Skip to main content

Home/ Socialism and the End of the American Dream/ Group items matching "learning" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
5More

Glenn Greenwald: The NSA Can "Literally Watch Every Keystroke You Make" - 0 views

  • On Sunday, the German publication Der Spiegel revealed new details about secretive hacking—a secretive hacking unit inside the NSA called the Office of Tailored Access Operations, or TAO. The unit was created in 1997 to hack into global communications traffic. Still with us, Jameel Jaffer, deputy legal director of the ACLU, director of the ACLU’s Center for Democracy, and Glenn Greenwald, the journalist who first broke the story about Edward Snowden. Glenn, can you just talk about the revelations in Der Spiegel?
  • And one of the ways that they’re doing it is that they intercept products in transit, such as if you order a laptop or other forms of Internet routers or servers and the like, they intercept it in transit, open the box, implant the malware, factory-seal it and then send it back to the user. They also exploit weaknesses in Google and YouTube and Yahoo and other services, as well, in order to implant these devices. It’s unclear to what extent, if at all, the companies even know about it, let alone cooperate in it. But what is clear is that they’ve been able to compromise the physical machines themselves, so that it makes no difference what precautions you take in terms of safeguarding the sanctity of your online activity.
  • But we’ve actually been working, ourselves, on certain stories that should be published soon regarding similar interdiction efforts. And one of the things that I think is so amazing about this, Amy, is that the U.S. government has spent the last three or four years shrilly, vehemently warning the world that Chinese technology companies are unsafe to purchase products from, because they claim the Chinese government interdicts these products and installs surveillance, backdoors and other forms of malware onto the machinery so that when you get them, immediately your privacy is compromised. And they’ve actually driven Chinese firms out of the U.S. market and elsewhere with these kinds of accusations. Congress has convened committees to issue reports making these kind of accusations about Chinese companies. And yet, at the same time, the NSA is doing exactly that which they accuse these Chinese companies of doing. And there’s a real question, which is: Are these warnings designed to steer people away from purchasing Chinese products into the arms of the American industry so that the NSA’s ability to implant these devices becomes even greater, since now everybody is buying American products out of fear that they can no longer buy Chinese products because this will happen to them?
  • ...1 more annotation...
  • And the final thing I want to say is, you know, all this talk about amnesty for Edward Snowden, and it’s so important that the rule of law be applied to him, it’s really quite amazing. Here’s Michael Hayden. He oversaw the illegal warrantless eavesdropping program implemented under the Bush administration. He oversaw torture and rendition as the head of the CIA. James Clapper lied to the face of Congress. These are felonies at least as bad, and I would say much worse, than anything Edward Snowden is accused of doing, and yet they’re not prosecuted. They’re free to appear on television programs. The United States government in Washington constantly gives amnesty to its highest officials, even when they commit the most egregious crimes. And yet the idea of amnesty for a whistleblower is considered radical and extreme. And that’s why a hardened felon like Michael Hayden is free to walk around on the street and is treated on American media outlets as though he’s some learned, wisdom-drenched elder statesman, rather than what he is, which is a chronic criminal.
  •  
    Greenwald asks a very good question about the U.S. government accusing the Chinese government of cyber-espionage and the government's finding that Chinese-manufactured ware pose a security risk. Was that intended to drive people to purchase hardware that comes equipped with NSA backdoors? The flip side, of course, is whether the world should be beating feet to purchase their hardware from the Chinese in order to escape the NSA backdoors. Then there is the question of how those backdoors might have made their way into the hardware devices without the acquiescence of their manufacturers, who surely would have realized that their businesses might take enormous financial hits if knowledge of the backdoors became public? Bribing key staff? The manufacturers named in the Der Spiegel article surely are going to face some hard questions and they may face some very unhappy shareholders if their stock prices take a dive. It would be fun to see a shareholder's derivative class action against one of these companies for having acquiesced to NSA implantation of backdoors, leading to the disclosure and the fall in stock price. Caption the case as Wall Street, Inc. v. National Security Agency, dba Seagate Technology, PLC, then watch the feathers and blood fly.  "Seagate is the company the world trusts to store our lives - our files and photos, our libraries and histories, our science and progress."   Yes, and your stockholders trusted you not to endanger their investment by adding NSA backdoors in your products.
8More

Statism: Whether Fascist or Communist, It's The Deadly Opposite of Capitalism - Forbes - 0 views

shared by Gary Edwards on 02 Jan 14 - No Cached
  • So, we observe a fundamental difference: one system grants the state unlimited power, holding that the individual is the rightless slave of the state; the other system holds individual rights to be supreme and inalienable, with the state limited to a single function: the protection of those rights from physical force and fraud.
  • That is the distinction that must be made. We can expect no clarity in political discussion until the pure, consistent poles are identified: the opposition between dictatorship and liberty, between the individual as the nothing and the individual as sovereign. “Left” and “Right” have to be defined accordingly.
  • But “Left” and “Right” are informal shorthand. The actual terms are: “statism,” on the Left, and “capitalism,” on the Right.
  • ...4 more annotations...
  • Today’s political-economic system is not capitalism–not pure, consistent, uncontrolled, laissez-faire capitalism. Today in America we live in the Entitlement State and the Regulatory State.
  • A government that taxes 40 percent or more of our income, that controls our medical care, that regulates business so thoroughly that every firm large enough to afford it has a department of “compliance,” a government that controls the money supply, sets bank reserve-ratios, regulates stock offerings, margin-ratios, home construction, determines what pharmaceuticals and medical innovations can be sold, operates schools and universities, runs the passenger rail system, forbids “offensive” speech, increasingly intervenes in diet, subsidizes agriculture and “green” businesses, imposes tariffs, decides which businesses may merge, and, we have just learned, spies on its own citizens–is not a government remotely consistent with capitalism.
  • The closest the world ever came to actual capitalism was the United States in the 19th Century, the era of this country’s fastest economic growth. Even in that era, the capitalist, industrial North had to fight a bloody Civil War to end the South’s infamous anti-capitalist institution: slavery.
  • the political spectrum–Left vs. Right–must be defined in terms of statism vs. individual liberty.
  •  
    The political spectrum of Left vs Right must be defined in terms of STATISM vs Individual Liberty. Liberty as understood by the Founding Fathers, and baked into the founding documents.
3More

Merkel compared NSA to Stasi in heated encounter with Obama | World news | The Guardian - 0 views

