Skip to main content

Home/ Socialism and the End of the American Dream/ Group items matching "started" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
5More

Testosterone Pit - Home - NSA Revelations Kill IBM Hardware Sales in China - 0 views

  • The first shot was fired on Monday. Teradata, which sells analytics tools for Big Data, warned that quarterly revenues plunged 21% in Asia and 19% in the Middle East and Africa. Wednesday evening, it was IBM’s turn to confess that its hardware sales in China had simply collapsed. Every word was colored by Edward Snowden’s revelations about the NSA’s hand-in-glove collaboration with American tech companies, from startups to mastodons like IBM.
  • The explanation is more obvious. In mid-August, an anonymous source told the Shanghai Securities News, a branch of the state-owned Xinhua News Agency, which reports directly to the Propaganda and Public Information Departments of the Communist Party, that IBM, along with Oracle and EMC, have become targets of the Ministry of Public Security and the cabinet-level Development Research Centre due to the Snowden revelations. “At present, thanks to their technological superiority, many of our core information technology systems are basically dominated by foreign hardware and software firms, but the Prism scandal implies security problems,” the source said, according to Reuters. So the government would launch an investigation into these security problems, the source said. Absolute stonewalling ensued. IBM told Reuters that it was unable to comment. Oracle and EMC weren’t available for comment. The Ministry of Public Security refused to comment. The Development Research Centre knew nothing of any such investigation. The Ministry of Industry and Information Technology “could not confirm anything because of the matter’s sensitivity.”
  • I’d warned about its impact at the time [read.... US Tech Companies Raked Over The Coals In China]. Snowden’s revelations started hitting in May. Not much later, the Chinese security apparatus must have alerted IT buyers in government agencies, state-owned enterprises, and major independent corporations to turn off the order pipeline for sensitive products until this is sorted out. As Mr. Loughridge’s efforts have shown, it’s hard to explain any other way that hardware sales suddenly collapsed by “40%, 50%” in China, where they’d boomed until then. This is the first quantitative indication of the price Corporate America has to pay for gorging at the big trough of the US Intelligence Community, and particularly the NSA with its endlessly ballooning budget. For once, there is a price to be paid, if only temporarily, for helping build a perfect, seamless, borderless surveillance society. The companies will deny it. At the same time, they’ll be looking for solutions. China, Russia, and Brazil are too important to just get kicked out of – and other countries might follow suit. In September, IBM announced that it would throw another billion at Linux, the open-source operating system, to run its Power System servers – the same that China had stopped buying. It seems IBM was trying to make hay of the NSA revelations that had tangled up American operating system makers. Linux, free of NSA influence, would be a huge competitive advantage for IBM. Or so it would seem. Read.... The Other Reason Why IBM Throws A Billion At Linux (With NSA- Designed Backdoor)
  • ...1 more annotation...
  • The first shot was fired on Monday. Teradata, which sells analytics tools for Big Data, warned that quarterly revenues plunged 21% in Asia and 19% in the Middle East and Africa. Wednesday evening, it was IBM’s turn to confess that its hardware sales in China had simply collapsed. Every word was colored by Edward Snowden’s revelations about the NSA’s hand-in-glove collaboration with American tech companies, from startups to mastodons like IBM.
  •  
    It's starting to look as though the price of NSA collaboration is bankruptcy. Look for Big Blue to attempt to recover the loss from the U.S. government via some juicy deal.
6More

Asia Times Online :: The self-beheading House of Saud - 0 views

  • By Pepe Escobar Don't count on a female Saudi playwright writing a 21st century remix of John Osborne's Look Back in Anger starring a bunch of non-working class Saudi royals. But anger it is - from King Abdullah downwards; not only at the UN's "double standards" but especially - hush hush - at the infidel Obama administration. This is the official Saudi explanation for spurning a much-coveted two-year term at the UN Security Council, only hours after its nomination. No wonder the House of Saud's unprecedented self-beheading move was praised only by the usual minion suspects; petro-monarchies of the Gulf Counter-revolution Club, aka Gulf <a href='http://asianmedia.com/GAAN/www/delivery/ck.php?n=a9473bc7&cb=%n' target='_blank'><img src='http://asianmedia.com/GAAN/www/delivery/avw.php?zoneid=36&cb=%n&n=a9473bc7&ct0=%c' border='0' alt='' ></a> Cooperation Council (GCC) as well as Egypt, who now depends on Saudi money to pay its bills and barely survive. Kuwait shared Riyadh's pain, enough to send "a message to the world". The UAE said the UN now had the "historical responsibility" to review its role. Bahrain - invaded by the Saudis in 2001 - stressed the "clear and courageous stand". Cairo said the whole thing was "brave".
  • How brave, indeed, to lobby Arab and Pacific nations for two years, and to spend a fortune training a dozen diplomats in New York for months just to say "no" when you get the prize. The House of Saud would have replaced Pakistan with a Pacific seat; Morocco stays until 2015, in an African seat. As early as five months ago the Saudi seat was considered a done deal at the UN.
  • Apart from a few Middle Eastern spots, no one is seriously losing sleep over the adolescent Saudi move - which displays a curious notion of leverage, as in choosing a PR spin reinventing the corrupt petro-monarchy as the "principled" champions of a cause (UN reform) just as they might have a crack at trying to influence it from within. That would have implied more scrutiny. For instance, this Monday the Human Rights Council, another UN institution, duly blasted Saudi Arabia on its sterling record of discrimination against women and sectarianism, following reports by Human Rights Watch and Amnesty International. As a member of the UN Security Council, the discrepancy between the medievalist reality inside Saudi Arabia and its lofty "reformist" agenda would be even more glaring.
  • ...3 more annotations...
  • The perennial Saudi Foreign Minister, Prince Saud al-Faisal had lunch with US Secretary of State John Kerry at the Prince's very private luxury digs in Paris this Monday. The mystery is which kafir fluid was consumed; no doubts though in the official, harmless spin; they agreed on a nuclear-free Iran, an end to the war in Syria and a "stable" Egypt. Before the Paris bash, during the weekend, Bandar Bush was already in his trademark full gear, openly announcing to European diplomats in Riyadh that he will buy his Syria-bound weapons somewhere else, will dissociate his scheme from the CIA, and will train "his" rebels with other players, mostly France and Jordan. The Wall Street Journal has the story, which predictably has not surfaced in Arab media (90% of it controlled by different branches of the House of Saud). Even more interesting is two other pieces of information leaked by diplomats. The House of Saud wanted the US to provide them with targets to be hit inside Syria when Obama's kinetic whatever would start. Washington adamantly refused.
  • Better yet; Washington allegedly told Riyadh the US would not be able to defend the Shi'ite majority, oil-rich Eastern Province if the Tomahawks started flying over Syria. Imagine the horror show in Riyadh; after all, mob protection against petrodollars recycled/invested in the US economy is the basis of this dysfunctional marriage for nearly seven decades. So that should lead us to the now much hyped "independent Saudi foreign policy posture" to be implemented in relation to Washington. Don't hold your breath. As much as the House of Saud is completely paranoid regarding the Obama administration's latest moves, throwing a fit will not change the way the geopolitical winds are blowing. Iran's geopolitical ascent is inevitable. A Syrian solution is on the horizon. No one wants batshit crazy jihadis roaming free from Syria to Iraq to the wider Middle East. The Saudi spin about creating "a new security arrangement for the Arab world" is a joke - as depicted by Saudi-financed shills such as this.
  • The bottom line is that an angry, fearful House of Saud does not have what it takes to confront benign protector Washington. Throwing a fit - as in crying to attract attention - is for geopolitical babies. Without the US - or "the West" - who's gonna run the Saudi energy industry? PhD-deprived camels? And who's gonna sell (and maintain) those savory weapons? Who's going to defend them for smashing the true spirit of the Arab Spring, across the GCC and beyond? Perennial Foreign Minister Prince Saud is gravely ill. He will be replaced by a recently appointed deputy prime minister. Guess who? Prince Abdul Aziz bin Abdullah, the king's son. Instead of a "principled" stance against "double standards", the House of Saud move at the UN feels more like nepotism.
13More

