Skip to main content

Home/ Socialism and the End of the American Dream/ Group items matching "consultation" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
9More

Netanyahu seeks to snatch victory from jaws of defeat on Iran deal - The Washington Post - 0 views

  • No political leader fought longer or harder against the Iran nuclear deal than Israeli Prime Minister Benjamin Netanyahu, who appears to have suffered the worst foreign policy ­defeat of his career following the announcement that President Obama has secured enough votes in the Senate to preserve the pact. Yet senior Israeli officials close to Netanyahu are saying that their prime minister has not failed — but won, in a way.
  • ith a looming defeat in Congress, Netanyahu’s aides and allies now say the prime minister and his closest adviser, Ron Dermer, Israel’s American-born ambassador to the United States, never really believed they could stop the deal in Congress — they only wanted to alert the world how dangerous Iran is.
  • may not matter much at home that the Israelis’ spin does not match previous assertions by Netanyahu, who said the deal could be defeated in Congress. It was the reason, the prime minister said, that he accepted an invitation by the Republican leadership to address Congress in March.
  • ...5 more annotations...
  • solid majority in Congress and among the American people” agrees with Netanyahu’s assertion that the deal is a bad one, a top Israeli official close to Netanyahu said. Yet recent polling is not so definitive. According to a survey released this week by the University of Maryland’s Program for Public Consultation, Americans narrowly support the deal, with 52 percent wanting Congress to approve it and 47 percent wanting the pact rejected. Other polls have shown greater opposition.
  • he same aides and allies say that Netanyahu is playing a longer game, that the deal is so unpopular now that the next president will abandon, change or undermine it. Republican candidates for president, including Donald Trump and Jeb Bush, have vigorously opposed the deal. Democratic front-runner Hillary Rodham Clinton announced support.
  • inally, officials here predict that when the dust settles, Israel will receive a windfall in new, advanced weaponry — including the most modern aircraft and missile technology — from members of Congress eager to show their pro-Israel bona fides and demonstrate that they remain steadfast enemies of Iran, even if some may have backed Obama on the nuclear pact. “Look at how they are spinning it. It’s not a defeat; it’s a success. And based on opposition in Congress and some polling in the United States, the spin is technically correct,” said Yossi Alpher, a political analyst and author of “Periphery: Israel’s Search for Middle East Allies.”
  • hen the news cycle shifts in coming weeks to arms packages, economic aid and proclamations of U.S. support, “Netanyahu will be able to say, ‘My opposition didn’t cost us a thing,’ ” Alpher said. “Netanyahu’s playing it cool,” he said. “If we pay attention, we would have noticed that for the last week or two, Netanyahu has lowered his rhetoric. He’s a little calmer, and the reason is that it became clear to him — if he ever thought he had a good chance — that an override of the veto was not going to happen,” said Yehuda Ben Meir, a senior research fellow at the Institute for National Security Studies in Tel Aviv.
  • me Israeli analysts also wonder what Netanyahu’s opposition will cost Israel and American Jews. Robert Wexler, a former Democratic congressman from Florida who now heads the S. Daniel Abraham Center for Middle East Peace, said that Netanyahu “compromised the efforts of his own allies” in Washington when he “thrust himself into American politics without understanding the consequences of his actions.” Wexler faulted Netanyahu for, in effect, “requesting that the American Jewish community rise up against an American president.” Domestically, the prime minister might not pay a price for his defeat, if it can be called that. Instead, he may be seen as Israel’s great defender. Public opinion about the loss in Congress is still evolving here; many ordinary Israelis seem to think that there’s still a chance of killing the deal. The front-page headline Thursday in Yedioth Ahronoth, Israel’s largest paid newspaper, was “Achievement for Obama, Blow to Netanyahu.” The headline in Israel Hayom, a free paper with a huge circulation that is owned by the prime minister’s close friend, the billionaire U.S. casino magnate Sheldon Adelson, was, “Official: A Majority in U.S. Agrees With Us.”
  •  
    All spin except the boost in Israel funding. But the BDS Movement is gaining ground so fast in the U.S. that Israel's U.S. funding won't last much longer.
8More

Hillary Clinton Goes to Militaristic, Hawkish Think Tank, Gives Militaristic, Hawkish S... - 0 views

  • Leading Democratic presidential candidate Hillary Clinton this morning delivered a foreign policy speech at the Brookings Institution in Washington. By itself, the choice of the venue was revealing. Brookings served as Ground Zero for centrist think tank advocacy of the Iraq War, which Clinton (along with potential rival Joe Biden) notoriously and vehemently advocated. Brookings’ two leading “scholar”-stars — Kenneth Pollack and Michael O’Hanlon — spent all of 2002 and 2003 insisting that invading Iraq was wise and just, and spent the years after that assuring Americans that the “victorious” war and subsequent occupation were going really well (in April 2003, O’Hanlon debated with himself over whether the strategy that led to the “victory” in his beloved war should be deemed “brilliant” or just extremely “clever,” while in June 2003, Pollack assured New York Times readers that Saddam’s WMD would be found).
  • Since then, O’Hanlon in particular has advocated for increased military force in more countries than one can count. That’s not surprising: Brookings is funded in part by one of the Democratic Party’s favorite billionaires, Haim Saban, who is a dual citizen of the U.S. and Israel and once said of himself: “I’m a one-issue guy, and my issue is Israel.” Pollack advocated for the attack on Iraq while he was “Director of Research of the Saban Center for Middle East Policy.” Saban became the Democratic Party’s largest fundraiser — even paying $7 million for the new DNC building — and is now a very substantial funder of Hillary Clinton’s campaign. In exchange, she’s written a personal letter to him publicly “expressing her strong and unequivocal support for Israel in the face of the Boycott, Divestment and Sanction movement.” So the hawkish Brookings is the prism through which Hillary Clinton’s foreign policy worldview can be best understood. The think tank is filled with former advisers to both Bill and Hillary Clinton, and would certainly provide numerous top-level foreign policy officials in any Hillary Clinton administration. As she put it today at the start: “There are a lot of long-time friends and colleagues who perch here at Brookings.” And she proceeded to deliver exactly the speech one would expect, reminding everyone of just how militaristic and hawkish she is.
  • Clinton proclaimed that she “too [is] deeply concerned about Iranian aggression and the need to confront it. It’s a ruthless, brutal regime that has the blood of Americans, many others and including its own people on its hands.” Even worse, she said, “Its political rallies resound with cries of ‘Death to America.’ Its leaders talk about wiping Israel off the face of the map, most recently just yesterday, and foment terror against it. There is absolutely no reason to trust Iran.” She repeated that claim several times for emphasis: “They vow to destroy Israel. And that’s worth saying again. They vow to destroy Israel.” She vowed that in dealing with Iran, she will be tougher and more aggressive than Reagan was with the Soviet Union: “You remember President Reagan’s line about the Soviets: Trust but verify? My approach will be distrust and verify.” She also explicitly threatened Iran with war if they fail to comply: “I will not hesitate to take military action if Iran attempts to obtain a nuclear weapon, and I will set up my successor to be able to credibly make the same pledge.” She even depicted the Iran Deal as making a future war with Iran easier and more powerful:
  • ...4 more annotations...
  • Should it become necessary in the future having exhausted peaceful alternatives to turn to military force, we will have preserved and in some cases enhanced our capacity to act. And because we have proven our commitment to diplomacy first, the world will more likely join us. As for Israel itself, Clinton eagerly promised to shower it with a long, expensive, and dangerous list of gifts. Here’s just a part of what that country can expect from the second President Clinton: I will deepen America’s unshakeable commitment to Israel’s security, including our long standing tradition of guaranteeing Israel’s qualitative military edge. I’ll increase support for Israeli rocket and missile defenses and for intelligence sharing. I’ll sell Israel the most sophisticated fire aircraft ever developed. The F-35. We’ll work together to develop and implement better tunnel detection technology to prevent arms smuggling and kidnapping as well as the strongest possible missile defense system for Northern Israel, which has been subjected to Hezbollah’s attacks for years.
  • She promised she “will sustain a robust military presence in the [Persian Gulf] region, especially our air and naval forces.” She vowed to “increase security cooperation with our Gulf allies” — by which she means the despotic regimes in Saudi Arabia, United Arab Emirates and Qatar, among others. She swore she will crack down even further on Hezbollah: “It’s time to eliminate the false distinction that some still make between the supposed political and military wings. If you’re part of Hezbollah, you’re part of a terrorist organization, plain and simple.” Then she took the ultimate pledge: “I would not support this agreement for one second if I thought it put Israel in greater danger.” So even if the deal would benefit the U.S., she would not support it “for one second” if it “put Israel in greater danger.” That’s an unusually blunt vow to subordinate the interests of the U.S. to that foreign nation.
  • But when it comes to gifts to Israel, that’s not all! Echoing the vow of several GOP candidates to call Netanyahu right away after being elected, Clinton promised: “I would invite the Israeli prime minister to the White House during my first month in office to talk about all of these issues and to set us on a course of close, frequent consultation right from the start, because we both rely on each other for support as partners, allies and friends.” She then addressed “the people of Israel,” telling them: “Let me say, you’ll never have to question whether we’re with you. The United States will always be with you.” For good measure, she heaped praise on “my friend Chuck Schumer,” who has led the battle to defeat the Iran Deal, gushing about what an “excellent leader in the Senate” he will make. What’s a little warmongering among friends? Just as was true in her book, she implicitly criticized Obama — who boasts that he has bombed seven predominantly Muslim countries — of being insufficiently militaristic, imperialistic, and violent. She said she wanted more involvement in Syria from the start (though did not call for the U.S. to accept any of its refugees). In a clear rebuke to the current president, she decreed that any criticisms U.S. officials may utter of Israel should be done only in private (“in private and behind, you know, closed doors”), not in public, lest “it open[] the door to everybody else to delegitimize Israel to, you know, pile on in ways that are not good for the — the strength and stability, not just of Israel.” About Russia, she said, “I think we have not done enough” and put herself “in the category of people who wanted us to do more in response to the annexation of Crimea and the continuing destabilization of Ukraine.”
  • Two words that did not come out of Clinton’s mouth during the entire event: “Palestinians” (do they exist?) and “Libya” (that glorious war she supported that was going to be the inspiring template for future “humanitarian interventions” before it predictably destroyed that whole country).
  •  
    Glenn Greenwald tags Hillary pandering to the Chicken Hawk Party
4More

