Discussion Topic |
|
This thread has been locked |
couchmaster
climber
pdx
|
|
Mar 18, 2014 - 07:06pm PT
|
Tvrash said: "Ken M is one of millions of parrots right wing PR campaigns depend on to do exactly what he's doing. He's a type, and a common one. It's more important to shout the party line than to be accurate or truthful. As Fox well knows, you publish the lie on page one, retract on page 10 (actually, they never retract - you don't need to with pure propaganda). This is today's anti-liberalism at work. It's easier to order off a fast food menu that learn to cook yourself. Guys like Ken M get the instant emotional stroke of liberal bashing without putting out much if any effort. Spoon fed, all the way. "
Bullsh#t, Ken M is more liberal than you, and as a Doctor, probably more intelligent. He believes differently than you. Which is what you have and offer us, your belief what you think the truth is. I personally think that you are correct in the unbelievable bashing and outright lies put out in the world by the Nancy Pelosi types to try to sway the Ken M types. It happens.
|
|
Tvash
climber
Seattle
|
|
Mar 18, 2014 - 07:43pm PT
|
Hey Bill, how's the anti-Mexican rant going for ya?
|
|
Ken M
Mountain climber
Los Angeles, Ca
|
|
Mar 19, 2014 - 12:47am PT
|
Thanks, Couch, very fair.
He also happens to be a patriotic as it gets. (Snowden)
yep, disclosing diplomatic cables that had nothing to do with anything illegal, that revealed nothing illegal, but damaged the relations between the US and other countries.
very patriotic. sort of what'd you'd expect of a new-born Russian. I notice he has nothing to say about Ukraine, but I'm sure he wouldn't want to upset his masters.
Guess I better tear up my ACLU card and re-register as a Tea Bagger.
Ha!
As a journalist myself, I read and watch a professional journalists words with great care. Unlike most people, their words contain messages at several levels. They are able to threaten, without making overt threats.
This is actually one of the great skills of the Repugs, and they are good at sending out things that have meanings at several levsls.
For example, their bumper stickers: Obama Psalm 108:8
http://content.usatoday.com/communities/Religion/post/2009/11/bumper-stickers-for-psalm-1098----a-wrong-hearted-prayer-for-obama/1#.UykhLajlnN4
|
|
nah000
climber
canuckistan
|
|
Topic Author's Reply - Mar 19, 2014 - 06:44am PT
|
so much of what Ken M has recently posted is so demonstrably false and has been rehashed so many times throughout this thread that it really isn't worth the effort.
people who want to believe, without any current evidence, that snowden acted with anything but patriotic intentions will continue to do so.
and people who want to believe that snowden is a saint, although equally as impossible to know at this point, will also continue to do so.
but this comment of Ken M's takes the cake and i can't help but get sucked in:
"yep, disclosing diplomatic cables that had nothing to do with anything illegal, that revealed nothing illegal, but damaged the relations between the US and other countries."
what in the actual f*#k?
have you really confused snowden's very careful release of nsa and surveillance related documents to a handful of selected journalists with assange's carpet bombing style release of diplomatic cables to the public?
given the level of bullshit in some of your other comments, it wouldn't surprise me if you were speaking with authoritah while being so fundamentally misinformed/confused.
regardless this focusing of the discussion on snowden is such a complete waste of time.
it's a bit like being served rotten food at a restaurant and then getting angry at the waiter...
|
|
Ken M
Mountain climber
Los Angeles, Ca
|
|
Mar 19, 2014 - 11:39am PT
|
]so much of what Ken M has recently posted is so demonstrably false and has been rehashed so many times throughout this thread that it really isn't worth the effort.
So what you are saying is that since you cannot refute anything that I say, you'll simply attack me personally. I can understand why you would not want to talk about Snowden in the Snowden thread. Far too confusing.
but this comment of Ken M's takes the cake and i can't help but get sucked in:
"yep, disclosing diplomatic cables that had nothing to do with anything illegal, that revealed nothing illegal, but damaged the relations between the US and other countries."
what in the actual f*#k?
have you really confused snowden's very careful release of nsa and surveillance related documents to a handful of selected journalists with assange's carpet bombing style release of diplomatic cables to the public?
Assange IS the most complicit "selected journalist", chosen by SNOWDEN. They clearly communicated on the carpet bombing, and you've read NOT ONE WORD by Snowden criticizing or being remorseful of the carpet bombing.
Doh!
I DO like that you acknowledge the inappropriateness of Assange's actions. We're getting somewhere.
regardless this focusing of the discussion on snowden is such a complete waste of time.
