Skip to main content

Home/ Socialism and the End of the American Dream/ Group items matching "outlook" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Paul Merrell

Washington Post Defends Not Running Article On Iraq Media Failure - 0 views

  • Greg Mitchell, author of a recently updated book on media mistakes during the run-up to the Iraq War, So Wrong For So Long, revealed Saturday night on his blog that the Washington Post's Outlook section had killed an assigned piece related to the press debacle that was slated for publication this weekend. Mitchell noted that the Outlook section did run what he called a “misleading, cherry-picking” piece by Post media writer Paul Farhi, in which Farhi claims the media didn’t fail during the 2002-2003 rush to war.
  • The Post’s decision to run Farhi’s piece defending the press, and not Mitchell’s, got a lot of attention Sunday morning on Twitter. It was especially noteworthy given that the paper’s editorial board –- which helped promote the Bush administration’s bogus rationale for invading Iraq -– was silent on last Tuesday’s 10th anniversary of the start of the conflict. Outlook editor Carlos Lozada told The Huffington Post that the Post didn't run Mitchell's piece because it didn't draw the "broader analytical points or insights" the paper was looking for on the topic of Iraq War mea culpas. (Mitchell has posted his article here.)
Paul Merrell

NYPD Blows Whistle on New Hillary Emails: Money Laundering, Sex Crimes with Children, Child Exploitation, Pay to Play, Perjury - 1 views

  • New York Police Department detectives and prosecutors working an alleged underage sexting case against former Congressman Anthony Weiner have turned over a newly-found laptop he shared with wife Huma Abedin to the FBI with enough evidence “to put Hillary (Clinton) and her crew away for life,” NYPD sources told True Pundit. NYPD sources said Clinton’s “crew” also included several unnamed yet implicated members of Congress in addition to her aides and insiders. The NYPD seized the computer from Weiner during a search warrant and detectives discovered a trove of over 500,000 emails to and from Hillary Clinton, Abedin and other insiders during her tenure as secretary of state. The content of those emails sparked the FBI to reopen its defunct email investigation into Clinton on Friday.
  • But new revelations on the contents of that laptop, according to law enforcement sources, implicate the Democratic presidential candidate, her subordinates, and even select elected officials in far more alleged serious crimes than mishandling classified and top secret emails, sources said. NYPD sources said these new emails include evidence linking Clinton herself and associates to: Money laundering Child exploitation Sex crimes with minors (children) Perjury Pay to play through Clinton Foundation Obstruction of justice Other felony crimes NYPD detectives and a NYPD Chief, the department’s highest rank under Commissioner, said openly that if the FBI and Justice Department fail to garner timely indictments against Clinton and co- conspirators, NYPD will go public with the damaging emails now in the hands of FBI Director James Comey and many FBI field offices. “What’s in the emails is staggering and as a father, it turned my stomach,” the NYPD Chief said. “There is not going to be any Houdini-like escape from what we found. We have copies of everything. We will ship them to Wikileaks or I will personally hold my own press conference if it comes to that.”
  • The NYPD Chief said once Comey saw the alarming contents of the emails he was forced to reopen a criminal probe against Clinton. “People are going to prison,” he said. Meanwhile, FBI sources said Abedin and Weiner were cooperating with federal agents, who have taken over the non-sexting portions the case from NYPD. The husband-and-wife Clinton insiders  are both shopping for separate immunity deals, sources said. “If they don’t cooperate they are going to see long sentences,” a federal law enforcement source said. NYPD sources said Weiner or Abedin stored all the emails in a massive Microsoft Outlook program on the laptop. The emails implicate other current and former members of Congress and one high-ranking Democratic Senator as having possibly engaged in criminal activity too, sources said. Prosecutors in the office of US Attorney Preet Bharara have issued a subpoena for Weiner’s cell phones and travel records, law enforcement sources confirmed. NYPD said it planned to order the same phone and travel records on Clinton and Abedin, however, the FBI said it was in the process of requesting the identical records. Law enforcement sources are particularly interested in cell phone activity and travel to the Bahamas, U.S. Virgin Islands and other locations that sources would not divulge.
  • ...4 more annotations...
  • The new emails contain travel documents and itineraries indicating Hillary Clinton, President Bill Clinton, Weiner and multiple members of Congress and other government officials accompanied convicted pedophile billionaire Jeffrey Epstein on his Boeing 727 on multiple occasions to his private island in the U.S Virgin Islands, sources said. Epstein’s island has also been dubbed Orgy Island or Sex Slave Island where Epstein allegedly pimps out underage girls and boys to international dignitaries. Both NYPD and FBI sources confirm based on the new emails they now believe Hillary Clinton traveled as Epstein’s guest on at least six occasions, probably more when all the evidence is combed, sources said. Bill Clinton, it has been confirmed in media reports spanning recent years, that he too traveled with Epstein over 20 times to the island.
  • According to other uncovered emails, Abedin and Clinton both sent and received thousands of classified and top secret documents to personal email accounts including Weiner’s unsecured campaign web site which is managed by Democratic political consultants in Washington D.C. Weiner maintained little known email accounts that the couple shared on the website anthonyweiner.com. Weiner, a former seven-term Democratic Congressman from New York, primarily used that domain to campaign for Congress and for his failed mayoral bid of New York City. At one point, FBI sources said, Abedin and Clinton’s classified and top secret State Department documents and emails were stored in Weiner’s email on a server shared with a dog grooming service and a western Canadian bicycle shop. However, Weiner and Abedin, who is Hillary Clinton’s closest personal aide, weren’t the only people with access to the Weiner’s email account. Potentially dozens of unknown individuals had access to Abedin’s sensitive State Department emails that were stored in Weiner’s email account, FBI sources confirmed. FEC records show Weiner paid more than $92,000 of congressional campaign funds to Anne Lewis Strategies LLC to manage his email and web site. According to FBI sources, the D.C.-based political consulting firm has served as the official administrator of the anthonyweiner.com domain since 2010, the same time Abedin was working at the State Department. This means technically Weiner and Abedin’s emails, including top secret State Department emails, could have been accessed, printed, discussed, leaked, or distributed by untold numbers of personnel at the Anne Lewis consulting firm because they can control where the website and it emails are pointed, FBI sources said.
  • According to FBI sources, the bureau’s newly-minted probe into Clinton’s use and handling of emails while she served as secretary of state, has also been broadened to include investigating new email-related revelations, including: Abedin forwarded classified and top secret State Department emails to Weiner’s email Abedin stored emails, containing government secrets, in a special folder shared with Weiner warehousing over 500,000 archived State Department emails. Weiner had access to these classified and top secret documents without proper security clearance to view the records Abedin also used a personal yahoo address and her Clintonemail.com address to send/receive/store classified and top secret documents A private consultant managed Weiner’s site for the last six years, including three years when Clinton was secretary of state, and therefore, had full access to all emails as the domain’s listed registrant and administrator via Whois email contacts. Because Weiner’s campaign website is managed by the third-party consultant and political email guru, FBI agents are burdened with the task of trying to decipher just how many people had access to Weiner’s server and emails and who were these people. Or if the server was ever compromised by hackers, or other actors.
  • Abedin told FBI agents in an April interview that she didn’t know how to consistently print documents or emails from her secure Dept. of State system. Instead, she would forward the sensitive emails to her yahoo, Clintonemail.com and her email linked to Weiner. Abedin said, according to FBI documents, she would then access those email accounts via webmail from an unclassified computer system at the State Dept. and print the documents, many of which were classified and top secret, from the largely unprotected webmail portals. Clinton did not have a computer in her office on Mahogany Row at the State Dept. so she was not able to read timely intelligence unless it was printed out for her, Abedin said. Abedin also said Clinton could not operate the secure State Dept. fax machine installed in her Chappaqua, NY home without assistance. Perhaps more alarming, according to the FBI’s 302 Report detailing its interview with Abedin, none of the multiple FBI agents and Justice Department officials who conducted the interview pressed Abedin to further detail the email address linked to Weiner. There was never a follow up, according to the 302 report. But now, all that has changed, with the FBI’s decision to reopen the Clinton email investigation and the husband and wife seeking immunity deals to testify against Clinton and other associates about the contents of the laptop’s emails.
  •  
    "New York Police Department detectives and prosecutors working an alleged underage sexting case against former Congressman Anthony Weiner have turned over a newly-found laptop he shared with wife Huma Abedin to the FBI with enough evidence "to put Hillary (Clinton) and her crew away for life," NYPD sources told True Pundit. NYPD sources said Clinton's "crew" also included several unnamed yet implicated members of Congress in addition to her aides and insiders. The NYPD seized the computer from Weiner during a search warrant and detectives discovered a trove of over 500,000 emails to and from Hillary Clinton, Abedin and other insiders during her tenure as secretary of state. The content of those emails sparked the FBI to reopen its defunct email investigation into Clinton on Friday. But new revelations on the contents of that laptop, according to law enforcement sources, implicate the Democratic presidential candidate, her subordinates, and even select elected officials in far more alleged serious crimes than mishandling classified and top secret emails, sources said. NYPD sources said these new emails include evidence linking Clinton herself and associates to: Money laundering Child exploitation Sex crimes with minors (children) Perjury Pay to play through Clinton Foundation Obstruction of justice Other felony crimes NYPD detectives and a NYPD Chief, the department's highest rank under Commissioner, said openly that if the FBI and Justice Department fail to garner timely indictments against Clinton and co- conspirators, NYPD will go public with the damaging emails now in the hands of FBI Director James Comey and many FBI field offices. "What's in the emails is staggering and as a father, it turned my stomach," the NYPD Chief said. "There is not going to be any Houdini-like escape from what we found. We have copies of everything. We will ship them to Wikileaks or I will personally hold my own press conference if it comes to that." The NYPD
Gary Edwards

