Skip to main content

Home/ Socialism and the End of the American Dream/ Group items matching "normalization" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
3More

The Dying Dollar -- Paul Craig Roberts - PaulCraigRoberts.org - 0 views

  • Since 2006, the US dollar has experienced a one-quarter to one-third drop in value to the Chinese yuan, depending on the choice of base.   Now China is going to let the dollar decline further in value.  China also says it is considering undermining the petrodollar by pricing oil futures on the Shanghai Futures Exchange in yuan. This on top of the growing avoidance of the dollar to settle trade imbalances means that the dollar’s role as reserve currency is coming to an end, which means the termination of the US as financial bully and financial imperialist.  This blow to the dollar in addition to the blows delivered by jobs offshoring and the uncovered bets in the gambling casino created by financial deregulation means that the US economy as we knew it is coming to an end. The US economy is already in shambles, with bond and stock markets propped up by massive and historically unprecedented Fed money printing pouring liquidity into financial asset prices.  This month at the IMF annual conference, former Treasury Secretary Larry Summers said that to achieve full employment in the US economy would require negative real interest rates.  Negative real interest rates could only be achieved by eliminating cash, moving to digital money that can only be kept in banks, and penalizing people for saving. The future is developing precisely as I have been predicting. As the dollar enters its death throes, the lawless Federal Reserve and the Wall Street criminals will increase their shorting of gold in the paper futures market, thereby driving the remnants of the West’s gold into Asian hands.
  • The People’s Bank of China said the country does not benefit any more from increases in its foreign-currency holdings, adding to signs policymakers will rein in dollar purchases that limit the yuan’s appreciation. “It’s no longer in China’s favor to accumulate foreign-exchange reserves,” Yi Gang, a deputy governor at the central bank, said in a speech organized by China Economists 50 Forum at Tsinghua University yesterday. The monetary authority will “basically” end normal intervention in the currency market and broaden the yuan’s daily trading range, Governor Zhou Xiaochuan wrote in an article in a guidebook explaining reforms outlined last week following a Communist Party meeting.
  •  
    By Paul Craig Roberts
5More

Greenwald's Twitter War Over PayPal-NSA Allegations | MyFDL - 0 views

  • In the interconnected, instantaneous and byte-sized world of internet journalism, both cyber-space and real-time often bend and warp into a self-referential wormhole.
  • And one of those fascinating wormholes just opened on Twitter as super neo-journalist Glenn Greenwald and 9/11 whistleblower Sibel Edmonds exchanged a series of increasingly vitriolic and accusatory tweets over Edmonds’ latest blog on Boiling Frogs Post:  BFP Breaking News–Omidyar’s PayPal Corporation Said To Be Implicated in Withheld NSA Document. In it, Edmonds claims that Greenwald’s soon-to-be financial partner and backer—PayPal billionaire Pierre Omidyar—was, in effect, a knowing partner with NSA spying and financial data-mining efforts: The 50,000-pages of documents obtained by NSA whistleblower Edward Snowden contain extensive documentation of PayPal Corporation’s partnership and cooperation with the National Security Agency (NSA), according to three NSA veterans.
  • Once again, Greenwald’s point is well taken. Neither Edmonds nor her interviewees can state as fact that there is anything in the Snowden docs that shows PayPal-NSA cooperation. However, their point is that—given the statement that only 1% of the documents have been released—the apparent trickle of the information from the trove highlights the need for transparency. Particularly if, in fact, there is anything in there that implicates PayPal. In fact, Greenwald doesn’t really challenge the claim of PayPal-NSA cooperation, just the claim that he is covering it up by withholding Snowden docs that implicate PayPal
  • ...2 more annotations...
  • This is a tricky situation. Unlike Wikileaks and their bulk data-dumps, Greenwald and Co. have released classified information in a more traditional, “sound practices of journalism” sorta way. Government officials get the opportunity to respond. Each story is hashed out and vetted in a normalized editorial process. Then the story is run. But daily revelations about the NSA using every imaginable electronic device to collect data are breeding suspicion and a growing sense that nothing is sacred (although dildos, electric razors and Magic Bullet food processors still seem safely anonymous). It seems that everything is in question, particularly in that redacted zone between the public and its national security minders at the helm of the United States of Surveillance. Thus, withholding information is an increasingly hard thing to defend. This creates a bit of a problem for Greenwald and his association with Omyidar which, it seems, is fair to question given what we know about the NSA’s penchant for doing business with many different businesses. Full disclosure of the Snowden documents may be, in the final analysis, the only antiseptic that will calm suspicions amongst allies.
  • Greenwald has already mounted a strong defense against accusations that the slow, methodical release of Snowden’s treasure-trove is a self-serving, profit-making process that, unlike a massive and direct data-dump, only serves the interests of his newspaper and his career. But these claims are likely to dog him—both from those who simply seek to punish him through proxies and by those who earnestly criticize a traditional “sound practices of journalism” approach to information that relies on the role of gatekeepers to decide how and when information is released over the Wikileaks-style which emphasizes the public’s inherent right to see immediately what lies behind the veil of secrecy. In this age of Twitterati, instant attacks, rapid-fire counter-attacks and Matrix-like convolution regarding who is plugged into whom, transparency is the only way to short-circuit festering suspicion—not just for governments, but also for the journalists, whistleblowers and the public they try to serve. Now it seems it’s up to Greenwald to clarify his association with Omidyar and for Omidyar to shine a bright light on PayPal’s associations with NSA.
3More

Tikkun Daily Blog » Blog Archive » Obama Suppressing 6,000-Page Report on CIA... - 0 views

  • Over a year ago, the Senate Intelligence Committee voted to adopt a historic, 6,000-page report which contains “startling details” about CIA misdeeds related to its torture program. The report, which cost $40 million to produce and appears to pose no national security threats, has been set for release since December 13, 2012. However, it has yet to see the light of day. The reason: the Obama administration continues to suppress its release, apparently for no reason other than to protect the reputations of the guilty. Per The Atlantic‘s Conor Friedersdorf:
  • [Over a year ago], the Senate Intelligence Committee voted to adopt a 6,000-page report on the CIA rendition, detention, and interrogation program that led to torture. Its contents include details on each prisoner in CIA custody, the conditions of their confinement, whether they were tortured, the intelligence they provided, and the degree to which the CIA lied about its behavior to overseers. Senator Dianne Feinstein declared it one of the most significant oversight efforts in American history, noting that it contains “startling details” and raises “critical questions.” But all these months later, the report is still being suppressed. The Obama Administration has no valid reason to suppress the report. Its contents do not threaten national security, as evidenced by the fact that numerous figures who normally defer to the national-security state want it released with minor redactions. The most prominent of all is Vice President Joe Biden. The Center for Victims of Torture, in advocating for the public’s right to fully understand the CIA’s lawless torture program during the Bush administration, has procured the signatures of 58 national security experts and officials. These signatures include U.S. senators, former Obama administration officials and retired military leaders. President Obama once promised that his White House would be the most transparent in history, and went so far in February to claim that such is indeed the case. This most-transparent-ever administration is now
  • marking the CIA report as classified, determined “to keep secret the most thorough accounting we have of the agency’s lawless, immoral behavior.” Is President Obama bowing to factions within the CIA? Shielding the powerful from rebuke during his own illegal drone program? Protecting past criminals as a down payment on future investigations? To answer those questions would be to speculate. However, what is known is this: if we don’t fully understand those CIA abuses perpetrated in the name of the State and national security, we are more likely to allow those abuses to happen again.
2More

Extent of spy agencies' surveillance to be investigated by parliamentary body | UK news... - 0 views

  • The extent and scale of mass surveillance undertaken by Britain's spy agencies is to be scrutinised in a major inquiry to be formally launched on Thursday.Parliament's intelligence and security committee (ISC), the body tasked with overseeing the work of GCHQ, MI5 and MI6, will say the investigation is a response to concern raised by the leaks from the whistleblower Edward Snowden.Sir Malcolm Rifkind, the committee chair, said "an informed and proper debate was needed". One Whitehall source described the investigation as "a public inquiry in all but name".
  • In a change from its usual protocol, the normally secretive committee also announced that part of its inquiry would be held in public.It will also take written evidence from interested groups and the public, as well as assessing secret material supplied by the intelligence agencies. The Guardian will also consider submitting evidence.
5More