  • In an angry exchange with Barack Obama, Angela Merkel has compared the snooping practices of the US with those of the Stasi, the ubiquitous and all-powerful secret police of the communist dictatorship in East Germany, where she grew up.The German chancellor also told the US president that America's National Security Agency cannot be trusted because of the volume of material it had allowed to leak to the whistleblower Edward Snowden, according to the New York Times.Livid after learning from Der Spiegel magazine that the Americans were listening in to her personal mobile phone, Merkel confronted Obama with the accusation: "This is like the Stasi."The newspaper also reported that Merkel was particularly angry that, based on the disclosures, "the NSA clearly couldn't be trusted with private information, because they let Snowden clean them out."
  • Snowden is to testify on the NSA scandal to a European parliament inquiry next month, to the anger of Washington which is pressuring the EU to stop the testimony.
  • A draft report by a European parliament inquiry into the affair, being presented on Wednesday and obtained by the Guardian, says there has to be a discussion about the legality of the NSA's operations and also of the activities of European intelligence agencies.The report drafted by Claude Moraes, the British Labour MEP heading the inquiry, says "we have received substantial evidence that the operations by intelligence services in the US, UK, France and Germany are in breach of international law and European law".
4More

Netanyahu orders IDF to prepare for possible strike on Iran during 2014 - Diplomacy and... - 0 views

  • Prime Minister Benjamin Netanyahu and Defense Minister Moshe Ya’alon have ordered the army to continue preparing for a possible military strike on Iran’s nuclear facilities at a cost of at least 10 billion shekels ($2.89 billion) this year, despite the talks between Iran and the West, according to recent statements by senior military officers. Three Knesset members who were present at Knesset joint committee hearings on Israel Defense Forces plans that were held in January and February say they learned during the hearings that 10 billion shekels to 12 billion shekels of the defense budget would be allocated this year for preparations for a strike on Iran, approximately the same amount that was allocated in 2013.
  • Some MKs asked the army’s deputy chief of staff, Maj. Gen. Gadi Eizenkot, and planning directorate official Brig. Gen. Agai Yehezkel whether they felt there was justification for investing so much money in those preparations, said the MKs present at the meetings, who asked that their names be withheld because of the sensitivity of the issue. They said some lawmakers also asked whether the interim agreement reached between Iran and the six powers in November 2013, and the ongoing negotiations for a full nuclear accord, had caused any change in the IDF’s preparations. The IDF representatives said the army had received a clear directive from government officials from the political echelon – meaning Netanyahu and Ya’alon – to continue readying for a possible independent strike by Israel on the Iranian nuclear sites, regardless of the talks now happening between Iran and the West, the three MKs said.
  • Ya’alon recently indicated during a speech at Tel Aviv University that his view has shifed and he is now likely to support a unilateral Israeli strike on Iran, in light of his assessment that the Obama administration will not do so. “We think that the United States should be the one leading the campaign against Iran,” Ya’alon said this week. “But the U.S. has entered talks with them and unfortunately, in the haggling in the Persian bazaar, the Iranians were better. ... Therefore, on this matter, we have to behave as though we have nobody to look out for us but ourselves.” The second round of nuclear talks opened in Vienna on Tuesday, with the participation of European Union foreign policy chief Catherine Ashton, Iranian Foreign Minister Mohammed Jawad Zarif and senior diplomats from the six powers.
  • ...1 more annotation...
  • After the first day of talks, Ashton’s spokesman, Michael Mann, described them as “positive, serious and substantive.” Iranian media reported that officials with the Iranian delegation said this round of talks will focus on how much uranium enrichment Iran will be permitted as part of a final accord, along with the future of the heavy water plant at Arak and the lifting of sanctions. In an opinion piece in Britain’s Financial Times this week, Zarif argued that his country is not seeking nuclear weapons and said the West’s suspicions will threaten Iran’s national security. Nuclear weapons are a tool of the past, Zarif argued, writing: “Israel’s nuclear arsenal was of little help in Lebanon in 2006.” Zarif said Iran must convince the West that it is not seeking nuclear arms, citing the fatwa ostensibly written by supreme leader Ali Khamenei that forbids the production of nuclear weapons.
8More

Revealed: Inside the Senate report on CIA interrogations | Al Jazeera America - 0 views

  • A still-classified report on the CIA's interrogation program established in the wake of 9/11 sparked a furious row last week between the agency and Senate Intelligence Committee chairwoman Dianne Feinstein. Al Jazeera has learned from sources familiar with its contents that the committee's report alleges that at least one high-value detainee was subjected to torture techniques that went beyond those authorized by George W. Bush's Justice Department. Two Senate staffers and a U.S. official, who spoke on the condition of anonymity because the information they disclosed remains classified, told Al Jazeera that the committee's analysis of 6 million pages of classified records also found that some of the harsh measures authorized by the Department of Justice had been applied to at least one detainee before such legal authorization was received. They said the report suggests that the CIA knowingly misled the White House, Congress and the Justice Department about the intelligence value of detainee Zain Abidin Mohammed Husain Abu Zubaydah when using his case to argue in favor of harsher interrogation techniques.
  • Even before accessing the documents, committee staffers received crucial information in a briefing from former FBI agent Ali Soufan in early 2008, according to Al Jazeera’s sources. Soufan — who now runs a private security and intelligence consultancy — told the staffers that he had kept meticulous notes about the methods used by a psychologist under CIA contract to interrogate Abu Zubaydah at a CIA black site in Thailand after his capture in Pakistan in March of 2002. Soufan's account, the staffers say, shows that torture techniques were used on Abu Zubaydah even before some had been sanctioned as permissible by the Bush administration.
  • Two Senate staffers told Al Jazeera that the Panetta documents question the Bush administration claims about the efficacy of Abu Zubaydah’s torture, and the staffers noted that some of the techniques to which he was subjected early in his captivity had not yet been authorized.
  • ...5 more annotations...
  • Soufan described his briefing of Intelligence Committee researchers in his memoir, “The Black Banners.” “In early 2008, in a conference room that is referred to as a sensitive compartmented information facility (SCIF), I gave a classified briefing on Abu Zubaydah to staffers of the Senate Select Committee on Intelligence,” Soufan wrote. “The staffers present were shocked. What I told them contradicted everything they had been told by Bush administration and CIA officials. When the discussion turned to whether I could prove everything I was saying, I told them, ‘Remember, an FBI agent always keep his notes.’ ”  The committee tried to gain access to Soufan’s notes — then in possession of the CIA and FBI — after it launched a review of the agency’s detention and interrogation program in 2009. But Senate investigators were told, according to Al Jazeera’s sources, that Soufan’s notes were missing and could not be found in either the FBI’s or CIA’s computer system, where other classified records about the interrogation program were stored. More than a year later, the notes ended up with the Senate Intelligence Committee, although it's not clear whether they were turned over to committee investigators by the CIA or FBI or if they were in the cache of documents taken by investigators from the secure facility in Northern Virginia in 2010, which Senate staffers refer to as the Panetta review.
  • A few weeks before the 2009 announcement of the Senate Intelligence Committee’s investigation, Abu Zubaydah’s attorney Brent Mickum was invited to meet with committee staffers in a secure conference room in the Senate Hart Office Building in Washington. Mickum recalled in an interview with Al Jazeera that committee staffers were interested in Abu Zubaydah’s recollections. “The committee was talking about torture and whether it was effective,” Mickum said. “I was able to relate to them what Abu Zubaydah told me. We talked about where he was tortured. I told them where we thought he was. I told them that the government confirmed he was never a member of Al-Qaeda. The drawings were then passed around the room.” Mickum and his co-counsel, Amy Jacobsen, presented to the committee staffers a set of ink drawings on yellow legal paper marked top secret by the CIA. Abu Zubaydah, they said, made the sketches to depict his torture and the torture of two other high-value detainees. One of the highly detailed drawings, according to knowledgeable intelligence officials, depict Abu Zubaydah being waterboarded. 
  • Senate staffers told Al Jazeera that Abu Zubaydah’s drawings were used in the report’s narrative but that the CIA objected to including copies of the images as exhibits.
  • When Panetta briefed CIA employees on March 16, 2009, about the Senate Intelligence Committee’s review, he said Feinstein and her Republican counterpart, Kit Bond of Missouri, had “assured” him “that their goal is to draw lessons for future policy decisions, not to punish those who followed guidance from the Department of Justice.” But now that some of the report’s conclusions suggest that some of the techniques used on Abu Zubaydah and other captives either went beyond what was authorized by the Justice Department or were applied before they had been authorized, the congressional staffers and U.S. officials who spoke to Al Jazeera said CIA officials are seeking further assurances against any criminal investigation. Thus far, no such assurances have been given, according to Al Jazeera’s sources, nor is there any indication that the Senate Intelligence Committee’s report would prompt a criminal investigation.
  • Chris Anders, senior legislative counsel for the American Civil Liberties Union, told Al Jazeera he's not surprised by the CIA's response, because many of those involved in the creation of the interrogation program still work at the agency and may fear being placed in legal jeopardy.  “Whatever is in the report is big enough and significant enough that the CIA has fought tooth and nail to keep it buried,” Anders said. “If what comes out in this report is as bad as some senators have said, it’s going to require a broader and deeper discussion about what took place, and it will be up to the president and Congress to lead the country through it, figure out what it means and how we need to respond to clean it up.”
8More