Judge scolds feds for slow-walking Clinton aide's emails | TheHill - 0 views

  • A federal judge on Tuesday scolded Obama administration lawyers for dragging their feet in handing over documents from top aides to Hillary Clinton.Judge Emmet Sullivan of the U.S. District Court for The District of Columbia suggested that the State Department needs to divert resources to deal with the onslaught of lawsuits seeking to get a hold of emails from Clinton, Huma Abedin and Cheryl Mills.“There has to be some reallocation of resources. There has to be,” he told a pair of government lawyers. “Because these are atypical cases.”ADVERTISEMENTThe State Department, he added, is treating the demands as if “it’s business as usual.”“This case is important to the public,” Sullivan added. “The public is clamoring for the information. Everybody is clamoring for the information.“You have to find the resources.”
  • The case is one of dozens of lawsuits against the department that seek information that involves Clinton’s emails.In the case, launched by conservative advocacy group Citizens United, government lawyers had attempted to delay the deadline for them to hand over documents until at least December.Though even that was merely a “hope date,” Department of Justice Lawyer Caroline Anderson said.The government wouldn’t be able to send out the documents until it had a chance to fully upload them into its digital system, search for the requested terms and then do a line-by-line search to see whether the emails were relevant or needed to be classified for one reason or the other.But the case has lingered for months, and lawyers representing Citizens United accused the government of doing little to speed up the process.“The government knew in the summer of this year that they had a problem, but they waited,” Matthew McGill told the judge.
  • Citizens United's case asked for correspondence between Clinton's former chief of staff Mills, longtime aide Abedin and officials from the Clinton Foundation as well as correspondence about Abedin's part-time work for a consulting firm while also working in the State Department.There are more than 30 lawsuits pending against the State Department seeking to enforce Freedom of Information Act (FOIA) requests for some combination of the tens of thousands of emails from Clinton and other top aides during their time at the State Department.The email requests have been complicated by the revelation earlier this year that Clinton relied exclusively on a personal email address housed on a private server during her tenure as secretary of State. Abedin, Mills and other top aides also used personal email accounts during their time assisting Clinton.In response, the emails have grown to consume a larger and larger portion of work for the 63 full-time employees and one part-timer that the State Department employs to respond to FOIA requests. The department has also brought on the part-time help of 40 Foreign Service officers to assist in the search.
  • ...1 more annotation...
  • Sullivan ordered the department to finish uploading Abedin's and Mills’s emails and conduct an initial search on them by next Friday. 
1More

Fossil Fuel Divestment Has Grown to $2.6 Trillion in Assets | InsideClimate News - 0 views

  • The fossil fuel divestment movement skyrocketed in the past year as hundreds of institutions and thousands of individuals committed to selling their oil, natural gas and coal holdings, according to a new report. So far, 436 institutions and 2,040 individuals representing $2.6 trillion in assets have agreed to sell their fossil fuel investments, according to a review by Arabella Advisors, a Washington, D.C.-based consultant that works with philanthropies. It represents a 50-fold increase from a year ago, when the divestment totals were 181 institutions and 656 individuals representing more than $50 billion in assets.
6More

Transatlantic Trade and Investment Partnership (TTIP) Negotiations Fall Apart Following... - 0 views

  • Back in January the EU Commission published their response to the consultation on TTIP and it was found that 97% of the 150,000 responses opposed the trade deal. These respondents represented the general public. The biggest petition in the EU’s history was then presented that contained the signatures of 2 million citizens (now nearly 3 million) opposed to TTIP. Both were rejected as were proposals even for a simple hearing of the European Citizens Initiative. Then in April this year, thousands of protestors took to the streets of cities all over Europe as unelected officials of the EU Commission continue to ignore the concerns of its citizens. In June, fellow MEPs from many political parties who are also opposed to TTIP joined Ukip in standing, shouting, booing and clapping to show their dissatisfaction with proceedings. MEPs were due to set out their first formal position on TTIP since negotiations started two years ago and the meeting descended into chaos (video). The meeting was then stopped by the commissioners. Meanwhile David Cameron has persistently attempted to call out those working to derail the deal. Cameron has accused critics of inventing false scare stories whilst urging business chiefs to help make the case to overcome sustained attacks from left-wing opponents and warned Britain would “rue the day if we miss this opportunity” to open up transatlantic markets.
  • Cameron, who (increasingly) seldom listens to the general public or elected members of parliament representing the electorate will no doubt use all his powers to get this deal though to redeem himself after being called incompetent by his own military generals and by the Obama administration over Syria. In sharp comparison, both Paris and Berlin want the Investor State Dispute Settlement mechanism (ISDS) of TTIP removed from the transatlantic trade treaty currently being negotiated with Washington. This is a game changer. Matthias Fekl, the French Secretary of State for Foreign Trade, told EurActiv France that he would “never allow private tribunals in the pay of multinational companies to dictate the policies of sovereign states, particularly in certain domains like health and the environment”. That was back in January. Nine months later and France has now reinforced that message and gone one big step forward. In an interview with Sud-Ouest, Matthias Fekl threatened to “call a complete halt” to the TTIP negotiations if things do not change. EurActiv France reports. America has shown no desire to change any of the major issues that have been challenged. Fekl told the French newspaper that he believes the “total lack of transparency” in the Transatlantic Trade and Investment Partnership (TTIP) negotiations poses a “democratic problem”.
  • Fekl, the Minister of State for Foreign Trade called on the United States to show “reciprocity” in the negotiations. “American members of parliament have access to a much higher number of documents than we do in Europe,” he said. The German people are now taking a stand and now it is being reported in the USA that sentiment is going against the deal – “It is entirely possible that the U.S. could seek to conclude the deal in the next few years only to find that European governments are unwilling to risk the ire of their voters”. Matthias Fekl, explained that, ever since the negotiations began in 2013, “These negotiations have been and are being conducted in a total lack of transparency,” and that France has, as of yet, received “no serious offer from the Americans.” The reasons for this stunning public rejection had probably already been accurately listed more than a year ago. Jean Arthuis, a member of the European Parliament, and formerly France’s Minister of Economy and Finance, headlined in Le Figaro, on 10 April 2014, “7 good reasons to oppose the transatlantic treaty”. There is no indication that the situation has changed since then, as regards the basic demands that President Obama is making. Arthuis said at that time, that he was opposed to;
  • ...3 more annotations...
  • Private arbitration of disputes between States and businesses. Such a procedure is strictly contrary to the idea that I have of the      sovereignty of States. … Any questioning of the European system of appellations of origin. According to the US proposal, there would be a non-binding register, and only for wines and spirits. Such a reform would kill many European local products, whose value is based on their certified origin. Signing of an agreement with a power that legalizes widespread and systematic spying on my fellow European citizens and European businesses. As long as the agreement does not protect the personal data of European and US citizens, it cannot be signed. Allowing the United States proposal of a transatlantic common financial space, who adamantly refuse a common regulation of finance, and they refuse to abolish systematic discrimination by the US financial markets against European financial services. The questioning of European health protections. We do not want our animals treated with growth hormones nor products derived from GMOs, or chemical decontamination of meat, or of genetically modified seeds or non-therapeutic antibiotics in animal feed.
  • The signing of an agreement if it does not include the end of the US monetary dumping. Since the abolition of the gold convertibility of the dollar and the transition to the system of floating exchange rates, the dollar is both American national currency and the main unit for exchange reserves in the world. The Federal Reserve then continually practices monetary dumping, by influencing the amount of dollars available to facilitate exports from the United States. As things now stand, America’s monetary weapon has the same effect as customs duties against every other nation. [And he will not sign unless it’s removed.] Allow the emerging digital services in Europe to be swept up by US giants such as Google, Amazon or Netflix. They’re giant absolute masters in tax optimization, which make Europe a “digital colony.”
  • France is now considering “all options including an outright termination of negotiations” says France’s Trade Minister.
12More

Popular Security Software Came Under Relentless NSA and GCHQ Attacks - The Intercept - 0 views

