Skip to main content

Home/ Socialism and the End of the American Dream/ Group items matching "target-sharing" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
5More

The CIA Just Declassified the Document That Supposedly Justified the Iraq Invasion | VI... - 0 views

  • Thirteen years ago, the intelligence community concluded in a 93-page classified document used to justify the invasion of Iraq that it lacked "specific information" on "many key aspects" of Iraqi President Saddam Hussein's weapons of mass destruction (WMD) programs.But that's not what top Bush administration officials said during their campaign to sell the war to the American public. Those officials, citing the same classified document, asserted with no uncertainty that Iraq was actively pursuing nuclear weapons, concealing a vast chemical and biological weapons arsenal, and posing an immediate and grave threat to US national security. Congress eventually concluded that the Bush administration had "overstated" its dire warnings about the Iraqi threat, and that the administration's claims about Iraq's WMD program were "not supported by the underlying intelligence reporting." But that underlying intelligence reporting — contained in the so-called National Intelligence Estimate (NIE) that was used to justify the invasion — has remained shrouded in mystery until now.
  • The CIA released a copy of the NIE in 2004 in response to a Freedom of Information Act (FOIA) request, but redacted virtually all of it, citing a threat to national security. Then last year, John Greenewald, who operates The Black Vault, a clearinghouse for declassified government documents, asked the CIA to take another look at the October 2002 NIE to determine whether any additional portions of it could be declassified.The agency responded to Greenewald this past January and provided him with a new version of the NIE, which he shared exclusively with VICE News, that restores the majority of the prewar Iraq intelligence that has eluded historians, journalists, and war critics for more than a decade. (Some previously redacted portions of the NIE had previously been disclosed in congressional reports.)
  • For the first time, the public can now read the hastily drafted CIA document [pdf below] that led Congress to pass a joint resolution authorizing the use of military force in Iraq, a costly war launched March 20, 2003 that was predicated on "disarming" Iraq of its (non-existent) WMD, overthrowing Saddam Hussein, and "freeing" the Iraqi people.A report issued by the government funded think-tank RAND Corporation last December titled "Blinders, Blunders and Wars" said the NIE "contained several qualifiers that were dropped…. As the draft NIE went up the intelligence chain of command, the conclusions were treated increasingly definitively."
  • ...1 more annotation...
  • Thirteen years ago, the intelligence community concluded in a 93-page classified document used to justify the invasion of Iraq that it lacked "specific information" on "many key aspects" of Iraqi President Saddam Hussein's weapons of mass destruction (WMD) programs.But that's not what top Bush administration officials said during their campaign to sell the war to the American public. Those officials, citing the same classified document, asserted with no uncertainty that Iraq was actively pursuing nuclear weapons, concealing a vast chemical and biological weapons arsenal, and posing an immediate and grave threat to US national security. 
  •  
    Confirmation that the intelligence was being fixed around the goal, but also that Bush2 and his administration stretched even that intelligence report beyond recognition. 
11More

The Real Reason for the Iraq War | VICE United Kingdom - 1 views

  • Like most lefty journalists, I assumed that George Bush and Tony Blair invaded Iraq to buy up its oil fields, cheap and at gun-point, and cart off the oil. We thought we knew the neo-cons true casus belli: Blood for oil. But the truth in the Options for Iraqi Oil Industry was worse than "Blood for Oil". Much, much worse.
  • Within days, our chief of investigations, Ms Badpenny, delivered to my shack in the woods outside New York a 323-page, three-volume programme for Iraq's oil crafted by George Bush's State Department and petroleum insiders meeting secretly in Houston, Texas. I cracked open the pile of paper – and I was blown away.
  • I'd already had in my hands a 101-page document, another State Department secret scheme, first uncovered by Wall Street Journal reporter Neil King, that called for the privatisation, the complete sell-off of every single government-owned asset and industry. And in case anyone missed the point, the sales would include every derrick, pipe and barrel of oil, or, as the document put it, "especially the oil". That plan was created by a gaggle of corporate lobbyists and neo-cons working for the Heritage Foundation. In 2004, the plan's authenticity was confirmed by Washington power player Grover Norquist. (It's hard to erase the ill memory of Grover excitedly waving around his soft little hands as he boasted about turning Iraq into a free-market Disneyland, recreating Chile in Mesopotamia, complete with the Pinochet-style dictatorship necessary to lock up the assets – while behind Norquist, Richard Nixon snarled at me from a gargantuan portrait.) The neo-con idea was to break up and sell off Iraq's oil fields, ramp up production, flood the world oil market – and thereby smash OPEC and with it, the political dominance of Saudi Arabia.
  • ...6 more annotations...
  • General Jay Garner also confirmed the plan to grab the oil. Indeed, Secretary of Defense Donald Rumsfeld fired Garner, when the General, who had lived in Iraq, complained the neo-con grab would set off a civil war. It did. Nevertheless, Rumsfeld replaced Garner with a new American viceroy, Paul Bremer, a partner in Henry Kissinger's firm, to complete the corporate takeover of Iraq's assets – "especially the oil".
  • But that was not to be. While Bremer oversaw the wall-to-wall transfer of Iraqi industries to foreign corporations, he was stopped cold at the edge of the oil fields. How? I knew there was only one man who could swat away the entire neo-con army: James Baker, former Secretary of State, Bush family consiglieri and most important, counsel to Exxon-Mobil Corporation and the House of Saud.
  • There was no way in hell that Baker's clients, from Exxon to Abdullah, were going to let a gaggle of neo-con freaks smash up Iraq's oil industry, break OPEC production quotas, flood the market with six million bbd of Iraqi oil and thereby knock the price of oil back down to $13 a barrel where it was in 1998.
  • Big Oil could not allow Iraq's oil fields to be privatised and taken from state control. That would make it impossible to keep Iraq within OPEC (an avowed goal of the neo-cons) as the state could no longer limit production in accordance with the cartel's quota system. The US oil industry was using its full political mojo to prevent their being handed ownership of Iraq's oil fields. That's right: The oil companies didn't want to own the oil fields – and they sure as hell didn't want the oil. Just the opposite. They wanted to make sure there would be a limit on the amount of oil that would come out of Iraq. Saddam wasn't trying to stop the flow of oil – he was trying to sell more. The price of oil had been boosted 300 percent by sanctions and an embargo cutting Iraq's sales to two million barrels a day from four. With Saddam gone, the only way to keep the damn oil in the ground was to leave it locked up inside the busted state oil company which would remain under OPEC (i.e. Saudi) quotas. The James Baker Institute quickly and secretly started in on drafting the 323-page plan for the State Department. With authority granted from the top (i.e. Dick Cheney), ex-Shell Oil USA CEO Phil Carroll was rushed to Baghdad in May 2003 to take charge of Iraq's oil. He told Bremer, "There will be no privatisation of oil – END OF STATEMENT." Carroll then passed off control of Iraq's oil to Bob McKee of Halliburton, Cheney's old oil-services company, who implemented the Baker "enhance OPEC" option anchored in state ownership.
  • This week, VICE readers can download, for free, Greg Palast's investigation of the war in Iraq in the BBC film, Bush Family Fortunes, at www.GregPalast.com – as well as the illustrated poster of "The Secret History of War over Oil in Iraq" from Palast's international bestseller, Armed Madhouse, also at www.GregPalast.com
  • Some oil could be released, mainly to China, through limited, but lucrative, "production sharing agreements". And that's how George Bush won the war in Iraq. The invasion was not about "blood for oil", but something far more sinister: blood for no oil. War to keep supply tight and send prices skyward. Oil men, whether James Baker or George Bush or Dick Cheney, are not in the business of producing oil. They are in the business of producing profits. And they've succeeded. Iraq, capable of producing six to 12 million barrels of oil a day, still exports well under its old OPEC quota of three million barrels. The result: As we mark the tenth anniversary of the invasion this month, we also mark the fifth year of crude at $100 a barrel. As George Bush could proudly say to James Baker: Mission Accomplished!
  •  
    The Sherman Act forbids conspiracies in restraint of trade and is at its zenith in price-fixing cases. This looks to be the mother of all price-fixing cases, to say the least.   
  •  
    Wow, Marbux has it right.  This report from the legendary Greg Palast of the BBC News Network is a stunning reversal of what everyone believed to be the truth.  To wit, the militarist and global strategist - resource control hungry neocon contingent of the Repubican party was always thought to be behind the Iraqi war.  For control of cheap, plentiful oil and, the protection / destruction of Israel's enemies.   Funny, but it turns out America was fighting for higher oil prices and limited supplies.  Just as in the first Gulf War, Americans were fighting to protect Saudi and big oil profits. excerpt: Big Oil could not allow Iraq's oil fields to be privatised and taken from state control. That would make it impossible to keep Iraq within OPEC (an avowed goal of the neo-cons) as the state could no longer limit production in accordance with the cartel's quota system. The US oil industry was using its full political mojo to prevent their being handed ownership of Iraq's oil fields. That's right: The oil companies didn't want to own the oil fields - and they sure as hell didn't want the oil. Just the opposite. They wanted to make sure there would be a limit on the amount of oil that would come out of Iraq. Saddam wasn't trying to stop the flow of oil - he was trying to sell more. The price of oil had been boosted 300 percent by sanctions and an embargo cutting Iraq's sales to two million barrels a day from four. With Saddam gone, the only way to keep the damn oil in the ground was to leave it locked up inside the busted state oil company which would remain under OPEC (i.e. Saudi) quotas. The James Baker Institute quickly and secretly started in on drafting the 323-page plan for the State Department. With authority granted from the top (i.e. Dick Cheney), ex-Shell Oil USA CEO Phil Carroll was rushed to Baghdad in May 2003 to take charge of Iraq's oil. He told Bremer, "There will be no privatisation of oil - END OF STATEMENT." Carroll then passed off control
3More