Half of Federal Agencies Still Use Outdated Freedom of Information Regulations - 0 views

  • Nearly half (50 out of 101) of all federal agencies have still not updated their Freedom of Information Act regulations to comply with Congress's 2007 FOIA amendments, and even more agencies (55 of 101) have FOIA regulations that predate and ignore President Obama's and Attorney General Holder's 2009 guidance for a "presumption of disclosure," according to the new National Security Archive FOIA Audit released today to mark Sunshine Week. Congress amended the Freedom of Information Act in 2007 to prohibit agencies from charging processing fees if they missed their response deadlines, to include new online journalists in the fee waiver category for the media, to order agencies to cooperate with the new FOIA ombudsman (the Office of Government Information Services, OGIS), and to require reports of specific data on their FOIA output, among other provisions co-authored by Senators Patrick Leahy (D-VT) and John Cornyn (R-TX). But half the government has yet to incorporate these changes in their regulations, according to the latest National Security Archive FOIA Audit. After President Obama's "Day One" commitments to open government, Attorney General Eric Holder issued new FOIA guidance on March 19, 2009, declaring that agencies should adopt a "presumption of disclosure," encourage discretionary releases if there was no foreseeable harm (even if technically covered by an exemption), proactively post the records of greatest public interest online, and remove "unnecessary bureaucratic hurdles" from the FOIA process. But five years later, the Archive found a majority of agencies have old regulations that simply ignore this guidance.
  • The Archive's FOIA Audit also highlights some good news this Sunshine Week: New plans from both the House of Representatives and White House have the potential to compel delinquent agencies to update their regulations. "Both Congress and the White House now recognize the problem of outdated FOIA regulations, and that is something to celebrate," said Archive director Tom Blanton. "But new regs should not follow the Justice Department's terrible lead, they must follow the best practices already identified by the FOIA ombuds office and FOIA experts." "If and when this important FOIA reform occurs, open government watchdogs must be vigilant to ensure that the agencies' updated regulations are progressive, rather than regressive, and embrace best practices to ensure that more documents are released to requesters, more quickly" said Nate Jones, the Archive's FOIA coordinator.
  • In 2011, the back-to-back Rosemary Award-winning Department of Justice proposed FOIA regulations that would have — among many other FOIA setbacks — allowed the Department to lie to FOIA requesters, eliminated online-only publications from receiving media fee status, and made it easier to destroy records. After intense pushback by openness advocates, the DOJ temporarily pulled these regulations, and Pustay claimed, "some people misinterpreted what we were trying to do, misconstrued some of the provisions, and didn't necessarily understand some of the fee guidelines." Pustay also claimed — to an incredulous Senate Judiciary Committee — that updating FOIA regulations to conform with the 2007 OPEN Government Act was merely optional and "not required." National Security Archive director Tom Blanton warned in his own 2013 Senate testimony that these terrible "vampire" regulations were not gone for good. This year, Pustay testified that the Department of Justice has indeed resubmitted its FOIA regulations for OMB approval; their content is unknown to the public.
  • ...4 more annotations...
  • The House of Representatives recently unanimously passed the bipartisan Freedom of Information Act Implementation Act (H.R. 1211), which includes a provision compelling agencies to update their FOIA regulations. The House bill — which now awaits Senate approval — would require each agency to update its FOIA regulations "not later than 180 days after the enactment of this Act." The White House is also addressing the problem of outdated FOIA regulations, albeit in a different manner. In its latest Open Government Partnership National Action Plan, the White House has committed (on paper, at least) to creating one "core FOIA regulation and common set of practices [that] would make it easier for requesters to understand and navigate the FOIA process and easier for the Government to keep regulations up to date." Transparency watchdogs went on alert this week after the Department of Justice's Director of Information Policy Melanie Pustay announced during her Senate testimony on March 11, 2014 that, "My office is leading that project" to create the White House-backed common regulation which, she estimated will be, "a one or two year project." Despite Pustay's pledge that she would accept input from OGIS and the requester community, her Department's history of crafting FOIA regulations has been anything but stellar.
  • As the Department of Justice and other agencies have demonstrated, new regulations do not necessarily make good regulations. As such, the National Security Archive has recommended that any updated FOIA regulations must: mandate that FOIA officers embrace direct communications with requesters; require agencies to receive requests by e-mail and post all responses and documents online; direct agencies to update their FOIA processing software so documents can be posted to any online repository, including the government-sponsored FOIAonline; encourage agencies to join FOIAonline to make their FOIA processing more cost-effective and efficient; stream-line inter and intra-agency "referral" black holes — and keep requesters abreast of where their requests are if the agency does have to refer them; include language encouraging use of the OGIS, which can help requesters and agencies mediate disputes to avoid animosity and costly litigation; end the practice of using fees to discourage FOIA requesters. The Office of Government Information Services — which reviews and comments on agency regulations as they are proposed — has also compiled a list of best practices for agencies to consider while crafting regulations. These include: "let the Freedom of Information Act itself" — and its presumption for disclosure — "be your guide;" bring attorneys, FOIA processors, records managers and IT pros to the table; include your plan for records management and preservation; and alert requesters of their option to contact OGIS for mediation and dispute resolution services.
  • A useful compilation of current agency FOIA regulation language — already on the books — put together by the Center of Effective Government also includes helpful guidelines on preventing the destruction of requested records; narrowly interpreting claims of confidential business information; and clarifying fee waivers and procedures. FOIA experts are currently working to craft model, pro-transparency, CFR-ready language that agencies — or the drafters of government-wide common regulations — can use to bring agencies' Freedom of Information Act regulations up to standard. Watch this space, and then watch the Code of Federal Regulations (CFR). "As the staffer who waded through every single federal agencies' FOIA website and CFR chapter to locate their — sometimes hidden — regulations, I learned FOIA officials often say they view their FOIA requesters as customers," said Archive researcher Lauren Harper, "I think easy to find, updated model FOIA regulations are the best way for agencies to demonstrate they truly value their customer service, and the spirit of the FOIA."
  • The National Security Archive has conducted thirteen FOIA audits since 2002. Modeled after the California Sunshine Survey and subsequent state "FOI Audits," the Archive's FOIA Audits use open-government laws to test whether or not agencies are obeying those same laws. Recommendations from previous Archive FOIA Audits have led directly to laws and executive orders which have: set explicit customer service guidelines, mandated FOIA backlog reduction, assigned individualized FOIA tracking numbers, forced agencies to report the average number of days needed to process requests, and revealed the (often embarrassing) ages of the oldest pending FOIA requests. The surveys include:
  •  
    Article includes tables indicating which agencies are out of compliance with which FOIA directives. 
4More