  • The National Security Agency and its British counterpart, Government Communications Headquarters, have worked to subvert anti-virus and other security software in order to track users and infiltrate networks, according to documents from NSA whistleblower Edward Snowden. The spy agencies have reverse engineered software products, sometimes under questionable legal authority, and monitored web and email traffic in order to discreetly thwart anti-virus software and obtain intelligence from companies about security software and users of such software. One security software maker repeatedly singled out in the documents is Moscow-based Kaspersky Lab, which has a holding registered in the U.K., claims more than 270,000 corporate clients, and says it protects more than 400 million people with its products. British spies aimed to thwart Kaspersky software in part through a technique known as software reverse engineering, or SRE, according to a top-secret warrant renewal request. The NSA has also studied Kaspersky Lab’s software for weaknesses, obtaining sensitive customer information by monitoring communications between the software and Kaspersky servers, according to a draft top-secret report. The U.S. spy agency also appears to have examined emails inbound to security software companies flagging new viruses and vulnerabilities.
  • The efforts to compromise security software were of particular importance because such software is relied upon to defend against an array of digital threats and is typically more trusted by the operating system than other applications, running with elevated privileges that allow more vectors for surveillance and attack. Spy agencies seem to be engaged in a digital game of cat and mouse with anti-virus software companies; the U.S. and U.K. have aggressively probed for weaknesses in software deployed by the companies, which have themselves exposed sophisticated state-sponsored malware.
  • The requested warrant, provided under Section 5 of the U.K.’s 1994 Intelligence Services Act, must be renewed by a government minister every six months. The document published today is a renewal request for a warrant valid from July 7, 2008 until January 7, 2009. The request seeks authorization for GCHQ activities that “involve modifying commercially available software to enable interception, decryption and other related tasks, or ‘reverse engineering’ software.”
  • ...9 more annotations...
  • The NSA, like GCHQ, has studied Kaspersky Lab’s software for weaknesses. In 2008, an NSA research team discovered that Kaspersky software was transmitting sensitive user information back to the company’s servers, which could easily be intercepted and employed to track users, according to a draft of a top-secret report. The information was embedded in “User-Agent” strings included in the headers of Hypertext Transfer Protocol, or HTTP, requests. Such headers are typically sent at the beginning of a web request to identify the type of software and computer issuing the request.
  • According to the draft report, NSA researchers found that the strings could be used to uniquely identify the computing devices belonging to Kaspersky customers. They determined that “Kaspersky User-Agent strings contain encoded versions of the Kaspersky serial numbers and that part of the User-Agent string can be used as a machine identifier.” They also noted that the “User-Agent” strings may contain “information about services contracted for or configurations.” Such data could be used to passively track a computer to determine if a target is running Kaspersky software and thus potentially susceptible to a particular attack without risking detection.
  • Another way the NSA targets foreign anti-virus companies appears to be to monitor their email traffic for reports of new vulnerabilities and malware. A 2010 presentation on “Project CAMBERDADA” shows the content of an email flagging a malware file, which was sent to various anti-virus companies by François Picard of the Montréal-based consulting and web hosting company NewRoma. The presentation of the email suggests that the NSA is reading such messages to discover new flaws in anti-virus software. Picard, contacted by The Intercept, was unaware his email had fallen into the hands of the NSA. He said that he regularly sends out notification of new viruses and malware to anti-virus companies, and that he likely sent the email in question to at least two dozen such outfits. He also said he never sends such notifications to government agencies. “It is strange the NSA would show an email like mine in a presentation,” he added.
  • The NSA presentation goes on to state that its signals intelligence yields about 10 new “potentially malicious files per day for malware triage.” This is a tiny fraction of the hostile software that is processed. Kaspersky says it detects 325,000 new malicious files every day, and an internal GCHQ document indicates that its own system “collect[s] around 100,000,000 malware events per day.” After obtaining the files, the NSA analysts “[c]heck Kaspersky AV to see if they continue to let any of these virus files through their Anti-Virus product.” The NSA’s Tailored Access Operations unit “can repurpose the malware,” presumably before the anti-virus software has been updated to defend against the threat.
  • The Project CAMBERDADA presentation lists 23 additional AV companies from all over the world under “More Targets!” Those companies include Check Point software, a pioneering maker of corporate firewalls based Israel, whose government is a U.S. ally. Notably omitted are the American anti-virus brands McAfee and Symantec and the British company Sophos.
  • As government spies have sought to evade anti-virus software, the anti-virus firms themselves have exposed malware created by government spies. Among them, Kaspersky appears to be the sharpest thorn in the side of government hackers. In the past few years, the company has proven to be a prolific hunter of state-sponsored malware, playing a role in the discovery and/or analysis of various pieces of malware reportedly linked to government hackers, including the superviruses Flame, which Kaspersky flagged in 2012; Gauss, also detected in 2012; Stuxnet, discovered by another company in 2010; and Regin, revealed by Symantec. In February, the Russian firm announced its biggest find yet: the “Equation Group,” an organization that has deployed espionage tools widely believed to have been created by the NSA and hidden on hard drives from leading brands, according to Kaspersky. In a report, the company called it “the most advanced threat actor we have seen” and “probably one of the most sophisticated cyber attack groups in the world.”
  • Hacks deployed by the Equation Group operated undetected for as long as 14 to 19 years, burrowing into the hard drive firmware of sensitive computer systems around the world, according to Kaspersky. Governments, militaries, technology companies, nuclear research centers, media outlets and financial institutions in 30 countries were among those reportedly infected. Kaspersky estimates that the Equation Group could have implants in tens of thousands of computers, but documents published last year by The Intercept suggest the NSA was scaling up their implant capabilities to potentially infect millions of computers with malware. Kaspersky’s adversarial relationship with Western intelligence services is sometimes framed in more sinister terms; the firm has been accused of working too closely with the Russian intelligence service FSB. That accusation is partly due to the company’s apparent success in uncovering NSA malware, and partly due to the fact that its founder, Eugene Kaspersky, was educated by a KGB-backed school in the 1980s before working for the Russian military.
  • Kaspersky has repeatedly denied the insinuations and accusations. In a recent blog post, responding to a Bloomberg article, he complained that his company was being subjected to “sensationalist … conspiracy theories,” sarcastically noting that “for some reason they forgot our reports” on an array of malware that trace back to Russian developers. He continued, “It’s very hard for a company with Russian roots to become successful in the U.S., European and other markets. Nobody trusts us — by default.”
  • Documents published with this article: Kaspersky User-Agent Strings — NSA Project CAMBERDADA — NSA NDIST — GCHQ’s Developing Cyber Defence Mission GCHQ Application for Renewal of Warrant GPW/1160 Software Reverse Engineering — GCHQ Reverse Engineering — GCHQ Wiki Malware Analysis & Reverse Engineering — ACNO Skill Levels — GCHQ
3More

Lobbyists for Spies Appointed To Oversee Spying - The Intercept - 0 views

  • Who’s keeping watch of the National Security Agency? In Congress, the answer in more and more cases is that the job is going to former lobbyists for NSA contractors and other intelligence community insiders. A wave of recent appointments has placed intelligence industry insiders into key Congressional roles overseeing intelligence gathering. The influx of insiders is particularly alarming because lawmakers in Washington are set to take up a series of sensitive surveillance and intelligence issues this year, from reform of the Patriot Act to far-reaching “information sharing” legislation.
  • Who’s keeping watch of the National Security Agency? In Congress, the answer in more and more cases is that the job is going to former lobbyists for NSA contractors and other intelligence community insiders. A wave of recent appointments has placed intelligence industry insiders into key Congressional roles overseeing intelligence gathering. The influx of insiders is particularly alarming because lawmakers in Washington are set to take up a series of sensitive surveillance and intelligence issues this year, from reform of the Patriot Act to far-reaching “information sharing” legislation. After the first revelations of domestic surveillance by NSA whistleblower Edward Snowden, President Obama defended the spying programs by claiming they were “subject to congressional oversight and congressional reauthorization and congressional debate.” But as Rep. Alan Grayson, D-Fla., and other members of Congress have pointed out, there is essentially a “two-tiered” system for oversight, with lawmakers and staff on specialized committees, such as the House and Senate committees on Intelligence and Homeland Security, controlling the flow of information and routinely excluding other Congress members, even those who have asked for specific information relating to pending legislation.
  • The Intercept reviewed the new gatekeepers in Congress, the leading staffers on the committees overseeing intelligence and surveillance matters, and found a large number of lobbyists and consultants passing through the revolving door between the intelligence community and the watchdogs who purportedly oversee the intelligence community. We reached out to each of them earlier this week and have yet to hear back:
2More

Germany's top prosecutor fired over treason probe - Yahoo News - 0 views

  • A treason investigation against two German journalists claimed its first casualty Tuesday — the country's top prosecutor who ordered the probe.
  • Justice Minister Heiko Maas announced he was seeking the dismissal of Harald Range hours after the chief federal prosecutor accused the government of interfering in his investigation.Maas said he made the decision in consultation with Chancellor Angela Merkel's office, indicating that the sacking was approved at the highest level.The Justice Ministry had questioned Range's decision to open the investigation against two journalists from the website Netzpolitik.org who had reported that Germany's domestic spy agency plans to expand surveillance of online communication.The treason probe was widely criticized and regarded as an embarrassment to the government. Senior officials stressed in recent days that Germany is committed to protecting press freedom.
12More

United Grand Lodge of England » Who's Who - 0 views

  • Grand Master Prince Edward George Nicholas Paul Patrick was born in 1935, and educated at Eton and Le Rosey, Switzerland. He is a cousin both of the Queen and of the Duke of Edinburgh.
  • His father,
  • Jonathan Spence was born in 1960, and educated at the Mathematical School, Rochester and Trinity College, Oxford. After a career in banking, from which he retired in 2006 as Chief Executive of a London bank, he now holds a senior position in education.
  • ...8 more annotations...
  • He has been the Grand Master of the United Grand Lodge of England since he was first elected in 1967
  • Pro Grand Master Peter Lowndes was born in 1948 and educated at Eton. He is a Fellow of the Royal Institution of Chartered Surveyors (RICS).
  • was the fourth son of King George V, and his mother, Princess Marina, was the daughter of Prince Nicholas of Greece.
  • He was appointed Grand Director of Ceremonies in 2003 and served in that office until his appointment as Deputy Grand Master on 11 March 2009.
  • Assistant Grand Master David Williamson was born in Bombay, India, in 1943 and educated at King Edward VI School, Lichfield, Queen Mary College, London and King’s College, Cambridge. He trained as a pilot, and was subsequently appointed as Training Captain and Assistant Flight Training Manager for British Airways until his retirement in 1998.
  • Appointed as Assistant Grand Director of Ceremonies in 1995,
  • Nigel Brown was born in 1948,
  • 12 years as a business consultant specialising in advising clients on winning competitive global tenders.
  •  
    He is the Queen's nephew and in line to the throne of Greece,(which is being robbed by the Goldman Sachs in the recession). CONNECT THE DOTS
6More