White House defends 'Cuban Twitter' to stir unrest - Yahoo News - 0 views

  • The Obama administration defended its creation of a Twitter-like Cuban communications network to undermine the communist government, declaring the secret program was "invested and debated" by Congress and wasn't a covert operation that required White House approval.
  • But two senior Democrats on congressional intelligence and judiciary committees said Thursday they had known nothing about the effort, which one of them described as "dumb, dumb, dumb." A showdown with that senator's panel is expected next week, and the Republican chairman of a House oversight subcommittee said that it, too, would look into the program.An Associated Press investigation found that the network was built with secret shell companies and financed through a foreign bank. The project, which lasted more than two years and drew tens of thousands of subscribers, sought to evade Cuba's stranglehold on the Internet with a primitive social media platform.First, the network was to build a Cuban audience, mostly young people. Then, the plan was to push them toward dissent.
  • Yet its users were neither aware it was created by a U.S. agency with ties to the State Department, nor that American contractors were gathering personal data about them, in the hope that the information might be used someday for political purposes.It is unclear whether the scheme was legal under U.S. law, which requires written authorization of covert action by the president as well as congressional notification. White House spokesman Jay Carney said he was not aware of individuals in the White House who had known about the program.
  • ...9 more annotations...
  • USAID's top official, Rajiv Shah, is scheduled to testify on Tuesday before the Senate Appropriations State Department and Foreign Operations Subcommittee, on the agency's budget. The subcommittee's chairman, Patrick Leahy, a Democrat, is the senator who called the project "dumb, dumb, dumb" during an appearance Thursday on MSNBC.The administration said early Thursday that it had disclosed the initiative to Congress — Carney said the program had been "debated in Congress" — but hours later the narrative had shifted to say that the administration had offered to discuss funding for it with the congressional committees that approve federal programs and budgets."We also offered to brief our appropriators and our authorizers," said State Department spokeswoman Marie Harf. She added that she was hearing on Capitol Hill that many people support these kinds of democracy promotion programs. And some lawmakers did speak up on that subject. But by late Thursday no members of Congress had acknowledged being aware of the Cuban Twitter program earlier than this week.
  • Harf described the program as "discreet" but said it was in no way classified or covert. Harf also said the project, dubbed ZunZuneo, did not rise to a level that required the secretary of state to be notified. Neither former Secretary of State Hillary Rodham Clinton nor John Kerry, the current occupant of the office, was aware of ZunZuneo, she said.In his prior position as chairman of the Senate Foreign Relations Committee, Kerry had asked congressional investigators to examine whether or not U.S. democracy promotion programs in Cuba were operated according to U.S. laws, among other issues. The resulting report, released by the Government Accountability Office in January 2013, does not examine whether or not the programs were covert. It does not say that any U.S. laws were broken.The GAO report does not specifically refer to ZunZuneo, but does note that USAID programs included "support for the development of independent social networking platforms."
  • "I know they said we were notified," Leahy told AP. "We were notified in the most oblique way, that nobody could understand it. I'm going to ask two basic questions: Why weren't we specifically told about this if you're asking us for money? And secondly, whose bright idea was this anyway?"The Republican chairman of a House oversight subcommittee said his panel will be looking into the project, too."That is not what USAID should be doing," said Rep. Jason Chaffetz, the Republican chairman of the House Oversight and Government Reform National Security Subcommittee. "USAID is flying the American flag and should be recognized around the globe as an honest broker of doing good. If they start participating in covert, subversive activities, the credibility of the United States is diminished."
  • At minimum, details uncovered by the AP appear to muddy the USAID's longstanding claims that it does not conduct covert actions, and the details could undermine the agency's mission to deliver aid to the world's poor and vulnerable — an effort that requires the trust and cooperation of foreign governments.Leahy and Rep. C.A. Dutch Ruppersberger, the top Democrat on the House Intelligence Committee, said they were unaware of ZunZuneo.
  • USAID and its contractors went to extensive lengths to conceal Washington's ties to the project, according to interviews and documents obtained by the AP. They set up front companies in Spain and the Cayman Islands to hide the money trail, and recruited CEOs without telling them they would be working on a U.S. taxpayer-funded project."There will be absolutely no mention of United States government involvement," according to a 2010 memo from Mobile Accord Inc., one of the project's creators. "This is absolutely crucial for the long-term success of the service and to ensure the success of the Mission."ZunZuneo was publicly launched shortly after the 2009 arrest in Cuba of American contractor Alan Gross. He was imprisoned after traveling repeatedly to the country on a separate, clandestine USAID mission to expand Internet access using sensitive technology that only governments use.The AP obtained more than 1,000 pages of documents about the ZunZuneo project's development. It independently verified the project's scope and details in the documents through publicly available databases, government sources and interviews with those involved.
  • The social media project began after Washington-based Creative Associates International obtained a half-million Cuban cellphone numbers. It was unclear to the AP how the numbers were obtained, although documents indicate they were done so illicitly from a key source inside the country's state-run provider. Project organizers used those numbers to start a subscriber base.ZunZuneo's organizers wanted the social network to grow slowly to avoid detection by the Cuban government. Eventually, documents and interviews reveal, they hoped the network would reach critical mass so that dissidents could organize "smart mobs" — mass gatherings called at a moment's notice — that could trigger political demonstrations, or "renegotiate the balance of power between the state and society."At a 2011 speech at George Washington University, Clinton said the U.S. helps people in "oppressive Internet environments get around filters." Noting Tunisia's role in the Arab Spring, she said people used technology to help "fuel a movement that led to revolutionary change."Suzanne Hall, then a State Department official working on Clinton's social media efforts, helped spearhead an attempt to get Twitter founder Jack Dorsey to take over the ZunZuneo project, documents indicate. Dorsey declined to comment.
  • The estimated $1.6 million spent on ZunZuneo was publicly earmarked for an unspecified project in Pakistan, public government data show, but those documents don't reveal where the funds were actually spent.ZunZuneo's organizers worked hard to create a network that looked like a legitimate business, including the creation of a companion website — and marketing campaign — so users could subscribe and send their own text messages to groups of their choice."Mock ad banners will give it the appearance of a commercial enterprise," one written proposal obtained by the AP said. Behind the scenes, ZunZuneo's computers were also storing and analyzing subscribers' messages and other demographic information, including gender, age, "receptiveness" and "political tendencies." USAID believed the demographics on dissent could help it target its other Cuba programs and "maximize our possibilities to extend our reach."
  • Executives set up a corporation in Spain and an operating company in the Cayman Islands — a well-known British offshore tax haven — to pay the company's bills so the "money trail will not trace back to America," a strategy memo said. Disclosure of that connection would have been a catastrophic blow, they concluded, because it would undermine the service's credibility with subscribers and get it shut down by the Cuban government.Similarly, subscribers' messages were funneled through two other countries — and never through American-based computer servers.Denver-based Mobile Accord considered at least a dozen candidates to head the European front company. One candidate, Francoise de Valera, told the AP she was told nothing about Cuba or U.S. involvement.
  • James Eberhard, Mobile Accord's CEO and a key player in the project's development, declined to comment. Creative Associates referred questions to USAID.For more than two years, ZunZuneo grew, reaching at least 40,000 subscribers. But documents reveal the team found evidence Cuban officials tried to trace the text messages and break into the ZunZuneo system. USAID told the AP that ZunZuneo stopped in September 2012 when a government grant ended.
  •  
    More coming related to this story.
3More

M of A - U.S. Again Gunning For "Regime Change" In Iraq - 0 views

  • Three days ago we said: The U.S. has conditioned any involvement on the Iraqi government side on a change in its structure towards some "unity government" that would include representatives of the rebellious Sunni strains. Prime Minister Maliki, who received good results in the recent elections, will see no reason to go for that. As expected Maliki declined to follow orders out of Washington DC and he is right to do so. Isn't Iraq supposed to be a sovereign state? No says Washington. It is us who are choosing a new Iraqi prime minister: Over the past two days the American ambassador, Robert S. Beecroft, along with Brett McGurk, the senior State Department official on Iraq and Iran, have met with Usama Nujaifi, the leader of the largest Sunni contingent, United For Reform, and with Ahmad Chalabi, one of the several potential Shiite candidates for prime minister, according to people close to each of those factions, as well as other political figures. “Brett and the ambassador met with Mr. Nujaifi yesterday and they were open about this, they do not want Maliki to stay,” Nabil al-Khashab, the senior political adviser to Mr. Nujaifi, said Thursday.
  • This move lets arouse suspicions that the recent insurgency against the Iraqi state, with ISIS takfiris in the front line, did not just by chance started after Maliki's party, the State of Law Coalition, won in the parliamentary elections a few weeks ago. It had been decided that he had to go. When the elections confirmed him, other methods had to be introduced. Thus the insurgency started and is now used as a pretext for "regime change". The U.S. media and policies again fall for the "big bad man" cliche portraying Nouri al-Maliki (Arabic for Ngo Dinh Diem) as the only person that stands in the way of Iraq as a "liberal democracy". That is of course nonsense. Maliki is not the problem in Iraq: The most significant factor behind Iraq’s problems has been the inability of Iraq’s Sunni Arabs and its Sunni neighbors to come to terms with a government in which the Shias, by virtue of their considerable majority in Iraq’s population, hold the leading role. This inability was displayed early on, when Iraq’s Sunnis refused to take part in Iraq’s first parliamentary elections, and resorted to insurgency almost immediately after the US invasion and fall of Saddam Hussein. All along, the goal of Iraqi Sunnis has been to prove that the Shias are not capable of governing Iraq. Indeed, Iraq’s Sunni deputy prime minister, Osama al Najafi, recently verbalized this view. The Sunnis see political leadership and governance to be their birthright and resent the Shia interlopers.
  • The U.S., with strong support from its GCC allies who finance the insurgency, now seems to again lean towards the Sunni minority side in Iraq and wants to subvert the ruling of a Shia majority and its candidate. Maliki doesn't follow Washington orders, is somewhat friendly with Iran and even wins elections. Such man can not be let standing. So the program is again "regime change" in Iraq, now with the help of Jihadists proxies, even after the recent catastrophic "successes" in similar endeavors in Libya, Egypt and Ukraine and the failure in Syria. Phil Greaves seems thereby right when he characterizes the insurgency and ISIS as a expression of Washington's imperialism: The ISIS-led insurgency currently gripping the western and northern regions of Iraq is but a continuation of the imperialist-sponsored insurgency in neighboring Syria. The state actors responsible for arming and funding said insurgency hold the same principal objectives in Iraq as those pursued in Syria for the last three years, namely: the destruction of state sovereignty; weakening the allies of an independent Iran; the permanent division of Iraq and Syria along sectarian lines establishing antagonistic “mini-states” incapable of forming a unified front against US/Israeli imperial domination. The best thing Maliki could now do is to shut down the U.S. embassy and request support from Russia, China and Iran. South Iraq is producing lots of oil and neither money nor the number of potential recruits for a big long fight are his problem. His problem is the insurgency and the states, including the United States, behind it. The fight would be long and Iraq would still likely be parted but the likely outcome would at least guarantee that the will of the majority constituency can not be ignored by outside actors.
3More

M of A - A Too Complicated Game: Obama's Deals With The Saudis And Al-Nusra - 0 views