I wonder just how stupid you are? Have you not READ the TITLE of this discussion thread??? It is ABOUT SNOWDEN. If you want to discuss something else, go to what must be the more appropriate for you kiddie porn threads.
|
|
Tvash
climber
Seattle
|
|
Mar 19, 2014 - 11:58am PT
|
Assange has nothing to do with Snowden's whistleblowing.
Snowden released documents to Greenwald (Guardian, Poitras (filmmaker), and Gellman (Wa Post).
That Snowden hasn't commented on Assange, the Ukraine, gravity waves, or the health benefits of I Can't Believe Its Not Butter! is, of course, irrelevant to anything.
If you're a journalist, Ken, you're a shitty one, at least if you're treatment of this topic is any indication.
|
|
TomCochrane
Trad climber
Santa Cruz Mountains and Monterey Bay
|
|
Mar 30, 2014 - 01:37am PT
|
http://www.ted.com/talks/edward_snowden_here_s_how_we_take_back_the_internet
Appearing by telepresence robot, Edward Snowden speaks at TED2014 about surveillance and Internet freedom. The right to data privacy, he suggests, is not a partisan issue, but requires a fundamental rethink of the role of the internet in our lives — and the laws that protect it. "Your rights matter,” he says, "because you never know when you're going to need them." Chris Anderson interviews, with special guest Tim Berners-Lee.
|
|
Dropline
Mountain climber
Somewhere Up There
|
|
Mar 30, 2014 - 10:04am PT
|
Edward Snowden = HERO
|
|
Marlow
Sport climber
OSLO
|
|
Mar 31, 2014 - 02:30pm PT
|
TFPU! Tom is adding great value to the thread ...
|
|
Marlow
Sport climber
OSLO
|
|
Apr 15, 2014 - 01:48pm PT
|
Guardian and Washington Post win Pulitzer prize for NSA revelations
http://www.theguardian.com/media/2014/apr/14/guardian-washington-post-pulitzer-nsa-revelations
The Pulitzer committee praised the Guardian for its "revelation of widespread secret surveillance by the National Security Agency, helping through aggressive reporting to spark a debate about the relationship between the government and the public over issues of security and privacy".
Keep up the good work...
|
|
couchmaster
climber
pdx
|
|
Apr 15, 2014 - 04:02pm PT
|
We knew that years before "Snowden" became a verb Dingus.
|
|
TomCochrane
Trad climber
Santa Cruz Mountains and Monterey Bay
|
|
John W. Whitehead, Rutherford Institute, www.rutherford.org
https://www.rutherford.org/publications_resources/john_whiteheads_commentary/putting_big_brother_in_the_drivers_seat_v2v_transmitters_black_boxes_d
The United States pretends to be a home of freedom and democracy. In fact, the US is rapidly degenerating into a police state and a worse dystopia than George Orwell imagined in his book, 1984.
John W. Whitehead describes below the prison that is being constructed for all of us. This prison is the work of many of our fellow citizens including scientists and entrepreneurs who have gained fame and fortune creating a prison for mankind. What were they thinking as they threw their energy and their lives into constructing a police state dystopia?
Putting Big Brother in the Driver’s Seat: V2V Transmitters, Black Boxes & Drones
By John W. Whitehead
“It’s a future where you don’t forget anything…In this new future you’re never lost…We will know your position down to the foot and down to the inch over time…Your car will drive itself, it’s a bug that cars were invented before computers…you’re never lonely…you’re never bored…you’re never out of ideas… We can suggest where you go next, who to meet, what to read…What’s interesting about this future is that it’s for the average person, not just the elites.”—Google CEO Eric Schmidt on his vision of the future
Time to buckle up your seatbelts, folks. You’re in for a bumpy ride.
We’re hurtling down a one-way road toward the Police State at mind-boggling speeds, the terrain is getting more treacherous by the minute, and we’ve passed all the exit ramps. From this point forward, there is no turning back, and the signpost ahead reads “Danger.”
Indeed, as I document in my book A Government of Wolves: The Emerging American Police State, we’re about to enter a Twilight Zone of sorts, one marked by drones, smart phones, GPS devices, smart TVs, social media, smart meters, surveillance cameras, facial recognition software, online banking, license plate readers and driverless cars—all part of the interconnected technological spider’s web that is life in the American police state, and every new gadget pulls us that much deeper into the sticky snare.
In this Brave New World awaiting us, there will be no communication not spied upon, no movement untracked, no thought unheard. In other words, there will be nowhere to run and nowhere to hide.