An Israeli takeover of the Palestine Authority…? - Alan Hart - 0 views

  • On the face of it that’s a silly question and the speculation it represents – that Palestinian “President” Abbas could replaced by an Israeli agent or asset – is not worthy of discussion. But before dismissing it readers might do what I did and consider two things. The first is that Mohammed Dahlan, formerly one of the most powerful Fatah leaders and almost certainly the one who administered for Israel the polonium that killed Arafat, is now putting a big effort into getting rid of Abbas by one means or another and replacing him with – guess who? – himself. In passing it is interesting to note that according to a recent report in the Israeli newspaper Ma’ariv, Netanyahu’s special envoy, Yitzhak Molcho, is in a secret dialogue with Dahlan who spends his time shuttling between Cairo and the U.A.E. where he currently lives. One assumption has to be that Netanyahu is hoping that if Dahlan became “President” of the PA he would go much further than collaborator Abbas in delivering for Israel. (Also worth noting is that Dahlan speaks fluent Hebrew. He learned to do so during his 11 spells in Israeli jails between 1981 and 1986).
  • The second consideration is Israel’s track record in successfully placing its agents inside Arab institutions and organizations at very high levels.
  • My speculation (repeat speculation) is that if Mohammed Dahlan became the “President”, he would be prepared to use force as necessary to impose Israel’s terms for peace on the Palestinians. Dahlan demonstrated his enthusiasm for doing Israeli and American dirty work when, at the request of the Bush administration, he agreed to lead a military campaign to destroy Hamas after its election victory in 2006. The Bush administration provided Dahlan with money and arms and trained his Fatah fighters in a number of Arab countries. But it all went badly wrong for Dahlan and his sponsors. Hamas got wind of what Dahlan (fronting for the Bush administration and Israel) was intending and launched an Israeli-like pre-emptive strike. It destroyed Fatah’s security forces based in the Gaza Strip (which had been Dahlan’s base) and put Fatah politically out of business there. Commenting on what had happened in the Gaza Strip, Hani al-Hassan, for many years Arafat’s crisis manager and one of his two most trusted advisers, said it was “not a war between Fatah and Hamas but between Hamas and Fatah collaborators who served the Americans and the Israelis.”
  • ...3 more annotations...
  • Subsequently the Bush administration exerted heavy pressure on Abbas (which he resisted) to appoint Dahlan as his deputy. And some Palestinian officials said that the U.S. and a number of European countries had made it clear that they would like Dahlan to succeed Abbas as head of the P.A. They presumably believed then, as Netanyahu might well do today, that Dahlan as “President” would use whatever means were necessary to compel the Palestinians to make peace on Israel’s terms. Shortly after his forces were expelled from the Gaza Strip, Dahlan re-established himself in the West Bank. And thereafter tensions between his Fatah supporters and opponents grew and grew. In June 2011 he was expelled from Fatah because of the assumption that he had delivered for Israel whatever it was that poisoned Arafat. Three months later Abbas ordered a raid on Dahlan’s house and the arrest of his private armed guards. Today in exile, and consulting with his allies in Sisi’s Egypt and some Arab Gulf states as well as Israel and America, Dahlan is plotting his comeback to replace Abbas by one means or another.
  • The Ma’ariv article I mentioned above said that Dahlan has claimed that he and not Abbas can be counted on to bring peace, and that in 2010 he reportedly sent a letter to the Obama administration in which he said, “There is no choice but to replace Abbas with someone who can deliver results.” Because Dahlan must know that Israel’s leaders are not remotely interested in peace on terms the Palestinians could accept, I think it is reasonable to assume that the result he has in mind is peace imposed on Israel’s terms – effectively a Palestinian surrender to Zionism’s will. Is a Dahlan/Israeli takeover of the PA really possible? An indication that Abbas seems to think it cannot be ruled out was his request to President Obama that he press Israel to include Marwan Barghouti in the fourth and final batch of Palestinian prisoners due to be released at the end of this month. (Prisoner release was one of the inducements to secure Abbas’s green light for Secretary of State Kerry to launch his “peace process”. But today Netanyahu is under mounting pressure from the neo-fascist tendency to the right of him to say “No” to any further prisoner releases).
  • Barghouti is by far the most popular Palestinian leader and would easily win an election to replace Abbas as “President”. And that, of course, is precisely why Israel won’t release him. So if Abbas can be bullied and bribed by Israel and the U.S. into lifting the ban on Dahlan’s return from exile to the occupied West Bank, he, Dahlan, could be in with a chance. In my view a victory for him would be the final betrayal of the Palestinian cause.
6More

CSIS asked foreign agencies to spy on Canadians, kept court in dark, judge says - 0 views

  • OTTAWA — Canada’s foremost jurist on national security law has slammed CSIS for deliberately keeping the Federal Court of Canada “in the dark” about outsourcing its spying on Canadians abroad to foreign agencies, according to a redacted version of a classified court decision made public Friday.In a thundering rebuke, Federal Court Judge Richard Mosley said the Canadian Security Intelligence Service (CSIS) purposely misled him when he granted it numerous warrants beginning in 2009 to intercept the electronic communications of unidentified Canadians abroad suspected as domestic security threats.“This was a breach of the duty of candour owed by the service and their legal advisers to the court,” Mosley said in his Further Reasons for Order.CSIS also mistakenly assigned powers to the warrants that the court never authorized and which do not exist in law, he said.“It is clear that the exercise of the court’s warrant issuing authority has been used as protective cover for activities that it has not authorized,” Mosley wrote.Furthermore, tasking foreign security intelligence services to spy on Canadians overseas “carries the risk of the detention of or other harm to a Canadian person based on that information.“Given the unfortunate history of information sharing with foreign agencies over the past decade and the reviews conducted by several royal commissions, there can be no question that the Canadian agencies are aware of those hazards. It appears to me that they are using the warrants as authorization to assume those risks.”
  • Legal observers say this case and Mosley’s scolding will harm CSIS’s credibility and raise questions about whether the service has broken Criminal Code provisions dealing with the invasion of privacy.“When a judge says the government breached its duty of candour that is a very big ‘ouch’ moment,” Craig Forcese, a national security law scholar at the University of Ottawa, wrote in a recent blog posting.At the time the first warrants were issued, CSIS told the court “on clearly stated grounds” that the electronic intercepts would be carried out from within Canada by the Communications Security Establishment Canada (CSEC), the country’s foreign signals intelligence spy service.CSIS is largely restricted to domestic spying operations. If an investigation involves the use of intrusive techniques, such as electronic intercepts, Section 21 of the CSIS Act requires it to obtain a warrant approved by a Federal Court judge to guard the Charter right to a reasonable expectation of privacy.CSEC, meanwhile, is not allowed to spy on Canadians anywhere unless it is to provide technical and operational assistance to federal law enforcement and security agencies such as CSIS.And the federal court only has jurisdiction to authorize warrants under the CSIS Act as long as the communications in question are intercepted within Canada.
  • Yet once the so-called 30-08 warrants were approved by the court, CSEC, on behalf of CSIS, turned around and handed the jobs to one or more of its partners in the “Five Eyes” intelligence-gathering alliance between Canada, the United States, Great Britain, Australia and New Zealand.Mosley found out about the situation late this summer and summoned CSIS, CSEC and government officials and lawyers to court to explain themselves. The public version of his reasons for order was released Friday.
  • ...2 more annotations...
  • Some excerpts:• “I am satisfied that a decision was made by CSIS officials in consultation with their legal advisers to strategically omit information in applications for 30-08 warrants about their intention to seek the assistance of the foreign partners. As a result, the court was led to believe that all of the interception activity would take place in or under the control of Canada.”• “The principle of comity between nations that implies the acceptance of foreign laws and procedures when Canadian officials are operating abroad ends where clear violations of international law and human rights begin. In tasking the other members of the Five Eyes to intercept the communications of the Canadian targets, CSIS and CSEC officials knew ... this would involve the breach of international law by the requested second parties.”• “There is nothing in any of the material that I have read ... that persuades me that it was the intent of Parliament to give the service authority to engage the collection resources of the second party allies to intercept the private communications of Canadians.”• “It must be made clear, in any grant of a 30-08 warrant, that the warrant does not authorize the interception of the communications of a Canadian person by any foreign service on behalf of the service either directly or through the assistance of CSEC.”• “There must be no further suggestion in any reference to the use of second party assets by CSIS and CSEC, or their legal advisers, that it is being done under the authority of a (section) 21 warrant issued by this court.”
  • Forcese, meanwhile, raises some intriguing questions:• If Five Eyes assistance was not authorized, and CSEC and CSIS nevertheless sought it, are they still protected from Criminal Code, Part VI (invasion of privacy) culpability? Culpability, he writes, is only avoided where the intercept is lawfully authorized. If the parameters of the warrant were disregarded, does that vitiate the lawful access?• If CSEC and CSIS called on Five Eyes agencies to intercept communications, was the intercept still territorial, thus satisfying the international law concerns raised in the two warrant applications?“Outsourcing an international violation does not diminish state responsibility for that international violation. In a different context, that would be like asking bounty hunters to do your kidnapping of fugitives on the territory of a foreign state. Still a violation of international law.”CSIS has a choice, Forcese concludes: “Conduct extraterritorial spying without recourse to the courts, at risk of ultimately being called to account under domestic law, or honour the federal court’s construal of international law — and CSIS’s jurisdiction — and pull in its truly international surveillance operations, potentially blinding the country’s chief security intelligence agency.
  •  
    Canadian Security Intelligence Service is in politically explosive deep doo-doo. 
6More

Memo to Potential Whistleblowers: If You See Something, Say Something | Global Research - 0 views

  • Blowing the whistle on wrongdoing creates a moral frequency that vast numbers of people are eager to hear. We don’t want our lives, communities, country and world continually damaged by the deadening silences of fear and conformity. I’ve met many whistleblowers over the years, and they’ve been extraordinarily ordinary. None were applying for halos or sainthood. All experienced anguish before deciding that continuous inaction had a price that was too high. All suffered negative consequences as well as relief after they spoke up and took action. All made the world better with their courage. Whistleblowers don’t sign up to be whistleblowers. Almost always, they begin their work as true believers in the system that conscience later compels them to challenge. “It took years of involvement with a mendacious war policy, evidence of which was apparent to me as early as 2003, before I found the courage to follow my conscience,” Matthew Hoh recalled this week.“It is not an easy or light decision for anyone to make, but we need members of our military, development, diplomatic and intelligence community to speak out if we are ever to have a just and sound foreign policy.”
  • Hoh describes his record this way: “After over 11 continuous years of service with the U.S. military and U.S. government, nearly six of those years overseas, including service in Iraq and Afghanistan, as well as positions within the Secretary of the Navy’s Office as a White House Liaison, and as a consultant for the State Department’s Iraq Desk, I resigned from my position with the State Department in Afghanistan in protest of the escalation of war in 2009.” Another former Department of State official, the ex-diplomat and retired Army colonel Ann Wright, who resigned in protest of the Iraq invasion in March 2003, is crossing paths with Hoh on Friday as they do the honors at a ribbon-cutting — half a block from the State Department headquarters in Washington — for a billboard with a picture of Pentagon Papers whistleblower Daniel Ellsberg. Big-lettered words begin by referring to the years he waited before releasing the Pentagon Papers in 1971. “Don’t do what I did,” Ellsberg says on the billboard.  “Don’t wait until a new war has started, don’t wait until thousands more have died, before you tell the truth with documents that reveal lies or crimes or internal projections of costs and dangers. You might save a war’s worth of lives.
  • The billboard – sponsored by the ExposeFacts organization, which launched this week — will spread to other prominent locations in Washington and beyond. As an organizer for ExposeFacts, I’m glad to report that outreach to potential whistleblowers is just getting started. (For details, visit ExposeFacts.org.) We’re propelled by the kind of hopeful determination that Hoh expressed the day before the billboard ribbon-cutting when he said: “I trust ExposeFacts and its efforts will encourage others to follow their conscience and do what is right.” The journalist Kevin Gosztola, who has astutely covered a range of whistleblower issues for years, pointed this week to the imperative of opening up news media. “There is an important role for ExposeFacts to play in not only forcing more transparency, but also inspiring more media organizations to engage in adversarial journalism,” he wrote. “Such journalism is called for in the face of wars, environmental destruction, escalating poverty, egregious abuses in the justice system, corporate control of government, and national security state secrecy. Perhaps a truly successful organization could inspire U.S. media organizations to play much more of a watchdog role than a lapdog role when covering powerful institutions in government.”
  • ...2 more annotations...
  • Overall, we desperately need to nurture and propagate a steadfast culture of outspoken whistleblowing. A central motto of the AIDS activist movement dating back to the 1980s – Silence = Death – remains urgently relevant in a vast array of realms. Whether the problems involve perpetual war, corporate malfeasance, climate change, institutionalized racism, patterns of sexual assault, toxic pollution or countless other ills, none can be alleviated without bringing grim realities into the light. “All governments lie,” Ellsberg says in a video statement released for the launch of ExposeFacts, “and they all like to work in the dark as far as the public is concerned, in terms of their own decision-making, their planning — and to be able to allege, falsely, unanimity in addressing their problems, as if no one who had knowledge of the full facts inside could disagree with the policy the president or the leader of the state is announcing.” Ellsberg adds: “A country that wants to be a democracy has to be able to penetrate that secrecy, with the help of conscientious individuals who understand in this country that their duty to the Constitution and to the civil liberties and to the welfare of this country definitely surmount their obligation to their bosses, to a given administration, or in some cases to their promise of secrecy.”
  • Right now, our potential for democracy owes a lot to people like NSA whistleblowers William Binney and Kirk Wiebe, and EPA whistleblower Marsha Coleman-Adebayo. When they spoke at the June 4 news conference in Washington that launched ExposeFacts, their brave clarity was inspiring. Antidotes to the poisons of cynicism and passive despair can emerge from organizing to help create a better world. The process requires applying a single standard to the real actions of institutions and individuals, no matter how big their budgets or grand their power. What cannot withstand the light of day should not be suffered in silence. If you see something, say something.
  •  
    While some governments -- my own included -- attempt to impose an Orwellian Dark State of ubiquitous secret surveillance, secret wars, the rule of oligarchs, and public ignorance, the Edward Snowden leaks fanned the flames of the countering War on Ignorance that had been kept alive by civil libertarians. Only days after the U.S. Supreme Court denied review in a case where a reporter had been ordered to reveal his source of information for a book on the Dark State under the penalties for contempt of court (a long stretch in jail), a new web site is launched for communications between sources and journalists where the source's names never need to be revealed. This article is part of the publicity for that new weapon fielded by the civil libertarian side in the War Against Ignorance.  Hurrah!
16More