Morning Bell: The Obama Fiscal Responsibility Farce Continues | The Foundry: Conservative Policy News. - 3 views

  • This February, after signing the largest single-year increase in domestic federal spending since World War II, President Obama held a “fiscal responsibility” summit designed to “send a signal that we are serious” about putting the nation on sounder financial footing. The Washington Post’s Dana Milbank quipped at the time: “Holding a ‘fiscal responsibility summit’ at the White House in the middle of a government spending spree is a bit like having an Alcoholics Anonymous meeting at a frat house on homecoming weekend.”
  •  
    Conn puts the numbers into the context of events and issues.  Good read. Today President Barack Obama's National Commission on Fiscal Responsibility and Reform will convene for the first time at the White House. Tasked with making recommendations to Congress that would put the budget in primary balance by 2015 and "meaningfully improve" our nation's long-term fiscal outlook, the commission meets a little over a month after Congress approved a new $2.5 trillion health care entitlement that the Obama administration now confirms will increase our nation's total health care spending. This is a now familiar pattern for the White House: first enact record breaking levels of deficit spending, then turn right around and promise austerity sometime in the future.
Paul Merrell

Federal Reserve predicts new economic crisis - RT USA - 0 views

  • A recent meeting of the US Federal Reserve revealed that members of America’s central bank are not very optimistic about the future of the country’s economy. Even though the Fed is at odds regarding what to do in terms of helping economic growth — and it still remains unclear whether or not a third round of quantitative easing (QE3) is to come — the official forecast from the bank suggests that the US may be sliding into a crisis.Details from the Fed’s last meeting have been released to the public, and the minutes from that gathering reveal that the economists that oversee much of the inner-workings of the country’s fiscal policy remain concerned with the state of America.
  • “It seems as though the committee is moving away from quantitative easing as the central bank expects the economic activity to gradually gather pace over the coming months,” David Song, a currency analyst at DailyFX, adds to MarketWatch.“Although theFed kept the door open to expand monetary policy further, the recent rhetoric suggests that QE3 will be taken off the table as members of the board float the idea of looking at ‘new tools’ to strengthen the tepid recovery.”The minutes also reveal that 15 members of the Federal Open Market Committee had a poor outlook about America’s economy as of their last meeting, up from April’s figure of just eight.
Paul Merrell

US Attempts to Shame Asia for "Caving to China" | New Eastern Outlook - 0 views

  • It is becoming clear that US influence – despite its “pivot toward Asia” – is waning across the Asia Pacific region. Washington has suffered geopolitical setbacks in virtually every nation in Asia Pacific, including those now led by regimes it has meticulously organized, funded, and backed for decades. It is also waning, however, among those nations considered long-time and crucial US allies. This includes Southeast Asia’s Thailand, whom the US repeatedly reminds the world has been Washington’s ally since the Cold War and America’s war in Vietnam, and allegedly, even before that. Washington’s Waning Influence is Based on Floundering Fundamentals   However, in reality, Thailand has incrementally dismantled American influence over it, and has diversified its trade and cooperation with a large variety of nations – including China – as a means of depending on ties with no single nation in particular. Thailand’s economic trade is focused primarily within Asia, with the majority of its imports and exports divided equally between China, Japan, and ASEAN, with the West collectively representing a smaller – though not insignificant – market. It is no coincidence that Thailand’s geopolitical ties thus reflect its economic ties around the world – revealing that economic and sociopolitical realities are driving intentional relations regardless of the vast array of “soft power” means at Washington’s disposal. A look at Thailand’s military inventories reveals a similar strategy of diversifying weapon acquisitions and partnerships as well as developing systems through indigenous industry. What used to be a military dominated by American hardware and military exercises, is transforming with the acquisition of Chinese tanks, European warplanes, Middle Eastern assault rifles, Russian helicopters, and Thai-made armored vehicles – as well as joint drills held with a variety of nations, including for the first time, China. A similar shift is occurring throughout the rest of Asia, with China naturally assuming a large share of regional cooperation due to its geographic, economic, and demographic size. http://journal-neo.org/2016/10/24/us-attempts-to-shame-asia-for-caving-to-china/
Paul Merrell

Syria "Transition Plan" Lacks Legitimacy, Turkish Invasion Faces Quagmire | New Eastern Outlook - 0 views

  • The Western media has now repeatedly reported on a so-called “transition plan” unveiled in London by what it calls the “High Negotiations Committee” (HNC) – a group Western media outlets refuse to identify, enumerate, or discuss behind their superficial headlines. The BBC in its article, “Syria conflict: Opposition unveils transition plan,” would claim: The umbrella group representing Syria’s political and armed opposition factions has set out a plan for a political transition to end five years of war.  The High Negotiations Committee (HNC) proposed holding six months of negotiations with President Bashar al-Assad, accompanied by a full ceasefire.  Mr Assad would then hand over power to a unity government that would run Syria for 18 months and organise elections. This lack of information regarding who the HNC actually is comprised of is not due to the fact that Western media outlets do not know, but precisely because they do know – and including this information in articles about their “transition plan” would undermine its legitimacy. The majority of the committee do not even reside in Syria and have little to no ties with actual militant groups fighting on the ground there. Those armed groups that do continue to fight, are now openly operating under the umbrella of US State Department designated foreign terrorist organization Jabhat Al-Nusra – Al Qaeda in Syria – and have done so since a failed offensive attempting to break the Syrian government’s encirclement of Aleppo last month. In essence, this is a “transition plan” proposed by a fictional opposition committee that has no power in Syria, and should Syria and its allies be irresponsible enough to accept such a plan, they would be negotiating with irrelevant players hiding abroad while failing to address the very realities on the ground in Syria itself. It is a recipe for compounding the conflict, not ending it. http://journal-neo.org/2016/09/10/syria-transition-plan-lacks-legitimacy-turkish-invasion-faces-quagmire/
Gary Edwards

Terrorism: A Matrix of Lies and Deceit - Christopher Black - 0 views

  • Christopher Black is an international criminal lawyer based in Toronto, he is a member of the Law Society of Upper Canada and he is known for a number of high-profile cases involving human rights and war crimes, especially for the online magazine “New Eastern Outlook”.
  •  
    "Terrorism: A Matrix of Lies and Deceit - Good catch of a very interesting article from Marbux! Christopher Black (NEO) : So how is your war on "terrorism" going? I'm not doing too well at it since I have no idea who the enemy is. Like the American black comedian, Dick Gregory, who, on hearing that President Johnson had declared a war on poverty, ran out onto the street with a hand grenade to throw it at some poor people, I have no idea who the real enemy is, who to throw a grenade at. That makes me think. We are told, the world over, by every government, that we are in a "war against terrorism." But terrorism is an action, a tactic, a strategy. It's a method not person, a group, a country. How can there be a war against a method of war. But they want us to fight a method and never ask the why or the who. That doesn't seem to matter anymore. They tell us not to be concerned with why something happens, only how it happens. Let's face it, the Americans, with all the creative skills of Madison Avenue, have got us all to use a phrase that George Bush first used in 2001after the strange event in New York that has all the indicia of a state attack on its own people to justify the invasions of Afghanistan and then Iraq. It has become a euphemism and a justification for all the wars they have waged since. The people don't need to know why "terrorists" exist, or who they are and what motivates them, or even whether they really exist, for they are just "terrorists." Sometimes the war is against a "regime" that is "terrorising" its own people according to the "responsibility to protect" mafia that act as the chorus to the principal players in this theatre, as was done to Yugoslavia and Libya; or a regime that "terrorises the world", as we saw with Iraq. Sometimes the war is a phony war against 'terrorists" who are really mercenary forces fighting for the USA and its allies. We see this in Syria. We have seen it used agai
Paul Merrell

The Fed caused 93% of the entire stock market's move since 2008: Analysis - Yahoo Finance - 0 views