Crimean leaders blame Kiev for selling Ukraine off for IMF loans - News - World - The V... - 0 views

  • Crimea's deputy prime minister, Olga Kovitidi, described as predatory the terms of an agreement Kiev is ready to accept from the International Monetary Fund. The tentative agreement with the IMF which the Ukrainian authorities signed with the IMF on March 2, says that the country's entire gas pipeline system will be handed over for free in the American company Chevron's ownership the moment the basic agreement is signed, while the owners of the Mariupol, Zaporizhzhya and Dnipropetrovsk steel mills will be obliged to surrender their 50% stakes to Germany's Ruhr.
  • The Donbass coal industry will be handed over to Ruhr's subsidiary in Finland, she told Interfax on Sunday, citing media reports. It emerged recently that Kyiv has pledged to make territory available near Kharkiv to host US missile defense systems and a wing of American fighter jets to provide cover for the missile defense installations, she also said. Ukraine's interim prime minister Arseniy Yatsenyuk has assured the West that Kiev will fulfill all of the IMF's terms in order to secure a loan, Kovitidi said. The Crimean leaders have also learned that Kyiv promised the West to take a package of unpopular measures in order to fill gaps in the Ukrainian budget, she said. Gas prices for municipal companies will have to be increased by 50% and for private will double.
  • Electricity tariffs will be raised by 40%, housing utility tariffs will be raised, too, gasoline excises will go up 60% and transportation tariffs 50%, while state support for childbirth will be cancelled, the free distribution of textbooks will be annulled at schools and the VAT relief will be scrapped in rural regions, she said. Concurrently, VAT will be introduced on medications, which will push up prices and bring citizens' living standards down," Kovitidi said. "The planned annulment of the moratorium on the sale of farmland looks appalling. The selloff of Ukraine's black soil zone, including to foreign countries, may have disastrous economic and social consequences," she said. Kovitidi said that the Crimean legislature's decision to hold a referendum on March 16 was correct. "The recent developments in Ukraine and the decisions being made have a direct bearing on the people of Crimea, who must know the truth and decide their own and their children's future in a referendum," she said.
  •  
    Cute. The Ukrainian government needs $17 billion to service its debt to the banksters. The IMF agrees to hand over another $3 billion loan, while Obama promises another $1 billion, not nearly what is needed (Russia had offered $15 billion, an offer withdrawn in light of the coup instigated by the U.S. Now the austerity measures and privatization that always accompanies IMF loans begin. One of the first announced was to cut pensioners' monthly checks in half. Meanwhile, Iceland's economy continues to rebound after having refused to bail out its banksters and putting them in prison instead.
3More

Behind Clash Between C.I.A. and Congress, a Secret Report on Interrogations - NYTimes.com - 0 views

  • It was early December when the Central Intelligence Agency began to suspect it had suffered what it regarded as an embarrassing computer breach.Investigators for the Senate Intelligence Committee, working in the basement of a C.I.A. facility in Northern Virginia, had obtained an internal agency review summarizing thousands of documents related to the agency’s detention and interrogation program. Parts of the C.I.A. report cast a particularly harsh light on the program, the same program the agency was in the midst of defending in a prolonged dispute with the intelligence committee. What the C.I.A. did next opened a new and even more rancorous chapter in the struggle over how the history of the interrogation program will be written. Agency officials began scouring the digital logs of the computer network used by the Senate staff members to try to learn how and where they got the report. Their search not only raised constitutional questions about the propriety of an intelligence agency investigating its congressional overseers, but has also resulted in two parallel inquiries by the Justice Department — one into the C.I.A. and one into the committee.
  • Each side accuses the other of spying on it, with the Justice Department now playing the uneasy role of arbitrator in the bitter dispute. “It’s always been a dicey proposition to be investigating Congress,” said W. George Jameson, a C.I.A. lawyer for decades. “You don’t do it lightly.”At the center of the dispute is the classified internal C.I.A. review of the detention and interrogation program, a review that Democratic senators believe buttresses the conclusion in the intelligence committee’s 6,300-page report that the program yielded little valuable intelligence.The story of how the internal review became the focal point of an escalating fight is based on interviews with more than a dozen current and former government officials on both sides of the battle. Most of them declined to be identified because of the continuing investigations.
  •  
    More details of the CIA surveillance of the Senate Intelligence Committee that led to the current confrontation.
19More