We’re on the losing end of a technological revolution that has already taken hostage our computers, our phones, our finances, our entertainment, our shopping, our appliances, and now, it’s focused its sights on our cars. As if the government wasn’t already able to track our movements on the nation’s highways and byways by way of satellites, GPS devices, and real-time traffic cameras, government officials are now pushing to require that all new vehicles come installed with black box recorders and vehicle-to-vehicle (V2V) communications, ostensibly to help prevent crashes.
Yet strip away the glib Orwellian doublespeak, and what you will find is that these black boxes and V2V transmitters, which will not only track a variety of data, including speed, direction, location, the number of miles traveled, and seatbelt use, but will also transmit this data to other drivers, including the police, are little more than Trojan Horses, stealth attacks on our last shreds of privacy, sold to us as safety measures for the sake of the greater good, all the while poised to wreak havoc on our lives.
Black boxes and V2V transmitters are just the tip of the iceberg, though. The 2015 Corvette Stingray will be outfitted with a performance data recorder which “uses a camera mounted on the windshield and a global positioning receiver to record speed, gear selection and brake force,” but also provides a recording of the driver’s point of view as well as recording noises made inside the car. As journalist Jaclyn Trop reports for the New York Times, “Drivers can barely make a left turn, put on their seatbelts or push 80 miles an hour without their actions somehow, somewhere being tracked or recorded.” Indeed, as Jim Farley, Vice President of Marketing and Sales for Ford Motor Company all but admitted, corporations and government officials already have a pretty good sense of where you are at all times: “We know everyone who breaks the law, we know when you’re doing it. We have GPS in your car, so we know what you’re doing.”
Now that the government and its corporate partners-in-crime know where you’re going and how fast you’re going when in your car, the next big hurdle will be to know how many passengers are in your car, what contraband might be in your car (and that will largely depend on whatever is outlawed at the moment, which could be anything from Sudafed cold medicine to goat cheese), what you’re saying and exactly what you’re doing within the fiberglass and steel walls of your vehicle. That’s where drones come in.
Once drones take to the skies en masse in 2015, there will literally be no place where government agencies and private companies cannot track your movements. These drones will be equipped with cameras that provide a live video feed, as well as heat sensors, radar and thermal imaging devices capable of seeing through the walls of your car. Some will be capable of peering at figures from 20,000 feet up and 25 miles away. They will be outfitted with infrared cameras and radar which will pierce through the darkness. They can also keep track of 65 persons of interest at once. Some drones are already capable of hijacking Wi-Fi networks and intercepting electronic communications such as text messages. The Army has developed drones with facial recognition software, as well as drones that can complete a target-and-kill mission without any human instruction or interaction. These are the ultimate killing and spying machines. There will also be drones armed with “less-lethal” weaponry, including bean bag guns and tasers.
And of course all of this information, your every movement—whether you make a wrong move, or appear to be doing something suspicious, even if you don’t do anything suspicious, the information of your whereabouts, including what stores and offices you visit, what political rallies you attend, and what people you meet—will be tracked, recorded and streamed to a government command center, where it will be saved and easily accessed at a later date.
By the time you add self-driving cars into the futuristic mix, equipped with computers that know where you want to go before you do, you’ll be so far down the road to Steven Spielberg’s vision of the future as depicted in Minority Report that privacy and autonomy will be little more than distant mirages in your rearview mirror. The film, set in 2054 and based on a short story by Philip K. Dick, offered movie audiences a special effect-laden techno-vision of a futuristic world in which the government is all-seeing, all-knowing and all-powerful. And if you dare to step out of line, dark-clad police SWAT teams will bring you under control.
Mind you, while critics were dazzled by the technological wonders displayed in Minority Report, few dared to consider the consequences of a world in which Big Brother is, literally and figuratively, in the driver’s seat. Even the driverless cars in Minority Report answer to the government’s (and its corporate cohorts’) bidding.
Likewise, we are no longer autonomous in our own cars. Rather, we are captive passengers being chauffeured about by a robotic mind which answers to the government and its corporate henchmen. Soon it won’t even matter whether we are seated behind the wheel of our own vehicles, because it will be advertisers and government agents calling the shots.
Case in point: devices are now being developed for European cars that would allow police to stop a car remotely, ostensibly to end police chases. Google is partnering with car manufacturers in order to integrate apps and other smartphone-like technology into vehicles, in order to alert drivers to deals and offers at nearby businesses. As Patrick Lin, professor of Stanford’s School of Engineering, warns, in a world where third-party advertisers and data collectors control a good deal of the content we see on a daily basis, we may one day literally be driven to businesses not because we wanted to go there, but because someone paid for us to be taken there.
Rod Serling, creator of the beloved sci fi series Twilight Zone and one of the most insightful commentators on human nature, once observed, “We’re developing a new citizenry. One that will be very selective about cereals and automobiles, but won’t be able to think.”
