four of our kids now lives in a family that receives food stamps. "
« First ‹ Previous 81 - 100 of 173 Next › Last »
Showing 20 items per page