Pepe Escobar - The real November surprise -- Puppet Masters -- Sott.net - 0 views

  • "As bad as it is the folks above the President make the decisions. They may have decided on Trump. These things do not happen by accident." Thus spoke a high-level US business mover and shaker with secure transit in rarified Masters of the Universe-related circles, amidst the utter political chaos provoked by head of the FBI James Comey's latest bombshell. It's virtually established by now that US Attorney General Loretta Lynch told Comey not to release his letter to Congress. But Comey did it anyway. If he had not, and a scandal would - inevitably - spring up after the US presidential election, Lynch would be perfectly positioned to deny she knew anything, and Comey would be on the firing line. Lynch is a certified Clinton machine asset. In 1999 then-President Bill Clinton appointed her to run the Brooklyn US Attorney's office. She left in 2002, taking the private practice revolving door. She was back to the Brooklyn office in 2010, urged by Obama. Five years later she became the 83rd US Attorney General, replacing the dodgy Eric Holder. A plausible case has been made that Comey took his fateful decision based on a serious internal revolt at the FBI - led by key people he trusts — as well as being egged-on by his wife. Yet one of the key questions that refuse to go away is why the FBI waited until 11 days before the US presidential election to supposedly "find" an email trove on certified sexting pervert Anthony Weiner's laptop.
  •      "As bad as it is the folks above the President make the decisions. They may have decided on Trump. These things do not happen by accident." Thus spoke a high-level US business mover and shaker with secure transit in rarified Masters of the Universe-related circles, amidst the utter political chaos provoked by head of the FBI James Comey's latest bombshell. It's virtually established by now that US Attorney General Loretta Lynch told Comey not to release his letter to Congress. But Comey did it anyway. If he had not, and a scandal would - inevitably - spring up after the US presidential election, Lynch would be perfectly positioned to deny she knew anything, and Comey would be on the firing line. Lynch is a certified Clinton machine asset. In 1999 then-President Bill Clinton appointed her to run the Brooklyn US Attorney's office. She left in 2002, taking the private practice revolving door. She was back to the Brooklyn office in 2010, urged by Obama. Five years later she became the 83rd US Attorney General, replacing the dodgy Eric Holder. A plausible case has been made that Comey took his fateful decision based on a serious internal revolt at the FBI - led by key people he trusts — as well as being egged-on by his wife. Yet one of the key questions that refuse to go away is why the FBI waited until 11 days before the US presidential election to supposedly "find" an email trove on certified sexting pervert Anthony Weiner's laptop.
  • The business source, although unsympathetic to the Clinton machine, especially in foreign policy, is a realpolitik practitioner, not a conspiracy theorist. He is adamant that, "the FBI reversal could not have happened without orders above the President. If the Masters [of the Universe] have changed their mind, then they will destroy Hillary." He adds, "they can make a deal with Donald just like anyone else; Donald wins; the Masters win; the people think that their voice has been heard. And then there will be some sort of (controlled) change." What's paramount in the whole soap opera is that faith in the US political system — as corrupt as it may be — must endure. That mirrors the faith in the US dollar; if confidence in the US dollar fails, the US as a hegemonic financial power is no more. The source is equally adamant that, "it is almost unprecedented to see a cover-up as extensive as Hillary's. A secret meeting between Bill Clinton and the Attorney General; the FBI ignoring all evidence and initially clearing Hillary to near rebellion of the whole of the FBI, attested to by Rudolf Giuliani whose reputation as a federal prosecutor is unquestioned; the Clinton "pay for play" foundation. The Masters are troubled that this is getting out of hand." The record shows that "the Masters do not usually have to go to such lengths to protect their own. They did manage to save Bill Clinton from the Monica Lewinsky perjury and keep him in the presidency. The Masters were not attacked in this case. They even got away with the 1987 cash settlement crash and the theft surrounding the Lehman debacle. In all these cases there were no overarching challenges to their control, as we see now open to the public by Trump. They antagonized and insulted the wrong man."
4More

Netanyahu and Trump: A Shared Focus on Terrorism « LobeLog - 0 views

  • Scholars of terrorism credit a specific 1979 symposium in Jerusalem as a turning point in the U.S. and international usage of “terrorism” as we understand it today. The Jonathan Institute, founded following the death of Benjamin Netanyahu’s brother Yonatan during a raid to rescue hostages from a PLO hijacking, hosted a 1979 conference in Jerusalem— and a follow up in 1984 in Washington—on “International Terrorism.” Directed by Benjamin Netanyahu, the Jonathan Institute maintained close ties to the Israeli government. Current and former Israeli officials across the political spectrum—including Golda Meir, Menachem Begin, Yitzhak Rabin, Ezer Weizman, Moshe Dayan, and Shimon Peres—dominated its administrative committee. Lisa Stampnitsky, in her 2013 book Disciplining Terror, discusses how the Jonathan Institute helped internationalize Israel’s use of the term to describe terrorist violence as both irrational and illegitimate in both means and ends, and as primarily targeting democracies and “the West.” Previously, she notes, terrorism referred largely to rational political violence, either state or individual, and was dealt with as an issue of criminality and law. The shift helped Israel delegitimize the political aims of certain groups, such as the Palestinian resistance to its colonization and territorial occupation. One cannot be a “freedom fighter” if one’s political aims are demonized as illegitimate or irrational. Stampnitsky argues that the shift to using terrorism to describe violence outside the law also set the stage for retaliatory strikes (such as the 1986 U.S. air strikes in Libya in response to a bombing at a Berlin disco that killed an American soldier) and eventually for the doctrine of preemptive force that has characterized the post-9/11 “War on Terror.”
  • Israel’s role in the development of a specifically anti-Muslim discourse of terrorism is deeply intertwined with the foreign policies of American politicians. As Deepa Kumar and others have pointed out, American neocons and Israel’s Likud party jointly developed a shared language around Islamic terrorism. The 1979 Jonathan Institute conference was attended by prominent American officials and political figures, including future President George H.W. Bush and representatives of the American Enterprise Institute, the Center for Strategic and International Studies, and Commentary magazine who brought the ideas, and later a follow-up conference, back to the U.S. Intended to serve as an intervention into the international discourse on terrorism, the explicit aim of the Jerusalem conference was to awaken the Western world to the problem of terrorism as defined by the conference organizers. It contributed to entrenching in the minds of American conservatives what was popularized a few years later as the “clash of civilizations,” firmly situating Israel in the category of Western democracies threatened by Soviets and Palestinians. The follow-up conference in the United States in 1984 went further by emphasizing the relationship between Islam and terror. As Netanyahu himself wrote in the book that came out of the conference: “the battle against terrorism was part of a much larger struggle, one between the forces of civilization and the forces of barbarism.” Then, as now, Netanyahu presented Israel as the bulwark against terrorism, a specific kind of illegitimate political violence that threatens not just Israel but all democracies and the Western world.
  • Echoes of this framing of the debate on terrorism can be found in how Western politicians, including Netanyahu and Trump, discuss the issue. Terrorism, which has no single agreed-upon definition in U.S. or international law, now serves as a moniker applied to all violence that established states deem illegitimate. Most often these days, Western democracies use “terrorism” to describe violence committed by Muslims. As journalist Glenn Greenwald writes, “In other words, any violence by Muslims against the West is inherently ‘terrorism,’ even if targeted only at soldiers at war and/or designed to resist invasion and occupation.” The term functions not as a descriptive tool but an ideological one. It doesn’t merely identify a particular kind of violence. It justifies and even requires a particular kind of forceful response by the state. Israel today presents itself as the world’s expert on counterterrorism. It maintains a profitable security industry predicated on selling expertise and technology tested in its interactions with Palestinians. American tax dollars have been funneled into this industry through U.S. military aid, over 25% of which Israel was allowed to spend domestically (the new military aid deal signed by the Obama White House will phase out this allowance over the next 10 years, sending the rest of the $3.8 billion per year to U.S. defense contractors). The United States and Israel collaborate on counterterrorism initiatives, including joint military exercises and police exchange programs. Here tactics and skills are developed and exchanged for surveillance and violent repression of protests that primarily impact Muslims and people of color in the U.S. and Palestinians and Black Jews in Israel.
  • ...1 more annotation...
  • In this context, Trump’s framing of his anti-Muslim immigration policies as a national security priority to keep out terrorists is nothing new. What is new in this political moment is the extent to which the U.S. public is seeing straight through this discourse and rallying against discrimination and bigotry. Ahead of Trump and Netanyahu’s meeting this week, there’s an opportunity to pay attention to how these discourses have enabled Israel to justify decades of military occupation and human rights abuses with the discourse of national security and counterterrorism. As the Trump administration goes back to the drawing board to devise restrictive immigration policies that will hold up in court, Netanyahu and Israel’s example shouldn’t be far from mind.
7More