  • The bull market just celebrated its seventh anniversary. But the gains in recent years – as well as its recent sputter – may be explained by just one thing: monetary policy. The factors behind that and previous bubbles can be illuminated using simple visual analysis of a chart. The S&P 500 (^GSPC) doubled in value from November 2008 to October 2014, coinciding with the Federal Reserve Bank’s “quantitative easing” asset purchasing program. After three rounds of “QE,” where the Fed poured billions of dollars into the bond market monthly, the Fed’s balance sheet went from $2.1 trillion to $4.5 trillion. This isn’t just a spurious correlation, according to economist Brian Barnier, principal at ValueBridge Advisors and founder of FedDashboard.com. What’s more, he says previous bull runs in the market lasting several years can also be explained by single factors each time.
  • Barnier first compiled data on the total value of publicly-traded U.S. stocks since 1950. He then divided it by another economic factor, graphing the ratio for each one. If the chart showed horizontal lines stretching over long periods of time, that meant both the numerator (stock values) and the denominator (the other factor) were moving at the same rate. “That's the beauty of the visual analysis,” he said. “All we have to do is find straight, stable lines and we know we've got something good.”
  • Scouring hundreds of different factors, Barnier ultimately whittled it down to just four factors: GDP data five years into the future, household and nonprofit liabilities, open market paper, and the Fed’s assets. At different stretches of time, just one of those was the single biggest driver of the market and was confirmed with regression analyses.
  • ...2 more annotations...
  • He isolated each factor in a separate chart, calling them “eras” for the stock market. From after World War II until the mid-1970s, future GDP outlook explained 90% of the stock market’s move, according to statistical analysis by Barnier. GDP growth lost its sway on the market in the early 1970s with the rise of credit cards and consumer debt. Household liabilities grew with plastic first, followed by home mortgages, until the real estate crash of the early 1990s. Barnier’s analysis shows debt explained 95% of the entire market’s move during this time. The period between the mid- to late-1990s until 2000 was, of course, marked by the tech bubble. While stocks took much of the headline, that time also saw heightened activity in the commercial paper market. Startups and young companies sought cash beyond their stratospheric share values to fund their operations. Barnier’s regression analysis shows commercial paper increases could explain as much as 97% of the tech bubble. Shortly after the tech bubble burst, a housing bubble began, once more in the form of mortgages and other debt. That drove 94% of the market’s move for the first several years of the current century.
  • As the financial crisis reached a fevered pitch in 2008, the Federal Reserve took to flooding the financial market with dollars by buying up bonds. Simultaneously, interest rates fell dramatically, as bond yields move in the opposite direction of bond prices. Barnier sees the Fed as responsible for over 93% of the market from the start of QE until today. During the first half of 2013, the Fed caused the entire market’s growth, he said. Since the Fed stopped buying bonds in late 2014, the S&P 500 has been batted around in a 16% range and is more or less where it was when the QE came to a close. Investors need to anticipate the next driver, said Barnier. “Quantitative easing has stopped, but now we're into the interest rate world,” he said. “That means for any investor trying to figure out what to do, step one is starting with a macro strategy.”
Paul Merrell

Global Results, End of Year survey, George gallup, WIN, WIN/Gallup International, Gallup International - 0 views

  • Zurich, Switzerland - 30th December 2013 - WIN/Gallup International, the leading global association in market research and polling, has today published, in collaboration with The BBC's Today programme, the results of its annual End of Year Survey which explores the outlook, expectations, hopes and fears of people from 65 countries around the world.
  • US is considered to be the greatest threat to peace in the world, followed by Pakistan and China;
  •  
    Our nation's behavior has not gone unnoticed around the globe.
Paul Merrell

N.S.A. Able to Foil Basic Safeguards of Privacy on Web - NYTimes.com - 1 views

  • The National Security Agency is winning its long-running secret war on encryption, using supercomputers, technical trickery, court orders and behind-the-scenes persuasion to undermine the major tools protecting the privacy of everyday communications in the Internet age, according to newly disclosed documents.
  • The agency has circumvented or cracked much of the encryption, or digital scrambling, that guards global commerce and banking systems, protects sensitive data like trade secrets and medical records, and automatically secures the e-mails, Web searches, Internet chats and phone calls of Americans and others around the world, the documents show.
  • The N.S.A. hacked into target computers to snare messages before they were encrypted. In some cases, companies say they were coerced by the government into handing over their master encryption keys or building in a back door. And the agency used its influence as the world’s most experienced code maker to covertly introduce weaknesses into the encryption standards followed by hardware and software developers around the world.
  • ...11 more annotations...
  • “For the past decade, N.S.A. has led an aggressive, multipronged effort to break widely used Internet encryption technologies,” said a 2010 memo describing a briefing about N.S.A. accomplishments for employees of its British counterpart, Government Communications Headquarters, or GCHQ. “Cryptanalytic capabilities are now coming online. Vast amounts of encrypted Internet data which have up till now been discarded are now exploitable.”
  • Some of the agency’s most intensive efforts have focused on the encryption in universal use in the United States, including Secure Sockets Layer, or SSL; virtual private networks, or VPNs; and the protection used on fourth-generation, or 4G, smartphones. Many Americans, often without realizing it, rely on such protection every time they send an e-mail, buy something online, consult with colleagues via their company’s computer network, or use a phone or a tablet on a 4G network.
  • For at least three years, one document says, GCHQ, almost certainly in collaboration with the N.S.A., has been looking for ways into protected traffic of popular Internet companies: Google, Yahoo, Facebook and Microsoft’s Hotmail. By 2012, GCHQ had developed “new access opportunities” into Google’s systems, according to the document. (Google denied giving any government access and said it had no evidence its systems had been breached).
  • Paul Kocher, a leading cryptographer who helped design the SSL protocol, recalled how the N.S.A. lost the heated national debate in the 1990s about inserting into all encryption a government back door called the Clipper Chip. “And they went and did it anyway, without telling anyone,” Mr. Kocher said. He said he understood the agency’s mission but was concerned about the danger of allowing it unbridled access to private information.
  • The documents are among more than 50,000 shared by The Guardian with The New York Times and ProPublica, the nonprofit news organization. They focus on GCHQ but include thousands from or about the N.S.A. Intelligence officials asked The Times and ProPublica not to publish this article, saying it might prompt foreign targets to switch to new forms of encryption or communications that would be harder to collect or read. The news organizations removed some specific facts but decided to publish the article because of the value of a public debate about government actions that weaken the most powerful privacy tools.
  • The files show that the agency is still stymied by some encryption, as Mr. Snowden suggested in a question-and-answer session on The Guardian’s Web site in June. “Properly implemented strong crypto systems are one of the few things that you can rely on,” he said, though cautioning that the N.S.A. often bypasses the encryption altogether by targeting the computers at one end or the other and grabbing text before it is encrypted or after it is decrypted.
  • Because strong encryption can be so effective, classified N.S.A. documents make clear, the agency’s success depends on working with Internet companies — by getting their voluntary collaboration, forcing their cooperation with court orders or surreptitiously stealing their encryption keys or altering their software or hardware.
  • At Microsoft, as The Guardian has reported, the N.S.A. worked with company officials to get pre-encryption access to Microsoft’s most popular services, including Outlook e-mail, Skype Internet phone calls and chats, and SkyDrive, the company’s cloud storage service.
  • Simultaneously, the N.S.A. has been deliberately weakening the international encryption standards adopted by developers. One goal in the agency’s 2013 budget request was to “influence policies, standards and specifications for commercial public key technologies,” the most common encryption method. Cryptographers have long suspected that the agency planted vulnerabilities in a standard adopted in 2006 by the National Institute of Standards and Technology and later by the International Organization for Standardization, which has 163 countries as members. Classified N.S.A. memos appear to confirm that the fatal weakness, discovered by two Microsoft cryptographers in 2007, was engineered by the agency. The N.S.A. wrote the standard and aggressively pushed it on the international group, privately calling the effort “a challenge in finesse.” “Eventually, N.S.A. became the sole editor,” the memo says.
  • But the agencies’ goal was to move away from decrypting targets’ tools one by one and instead decode, in real time, all of the information flying over the world’s fiber optic cables and through its Internet hubs, only afterward searching the decrypted material for valuable intelligence. A 2010 document calls for “a new approach for opportunistic decryption, rather than targeted.” By that year, a Bullrun briefing document claims that the agency had developed “groundbreaking capabilities” against encrypted Web chats and phone calls. Its successes against Secure Sockets Layer and virtual private networks were gaining momentum.
  • Ladar Levison, the founder of Lavabit, wrote a public letter to his disappointed customers, offering an ominous warning. “Without Congressional action or a strong judicial precedent,” he wrote, “I would strongly recommend against anyone trusting their private data to a company with physical ties to the United States.”
  •  
    Lengthy article, lots of new information on NSA decryption capabilities, none of it good for those who value their data privacy.
  •  
    Thanks Paul - nice job cutting this monster down to size :)
Paul Merrell

Tomgram: Alfred McCoy, It's About Blackmail, Not National Security | TomDispatch - 0 views