NSA chief Gen. Keith Alexander to retire in March, agency tells UPI - UPI.com - 0 views

  • (UPI) -- U.S. National Security Agency chief Gen. Keith Alexander, who has steadfastly defended NSA mass surveillance, plans to retire in five months, the agency said.Alexander, who will be 62 then, is expected to leave the main producer and manager of U.S. signals intelligence in March, NSA spokeswoman Vanee Vines said Wednesday in a statement to United Press International.Alexander, appointed to the NSA spot in 2005 by George W. Bush administration Defense Secretary Donald Rumsfeld, "served well beyond a normal rotation, having been 'extended' three times," Vines told UPI.
  • The four-star general is a career Army intelligence officer who is also chief of the Defense Department's Central Security Service and commander of the military's Cyber Command.After the disclosures by former NSA contractor Edward Snowden of mass NSA surveillance of U.S. citizens and foreign nationals, Alexander became the public face of Washington's secret collection of personal communications records in the name of national security.He has consistently defended the controversial practice, saying it has helped prevent dozens of "potential terrorist events" since the Sept. 11, 2001, attacks.Alexander's departure "has nothing to do with media leaks," Vines' statement to UPI said.
  • "The decision for his retirement was made prior" to the leaks, in an agreement made with Defense Secretary Chuck Hagel in March, she said.Snowden started leaking information to the press in May, with the first reports published in June."The process for selecting his successor is ongoing," Vines told UPI.
  • ...1 more annotation...
  • Alexander's departure and potential successor are widely expected to prompt congressional debate over whether the huge NSA infrastructure built during Alexander's tenure will remain or be restricted.Senate Judiciary Committee Chairman Patrick Leahy, D-Vt., has drafted legislation to eliminate the NSA's ability to systematically obtain Americans' calling records.Rep. Jim Sensenbrenner, R-Wis., co-author of the Patriot Act, whose secret interpretation is used to justify the mass metadata collection, is drafting a bill to cut back on domestic surveillance programs.
  •  
    So the Obama Administration is looking for a new professional liar to head the NSA. 
9More

If GCHQ wants to improve national security it must fix our technology | Technology | th... - 0 views

  • In a recent column, security expert Bruce Schneier proposed breaking up the NSA – handing its offensive capabilities work to US Cyber Command and its law enforcement work to the FBI, and terminating its programme of attacking internet security. In place of this, Schneier proposed that “instead of working to deliberately weaken security for everyone, the NSA should work to improve security for everyone.” This is a profoundly good idea for reasons that may not be obvious at first blush.People who worry about security and freedom on the internet have long struggled with the problem of communicating the urgent stakes to the wider public. We speak in jargon that’s a jumble of mixed metaphors – viruses, malware, trojans, zero days, exploits, vulnerabilities, RATs – that are the striated fossil remains of successive efforts to come to grips with the issue. When we do manage to make people alarmed about the stakes, we have very little comfort to offer them, because Internet security isn’t something individuals can solve.
  • I remember well the day this all hit home for me. It was nearly exactly a year ago, and I was out on tour with my novel Homeland, which tells the story of a group of young people who come into possession of a large trove of government leaks that detail a series of illegal programmes through which supposedly democratic governments spy on people by compromising their computers.
  • I explained the book’s premise, and then talked about how this stuff works in the real world. I laid out a parade of awfuls, including a demonstrated attack that hijacked implanted defibrillators from 10 metres’ distance and caused them to compromise other defibrillators that came into range, implanting an instruction to deliver lethal shocks at a certain time in the future. I talked about Cassidy Wolf, the reigning Miss Teen USA, whose computer had been taken over by a “sextortionist” who captured nude photos of her and then threatened to release them if she didn’t perform live sex shows for him. I talked about the future of self-driving cars, smart buildings, implanted hearing aids and robotic limbs, and explained that the world is made out of computers that we put our bodies into, and that we put inside our bodies.These computers are badly secured. What’s more, governments and their intelligence agencies are actively working to undermine the security of our computers and networks. This was before the Snowden revelations, but we already knew that governments were buying “zero-day vulnerabilities” from security researchers. These are critical bugs that can be leveraged to compromise entire systems. Until recently, the normal response to the discovery of one of these “vulns” was to report them to the vendor so they could be repaired.
  • ...6 more annotations...
  • But spy-agencies and law-enforcement have created a bustling marketplace for “zero-days,” which are weaponised for the purpose of attacking the computers and networks of “bad guys”. The incentives have shifted, and now a newly discovered bug had a good chance of remaining unpatched and live in the field because governments wanted to be able to use it to hack their enemies.
  • Last year, when I finished that talk in Seattle, a talk about all the ways that insecure computers put us all at risk, a woman in the audience put up her hand and said, “Well, you’ve scared the hell out of me. Now what do I do? How do I make my computers secure?”And I had to answer: “You can’t. No one of us can. I was a systems administrator 15 years ago. That means that I’m barely qualified to plug in a WiFi router today. I can’t make my devices secure and neither can you. Not when our governments are buying up information about flaws in our computers and weaponising them as part of their crime-fighting and anti-terrorism strategies. Not when it is illegal to tell people if there are flaws in their computers, where such a disclosure might compromise someone’s anti-copying strategy.But: If I had just stood here and spent an hour telling you about water-borne parasites; if I had told you about how inadequate water-treatment would put you and everyone you love at risk of horrifying illness and terrible, painful death; if I had explained that our very civilisation was at risk because the intelligence services were pursuing a strategy of keeping information about pathogens secret so they can weaponise them, knowing that no one is working on a cure; you would not ask me ‘How can I purify the water coming out of my tap?’”
  • Because when it comes to public health, individual action only gets you so far. It doesn’t matter how good your water is, if your neighbour’s water gives him cholera, there’s a good chance you’ll get cholera, too. And even if you stay healthy, you’re not going to have a very good time of it when everyone else in your country is striken and has taken to their beds.If you discovered that your government was hoarding information about water-borne parasites instead of trying to eradicate them; if you discovered that they were more interested in weaponising typhus than they were in curing it, you would demand that your government treat your water-supply with the gravitas and seriousness that it is due.The public health analogy is suprisingly apt here. The public health threat-model is in a state of continuous flux, because our well-being is under continuous, deliberate attack from pathogens for whom we are, at best, host organisms, and at worst, dinner. Evolution drives these organisms to a continuously shifting array of tactics to slide past our defenses.Public health isn’t just about pathogens, either – its thorniest problems are about human behaviour and social policy. HIV is a blood-borne disease, but disrupting its spread requires changes to our attitudes about sex, pharmaceutical patents, drugs policy and harm minimisation. Almost everything interesting about HIV is too big to fit on a microscope slide.
  • And so it is for security: crypto is awesome maths, but it’s just maths. Security requires good password choice, good password management, good laws about compelled crypto disclosure, transparency into corporate security practices, and, of course, an end to the governmental practice of spending $250M/year on anti-security sabotage through the NSA/GCHQ programmes Bullrun and Edgehill.
  • But for me, the most important parallel between public health and internet security is their significance to our societal wellbeing. Everything we do today involves the internet. Everything we do tomorrow will require the internet. If you live near a nuclear power plant, fly in airplanes, ride in cars or trains, have an implanted pacemaker, keep money in the bank, or carry a phone, your safety and well-being depend on a robust, evolving, practice of network security.This is the most alarming part of the Snowden revelations: not just that spies are spying on all of us – that they are actively sabotaging all of our technical infrastructure to ensure that they can continue to spy on us.There is no way to weaken security in a way that makes it possible to spy on “bad guys” without making all of us vulnerable to bad guys, too. The goal of national security is totally incompatible with the tactic of weakening the nation’s information security.
  • “Virus” has been a term of art in the security world for decades, and with good reason. It’s a term that resonates with people, even people with only a cursory grasp of technology. As we strive to make the public and our elected representatives understand what’s at stake, let’s expand that pathogen/epidemiology metaphor. We’d never allow MI5 to suppress information on curing typhus so they could attack terrorists by infecting them with it. We need to stop allowing the NSA and GCHQ to suppress information on fixing bugs in our computers, phones, cars, houses, planes, and bodies.If GCHQ wants to improve the national security of the United Kingdom – if the NSA want to impove the American national security – they should be fixing our technology, not breaking it. The technology of Britons and Americans is under continuous, deadly attack from criminals, from foreign spies, and from creeps. Our security is better served by armouring us against these threats than it is by undermining security so that cops and spies have an easier time attacking “bad guys.”
10More