Living in the small spaces around the State | RedState - 1 views

  • That’s why socialists despise federalism.
    • Gary Edwards
       
      Socialist despise federalism?  I disagree.  Socialist love big big and bigger government.  To the socialist, "the needs of society trump the rights and liberty of the individual".  That's why the HATE the Constitution!  The founding documents mark the first time in mankind's recorded history that God given inalienable individual rights and freedoms are the central force and moral imperative driving the institution of government.  To the founders, government only exists to protect the inalienable rights and freedoms of the individual.  The need for an "ordered society" is exactly to protect individual liberty! The socialist rejects this moral imperative and the ordered society created by the founding documents.  They reject the Constitution because it protects and champions individual liberty. 
    • Gary Edwards
       
      Perhaps there is a difference between what the founding fathers meant by Federalism, and what a Socialist means.  The founders thought of Federalism as a system of government where governance is balanced and divided three ways:  federal government, State government, and individual citizens. The powers and authorities of both federal and State governments were carefully enumerated and limited to only those emumerations.  Incredibly, the States voted to ratify the Constitution, thereby creating the Federal government.  Including full recognition of the Supremacy Clause and, the 9th and 10th Amendments.   And then, they embedded the Constitution in their own State Constitutions. I know of no socialist who accepts the concept of individual liberty trumping or even being equal to either State or Federal government authority.  The "Federalism" they accept does not include individual rights and authorities.  They also see State government as a subset of Federal government - and not the independent, sovereign governments consenting to the exact, enumerated authorities and powers granted the Federal government through the Constitution.  A grant that came from the people, and the States themselves.
  • Only centralized, inescapable power will do.  Otherwise, citizens can escape from oppressive socialist schemes by moving to a different community, which is relatively easy to do in 21st-century America.
  •  The Founders were very big on the importance of free people granting, and by extension withdrawing, consent from government.
  • ...14 more annotations...
  •  Moving away is the simplest method of withdrawing consent.  The ability to walk away from any deal, public or private, is the essential fuel of competition.  That’s why we are always on guard against monopolistic business practices.  Who cares whether a captive audience applauds or not?
  • But the Left insists on monopoly in the case of government power.  Elections are to be followed by obedience.  And this sphere of inescapable power grows relentlessly.
  • The one thing we are not allowed to vote on, ever, is reducing the size of government, and therefore increasing the sphere of liberty.
  • To the Left, that kind of talk is seditious.  Elections are about nudging the government into applying one trillion-dollar solution or other to society’s problems, but there must be a trillion-dollar solution.  Those who would prefer the government to do nothing are considered cruel or selfish… but the government “doing nothing” is the very definition of liberty.
  • So everything is now a matter of government interest, which means politics is all-consuming.  It’s amusing to listen to someone complain that they don’t like politics – a very common sentiment – while also declaring themselves comfortable with gigantic maternal government.
  • If you want the State to control, provide, tax, and limit everything, you had bloody well better learn to love politics.  They will be everywhere; they must be.
  • And because one person’s votes and opinions matter very little against the power of a mighty central government that controls the lives of hundreds of millions of people, you had better be prepared to get organized.  Your interests will only be protected if you belong to a large, aggressive political collective that can command the attention of politicians.
  • You must be aggressive in asserting those interests against others.  The State-run economy is a zero-sum game, a very limited pie, sliced with extremely sharp knives.  You either take, or you give.
  • The last energy of federalism will be drained away when the basket-case blue states begin imploding, and everyone else is taxed to bail them out.  It won’t matter that your state government was managed responsibly, or that your governor provided a growth-oriented business-friendly environment.  Your reward for that will be a bigger share of the bailout for the left-wing lunatics in Illinois and California.
  • Big Government is fundamentally incompatible with social harmony, although its acolytes are always trying to argue the reverse.
  • If you seek a more genteel society with less political strife, you want states to compete with each other for citizens.  
  • You want a federal government that will make America a magnet for investment, instead of building regulatory fences to keep it from fleeing overseas.  You want a system that spends less time telling people what they’re allowed to work for, and obliged to settle for.  
  • You want people to cooperate voluntarily, rather than using force to impose their demands on each other.  Life in such a society is not always placid, but at least the discord tends to be more productive.
  • Government is force.  Big government means more force.  Release cannot be tolerated, or else force dissipates.  Look at the current idiocy of the Washington, D.C. city council’s efforts to arrange a special $12.50 “living wage” that will only apply to Wal-Mart, which wanted to build a few stores in poverty-stricken, high-unemployment communities.  Wal-Mart said no thanks, and escaped.  The living wage crowd is very angry about this.  They won’t be happy until escape is impossible.
1More

"Everyone is corrupt, I've come to learn" - Salon.com - 0 views

  •  
    Barack Obama came to office promising to have the most transparent administration in U.S. history. This article is mandatory reading for anyone who believes Obama delivered on that promise. 
1More

Tea Party Community Organizers? - 2 views

  •  
    Tea Party Precinct Workers Needed: http://goo.gl/8u9wAI Republican Community Organizers? Or are they really libertarian infiltrators posturing as repubicans :) Interesting discussion at The Tea Party.org. Here is my comment concerning "fragmentation" and third party participation. And yes, I have registered to become a precinct worker on behalf of the Republican Party Libertarian Caucus movement. I've also listed myself in a number of local County Sheriff activities. It's getting real that matters :) ................... Fragmentation is an issue. Which is exactly why the core set of principles must be very limited. IMHO, restoring the founding documents and principles; the American Republic, the Constitution and the principles so famously described in the Declaration of Independence are the single point of agreement that defines "America". The founding documents created a Republic based on "individual liberty". So it would seem that the concept and value of "individual liberty" would be the single "lowest common denominator" that all Americans can rally around. Stray from the Constitution and Declaration, and you will have arguments that divide and defeat. Stay on point, arguing the value and importance of "individual liberty" and it becomes very hard to wander from the importance of limiting government, and protecting individual rights to privacy, property and prosperity. I've been very successful at arguing that a socialist can not honestly take the oath of office, oath of citizenship, or pledge of allegiance. The socialist believes that the rights and liberty of the individual is subordinate to the needs of society. For the socialist, there is no such thing as individual liberty or inalienable rights. They are un-Constitutional and un-American to the core of their being. For the libertarian, an ordered society based on limited government and the Rule of Law, is the best guarantor of effective and meaningful "individual liberty". The ess
28More

XKeyscore: NSA tool collects 'nearly everything a user does on the internet' | World ne... - 1 views