DEA Global Surveillance Dragnet Exposed; Access to Data Likely Continues - The Intercept - 0 views

  • Secret mass surveillance conducted by the Drug Enforcement Administration is falling under renewed scrutiny after fresh revelations about the broad scope of the agency’s electronic spying. On Tuesday, USA Today reported that for more than two decades, dating back to 1992, the DEA and the Justice Department “amassed logs of virtually all telephone calls from the USA to as many as 116 countries linked to drug trafficking.” Citing anonymous current and former officials “involved with the operation,” USA Today reported that Americans’ calls were logged between the United States and targeted countries and regions including Canada, Mexico, and Central and South America.
  • The DEA’s data dragnet was apparently shut down by Attorney General Eric Holder in September 2013. But on Wednesday, following USA Today’s report, Human Rights Watch launched a lawsuit against the DEA over its bulk collection of phone records and is seeking a retrospective declaration that the surveillance was unlawful. The latest revelations shine more light on the broad scope of the DEA’s involvement in mass surveillance programs, which can be traced back to a secret program named “Project Crisscross” in the early 1990s, as The Intercept previously revealed. Documents from National Security Agency whistleblower Edward Snowden, published by The Intercept in August last year, showed that the DEA was involved in collecting and sharing billions of phone records alongside agencies such as the NSA, the CIA and the FBI.
  • The vast program reported on by USA Today shares some of the same hallmarks of Project Crisscross: it began in the early 1990s, was ostensibly aimed at gathering intelligence about drug trafficking, and targeted countries worldwide, with focus on Central and South America. It is also reminiscent of the so-called Hemisphere Project, a DEA operation revealed in September 2013 by The New York Times, which dated as far back as 1987, and used subpoenas to collect vast amounts of international call records every day. There is crossover, too, with a DEA database called DICE, revealed by Reuters in August 2013, which reportedly contains phone and Internet communication records gathered by the DEA through subpoenas and search warrants nationwide. The precise relationship between Crisscross, DICE, Hemisphere and the surveillance program revealed by USA Today is unclear. Whether or not they were part of a single overarching operation, the phone records and other data collected by each were likely accessible to DEA agents through the same computer interfaces and search and analysis tools.
  • ...3 more annotations...
  • A Justice Department spokesman told Reuters Wednesday that “all of the information has been deleted” and that the DEA was “no longer collecting bulk telephony metadata from U.S. service providers.” What the spokesman did not say is that the DEA has access to troves of phone records from multiple sources — and not all of them are obtained from U.S. service providers. As The Intercept’s reporting on Project Crisscross revealed, the DEA has had large-scale access to data covertly collected by the NSA, CIA and other agencies for years. According to NSA documents obtained by Snowden, the DEA can sift through billions of metadata records collected by other agencies about emails, phone calls, faxes, Internet chats and text messages using systems named ICREACH and CRISSCROSS/PROTON.
  • Notably, the DEA spying reported by USA Today encompassed phone records collected by the DEA using administrative subpoenas to obtain data from phone companies without the approval of a judge. The phone records collected by the agency as part of Project Hemisphere and the data stored on the DICE system were also collected through subpoenas and warrants. But ICREACH alone was designed to handle two to five billion new records every day — the majority of them not collected using any conventional search warrant or a subpoena. Instead, most of the data accessible to the DEA through ICREACH is vacuumed up by the NSA using Executive Order 12333, a controversial Reagan-era presidential directive that underpins several NSA bulk surveillance operations that monitor communications overseas. The 12333 surveillance takes place with no court oversight and has received minimal Congressional scrutiny because it is targeted at foreign, not domestic, communication networks.
  • This means that some of the DEA’s access to mass surveillance data — records collected in bulk through subpoenas or warrants — may have been shut down by Holder in 2013. But it is likely that the agency still has the ability to tap into other huge data repositories, and questions remain about how that access is being used.
  •  
    How many ways do I love thee? ... Just a few minutes. I have to consult my haystacks.  'Twas on August 20, 1982 when Ronald Reagan formally declered "War on Drugs," thereby sweeping U.S. Drug Enforcement Administration records under the umbrella of "national security" secrets. Concurrently, a document was produced by the White House that mentioned that the forerunners of today's "fusion centers" would be created to begin trawling government databases for information to wage that war, including medical records held by the then-Veterans Administration. I''ve been keeping an eye on those rascals ever since. Believe me, we have merely scratched the surface of a very few of the Feds' "haystacks." There are very many to go before they're all rooted out into the sunlight.  
8More

New regs say passengers cannot fly without biometric ID card - Police State USA - 0 views

  • The ability to travel in the United States is about to become more restrictive as the TSA announces it will soon be enforcing new identification standards in American airports. Beginning in 2016, passengers attempting to pass through a federal TSA checkpoint will be subject to the requirements of the REAL ID Act. To that end, the TSA will put higher scrutiny on travelers’ identities, and will only accept a federal passport or a “REAL-ID” card, which is issued by the states to meet federal requirements. Passengers will not be allowed to fly through an American airport without submitting to the advanced federal specifications. Both federal passports and REAL-ID cards require a number of unique personal identifiers to be stored together in government databases, including his or her full name, date of birth, Social Security Number, scanned signature, and other identifiers. Both cards require biometric data: a front-facing digital photograph of the passenger’s face, which is ultimately used with a facial recognition database.
  • The enhanced security measures stem from the passage of the REAL ID Act of 2005, a U.S. law enacted by President Bush that states that a Federal agency may not accept state-issued identification cards without complying with a number of enhanced standards of the REAL ID Act. The states were given a number of years to comply, and many moved to pass their own laws to meet the benchmarks of the REAL ID Act. Due to some sluggish response, DHS extended the compliance deadline several times. Unfortunately, most states were all too willing to bend to the requirements of the federal government in order to obtain “state certifications” of compliance. To signify their compliance with the federal standards, many states are now issuing identity cards emblazoned with gold stars in the corner.
  • According to the Department of Homeland Security, only Arizona, Idaho, Louisiana, Maine, Minnesota, New Hampshire, New York, and American Samoa have not met REAL ID standards as of January 2015. By DHS estimates, 70%-80% of all U.S. drivers are already carrying around REAL ID cards or live in states that have received extensions for compliance. Some states have even gone as far as to require the applicant to present birth certificates, W-2 tax forms, bank statements, and/or pay stubs to verify one’s identity before handing out the new REAL-ID cards. Some cards have RFID chips embedded in them. Among the 39 benchmarks of the REAL ID Act, state ID cards have to be scannable with a bar code reader, and the states are required to share access to an electronic database with all other states.
  • ...4 more annotations...
  • Once DHS begins enforcing the REAL ID standards, Americans without a compliant state ID will be effectively prohibited from flying at a commercial airport. Passengers would need to obtain passports even to fly on planes that never leave the United States.
  • a few rose in opposition to REAL ID, including Congressman Ron Paul (R-TX), who was perhaps its most outspoken critic. Dr. Paul, a former presidential candidate, called REAL ID a “Trojan horse” which “transform[s] state drivers licenses into de facto national ID cards.” In an impassioned speech on the House floor on February 9, 2005, Paul laid out a number of specific objections to H.R. 418: The REAL ID Act establishes a national ID card by mandating that states include certain minimum identification standards on driver’s licenses. It contains no limits on the government’s power to impose additional standards. Indeed, it gives authority to the Secretary of Homeland Security to unilaterally add requirements as he sees fit.
  • Supporters claim it is not a national ID because it is voluntary. However, any state that opts out will automatically make non-persons out of its citizens. The citizens of that state will be unable to have any dealings with the federal government because their ID will not be accepted. They will not be able to fly or to take a train. In essence, in the eyes of the federal government they will cease to exist. It is absurd to call this voluntary. Republican Party talking points on this bill, which claim that this is not a national ID card, nevertheless endorse the idea that “the federal government should set standards for the issuance of birth certificates and sources of identification such as driver’s licenses.” So they admit that they want a national ID but at the same time pretend that this is not a national ID. This bill establishes a massive, centrally-coordinated database of highly personal information about American citizens: at a minimum their name, date of birth, place of residence, Social Security number, and physical and possibly other characteristics. What is even more disturbing is that, by mandating that states participate in the “Drivers License Agreement,” this bill creates a massive database of sensitive information on American citizens that will be shared with Canada and Mexico!
  • This bill could have a chilling effect on the exercise of our constitutionally guaranteed rights. It re-defines “terrorism” in broad new terms that could well include members of firearms rights and anti-abortion groups, or other such groups as determined by whoever is in power at the time. There are no prohibitions against including such information in the database as information about a person’s exercise of First Amendment rights or about a person’s appearance on a registry of firearms owners. REAL ID cards streamline the process for the centralization and federalization of our private biometric data, while offering very little true benefit. In the words of Congressman Ron Paul, the program “offers us a false sense of greater security at the cost of taking a gigantic step toward making America a police state.” Its difficult to argue otherwise when passports may soon be necessary to travel domestically.
  •  
    This is among the reasons I no longer fly. I refuse to be treated in that distrustful way by my government. Atthough I used to fly several hundred thousands of miles annually, if the airlines want my business, they need to actively and effectively oppose the emergence of the surveillance state. I reject the politics of fear that attempts to justify suppression of liberties. Where I travel is none of the government's business.
3More