Tomgram: Engelhardt, Knowledge Is Crime | TomDispatch - 0 views

  • Seven Free Passes for the National Security State With Cartwright as a possible exception, the members of the national security state, unlike the rest of us, exist in what might be called “post-legal” America.  They know that, no matter how heinous the crime, they will not be brought to justice for it.  The list of potentially serious criminal acts for which no one has had to take responsibility in a court of law is long, and never tabulated in one place.  Consider this, then, an initial run-down on seven of the most obvious crimes and misdemeanors of this era for which no one has been held accountable.
  • *Kidnapping:
  • *The destruction of evidence of a crime:
  • ...7 more annotations...
  • *Torture (and other abuses):
  • *Perjury before Congress:
  • *The killing of detainees in that extralegal system:
  • *Assassination:
  • *The planning of an extralegal prison system:
  • Mind you, the above seven categories don’t even take into account the sort of warrantless surveillance of Americans that should have put someone in a court of law, or the ways in which various warrior corporations overbilled or cheated the government in its war zones, or the ways private contractors “ran wild” in those same zones.  Even relatively low-level crimes by minor figures in the national security state have normally not been criminalized.  Take, for example, the private surveillance of and cyberstalking of “love interests,” or “LOVEINT,” by NSA employees using government surveillance systems.  The NSA claims that at least one employee was “disciplined” for this, but no one was taken to court.  A rare exception: a number of low level military figures in the Abu Ghraib scandal were tried for their abusive actions, convicted, and sent to jail, though no one higher than a colonel was held accountable in court for those infamously systematic and organized acts of torture and abuse. Too Big to Fail, National Security-Style
  • In Washington today, knowledge is the only crime.  That’s a political reality of the twenty-first century.  Get used to it.
6More

Pentagon preparing for mass civil breakdown | Nafeez Ahmed | Environment | theguardian.com - 0 views

  • A US Department of Defense (DoD) research programme is funding universities to model the dynamics, risks and tipping points for large-scale civil unrest across the world, under the supervision of various US military agencies. The multi-million dollar programme is designed to develop immediate and long-term "warfighter-relevant insights" for senior officials and decision makers in "the defense policy community," and to inform policy implemented by "combatant commands." Launched in 2008 – the year of the global banking crisis – the DoD 'Minerva Research Initiative' partners with universities "to improve DoD's basic understanding of the social, cultural, behavioral, and political forces that shape regions of the world of strategic importance to the US."
  • According to Prof David Price, a cultural anthropologist at St Martin's University in Washington DC and author of Weaponizing Anthropology: Social Science in Service of the Militarized State, "when you looked at the individual bits of many of these projects they sort of looked like normal social science, textual analysis, historical research, and so on, but when you added these bits up they all shared themes of legibility with all the distortions of over-simplification. Minerva is farming out the piece-work of empire in ways that can allow individuals to disassociate their individual contributions from the larger project."Prof Price has previously exposed how the Pentagon's Human Terrain Systems (HTS) programme - designed to embed social scientists in military field operations - routinely conducted training scenarios set in regions "within the United States." Citing a summary critique of the programme sent to HTS directors by a former employee, Price reported that the HTS training scenarios "adapted COIN [counterinsurgency] for Afghanistan/Iraq" to domestic situations "in the USA where the local population was seen from the military perspective as threatening the established balance of power and influence, and challenging law and order."
  • Last year, the DoD's Minerva Initiative funded a project to determine 'Who Does Not Become a Terrorist, and Why?' which, however, conflates peaceful activists with "supporters of political violence" who are different from terrorists only in that they do not embark on "armed militancy" themselves. The project explicitly sets out to study non-violent activists
  • ...3 more annotations...
  • Twitter posts and conversations will be examined "to identify individuals mobilised in a social contagion and when they become mobilised."
  • One war-game, said Price, involved environmental activists protesting pollution from a coal-fired plant near Missouri, some of whom were members of the well-known environmental NGO Sierra Club. Participants were tasked to "identify those who were 'problem-solvers' and those who were 'problem-causers,' and the rest of the population whom would be the target of the information operations to move their Center of Gravity toward that set of viewpoints and values which was the 'desired end-state' of the military's strategy."Such war-games are consistent with a raft of Pentagon planning documents which suggest that National Security Agency (NSA) mass surveillance is partially motivated to prepare for the destabilising impact of coming environmental, energy and economic shocks.
  • Minerva is a prime example of the deeply narrow-minded and self-defeating nature of military ideology. Worse still, the unwillingness of DoD officials to answer the most basic questions is symptomatic of a simple fact – in their unswerving mission to defend an increasingly unpopular global system serving the interests of a tiny minority, security agencies have no qualms about painting the rest of us as potential terrorists.
7More

War Gear Flows to Police Departments - NYTimes.com - 0 views

  • During the Obama administration, according to Pentagon data, police departments have received tens of thousands of machine guns; nearly 200,000 ammunition magazines; thousands of pieces of camouflage and night-vision equipment; and hundreds of silencers, armored cars and aircraft. The equipment has been added to the armories of police departments that already look and act like military units. Police SWAT teams are now deployed tens of thousands of times each year, increasingly for routine jobs.
  • As the nation’s wars abroad wind down, many of the military’s surplus tools of combat have ended up in the hands of state and local law enforcement. Totals below are the minimum number of pieces acquired since 2006 in a selection of categories.
  • Congress created the military-transfer program in the early 1990s, when violent crime plagued America’s cities and the police felt outgunned by drug gangs. Today, crime has fallen to its lowest levels in a generation, the wars have wound down, and despite current fears, the number of domestic terrorist attacks has declined sharply from the 1960s and 1970s.Continue reading the main story Police departments, though, are adding more firepower and military gear than ever. Some, especially in larger cities, have used federal grant money to buy armored cars and other tactical gear. And the free surplus program remains a favorite of many police chiefs who say they could otherwise not afford such equipment.
  • ...4 more annotations...
  • The number of SWAT teams has skyrocketed since the 1980s, according to studies by Peter B. Kraska, an Eastern Kentucky University professor who has been researching the issue for decades.The ubiquity of SWAT teams has changed not only the way officers look, but also the way departments view themselves. Recruiting videos feature clips of officers storming into homes with smoke grenades and firing automatic weapons.
  • The Pentagon program does not push equipment onto local departments. The pace of transfers depends on how much unneeded equipment the military has, and how much the police request. Equipment that goes unclaimed typically is destroyed. So police chiefs say their choice is often easy: Ask for free equipment that would otherwise be scrapped, or look for money in their budgets to prepare for an unlikely scenario.
  • Pentagon data suggest how the police are arming themselves for such worst-case scenarios. Since 2006, the police in six states have received magazines that carry 100 rounds of M-16 ammunition, allowing officers to fire continuously for three times longer than normal. Twenty-two states obtained equipment to detect buried land mines.Continue reading the main story Continue reading the main story AdvertisementIn the Indianapolis suburbs, officers said they needed a mine-resistant vehicle to protect against a possible attack by veterans returning from war.
  • The police in 38 states have received silencers, which soldiers use to muffle gunfire during raids and sniper attacks.
7More