  • For more than six months, Edward Snowden’s revelations about the National Security Agency (NSA) have been pouring out from the Washington Post, the New York Times, the Guardian, Germany’s Der Spiegel, and Brazil’s O Globo, among other places.  Yet no one has pointed out the combination of factors that made the NSA’s expanding programs to monitor the world seem like such a slam-dunk development in Washington.  The answer is remarkably simple.  For an imperial power losing its economic grip on the planet and heading into more austere times, the NSA’s latest technological breakthroughs look like a bargain basement deal when it comes to projecting power and keeping subordinate allies in line -- like, in fact, the steal of the century.  Even when disaster turned out to be attached to them, the NSA’s surveillance programs have come with such a discounted price tag that no Washington elite was going to reject them.
  • What exactly was the aim of such an unprecedented program of massive domestic and planetary spying, which clearly carried the risk of controversy at home and abroad? Here, an awareness of the more than century-long history of U.S. surveillance can guide us through the billions of bytes swept up by the NSA to the strategic significance of such a program for the planet’s last superpower. What the past reveals is a long-term relationship between American state surveillance and political scandal that helps illuminate the unacknowledged reason why the NSA monitors America’s closest allies. Not only does such surveillance help gain intelligence advantageous to U.S. diplomacy, trade relations, and war-making, but it also scoops up intimate information that can provide leverage -- akin to blackmail -- in sensitive global dealings and negotiations of every sort. The NSA’s global panopticon thus fulfills an ancient dream of empire. With a few computer key strokes, the agency has solved the problem that has bedeviled world powers since at least the time of Caesar Augustus: how to control unruly local leaders, who are the foundation for imperial rule, by ferreting out crucial, often scurrilous, information to make them more malleable.
  • Once upon a time, such surveillance was both expensive and labor intensive. Today, however, unlike the U.S. Army’s shoe-leather surveillance during World War I or the FBI’s break-ins and phone bugs in the Cold War years, the NSA can monitor the entire world and its leaders with only 100-plus probes into the Internet’s fiber optic cables. This new technology is both omniscient and omnipresent beyond anything those lacking top-secret clearance could have imagined before the Edward Snowden revelations began.  Not only is it unimaginably pervasive, but NSA surveillance is also a particularly cost-effective strategy compared to just about any other form of global power projection. And better yet, it fulfills the greatest imperial dream of all: to be omniscient not just for a few islands, as in the Philippines a century ago, or a couple of countries, as in the Cold War era, but on a truly global scale. In a time of increasing imperial austerity and exceptional technological capability, everything about the NSA’s surveillance told Washington to just “go for it.”  This cut-rate mechanism for both projecting force and preserving U.S. global power surely looked like a no-brainer, a must-have bargain for any American president in the twenty-first century -- before new NSA documents started hitting front pages weekly, thanks to Snowden, and the whole world began returning the favor.
  • ...12 more annotations...
  • As the gap has grown between Washington’s global reach and its shrinking mailed fist, as it struggles to maintain 40% of world armaments (the 2012 figure) with only 23% of global gross economic output, the U.S. will need to find new ways to exercise its power far more economically. As the Cold War took off, a heavy-metal U.S. military -- with 500 bases worldwide circa 1950 -- was sustainable because the country controlled some 50% of the global gross product. But as its share of world output falls -- to an estimated 17% by 2016 -- and its social welfare costs climb relentlessly from 4% of gross domestic product in 2010 to a projected 18% by 2050, cost-cutting becomes imperative if Washington is to survive as anything like the planet’s “sole superpower.” Compared to the $3 trillion cost of the U.S. invasion and occupation of Iraq, the NSA’s 2012 budget of just $11 billion for worldwide surveillance and cyberwarfare looks like cost saving the Pentagon can ill-afford to forego. Yet this seeming “bargain” comes at what turns out to be an almost incalculable cost. The sheer scale of such surveillance leaves it open to countless points of penetration, whether by a handful of anti-war activists breaking into an FBI field office in Media, Pennsylvania, back in 1971 or Edward Snowden downloading NSA documents at a Hawaiian outpost in 2012.
  • In October 2001, not satisfied with the sweeping and extraordinary powers of the newly passed Patriot Act, President Bush ordered the National Security Agency to commence covert monitoring of private communications through the nation's telephone companies without the requisite FISA warrants. Somewhat later, the agency began sweeping the Internet for emails, financial data, and voice messaging on the tenuous theory that such “metadata” was “not constitutionally protected.” In effect, by penetrating the Internet for text and the parallel Public Switched Telephone Network (PSTN) for voice, the NSA had gained access to much of the world’s telecommunications. By the end of Bush’s term in 2008, Congress had enacted laws that not only retrospectively legalized these illegal programs, but also prepared the way for NSA surveillance to grow unchecked. Rather than restrain the agency, President Obama oversaw the expansion of its operations in ways remarkable for both the sheer scale of the billions of messages collected globally and for the selective monitoring of world leaders.
  • By 2012, the centralization via digitization of all voice, video, textual, and financial communications into a worldwide network of fiber optic cables allowed the NSA to monitor the globe by penetrating just 190 data hubs -- an extraordinary economy of force for both political surveillance and cyberwarfare.
  • With a few hundred cable probes and computerized decryption, the NSA can now capture the kind of gritty details of private life that J. Edgar Hoover so treasured and provide the sort of comprehensive coverage of populations once epitomized by secret police like East Germany’s Stasi. And yet, such comparisons only go so far. After all, once FBI agents had tapped thousands of phones, stenographers had typed up countless transcripts, and clerks had stored this salacious paper harvest in floor-to-ceiling filing cabinets, J. Edgar Hoover still only knew about the inner-workings of the elite in one city: Washington, D.C.  To gain the same intimate detail for an entire country, the Stasi had to employ one police informer for every six East Germans -- an unsustainable allocation of human resources. By contrast, the marriage of the NSA’s technology to the Internet’s data hubs now allows the agency’s 37,000 employees a similarly close coverage of the entire globe with just one operative for every 200,000 people on the planet
  • Through the expenditure of $250 million annually under its Sigint Enabling Project, the NSA has stealthily penetrated all encryption designed to protect privacy. “In the future, superpowers will be made or broken based on the strength of their cryptanalytic programs,” reads a 2007 NSA document. “It is the price of admission for the U.S. to maintain unrestricted access to and use of cyberspace.” By collecting knowledge -- routine, intimate, or scandalous -- about foreign leaders, imperial proconsuls from ancient Rome to modern America have gained both the intelligence and aura of authority necessary for dominion over alien societies. The importance, and challenge, of controlling these local elites cannot be overstated. During its pacification of the Philippines after 1898, for instance, the U.S. colonial regime subdued contentious Filipino leaders via pervasive policing that swept up both political intelligence and personal scandal. And that, of course, was just what J. Edgar Hoover was doing in Washington during the 1950s and 1960s.
  • Indeed, the mighty British Empire, like all empires, was a global tapestry woven out of political ties to local leaders or “subordinate elites” -- from Malay sultans and Indian maharajas to Gulf sheiks and West African tribal chiefs. As historian Ronald Robinson once observed, the British Empire spread around the globe for two centuries through the collaboration of these local leaders and then unraveled, in just two decades, when that collaboration turned to “non-cooperation.” After rapid decolonization during the 1960s transformed half-a-dozen European empires into 100 new nations, their national leaders soon found themselves the subordinate elites of a spreading American global imperium. Washington suddenly needed the sort of private information that could keep such figures in line. Surveillance of foreign leaders provides world powers -- Britain then, America now -- with critical information for the exercise of global hegemony. Such spying gave special penetrating power to the imperial gaze, to that sense of superiority necessary for dominion over others.  It also provided operational information on dissidents who might need to be countered with covert action or military force; political and economic intelligence so useful for getting the jump on allies in negotiations of all sorts; and, perhaps most important of all, scurrilous information about the derelictions of leaders useful in coercing their compliance.
  • In late 2013, the New York Times reported that, when it came to spying on global elites, there were “more than 1,000 targets of American and British surveillance in recent years,” reaching down to mid-level political actors in the international arena. Revelations from Edward Snowden’s cache of leaked documents indicate that the NSA has monitored leaders in some 35 nations worldwide -- including Brazilian president Dilma Rousseff, Mexican presidents Felipe Calderón and Enrique Peña Nieto, German Chancellor Angela Merkel, and Indonesia’s president Susilo Bambang Yudhoyono.  Count in as well, among so many other operations, the monitoring of “French diplomatic interests” during the June 2010 U.N. vote on Iran sanctions and “widespread surveillance” of world leaders during the Group 20 summit meeting at Ottawa in June 2010. Apparently, only members of the historic “Five Eyes” signals-intelligence alliance (Australia, Canada, New Zealand, and Great Britain) remain exempt -- at least theoretically -- from NSA surveillance. Such secret intelligence about allies can obviously give Washington a significant diplomatic advantage. During U.N. wrangling over the U.S. invasion of Iraq in 2002-2003, for example, the NSA intercepted Secretary-General Kofi Anan’s conversations and monitored the “Middle Six” -- Third World nations on the Security Council -- offering what were, in essence, well-timed bribes to win votes. The NSA’s deputy chief for regional targets sent a memo to the agency’s Five Eyes allies asking “for insights as to how membership is reacting to on-going debate regarding Iraq, plans to vote on any related resolutions [..., and] the whole gamut of information that could give U.S. policymakers an edge in obtaining results favorable to U.S. goals.”
  • Indicating Washington’s need for incriminating information in bilateral negotiations, the State Department pressed its Bahrain embassy in 2009 for details, damaging in an Islamic society, on the crown princes, asking: “Is there any derogatory information on either prince? Does either prince drink alcohol? Does either one use drugs?” Indeed, in October 2012, an NSA official identified as “DIRNSA,” or Director General Keith Alexander, proposed the following for countering Muslim radicals: “[Their] vulnerabilities, if exposed, would likely call into question a radicalizer’s devotion to the jihadist cause, leading to the degradation or loss of his authority.” The agency suggested that such vulnerabilities could include “viewing sexually explicit material online” or “using a portion of the donations they are receiving… to defray personal expenses.” The NSA document identified one potential target as a “respected academic” whose “vulnerabilities” are “online promiscuity.”
  • Just as the Internet has centralized communications, so it has moved most commercial sex into cyberspace. With an estimated 25 million salacious sites worldwide and a combined 10.6 billion page views per month in 2013 at the five top sex sites, online pornography has become a global business; by 2006, in fact, it generated $97 billion in revenue. With countless Internet viewers visiting porn sites and almost nobody admitting it, the NSA has easy access to the embarrassing habits of targets worldwide, whether Muslim militants or European leaders. According to James Bamford, author of two authoritative books on the agency, “The NSA's operation is eerily similar to the FBI's operations under J. Edgar Hoover in the 1960s where the bureau used wiretapping to discover vulnerabilities, such as sexual activity, to ‘neutralize’ their targets.”
  • Indeed, whistleblower Edward Snowden has accused the NSA of actually conducting such surveillance.  In a December 2013 letter to the Brazilian people, he wrote, “They even keep track of who is having an affair or looking at pornography, in case they need to damage their target's reputation.” If Snowden is right, then one key goal of NSA surveillance of world leaders is not U.S. national security but political blackmail -- as it has been since 1898. Such digital surveillance has tremendous potential for scandal, as anyone who remembers New York Governor Eliot Spitzer’s forced resignation in 2008 after routine phone taps revealed his use of escort services; or, to take another obvious example, the ouster of France’s budget minister Jérôme Cahuzac in 2013 following wire taps that exposed his secret Swiss bank account. As always, the source of political scandal remains sex or money, both of which the NSA can track with remarkable ease.
  • By starting a swelling river of NSA documents flowing into public view, Edward Snowden has given us a glimpse of the changing architecture of U.S. global power. At the broadest level, Obama’s digital “pivot” complements his overall defense strategy, announced in 2012, of reducing conventional forces while expanding into the new, cost-effective domains of space and cyberspace. While cutting back modestly on costly armaments and the size of the military, President Obama has invested billions in the building of a new architecture for global information control. If we add the $791 billion expended to build the Department of Homeland Security bureaucracy to the $500 billion spent on an increasingly para-militarized version of global intelligence in the dozen years since 9/11, then Washington has made a $1.2 trillion investment in a new apparatus of world power.
  • So formidable is this security bureaucracy that Obama’s recent executive review recommended the regularization, not reform, of current NSA practices, allowing the agency to continue collecting American phone calls and monitoring foreign leaders into the foreseeable future. Cyberspace offers Washington an austerity-linked arena for the exercise of global power, albeit at the cost of trust by its closest allies -- a contradiction that will bedevil America’s global leadership for years to come. To update Henry Stimson: in the age of the Internet, gentlemen don't just read each other’s mail, they watch each other’s porn. Even if we think we have nothing to hide, all of us, whether world leaders or ordinary citizens, have good reason to be concerned.
Paul Merrell