Data Pirates of the Caribbean: The NSA Is Recording Every Cell Phone Call in the Bahama... - 0 views

  • The National Security Agency is secretly intercepting, recording, and archiving the audio of virtually every cell phone conversation on the island nation of the Bahamas. According to documents provided by NSA whistleblower Edward Snowden, the surveillance is part of a top-secret system – code-named SOMALGET – that was implemented without the knowledge or consent of the Bahamian government. Instead, the agency appears to have used access legally obtained in cooperation with the U.S. Drug Enforcement Administration to open a backdoor to the country’s cellular telephone network, enabling it to covertly record and store the “full-take audio” of every mobile call made to, from and within the Bahamas – and to replay those calls for up to a month. SOMALGET is part of a broader NSA program called MYSTIC, which The Intercept has learned is being used to secretly monitor the telecommunications systems of the Bahamas and several other countries, including Mexico, the Philippines, and Kenya. But while MYSTIC scrapes mobile networks for so-called “metadata” – information that reveals the time, source, and destination of calls – SOMALGET is a cutting-edge tool that enables the NSA to vacuum up and store the actual content of every conversation in an entire country.
  • All told, the NSA is using MYSTIC to gather personal data on mobile calls placed in countries with a combined population of more than 250 million people. And according to classified documents, the agency is seeking funding to export the sweeping surveillance capability elsewhere. The program raises profound questions about the nature and extent of American surveillance abroad. The U.S. intelligence community routinely justifies its massive spying efforts by citing the threats to national security posed by global terrorism and unpredictable rival nations like Russia and Iran. But the NSA documents indicate that SOMALGET has been deployed in the Bahamas to locate “international narcotics traffickers and special-interest alien smugglers” – traditional law-enforcement concerns, but a far cry from derailing terror plots or intercepting weapons of mass destruction.
  • By targeting the Bahamas’ entire mobile network, the NSA is intentionally collecting and retaining intelligence on millions of people who have not been accused of any crime or terrorist activity. Nearly five million Americans visit the country each year, and many prominent U.S. citizens keep homes there, including Sen. Tom Harkin (D-Iowa), Bill Gates, and Oprah Winfrey.
  • ...12 more annotations...
  • The Intercept has confirmed that as of 2013, the NSA was actively using MYSTIC to gather cell-phone metadata in five countries, and was intercepting voice data in two of them. Documents show that the NSA has been generating intelligence reports from MYSTIC surveillance in the Bahamas, Mexico, Kenya, the Philippines, and one other country, which The Intercept is not naming in response to specific, credible concerns that doing so could lead to increased violence. The more expansive full-take recording capability has been deployed in both the Bahamas and the unnamed country. MYSTIC was established in 2009 by the NSA’s Special Source Operations division, which works with corporate partners to conduct surveillance. Documents in the Snowden archive describe it as a “program for embedded collection systems overtly installed on target networks, predominantly for the collection and processing of wireless/mobile communications networks.”
  • If an entire nation’s cell-phone calls were a menu of TV shows, MYSTIC would be a cable programming guide showing which channels offer which shows, and when. SOMALGET would be the DVR that automatically records every show on every channel and stores them for a month. MYSTIC provides the access; SOMALGET provides the massive amounts of storage needed to archive all those calls so that analysts can listen to them at will after the fact. According to one NSA document, SOMALGET is “deployed against entire networks” in the Bahamas and the second country, and processes “over 100 million call events per day.”
  • When U.S. drug agents need to tap a phone of a suspected drug kingpin in another country, they call up their counterparts and ask them set up an intercept. To facilitate those taps, many nations – including the Bahamas – have hired contractors who install and maintain so-called lawful intercept equipment on their telecommunications. With SOMALGET, it appears that the NSA has used the access those contractors developed to secretly mine the country’s entire phone system for “signals intelligence” –recording every mobile call in the country. “Host countries,” the document notes, “are not aware of NSA’s SIGINT collection.” “Lawful intercept systems engineer communications vulnerabilities into networks, forcing the carriers to weaken,” says Christopher Soghoian, the principal technologist for the American Civil Liberties Union. “Host governments really should be thinking twice before they accept one of these Trojan horses.”
  • The DEA has long been in a unique position to help the NSA gain backdoor access to foreign phone networks. “DEA has close relationships with foreign government counterparts and vetted foreign partners,” the manager of the NSA’s drug-war efforts reported in a 2004 memo. Indeed, with more than 80 international offices, the DEA is one of the most widely deployed U.S. agencies around the globe. But what many foreign governments fail to realize is that U.S. drug agents don’t confine themselves to simply fighting narcotics traffickers. “DEA is actually one of the biggest spy operations there is,” says Finn Selander, a former DEA special agent who works with the drug-reform advocacy group Law Enforcement Against Prohibition. “Our mandate is not just drugs. We collect intelligence.” What’s more, Selander adds, the NSA has aided the DEA for years on surveillance operations. “On our reports, there’s drug information and then there’s non-drug information,” he says. “So countries let us in because they don’t view us, really, as a spy organization.”
  • “I seriously don’t think that would be your run-of-the-mill legal interception equipment,” says the former engineer, who worked with hardware and software that typically maxed out at 1,000 intercepts. The NSA, by contrast, is recording and storing tens of millions of calls – “mass surveillance,” he observes, that goes far beyond the standard practices for lawful interception recognized around the world. The Bahamas Telecommunications Company did not respond to repeated phone calls and emails.
  • The proliferation of private contractors has apparently provided the NSA with direct access to foreign phone networks. According to the documents, MYSTIC draws its data from “collection systems” that were overtly installed on the telecommunications systems of targeted countries, apparently by corporate “partners” cooperating with the NSA. One NSA document spells out that “the overt purpose” given for accessing foreign telecommunications systems is “for legitimate commercial service for the Telco’s themselves.” But the same document adds: “Our covert mission is the provision of SIGINT,” or signals intelligence.
  • According to the NSA documents, MYSTIC targets calls and other data transmitted on  Global System for Mobile Communications networks – the primary framework used for cell phone calls worldwide. In the Philippines, MYSTIC collects “GSM, Short Message Service (SMS) and Call Detail Records” via access provided by a “DSD asset in a Philippine provider site.” (The DSD refers to the Defence Signals Directorate, an arm of Australian intelligence. The Australian consulate in New York declined to comment.) The operation in Kenya is “sponsored” by the CIA, according to the documents, and collects “GSM metadata with the potential for content at a later date.” The Mexican operation is likewise sponsored by the CIA. The documents don’t say how or under what pretenses the agency is gathering call data in those countries. In the Bahamas, the documents say, the NSA intercepts GSM data that is transmitted over what is known as the “A link”–or “A interface”–a core component of many mobile networks. The A link transfers data between two crucial parts of GSM networks – the base station subsystem, where phones in the field communicate with cell towers, and the network subsystem, which routes calls and text messages to the appropriate destination. “It’s where all of the telephone traffic goes,” says the former engineer.
  • When U.S. drug agents wiretap a country’s phone networks, they must comply with the host country’s laws and work alongside their law enforcement counterparts. “The way DEA works with our allies – it could be Bahamas or Jamaica or anywhere – the host country has to invite us,” says Margolis. “We come in and provide the support, but they do the intercept themselves.” The Bahamas’ Listening Devices Act requires all wiretaps to be authorized in writing either by the minister of national security or the police commissioner in consultation with the attorney general. The individuals to be targeted must be named. Under the nation’s Data Protection Act, personal data may only be “collected by means which are both lawful and fair in the circumstances of the case.” The office of the Bahamian data protection commissioner, which administers the act, said in a statement that it “was not aware of the matter you raise.” Countries like the Bahamas don’t install lawful intercepts on their own. With the adoption of international standards, a thriving market has emerged for private firms that are contracted by foreign governments to install and maintain lawful intercept equipment. Currently valued at more than $128 million, the global market for private interception services is expected to skyrocket to more than $970 million within the next four years, according to a 2013 report from the research firm Markets and Markets.
  • If the U.S. government wanted to make a case for surveillance in the Bahamas, it could point to the country’s status as a leading haven for tax cheats, corporate shell games, and a wide array of black-market traffickers. The State Department considers the Bahamas both a “major drug-transit country” and a “major money laundering country” (a designation it shares with more than 60 other nations, including the U.S.). According to the International Monetary Fund, as of 2011 the Bahamas was home to 271 banks and trust companies with active licenses. At the time, the Bahamian banks held $595 billion in U.S. assets. But the NSA documents don’t reflect a concerted focus on the money launderers and powerful financial institutions – including numerous Western banks – that underpin the black market for narcotics in the Bahamas. Instead, an internal NSA presentation from 2013 recounts with pride how analysts used SOMALGET to locate an individual who “arranged Mexico-to-United States marijuana shipments” through the U.S. Postal Service.
  • The presentation doesn’t say whether the NSA shared the information with the DEA. But the drug agency’s Special Operations Divison has come under fire for improperly using classified information obtained by the NSA to launch criminal investigations – and then creating false narratives to mislead courts about how the investigations began. The tactic – known as parallel construction – was first reported by Reuters last year, and is now under investigation by the Justice Department’s inspector general. So: Beyond a desire to bust island pot dealers, why would the NSA choose to apply a powerful collection tool such as SOMALGET against the Bahamas, which poses virtually no threat to the United States? The answer may lie in a document that characterizes the Bahamas operation as a “test bed for system deployments, capabilities, and improvements” to SOMALGET. The country’s small population – fewer than 400,000 residents – provides a manageable sample to try out the surveillance system’s features. Since SOMALGET is also operational in one other country, the Bahamas may be used as a sort of guinea pig to beta-test improvements and alterations without impacting the system’s operations elsewhere. “From an engineering point of view it makes perfect sense,” says the former engineer. “Absolutely.”
  • SOMALGET operates under Executive Order 12333, a Reagan-era rule establishing wide latitude for the NSA and other intelligence agencies to spy on other countries, as long as the attorney general is convinced the efforts are aimed at gathering foreign intelligence. In 2000, the NSA assured Congress that all electronic surveillance performed under 12333 “must be conducted in a manner that minimizes the acquisition, retention, and dissemination of information about unconsenting U.S. persons.” In reality, many legal experts point out, the lack of judicial oversight or criminal penalties for violating the order render the guidelines meaningless. “I think it would be open, whether it was legal or not,” says German, the former FBI agent. “Because we don’t have all the facts about how they’re doing it. For a long time, the NSA has been interpreting their authority in the broadest possible way, even beyond what an objective observer would say was reasonable.” “An American citizen has Fourth Amendment rights wherever they are,” adds Kurt Opsahl, an attorney with the Electronic Frontier Foundation. “Nevertheless, there have certainly been a number of things published over the last year which suggest that there are broad, sweeping programs that the NSA and other government agencies are doing abroad that sweep up the communications of Americans.”
  • Legal or not, the NSA’s covert surveillance of an entire nation suggests that it will take more than the president’s tepid “limits” to rein in the ambitions of the intelligence community. “It’s almost like they have this mentality – if we can, we will,” says German. “There’s no analysis of the long-term risks of doing it, no analysis of whether it’s actually worth the effort, no analysis of whether we couldn’t take those resources and actually put them on real threats and do more good.” It’s not surprising, German adds, that the government’s covert program in the Bahamas didn’t remain covert. “The undermining of international law and international cooperation is such a long-term negative result of these programs that they had to know would eventually be exposed, whether through a leak, whether through a spy, whether through an accident,” he says. “Nothing stays secret forever. It really shows the arrogance of these agencies – they were just going to do what they were going to do, and they weren’t really going to consider any other important aspects of how our long-term security needs to be addressed.”
  •  
    Words fail me.
2More