  • According to the Wall Street Journal Obama made a deal with the Saudis. They will lend legitimacy for his attacks against the Islamic State and AlQaeda in Syria (aka Jabhat al-Nusra) and he will later overthrow the Syrian government under president Assad. Like the Saudi prince Bandar, who nutured the Jihadists, was ousted over it, but is now back in the deal, the neocon editors of The Economist are doing victory jumps. They managed to get the U.S. back into their war. Hurray! But as I understand it Obama's part of the deal is supposed come only later. It will take a year to train the "moderate, vetted" insurgents in Saudi Arabia and only when those are ready, and Obama a lame duck, may such action start (or not). U.S. voters know very well that Obama always keeps his promises (not). A year can be a quite a long time and who knows what will happen in between. The urgency of the deal with the Saudis may have come because some folks felt a time-critical need to attack the al-Qaeda (Jabhat al-Nusra) leadership in Syria. It may also have come from the low polls of Obama's leadership and his need to keep the Senate in the hands of Democrats after Novembers election. The second reason seems more likely.
  • To justify the hit on the leadership group it had to be differentiated from the ""the moderate Jihadis" al-Nusra organization with which there is cooperation on other issues. The "Khorasan" group was invented and a FUD campaign launched to justify the attack. The U.S. media predictably ate it all up and propagandized every fearmongering bit of what "officials said" about Khorasan. Only after the attack has taken place are doubts allowed to be aired: Several of Mr. Obama’s aides said Tuesday that the airstrikes against the Khorasan operatives were launched to thwart an “imminent” terrorist attack, possibly using concealed explosives to blow up airplanes. But other American officials said that the plot was far from mature, and that there was no indication that Khorasan had settled on a time or location for the attack — or even on the exact method of carrying out the plot.
  • Some speculation: Jabhat al-Nusra is a nominal part of the al-Qaeda organization. It was led by al-Qaeda veterans who had been fighting in AfPak but came to Syria when the insurgency started. The U.S. relabeled these veterans the "Khorasan" group to have some reason to separately eliminate them. Their replacement may well turn out to be local men currently leading the groups in southern Syria and willing to further cooperate with USrael. A new version of the moderate cuddly homegrown al-Qaeda ploy. The whole game played within the various proxy wars within the current Syriraq war is becoming increasingly complicate. I would not be astonished to see Obama throw the towel on this whole affair. After the November election he may well say "enough" and just leave the chaos behind him. P
1More

Paul starts new drone war | TheHill - 0 views

  • Sen. Rand Paul has warned Senate Majority Leader Harry Reid (D-Nev.) that he will place a hold on one of President Obama’s appellate court nominees because of his role in crafting the legal basis for Obama’s drone policy.Paul, the junior Republican senator from Kentucky, has informed Reid he will object to David Barron’s nomination to the 1st Circuit Court of Appeals, unless the Justice Department makes public the memos he authored justifying the killing of an American citizen in Yemen.ADVERTISEMENTThe American Civil Liberties Union supports Paul’s objection, giving some Democratic lawmakers extra incentive to support a delay to Barron’s nomination, which could come to the floor in the next two weeks.Barron, formerly a lawyer in the Justice Department’s Office of Legal Counsel, penned at least one secret legal memo approving the September 2011 drone strike that killed Anwar al-Awlaki, a radical Muslim cleric whom intelligence officials accused of planning terrorist attacks against the United States.
7More

DOJ Seeks Removal Of Restrictions On Computer Search Warrants - 0 views

  • The Justice Department recently submitted proposed new rules on the procedures and practices of the department’s agencies and bureaus. Among the suggested changes is a modification of the Federal Rules of Criminal Procedure Rule 41(b), which empowers a federal court to issue a warrant allowing the federal government to conduct a search of a computer or computer network involved in a criminal investigation. Under current regulations, a warrant issued by a federal court is only valid in that court’s district. As there are 94 federal judicial districts, investigating a widespread attack may require either petitioning dozens of district courts or acting extrajudicially by not seeking a warrant. An extrajudicial investigation, however, cannot be used if criminal convictions are sought, as evidence gathered in this manner is not typically admissible in court. The Justice Department is seeking to make remote access warrants to search, seize and copy electronic information valid for all federal districts.
  • The Justice Department argues that due to the sophistication of cyber-criminals, an offending computer or computer cluster can sit in a district separate from the district where the hackers that infected the target computer anonymously are and separate from the investigators’ district. “Criminals are using multiple computers in many districts simultaneously as part of complex criminal schemes, and effectively investigating and disrupting these schemes often requires remote access to Internet-connected computers in many different districts,” wrote then-acting Assistant Attorney General Mythili Raman in a September letter to the Advisory Committee on the Criminal Rules. “Botnets are a significant threat to the public: they are used to conduct large-scale denial of service attacks, steal personal and financial data, and distribute malware designed to invade the privacy of users of the host computers,” Raman continued. In the letter, Raman cited an investigation of a child porn site that uses The Onion Router Network, or Tor, to anonymize its traffic. The Justice Department argues that it knows the site’s hosting server location, but without a warrant local to the server, the department is prevented from retrieving the server’s user records — including IP and MAC addresses. In most cases, however, law enforcement do not know the physical location of the site’s server, making it impossible to request a specific warrant.
  • In these cases, the Justice Department could request a blanket warrant. This would allow the department to set up a “zero-day” attack on the server — an attack exploiting a manufacturer-unknown or -permitted security flaw, allowing access to the system’s operating software. However, a Texas judge denied the FBI access to such a warrant, saying the Justice Department’s use of “zero-day” attacks in its investigation exposes the public and the target to unknown risks. One typical type of a “zero-day” attack is an infected email that could affect a large number of innocent people if the target used a public computer to access his email. The FBI planned to install a Remote Administration Tool, or RAT, which would distribute such emails in a partially-targeted spam mail distribution. Last year, Federal Magistrate Judge Stephen Smith of the Houston Division of the Southern District of Texas ruled that this was a gross overreach of investigatory intrusion, blocking the plan temporarily. A “zero-day” attack has the potential to activate and control the targeted computer’s peripherals, such as webcams and microphones.
  • ...2 more annotations...
  • Following this ruling, based on the assumptions that federal law enforcement fundamentally act in good faith and that there may be a legitimate need for remote exploitation of computer data, the Justice Department sought to introduce changes to the rules that would overcome Smith’s objections. The proposed change to Rule 41(b) would allow magistrate judges “… to issue a warrant to use remote access to search electronic storage media and to seize electronically stored information located within or outside that district.” The Justice Department has indicated that it wants warrants permitting multiple computers to be searched at the same time, as well as permission to search all of the email and social media accounts accessible from a single computer. Such access would constitute a violation of the Electronic Communications Privacy Act, as the government, under the act, must make demonstrate probable cause to each targeted service provider and obtain and serve a warrant for each service provider. A warrant to search every account active on a computer would be actively bypassing the act’s numerous safeguards.
  • Privacy advocates fear that this rule change would allow prosecutors and the Justice Department to seek out magistrates likely to give them their requested warrants, creating a situation in which the federal government could have a “warrant shop” with just one judge for the whole of the nation. In light of allegations of federal government over-policing — including revelations of aggressive domestic and international electronic spying by the FBI and the National Security Agency — many advocates argue that an examination of the federal government’s commitment to the Fourth Amendment is needed. “The proposed amendment would significantly expand the government’s authority to conduct remote searches of electronic storage media,” the American Civil Liberties Union wrote in a memorandum early last month. “It would also expand the government’s power to engage in computer hacking in the course of criminal investigations, including through the use of malware and other techniques that pose a risk to internet security and that raise Fourth Amendment and policy concerns. “In light of these concerns, the ACLU recommends that the Advisory Committee exercise extreme caution before granting the government new authority to remotely search individuals’ electronic data.” The rules are scheduled to be discussed at the meeting of the Judiciary’s Committee on Rules of Practice and Procedure later this month.
  •  
    The proposed rule change is at pp. 499-501 here. http://www.uscourts.gov/uscourts/RulesAndPolicies/rules/Agenda%20Books/Standing/ST2014-05.pdf#page499 (very large PDF).  This is not just about the government being granted permission to exploit vulnerabilities unknown to the computer owner; the issue arose in a case where the government sought judicial permission to implant a Trojan Horse in a suspect's computer. Moreover, the proposed rule goes far beyond the confines of that case, purporting to authorize the government to skip merrily along searching computers not specified in the warrant, along the purported botnet. To put the icing on the cake, the government wants to be relieved from the requirement that they apply for a warrant in the district in which the computer to be searched is located. ("Oh, Goody! Let's start shopping around for the judges we like instead of the ones we are now required to persuade. What? The Mississippi judge refused to sign the warrant? Oh well, let's try it with that other judge we like, the one in Gnome, Alaska.") In other words, what the government seeks is authority for "general warrants," the very evil that the 4th Amendment was designed to outlaw. Even more outrageously, the proposed rule provides in part: "For a warrant to use remote access to search electronic storage media and seize or copy electronically stored information, the officer must make reasonable efforts to serve a copy of the warrant on the person whose property *was* searched or whose information *was* seized or copied. Service may be accomplished by any means, including electronic means, reasonably calculated to reach that person." Not the use of the past tense "was." So after they have drained your computer of all its data, they may permissibly install a batch file that will display a copy of the warrant on your monitor the next time you boot your computer. With a big red lipstick imprint of a kiss imprinted in the warrant's bottom margin, no doubt
  •  
    The proposed rule change is at pp. 499-501 here. http://www.uscourts.gov/uscourts/RulesAndPolicies/rules/Agenda%20Books/Standing/ST2014-05.pdf#page499 (very large PDF).  This is not just about the government being granted permission to exploit vulnerabilities unknown to the computer owner; the issue arose in a case where the government sought judicial permission to implant a Trojan Horse in a suspect's computer. Moreover, the proposed rule goes far beyond the confines of that case, purporting to authorize the government to skip merrily along searching computers not specified in the warrant, along the purported botnet. To put the icing on the cake, the government wants to be relieved from the requirement that they apply for a warrant in the district in which the computer to be searched is located. In other words, what the government seeks is authority for "general warrants," the very evil that the 4th Amendment was designed to outlaw. Even more outrageously, the proposed rule provides in part: "For a warrant to use remote access to search electronic storage media and seize or copy electronically stored information, the officer must make reasonable efforts to serve a copy of the warrant on the person whose property *was* searched or whose information *was* seized or copied. Service may be accomplished by any means, including electronic means, reasonably calculated to reach that person." Not the use of the past tense "was." So after they have drained your computer of all its data, they may permissibly install a batch file that will display a copy of the warrant on your monitor the next time you boot your computer. With a big red lipstick imprint of a kiss imprinted at the bottom.  To be continued after this is intially posted to Diigo so the content isn't cut off.   
1More