Afghanistan gains will be lost quickly after drawdown, U.S. intelligence estimate warns - The Washington Post - 0 views

  • A new American intelligence assessment on the Afghan war predicts that the gains the United States and its allies have made during the past three years are likely to have been significantly eroded by 2017, even if Washington leaves behind a few thousand troops and continues bankrolling the impoverished nation, according to officials familiar with the report. The National Intelligence Estimate, which includes input from the country’s 16 intelligence agencies, predicts that the Taliban and other power brokers will become increasingly influential as the United States winds down its longest war in history, according to officials who have read the classified report or received briefings on its conclusions. The grim outlook is fueling a policy debate inside the Obama administration about the steps it should take over the next year as the U.S. military draws down its remaining troops.
  • “In the absence of a continuing presence and continuing financial support,” the intelligence assessment “suggests the situation would deteriorate very rapidly,” said one U.S. official familiar with the report. That conclusion is widely shared among U.S. officials working on Afghanistan, said the official, who was among five people familiar with the report who agreed to speak on the condition of anonymity to discuss the assessment. Some officials have taken umbrage at the underlying pessimism in the report, arguing that it does not adequately reflect how strong Afghanistan’s security forces have become. One American official, who described the NIE as “more dark” than past intelligence assessments on the war, said there are too many uncertainties to make an educated prediction on how the conflict will unfold between now and 2017, chief among them the outcome of next year’s presidential election.
  • “I think what we’re going to see is a recalibration of political power, territory and that kind of thing,” said one U.S. official who felt the assessment was unfairly negative. “It’s not going to be an inevitable rise of the Taliban.” A senior administration official said that the intelligence community has long underestimated Afghanistan’s security forces. “An assessment that says things are going to be gloomy no matter what you do, that you’re just delaying the inevitable, that’s just a view,” said the official. “I would not think it would be the determining view.”
  •  
    The War Party is not happy with the consensus position of 16 U.S. intelligence agencies that leaving U.S. troops in Afghanistan is futile. I offer them my lesson learned from 27 months of combat duty in Viet Nam: When you find yourself part of an invading force in a foreign land fighting patriots, it's time for a reality check on your world view.
Paul Merrell

Your Computer May Already be Hacked - NSA Inside? | Steve Blank - 1 views

  • But while the interviewer focused on the Skype revelation, I thought the most interesting part was the other claim, “that the National Security Agency already had pre-encryption stage access to email on Outlook.”  Say what??  They can see the plaintext on my computer before I encrypt it? That defeats any/all encryption methods. How could they do that? Bypass Encryption While most outside observers think the NSA’s job is cracking encrypted messages, as the Prism disclosures have shown, the actual mission is simply to read all communications. Cracking codes is a last resort.
  • The NSA has a history of figuring out how to get to messages before or after they are encrypted. Whether it was by putting keyloggers on keyboards and recording the keystrokes or detecting the images of the characters as they were being drawn on a CRT. Today every desktop and laptop computer has another way for the NSA to get inside. Intel Inside It’s inevitable that complex microprocessors have bugs in them when they ship. When the first microprocessors shipped the only thing you could hope is that the bug didn’t crash your computer. The only way the chip vendor could fix the problem was to physically revise the chip and put out a new version. But computer manufacturers and users were stuck if you had an old chip. After a particularly embarrassing math bug in 1994 that cost Intel $475 million, the company decided to fix the problem by allowing it’s microprocessors to load fixes automatically when your computer starts.
  • Starting in 1996 with the Intel P6 (Pentium Pro) to today’s P7 chips (Core i7) these processors contain instructions that are reprogrammable in what is called microcode. Intel can fix bugs on the chips by reprogramming a microprocessors microcode with a patch. This patch, called a microcode update, can be loaded into a processor by using special CPU instructions reserved for this purpose. These updates are not permanent, which means each time you turn the computer on, its microprocessor is reset to its built-in microcode, and the update needs to be applied again (through a computer’s BIOS.). Since 2000, Intel has put out 29 microcode updates to their processors. The microcode is distributed by 1) Intel or by 2) Microsoft integrated into a BIOS or 3) as part of a Windows update. Unfortunately, the microcode update format is undocumented and the code is encrypted. This allows Intel to make sure that 3rd parties can’t make unauthorized add-ons to their chips. But it also means that no one can look inside to understand the microcode, which makes it is impossible to know whether anyone is loading a backdoor into your computer.
  • ...3 more annotations...
  • Or perhaps the NSA, working with Intel and/or Microsoft, have wittingly have put backdoors in the microcode updates. A backdoor is is a way of gaining illegal remote access to a computer by getting around the normal security built-in to the computer. Typically someone trying to sneak malicious software on to a computer would try to install a rootkit (software that tries to conceal the malicious code.) A rootkit tries to hide itself and its code, but security conscious sites can discover rootkits by tools that check kernel code and data for changes. But what if you could use the configuration and state of microprocessor hardware in order to hide? You’d be invisible to all rootkit detection techniques that checks the operating system. Or what if you can make the microprocessor random number generator (the basis of encryption) not so random for a particular machine? (The NSA’s biggest coup was inserting backdoors in crypto equipment the Swiss sold to other countries.) Rather than risk getting caught messing with everyone’s updates, my bet is that the NSA has compromised the microcode update signing keys  giving the NSA the ability to selectively target specific computers. (Your operating system ensures security of updates by checking downloaded update packages against the signing key.) The NSA then can send out backdoors disguised as a Windows update for “security.” (Ironic but possible.) That means you don’t need backdoors baked in the hardware, don’t need Intel’s buy-in, don’t have discoverable rootkits, and you can target specific systems without impacting the public at large.
  • A few months ago these kind of discussions would have been theory at best, if not paranoia.
  • The Prism disclosures prove otherwise – the National Security Agency has decided it needs the ability to capture all communications in all forms. Getting inside of a target computer and weakening its encryption or having access to the plaintext of encrypted communication seems likely. Given the technical sophistication of the other parts of their surveillance net, the surprise would be if they haven’t implemented a microcode backdoor. The downside is that 1) backdoors can be hijacked by others with even worse intent. So if NSA has a microcode backdoor – who else is using it? and 2) What other pieces of our infrastructure, (routers, smartphones, military computers, satellites, etc) use processors with uploadable microcode? —— And that may be why the Russian president is now using a typewriter rather than a personal computer.
Gary Edwards