Why Isn't the Media Feeling the Bern? - 0 views

  • Let’s go to the scoreboard to see who’s winning the exciting presidential election media coverage game. The Tyndall Report, a non-partisan media monitoring firm that has been tracking the nightly news broadcasts of ABC, CBS, and NBC, found that Trump is tromp, tromp, tromping over the airtime of everyone else. From last January through November, these dominant flagship news shows devoted 234 minutes of prime-time coverage to the incessant chirping of the yellow-crested birdbrain, with no other contender getting even a fourth of that.
  • Take Bernie Sanders, who’s stunning the political establishment with a fiery populist campaign that’s drawing record crowds. Indeed, Sanders’ upstart campaign is commanding a comparable share of support within the Democratic Party’s voting base to what Trump is enjoying from the Republican electorate. And — get this — polls also show Bernie trouncing The Donald if they face each other in November’s presidential showdown. So surely he’s getting a proportional level of media coverage by the networks on our public airwaves, right? Ha, just kidding! The big networks’ devotion of 234 minutes to all-things-Trump was “balanced” by less than 10 minutes for Sanders. Most egregious was ABC, the Disney-owned network. ABC’s World News Tonight awarded 81 minutes of national showtime to Trump last year — and for Bernie: 20 seconds.
  •  
    Sanders is getting the MSM treatment that Ron Paul got in the 2012 election run-up.
11More

The NSA Is Building the Country's Biggest Spy Center (Watch What You Say) | Threat Leve... - 0 views

    • Paul Merrell
       
      There goes the neighborhood; the Feds are moving in. 
  • In the process—and for the first time since Watergate and the other scandals of the Nixon administration—the NSA has turned its surveillance apparatus on the US and its citizens. It has established listening posts throughout the nation to collect and sift through billions of email messages and phone calls, whether they originate within the country or overseas. It has created a supercomputer of almost unimaginable speed to look for patterns and unscramble codes. Finally, the agency has begun building a place to store all the trillions of words and thoughts and whispers captured in its electronic net. And, of course, it’s all being done in secret.
  • According to another top official also involved with the program, the NSA made an enormous breakthrough several years ago in its ability to cryptanalyze, or break, unfathomably complex encryption systems employed by not only governments around the world but also many average computer users in the US. The upshot, according to this official: “Everybody’s a target; everybody with communication is a target.
  • ...8 more annotations...
  • as a 2007 Department of Defense report puts it, the Pentagon is attempting to expand its worldwide communications network, known as the Global Information Grid, to handle yottabytes (1024 bytes) of data. (A yottabyte is a septillion bytes—so large that no one has yet coined a term for the next higher magnitude.) It needs that capacity because, according to a recent report by Cisco, global Internet traffic will quadruple from 2010 to 2015, reaching 966 exabytes per year. (A million exabytes equal a yottabyte.
  • The data stored in Bluffdale will naturally go far beyond the world’s billions of public web pages. The NSA is more interested in the so-called invisible web, also known as the deep web or deepnet—data beyond the reach of the public. This includes password-protected data, US and foreign government communications, and noncommercial file-sharing between trusted peers.
  • The broad outlines of the so-called warrantless-wiretapping program have long been exposed—how the NSA secretly and illegally bypassed the Foreign Intelligence Surveillance Court, which was supposed to oversee and authorize highly targeted domestic eavesdropping; how the program allowed wholesale monitoring of millions of American phone calls and email. In the wake of the program’s exposure, Congress passed the FISA Amendments Act of 2008, which largely made the practices legal. Telecoms that had agreed to participate in the illegal activity were granted immunity from prosecution and lawsuits. What wasn’t revealed until now, however, was the enormity of this ongoing domestic spying program. For the first time, a former NSA official has gone on the record to describe the program, codenamed Stellar Wind, in detail.
  • one of the deepest secrets of the Stellar Wind program—again, never confirmed until now—was that the NSA gained warrantless access to AT&T’s vast trove of domestic and international billing records, detailed information about who called whom in the US and around the world. As of 2007, AT&T had more than 2.8 trillion records housed in a database at its Florham Park, New Jersey, complex. Verizon was also part of the program
  • the NSA succeeded in building an even faster supercomputer. “They made a big breakthrough,” says another former senior intelligence official, who helped oversee the program. The NSA’s machine was likely similar to the unclassified Jaguar, but it was much faster out of the gate, modified specifically for cryptanalysis and targeted against one or more specific algorithms, like the AES.
  • The breakthrough was enormous, says the former official, and soon afterward the agency pulled the shade down tight on the project, even within the intelligence community and Congress. “Only the chairman and vice chairman and the two staff directors of each intelligence committee were told about it,” he says. The reason? “They were thinking that this computing breakthrough was going to give them the ability to crack current public encryption.”
  • But the real competition will take place in the classified realm. To secretly develop the new exaflop (or higher) machine by 2018, the NSA has proposed constructing two connecting buildings, totaling 260,000 square feet, near its current facility on the East Campus of Oak Ridge. Called the Multiprogram Computational Data Center,
  • n the meantime Cray is working on the next step for the NSA, funded in part by a $250 million contract with the Defense Advanced Research Projects Agency. It’s a massively parallel supercomputer called Cascade, a prototype of which is due at the end of 2012. Its development will run largely in parallel with the unclassified effort for the DOE and other partner agencies. That project, due in 2013, will upgrade the Jaguar XT5 into an XK6, codenamed Titan, upping its speed to 10 to 20 petaflops.
5More