The Agency That Could Be Big Brother - New York Times - 0 views

  • December 25, 2005
  • DEEP in a remote, fog-layered hollow near Sugar Grove, W.Va., hidden by fortress-like mountains, sits the country's largest eavesdropping bug. Located in a "radio quiet" zone, the station's large parabolic dishes secretly and silently sweep in millions of private telephone calls and e-mail messages an hour. Run by the ultrasecret National Security Agency, the listening post intercepts all international communications entering the eastern United States. Another N.S.A. listening post, in Yakima,Wash., eavesdrops on the western half of the country. A hundred miles or so north of Sugar Grove, in Washington, the N.S.A. has suddenly taken center stage in a political firestorm. The controversy over whether the president broke the law when he secretly ordered the N.S.A. to bypass a special court and conduct warrantless eavesdropping on American citizens has even provoked some Democrats to call for his impeachment. According to John E. McLaughlin, who as the deputy director of the Central Intelligence Agency in the fall of 2001 was among the first briefed on the program, this eavesdropping was the most secret operation in the entire intelligence network, complete with its own code word - which itself is secret.
  • But the agency is still struggling to adjust to the war on terror, in which its job is not to monitor states, but individuals or small cells hidden all over the world. To accomplish this, the N.S.A. has developed ever more sophisticated technology that mines vast amounts of data. But this technology may be of limited use abroad. And at home, it increases pressure on the agency to bypass civil liberties and skirt formal legal channels of criminal investigation. Originally created to spy on foreign adversaries, the N.S.A. was never supposed to be turned inward. Thirty years ago, Senator Frank Church, the Idaho Democrat who was then chairman of the select committee on intelligence, investigated the agency and came away stunned. "That capability at any time could be turned around on the American people," he said in 1975, "and no American would have any privacy left, such is the capability to monitor everything: telephone conversations, telegrams, it doesn't matter. There would be no place to hide." He added that if a dictator ever took over, the N.S.A. "could enable it to impose total tyranny, and there would be no way to fight back."
  • ...3 more annotations...
  • Before the Sept. 11 attacks, the N.S.A. normally eavesdropped on a small number of American citizens or resident aliens, often a dozen or less, while the F.B.I., whose low-tech wiretapping was far less intrusive, requested most of the warrants from FISA. Despite the low odds of having a request turned down, President Bush established a secret program in which the N.S.A. would bypass the FISA court and begin eavesdropping without warrant on Americans. This decision seems to have been based on a new concept of monitoring by the agency, a way, according to the administration, to effectively handle all the data and new information. At the time, the buzzword in national security circles was data mining: digging deep into piles of information to come up with some pattern or clue to what might happen next. Rather than monitoring a dozen or so people for months at a time, as had been the practice, the decision was made to begin secretly eavesdropping on hundreds, perhaps thousands, of people for just a few days or a week at a time in order to determine who posed potential threats. Those deemed innocent would quickly be eliminated from the watch list, while those thought suspicious would be submitted to the FISA court for a warrant. In essence, N.S.A. seemed to be on a classic fishing expedition, precisely the type of abuse the FISA court was put in place to stop.At a news conference, President Bush himself seemed to acknowledge this new tactic. "FISA is for long-term monitoring," he said. "There's a difference between detecting so we can prevent, and monitoring.
  • In 2002, it was revealed that the Pentagon had launched Total Information Awareness, a data mining program led by John Poindexter, a retired rear admiral who had served as national security adviser under Ronald Reagan and helped devise the plan to sell arms to Iran and illegally divert the proceeds to rebels in Nicaragua. Total Information Awareness, known as T.I.A., was intended to search through vast data bases, promising to "increase the information coverage by an order-of-magnitude." According to a 2002 article in The New York Times, the program "would permit intelligence analysts and law enforcement officials to mount a vast dragnet through electronic transaction data ranging from credit card information to veterinary records, in the United States and internationally, to hunt for terrorists." After press reports, the Pentagon shut it down, and Mr. Poindexter eventually left the government. But according to a 2004 General Accounting Office report, the Bush administration and the Pentagon continued to rely heavily on data-mining techniques. "Our survey of 128 federal departments and agencies on their use of data mining," the report said, "shows that 52 agencies are using or are planning to use data mining. These departments and agencies reported 199 data-mining efforts, of which 68 are planned and 131 are operational." Of these uses, the report continued, "the Department of Defense reported the largest number of efforts."
  • "I don't want to see this country ever go across the bridge," Senator Church said. "I know the capacity that is there to make tyranny total in America, and we must see to it that this agency and all agencies that possess this technology operate within the law and under proper supervision, so that we never cross over that abyss. That is the abyss from which there is no return." James Bamford is the author of "Puzzle Palace" and"Body of Secrets: Anatomy of the Ultra-Secret National Security Agency."
  •  
    James Bamford's 2005 article in The New York Times that raised public awareness of what the Bush-II administration had done by bypass the FISA Court. 
4More

ExposeFacts - For Whistleblowers, Journalism and Democracy - 0 views

  • Launched by the Institute for Public Accuracy in June 2014, ExposeFacts.org represents a new approach for encouraging whistleblowers to disclose information that citizens need to make truly informed decisions in a democracy. From the outset, our message is clear: “Whistleblowers Welcome at ExposeFacts.org.” ExposeFacts aims to shed light on concealed activities that are relevant to human rights, corporate malfeasance, the environment, civil liberties and war. At a time when key provisions of the First, Fourth and Fifth Amendments are under assault, we are standing up for a free press, privacy, transparency and due process as we seek to reveal official information—whether governmental or corporate—that the public has a right to know. While no software can provide an ironclad guarantee of confidentiality, ExposeFacts—assisted by the Freedom of the Press Foundation and its “SecureDrop” whistleblower submission system—is utilizing the latest technology on behalf of anonymity for anyone submitting materials via the ExposeFacts.org website. As journalists we are committed to the goal of protecting the identity of every source who wishes to remain anonymous.
  • The seasoned editorial board of ExposeFacts will be assessing all the submitted material and, when deemed appropriate, will arrange for journalistic release of information. In exercising its judgment, the editorial board is able to call on the expertise of the ExposeFacts advisory board, which includes more than 40 journalists, whistleblowers, former U.S. government officials and others with wide-ranging expertise. We are proud that Pentagon Papers whistleblower Daniel Ellsberg was the first person to become a member of the ExposeFacts advisory board. The icon below links to a SecureDrop implementation for ExposeFacts overseen by the Freedom of the Press Foundation and is only accessible using the Tor browser. As the Freedom of the Press Foundation notes, no one can guarantee 100 percent security, but this provides a “significantly more secure environment for sources to get information than exists through normal digital channels, but there are always risks.” ExposeFacts follows all guidelines as recommended by Freedom of the Press Foundation, and whistleblowers should too; the SecureDrop onion URL should only be accessed with the Tor browser — and, for added security, be running the Tails operating system. Whistleblowers should not log-in to SecureDrop from a home or office Internet connection, but rather from public wifi, preferably one you do not frequent. Whistleblowers should keep to a minimum interacting with whistleblowing-related websites unless they are using such secure software.
    • Gary Edwards
       