The Economic Scam of the Century » CounterPunch: Tells the Facts, Names the N... - 0 views

  • The leaders of the U.S. Senate Banking Committee,  Sen. Tim Johnson (D., S.D.) and Sen. Mike Crapo (R., Idaho),  released a draft bill on Sunday that would provide explicit government guarantees on mortgage-backed securities (MBS) generated by privately-owned banks and financial institutions. The gigantic giveaway to Wall Street would put US taxpayers on the hook for 90 percent of the losses on toxic MBS the likes of which crashed the financial system in 2008 plunging the economy into the deepest slump since the Great Depression. Proponents of the bill say that new rules by the Consumer Financial Protection Bureau (CFPB) –which set standards for a “qualified mortgage” (QM)– assure that borrowers will be able to repay their loans thus reducing the chances of a similar meltdown in the future. However, those QE rules were largely shaped by lobbyists and attorneys from the banking industry who eviscerated strict underwriting requirements– like high FICO scores and 20 percent down payments– in order to lend freely to borrowers who may be less able to repay their loans.  Additionally, a particularly lethal clause has been inserted into the bill that would provide blanket coverage for all MBS  (whether they met the CFPB’s QE standard or not) in the event of another financial crisis. Here’s the paragraph:
  • “Sec.305. Authority to protect taxpayers in unusual and exigent market conditions…. If the Corporation, the Chairman of the Federal Reserve Board of Governors and the Secretary of the Treasury, in consultation with the Secretary of Housing and Urban Development, determine that unusual and exigent circumstances threaten mortgage credit availability within the U.S. housing market, FMIC may provide insurance on covered securities that do not meet the requirements under section 302 including those for first loss position of private market holders.” (“Freddie And Fannie Reform – The Monster Has Arrived”, Zero Hedge) In other words, if the bill passes,  US taxpayers will be responsible for any and all bailouts deemed necessary by the regulators mentioned above.  And, since all of those regulators are in Wall Street’s hip-pocket, there’s no question what they’ll do when the time comes. They’ll bailout they’re fatcat buddies and dump the losses on John Q. Public. If you can’t believe what you are reading or if you think that the system is so thoroughly corrupt it can’t be fixed; you’re not alone. This latest outrage just confirms that the Congress, the executive and all the chief regulators are mere marionettes performing whatever task is asked of them by their Wall Street paymasters.
15More

Operation AURORAGOLD: How the NSA Hacks Cellphone Networks Worldwide - 0 views

  • In March 2011, two weeks before the Western intervention in Libya, a secret message was delivered to the National Security Agency. An intelligence unit within the U.S. military’s Africa Command needed help to hack into Libya’s cellphone networks and monitor text messages. For the NSA, the task was easy. The agency had already obtained technical information about the cellphone carriers’ internal systems by spying on documents sent among company employees, and these details would provide the perfect blueprint to help the military break into the networks. The NSA’s assistance in the Libya operation, however, was not an isolated case. It was part of a much larger surveillance program—global in its scope and ramifications—targeted not just at hostile countries.
  • According to documents contained in the archive of material provided to The Intercept by whistleblower Edward Snowden, the NSA has spied on hundreds of companies and organizations internationally, including in countries closely allied to the United States, in an effort to find security weaknesses in cellphone technology that it can exploit for surveillance. The documents also reveal how the NSA plans to secretly introduce new flaws into communication systems so that they can be tapped into—a controversial tactic that security experts say could be exposing the general population to criminal hackers. Codenamed AURORAGOLD, the covert operation has monitored the content of messages sent and received by more than 1,200 email accounts associated with major cellphone network operators, intercepting confidential company planning papers that help the NSA hack into phone networks.
  • Karsten Nohl, a leading cellphone security expert and cryptographer who was consulted by The Intercept about details contained in the AURORAGOLD documents, said that the broad scope of information swept up in the operation appears aimed at ensuring virtually every cellphone network in the world is NSA accessible.
  • ...11 more annotations...
  • “Collecting an inventory [like this] on world networks has big ramifications,” Nohl said, because it allows the NSA to track and circumvent upgrades in encryption technology used by cellphone companies to shield calls and texts from eavesdropping. Evidence that the agency has deliberately plotted to weaken the security of communication infrastructure, he added, was particularly alarming. “Even if you love the NSA and you say you have nothing to hide, you should be against a policy that introduces security vulnerabilities,” Nohl said, “because once NSA introduces a weakness, a vulnerability, it’s not only the NSA that can exploit it.”
  • The AURORAGOLD operation is carried out by specialist NSA surveillance units whose existence has not been publicly disclosed: the Wireless Portfolio Management Office, which defines and carries out the NSA’s strategy for exploiting wireless communications, and the Target Technology Trends Center, which monitors the development of new communication technology to ensure that the NSA isn’t blindsided by innovations that could evade its surveillance reach. The center’s logo is a picture of the Earth overshadowed by a large telescope; its motto is “Predict – Plan – Prevent.”
  • The NSA documents reveal that, as of May 2012, the agency had collected technical information on about 70 percent of cellphone networks worldwide—701 of an estimated 985—and was maintaining a list of 1,201 email “selectors” used to intercept internal company details from employees. (“Selector” is an agency term for a unique identifier like an email address or phone number.) From November 2011 to April 2012, between 363 and 1,354 selectors were “tasked” by the NSA for surveillance each month as part of AURORAGOLD, according to the documents. The secret operation appears to have been active since at least 2010.
  • By covertly monitoring GSMA working groups in a bid to identify and exploit security vulnerabilities, the NSA has placed itself into direct conflict with the mission of the National Institute for Standards and Technology, or NIST, the U.S. government agency responsible for recommending cybersecurity standards in the United States. NIST recently handed out a grant of more than $800,000 to GSMA so that the organization could research ways to address “security and privacy challenges” faced by users of mobile devices. The revelation that the trade group has been targeted for surveillance may reignite deep-seated tensions between NIST and NSA that came to the fore following earlier Snowden disclosures. Last year, NIST was forced to urge people not to use an encryption standard it had previously approved after it emerged NSA had apparently covertly worked to deliberately weaken it.
  • The NSA focuses on intercepting obscure but important technical documents circulated among the GSMA’s members known as “IR.21s.” Most cellphone network operators share IR.21 documents among each other as part of agreements that allow their customers to connect to foreign networks when they are “roaming” overseas on a vacation or a business trip. An IR.21, according to the NSA documents, contains information “necessary for targeting and exploitation.” The details in the IR.21s serve as a “warning mechanism” that flag new technology used by network operators, the NSA’s documents state. This allows the agency to identify security vulnerabilities in the latest communication systems that can be exploited, and helps efforts to introduce new vulnerabilities “where they do not yet exist.” The IR.21s also contain details about the encryption used by cellphone companies to protect the privacy of their customers’ communications as they are transmitted across networks. These details are highly sought after by the NSA, as they can aid its efforts to crack the encryption and eavesdrop on conversations.
  • One of the prime targets monitored under the AURORAGOLD program is the London-headquartered trade group, the GSM Association, or the GSMA, which represents the interests of more than 800 major cellphone, software, and internet companies from 220 countries. The GSMA’s members include U.S.-based companies such as Verizon, AT&T, Sprint, Microsoft, Facebook, Intel, Cisco, and Oracle, as well as large international firms including Sony, Nokia, Samsung, Ericsson, and Vodafone. The trade organization brings together its members for regular meetings at which new technologies and policies are discussed among various “working groups.” The Snowden files reveal that the NSA specifically targeted the GSMA’s working groups for surveillance.
  • Last year, the Washington Post reported that the NSA had already managed to break the most commonly used cellphone encryption algorithm in the world, known as A5/1. But the information collected under AURORAGOLD allows the agency to focus on circumventing newer and stronger versions of A5 cellphone encryption, such as A5/3. The documents note that the agency intercepts information from cellphone operators about “the type of A5 cipher algorithm version” they use, and monitors the development of new algorithms in order to find ways to bypass the encryption. In 2009, the British surveillance agency Government Communications Headquarters conducted a similar effort to subvert phone encryption under a project called OPULENT PUP, using powerful computers to perform a “crypt attack” to penetrate the A5/3 algorithm, secret memos reveal. By 2011, GCHQ was collaborating with the NSA on another operation, called WOLFRAMITE, to attack A5/3 encryption. (GCHQ declined to comment for this story, other than to say that it operates within legal parameters.)
  • The extensive attempts to attack cellphone encryption have been replicated across the Five Eyes surveillance alliance. Australia’s top spy agency, for instance, infiltrated an Indonesian cellphone company and stole nearly 1.8 million encryption keys used to protect communications, the New York Times reported in February.
  • The NSA’s documents show that it focuses on collecting details about virtually all technical standards used by cellphone operators, and the agency’s efforts to stay ahead of the technology curve occasionally yield significant results. In early 2010, for instance, its operatives had already found ways to penetrate a variant of the newest “fourth generation” smartphone-era technology for surveillance, years before it became widely adopted by millions of people in dozens of countries. The NSA says that its efforts are targeted at terrorists, weapons proliferators, and other foreign targets, not “ordinary people.” But the methods used by the agency and its partners to gain access to cellphone communications risk significant blowback. According to Mikko Hypponen, a security expert at Finland-based F-Secure, criminal hackers and foreign government adversaries could be among the inadvertent beneficiaries of any security vulnerabilities or encryption weaknesses inserted by the NSA into communication systems using data collected by the AURORAGOLD project.
  • Vines, the NSA spokeswoman, told The Intercept that the agency was committed to ensuring an “open, interoperable, and secure global internet.” “NSA deeply values these principles and takes great care to honor them in the performance of its lawful foreign-intelligence mission,” Vines said.
  • Documents published with this article: AURORAGOLD – Project Overview AURORAGOLD Working Group IR.21 – A Technology Warning Mechanism AURORAGOLD – Target Technology Trends Center support to WPMO NSA First-Ever Collect of High-Interest 4G Cellular Signal AURORAGOLD Working Aid WOLFRAMITE Encryption Attack OPULENT PUP Encryption Attack NSA/GCHQ/CSEC Network Tradecraft Advancement Team
  •  
    Notice that they've cracked even 4G.
4More