Cut Off the NSA's Juice | Global Research - 0 views

  • The National Security Agency depends on huge computers that guzzle electricity in the service of the surveillance state. For the NSA’s top executives, maintaining a vast flow of juice to keep Big Brother nourished is essential — and any interference with that flow is unthinkable. But interference isn’t unthinkable. And in fact, it may be doable. Grassroots activists have begun to realize the potential to put the NSA on the defensive in nearly a dozen states where the agency is known to be running surveillance facilities, integral to its worldwide snoop operations. Organizers have begun to push for action by state legislatures to impede the electric, water and other services that sustain the NSA’s secretive outposts.
  • Those efforts are farthest along in the state of Washington, where a new bill in the legislature — the Fourth Amendment Protection Act — is a statutory nightmare for the NSA. The agency has a listening post in Yakima, in the south-central part of the state. The bill throws down a challenge to the NSA, seeking to block all state support for NSA activities violating the Fourth Amendment. For instance, that could mean a cutoff of electricity or water or other state-government services to the NSA site. And the measure also provides for withholding other forms of support, such as research and partnerships with state universities. Here’s the crux of the bill: “It is the policy of this state to refuse material support, participation, or assistance to any federal agency which claims the power, or with any federal law, rule, regulation, or order which purports to authorize, the collection of electronic data or metadata of any person pursuant to any action not based on a warrant that particularly describes the person, place, and thing to be searched or seized.” If the windup of that long sentence has a familiar ring, it should. The final dozen words are almost identical to key phrases in the Fourth Amendment of the U.S. Constitution.
  • In recent days, more than 15,000 people have signed a petition expressing support for the legislation. Launched by RootsAction.org, the petition is addressed to the bill’s two sponsors in the Washington legislature — Republican Rep. David Taylor, whose district includes the NSA facility in Yakima, and Democrat Luis Moscoso from the Seattle area. Meanwhile, a similar bill with the same title has just been introduced in the Tennessee legislature — taking aim at the NSA’s center based in Oak Ridge, Tenn. That NSA facility is a doozy: with several hundred scientists and computer specialists working to push supercomputers into new realms of mega-surveillance capacities. A new coalition, OffNow, is sharing information about model legislation. The group also points to known NSA locations in other states including Utah (in Bluffdale), Texas (San Antonio), Georgia (Augusta), Colorado (Aurora), Hawaii (Oahu) and West Virginia (Sugar Grove), along with the NSA’s massive headquarters at Fort Meade in Maryland. Grassroots action and legislative measures are also stirring in several of those states.
  • ...2 more annotations...
  • “By working together to tackle the erosion of the Fourth Amendment presented by bulk data collection,” Kellegrew said, “people from across partisan divides are resurrecting the lost art of collaboration and in the process, rehabilitating the possibility of a functional American political dialogue denied to the people by dysfunction majority partisan hackery.” From another vantage point, this is an emerging faceoff between reliance on cynical violence and engagement in civic nonviolence.
  • Serving the warfare state and overall agendas for U.S. global dominance to the benefit of corporate elites, the NSA persists in doing violence to the Constitution’s civil-liberties amendments — chilling the First, smashing the Fourth and end-running the Fifth. Meanwhile, a nascent constellation of movements is striving to thwart the surveillance state, the shadowy companion of perpetual war. This is a struggle for power over what kind of future can be created for humanity. It’s time to stop giving juice to Big Brother.
5More

Attention fliers: Canada's electronic spy agency is following you - new Snowden leaks -... - 0 views

  • Documents released by US whistleblower Edward Snowden show the Communications Security Establishment Canada (CSEC) used airport Wi-Fi to track passengers from around the world. Travelers passing through a major Canadian airport were potentially caught up in a vast electronic surveillance net, which allowed the nation’s electronic spy agency to track the wireless devices of thousands of airline passengers - even for days after they had departed the terminal, a document obtained by CBC News revealed. The document shows the spy agency was then able to track travelers for a week or more as the unwitting passengers, together with their wireless devices, visited other Wi-Fi "hot spots" in locations across Canada, and across the border at American airports.
  • After reviewing details of the leaked information, one of Canada's leading authorities on internet security says the secret operation was almost certainly illegal. "I can't see any circumstance in which this would not be unlawful, under current Canadian law, under our Charter, under CSEC's mandates," Professor Ronald Deibert, an internet security expert at the University of Toronto, told CBC News. It remains unclear from the leaked data how CSEC was able to infiltrate so many wireless devices to see who was using them, both on Canadian territory and beyond.
  • The CSEC is specifically tasked with gathering foreign intelligence by intercepting overseas phone and internet traffic, and is forbidden by law from collecting information on Canadians - or foreigners in Canada - without a court warrant. As CSEC Chief John Forster recently stated: "I can tell you that we do not target Canadians at home or abroad in our foreign intelligence activities, nor do we target anyone in Canada. "In fact, it's prohibited by law. Protecting the privacy of Canadians is our most important principle." However analysts who were privy to the document say that airline passengers in a Canadian airport were clearly on the territory of Canada. CSEC spokesperson Lauri Sullivan told the Star, an online Canadian news outlet, that the “classified document in question is a technical presentation between specialists exploring mathematical models built on everyday scenarios to identify and locate foreign terrorist threats.”
  • ...2 more annotations...
  • Early assessment of the leaked information indicates the passenger tracking operation was a trial run of a powerful new software program CSEC was developing with help from its American partner, the National Security Agency. The technology was to be shared with the so-called 'Five Eyes' surveillance bloc composed of Canada, the United States, Britain, New Zealand and Australia. In the document, CSEC described the new spy technology as "game-changing," saying it could be used for powerful surveillance on "any target that makes occasional forays into other cities/regions." Sources told CBC News the “technologies tested on Canadians in 2012 have since become fully operational.”
  • Ontario's privacy commissioner Ann Cavoukian admitted she is "blown away" by news of the secret operation. "It is really unbelievable that CSEC would engage in that kind of surveillance of Canadians," Cavoukian told the Canadian news agency. "This resembles the activities of a totalitarian state, not a free and open society."
4More

SPIEGEL Exclusive: NSA Spies on International Bank Transactions - SPIEGEL ONLINE - 0 views

  • The National Security Agency (NSA) widely monitors international payments, banking and credit card transactions, according to documents seen by SPIEGEL. The information from the American foreign intelligence agency, acquired by former NSA contractor and whistleblower Edward Snowden, show that the spying is conducted by a branch called "Follow the Money" (FTM). The collected information then flows into the NSA's own financial databank, called "Tracfin," which in 2011 contained 180 million records. Some 84 percent of the data is from credit card transactions. Further NSA documents from 2010 show that the NSA also targets the transactions of customers of large credit card companies like VISA for surveillance. NSA analysts at an internal conference that year described in detail how they had apparently successfully searched through the US company's complex transaction network for tapping possibilities.
  • Their aim was to gain access to transactions by VISA customers in Europe, the Middle East and Africa, according to one presentation. The goal was to "collect, parse and ingest transactional data for priority credit card associations, focusing on priority geographic regions." In response to a SPIEGEL inquiry, however, VISA issued a statement in which it said, "We are not aware of any unauthorized access to our network. Visa takes data security seriously and, in response to any attempted intrusion, we would pursue all available remedies to the fullest extent of the law. Further, its Visa's policy to only provide transaction information in response to a subpoena or other valid legal process." The NSA's Tracfin data bank also contained data from the Brussels-based Society for Worldwide Interbank Financial Telecommunication (SWIFT), a network used by thousands of banks to send transaction information securely. SWIFT was named as a "target," according to the documents, which also show that the NSA spied on the organization on several levels, involving, among others, the agency's "tailored access operations" division. One of the ways the agency accessed the data included reading "SWIFT printer traffic from numerous banks," the documents show.
  • But even intelligence agency employees are somewhat concerned about spying on the world finance system, according to one document from the UK's intelligence agency GCHQ concerning the legal perspectives on "financial data" and the agency's own cooperations with the NSA in this area. The collection, storage and sharing of politically sensitive data is a deep invasion of privacy, and involved "bulk data" full of "rich personal information," much of which "is not about our targets," the document says.
  •  
    NSA and GCHQ spying on banksters' transactions? I'll bet that comes to a screeching halt soon. Isn't it unwritten law in the Obama Administration that no government agencies mess with the banksters?
9More

White House OKd spying on allies, U.S. intelligence officials say - latimes.com - 0 views