      Thanks Paul! Great article and I agree with you about switching. Rather than a USB, I would rather look into a SSD and try to isolate performance to an ISP bandwidth issue. FYI, I read your Diigo posts daily at this Web site: https://groups.diigo.com/group/socialism-and-the-end-of-the-american-dream/content/user/marbux Seems to be the best visual presentation of your research. I do however think Diigo could improve their hosting of this research by enabling more extensive comments. Notice that your comments are often clipped :( Still, I really do appreciate your sharing both your research and your commentary. Priceless stuff! Many thanks! ~ge~
  •  
    A new resource site for whistle-blowers. somewhat in the tradition of Wikileaks, but designed for encrypted communications between whistleblowers and journalists.  This one has an impressive board of advisors that includes several names I know and tend to trust, among them former whistle-blowers Daniel Ellsberg, Ray McGovern, Thomas Drake, William Binney, and Ann Wright. Leaked records can only be dropped from a web browser running the Tor anonymizer software and uses the SecureDrop system originally developed by Aaron Schwartz. They strongly recommend using the Tails secure operating system that can be installed to a thumb drive and leaves no tracks on the host machine. https://tails.boum.org/index.en.html Curious, I downloaded Tails and installed it to a virtual machine. It's a heavily customized version of Debian. It has a very nice Gnome desktop and blocks any attempt to connect to an external network by means other than installed software that demands encrypted communications. For example, web sites can only be viewed via the Tor anonymizing proxy network. It does take longer for web pages to load because they are moving over a chain of proxies, but even so it's faster than pages loaded in the dial-up modem days, even for web pages that are loaded with graphics, javascript, and other cruft. E.g., about 2 seconds for New York Times pages. All cookies are treated by default as session cookies so disappear when you close the page or the browser. I love my Linux Mint desktop, but I am thinking hard about switching that box to Tails. I've been looking for methods to send a lot more encrypted stuff down the pipe for NSA to store. Tails looks to make that not only easy, but unavoidable. From what I've gathered so far, if you want to install more software on Tails, it takes about an hour to create a customized version and then update your Tails installation from a new ISO file. Tails has a wonderful odor of having been designed for secure computing. Current
5More

The Qatari Deal To Hold The Taliban - The Qataris Have Been Used Before By President Ob... - 1 views

  • Three months, a naval fleet, 3,000 marines, one Billion dollars, and 450 cruise missiles later, it’s May 2011 and Obama had yet to ask for permission to engage in his offensive war from anyone but himself and the previously noted ‘club of the traveling pantsuits’. Despite the Office of Legal Council (the golfers own legal team) telling him approval is needed, he chose to violate the War Powers Act and more importantly the Constitution. It is critical to remember the political battle being waged at the time over whether President Obama had the authority to take “offensive military action”, without congressional approval,  when the threat was not against the United States. It’s critical because from that initial impetus you find the reason why arming the Libyan rebels had to be done by another method – because President Obama never consulted congress, nor sought permission.
  • Normally, in order to send arms to the rebels lawfully, President Obama would have to request approval from Congress. He did not want to do that.   Partly because he was arrogant, and partly because he did not want the politically charged fight that such a request would engage.  It would hamper his ability to take unilateral action in Libya.
  • So an alternate method of arming the rebels needed to be structured.    Enter the State Department, Hillary Clinton, and CIA David Petraeus. Weapons, specifically MANPADS or shoulder fired missiles, would be funneled to the Benghazi rebels by the State Dept, through the CIA under the auspices of ongoing NATO operations.   May, June, July, August, Sept, 2011 this covert process was taking place. It was this covert missile delivery process which later became an issue after Gaddafi was killed.    It was during the recovery of these missiles , and the redeployment/transfer to the now uprising “Syrian Rebels” when Ambassador Chris Stevens was killed on Sept. 11th 2012.
  • ...1 more annotation...
  • [O]n July 25, 2012, Taliban fighters in Kunar province successfully targeted a US Army CH-47 helicopter with a new generation Stinger missile. They thought they had a surefire kill. But instead of bursting into flames, the Chinook just disappeared into the darkness as the American pilot recovered control of the aircraft and brought it to the ground in a hard landing. The assault team jumped out the open doors and ran clear in case it exploded. Less than 30 seconds later, the Taliban gunner and his comrade erupted into flames as an American gunship overhead locked onto their position and opened fire. The next day, an explosive ordnance disposal team arrived to pick through the wreckage and found unexploded pieces of a missile casing that could only belong to a Stinger missile. Lodged in the right nacelle, they found one fragment that contained an entire serial number. The investigation took time. Arms were twisted, noses put out of joint. But when the results came back, they were stunning: The Stinger tracked back to a lot that had been signed out by the CIA recently, not during the anti-Soviet ­jihad. Reports of the Stinger reached the highest echelons of the US command in Afghanistan and became a source of intense speculation, but no action. Everyone knew the war was winding down. Revealing that the Taliban had US-made Stingers risked demoralizing coalition troops. Because there were no coalition casualties, government officials made no public announcement of the attack. My sources in the US Special Operations community believe the Stinger fired against the Chinook was part of the same lot the CIA turned over to the ­Qataris in early 2011, weapons Hillary Rodham Clinton’s State Department intended for anti-Khadafy forces in Libya. They believe the Qataris delivered between 50 and 60 of those same Stingers to the Taliban in early 2012, and an additional 200 SA-24 Igla-S surface-to-air missiles.  (link)
  •  
    The pieces of the puzzle are slowly coming together, and it isn't pretty. This article connects Qatar, Afghanistan and hero of Benghazi, to the fabulous five terrorist dream team Obama let out of the gitmo prison. Incredible story. excerpt: "How Our Stinger Missiles Wound Up In Afghanistan Being Used Against Our Own Troops: On February 15th 2011 a civil war erupted inside Libya.   Egyptian Islamists previously  freed from jail by the Muslim Brotherhood flooded into Eastern Libya and joined with their ideological counterparts.  al-Qaeda operatives hell bent on using the cover of the Arab Spring to finally rid themselves of their nemesis, Muammar Gaddafi. President Obama chose to ignore an outbreak of violence in Libya for 19 days.  Perhaps Obama was tentative from the criticism he and Hillary received over the mixed messaging in Egypt.  Regardless, eventually Obama was begged to engage himself by leaders from France, The United Kingdom, and Italy. The White House advisors (Emanuel, McDonough, Donolin, Jarrett, Axelrod, Plouffe) were more cautious this time.  Initially Obama ignored the EU requests and later chose to dispatch the Secretary of State, Hillary Clinton, to Europe to address their concerns. "Look, enough with the jokes shorty; you got us into this mess, now the turban heads are laughing at us"… "ah, bot of course, zeah av bullets, no? Vee ave to shoot" For the following 11 days American citizens, including State Dept. embassy officials, were trying to evacuate the country as vast swathes of the country erupted in bloodshed and violence, they became trapped in Tripoli.   A bloody national revolution was underway. The United Nations Security Council held urgent immediate emergency meetings to try to determine what to do.    However, the United States Ambassador to those meetings, Susan Rice, was not present.    She was attending a global warming summit in Africa. Without the U.S. present the United  Natio
4More

Hacking Online Polls and Other Ways British Spies Seek to Control the Internet - The In... - 0 views

  • The secretive British spy agency GCHQ has developed covert tools to seed the internet with false information, including the ability to manipulate the results of online polls, artificially inflate pageview counts on web sites, “amplif[y]” sanctioned messages on YouTube, and censor video content judged to be “extremist.” The capabilities, detailed in documents provided by NSA whistleblower Edward Snowden, even include an old standby for pre-adolescent prank callers everywhere: A way to connect two unsuspecting phone users together in a call.
  • he “tools” have been assigned boastful code names. They include invasive methods for online surveillance, as well as some of the very techniques that the U.S. and U.K. have harshly prosecuted young online activists for employing, including “distributed denial of service” attacks and “call bombing.” But they also describe previously unknown tactics for manipulating and distorting online political discourse and disseminating state propaganda, as well as the apparent ability to actively monitor Skype users in real-time—raising further questions about the extent of Microsoft’s cooperation with spy agencies or potential vulnerabilities in its Skype’s encryption. Here’s a list of how JTRIG describes its capabilities: • “Change outcome of online polls” (UNDERPASS) • “Mass delivery of email messaging to support an Information Operations campaign” (BADGER) and “mass delivery of SMS messages to support an Information Operations campaign” (WARPARTH) • “Disruption of video-based websites hosting extremist content through concerted target discovery and content removal.” (SILVERLORD)
  • • “Active skype capability. Provision of real time call records (SkypeOut and SkypetoSkype) and bidirectional instant messaging. Also contact lists.” (MINIATURE HERO) • “Find private photographs of targets on Facebook” (SPRING BISHOP) • “A tool that will permanently disable a target’s account on their computer” (ANGRY PIRATE) • “Ability to artificially increase traffic to a website” (GATEWAY) and “ability to inflate page views on websites” (SLIPSTREAM) • “Amplification of a given message, normally video, on popular multimedia websites (Youtube)” (GESTATOR) • “Targeted Denial Of Service against Web Servers” (PREDATORS FACE) and “Distributed denial of service using P2P. Built by ICTR, deployed by JTRIG” (ROLLING THUNDER)
  • ...1 more annotation...
  • • “A suite of tools for monitoring target use of the UK auction site eBay (www.ebay.co.uk)” (ELATE) • “Ability to spoof any email address and send email under that identity” (CHANGELING) • “For connecting two target phone together in a call” (IMPERIAL BARGE) While some of the tactics are described as “in development,” JTRIG touts “most” of them as “fully operational, tested and reliable.” It adds: “We only advertise tools here that are either ready to fire or very close to being ready.”
8More