Leftists Become Incandescent When Reminded of the Socialist Roots in Nazism | RealClearPolitics - 0 views

  • As George Watson put it in The Lost Literature of Socialism:It is now clear beyond all reasonable doubt that Hitler and his associates believed they were socialists, and that others, including democratic socialists, thought so too. The clue is in the name. Subsequent generations of Leftists have tried to explain away the awkward nomenclature of the National Socialist German Workers' Party as either a cynical PR stunt or an embarrassing coincidence. In fact, the name meant what it said. Hitler told Hermann Rauschning, a Prussian who briefly worked for the Nazis before rejecting them and fleeing the country, that he had admired much of the thinking of the revolutionaries he had known as a young man; but he felt that they had been talkers, not doers. "I have put into practice what these peddlers and pen pushers have timidly begun," he boasted, adding that "the whole of National Socialism" was "based on Marx".
  • Marx's error, Hitler believed, had been to foster class war instead of national unity - to set workers against industrialists instead of conscripting both groups into a corporatist order.
  • His aim, he told his economic adviser, Otto Wagener, was to "convert the German Volk to socialism without simply killing off the old individualists" - by which he meant the bankers and factory owners who could, he thought, serve socialism better by generating revenue for the state. "What Marxism, Leninism and Stalinism failed to accomplish," he told Wagener, "we shall be in a position to achieve."
  • ...7 more annotations...
  • but think of the groups around the world that the BBC, for example, calls "Right-wing": the Taliban, who want communal ownership of goods;
  • the Iranian revolutionaries, who abolished the monarchy, seized industries and destroyed the middle class;
  • authoritarianism was the common feature of socialists of both National and Leninist varieties, who rushed to stick each other in prison camps or before firing squads. Each faction loathed the other as heretical, but both scorned free-market individualists as beyond redemption. Their battle was all the fiercer, as Hayek pointed out in 1944, because it was a battle between brothers.
  • Authoritarianism - or, to give it a less loaded name, the belief that state compulsion is justified in pursuit of a higher goal, such as scientific progress or greater equality - was traditionally a characteristic of the social democrats as much as of the revolutionaries.
  • quoting that impeccable progressive H.G. Wells who, in 1932, told the Young Liberals that they must become "liberal fascists" and "enlightened Nazis".
  • George Bernard Shaw in 1933: Extermination must be put on a scientific basis if it is ever to be carried out humanely and apologetically as well as thoroughly... If we desire a certain type of civilisation and culture we must exterminate the sort of people who do not fit into it.
  • Eugenics, of course, topples easily into racism. Engels himself wrote of the "racial trash" - the groups who would necessarily be supplanted as scientific socialism came into its own. Season this outlook with a sprinkling of anti-capitalism and you often got Leftist anti-Semitism - something else we have edited from our memory, but which once went without saying. "How, as a socialist, can you not be an anti-Semite?" Hitler had asked his party members in 1920.
Paul Merrell

Review & Outlook: Loose Lips on Syria - WSJ.com - 0 views

  • An American military attack on Syria could begin as early as Thursday and will involve three days of missile strikes, according to "senior U.S. officials" talking to NBC News. The Washington Post has the bombing at "no more than two days," though long-range bombers could "possibly" join the missiles. "Factors weighing into the timing of any action include a desire to get it done before the president leaves for Russia next week," reports CNN, citing a "senior administration official." The New York Times, quoting a Pentagon official, adds that "the initial target list has fewer than 50 sites, including air bases where Syria's Russian-made attack helicopters are deployed." The Times adds that "like several other military officials contacted for this report, the official agreed to discuss planning options only on condition of anonymity." Thus do the legal and moral requirements of secret military operations lose out in this Administration to the imperatives of in-the-know spin and political gestures.
  • It's always possible that all of this leaking about when, how and for how long the U.S. will attack Syria is an elaborate head-fake, like Patton's ghost army on the eve of D-Day, poised for the assault on Calais. But based on this Administration's past behavior, such as the leaked bin Laden raid details, chances are most of this really is the war plan. Which makes us wonder why the Administration even bothers to pursue the likes of Edward Snowden when it is giving away its plan of attack to anyone in Damascus with an Internet connection. The answer, it seems, is that the attack in Syria isn't really about damaging the Bashar Assad regime's capacity to murder its own people, much less about ending the Assad regime for good. "I want to make clear that the options that we are considering are not about regime change," White House spokesman Jay Carney said Tuesday. Translation: We're not coming for you, Bashar, so don't worry. And by the way, you might want to fly those attack choppers off base, at least until next week.
  • So what is the purpose of a U.S. attack? Mr. Carney elaborated that it's "about responding to [a] clear violation of an international standard that prohibits the use of chemical weapons." He added that the U.S. had a national security interest that Assad's use of chemical weapons "not go unanswered." This is another way of saying that the attacks are primarily about making a political statement, and vindicating President Obama's ill-considered promise of "consequences," rather than materially degrading Assad's ability to continue to wage war against his own people. It should go without saying that the principal purpose of a military strike is to have a military effect. Political statements can always be delivered politically, and U.S. airmen should not be put in harm's way to deliver what amounts to an extremely loud diplomatic demarche. That's especially so with a "do something" strike that is, in fact, deliberately calibrated to do very little. We wrote Tuesday that there is likely to be no good outcome in Syria until Assad and his regime are gone. Military strikes that advance that goal—either by targeting Assad directly or crippling his army's ability to fight—deserve the support of the American people and our international partners. That's not what this Administration seems to have in mind.
  •  
    This typically pompous Wall Street Journal editorial gets part of it right but ignores several elephants in the room. -- No way this goes down without Russia having agreed to it. Russia's only foreign military base is a naval port in Syria. Russia has deployed anti-aircraft missile batteries in Syria. Russia has supplied the Syrian government with state-of-the-art antiaircraft shoulder-held missiles. Several months ago, the Russians moved a fleet of warships into the Mediterranean for the first time, to protect Syria from foreign attack, including at least one submarine equipped with anti-ship missiles.  The U.S. and Russia have been engaged in building up their forces positioned around for over a year, in an escalating fashion. Russia has a huge economic incentive to keep Assad in power because he is blocking the natural gas pipeline that western interests want to run through Syria Russia has also built up its forces within Syria, a pipeline that would break Russia's near-monopoly on supplying natural gas to the European Union. A direct military intervention in Syria doesn't go down without Russia's approval, notwithstanding what their later statements might be. Obama is an accomplished liar but he's politically timid. Touching off World War III is not on his agenda. 2. Iran also has to acquiesce in advance. Syria and Iran have a mutual defense treaty, the first announced in 2005, a later treaty announced in 2008. http://tinyurl.com/oez2dq7 (.) Thousands of crack Iranian Revolutionary Guards troops are already stationed in Syria. As the only other Shia-majority state in the region, Syria is critical to Iran's own defense. Iran has the ability to close the Straits of Hormuz, thereby toppling the western world economy as petroleum supplies suddenly dry up. The U.S. Navy lacks the ability to quickly clear the Straits of mines, as was proved in embarrassingly bad tests the U.S. Navy did last year. Iran is not a world power but its military might is nothing to sneez
Paul Merrell

Israel Still Holds Plenty of U.S. Cards » CounterPunch: Tells the Facts, Names the Names - 0 views