  • The White House and State Department signed off on surveillance targeting phone conversations of friendly foreign leaders, current and former U.S. intelligence officials said Monday, pushing back against assertions that President Obama and his aides were unaware of the high-level eavesdropping. Professional staff members at the National Security Agency and other U.S. intelligence agencies are angry, these officials say, believing the president has cast them adrift as he tries to distance himself from the disclosures by former NSA contractor Edward Snowden that have strained ties with close allies. The resistance emerged as the White House said it would curtail foreign intelligence collection in some cases and two senior U.S. senators called for investigations of the practice. France, Germany, Italy, Mexico and Sweden have all publicly complained about the NSA surveillance operations, which reportedly captured private cellphone conversations by German Chancellor Angela Merkel, among other foreign leaders.
  • On Monday, as Spain joined the protest, the fallout also spread to Capitol Hill.
  • Until now, members of Congress have chiefly focused their attention on Snowden's disclosures about the NSA's collection of U.S. telephone and email records under secret court orders. "With respect to NSA collection of intelligence on leaders of U.S. allies — including France, Spain, Mexico and Germany — let me state unequivocally: I am totally opposed," said Sen. Dianne Feinstein (D-Calif.), who chairs the Senate Intelligence Committee. "Unless the United States is engaged in hostilities against a country or there is an emergency need for this type of surveillance, I do not believe the United States should be collecting phone calls or emails of friendly presidents and prime ministers," she said in a statement. Feinstein said the Intelligence Committee had not been told of "certain surveillance activities" for more than a decade, and she said she would initiate a major review of the NSA operation. She added that the White House had informed her that "collection on our allies will not continue," although other officials said most U.S. surveillance overseas would not be affected. Sen. John McCain (R-Ariz.), ranking minority member of the Armed Services Committee, said Congress should consider creating a special select committee to examine U.S. eavesdropping on foreign leaders.
  • ...5 more annotations...
  • "Obviously, we're going to want to know exactly what the president knew and when he knew it," McCain told reporters in Chicago. "We have always eavesdropped on people around the world. But the advance of technology has given us enormous capabilities, and I think you might make an argument that some of this capability has been very offensive both to us and to our allies."
  • Precisely how the surveillance is conducted is unclear. But if a foreign leader is targeted for eavesdropping, the relevant U.S. ambassador and the National Security Council staffer at the White House who deals with the country are given regular reports, said two former senior intelligence officials, who spoke on condition of anonymity in discussing classified information. Obama may not have been specifically briefed on NSA operations targeting a foreign leader's cellphone or email communications, one of the officials said. "But certainly the National Security Council and senior people across the intelligence community knew exactly what was going on, and to suggest otherwise is ridiculous." If U.S. spying on key foreign leaders was news to the White House, current and former officials said, then White House officials have not been reading their briefing books. Some U.S. intelligence officials said they were being blamed by the White House for conducting surveillance that was authorized under the law and utilized at the White House. "People are furious," said a senior intelligence official who would not be identified discussing classified information. "This is officially the White House cutting off the intelligence community."
  • Any decision to spy on friendly foreign leaders is made with input from the State Department, which considers the political risk, the official said. Any useful intelligence is then given to the president's counter-terrorism advisor, Lisa Monaco, among other White House officials. Jay Carney, the White House press secretary, said Monday that Obama had ordered a review of surveillance capabilities, including those affecting America's closest foreign partners and allies. "Our review is looking across the board at our intelligence gathering to ensure that as we gather intelligence, we are properly accounting for both the security of our citizens and our allies and the privacy concerns shared by Americans and citizens around the world," Carney said.
  • Caitlin Hayden, spokeswoman for the National Security Council, said the review would examine "whether we have the appropriate posture when it comes to heads of state, how we coordinate with our closest allies and partners, and what further guiding principles or constraints might be appropriate for our efforts." She said the review should be completed this year.
  • Intelligence officials also disputed a Wall Street Journal article Monday that said the White House had learned only this summer — during a review of surveillance operations that might be exposed by Snowden — about an NSA program to monitor communications of 35 world leaders. Since then, officials said, several of the eavesdropping operations have been stopped because of political sensitivities.
  •  
    Good. The Intelligence community is calling BS on Obama's claim that he didn't know about the spying on foreign heads of allied states. And McCain says we need a select Congressional committee to look into what the president knew and when he knew it. That's an implicit slam of the Feinstein-led Senate Select Committee on Intelligence's oversight of the intelligence agencies and a signal that there is a scandal lurking here. More importantly, a new select committee would not have the same membership as the existing Intelligence Community, which has largely functioned as a rubber stamp for what the intelligence agencies want. We have been down this road before, in the mid-70s, when the Defense Dept. intelligence agencies were caught spying on Americans, leading to the Select Committee investigation headed by former Sen. Frank Church and to the initial passage of the Foreign Intelligence Surveillance Act, among other legislation delivering a strong message to the intelligence agencies that what happens within the U.S. is off-limits to them. But that was a lesson forgotten as new technology came along for NSA to play with. If Obama is smart, he will promptly respond to the LA Times article with a clarification that top members of his staff knew and the previous statement dealt only with his personal knowledge. But the Obama Administration has overwhelmingly demonstrated an inability to head off scandals and a big tendency to cover-up rather than get out in front of story, particularly in matters involving the NSA. So we may see a major scandal emerge from this already enormous scandal that is laid directly at Barack Obama's feet, a cover-up scandal.   Who knew what when, where, why, and how? My favorite question. 
6More

Dutch MH17 Investigation Omits US "Intel". Fabrications and Omissions Supportive of US-... - 0 views

  • The absence of America’s so-called “intelligence” regarding the downing of Malaysia Airlines MH17 over Ukraine in a 34 page Dutch Safety Board preliminary report raises serious questions about the credibility and legitimacy of both America’s political agenda, and all agencies, organizations, and political parties currently behind it. The report titled, “Preliminary Report: Crash involving Malaysia Airlines Boeing 777-200 flight MH17″ (.pdf), cites a wide variety of evidence in its attempt to determine the cause of flight MH17′s crash and to prevent similar accidents or incidents from occurring again in the future. Among this evidence includes the cockpit voice recorder (CVR), the flight data recorder (FDR), analysis of recorded air traffic control (ATC) surveillance data and radio communication, analysis of the meteorological circumstances, forensic examination of the wreckage (if recovered and possible foreign objects if found), results of the pathological investigation, and analysis of the in-flight break up sequence.
  • Satellite images are referenced in regards to analyzing the crash site after the disaster, however, no where in the report is mentioned any evidence whatsoever of satellite images of missile launchers, intelligence from the United States regarding missile launches, or any information or evidence at all in any regard suggesting a missile had destroyed MH17. In fact, the report concludes by stating: This report is preliminary. The information must necessarily be regarded as tentative and subject to alternation or correction if additional evidence becomes available. Further work will at least include the following areas of interest to substantiate the factual information regarding:
  • The report specifically mentions information collected from Russia, including air traffic control and radar data – both of which were publicly shared by Russia in the aftermath of the disaster. The report also cites data collected from Ukraine air traffic controllers. The United States however, apart from providing technical information about the aircraft itself considering it was manufactured in the US, provided absolutely no data in any regard according to the report.
  • ...3 more annotations...
  • Had the US actually possessed any credible information to substantiate its claims that MH17 was shot down by a missile, such evidence surely would have been submitted to and included in the Dutch Safety Board’s preliminary reporting. That it is predictably missing confirms what commentators, analysts, and politicians around the world had long since suspected – the West’s premature conclusions regarding MH17′s demise were driven by a political agenda, not a factually based search for the truth. The evidence that MH17 was shot down by a missile as the West insisted is missing because it never existed in the first place. That the Dutch Safety Board possesses such a vast amount of information but is still unable to draw anything but the most tentative conclusions, exposes the alleged certainty of Western pundits and politicians in the hours and days after MH17′s loss as an utterly irresponsible, politically motivated, exploitation of tragedy at best, and at worst, exposing the West – NATO in particular – as possible suspects in a crime they clearly stood the most to benefit from.
  • In the wake of the MH17 tragedy, the West would rush through a series of sanctions against Russia as well as justify further military aid for the regime in Kiev, Ukraine and the literal Neo-Nazi militant battalions serving its pro-Western agenda amid a brutal civil war raging in the country’s eastern most provinces. With sanctions in hand, and the war raging on in earnest, the MH17 disaster dropped entirely out of Western narratives as if it never occurred. Surely if the West had solid evidence implicating eastern Ukrainian rebels and/or Russia, the world would never have heard the end of the MH17 disaster until the truth was fully aired before the public. When Dutch investigators published their preliminary report, the West merely reiterated its original claims, simply imposing their contradictory nature upon the report – most likely believing the public would never actually read its 34 pages. For example, Reuters in a report titled, “Malaysia: Dutch report suggests MH-17 shot down from ground,” would brazenly claim:
  • Malaysia Airlines flight MH17 broke apart over Ukraine due to impact from a large number of fragments, the Dutch Safety Board said on Tuesday, in a report that Malaysia’s prime minister and several experts said suggested it was shot down from the ground. The title of Reuters’ propaganda piece directly contradicts its first paragraph which reveals “experts,” not the actual Dutch Safety Board report, claimed it was “shot down from the ground,” while the report itself says nothing of the sort. The experts cited by Reuters in fact had no association whatsoever with the preliminary report and instead are the same mainstay of cherry picked commentators the West constantly defers to while building up and perpetuating utterly fabricated narratives to advance its agenda globally.
5More