Economy Roundtable - Coast to Coast AM - 0 views

  •  
    "Date: 05-07-14 Host: George Noory Guests: Catherine Austin Fitts, Gerald Celente, George Ure, Robert Zimmerman This special panel discussion on the economy and related topics featured investment advisor Catherine Austin Fitts, trends analyst Gerald Celente, and consultant George Ure. Currently, the financial system is still being pumped with cheap money, such as $45 billion a month in mortgage-backed securities, and interest rates remain at record lows-- but once those interest rates go back up, the economy will tumble, said Celente. Fitts cited the continued inequality and centralization in the economy as hampering growth, while Ure noted that we're in the bottoming process with the Fed, which is trying to print money fast enough so we don't drop into something like the Great Depression. While the US continues its behind-closed-doors propping up of the economy, "I still believe we're going to see something like a panic level by the end of the second quarter," Celente remarked. America used to be the land of opportunity, but now the wealth is concentrated in the hands of the few, he added. Globalization is lowering the wealth of the middle class, and the reality is "we're automating or outsourcing jobs, and putting people on government checks," Fitts commented. Ure, who studies cyclical patterns of the economy or "long waves," said right now we're seeing a "war on cash," with a huge effort to get people into an electronic system, where all their transactions and investments can be tracked. The revelations by Edward Snowden about America's surveillance state has had a depressing effect on US economic growth, as well as inspiring other countries around the world to pull out of the system, Fitts suggested. "We live in a country where the system of creating money has basically been sublet from Congress to the Federal Reserve...and government is wholesale now, in the business of granting different franchises such as in communications and money operations," Ure detail
7More

The 28 Pages and the War on Terror: Is Congress in a State of Willful Ignorance? | 28 P... - 0 views

  • Today more than ever, Americans are struggling to unravel the Gordian knot of overt and covert alliances that comprise the Middle East’s geostrategic landscape. As they do, politicians and pundits constantly remind them that reaching the correct conclusions about the region is imperative if we are to thwart the menace of terrorism and prevent the next 9/11.
  • On January 8th of this year, by way of a “Dear Colleague” letter, Jones and Massachusetts Congressman Stephen Lynch urged every one of their fellow House representatives to read the 28 pages for themselves. Among those who heeded their call was Rep. Massie. At a March 11 press conference in which he joined Jones and Lynch in imploring peers to examine the redacted finding, Massie offered a striking description of his reaction to the revelations within the 28 pages, saying: “It was a really disturbing event for me to read those. I had to stop every two or three pages and rearrange my perception of history. And it’s that fundamental…it certainly changes your view of the Middle East.”
  • For everyday Americans, ignorance about what lies within the 28 pages is imposed; for apparently far too many in Congress, that ignorance is willful. You see—unlike the citizens they represent—when it comes to reading or not reading the 28 pages, legislators enjoy the luxury of a choice: After securing permission through their respective intelligence committee, representatives and senators can venture into a guarded, soundproof room at the Capitol and read the classified findings on foreign government assistance to the 9/11 hijackers in their entirety. Astonishingly—given what’s at stake for the country and for the lives of servicemembers and civilians alike—there are indications only a slim minority have bothered to do so. Rep. Walter Jones North Carolina’s Walter Jones is one congressman who did take the initiative to learn what lies in the 28 pages. Later, he said, “I was absolutely shocked by what I read. What was so surprising was that those whom we thought we could trust really disappointed me.” He added, “The information is critical to our foreign policy moving forward and should thus be available to the American people.”
  • ...4 more annotations...
  • As if a thicket of misinformation, hit-and-miss journalism and competing propaganda didn’t make the challenge daunting enough, the American people face an even more formidable barrier in their attempts to reach informed and rational conclusions about U.S. policy in the Middle East: the classification of a 28-page finding on foreign government support of the 9/11 hijackers—classification that continues over the objections of the chairman and vice-chairman of the 9/11 Commission and the former senator who co-chaired the inquiry that produced the 28 pages. Preventing a hypothetical “next 9/11″ starts with a clear understanding of what enabled the actual one—yet, even as the U.S. military prepares for the next chapter in the seemingly perpetual War on Terror, Americans continue to be denied critical knowledge about how the September 11 attacks were planned and funded. Reflecting on that disconnect, Kentucky Congressman Thomas Massie recently told Slate, “Until we know what enabled or caused 9/11, we shouldn’t be talking about starting a third war to prevent another 9/11.”
  • in what could well emerge as a national security scandal that engulfs much of Congress, there are indications that, when it comes to acquiring essential knowledge to shape policies that safeguard the country, a majority of legislators have thus far made a conscious decision to remain ignorant: As of this writing, 13 of the House’s 432 representatives have joined as cosponsors of a Jones-authored resolution urging the president to declassify the 28 pages. A source on the Hill who is familiar with the declassification effort is personally unaware of any representative who has read the 28 pages over the last several months who didn’t emerge from the experience as a supporter of declassification. When you overlay one of those observations on the other, the result points to a woefully low level of interest among the nation’s legislators in learning what “shocking,” “surprising” and “history-rearranging” facts are contained in the classified passage.
  • Those indications paint a bleak—albeit, tentative—portrait of Congressional diligence in overseeing national security policy. What’s needed now is a precise, name-by-name accounting of which representatives and senators have read the 28 pages and which have not. To that end, 28Pages.org urges constituents, journalists and transparency advocacy organizations to help bring accountability to this essential issue of national security job performance by contacting legislators and asking them two simple, yes-or-no questions: Have you read the 28 pages? If not, have you asked permission from your intelligence committee to do so? Shortly, 28Pages.org will announce its own contribution to this national exercise in Congressional accountability. However, a thorough accounting will only be achieved with the participation of citizens, journalists and transparency advocates. And with every House and 36 Senate seats up for election on Nov. 4, the faster the country collectively assembles a name-by-name roster of 28-pages readership on the Hill, the better position voters will be in to evaluate incumbents using this potent indicator of their attentiveness to matters of national security.
  • We provide a wealth of resources to help citizens do their part, and journalists are encouraged to contact us for insights on this issue.
17More