  • More than ever, Israel is isolated from world opinion and the squishy entity known as “the international community.” The Israeli government keeps condemning the Iran nuclear deal, by any rational standard a positive step away from the threat of catastrophic war. In the short run, the belligerent responses from Prime Minister Benjamin Netanyahu are bound to play badly in most of the U.S. media. But Netanyahu and the forces he represents have only begun to fight. They want war on Iran, and they are determined to exercise their political muscle that has long extended through most of the Washington establishment. While it’s unlikely that such muscle can undo the initial six-month nuclear deal reached with Iran last weekend, efforts are already underway to damage and destroy the negotiations down the road. On Capitol Hill the attacks are most intense from Republicans, and some leading Democrats have also sniped at the agreement reached in Geneva.
  • A widespread fear is that some political precedent might be set, undercutting “pro-Israel” leverage over U.S. government decisions. Such dread is inherent in the negative reactions from Netanyahu (“a historic mistake”), GOP lawmakers like House Intelligence Committee chair Mike Rogers (“a permission slip to continue enrichment”) and Senator Saxby Chambliss (“we’ve let them out of the trap”), and Democratic lawmakers like Senate Foreign Relations Committee chair Robert Menendez (“this agreement did not proportionately reduce Iran’s nuclear program”) and Senator Charles Schumer (“it does not seem proportional”). Netanyahu and many other Israelis — as well as the powerhouse U.S. lobbying group AIPAC and many with similar outlooks in U.S. media and politics — fear that Israel’s capacity to hold sway over Washington policymakers has begun to slip away. “Our job is to be the ones to warn,” Israel’s powerful finance minister, Yair Lapid, told Israeli Army Radio on Sunday. “We need to make the Americans to listen to us like they have listened in the past.” This winter and spring, the Israeli government and its allies are sure to strafe U.S. media and political realms with intense barrages of messaging. “Israel will supplement its public and private diplomacy with other tools,” the New York Times reported Monday from Jerusalem. “Several officials and analysts here said Israel would unleash its intelligence industry to highlight anticipated violations of the interim agreement.” Translation: Israel will do everything it can to undermine the next stage of negotiations and prevent a peaceful resolution of the dispute over Iran’s nuclear program.
Paul Merrell

Iceland Defies Bank Backlash: Advance $1.2 Billion Debt Relief Plan - 0 views

  • Iceland’s government has announced that it will be writing off up to 24,000 euros ($32,600) of every household’s mortgage, fulfilling its election promise, despite overwhelming criticism from international financial institutions. The measure was introduced by the country’s prime minister, Sigmundur David Gunnlaugsson, the leader of the Progressive Party which won the late-April elections on a promise of household debt relief. According to the government’s website the household debt will be reduced by 13 percent on average.  Citizens of Iceland have been suffering from debt since the 2008 financial crisis, which led to high borrowing costs after the collapse of the krona against other currencies.   “Currently, household debt is equivalent to 108 percent of GDP, which is high by international comparison,” highlighted a government statement, according to AFP. "The action will boost household disposable income and encourage savings.” The government said that the debt relief will begin by mid-2014 and according to estimates the measure is set to cost $1.2 billion in total. It will be spread out over four years. 
  • The financing plan for the program has not yet been laid out. However, Gunnlaugsson has promised that public finances will not be put at risk. It was initially proposed that the foreign creditors of Icelandic banks would pay for the measure. International organizations have confronted the idea with criticism. The International Monetary Fund (IMF) and the Organization for Economic Cooperation and Development (OECD) have advised against it, citing economic concerns. Iceland has “little fiscal space for additional household debt relief” according to the IMF, while the OECD stated that Iceland should limit its mortgage relief to low-income households. In the meantime, ratings service, Standard & Poor's, cut back on its outlook for Iceland's long-term credit rating to negative from stable, stating that the economic measure could affect the confidence of foreign investors if it ends up being paid for by the existing creditors of Icelandic banks.
Paul Merrell

NATO's Terror Hordes in Iraq a Pretext for Syria Invasion | New Eastern Outlook - 0 views

  • All roads lead to Baghdad and the Islamic State in Iraq and Syria (ISIS) is following them all, north from Syria and Turkey to south. Reading Western headlines, two fact-deficient narratives have begun gaining traction. The first is that this constitutes a “failure” of US policy in the Middle East, an alibi as to how the US and its NATO partners should in no way be seen as complicit in the current coordinated, massive, immensely funded and heavily armed terror blitzkrieg toward Baghdad. The second is how ISIS appears to have “sprung” from the sand dunes and date trees as a nearly professional military traveling in convoys of matching Toyota trucks without explanation. In actuality, ISIS is the product of a joint NATO-GCC conspiracy stretching back as far as 2007 where US-Saudi policymakers sought to ignite a region-wide sectarian war to purge the Middle East of Iran’s arch of influence stretching from its borders, across Syria and Iraq, and as far west as Lebanon and the coast of the Mediterranean. ISIS has been harbored, trained, armed, and extensively funded by a coalition of NATO and Persian Gulf states within Turkey’s (NATO territory) borders and has launched invasions into northern Syria with, at times, both Turkish artillery and air cover.
  • The alleged territorial holdings of ISIS cross over both Syrian and Iraqi borders meaning that any campaign to eradicate them from Iraqi territory can easily spill over into Syria’s borders. And that is exactly the point. With ISIS having ravaged Mosul, Iraq near the Turkish border and moving south in a terror blitzkrieg now threatening the Iraqi capital of Baghdad itself, the Iraqi government is allegedly considering calling for US and/or NATO assistance to break the terror wave. Adding to the pretext, ISIS, defying any sound tactical or strategic thinking, has seized a Turkish consulate in Mosul, taking over 80 Turkish hostages - serendipitous giving Turkey not only a new pretext to invade northern Iraq as it has done many times in pursuit of alleged Kurdish militants, but to invade Syrian territory where ISIS is also based.
  •  
    Tony Cartalucci blows the top off the manufactured excuse for Turkey -- a NATO nation already caught making plans to initiate a false flag attack on itself posing as Syrian government forces -- to invade both Iraq and Syria. Heavily referenced with lots of links. An in-depth study of the players and plays in motion in Iraq. A must read.
Paul Merrell

Land Destroyer: America's Covert Re-Invasion of Iraq - 0 views

  • mage: ISIS clearly did not materialize spontaneously within Iraq, it hasclearly redeployed from its NATO-sponsored destruction of Syria to northern Iraq, perhaps in an attempt to justify a NATO incursion and thecreation of a buffer zone straddling Syrian, Iraqi, and even possibly Iranian territory with the goal of targeting Iran directly with ISIS.   June 13, 2014 (Tony Cartalucci - LD) - Heavily armed, well funded, and organized as a professional, standing army, the forces of the Islamic State of Iraq and Syria (ISIS) swept southward into Iraq from Turkey and northeastern Syria, taking the cities of Mosul and Tikrit, and now threaten the Iraqi capital city of Baghdad itself. The United States was sure to prop up two unfounded narratives - the first being that US intelligence agencies, despite assets in Iraq and above it in the form of surveillance drones, failed to give warning of the invasion, and that ISIS is some sort of self-sustaining terror organization carving out a "state" by "robbing banks" and collecting "donations" on Twitter. The Wall Street Journal in its report, "Iraqi Drama Catches U.S. Off Guard," stated: The quickly unfolding drama prompted a White House meeting Wednesday of top policy makers and military leaders who were caught off guard by the swift collapse of Iraqi security forces, officials acknowledged.
  • mage: ISIS has convoys of brand new matching Toyota's the samevehicles seen among admittedly NATO-armed terrorists operatingeverywhere from Libya to Syria, and now Iraq. It is a synthetic, state-sponsored regional mercenary expeditionary force.
  • The question remains, if a Lebanese newspaper knew ISIS was on the move eastward, why didn't the CIA? The obvious answer is the CIA did know, and is simply feigning ignorance at the expense of their reputation to bait its enemies into suspecting the agency of  incompetency rather than complicity in the horrific terroristic swath ISIS is now carving through northern Iraq. Described extensively in the full New Eastern Outlook Journal (NEO) report, "NATO’s Terror Hordes in Iraq a Pretext for Syria Invasion," the United States, Turkey, Saudi Arabia, and Qatar, have funded and armed terrorists operating in Syria for the past 3 years to the tune of hundreds of millions of dollars - coincidentally the same amount that ISIS would require to gain primacy among militant groups fighting in Syria and to mobilize forces capable of crossing into Iraq and overwhelming Baghdad's national defenses.
  • ...4 more annotations...
  • a 3-year ongoing CIA program (here, here, and here) all along the Turkish-Syrian border to "monitor" and "arm" "moderate" militants fighting the Syrian government, the US claims it was caught "by surprise." If drones and CIA operatives operating in ISIS territory weren't enough to detect the impending invasion, perhaps the CIA should have just picked up a newspaper.Indeed, the Lebanon Daily Start in March 2014 reported that ISIS openly withdrew its forces from Latakia and Idlib provinces in western Syria, and redeployed them in Syria's east - along the Syrian-Iraqi border. The article titled, "Al-Qaeda splinter group in Syria leaves two provinces: activists," stated explicitly that: On Friday, ISIS – which alienated many rebels by seizing territory and killing rival commanders – finished withdrawing from the Idlib and Latakia provinces and moved its forces toward the eastern Raqqa province and the eastern outskirts of the northern city of Aleppo, activists said.
  • The NEO report includes links to the US Army’s West Point Countering Terrorism Center reports, “Bombers, Bank Accounts and Bleedout: al-Qa’ida’s Road In and Out of Iraq,” and “Al-Qa’ida’s Foreign Fighters in Iraq,” which detail extensively the terror network used to flood Iraq with foreign terrorists, weapons, and cash to fuel an artificial "sectarian war" during the US occupation, and then turned over to flood Syria with terrorists in the West's bid to overthrow the government in Damascus. What's ISIS Doing in Iraq? The NEO report would also post Seymour Hersh's 2007 article, "The Redirection," documenting over the course of 9 pages US, Saudi, and Israeli intentions to create and deploy sectarian extremists region-wide to confront Iran, Syria, and Hezbollah in Lebanon. Hersh would note that these "sectarian extremists" were either tied to Al Qaeda, or Al Qaeda itself. The ISIS army moving toward Baghdad is the final manifestation of this conspiracy, a standing army operating with impunity, threatening to topple the Syrian government, purge pro-Iranian forces in Iraq, and even threatening Iran itself by building a bridge from Al Qaeda's NATO safe havens in Turkey, across northern Iraq, and up to Iran's borders directly. Labeled "terrorists" by the West, grants the West plausible deniability in its creation, deployment, and across the broad spectrum of atrocities it is now carrying out.  
  • It is a defacto re-invasion of Iraq by Western interests - but this time without Western forces directly participating - rather a proxy force the West is desperately attempting to disavow any knowledge of or any connection to. However, no other explanation can account for the size and prowess of ISIS beyond state sponsorship. And since ISIS is the clear benefactor of state sponsorship, the question is, which states are sponsoring it? With Iraq, Syria, and Iran along with Lebanese-based Hezbollah locked in armed struggle with ISIS and other Al Qaeda franchises across the region, the only blocs left are NATO and the GCC (Saudi Arabia and Qatar in particular).
  • With the West declaring ISIS fully villainous in an attempt to intervene more directly in northern Iraq and eastern Syria, creating a long desired "buffer zone" within which to harbor, arm, and fund an even larger terrorist expeditionary force, Syria, Iraq, Iran, and others are offered an opportunity to preempt Western involvement and to crush the ISIS - cornering and eliminating NATO-GCC's expeditionary force while scoring geopolitical points of vanquishing Washington's latest "villain." Joint Iraq-Iranian operations in the north and south of ISIS's locations, and just along Turkey's borders could envelop and trap ISIS to then be whittled down and destroyed - just as Syria has been doing to NATO's proxy terrorist forces within its own borders.Whatever the regional outcome may be, the fact is the West has re-invaded Iraq, with a force as brutal, if not worse than the "shock and awe" doctrine of 2003. Iraq faces another difficult occupation if it cannot summon a response from within, and among its allies abroad, to counter and crush this threat with utmost expediency.
Paul Merrell