  • The latest revelations will add to the intense public and congressional debate around the extent of NSA surveillance programs. They come as senior intelligence officials testify to the Senate judiciary committee on Wednesday, releasing classified documents in response to the Guardian's earlier stories on bulk collection of phone records and Fisa surveillance court oversight.
  • The files shed light on one of Snowden's most controversial statements, made in his first video interview published by the Guardian on June 10
  • "I, sitting at my desk," said Snowden, could "wiretap anyone, from you or your accountant, to a federal judge or even the president, if I had a personal email".
  • ...23 more annotations...
  • US officials vehemently denied this specific claim. Mike Rogers, the Republican chairman of the House intelligence committee, said of Snowden's assertion: "He's lying. It's impossible for him to do what he was saying he could do."
  • But training materials for XKeyscore detail how analysts can use it and other systems to mine enormous agency databases by filling in a simple on-screen form giving only a broad justification for the search. The request is not reviewed by a court or any NSA personnel before it is processed.
  • XKeyscore, the documents boast, is the NSA's "widest reaching" system developing intelligence from computer networks – what the agency calls Digital Network Intelligence (DNI). One presentation claims the program covers "nearly everything a typical user does on the internet", including the content of emails, websites visited and searches, as well as their metadata.
  • Analysts can also use XKeyscore and other NSA systems to obtain ongoing "real-time" interception of an individual's internet activity.
  • Under US law, the NSA is required to obtain an individualized Fisa warrant only if the target of their surveillance is a 'US person', though no such warrant is required for intercepting the communications of Americans with foreign targets.
  • But XKeyscore provides the technological capability, if not the legal authority, to target even US persons for extensive electronic surveillance without a warrant provided that some identifying information, such as their email or IP address, is known to the analyst.
  • One training slide illustrates the digital activity constantly being collected by XKeyscore and the analyst's ability to query the databases at any time.
  • The purpose of XKeyscore is to allow analysts to search the metadata as well as the content of emails and other internet activity, such as browser history, even when there is no known email account (a "selector" in NSA parlance) associated with the individual being targeted.
  • Analysts can also search by name, telephone number, IP address, keywords, the language in which the internet activity was conducted or the type of browser used.
  • One document notes that this is because "strong selection [search by email address] itself gives us only a very limited capability" because "a large amount of time spent on the web is performing actions that are anonymous."
  • Email monitoring
  • One top-secret document describes how the program "searches within bodies of emails, webpages and documents", including the "To, From, CC, BCC lines" and the 'Contact Us' pages on websites".
  • To search for emails, an analyst using XKS enters the individual's email address into a simple online search form, along with the "justification" for the search and the time period for which the emails are sought.
  • One document, a top secret 2010 guide describing the training received by NSA analysts for general surveillance under the Fisa Amendments Act of 2008, explains that analysts can begin surveillance on anyone by clicking a few simple pull-down menus designed to provide both legal and targeting justifications.
  • Once options on the pull-down menus are selected, their target is marked for electronic surveillance and the analyst is able to review the content of their communications:
  • Chats, browsing history and other internet activity
  • Beyond emails, the XKeyscore system allows analysts to monitor a virtually unlimited array of other internet activities, including those within social media.
  • An NSA tool called DNI Presenter, used to read the content of stored emails, also enables an analyst using XKeyscore to read the content of Facebook chats or private messages.
  • The XKeyscore program also allows an analyst to learn the IP addresses of every person who visits any website the analyst specifies.
  • The quantity of communications accessible through programs such as XKeyscore is staggeringly large. One NSA report from 2007 estimated that there were 850bn "call events" collected and stored in the NSA databases, and close to 150bn internet records. Each day, the document says, 1-2bn records were added.
  • William Binney, a former NSA mathematician, said last year that the agency had "assembled on the order of 20tn transactions about US citizens with other US citizens", an estimate, he said, that "only was involving phone calls and emails". A 2010 Washington Post article reported that "every day, collection systems at the [NSA] intercept and store 1.7bn emails, phone calls and other type of communications."
  • The ACLU's deputy legal director, Jameel Jaffer, told the Guardian last month that national security officials expressly said that a primary purpose of the new law was to enable them to collect large amounts of Americans' communications without individualized warrants.
  • "The government doesn't need to 'target' Americans in order to collect huge volumes of their communications," said Jaffer. "The government inevitably sweeps up the communications of many Americans" when targeting foreign nationals for surveillance.
  •  
    "One presentation claims the XKeyscore program covers 'nearly everything a typical user does on the internet' ................................................................. A top secret National Security Agency program allows analysts to search with no prior authorization through vast databases containing emails, online chats and the browsing histories of millions of individuals, according to documents provided by whistleblower Edward Snowden. The NSA boasts in training materials that the program, called XKeyscore, is its "widest-reaching" system for developing intelligence from the internet. The latest revelations will add to the intense public and congressional debate around the extent of NSA surveillance programs. They come as senior intelligence officials testify to the Senate judiciary committee on Wednesday, releasing classified documents in response to the Guardian's earlier stories on bulk collection of phone records and Fisa surveillance court oversight. The files shed light on one of Snowden's most controversial statements, made in his first video interview published by the Guardian on June 10. "I, sitting at my desk," said Snowden, could "wiretap anyone, from you or your accountant, to a federal judge or even the president, if I had a personal email". US officials vehemently denied this specific claim. Mike Rogers, the Republican chairman of the House intelligence committee, said of Snowden's assertion: "He's lying. It's impossible for him to do what he was saying he could do." But training materials for XKeyscore detail how analysts can use it and other systems to mine enormous agency databases by filling in a simple on-screen form giving only a broad justification for the search. The request is not reviewed by a court or any NSA personnel before it is processed. XKeyscore, the documents boast, is the NSA's "widest reaching" system developing intelligence from computer networks - what the agency calls Digital Network Intelligence (DNI). One
  •  
    "But training materials for XKeyscore detail how analysts can use it and other systems to mine enormous agency databases by filling in a simple on-screen form giving only a broad justification for the search. The request is not reviewed by a court or any NSA personnel before it is processed. " Note in that regard that Snowden said in an earlier interview that use of this system rarely was audited and that when audited, the most common request if changes were requested was to beef up the justification for the search. The XScore system puts the lie to just about everything the Administration has claimed about intense oversight by all three branches of federal government and about not reading emails or listening to (Skype) phone calls. The lies keep stacking up in an ever-deepening pile.
4More

On Obama's cancellation of summit with Putin and extradition [ Glenn Greenwald | Commen... - 0 views

  • Former Bush-era CIA and NSA director Michael Hayden appeared on CNN this week and confirmed that our reporting on the NSA's X-Keyscore program was accurate, telling the nation that we should all be grateful for those capabilities.NYU journalism professor Jay Rosen has a superb essay on the behavior of the US media in NSA stories.Foreign Policy CEO and Editor David Rothkopf becomes the latest establishment figure to recognize, as he puts it in a quite good column: "I have myself been too slow to recognize that the benefits we have derived from Snowden's revelations substantially outweigh the costs associated with the breach."
  • Meanwhile, 150 press freedom and human rights groups from around the world issued a letter demanding that the US cease prosecuting Snowden on the ground that "Snowden's disclosures have triggered a much-needed public debate about mass surveillance online everywhere" and "thanks to him, we have learned the extent to which our online lives are systematically monitored by governments, without transparency, accountability or safeguards from abuse."
  • Finally, Princeton University international law professor Richard Falk has an Op-Ed today explaining that the granting of asylum to Snowden wasn't just within Russia's rights, but was legally compelled.
  • ...1 more annotation...
  • The US frequently refuses extradition requests where, unlike with Snowden, it involves serious crimes and there is an extradition treaty
2More