Reported US-Syrian Accord on Air Strikes | Consortiumnews - 1 views

  • Exclusive: A problem with President Obama’s plan to expand the war against ISIS into Syria was always the risk that Syrian air defenses might fire on U.S. warplanes, but now a source says Syria’s President Assad has quietly agreed to permit strikes in some parts of Syria, reports Robert Parry.
  • The Obama administration, working through the Russian government, has secured an agreement from the Syrian regime of Bashar al-Assad to permit U.S. airstrikes against Islamic State targets in parts of Syria, according to a source briefed on the secret arrangements. The reported agreement would clear away one of the chief obstacles to President Barack Obama’s plan to authorize U.S. warplanes to cross into Syria to attack Islamic State forces – the concern that entering Syrian territory might prompt anti-aircraft fire from the Syrian government’s missile batteries.
  • In essence, that appears to be what is happening behind the scenes in Syria despite the hostility between the Obama administration and the Assad government. Obama has called for the removal of Assad but the two leaders find themselves on the same side in the fight against the Islamic State terrorists who have battled Assad’s forces while also attacking the U.S.-supported Iraqi government and beheading two American journalists.
  • ...13 more annotations...
  • The usual protocol for the U.S. military – when operating in territory without a government’s permission – is to destroy the air defenses prior to conducting airstrikes so as to protect American pilots and aircraft, as was done with Libya in 2011. However, in other cases, U.S. intelligence agencies have arranged for secret permission from governments for such attacks, creating a public ambiguity usually for the benefit of the foreign leaders while gaining the necessary U.S. military assurances.
  • Just last month, Obama himself termed the strategy of arming supposedly “moderate” Syrian rebels “a fantasy.” He told the New York Times’ Thomas L. Friedman: “This idea that we could provide some light arms or even more sophisticated arms to what was essentially an opposition made up of former doctors, farmers, pharmacists and so forth, and that they were going to be able to battle not only a well-armed state but also a well-armed state backed by Russia, backed by Iran, a battle-hardened Hezbollah, that was never in the cards.” Obama’s point would seem to apply at least as much to having the “moderate” rebels face down the ruthless Islamic State jihadists who engage in suicide bombings and slaughter their captives without mercy. But this “fantasy” of the “moderate” rebels has a big following in Congress and on the major U.S. op-ed pages, so Obama has included the $500 million in his war plan despite the risk it poses to Assad’s acquiescence to American air attacks.
  • In a national address last week, Obama vowed to order U.S. air attacks across Syria’s border without any coordination with the Syrian government, a proposition that Damascus denounced as a violation of its sovereignty. So, in this case, Syria’s behind-the-scenes acquiescence also might provide some politically useful ambiguity for Obama as well as Assad. Yet, this secret collaboration may go even further and include Syrian government assistance in the targeting of the U.S. attacks, according to the source who spoke on condition of anonymity. That is another feature of U.S. military protocol in conducting air strikes – to have some on-the-ground help in pinpointing the attacks. As part of its public pronouncements about the future Syrian attacks, the Obama administration sought $500 million to train “vetted” Syrian rebels to handle the targeting tasks inside Syria as well as to carry out military ground attacks. But that approach – while popular on Capitol Hill – could delay any U.S. airstrikes into Syria for months and could possibly negate Assad’s quiet acceptance of the U.S. attacks, since the U.S.-backed rebels share one key goal of the Islamic State, the overthrow of Assad’s relatively secular regime.
  • Without Assad’s consent, the U.S. airstrikes might require a much wider U.S. bombing campaign to first target Syrian government defenses, a development long sought by Official Washington’s influential neoconservatives who have kept “regime change” in Syria near the top of their international wish list. For the past several years, the Israeli government also has sought the overthrow of Assad, even at the risk of Islamic extremists gaining power. The Israeli thinking had been that Assad, as an ally of Iran, represented a greater threat to Israel because his government was at the center of the so-called Shiite crescent reaching from Tehran through Damascus to Beirut and southern Lebanon, the base for Hezbollah.
  • The thinking was that if Assad’s government could be pulled down, Iran and Hezbollah – two of Israel’s principal “enemies” – would be badly damaged. A year ago, then-Israeli Ambassador to the United States Michael Oren articulated this geopolitical position in an interview with the Jerusalem Post. “The greatest danger to Israel is by the strategic arc that extends from Tehran, to Damascus to Beirut. And we saw the Assad regime as the keystone in that arc,” Oren said. “We always wanted Bashar Assad to go, we always preferred the bad guys who weren’t backed by Iran to the bad guys who were backed by Iran.” He said this was the case even if the other “bad guys” were affiliated with al-Qaeda. More recently, however, with the al-Qaeda-connected Nusra Front having seized Syrian territory adjacent to the Israeli-occupied Golan Heights – forcing the withdrawal of UN peacekeepers – the balance of Israeli interests may be tipping in favor of preferring Assad to having Islamic extremists possibly penetrating directly into Israeli territory.
  • In the longer term, by working together to create political solutions to various Mideast crises, the Obama-Putin cooperation threatened to destroy the neocons’ preferred strategy of escalating U.S. military involvement in the region. There was the prospect, too, that the U.S.-Russian tag team might strong-arm Israel into a peace agreement with the Palestinians. So, starting last September – almost immediately after Putin helped avert a U.S. air war against Syria – key neocons began taking aim at Ukraine as a potential sore point for Putin. A leading neocon, Carl Gershman, president of the U.S.-government-funded National Endowment for Democracy, took to the op-ed pages of the neocon Washington Post to identify Ukraine as “the biggest prize” and explaining how its targeting could undermine Putin’s political standing inside Russia. “Ukraine’s choice to join Europe will accelerate the demise of the ideology of Russian imperialism that Putin represents,” Gershman wrote. “Russians, too, face a choice, and Putin may find himself on the losing end not just in the near abroad but within Russia itself.” At the time, Gershman’s NED was funding scores of political and media projects inside Ukraine.
  • The Russian Hand Besides the tactical significance of U.S. intelligence agencies arranging Assad’s tacit acceptance of U.S. airstrikes over Syrian territory, the reported arrangement is also significant because of the role of Russian intelligence serving as the intermediary. That suggests that despite the U.S.-Russian estrangement over the Ukraine crisis, the cooperation between President Obama and Russian President Vladimir Putin has not been extinguished; it has instead just gone further underground. Last year, this growing behind-the-scenes collaboration between Obama and Putin represented a potential tectonic geopolitical shift in the Middle East. In the short term, their teamwork produced agreements that averted a U.S. military strike against Syria last September (by getting Assad to surrender his chemical weapons arsenal) and struck a tentative deal with Iran to constrain but not eliminate its nuclear program.
  • Direct attacks on Israel would be a temptation to al-Nusra Front, which is competing for the allegiance of young jihadists with the Islamic State. While the Islamic State, known by the acronyms ISIS or ISIL, has captured the imaginations of many youthful extremists by declaring the creation of a “caliphate” with the goal of driving Western interests from the Middle East, al-Nusra could trump that appeal by actually going on the offensive against one of the jihadists’ principal targets, Israel. Yet, despite Israel’s apparent rethinking of its priorities, America’s neocons appear focused still on their long-held strategy of using violent “regime change” in the Middle East to eliminate governments that have been major supporters of Lebanon’s Hezbollah and Palestine’s Hamas, i.e. Syria and Iran. One reason why Obama may have opted for a secretive overture to the Assad regime, using intelligence channels with the Russians as the middlemen, is that otherwise the U.S. neocons and their “liberal interventionist” allies would have howled in protest.
  • By early 2014, American neocons and their “liberal interventionist” pals were conspiring “to midwife” a coup to overthrow Ukraine’s elected President Viktor Yanukovych, according to a phrase used by U.S. Ambassador Geoffrey Pyatt in an intercepted phone conversation with Assistant Secretary of State for European Affairs Victoria Nuland, who was busy handpicking leaders to replace Yanukovych. A neocon holdover from George W. Bush’s administration, Nuland had been a top aide to Vice President Dick Cheney and is married to prominent neocon Robert Kagan, a co-founder of the Project for a New American Century which prepared the blueprint for the neocon strategy of “regime change” starting with the 2003 U.S.-led invasion of Iraq.
  • The U.S.-backed coup ousted Yanukovych on Feb. 22 and sparked a bloody civil war, leaving thousands dead, mostly ethnic Russians in eastern Ukraine. But the Gershman-Nuland strategy also drove a deep wedge between Obama and Putin, seeming to destroy the possibility that their peace-seeking collaboration would continue in the Middle East. [See Consortiumnews.com’s “Neocons’ Ukraine-Syria-Iran Gambit.”] New Hope for ‘Regime Change’ The surprise success of Islamic State terrorists in striking deep inside Iraq during the summer revived neocon hopes that their “regime change” strategy in Syria might also be resurrected. By baiting Obama to react with military force not only in Iraq but across the border in Syria, neocons like Sens. John McCain and Lindsey Graham put the ouster of Assad back in play.
  • In a New York Times op-ed on Aug. 29, McCain and Graham used vague language about resolving the Syrian civil war, but clearly implied that Assad must go. They wrote that thwarting ISIS “requires an end to the [civil] conflict in Syria, and a political transition there, because the regime of President Bashar al-Assad will never be a reliable partner against ISIS; in fact, it has abetted the rise of ISIS, just as it facilitated the terrorism of ISIS’ predecessor, Al Qaeda in Iraq.” Though the McCain-Graham depiction of Assad’s relationship to ISIS and al-Qaeda was a distortion at best – in fact, Assad’s army has been the most effective force in pushing back against the Sunni terrorist groups that have come to dominate the Western-backed rebel movement – the op-ed’s underlying point is obvious: a necessary step in the U.S. military operation against ISIS must be “regime change” in Damascus.
  • That would get the neocons back on their original track of forcing “regime change” in countries seen as hostile to Israel. The first target was Iraq with Syria and Iran always meant to follow. The idea was to deprive Israel’s close-in enemies, Lebanon’s Hezbollah and Palestine’s Hamas, of crucial support. But the neocon vision got knocked off track when Bush’s Iraq War derailed and the American people balked at extending the conflict to Syria and Iran. Still, the neocons retained their vision even after Bush and Cheney departed. They also remained influential by holding onto key positions inside Official Washington – at think tanks, within major news outlets and even inside the Obama administration. They also built a crucial alliance with “liberal interventionists” who had Obama’s ear. [See Consortiumnews.com’s “The Dangerous Neocon-R2P Alliance.”]
  • The neocons’ new hope arrived with the public outrage over ISIS’s atrocities. Yet, while pushing to get this new war going, the neocons have downplayed their “regime change” agenda, getting Obama to agree only to extend his anti-ISIS bombing campaign from Iraq into Syria. But it was hard to envision expanding the war into Syria without ousting Assad. Now, however, if the source’s account is correct regarding Assad’s quiet assent to U.S. airstrikes, Obama may have devised a way around the need to bomb Assad’s military, an maneuver that might again frustrate the neocons’ beloved goal of “regime change.”
  •  
    Robert Parry lands another major scoop. But beware of government officials who leak government plans because they do not invariably speak the truth.  I am particularly wary of this report because Obama's planned arming and training of the "moderate Syrian opposition" was such a patent lie. The "moderate Syrian opposition" disappeared over two years ago as peaceful protesters were replaced by Saudi, Qatari, Turkish, and American-backed Salafist mercenaries took their place. Up until this article, there has been every appearance that the U.S. was about to become ISIL's Air Force in Syria. In other words, there has been a steady gushing of lies from the White House on fundamental issues of war and peace. In that light, I do not plan to accept this article as truth before I see much more confirmation that ISIL rather than the Assad government is the American target in Syria. We have a serial liar in the White House.
13More

Resurrecting the Dubious State Secrets Privilege | John Dean | Verdict | Legal Analysis... - 0 views