NSA Drops Christmas Eve Surprise - The Intercept - 0 views

  • The National Security Agency on Christmas Eve day released twelve years of internal oversight reports documenting abusive and improper practices by agency employees. The heavily redacted reports to the President’s Intelligence Oversight Board found that NSA employees repeatedly engaged in unauthorized surveillance of communications by American citizens, failed to follow legal guidelines regarding the retention of private information, and shared data with unauthorized recipients. While the NSA has come under public pressure for openness since high-profile revelations by whistleblower Edward Snowden, the release of the heavily redacted internal reports at 1:30PM on Christmas Eve demonstrates limits to the agency’s attempts to demonstrate transparency. Releasing bad news right before a holiday weekend, often called a “Christmas Eve surprise,”  is a common tactic for trying to minimize press coverage.
  • The reports, released in response to a Freedom of Information Act request submitted by the American Civil Liberties Union, offer few revelations, but contain accounts of internal behavior embarrassing to the agency. In one instance an NSA employee “searched her spouse’s personal telephone directory without his knowledge to obtain names and telephone numbers for targeting”, a practice which previous reports have indicated was common enough to warrant the name “LOVEINT”. Many of the reports appear to deal with instances of human error rather than malicious misuse of agency resources. Nonetheless, many of these errors are potentially serious, including entries suggesting that unminimized U.S. telephone numbers were mistakenly disseminated to unauthorized parties and that military personnel were given unauthorized access to raw traffic databases collected under the Foreign Intelligence Services Act.
  • There are also accounts of simple bumbling by NSA employees, including the apparently common mistake of targeting their own communications for surveillance. In one unintentionally amusing passage, an NSA analyst is said to have “targeted his personal cellphone,” because he “mistakenly thought it would be acceptable to [redacted].” Another common example is the practice of NSA analysts accidentally designating their own communications as being those of a foreign intelligence target.
  • ...1 more annotation...
  • Even in their redacted form the reports give insight into the level of power individual agency employees have in ordering surveillance, and the intentional and unintentional abuses that can take place in an environment of minimal oversight. Though NSA officials have repeatedly suggested that the agency has rigorous safeguards in place to prevent individual employees from abusing their powers of surveillance, the agency’s own confidential internal reporting appears to contradict this. “The government conducts sweeping surveillance under this authority -— surveillance that increasingly puts Americans’ data in the hands of the NSA”, Patrick Toomey of the ACLU’s National Security Project said in comments to Bloomberg News. “Despite that fact, this spying is conducted almost entirely in secret and without legislative or judicial oversight.”
  •  
    NSA: not so squeaky clean and careful as it claimed. Surprise, surprise.
5More

New G20 Rules: Cyprus-style Bail-ins to Hit Depositors AND Pensioners | nsnbc internati... - 0 views

  • On the weekend of November 16th, the G20 leaders whisked into Brisbane, posed for their photo ops, approved some proposals, made a show of roundly disapproving of Russian President Vladimir Putin, and whisked out again.
  • It was all so fast, they may not have known what they were endorsing when they rubber-stamped the Financial Stability Board’s “Adequacy of Loss-Absorbing Capacity of Global Systemically Important Banks in Resolution,” which completely changes the rules of banking. Russell Napier, writing in ZeroHedge, called it “the day money died.” In any case, it may have been the day deposits died as money. Unlike coins and paper bills, which cannot be written down or given a “haircut,” says Napier, deposits are now “just part of commercial banks’ capital structure.” That means they can be “bailed in” or confiscated to save the megabanks from derivative bets gone wrong.
  • Rather than reining in the massive and risky derivatives casino, the new rules prioritize the payment of banks’ derivatives obligations to each other, ahead of everyone else. That includes not only depositors, public and private, but the pension funds that are the target market for the latest bail-in play, called “bail-inable” bonds. “Bail in” has been sold as avoiding future government bailouts and eliminating too big to fail (TBTF). But it actually institutionalizes TBTF, since the big banks are kept in business by expropriating the funds of their creditors. It is a neat solution for bankers and politicians, who don’t want to have to deal with another messy banking crisis and are happy to see it disposed of by statute. But a bail-in could have worse consequences than a bailout for the public. If your taxes go up, you will probably still be able to pay the bills. If your bank account or pension gets wiped out, you could wind up in the street or sharing food with your pets.
  • ...1 more annotation...
  • In theory, US deposits under $250,000 are protected by federal deposit insurance; but deposit insurance funds in both the US and Europe are woefully underfunded, particularly when derivative claims are factored in. The problem is graphically illustrated in a chart from a March 2013 ZeroHedge post. OCC Chart (Image, upper left).
  •  
    With commercial banks overloaded by investment bank derivative debt, a bank is the very last place one should park their money. See http://tinyurl.com/3oj7vbs and http://tinyurl.com/3ovf6ze FDIC insurance is now of value only to senior debtors, not to deposit account holders.
11More

Jim Crow returns | Al Jazeera America - 0 views

  • Election officials in 27 states, most of them Republicans, have launched a program that threatens a massive purge of voters from the rolls. Millions, especially black, Hispanic and Asian-American voters, are at risk. Already, tens of thousands have been removed in at least one battleground state, and the numbers are expected to climb, according to a six-month-long, nationwide investigation by Al Jazeera America. At the heart of this voter-roll scrub is the Interstate Crosscheck program, which has generated a master list of nearly 7 million names. Officials say that these names represent legions of fraudsters who are not only registered but have actually voted in two or more states in the same election — a felony punishable by 2 to 10 years in prison. Until now, state elections officials have refused to turn over their Crosscheck lists, some on grounds that these voters are subject to criminal investigation. Now, for the first time, three states — Georgia, Virginia and Washington — have released their lists to Al Jazeera America, providing a total of just over 2 million names.
  • The Crosscheck list of suspected double voters has been compiled by matching names from roughly 110 million voter records from participating states. Interstate Crosscheck is the pet project of Kansas’ controversial Republican secretary of state, Kris Kobach, known for his crusade against voter fraud. The three states’ lists are heavily weighted with names such as Jackson, Garcia, Patel and Kim — ones common among minorities, who vote overwhelmingly Democratic. Indeed, fully 1 in 7 African-Americans in those 27 states, plus the state of Washington (which enrolled in Crosscheck but has decided not to utilize the results), are listed as under suspicion of having voted twice. This also applies to 1 in 8 Asian-Americans and 1 in 8 Hispanic voters. White voters too — 1 in 11 — are at risk of having their names scrubbed from the voter rolls, though not as vulnerable as minorities.If even a fraction of those names are blocked from voting or purged from voter rolls, it could alter the outcome of next week’s electoral battle for control of the U.S. Senate — and perhaps prove decisive in the 2016 presidential vote count.
  • Based on the Crosscheck lists, officials have begun the process of removing names from the rolls — beginning with 41,637 in Virginia alone. Yet the criteria used for matching these double voters are disturbingly inadequate.
  • ...8 more annotations...
  • In practice, all it takes to become a suspect is sharing a first and last name with a voter in another state. Typical “matches” identifying those who may have voted in both Georgia and Virginia include:Kevin Antonio Hayes of Durham, North Carolina, is a match for a man who voted in Alexandria, Virginia, as Kevin Thomas Hayes.John Paul Williams of Alexandria is supposedly the same man as John R. Williams of Atlanta, Georgia.Robert Dewey Cox of Marietta, Georgia is matched with Robert Glen Cox of Springfield, Virginia.
  • That was the sales pitch. But the actual lists show that not only are middle names commonly mismatched and suffix discrepancies ignored, even birthdates don’t seem to have been taken into account. Moreover, Crosscheck deliberately ignores Social Security mismatches, in the few instances when the numbers are even collected. The Crosscheck instructions for county election officers state, “Social Security numbers are included for verification; the numbers might or might not match.”
  • There are 6,951,484 names on the target list of the 28 states in the Crosscheck group; each of them represents a suspected double voter whose registration has now become subject to challenge and removal. According to a 2013 presentation by Kobach to the National Association of State Election Directors, the program is a highly sophisticated voter-fraud-detection system. The sample matches he showed his audience included the following criteria: first, last and middle name or initial; date of birth; suffixes; and Social Security number, or at least its last four digits.
  • Al Jazeera America visited these and several other potential double voters. John Paul Williams of Alexandria insists he has never used the alias “John R. Williams.” “I’ve never lived in Georgia,” he says.Jo Cox, wife of suspected double voter Robert Glen Cox of Virginia, says she has a solid alibi for him. Cox “is 85 years old and handicapped. He wasn’t in Georgia. Never voted there,” she says. He has also never used the middle name “Dewey.” Twenty-three percent of the names — nearly 1.6 million of them — lack matching middle names. “Jr.” and “Sr.” are ignored, potentially disenfranchising two generations in the same family. And, notably, of those who may have voted twice in the 2012 presidential election, 27 percent were listed as “inactive” voters, meaning that almost 1.9 million may not even have voted once in that race, according to Crosscheck’s own records.
  • Mark Swedlund is a specialist in list analytics whose clients have included eBay, AT&T and Nike. At Al Jazeera America’s request, he conducted a statistical review of Crosscheck’s three lists of suspected double voters. According to Swedlund, “It appears that Crosscheck does have inherent bias to over-selecting for potential scrutiny and purging voters from Asian, Hispanic and Black ethnic groups. In fact, the matching methodology, which presumes people in other states with the same name are matches, will always over-select from groups of people with common surnames.” Swedlund sums up the method for finding two-state voters — simply matching first and last name — as “ludicrous, just crazy.”
  • elen Butler is the executive director of Georgia’s Coalition for the Peoples’ Agenda, which conducts voter drives in minority communities. Any purge list that relies on name matches will contain a built-in racial bias against African-Americans, she says, because “We [African-Americans] took our slave owners’ names.” The search website PeopleSmart notes that 86,020 people in the United States have the name John Jackson. And according to the 2000 U.S. Census, which is the most recent data set, 53 percent of Jacksons are African-American.
  • In North Carolina, state officials have hired former FBI agent Charles W. “Chuck” Stuber, who played a major role in the campaign finance fraud case brought against former North Carolina Sen. John Edwards, to, in the words of their press release, “investigate cases of possible voter fraud identified by an interstate cross-check comparing election records from 28 states.”
  • But despite knowing the names and addresses of 192,207 supposed double voters in the state, Stuber has not nabbed a single one in his five months on the job. Josh Lawson, a spokesman for the board of elections, says, “This agency has made no determination as to which portion of these [lists] represent data error or voter fraud.” In fact, to date, Lawson admits that Stuber has found only errors and not one verified fraudulent voter.
3More