Intelligence Archives - Secrecy News - 0 views

  • The U.S. military has been investigating the use of sophisticated data mining tools to probe social media and other open sources in order to support military operations against money laundering, drug trafficking, terrorism and other threats.  But the window for doing so may be closing as the social media landscape changes, according to an internal assessment. U.S. Special Operations Command (SOCOM) National Capital Region (NCR) conducted a series of experiments over the past year under the rubric “QUANTUM LEAP” that was intended to test “non-traditional” tools and techniques to advance the SOCOM mission. An after-action report on the first experiment said it “was successful in identifying strategies and techniques for exploiting open sources of information, particularly social media, in support of a counter threat finance mission.”  Counter threat finance refers to efforts to disrupt an adversary’s finances.  A copy of the SOCOM NCR report was obtained by Secrecy News.  See “Project QUANTUM LEAP: After Action Report,” 12 September 2012. “Major lessons learned were the pronounced utility of social media in exploiting human networks, including networks in which individual members actively seek to limit their exposure to the internet and social media…,” the report said.
  • The report said that as valuable as the opportunity created by new techniques for data mining of open sources appears to be, it may prove to be transient. “We are currently in a ‘window’ of opportunity for exploitation of social media sources for application to CTF [counter threat finance] or other SOCOM NCR missions. This window could be as narrow as 18-24 months before the social media phenomenon transforms. This future transformation is unknown and could offer additional opportunities, or existing opportunities could be closed, but the only thing that is certain is that there will continue to be rapid change.”
2More

The NSA Is Commandeering the Internet - Bruce Schneier - The Atlantic - 1 views

  • It turns out that the NSA's domestic and world-wide surveillance apparatus is even more extensive than we thought. Bluntly: The government has commandeered the Internet. Most of the largest Internet companies provide information to the NSA, betraying their users. Some, as we've learned, fight and lose. Others cooperate, either out of patriotism or because they believe it's easier that way. I have one message to the executives of those companies: fight.
  •  
    Bruce Schneier details the reason that internet companies should fight back.
3More

Code words used in intercepted al Qaeda messages, US source says - 0 views

  • The intercepted al Qaeda communications that sparked the closure of U.S. embassies in the Middle East and North Africa contained specific words that American intelligence interpreted as a coded message for what they believed signaled a potentially imminent attack, CNN has learned.
  • A U.S. official declined to discuss specific code words on the intercepts but told CNN "there was a sense of imminence, a sense of the overall area at risk and the known actors. There was great concern." Members of Congress have indicated that National Security Agency surveillance programs played a role in intercepting and monitoring recent al Qaeda communications. The programs were defended by Secretary of State John Kerry on Tuesday. "A number of groups in the world have individually targeted not just American interests but free interests in the world," Kerry said during press conference in Brasilia, Brazil. "There have been bombings in many places in the world. Innocent people have lost their lives. And what the United States has been trying to do is prevent these things from happening beforehand by knowing what others might be plotting."
  •  
    Kerry's quote is significant because it links the State Dept. embassy closures in Arab nations to Obama Administration advocacy for NSA surveillance programs. 
4More

Michael Hayden talks to CNN about XKEYSCORE program. - 0 views

  • Does the NSA really operate a vast database that allows its analysts to sift through millions of records showing nearly everything a user does on the Internet, as was recently reported? Yes, and people should stop worrying and learn to love it, according former NSA chief Gen. Michael Hayden. Last week, the Guardian published a series of leaked documents revealing new details about an NSA surveillance program called XKEYSCORE. The newspaper said that the program enabled the agency to “search with no prior authorization through vast databases containing emails, online chats and the browsing histories of millions of individuals,” and secret slides dated 2008 showed how people could be deemed a target for searching the Web for “suspicious stuff” or by using encryption. Following the disclosures, Hayden appeared on CNN to discuss the agency’s surveillance programs. The general, who directed the NSA from 1999 through 2005, was remarkably candid in his responses to Erin Burnett’s questions about the Guardian’s XKEYSCORE report. Was there any truth to claims that the NSA is sifting through millions of browsing histories and able to collect virtually everything users do on the Internet? “Yeah,” Hayden said. “And it's really good news.”
  • Not only that, Hayden went further. He revealed that the XKEYSCORE was “a tool that's been developed over the years, and lord knows we were trying to develop similar tools when I was at the National Security Agency.” The XKEYSCORE system, Hayden said, allows analysts to enter a “straight-forward question” into a computer and sift through the “oceans of data” that have been collected as part of foreign intelligence gathering efforts. How this process works was illustrated in the Guardian’s report. Analysts can enter search terms to sift through data and select from a drop-down menu a target’s “foreignness factor,” which is intended to minimize the warrantless surveillance of Americans. However, operating a vast electronic dragnet such as this is far from an exact science, and the NSA’s system of sifting data from the backbone of international Internet networks likely sometimes involves gobbling up information on Americans’ communications and online activity—whether it is done wittingly or not. Indeed, the NSA reportedly only needs to have 51 percent certainty that it is targeting a foreigner. And as leaked secret rules for the surveillance have shown, even if the NSA does “inadvertently” gather Americans’ communications, it can hold on to them if they are deemed valuable for vague “foreign intelligence” purposes or if the communications show evidence of a crime that has occurred or may occur in the future.
  • In the CNN interview, Hayden described XKEYSCORE as “really quite an achievement” and said that it enabled NSA spies to find the needle in the haystack. But his ardent defense of the system is unlikely to reassure civil liberties advocates. Having Hayden’s support is a rather dubious stamp of approval, particularly because he was responsible for leading the NSA’s illegal warrantless wiretapping program, which was initiated post-9/11 and exposed by the New York Times in 2005. Hayden later went on to lead the CIA from 2006 through 2009, where he oversaw the use of the waterboarding torture technique and the operation of a controversial black-site prison program that was eventually dismantled by President Obama. The former NSA chief retired in 2009, but he has since become a regular media commentator, using a recent column at CNN to blast Snowden for leaking the secret NSA documents and implying that he’d like to see the Guardian journalist Glenn Greenwald prosecuted as a “co-conspirator” for his role reporting the surveillance scoops.
  •  
    Let's see, the entire U.S. military has been forbidden from reading The Guardian because the documents Edward Snowden leaked are still classified. But a former NSA chief can confirm their accuracy on CNN?  Surely, even as I write a grand jury is busy indicting him on Espionage Act charges? No? Smells like hypocrisy to me. 
6More