  • In an unusual move, the U.S. Department of Justice has filed a motion to make a private lawsuit simply disappear. While the U.S. Government is not a party to this defamation lawsuit—Victor Restis et al. v. American Coalition Against Nuclear Iran, Inc.—filed July 19, 2013, in the U.S. District Court for the Southern District of New York, Attorney General Eric Holder is concerned that the discovery being undertaken might jeopardize our national security.
  • The government’s argument for intervening in this lawsuit is technical and thin.
  • The strongest precedent in the government’s brief in the current case is the 1985 case of Fitzgerald v. Penthouse Intern., Ltd. Fitzgerald had sued Penthouse Magazine for an allegedly libelous article, but the U.S. Navy moved to intervene on the ground that the government had a national security interest which would not be adequately protected by the parties, so the government requested the action be dismissed, after invoking the state secrets privilege. The federal district court granted the motions and dismissed the case, which the U.S. Court of Appeals for Fourth Circuit affirmed. So there is precedent for this unusual action by the government in a private lawsuit, but the legitimacy of the state secrets privilege remains subject to question.
  • ...9 more annotations...
  • In February 2000, Judith Loether, a daughter of one of the three civilians killed in the 1948 B-29 explosion, discovered the government’s once-secret accident report for the incident on the Internet. Loether had been seven weeks old when her father died but been told by her mother what was known of her father’s death and the unsuccessful efforts to find out what had truly happened. When Loether read the accident report she was stunned. There were no national security secrets whatsoever, rather there was glaringly clear evidence of the government’s negligence resulting in her father’s death. Loether shared this information with the families of the other civilian engineers who had been killed in the incident and they joined together in a legal action to overturn Reynolds, raising the fact that the executive branch of the government had misled the Supreme Court, not to mention the parties to the earlier lawsuit.
  • Lou Fisher looked closely at the state secrets privilege in his book In The Name of National Security, as well as in follow-up articles when the Reynolds case was litigated after it was discovered, decades after the fact, that the government had literally defrauded the Supreme Court in Reynolds, e.g., “The State Secrets Privilege: Relying on Reynolds.” The Reynolds ruling emerged from litigation initiated by the widows of three civilian engineers who died in a midair explosion of a B-29 bomber on October 6, 1948. The government refused to provide the widows with the government’s accident report. On March 9, 1953, the Supreme Court created the state secrets privilege when agreeing the accident report did not have to be produced since the government claimed it contained national security secrets. In fact, none of the federal judges in the lower courts, nor the justices on the Supreme Court, were allowed to read the report.
  • Lowell states in his letter: “By relying solely upon ex parte submissions to justify its invocation of the state secrets privilege, especially in the unprecedented circumstance of private party litigation without an obvious government interest, the Government has improperly invoked the state secrets privilege, deprived Plaintiffs of the opportunity to test the Government’s claims through the adversarial process, and limited the Court’s opportunity to make an informed judgment. “ Lowell further claims that in “the typical state secrets case, the Government will simultaneously file both a sealed declaration and a detailed public declaration.” (Emphasis in Lowell’s letter.) To bolster this contention, he provided the court with an example, and offered to provide additional examples if so requested.
  • The Justice Department’s memorandum of law accompanying its motion to intervene states that once the state secrets privilege has been asserted “by the head of the department with control over the matter in question . . . the scope of judicial review is quite narrow.” Quoting from the U.S. Supreme Court ruling establishing this privilege in 1953, U.S. v. Reynolds, the brief adds: “the sole determination for the court is whether, ‘from all the circumstances of the case . . . there is a reasonable danger that compulsion of the evidence will expose military [or other] matters which, in the interest of national security, should not be divulged.’”In short, all the Justice Department need claim is the magic phrase—”state secrets”—after assuring the court that the head of department or agency involved has personally decided it is information that cannot be released. That ends the matter. This is what has made this privilege so controversial, not to mention dubious. Indeed, invocation by the executive branch effectively removes the question from judicial determination, and the information underlying the decision is not even provided to the court.
  • As Fisher and other scholars note, there is much more room under the Reynolds ruling for the court to take a hard look at the evidence when the government claims state secrets than has been common practice. Fisher reminds: “The state secrets privilege is qualified, not absolute. Otherwise there is no adversary process in court, no exercise of judicial independence over what evidence is needed, and no fairness accorded to private litigants who challenge the government . . . . There is no justification in law or history for a court to acquiesce to the accuracy of affidavits, statements, and declarations submitted by the executive branch.” Indeed, he noted to do so is contrary to our constitutional system of checks and balances.
  • Time to Reexamine Blind Adherence to the State Secrets PrivilegeIn responding to the government’s move to intervene, invoke state secrets, and dismiss the Restis lawsuit, plaintiffs’ attorney Abbe Lowell sent a letter to Judge Edgardo Ramos, the presiding judge on the case on September 17, 2014, contesting the Department of Justice’s ex parte filings, and requesting that Judge Ramos “order the Government to file a public declaration in support of its filing that will enable Plaintiffs to meaningfully respond.” Lowell also suggested as an alternative that he “presently holds more than sufficient security clearances to be given access to the ex parte submission,” and the court could do here as in other national security cases, and issue a protective order that the information not be shared with anyone. While Lowell does not so state, he is in effect taking on the existing state secrets privilege procedure where only the government knows what is being withheld and why, and he is taking on Reynolds.
  • To make a long story short, the Supreme Court was more interested in the finality of their decisions than the fraud that had been perpetrated upon them. They rejected the direct appeal, and efforts to relegate the case through the lower courts failed. As Fisher notes, the Court ruled in Reynolds based on “vapors and allusions,” rather than facts and evidence, and today it is clear that when it uncritically accepted the government’s word, the Court abdicated its duty to protect the ability of each party to present its case fairly, not to mention it left the matter under the control of a “self-interested executive” branch.
  • Lowell explains it is not clear—and suggests the government is similarly unclear in having earlier suggested a “law enforcement privilege”—as to why the state secrets privilege is being invoked, and argues this case can be tried without exposing government secrets. Citing the Fitzgerald ruling, Lowell points out dismissal is appropriate “[o]nly when no amount of effort and care on the part of the court and the parties will safeguard privileged material is dismissal warranted.”
  • No telling how Judge Ramos will rule, and the government has a remarkable record of prevailing with the deeply flawed state secrets privilege. But Lowell’s letter appears to say, between the lines, that he has a client who is prepared to test this dubious privilege and the government’s use of it in this case if Judge Ramos dismisses this lawsuit. The U.S. Court of Appeals for the Second Circuit, where that ruling would be reviewed, sees itself every bit the intellectual equal of the U.S. Supreme Court and it is uniquely qualified to give this dubious privilege and the Reynolds holding a reexamination. It is long past time this be done.
  •  
    Interesting take on the Restis case by former Nixon White House Counsel John Dean. Where the State Secrets Privilege is at its very nastiest, in my opinion, is in criminal prosecutions where the government withholds potentially exculpatory evidence on grounds of state secrecy. I think the courts have been far too lenient in allowing people to be tried without production of such evidence. The work-around in the Guantanamo Bay inmate cases has been to appoint counsel who have security clearances, but in those cases the lawyer is forbidden from discussing the classified information with the client, who could have valuable input if advised what the evidence is. It's also incredibly unfair in the extraordinary rendition cases, where the courts have let the government get away with having the cases dismissed on state secrecy grounds, even though the tortures have been the victim of criminal official misconduct.  It forces the victims to appeal clear to the Supreme Court before they can start over in an international court with jurisdiction over human rights violations, where the government loses because of its refusal to produce the evidence.  (Under the relevant treaties that the U.S. is a party to, the U.S. is required to provide a judicial remedy without resort to claims of national security secrecy.) Then the U.S. refuses to pay the judgments of the International courts, placing the U.S. in double breach of its treaty obligations. We see the same kinds of outrageous secrecy playing out in the Senate Intellience Committee's report on CIA torture, where the Obama Administration is using state secrecy claims to delay release of the report summary and minimize what is in it. It's highly unlikely that I will live long enough to read the full report. And that just is not democracy in action. Down with the Dark State!   
7More

CIA's Ex-No. 2 Says ISIS 'Learned From Snowden' - The Daily Beast - 0 views

  • That is not a consensus view within the U.S. intelligence community, where officials have been divided over how much ISIS really learned from the Snowden leaks that it didn’t already know. The group didn’t begin seizing territory in Iraq until a year after the leaks began. And last year, a U.S. intelligence official with access to information about ISIS’s current tactics told The Daily Beast that while the group had “likely learned a lot” from the Snowden leaks, “many of their forces are familiar with the U.S. from their time in AQI, [and] they have adapted well to avoiding detection.”
  • “Within weeks of the leaks, terrorist organizations around the world were already starting to modify their actions in light of what Snowden disclosed. Communications sources dried up, tactics were changed,” Morell writes. Among the most damaging leaks, he adds, was one that described a program that collects foreigners’ emails as they move through equipment in the United States.Terrorist groups, including ISIS, have since shifted their communications to more “secure” platforms, are using encryption, or “are avoiding electronic communications altogether.”“ISIS was one of those terrorist groups that learned from Snowden, and it is clear that his actions played a role in the rise of ISIS,” Morell writes.
  • Edward Snowden’s leaks about U.S. intelligence operations “played a role in the rise of ISIS.” That’s the explosive new allegation from the former deputy director of the CIA, Michael Morell, who was among the United States’ most senior intelligence officials when Snowden began providing highly classified documents to journalists in 2013. U.S. intelligence officials have long argued that Snowden’s disclosures provided valuable insights to terrorist groups and nation-state adversaries, including China and Russia, about how the U.S. monitors communications around the world. But in his new memoir, to be published next week, Morell raises the stakes of that debate by directly implicating Snowden in the expansion of ISIS, which broke away from al Qaeda and has conquered large swaths of territory in Iraq and Syria.
  • ...3 more annotations...
  • Edward Snowden’s leaks about U.S. intelligence operations “played a role in the rise of ISIS.” That’s the explosive new allegation from the former deputy director of the CIA, Michael Morell, who was among the United States’ most senior intelligence officials when Snowden began providing highly classified documents to journalists in 2013. U.S. intelligence officials have long argued that Snowden’s disclosures provided valuable insights to terrorist groups and nation-state adversaries, including China and Russia, about how the U.S. monitors communications around the world. But in his new memoir, to be published next week, Morell raises the stakes of that debate by directly implicating Snowden in the expansion of ISIS, which broke away from al Qaeda and has conquered large swaths of territory in Iraq and Syria. 
  • “Within weeks of the leaks, terrorist organizations around the world were already starting to modify their actions in light of what Snowden disclosed. Communications sources dried up, tactics were changed,” Morell writes. Among the most damaging leaks, he adds, was one that described a program that collects foreigners’ emails as they move through equipment in the United States.Terrorist groups, including ISIS, have since shifted their communications to more “secure” platforms, are using encryption, or “are avoiding electronic communications altogether.”“ISIS was one of those terrorist groups that learned from Snowden, and it is clear that his actions played a role in the rise of ISIS,” Morell writes.
  • That is not a consensus view within the U.S. intelligence community, where officials have been divided over how much ISIS really learned from the Snowden leaks that it didn’t already know. The group didn’t begin seizing territory in Iraq until a year after the leaks began. And last year, a U.S. intelligence official with access to information about ISIS’s current tactics told The Daily Beast that while the group had “likely learned a lot” from the Snowden leaks, “many of their forces are familiar with the U.S. from their time in AQI, [and] they have adapted well to avoiding detection.”
  •  
    Keep in mind that ISIL is a U.S. creation. And that just about everything that CIA and NSA do violates the laws of the nation in which they act and is antithetical to our form of government.   
12More