Poland Considers Deployment of U.S. Tactical Nuclear Weapons, Directed against Russia |... - 0 views

  • Last weekend, Polish Deputy Defense Minister Tomasz Szatkowski said that Poland is considering asking for access to nuclear weapons through a NATO program allowing non-nuclear states “to borrow” the warheads from the US. This is a reverberation from the intensified debates within alliances regarding the nuclear support of NATO’s operations.
  • Commenting on the debates that took place during an Oct. 8 meeting in Brussels between the defense ministers of NATO countries, Adam Thomson, the UK Permanent Representative to NATO, publicly bemoaned the fact that the alliance “has done conventional exercising and nuclear exercising” but has not conducted exercises on “the transition from one to the other.” He claimed that such a recommendation is being looked at within the North Atlantic alliance. NATO Secretary General Jens Stoltenberg also supports strengthening the nuclear component in the military planning of this alliance that has identified Russia as its primary enemy. In their analyses, military-political and academic insiders in the West typically do not distinguish between the strategic and tactical nuclear weapons belonging to the three Western nuclear powers: the UK, US, and France. As they calculate how best to defend “the entire territory of NATO,” they begin with the assumption that all those nuclear weapons can be commanded en masse. And because those weapons must be used “as a means to deter aggression, along with conventional weapons,” their special status should once again be recognized, as it was during the height of the Cold War during the 1960s-1980s.
  • In his statement Tomasz Szatkowski emphasized the need for the Polish armed forces to have access to the same American nuclear weapons as those entrusted to five of the member states of the North Atlantic pact: Belgium, Italy, the Netherlands, Turkey and Germany, all of which consented to stationing those weapons within their borders: “We want to see an end to the division of NATO members into two categories,” he said, explaining that he was referring to states that have long hosted American nuclear weapons vs. countries that still do not have them, meaning the allies that have only recently joined this military bloc, especially Poland. The Polish Defense Ministry hastened to disavow their own colleague’s words, arguing that “within the defense ministry there is presently no work underway concerning the accession of our country to the NATO Nuclear Sharing program.” But the further clarification that followed this message suggests otherwise, since the Polish defense ministry literally stated the following: “We have to consider various options, including some form of Poland’s participation in this program.” And as we all know, that program allows US nuclear weapons to be deployed within the borders of other states and to be used in military exercises that include the dropping of mock “nuclear bombs” from aircraft. We must also look closely at how the first part of that answer is expressed: “there is presently no work underway …” Today. And perhaps that is true. But in the future?
1More

Another Unnecessary War - LobeLog - 0 views

  • The writing is already on the wall: Israel will soon launch a military operation in Lebanon. Not a targeted attack on a weapons convoy or factory, but a simultaneous attack on Hezbollah’s missile production and launch sites. The operation will take place at the same time as, or immediately after, a series of assassinations of known Hezbollah operatives. That organization will, of course, react by launching a massive missile barrage at population centers in Israel, and Hamas may contribute its share in the south. Last week we were informed that missile interceptor systems have already been deployed throughout the country as part of a joint “drill” between the IDF and the U.S. military. Washington has already given a green light, or so we learn from Thomas Friedman’s most recent column — a faithful mouthpiece of American foreign policy.
2More

Missouri house bans cellphone tracking without a warrant, 134-13 | Tenth Amendment Cent... - 0 views

  • Yesterday, the Missouri house overwhelmingly approved a bill to ban the obtaining of cellphone location tracking information without a warrant. House Bill 1388 (HB1388) prohibits use of such information in civil or criminal proceedings, and even bans its use as “an affidavit of probable cause in an effort to obtain a search warrant.” Introduced by Rep. Robert Cornejo, the measure passed by a vote of 134-13. HB1388 will not only add a key protection to bolster the privacy rights of Missourians from potential local abuse, it will also end some practical effects of unconstitutional data gathering by the federal government. NSA collects, stores, and analyzes data on countless millions of people without a warrant, and without even the mere suspicion of criminal activity. The NSA tracks the physical location of people through their cellphones. In late 2013, the Washington Post reported that NSA is “gathering nearly 5 billion records a day on the whereabouts of cellphones around the world.” This includes location data on “tens of millions” of Americans each year – without a warrant. Through fusion centers, state and local law enforcement act as “information recipients” to various federal departments under Information Sharing Environment (ISE). ISE partners include the Office of Director of National Intelligence, which is an umbrella covering 17 federal agencies and organizations, including the NSA.
  • The NSA expressly shares warrantless data with state and local law enforcement through a super-secret DEA unit known as the Special Operations Division (SOD). That information is being used for criminal prosecutions. Reuters reported that most of this shared data has absolutely nothing to do with national security issues. Most of it involves routine criminal investigations. In short – banning state government entities in Missouri from obtaining phone location tracking information without a warrant will block them from receiving that kind of information from federal agencies who routinely collect it without warrant. HB1388 is part of a package of bills designed to thwart the surveillance state being considered in the Missouri legislature this year.  SB819 would deny compliance and material support from the state to the NSA as long as they continue their unconstitutional spying programs. SJR27 would amend the Missouri State Constitution to protect residents’ electronic data from warrantless searches. HB1388 now moves to the State Senate where it will first be assigned to a committee for approval before the full senate has an opportunity to send it to Gov. Nixon’s desk for a signature.
4More

BBC News - MEPs vote to suspend US data sharing - 0 views

  • The European Parliament has voted to suspend the sharing of financial data with the US, following allegations that citizens' data was spied on. The allegation forms part of leaked documents from whistleblower Edward Snowden. The vote is non-binding but illustrates MEPs' growing unease over how much data was shared with the US.
  • It comes a day after it was alleged that German Chancellor Angela Merkel's mobile phone calls were monitored. The European Parliament voted to suspend its Terrorist Finance Tracking Program (TFTP) agreement with the US, in response to the alleged tapping of EU citizens' bank data held by the Belgian company SWIFT. The agreement granted the US authorities access to bank data for terror-related investigations but leaked documents made public by whistleblower Edward Snowden allege that the global bank transfer network was the target of wider US surveillance. MEPs also want to launch a full inquiry into the alleged spying.
  • The row over exactly how much snooping was done on European citizens appears to be escalating. Germany has summoned the US ambassador in Berlin over the claims that the US monitored Mrs Merkel's mobile phone calls. Other leaders are also likely to want further clarification from Washington over the activities of its National Security Agency (NSA) in Europe.
  •  
    See also closely related earlier legal opinion by a European Commission advisory committee. http://ec.europa.eu/justice/policies/privacy/docs/wpdocs/2006/wp128_en.pdf
« First ‹ Previous 101 - 120 of 251 Next › Last »
Showing 20 items per page