Obama's "War on Ebola" or War for Oil? Sending 3000 Troops to African "Ebola" Areas that Happen to Export Oil to China | Global Research - 0 views

  • For a Nobel Peace Prize President, Barack Obama seems destined to go down in history books as the President who presided over one of the most aggressive series of wars ever waged by a bellicose Washington Administration. Not even George Bush and Dick Cheney came close.
  • Now Obama’s advisers, no doubt led by the blood-thirsty National Security Adviser, Susan Rice, have come up with a new war. This is the War Against Ebola. On September 16, President Obama solemnly declared the war. He announced, to the surprise of most sane citizens, that he had ordered 3,000 American troops, the so-called “boots on the ground” that the Pentagon refuses to agree to in Syria, to wage a war against….a virus? In a carefully stage-managed appearance at the US Centers for Disease Control (CDC), Obama read a bone-chilling speech. He called the alleged Ebola outbreaks in west Africa, “a global threat, and it demands a truly global response. This is an epidemic that is not just a threat to regional security. It’s a potential threat to global security, if these countries break down, if their economies break down, if people panic,” Obama continued, conjuring images that would have made Andromeda Strain novelist Michael Chrichton drool with envy. Obama added, “That has profound effects on all of us, even if we are not directly contracting the disease. This outbreak is already spiraling out of control.”
  • With that hair-raising introduction, the President of the world’s greatest Superpower announced his response. In his role as Commander-in-Chief of the United States of America announced he has ordered 3,000 US troops to west Africa in what he called, “the largest international response in the history of the CDC.” He didn’t make clear if their job would be to shoot the virus wherever it reared its ugly head, or to shoot any poor hapless African suspected of having Ebola. Little does it matter that the US military doesn’t have anywhere near 3,000 troops with the slightest training in public health. Before we all panic and line up to receive the millions of doses of untested and reportedly highly dangerous “Ebola vaccines” the major drug-makers are preparing to dump on the market, some peculiarities of this Ebola outbreak in Africa are worth noting.
  • ...6 more annotations...
  • A major problem for Chan and her backers, however, is that her Ebola statistics are very, very dubious. For those whose memory is short, this is the same Dr Margaret Chan at WHO in Geneva who was guilty in 2009 of trying to panic the world into taking unproven vaccines for “Swine Flu” influenza, by declaring a Global Pandemic with statistics calling every case of symptoms that of the common cold to be “Swine Flu,” whether it was runny nose, coughing, sneezing, sore throat. That changed WHO definition of Swine Flu allowed the statistics of the disease to be declared Pandemic. It was an utter fraud, a criminal fraud Chan carried out, wittingly or unwittingly (she could be simply stupid but evidence suggests otherwise), on behalf of the major US and EU pharmaceutical cartel. In a recent Washington Post article it was admitted that sixty-nine percent of all the Ebola cases in Liberia registered by WHO have not been laboratory confirmed through blood tests. Liberia is the epicenter of the Ebola alarm in west Africa. More than half of the alleged Ebola deaths, 1,224, and nearly half of all cases, 2,046, have been in Liberia says WHO. And the US FDA diagnostic test used for the lab confirmation of Ebola is so flawed that the FDA has prohibited anyone from claiming they are safe or effective. That means, a significant proportion of the remaining 31 % of the Ebola cases lab confirmed through blood tests could be false cases.
  • Then the official WHO Ebola Fact Sheet dated September, 2014, states, “It can be difficult to distinguish EVD from other infectious diseases such as malaria, typhoid fever and meningitis.” Excuse me, Dr Margaret Chan, can you say that slowly? It can be difficult to distinguish EVD from other infectious diseases such as malaria, typhoid fever and meningitis? And you admit that 69% of the declared cases have never been adequately tested? And you state that the Ebola symptoms include “sudden onset of fever fatigue, muscle pain, headache and sore throat. This is followed by vomiting, diarrhea, rash, symptoms of impaired kidney and liver function, and in some cases, both internal and external bleeding”? In short it is all the most vague and unsubstantiated basis that lies behind President Obama’s new War on Ebola.
  • One striking aspect of this new concern of the US President for the situation in Liberia and other west African states where alleged surges of Ebola are being claimed is the presence of oil, huge volumes of untapped oil. The offshore coast of Liberia and east African ‘Ebola zones’ conveniently map with the presence of vast untapped oil and gas resources shown here The issue of oil in west Africa, notably in the waters of the Gulf of Guinea have become increasingly strategic both to China who is roaming the world in search of future secure oil import sources, and the United States, whose oil geo-politics was summed up in a quip by then Secretary of State Henry Kissinger in the 1970’s: ‘If you control the oil, you control entire nations.’
  • The Obama Administration and Pentagon policy has continued that of George W. Bush who in 2008 created the US military Africa Command or AFRICOM, to battle the rapidly-growing Chinese economic presence in Africa’s potential oil-rich countries. West Africa is a rapidly-emerging oil treasure, barely tapped to date. A US Department of Energy study projected that African oil production would rise 91 percent between 2002 and 2025, much from the region of the present Ebola alarm. Chinese oil companies are all over Africa and increasingly active in west Africa, especially Angola, Sudan and Guinea, the later in the epicenter of Obama’s new War on Ebola troop deployment.
  • If the US President were genuine about his concern to contain a public health emergency, he could look at the example of that US-declared pariah Caribbean nation, Cuba. Reuters reports that the Cuban government, a small financially distressed, economically sanctioned island nation of 11 million people, with a national budget of $50 billion, Gross Domestic Product of 121 billion and per capita GDP of just over $10,000, is dispatching 165 medical personnel to Africa to regions where there are Ebola outbreaks. Washington sends 3,000 combat troops. Something smells very rotten around the entire Ebola scare.
  • F. William Engdahl is strategic risk consultant and lecturer, he holds a degree in politics from Princeton University and is a best-selling author on oil and geopolitics, exclusively for the online magazine “New Eastern Outlook
1 - 20 of 66 Next › Last »
Showing 20 items per page