No, Israel Does Not Have the Right to Self-Defense In International Law Against Occupie... - 0 views

  • On the fourth day of Israel's most recent onslaught against Gaza's Palestinian population, President Barack Obama declared, “No country on Earth would tolerate missiles raining down on its citizens from outside its borders.” In an echo of Israeli officials, he sought to frame Israel's aerial missile strikes against the 360-square kilometer Strip as the just use of armed force against a foreign country. Israel's ability to frame its assault against territory it occupies as a right of self-defense turns international law on its head.  A state cannot simultaneously exercise control over territory it occupies and militarily attack that territory on the claim that it is “foreign” and poses an exogenous national security threat. In doing precisely that, Israel is asserting rights that may be consistent with colonial domination but simply do not exist under international law. 
  • Admittedly, the enforceability of international law largely depends on voluntary state consent and compliance. Absent the political will to make state behavior comport with the law, violations are the norm rather than the exception. Nevertheless, examining what international law says with regard to an occupant’s right to use force is worthwhile in light of Israel's deliberate attempts since 1967 to reinterpret and transform the laws applicable to occupied territory. These efforts have expanded significantly since the eruption of the Palestinian uprising in 2000, and if successful, Israel’s reinterpretation would cast the law as an instrument that protects colonial authority at the expense of the rights of civilian non-combatants.  
  • International Law places the responsibility upon the commanding general of preserving order, punishing crime, and protecting lives and property within the occupied territory. His power in accomplishing these ends is as great as his responsibility.  The extent and breadth of force constitutes the distinction between the right to self-defense and the right to police. Police authority is restricted to the least amount of force necessary to restore order and subdue violence. In such a context, the use of lethal force is legitimate only as a measure of last resort. Even where military force is considered necessary to maintain law and order, such force is circumscribed by concern for the civilian non-combatant population. The law of self-defense, invoked by states against other states, however, affords a broader spectrum of military force. Both are legitimate pursuant to the law of armed conflict and therefore distinguished from the peacetime legal regime regulated by human rights law. 
  • ...5 more annotations...
  • Military occupation is a recognized status under international law and since 1967, the international community has designated the West Bank and the Gaza Strip as militarily occupied. As long as the occupation continues, Israel has the right to protect itself and its citizens from attacks by Palestinians who reside in the occupied territories. However, Israel also has a duty to maintain law and order, also known as “normal life,” within territory it occupies. This obligation includes not only ensuring but prioritizing the security and well-being of the occupied population. That responsibility and those duties are enumerated in Occupation Law.  Occupation Law is part of the laws of armed conflict; it contemplates military occupation as an outcome of war and enumerates the duties of an occupying power until the peace is restored and the occupation ends. To fulfill its duties, the occupying power is afforded the right to use police powers, or the force permissible for law enforcement purposes. As put by the U.S. Military Tribunal during the Hostages Trial (The United States of America vs. Wilhelm List, et al.)
  • To equate the two is simply to confuse the legal with the linguistic denotation of the term ”defense.“ Just as ”negligence,“ in law, does not mean ”carelessness” but, rather, refers to an elaborate doctrinal structure, so ”self-defense” refers to a complex doctrine that has a much more restricted scope than ordinary notions of ”defense.“  To argue that Israel is employing legitimate “self-defense” when it militarily attacks Gaza affords the occupying power the right to use both police and military force in occupied territory. An occupying power cannot justify military force as self-defense in territory for which it is responsible as the occupant. The problem is that Israel has never regulated its own behavior in the West Bank and Gaza as in accordance with Occupation Law. 
  • Once armed conflict is initiated, and irrespective of the reason or legitimacy of such conflict, the jus in bello legal framework is triggered. Therefore, where an occupation already is in place, the right to initiate militarized force in response to an armed attack, as opposed to police force to restore order, is not a remedy available to the occupying state. The beginning of a military occupation marks the triumph of one belligerent over another. In the case of Israel, its occupation of the West Bank, the Gaza Strip, the Golan Heights, and the Sinai in 1967 marked a military victory against Arab belligerents.  Occupation Law prohibits an occupying power from initiating armed force against its occupied territory. By mere virtue of the existence of military occupation, an armed attack, including one consistent with the UN Charter, has already occurred and been concluded. Therefore the right of self-defense in international law is, by definition since 1967, not available to Israel with respect to its dealings with real or perceived threats emanating from the West Bank and Gaza Strip population. To achieve its security goals, Israel can resort to no more than the police powers, or the exceptional use of militarized force, vested in it by IHL. This is not to say that Israel cannot defend itself—but those defensive measures can neither take the form of warfare nor be justified as self-defense in international law. As explained by Ian Scobbie:  
  • When It Is Just to Begin to Fight  The laws of armed conflict are found primarily in the Hague Regulations of 1907, the Four Geneva Conventions of 1949, and their Additional Protocols I and II of 1977. This body of law is based on a crude balance between humanitarian concerns on the one hand and military advantage and necessity on the other. The post-World War II Nuremberg trials defined military exigency as permission to expend “any amount and kind of force to compel the complete submission of the enemy…” so long as the destruction of life and property is not done for revenge or a lust to kill. Thus, the permissible use of force during war, while expansive, is not unlimited.  In international law, self-defense is the legal justification for a state to initiate the use of armed force and to declare war. This is referred to as jus ad bellum—meaning “when it is just to begin to fight.” The right to fight in self-defense is distinguished from jus in bello, the principles and laws regulating the means and methods of warfare itself. Jus ad bellum aims to limit the initiation of the use of armed force in accordance with United Nations Charter Article 2(4); its sole justification, found in Article 51, is in response to an armed attack (or an imminent threat of one in accordance with customary law on the matter). The only other lawful way to begin a war, according to Article 51, is with Security Council sanction, an option reserved—in principle, at least—for the defense or restoration of international peace and security.
  • Noura Erakat
7More