How the NSA Converts Spoken Words Into Searchable Text - The Intercept - 0 views

  • Most people realize that emails and other digital communications they once considered private can now become part of their permanent record. But even as they increasingly use apps that understand what they say, most people don’t realize that the words they speak are not so private anymore, either. Top-secret documents from the archive of former NSA contractor Edward Snowden show the National Security Agency can now automatically recognize the content within phone calls by creating rough transcripts and phonetic representations that can be easily searched and stored. The documents show NSA analysts celebrating the development of what they called “Google for Voice” nearly a decade ago.
  • Most people realize that emails and other digital communications they once considered private can now become part of their permanent record. But even as they increasingly use apps that understand what they say, most people don’t realize that the words they speak are not so private anymore, either. Top-secret documents from the archive of former NSA contractor Edward Snowden show the National Security Agency can now automatically recognize the content within phone calls by creating rough transcripts and phonetic representations that can be easily searched and stored. The documents show NSA analysts celebrating the development of what they called “Google for Voice” nearly a decade ago.
  • Though perfect transcription of natural conversation apparently remains the Intelligence Community’s “holy grail,” the Snowden documents describe extensive use of keyword searching as well as computer programs designed to analyze and “extract” the content of voice conversations, and even use sophisticated algorithms to flag conversations of interest. The documents include vivid examples of the use of speech recognition in war zones like Iraq and Afghanistan, as well as in Latin America. But they leave unclear exactly how widely the spy agency uses this ability, particularly in programs that pick up considerable amounts of conversations that include people who live in or are citizens of the United States.
  • ...9 more annotations...
  • The Defense Department, through its Defense Advanced Research Projects Agency (DARPA), started funding academic and commercial research into speech recognition in the early 1970s. What emerged were several systems to turn speech into text, all of which slowly but gradually improved as they were able to work with more data and at faster speeds. In a brief interview, Dan Kaufman, director of DARPA’s Information Innovation Office, indicated that the government’s ability to automate transcription is still limited. Kaufman says that automated transcription of phone conversation is “super hard,” because “there’s a lot of noise on the signal” and “it’s informal as hell.”
  • A 2008 document from the Snowden archive shows that  transcribing news broadcasts was already working well seven years ago, using a program called Enhanced Video Text and Audio Processing: (U//FOUO) EViTAP is a fully-automated news monitoring tool. The key feature of this Intelink-SBU-hosted tool is that it analyzes news in six languages, including Arabic, Mandarin Chinese, Russian, Spanish, English, and Farsi/Persian. “How does it work?” you may ask. It integrates Automatic Speech Recognition (ASR) which provides transcripts of the spoken audio. Next, machine translation of the ASR transcript translates the native language transcript to English. Voila! Technology is amazing. A version of the system the NSA uses is now even available commercially.
  • But even then, a newer, more sophisticated product was already being rolled out by the NSA’s Human Language Technology (HLT) program office. The new system, called VoiceRT, was first introduced in Baghdad, and “designed to index and tag 1 million cuts per day.” The goal, according to another 2006 memo, was to use voice processing technology to be able “index, tag and graph,” all intercepted communications. “Using HLT services, a single analyst will be able to sort through millions of cuts per day and focus on only the small percentage that is relevant,” the memo states. A 2009 memo from the NSA’s British partner, GCHQ, describes how “NSA have had the BBN speech-to-text system Byblos running at Fort Meade for at least 10 years. (Initially they also had Dragon.) During this period they have invested heavily in producing their own corpora of transcribed Sigint in both American English and an increasing range of other languages.” (GCHQ also noted that it had its own small corpora of transcribed voice communications, most of which happened to be “Northern Irish accented speech.”)
  • According to a 2011 memo, “How is Human Language Technology (HLT) Progressing?“, NSA that year deployed “HLT Labs” to Afghanistan, NSA facilities in Texas and Georgia, and listening posts in Latin America run by the Special Collection Service, a joint NSA/CIA unit that operates out of embassies and other locations. “Spanish is the most mature of our speech-to-text analytics,” the memo says, noting that the NSA and its Special Collections Service sites in Latin America, have had “great success searching for Spanish keywords.”
  • The Snowden archive, as searched and analyzed by The Intercept, documents extensive use of speech-to-text by the NSA to search through international voice intercepts — particularly in Iraq and Afghanistan, as well as Mexico and Latin America. For example, speech-to-text was a key but previously unheralded element of the sophisticated analytical program known as the Real Time Regional Gateway (RTRG), which started in 2005 when newly appointed NSA chief Keith B. Alexander, according to the Washington Post, “wanted everything: Every Iraqi text message, phone call and e-mail that could be vacuumed up by the agency’s powerful computers.” The Real Time Regional Gateway was credited with playing a role in “breaking up Iraqi insurgent networks and significantly reducing the monthly death toll from improvised explosive devices.” The indexing and searching of “voice cuts” was deployed to Iraq in 2006. By 2008, RTRG was operational in Afghanistan as well.
  • VoiceRT, in turn, was surpassed a few years after its launch. According to the intelligence community’s “Black Budget” for fiscal year 2013, VoiceRT was decommissioned and replaced in 2011 and 2012, so that by 2013, NSA could operationalize a new system. This system, apparently called SPIRITFIRE, could handle more data, faster. SPIRITFIRE would be “a more robust voice processing capability based on speech-to-text keyword search and paired dialogue transcription.”
  • What’s less clear from the archive is how extensively this capability is used to transcribe or otherwise index and search voice conversations that primarily involve what the NSA terms “U.S. persons.” The NSA did not answer a series of detailed questions about automated speech recognition, even though an NSA “classification guide” that is part of the Snowden archive explicitly states that “The fact that NSA/CSS has created HLT models” for speech-to-text processing as well as gender, language and voice recognition, is “UNCLASSIFIED.”
  • Also unclassified: The fact that the processing can sort and prioritize audio files for human linguists, and that the statistical models are regularly being improved and updated based on actual intercepts. By contrast, because they’ve been tuned using actual intercepts, the specific parameters of the systems are highly classified.
  • The presidentially appointed but independent Privacy and Civil Liberties Oversight Board (PCLOB) didn’t mention speech-to-text technology in its public reports. “I’m not going to get into whether any program does or does not have that capability,” PCLOB chairman David Medine told The Intercept. His board’s reports, he said, contained only information that the intelligence community agreed could be declassified.
3More

Secret is out: Americans murdered Liaquat Ali Khan! | Pakistan Today - 0 views

  • Americans murdered the first elected prime minister of Pakistan through the Afghan government, declassified documents of US State Department disclosed. Like a number of other high-profile killings, the assassination of Liaquat Ali Khan, has also remained a mystery. Conspiracy theories abound, yet are difficult to substantiate. It was revealed in the documents declassified a few years ago that two people killed the murderer of Liaquat Ali Khan at the spot while crowd also massacred the two persons in order to leave no sign of the conspiracy. According to the documents, the United States wanted to get contracts of oil resources in Iran. Pakistan and Iran enjoyed cordial ties and Afghanistan used to be an enemy of Pakistan during 1950-51. The neighbouring Afghanistan was the only country that did not accept Pakistan at that time. The US demanded Pakistan use its influence in Tehran and persuade it to transfer control of its oil fields to the US. Liaquat Ali Khan declined to accede to the request, saying he would not use his friendship for dishonest purposes and not interfere in personal affairs of Iran.
  • On which, then US President Harry Truman had threatened to Liaquat Ali Khan. Not only that, Liaquat Ali Khan also demanded that the US vacate air bases in Pakistan, dropping a bombshell on Americans. Following the development, American started search of murderer for assassinating Khan. They did not find a suitable person in Pakistan and then turned to Afghanistan for this purpose, according to the documents. Washington contacted the US Embassy in Kabul, offering Zahir Shah to search an assassin for Khan and in return they will ensure Pashtoonistan’s freedom. Afghan government had found a man, Syed Akbar, to take the job and also made arrangements for him to be killed immediately after, so as to conceal the conspiracy. All three stayed at a local hotel in Rawalpindi one day before the meeting of party in Company Bagh. Akbar fired at Khan when he started his speech at dais and he fell on the stage, saying “Allah help Pakistan”. The cartridges recovered from Khan’s body were US made. The type of bullets used to kill the Pakistani prime minister was in use by high-ranking American officers and were not usually available in the market.
  • Some people claimed that Governor General Ghulam Muhammad was behind Khan’s murder while some blamed Mushtaq Ahmed Gormani. Different committees and commission were constituted but failed to conclude any results. After a span of over 60 years, the US State Department have disclosed all the secrets and a video of Dr Shabir about disclosures also appeared in which he gave reaction over the declassified documents. When Online contacted Muazzam Ali Khan, the grandson of Liaquat Ali Khan, he said they are aware about the report and it is true. He also said they also have supporting documents in this regard.
3More

The Most Expensive Wars in U.S. History - 24/7 Wall St. - 0 views

  • Declared an official holiday in 1971, Memorial Day honors those who have given their lives in service to the United States. While the human toll is always great, wars also cost treasure as well as blood. Many factors can affect the cost of waging war. Using a report from the Congressional Research Service, 24/7 Wall St. reviewed the most expensive wars in U.S. history. While the Mexican-American War cost just $2.4 billion, or 1.4% of GDP in 1847, spending on World War II accounted for nearly 36% of GDP in 1945, or $4.1 trillion. These are the most expensive wars in U.S. history. Click here to see the most expensive wars in U.S. history. Many early wars in U.S. history resulted in the acquisition of land. The Mexican-American War in the 1840s yielded much of the territory that makes up the present-day Southwest. Similarly, the Spanish-American War prior to the start of the 20th Century ended with U.S. control of Guam, Puerto Rico, and the Philippines.
  • In every conflict before World War II, nearly all of the country’s defense budget was spent on direct conflict — classified as wartime spending. For example, the U.S. spent 1.1% of GDP in 1899 to fight the Spanish-American War, and just 1.5% of GDP was spent on total defense spending. That trend largely changed at the start of the Cold War. The persistent threat of military conflict ensured that the U.S. would be ready for war at any time, as the Space Race and nuclear armament became national priorities in both the U.S. and the Soviet Union. As a result, wartime spending and defense spending began to diverge. During the Korean War, for example, war costs accounted for just 4.2% of GDP in 1952, while total defense spending represented more than 13% of GDP in the same year. Comparing war costs over a 235-year period can be difficult. While the report attempted to correct for inflation by calculating each war’s cost in fiscal year 2011 dollars, inflation adjustments do not account for advances in technology. It is entirely possible that wars also became more expensive over time as the sophistication and cost of technology increased.
  • To determine the most expensive wars in U.S. history, 24/7 Wall St. used a 2010 report from the Congressional Research Service entitled “Costs of Major U.S. Wars”. The report does not include veterans’ benefits, interest on loans used to finance the war, and assistance to allies. Additionally, the report attempts to capture the increase in military expenditures during wartime and does not include the costs of maintaining a standing army in peacetime. The report also presents both military costs and defense spending as percentages of GDP in the year of peak war spending. War cost figures for the War on Terror were updated to reflect expenditure after 2010. These are the most expensive wars in U.S. history. Next »
6More

The Debt To GDP Ratio For The Entire World: 286 Percent Washington's Blog - 0 views