And the Winner of the 'War On Terror' Financed Dream Home 2014 Giveaway Is… -... - 0 views

  • Oceanfront views, 24-hour doorman, heated pool, and perhaps best of all, a “private tunnel to the beach.” This $3 million Palm Beach, Florida penthouse could be yours, but unfortunately it isn’t because this prize has already been claimed by a former high-level U.S. official who helped pave the way for the over decade-long “war on terror,” which has been a near complete catastrophe. Iraq is aflame, the Islamic State is on the rampage, the situation in Afghanistan worsens by the day, and thousands of Americans—and many more Iraqis and Afghans—have died during the post-9/11 conflicts. Meanwhile, the combined cost of the “war on terror” comes to an estimated $1.6 trillion. But if the American people got screwed on the deal, a lot of former senior government officials who played important roles in this debacle have done quite well for themselves. It’s New Year’s Eve and I need to write a final sendoff to 2014, so I thought I’d take a look at the fortunes (literally) of some of these figures: Former CIA director George Tenet and former FBI director Louis Freeh (I’ll cover former Department of Homeland Security chief Tom Ridge in a New Year’s post).
  • Freeh resigned from the FBI two months before 9/11. When he worked there he was making an annual salary of $145,000 and lived “in a heavily mortgaged house in Great Falls, a Virginia suburb,” according to an old and admiring New Yorker profile. He and his wife now own at least four lavish estates worth many millions of dollars, including a residence in Wilmington, Delaware, a six-bedroom summerhouse worth more than $3 million in Vermont, and a beachfront penthouse at 100 Worth Avenue in Palm Beach, Florida, which was bought for $1.4 million and now has an estimated value of $3 million. How’d that happen? Well, Freeh is one of many former U.S. officials who got paid big speaking fees (reportedly up to $50,000 a pop) by a creepy Iranian group called the People’s Mujahedin, also known as Mojahedin-e-Khalq, or MEK, to successfully advocate for its removal from the State Department’s list of Foreign Terrorist Organizations. He also opened up a consulting firm whose clients have included Saudi Arabia’s Prince Bandar, who the U.S. Department of Justice accused of taking massive bribes from a British defense contractor. That’s right, Freeh represented a prince from America’s old pal Saudi Arabia, home to fifteen of the nineteen 9/11 hijackers, and whose export of Wahhabism is credited with giving rising to the Islamic State.
  • Freeh is also hired to conduct investigations, like the controversial report he produced about Penn State’s football program. Nasser Kazeminy, a Minnesota businessman who in 2008 was accused of bribing former Senator Norm Coleman, also hired Freeh to conduct a “thorough investigation” of the allegations against him in the hopes of clearing his name.
  • ...1 more annotation...
  • In 2011, Freeh issued a public statement saying that his investigation had “completely vindicated” both Kazeminy and Coleman. Sure, Kazeminy had bought Coleman $100,000 worth of presents, but, Freeh said at a press conference, “There was no quid pro quo in the gifts. There was no wrongdoing.” Freeh also met with the Justice Department – which was investigating the bribery charges but declined to bring a case—on Kazeminy’s behalf. Oh yeah, about Freeh’s Palm Beach penthouse. As I discovered through Florida property records, Freeh’s wife co-owns it with Kazeminy, which kind of makes you wonder about just how thorough and impartial his investigation was. The quit claim deed giving Freeh’s wife one-half ownership of the penthouse was signed nine days after Freeh’s vindication of Kazeminy.
6More

The new European 'arc of instability' - RT Op-Edge - 0 views

  • The European Council on Foreign Relations and Berlin think-tank Friedrich Ebert Stiftung have just reached more or less the same conclusion. If the dangerous stand-off between the EU and Russia over Ukraine is not solved, the EU could face, up to 2030, a military build-up in eastern Europe; a new arms race with NATO as a protagonist; and a semi-permanent “zone of instability” from the Baltic to the Balkans and the Black Sea. What these two think-tanks don’t – and won’t – ever acknowledge is that a new European “arc of instability” – from the Baltic to the Black Sea, as myself and other independent analysts have stressed – is exactly what the Empire of Chaos and its weaponized arm – NATO – are working on to prevent closer Eurasia integration. By the way, the Pentagon excels in fabricating “arcs of instability.” The previous one was – and remains – massive, stretching from the Maghreb to Xinjiang in western China across the Middle East and Central Asia.
  • Moscow has totally identified the plot; Foreign Minister Sergey Lavrov, once again, has made it crystal clear, in detail. And crucially, some influential sectors in Germany also did, as in members of the cultural elite destroying the notion of a new war in Europe: “Not in our name.” The same applies to those that always preach more transatlantic cooperation, extol the US’s “defining” role in Germany, and effusively praise Germany as the most American country in Europe; that’s the case of the Frankfurter Allgemeine newspaper – which stands for the core of the political and economic establishment in Germany. It’s still in an embryonic stage, and has not yet made Chancellor Angela Merkel see the light; but a reverse reengineering of Atlanticist relations is already in progress in Germany.
  • Meanwhile, the proverbial group of extremist US senators, plus the notorious poodles/vassals of Britain and Poland, haven’t stopped lobbying to shut Russia off from SWIFT – just as they did with Iran. This would be nothing but yet another declaration of (economic) war – or the economic counterpoint to NATO hysteria. In fairness, a great deal of the EU – especially Germany – knows this is madness. Germany’s top financial paper Handelsblatt recently published a key interview with head of VTB-Bank Andrei Kostin, which has still not been translated into any major English-language paper.
  • ...3 more annotations...
  • Kostin went straight to the point: “Of course, there is a plan B [in the case of Russia being shut off from the SWIFT bank system], but in my personal opinion it would mean war – if this type of sanction will be introduced. America and Europe did that against Iran but with Iran at that time there were no diplomatic relations, only military containment...if Russian banks’ access to SWIFT will be prohibited, the US ambassador to Moscow should leave the same day. Diplomatic relations must be finished. Banking is the most vulnerable part of the Russian economy because the system is based so strongly on the dollar and the euro.” Next May, Russia’s Central Bank is planning to introduce an analogue to SWIFT – after key consultations with China. It’s always important to keep in mind that China set up a parallel SWIFT to do business with Iran under sanctions. But still there will be a window of four months for a lot of nasty things to happen after a Republican-controlled US Senate is empowered in January.
  • And then there’s the golden rule. Why is Russia buying so much gold? With the US dollar forced upward and gold downward, it makes total business sense to sell gas for inflated dollars and then buy cheap depressed gold; that’s what the Chinese call a “win-win.” And of course on both counts, the West loses. The Washington/Wall Street elites are fully aware that both Moscow and Beijing won’t accumulate US dollars anymore. As for the Masters of the Universe plutocrats who manipulate/control the value of the US dollar, a case can be made that one of their purposes is wrecking the US’s industrial base and the nation’s middle classes. Moscow, meanwhile, has adjusted to the new “instability.” The weak ruble has a positive effect – already stressed by President Putin – by forcing Russia to diversify its manufacturing and become more self-sufficient.
  • Of course, the problem remains for Russia to pay the foreign interest on its debt in US dollars. Moscow could always declare a moratorium in debt repayments. The ruble might go down even more. But as everyone from Lukoil to Rosneft converts more US dollars into rubles, that will drive the ruble back up. Not to mention that the ruble is shorted as it stands. The bottom line is that Moscow has learned yet another lesson for the immediate future: never become indebted to the West. What’s certain is that the Empire of Chaos won’t relent in its strategy of heating up the new arc of instability – inside Europe, across the economic/financial spectrum – and instrumentalizing its pre-fabricated New Iron Curtain from the Baltic to the Black Sea. The Kremlin seems to know exactly how high the stakes are. As The Saker told me in an email, “Putin is telling both the West and the Russian people that there is a long war in progress and that the Russian people have to morally be prepared to accept sacrifices for the survival of Russia. This is one more step in the 'coming-out' of what I call the ‘Eurasian Sovereignists’ in which the US [has] now openly declared as a Russophobic (Russia-hating and Russia-fearing) enemy, and the Europeans as a powerless colony. Military power is not directly a factor in this, the internal power balance between the pro-Western ‘Atlantic Integrationists’ and the ‘Eurasian Sovereignists’ is.” It’s all here – from the debacle of a regime (Bretton Woods) to the current, provoked crisis, all brilliantly explained by Mikhail Khazin. Russia is getting ready to rock. Is the West?
5More