Speech Recognition is NSA's Best-Kept Open Secret - The Intercept - 0 views

  • Siri can understand what you say. Google can take dictation. Even your new smart TV is taking verbal orders. So is there any doubt the National Security Agency has the ability to translate spoken words into text? But precisely when the NSA does it, with which calls, and how often, is a well-guarded secret. It’s not surprising that the NSA isn’t talking about it. But oddly enough, neither is anyone else: Over the years, there’s been almost no public discussion of the NSA’s use of automated speech recognition.
  • Siri can understand what you say. Google can take dictation. Even your new smart TV is taking verbal orders. So is there any doubt the National Security Agency has the ability to translate spoken words into text? But precisely when the NSA does it, with which calls, and how often, is a well-guarded secret. It’s not surprising that the NSA isn’t talking about it. But oddly enough, neither is anyone else: Over the years, there’s been almost no public discussion of the NSA’s use of automated speech recognition. One minor exception was in 1999, when a young Australian cryptographer named Julian Assange stumbled across an NSA patent that mentioned “machine transcribed speech.”
  • One minor exception was in 1999, when a young Australian cryptographer named Julian Assange stumbled across an NSA patent that mentioned “machine transcribed speech.” Assange, who went on to found WikiLeaks, said at the time: “This patent should worry people. Everyone’s overseas phone calls are or may soon be tapped, transcribed and archived in the bowels of an unaccountable foreign spy agency.” The most comprehensive post-Snowden descriptions of NSA’s surveillance programs are strangely silent when it comes to speech recognition. The report from the President’s Review Group on Intelligence and Communications Technologies doesn’t mention it, and neither does the October 2011 FISA Court ruling, or the detailed reports from the Privacy and Civil Liberties Oversight Board.
  • ...3 more annotations...
  • There is some mention of speech recognition in the “Black Budget” submitted to Congress each year. But there’s no clear sign that anybody on the Hill has ever really noticed. As The Intercept reported on Tuesday, items from the Snowden archive document the widespread use of automated speech recognition by the NSA. The strategic advantage, invasive potential and policy implications of being able to turn spoken words into text are not trivial: Suddenly, voice conversations, historically considered ephemeral and unsearchable, can be scanned, catalogued and archived — not perfectly, but well enough to dramatically increase the effective scope of eavesdropping. Former senior NSA executive turned whistleblower Thomas Drake, who’s seen NSA’s automated speech recognition at work, says the silence is telling.
  • “You’re seeing a black hole,” Drake told The Intercept. “That means there’s something there that’s really significant. You’re seeing some of the fuzzy contours of this whole other program.”
  • Senator Ron Wyden, D-Ore., arguably the foremost congressional critic of NSA overreach, wouldn’t comment directly on the question of speech recognition. But, he said through a spokesperson: “After 14 years on the Intelligence Committee, I’ve learned that senators must be constantly on the lookout for secret interpretations of the law and advances in surveillance that Congress isn’t aware of.” He added: “For centuries, individual privacy was protected in part by the limited resources of governments. It simply wasn’t possible for governments to secretly collect information on every single citizen without investing in massive networks of spies and informants. But in the 21st century mass surveillance is no longer difficult and expensive — it’s increasingly cheap and easy. The only privacy protections that will matter in the future are the ones that are written into law and defended by public demand for freedom and openness.”
  •  
    A "black hole" at the NSA? Voice-to-text is indeed an ultra-powerful intelligence tool, but only if you are gathering verbal conversations. As content, verbal conversations should be off-limits without a court order. But is NSA honoring that limitation? And is the FISA Court enforcing it?
6More

OPERATION CONDOR: National Security Archive Presents Trove of Declassified Documentatio... - 0 views

  • Argentine Newspaper, Pagina 12, Highlights Evidence Presented by Archive Southern Cone Project Director Carlos Osorio Documents given to Court Reveal Condor Precedents; Secret Summary of Inaugural Condor Meeting Introduced into Court for First Time National Security Archive Electronic Briefing Book No. 514
  • The National Security Archive today posted key documents on Operation Condor, presented by its Southern Cone analyst, Carlos Osorio, at a historic trial in Buenos Aires of former military officers. During 10 hours on the witness stand recently, Osorio introduced one hundred documents into evidence for the court proceedings. His testimony was profiled on May 3 in a major feature article published in the Buenos Aires daily, Pagina 12. Operation Condor was an infamous secret alliance between South American dictatorships in the mid and late 1970s - a Southern Cone rendition and repression program - formed to track down and eliminate enemies of their military regimes. The Condor trial charges 25 high-ranking officers, originally including former Argentine presidents Jorge Videla (deceased) and Reynaldo Bignone (aged 87), with conspiracy to "kidnap, disappear, torture and kill" 171 opponents of the regimes that dominated the Southern Cone in the 1970s and 1980s. Among the victims were approximately 80 Uruguayans, 50 Argentines, 20 Chileans and a dozen others from Paraguay, Bolivia, Peru and Ecuador who were targeted by Condor operatives.
  • The tribunal requested Osorio’s testimony, which took place over two days on March 6 and 7, 2015, and included presentation of an Excel data base of 900 documents drawn mostly from U.S. government sources and from the Archive of Terror in Paraguay. Of these, Osorio focused on 100 declassified records selected for the tribunal, which was presided over by Judge Oscar Amirante, president of Federal Tribunal N° 1. The National Security Archive obtained the U.S. documents through the Freedom of Information Act (FOIA), primarily from the Central Intelligence Agency, Defense Intelligence Agency and the State Department. Other notable records originated from the Chilean former secret police, DINA. "We have been working on Operation Condor for years," Osorio said, "sifting through archives in many continents and building a body of knowledge and a trove of documents." The Pagina 12 feature entitled "The Evolution of Condor," described Osorio’s presentation of "dozens" of documents to the tribunal, and the contribution the documents made in educating the judges on the genesis and evolution of coordinated repression in the Southern Cone. Osorio’s testimony covered a range of topics including the breadth of Condor operations, U.S. knowledge of those operations and the authenticity of the records being introduced into evidence.
  • ...3 more annotations...
  • The article highlighted one document Osorio presented that revealed the bilateral precedent for what would become a multilateral system of regional repression: a secret accord between the Argentine and Paraguayan military intelligence services to "Collaborate in the struggle against subversion…" and the "… internment [of dissenters]…" " The agreement was dated September 12,1972, and signed by Paraguayan intelligence officer Col. Benito Guanes Serrano. Three years later, Guanes would also be one of the five original signatories of the secret Condor accords. Osorio discovered the document in the Archive of Terror in Paraguay. In September 1975, an assessment by a State Department intelligence analyst concluded that "The national security forces of the southern cone surpass the terrorists in cooperation at the international level…" Six weeks later, in Santiago, Chile, intelligence chiefs from Argentina, Bolivia, Chile, Paraguay and Uruguay signed an "Acta" officially establishing Operation Condor. Osorio introduced that pivotal document - provided to the Archive by a source in Chile - into evidence as well.
  • Two declassified U.S. documents presented to the tribunal underscored the contradictory response of high U.S. officials as they became aware of Condor operations in the summer of 1976. One well-known 13-page memorandum of conversation between Secretary of State Henry Kissinger and Argentine Foreign Minister Admiral Cesar Guzzetti dated June 10, 1976, revealed Kissinger’s endorsement of the regional collaboration to repress the left. After Guzzetti informed Kissinger that the Southern Cone regimes were engaged in "joint efforts" to fight "the terrorist problem," Kissinger essentially supported this approach: "If there are things that have to be done, you should do them quickly. But you should get back quickly to normal procedures," according to the declassified transcript Osorio provided to the court. "We want you to succeed. We do not want to harrass [sic] you," Kissinger concluded. "I will do what I can … "
  • After a CIA briefing to Kissinger’s top aides in late July 1976 on the Condor countries’ plans to send assassination teams around the world to eliminate opponents, the Secretary of State authorized a démarche to General Augusto Pinochet in Chile, General Jorge Videla in Argentina, and other military leaders in the region calling on them to cease and desist. "Government planned and directed assassinations within and outside the territory of Condor members has most serious implication which we must face squarely and rapidly," stated the secret August 13, 1976, cable to U.S. ambassadors in those nations. But the démarche was never delivered to any of the Condor regimes. After the U.S. ambassadors raised objections about presenting the démarche to the generals, on September 16, 1976, Kissinger rescinded it, and ordered "that no further action be taken on this matter." In addition to Osorio, the National Security Archive’s Chile Documentation Project director, Peter Kornbluh, testified in the Operation Condor trial for five hours in December 2014. Archive Advisory Board member, professor of journalism and author John Dinges presented evidence in April 2015. Read the Documents
3More