NSA shares raw intelligence including Americans' data with Israel | World news | The Gu... - 0 views

  • The National Security Agency routinely shares raw intelligence data with Israel without first sifting it to remove information about US citizens, a top-secret document provided to the Guardian by whistleblower Edward Snowden reveals.Details of the intelligence-sharing agreement are laid out in a memorandum of understanding between the NSA and its Israeli counterpart that shows the US government handed over intercepted communications likely to contain phone calls and emails of American citizens. The agreement places no legally binding limits on the use of the data by the Israelis.The disclosure that the NSA agreed to provide raw intelligence data to a foreign country contrasts with assurances from the Obama administration that there are rigorous safeguards to protect the privacy of US citizens caught in the dragnet. The intelligence community calls this process "minimization", but the memorandum makes clear that the information shared with the Israelis would be in its pre-minimized state.
  • The deal was reached in principle in March 2009, according to the undated memorandum, which lays out the ground rules for the intelligence sharing.The five-page memorandum, termed an agreement between the US and Israeli intelligence agencies "pertaining to the protection of US persons", repeatedly stresses the constitutional rights of Americans to privacy and the need for Israeli intelligence staff to respect these rights.But this is undermined by the disclosure that Israel is allowed to receive "raw Sigint" – signal intelligence. The memorandum says: "Raw Sigint includes, but is not limited to, unevaluated and unminimized transcripts, gists, facsimiles, telex, voice and Digital Network Intelligence metadata and content."According to the agreement, the intelligence being shared would not be filtered in advance by NSA analysts to remove US communications. "NSA routinely sends ISNU [the Israeli Sigint National Unit] minimized and unminimized raw collection", it says.
  • In a statement to the Guardian, an NSA spokesperson did not deny that personal data about Americans was included in raw intelligence data shared with the Israelis. But the agency insisted that the shared intelligence complied with all rules governing privacy."Any US person information that is acquired as a result of NSA's surveillance activities is handled under procedures that are designed to protect privacy rights," the spokesperson said.The NSA declined to answer specific questions about the agreement, including whether permission had been sought from the Foreign Intelligence Surveillance (Fisa) court for handing over such material.
  • ...3 more annotations...
  • While NSA documents tout the mutually beneficial relationship of Sigint sharing, another report, marked top secret and dated September 2007, states that the relationship, while central to US strategy, has become overwhelmingly one-sided in favor of Israel."Balancing the Sigint exchange equally between US and Israeli needs has been a constant challenge," states the report, titled 'History of the US – Israel Sigint Relationship, Post-1992'. "In the last decade, it arguably tilted heavily in favor of Israeli security concerns. 9/11 came, and went, with NSA's only true Third Party [counter-terrorism] relationship being driven almost totally by the needs of the partner."
  • In another top-secret document seen by the Guardian, dated 2008, a senior NSA official points out that Israel aggressively spies on the US. "On the one hand, the Israelis are extraordinarily good Sigint partners for us, but on the other, they target us to learn our positions on Middle East problems," the official says. "A NIE [National Intelligence Estimate] ranked them as the third most aggressive intelligence service against the US."Later in the document, the official is quoted as saying: "One of NSA's biggest threats is actually from friendly intelligence services, like Israel. There are parameters on what NSA shares with them, but the exchange is so robust, we sometimes share more than we intended."
  • The Guardian asked the Obama administration how many times US data had been found in the raw intelligence, either by the Israelis or when the NSA reviewed a sample of the files, but officials declined to provide this information. Nor would they disclose how many other countries the NSA shared raw data with, or whether the Fisa court, which is meant to oversee NSA surveillance programs and the procedures to handle US information, had signed off the agreement with Israel.In its statement, the NSA said: "We are not going to comment on any specific information sharing arrangements, or the authority under which any such information is collected. The fact that intelligence services work together under specific and regulated conditions mutually strengthens the security of both nations."NSA cannot, however, use these relationships to circumvent US legal restrictions. Whenever we share intelligence information, we comply with all applicable rules, including the rules to protect US person information."
2More

Credit unions fight back against tax repeal efforts - Business Monday - MiamiHerald.com - 0 views

  • At the moment, it’s a war of words, but very soon the debate to tax credit unions will hit the streets. This week, credit union supporters from South Florida and throughout the country will descend on Washington, D.C. to “Hike the Hill” and meet with lawmakers to stress the importance of keeping in place the federal tax exemption for credit unions. The debate is nothing new. For years, the big banks have lobbied Congress to repeal the tax exemption status. This time around, they declared war. Earlier this year, the American Bankers Association began advertising its anti-credit union message throughout Washington, and last month ABA executives wrote letters to President Barack Obama and Congress requesting a repeal of the tax exemption status. The ABA and their lobbyists complain that the growing financial stature of credit unions throughout the country proves that they should be taxed like banks. They even refer to the tax exemption as a government “expenditure,” which they claim should be eliminated as part of a larger tax reform and budget reduction package.
  • What the bankers fail to mention was that credit unions only hold 6 percent of all the financial assets in the United States while banks hold 93 percent. They also fail to mention that 96 million Americans are satisfied members of credit unions, and that for every dollar in new taxes the government might gain, it would be eliminating $10 of credit union member benefits. The Federal Credit Union Act of 1934 established the tax-exemption status of credit unions because the structure and goals of credit unions are far different from traditional banks. All credit unions are designated as not-for-profit, which means any and all profits made are redistributed back to credit union members in the form of higher interest rates on savings accounts and reduced fees. They offer loans at the lowest possible interest rates because their mandate is to cultivate community development by assisting working families, low income households, small businesses and the middle class.Banks operate very differently. Led by small groups of shareholders who seek to maximize return on their investment, they raise fees regardless of how much profit they accumulate. They offer loans at the highest possible interest rate because their mandate is to make money, not to assist anyone, including and especially the middle class. (It wasn’t long ago we learned this the hard way as predatory banks helped fuel the Great Recession.) The truth is, big banks want one thing and one thing only: to get bigger. They want to merge and grow and rack-in record profits so they can grow even bigger. Credit unions are the only thing standing in the way of an oligarchy of a few major banks from controlling all of the deposited funds in the country. Their pursuit to tax credit unions is aimed at eliminating their only competition so they can be free to charge as much interest and fees as they wish without restraint.
2More

OpenCongress - 113th Congress - Track bills, votes, senators, and representatives in th... - 0 views

  • Enter a lawmaker’s name, issue area or bill number to search OpenCongress. Discover who represents you, find relevant legislation and learn how to take action.
  • Track Bills, Follow Lawmakers and More Create an OpenCongress account to get updates on lawmaking activity, bills and votes, and connect with other users on issues you care about.
« First ‹ Previous 181 - 200 of 361 Next › Last »
Showing 20 items per page