Bail-In and the Financial Stability Board: The Global Bankers' Coup | nsnbc international - 0 views

  • Ellen H. Brown (WoD) : On December 11, 2014, the US House passed a bill repealing the Dodd-Frank requirement that risky derivatives be pushed into big-bank subsidiaries, leaving our deposits and pensions exposed to massive derivatives losses. The bill was vigorously challenged by Senator Elizabeth Warren; but the tide turned when Jamie Dimon, CEO of JPMorganChase, stepped into the ring. Perhaps what prompted his intervention was the unanticipated $40 drop in the price of oil. As financial blogger Michael Snyder points out, that drop could trigger a derivatives payout that could bankrupt the biggest banks. And if the G20’s new “bail-in” rules are formalized, depositors and pensioners could be on the hook. The new bail-in rules were discussed in my last last article entitled “New G20 Rules: Cyprus-style Bail-ins to Hit Depositors AND Pensioners.” They are edicts of the Financial Stability Board (FSB), an unelected body of central bankers and finance ministers headquartered in the Bank for International Settlements in Basel, Switzerland. Where did the FSB get these sweeping powers, and is its mandate legally enforceable?
  • Those questions were addressed in an article I wrote in June 2009, two months after the FSB was formed, titled “Big Brother in Basel: BIS Financial Stability Board Undermines National Sovereignty.” It linked the strange boot shape of the BIS to a line from Orwell’s 1984: “a boot stamping on a human face—forever.” The concerns raised there seem to be materializing, so I’m republishing the bulk of that article here. We need to be paying attention, lest the bail-in juggernaut steamroll over us unchallenged. The Shadowy Financial Stability Board Alarm bells went off in April 2009, when the Bank for International Settlements (BIS) was linked to the new Financial Stability Board (FSB) signed onto by the G20 leaders in London. The FSB was an expansion of the older Financial Stability Forum (FSF) set up in 1999 to serve in a merely advisory capacity by the G7 (a group of finance ministers formed from the seven major industrialized nations). The chair of the FSF was the General Manager of the BIS. The new FSB was expanded to include all G20 members (19 nations plus the EU).
  • Formally called the “Group of Twenty Finance Ministers and Central Bank Governors,” the G20 was, like the G7, originally set up as a forum merely for cooperation and consultation on matters pertaining to the international financial system. What set off alarms was that the new Financial Stability Board had real teeth, imposing “obligations” and “commitments” on its members; and this feat was pulled off without legislative formalities, skirting the usual exacting requirements for treaties. It was all done in hasty response to an “emergency.” Problem-reaction-solution was the slippery slope of coups. Buried on page 83 of an 89-page Report on Financial Regulatory Reform issued by the US Obama administration was a recommendation that the FSB strengthen and institutionalize its mandate to promote global financial stability. It sounded like a worthy goal, but there was a disturbing lack of detail. What was the FSB’s mandate, what were its expanded powers, and who was in charge? An article in The London Guardian addressed those issues in question and answer format:
  • ...2 more annotations...
  • For three centuries, private international banking interests have brought governments in line by blocking them from issuing their own currencies and requiring them to borrow banker-issued “banknotes” instead. Political colonialism is now a thing of the past, but under the new FSB guidelines, nations could still be held in feudalistic subservience to foreign masters. Consider this scenario: the new FSB rules precipitate a massive global depression due to contraction of the money supply. XYZ country wakes up to the fact that all of this is unnecessary – that it could be creating its own money, freeing itself from the debt trap, rather than borrowing from bankers who create money on computer screens and charge interest for the privilege of borrowing it. But this realization comes too late: the boot descends and XYZ is crushed into line. National sovereignty has been abdicated to a private committee, with no say by the voters. Marilyn Barnewall, dubbed by Forbes Magazine the “dean of American private banking,” wrote in an April 2009 article titled “What Happened to American Sovereignty at G-20?”: It seems the world’s bankers have executed a bloodless coup and now represent all of the people in the world. . . . President Obama agreed at the G20 meeting in London to create an international board with authority to intervene in U.S. corporations by dictating executive compensation and approving or disapproving business management decisions.  Under the new Financial Stability Board, the United States has only one vote. In other words, the group will be largely controlled by European central bankers. My guess is, they will represent themselves, not you and not me and certainly not America.
  • Are these commitments legally binding? Adoption of the FSB was never voted on by the public, either individually or through their legislators. The G20 Summit has been called “a New Bretton Woods,” referring to agreements entered into in 1944 establishing new rules for international trade. But Bretton Woods was put in place by Congressional Executive Agreement, requiring a majority vote of the legislature; and it more properly should have been done by treaty, requiring a two-thirds vote of the Senate, since it was an international agreement binding on the nation. “Bail-in” is not the law yet, but the G20 governments will be called upon to adopt the FSB’s resolution measures when the proposal is finalized after taking comments in 2015. The authority of the G20 has been challenged, but mainly over whether important countries were left out of the mix. The omitted countries may prove to be the lucky ones, having avoided the FSB’s net.
3More

China to 'Regulate' Foreign NGOs | The Diplomat - 0 views

  • On Monday, China announced that it would move to “regulate” foreign non-governmental organizations (NGOs) to keep political checks on these organizations and to prevent them from fomenting political unrest. NGO regulation is part of a new law being discussed this week, according to reports in Chinese state media. Reuters reports that the new law will primarily step up supervision of the “fast-growing” NGO sector in China. The law is under debate following a months-long investigation into foreign NGO operations in China as part of a national security initiative. Chinese President Xi Jinping himself headed the national panel under which the NGO investigation was conducted.
  • On the current debate over the national law, Xinhua, citing Deputy Public Security Minister Yang Huanning, notes that ”the bill aims to regulate the activities of overseas NGOs in China, protect their legal rights and interests, and promote exchanges and cooperation between Chinese and foreigners.” Additionally, under the law, all levels of government bureaucracy in China will be required to ”provide policy consultation, assistance and guidance for overseas NGOs so that they can effectively and legally operate in the mainland.” ”It is necessary to have a law to regulate, guide and supervise their activities,” Yang added. There is no confirmation of when this law might come into effect, but it could be as soon as early 2015. China’s anxiety over foreign NGOs multiplied following this year’s protests in Hong Kong, which Beijing attributed to hostile foreign forces. Recently, speaking to the Macau Special Administrative Region (SAR) on the occasion of the 15th anniversary of its transfer to Chinese control, Xi Jinping warned Macau residents to guard against interference by these same foreign forces. Xi’s anxieties echo concerns in other countries. Most notably, Vladimir Putin’s government in Russia has banned several prominent U.S.-affiliated NGOs under the pretext of national security concerns.
  •  
    No U.S.color revolutions will be permitted to get off the ground in China and Russia.
5More

Fighting Al Qaeda by Supporting Al Qaeda in Syria: The Obama Administration is a "State... - 0 views

  • First published by GR on June 19, 2013 A major transition in US counter-terrorism doctrine is unfolding. While Barack Obama, following in the footsteps of  George W. Bush, remains firmly committed to waging a “Global War on Terrorism” (GWOT), his administration is now openly supporting selected rebel units in Syria which are part of the Al Qaeda network. Known and documented, Al Qaeda is a creation of the CIA, which has covertly supported the “Islamic Terror Network” since the heyday of the Soviet Afghan war. While Al Qaeda is a US sponsored “intelligence asset”, a “New Normal” has been established. An Al Qaeda affiliated organization, namely Syria’s Al Nusrah, is being supported “overtly” by the US President, rather than “covertly” by the CIA.
  • The support of Al Nusrah, an affiliate of al Qaeda in Iraq (AQI), is no longer channeled in secrecy as part of a CIA-MI6 covert operation, it  is now being supported –in a semi-official fashion– as part of a US foreign policy agenda. The latter is also part of America’s diplomatic discourse, implemented in consultation with Britain, Canada, Germany and France. Although Al Nusrah was not mentioned explicitly, “support to the Syrian rebels” was the main topic of debate at the June 2013 G-8 meetings in Northern Ireland. While intelligence covert ops continue to perform an important role, Washington’s support to Al Qaeda in Syria is now “out in the open”, within the public domain. It is no longer part of a secret undertaking. It is part of the mainstay of US foreign policy, carried out under the helm of Secretary of State John Kerry.
  • “Support to the rebels” is also debated in the US Congress. It is the object of a bill which has already been adopted by the Senate Foreign Relations Committee.  Senator Corker who co-sponsored the bill stated that: “The future for Syria is uncertain, but the U.S. has a vested interest in trying to prevent an extremist takeover, which poses a very real risk for us and the region,” (emphasis added) In a twisted logic, the bill purports to prevent “an extremist takeover” by supporting an Al Qaeda terrorist formation.
  • ...1 more annotation...
  • According to the 2001 Patriot Act, those “who pay for the bomb“, namely those who fund affiliates of Al Qaeda, are terrorists. In the words of George W. Bush on September 11, 2001,   “We will make no distinction between the terrorists who committed these acts and those who harbor them.” The Act pertains to the harboring and financing of terrorist organizations. Al Qaeda and its affiliates are defined in the PATRIOT Act as a terror network. Persons and organizations which support or abet Al Qaeda are considered as terrorists. The forbidden question: Does the substance of Executive order 13224 and the PATRIOT  legislation quoted above apply to a US president, a Secretary of State, a Member of the US Congress?
  •  
    Well, here is an Obama "high crime and misdemeanor". Subverting the U.S. government to sponsor terrorism. 
« First ‹ Previous 101 - 120 of 167 Next › Last »
Showing 20 items per page