Yemen's children at immediate risk of severe malnutrition | Scoop News - 0 views

  • More children in Yemen are at risk of dying from hunger and lack of health services than from bombs and bullets, the United Nations Children’s Fund (UNICEF) warned today amid ongoing fighting across the Gulf country.Briefing the press in Geneva, UNICEF spokesperson Christophe Boulierac warned that 120,000 children in Yemen remain at immediate risk of severe malnutrition over the coming three months if health and hygiene services failed to resume normal functioning.Mr. Boulierac explained that restrictions on commercial imports of fuel and food are largely to blame for the rapidly deteriorating situation facing the country’s children.He added that another 2.5 million children under five years of age were at immediate risk of diarrhoea while 1.2 children were likely to suffer from preventable diseases such as pneumonia and measles as vaccination campaigns had ground to a halt.
  • More than 1,400 people have been killed and 300,000 have fled their homes in nearly three months of fighting in the war-torn Gulf nation. Emergency relief and medical teams from abroad are struggling to fly in to scale-up the humanitarian operation to address the needs of increasingly vulnerable Yemenis.Insecurity and lack of fuel have also limited access to and delivery of services. Partners report difficulty providing medical services as result of the current security situation and continued airstrikes targeting Haradh, Sa'ada and Sana'a. Food relief partners have reported they have had to suspend assistance in several districts due to lack of fuel. Jens Laerke, for the Office for the Coordination of Humanitarian Affairs (OCHA), confirmed that regular commercial imports of fuel had become the main issue and called for them to increase. The primary obstacle, he explained, was an inspection regime instituted by a recent Security Council resolution and which had resulted in a crippling effect on humanitarian operations.In addition to the limited access to fuel, food imports had also been impacted, cautioned Mr. Laerke as he noted that 90 percent of the country depended on their food from imports.Against that backdrop, the UN’s World Health Organization (WHO) – which also addressed the briefing – cited reports of 484 suspected cases of dengue fever with two reported deaths.
  • A spokesperson for the WHO said the UN agency was on the ground and trying to send rapid diagnostic kits for both dengue and malaria but could not confirm the dengue cases without lab testing. The spokesperson added that between 19 March and 4 May the number of casualties across the country had shot up to 1,439 deaths and 5,951 injuries, including 71 children deaths.
4More

Clinton can't separate herself from foreign-policy buffoons Saban and Adelson - Mondoweiss - 0 views

  • Are Adelson and Saban people that presidents should be looking to for Middle East policy advice? Apparently Hillary Clinton thinks so. It’s not a matter of necessity. As Bruck details in her profile of Saban, Obama kept Saban at a distance. He did not rely on Adelson money or on Saban money for his elections. Hillary Clinton is choosing to dance to a different tune. All of this brings into question Hillary Clinton’s judgement when it comes to the Middle East. As we know, she voted for the invasion of Iraq in 2003. In the 2008 campaign she refused to acknowledge the vote as a mistake; now she does.  However, this letter to Saban leaves one to wonder whether her judgment has improved.
  • Beinart thinks Clinton’s implicit support of the occupation and the fight against BDS is counterproductive and bad for Israel. Signing up with Saban and Adelson, says Beinart, “is disastrous” because Adelson and Saban are shutting out the very voices and constituencies with whom BDS enjoys credibility.  The Adelson/Saban approach, worries Beinart, will be counter-productive and will ultimately make the BDS movement more potent.  If Hillary Clinton were serious about fighting BDS, says Beinart, Saban would be the last person she’d ask. She’d be looking for ways to impose a two state solution from the outside.
  • The only way to prevent this Israeli unilateralism is through solutions “imposed from the outside.” …. How can direct negotiations possibly succeed when Benjamin Netanyahu has explicitly and repeatedly said that he doesn’t support a Palestinian state anytime soon, and doesn’t support one near the 1967 lines ever? The only way to make direct negotiations meaningful is to force Netanyahu, or some Israeli successor, back into the paradigm outlined by Bill Clinton and the Arab Peace Initiative [in the Oslo process] …. Unless that framework is “imposed from the outside,” people morally opposed to Israel’s occupation of the West Bank will see no hope for ending it without BDS. And they will gradually embrace the movement, even though it goes beyond the two-state solution to question the legitimacy of Israel as a Jewish state within any borders. The Obama administration, by signaling that it may support such a UN framework this fall, is pursuing the best alternative to BDS that exists today. If Hillary helps torpedo that UN initiative, Haim Saban should look forward to more letters from her about BDS in the future. Because the Democratic presidential frontrunner will have done her part to help it grow.
  • ...1 more annotation...
  • Over the course of his Presidency Obama has successfully gotten Iran to halt its pursuit of a nuclear weapon and he has made efforts to normalize relations and bring Iran back into the international community. This effort has been shrilly opposed by Israel. Hillary Clinton has at times opposed the Obama administration’s approach on Iran. How would she balance her unceasing commitment to Israeli neoconservatives with America’s policy interests in the region as president? There are more questions than answers. In Syria as with Iraq, it’s clear Hillary’s instincts have been considerably more hawkish than Obama’s. Hawkish instincts proved a disaster in the wake of September 9, 2001. The fact that Clinton is unable to distance herself from Saban and Adelson, buffoons who don’t know what they’re talking about on BDS, leaves room for worry about how Hillary Clinton’s hawkish instincts would serve the country if she were president for the next four or eight years.
1More

Air Force: Cyber Warriors Need Plenty of Rest - 0 views

  • The document discusses the general conduct of Air Force cyber operations, including so-called “Real-Time Operations & Innovation” (RTOI) projects that enable the USAF “to generate tools and tactics in response to critical cyber needs at the fastest possible pace.” See Cyberspace Operations and Procedures, Air Force Instruction 10-1703, volume 3, 5 May 2015. With the growing normalization of defensive and (especially) offensive military operations in cyberspace, more and more U.S. military doctrine governing such activity is gradually being published on an unclassified basis. Some of the principal components of this emerging open literature include the following: Cyberspace Operations, Joint Publication 3-12, 5 February 2013 Cyberspace Operations, Air Force Policy Directive 10-17, 31 July 2012 Command and Control for Cyberspace Operations, Air Force Instruction 10-1701, 5 March 2014 Legal Reviews of Weapons and Cyber Capabilities, Air Force Instruction 51-402, 27 July 2011 Information Assurance (IA) and Support to Computer Network Defense (CND), Chairman of the Joint Chiefs of Staff Instruction 6510.01F, 9 February 2011 Department of Defense Strategy for Operating in Cyberspace, July 2011
3More

Embracing the Saudi War on Yemen | Consortiumnews - 0 views

  • As the humanitarian crisis in Yemen worsens, the Obama administration seems less concerned about the plight of the desperate Yemeni people than the feelings of the Saudi royals who have spent the last month indiscriminately bombing a nearly defenseless Yemen, using high-tech U.S. jets and bombs to reportedly kill hundreds of civilians and damage its ancient cities.On Friday, the Obama administration took credit for blocking nine Iranian ships from reaching Yemen with relief supplies, claiming that the ships may have carried weapons that the Yemenis could use in their civil war or to defend against Saudi attacks. President Barack Obama had dispatched a U.S. aircraft carrier fleet to the Yemeni coast to enforce an embargo that has helped the Saudis seal off the country from outside help.
  • A person closely involved with the Yemen crisis told me that the Iranian ships carried food and medicine, not weapons, but turned back to avoid the risk and humiliation of being boarded by the U.S. Navy. Meanwhile, Yemen, already one of the poorest countries in the Arab world, is facing shortages of basic supplies since the Saudis have cut off normal trade routes into Yemen.Yet, despite the suffering of Yemen, the U.S. government appears more worried about the sensitivities of Saudi Arabia, one of the richest countries in the region. A Defense Department official, speaking anonymously, told the New York Times that it was “important that the Saudis know that we have an arm around their shoulders.”
  • Defense Department officials also acknowledged that they didn’t know what type of cargo was being transported aboard the Iranian ships, the Times reported. Though the Obama administration had touted the possibility that the Iranian ships carried weapons, the decision by Iran to avoid a confrontation may have reflected Tehran’s desire not to worsen relations with the United States and thus disrupt fragile negotiations over international guarantees to ensure that its nuclear program remains peaceful.But the losers in this military/diplomatic maneuvering appear to be the Yemenis who, in effect, face a Saudi strategy of starving the country into submission with the help of the United States. While U.S. Ambassador to the United Nations Samantha Power built her public image as a “humanitarian interventionist” asserting a “responsibility to protect” vulnerable populations, she has said little about the Saudi role in Yemen’s humanitarian crisis.
« First ‹ Previous 101 - 120 of 173 Next › Last »
Showing 20 items per page