  • Did you know that there is more than $28,000 of debt for every man, woman and child on the entire planet?  And since close to 3 billion of those people survive on less than 2 dollars a day, your share of that debt is going to be much larger than that.  If we took everything that the global economy produced this year and everything that the global economy produced next year and used it to pay all of this debt, it still would not be enough.  According to a recent report put out by the McKinsey Global Institute entitled “Debt and (not much) deleveraging“, the total amount of debt on our planet has grown from 142 trillion dollars at the end of 2007 to 199 trillion dollars today.  This is the largest mountain of debt in the history of the world, and those numbers mean that we are in substantially worse condition than we were just prior to the last financial crisis.
  • When it comes to debt, a lot of fingers get pointed at the United States, and rightly so.  Just prior to the last recession, the U.S. national debt was sitting at about 9 trillion dollars.  Today, it has crossed the 18 trillion dollar mark.  But of course the U.S. is not the only one that is guilty.  In fact, the McKinsey Global Institute says that debt levels have grown in all major economies since 2007.  The following is an excerpt from the report… Seven years after the bursting of a global credit bubble resulted in the worst financial crisis since the Great Depression, debt continues to grow. In fact, rather than reducing indebtedness, or deleveraging, all major economies today have higher levels of borrowing relative to GDP than they did in 2007. Global debt in these years has grown by $57 trillion, raising the ratio of debt to GDP by 17 percentage points (Exhibit 1). That poses new risks to financial stability and may undermine global economic growth. What is surprising is that debt has actually grown the most in China.  If you can believe it, total Chinese debt has grown from 7 trillion dollars in 2007 to 28 trillion dollars today.  Needless to say, that is absolutely insane…
  • What all of this means is that our long-term global economic problems have gotten much, much worse.  This short-lived period of relative stability that we have been enjoying has been fueled by unprecedented amounts of debt and voracious money printing.  Anyone with half a brain should be able to see that this is a giant financial bubble, and in the end it is going to unwind very, very painfully.  The following comes from a Canadian news source… At the beginning of 2008, government accounted for a smaller portion of the debt pie than corporate, household or financial debt. It now exceeds each of those other categories. “The current situation is much worse than in 2000 or 2007, and with interest rates near or at zero, the central banks have already used up their ammunition. Plus, the total indebtedness, especially the indebtedness of governments, is much higher than ever before,” said Claus Vogt, a Berlin-based analyst and co-author of a 2011 book titled The Global Debt Trap.
  • ...3 more annotations...
  • “Every speculative bubble rests on some kind of a fairy tale, a story the bubble participants believe in and use as rationalization to buy extremely overvalued stocks or bonds or real estate,” Mr. Vogt argued. “And now it is the faith in the central-planning capabilities of global central bankers. When the loss of confidence in the Fed, the ECB etc. begins, the stampede out of stocks and bonds will start. I think we are very close to this pivotal moment in financial history.” But for the moment, the ridiculous stock market bubble continues.
  • Internet companies that didn’t even exist a decade ago are now supposedly worth billions upon billions of dollars even though some of them don’t make any money at all.  There is even a name for this phenomenon.  Internet companies that have gigantic valuations without gigantic revenue streams are being called “unicorns”… A dizzying mix of bold ideas and lavish investments has catapulted dozens of privately held start-ups to unicorn status, defined as having market valuations of at least $1 billion often without soaring revenues to match. Social-sharing site Pinterest has soared to $11 billion. Ride-hailing company Uber is now worth a staggering $50 billion. How long can the party last?
  • Sadly, the truth is that Wall Street is headed for a very painful awakening. What we are experiencing right now is the greatest financial bubble of all time. What comes after that is going to be the greatest financial crash of all time. 199,000,000,000,000 dollars of debt is about to come crashing down, and the pain of this disaster will be felt by every man, woman and child on the entire planet.
7More

Losing public opinion on BDS, activists turn to 'lawfare' - 0 views

  •      Champions of proposed Senate Bill SB1761, which passed both houses of the Illinois General Assembly May 18th, say it’s designed to fight anti-Semitic activism and protects Israel from the existential threat posed by the Boycott, Divestment, & Sanctions movement (BDS). Opponents of the bill say it places the economic welfare of Israel before U.S. interests, tacitly endorses the full annexation of the West Bank into Israel, and violates our country’s First Amendment rights. The bill’s opponents are right. But a potential threat of this legislation, edging closer to the criminalization of advocating for Palestinian rights and against occupation, threatens our core First Amendment rights and has been relatively absent from the discourse surrounding this bill.
  • And that’s not just here in the United States. Israeli lawmakers sought to criminalize public support of boycotts against Israel back in 2010 through their “Law for Prevention of Damage to the State of Israel through Boycott.” When I spoke with a staffer for Illinois State Rep. Sara Feigenholtz, one of the bill’s primary sponsors, inquiring if SB1761 was modeled after the 1977 amendments to the Export Administration Act (regarding the Arab League boycott of Israel), I was informed “These ‘antiboycott’ laws are the 1977 amendments to the Export Administration Act (EAA) and the Ribicoff Amendment to the 1976 Tax Reform Act (TRA). I hope this helps.…SB1761 falls in line with these federal laws”
  • Referencing EAA is another indication of the move toward weakening our First Amendment rights, as that amendment was meant to criminalize people who adhered to the Arab League’s boycott of Israel. Melissa Redmiles writes of the 70’s legislation in International Boycott Reports, 2003 and 2004 (pdf), from the IRS.gov website: “Those U.S persons who agree to participate in such boycotts are subject to criminal and civil penalties.” SB1761 seems to be the latest manifestation of a trend toward enacting a kind of trickle-down suppression. From the Center For Constitutional Rights website for Palestine Solidarity Legal Support: “These bills must be opposed in order to protect the right to engage in boycotts that reflect collective action to address a human rights issue, which the US Supreme Court has declared is protected speech… These bills would make it state policy to discourage support of human rights boycotts against Israel… and have the potential to stifle expressions of political beliefs…”
  • ...3 more annotations...
  • SB1761 requires all five public retirement benefits systems of the Illinois Pension Code to divest “all direct holdings” from any company which engages in boycotting Israel. This is designed to financially punish companies which participate in BDS; presumably European companies. But it will also burden an already severely crippled,“worst in nation”, Illinois pension system. Illinois Governor Bruce Rauner was quoted by Jewish United Fund News (JUF) earlier this month as saying, “I made a pledge that Illinois would become the first state in America to divest its public pension funds from any company in the world that boycotts Israel.” Rauner includes U.S. companies in his threat of divestment when he says “any company in the world.”
  • Relatedly from SB1761 itself: “It is not the intent [of this bill]… to cause divestiture from any company based in the United States of America.” Not intended? This soft language clearly leaves the door open to require Illinois public retirement systems’ divestiture from U.S. companies that participate in BDS. So, while politicians endorsing this bill can point to this statement of “intent” as some kind of safeguard for American companies, this same sentence simultaneously functions as a veiled threat to those companies.
  • SB1761 characterizes the motivations of the BDS movement as “intending to penalize… Israel.” Similarly, JUF News this month quoted JUF President Steven B. Nasatir saying, “At the core of the BDS movement is a quest to delegitimize Israel as a Jewish state.” That’s like stating that the intent of the Civil Rights Montgomery bus boycott was to “penalize white people.
  •  
    As though ACLU didn't already have enough lawsuits going. But this takes the cake. Although anti-BDS legislation has been introduced several times in Congress but never got off the ground because of the First Amendment barrier. Similar measures pending in Europe too.  The good news here is that Israel's right-wing government is getting desperate. The BDS movement is mushrooming globally and routinely is achieving success in convincing companies (and recording artists, etc.) to pull out of Israel. More so in Europe, but BDS is off to a great start in the U.S. Kerry warned Netanyahu before the latter blew up the last round of negotations with the Palestinians that BDS would soon make it politically impossible for the U.S. to continue providing cover for Israel on the U.N. Security Council. There's a big shift of public opinion in the U.S. about Israel's abuse of Palestinians well under way. It won't be long before introducing Israel Lobby measures in Congress will stop happening. 
4More

Binney: the NSA is destroying democracy | ITWeb - 0 views

  • The US's National Security Agency is destroying democracy by collecting data on everyone in the world, says the agency's former technical director, William Binney. This, he says, is a situation he feels partly responsible for.
  • "I have a good idea of the problems they were having and actually I started a lot of the programmes they are using to spy on everybody. So I am feeling kind of responsible for this, so I'm trying to turn it around. And we are starting to have some success, by the way." Binney explained the NSA is seeking to map everybody in the electronic world, so any electronic transaction can be used, stored and manipulated. "I would say they are very good at collecting data and storing data, but they are very bad at analysing it, because they are collecting everything."
  • Binney explained US media had covered the NSA's PRISM programme extensively when details emerged. "Well, the PRISM programme was just a miniscule amount of data compared to the Upstream [programme]. The Upstream was the big programme and that's where they are tapping the fibre lines and pulling the data off as it floats by. "Of course, that is the real programme that is collecting the massive amounts of data that's all done under Executive Order 1333, meaning it has no oversight by courts of Congress in the United States. So they're collecting everything on everybody." Binney also outlined an NSA programme named Treasure Map, aimed at mapping the entire global communications network and every device on it, all the time. "What this means is they want to monitor the location of everybody in the world using a device; that being approximately four billion people. "And they want to have that knowledge every minute of the day."
  • ...1 more annotation...
  • Binney said he refers to the NSA as a new Stasi agency, saying its work is effectively destroying democracy, as the NSA is collecting files on everyone in the world. "This was an adoption of totalitarian state procedures. "They're doing this in secret, with secret interpretations of laws, in a secret court, making secret decisions on constitutionality, and all of that behind closed doors. That really is a threat to everybody."
2More

12 Reasons America Doesn't Win Its Wars | The American Conservative - 0 views

  • America doesn’t “win” its wars, because winning a war is secondary to other goals in our war making. Winning or losing has little immediate consequence for the United States, because the wars we start, Wars of Choice, are not of vital national interest; losing doesn’t mean getting invaded or our cities being destroyed. The following are some of the interests Washington has in not winning, reasons for our unending wars.
  • America doesn’t “win” its wars, because winning a war is secondary to other goals in our war making. Winning or losing has little immediate consequence for the United States, because the wars we start, Wars of Choice, are not of vital national interest; losing doesn’t mean getting invaded or our cities being destroyed. The following are some of the interests Washington has in not winning, reasons for our unending wars.
« First ‹ Previous 161 - 180 of 758 Next › Last »
Showing 20 items per page