Indeed, not only are we developing a new citizenry incapable of thinking for themselves, we’re also instilling in them a complete and utter reliance on the government and its corporate partners to do everything for them—tell them what to eat, what to wear, how to think, what to believe, how long to sleep, who to vote for, whom to associate with, and on and on.
In this way, we have created a welfare state, a nanny state, a police state, a surveillance state, an electronic concentration camp—call it what you will, the meaning is the same: in our quest for less personal responsibility, a greater sense of security, and no burdensome obligations to each other or to future generations, we have created a society in which we have no true freedom.
Pandora’s Box has been opened and there’s no way to close it. As Rod Serling prophesied in a Commencement Address at the University of Southern California in March 17, 1970:
“It’s simply a national acknowledgement that in any kind of priority, the needs of human beings must come first. Poverty is here and now. Hunger is here and now. Racial tension is here and now. Pollution is here and now. These are the things that scream for a response. And if we don’t listen to that scream – and if we don’t respond to it – we may well wind up sitting amidst our own rubble, looking for the truck that hit us – or the bomb that pulverized us. Get the license number of whatever it was that destroyed the dream. And I think we will find that the vehicle was registered in our own name.”
You can add the following to that list of needs requiring an urgent response: Police abuse is here and now. Surveillance is here and now. Imperial government is here and now. Yet while the vehicle bearing down upon us is indeed registered in our own name, we’ve allowed Big Brother to get behind the wheel, and there’s no way to put the brakes on this runaway car.
|
|
Psilocyborg
climber
|
|
you ever think all you conservatives and liberals are played against each other?
Ya know the old united we stand, divided we fall?
Sometimes I feel you are all unsuspecting puppets on a string playing out an imaginary drama. And all the while the world turns and nothing ever changes....except what you fools argue about
|
|
Lorenzo
Trad climber
Oregon
|
|
. It has nothing whatsoever to do with the GOP strategy of cutting taxes but not spending, and everything to do with old farts like you taking all the cheese. A-hole ;).
Actually, it has everything to do with the GOP strategy of cutting taxes and continuing to spend, then getting the Government to cover their asses when their investment pyramid schemes finally dry up.
Us old farts earned every cent that we now get by Y'know... actually holding down jobs And paying taxes instead of being trust fund babies.
|
|
Psilocyborg
climber
|
|
So why I don't buy into the while new world order nonsense is, there is no feasible end game scenario. They do all these elaborate things and for what?
"Internet misinformation campaigns"
This.
What makes you think all this new world order buisness isn't a misinformation campaign covering something even more sinister, or perhaps more benign?
How do you decide what is misinformation and what is truth?
The internet has made it so there is NO truth anymore....or more realistically...all information is truth.
I laugh when people talk up the internet like it is this great thing that is "gonna get the truth out there man". Bullsh#t. What it does is gets any crazy thought running through any random persons head....and polish it enough and repeat it enough and it becomes truth. It becomes history. Same as it ever was......
|
|
Marlow
Sport climber
OSLO
|
|
May 17, 2014 - 03:16pm PT
|
Everyone should know just how much the government lied to defend the NSA.
A web of deception has finally been untangled: the Justice Department got the US supreme court to dismiss a case that could have curtailed the NSA's dragnet. Why?
http://www.theguardian.com/commentisfree/2014/may/17/government-lies-nsa-justice-department-supreme-court
The ACLU argued before the supreme court that the Fisa Amendments Act – one of the two main laws used by the NSA to conduct mass surveillance – was unconstitutional.
In a sharply divided opinion, the supreme court ruled, 5-4, that the case should be dismissed because the plaintiffs didn't have "standing" – in other words, that the ACLU couldn't prove with near-certainty that their clients, which included journalists and human rights advocates, were targets of surveillance, so they couldn't challenge the law. As the New York Times noted this week, the court relied on two claims by the Justice Department to support their ruling: 1) that the NSA would only get the content of Americans' communications without a warrant when they are targeting a foreigner abroad for surveillance, and 2) that the Justice Department would notify criminal defendants who have been spied on under the Fisa Amendments Act, so there exists some way to challenge the law in court.
It turns out that neither of those statements were true – but it took Snowden's historic whistleblowing to prove it.
|
|
couchmaster
climber
pdx
|
|
May 23, 2014 - 02:51pm PT
|
But the ACLU still doesn't have "standing" despite the decision being founded on faulty evidence? hmmm
Todays tidbit from Fars News. "American NSA Recording Every Cell Phone Call in Bahamas
TEHRAN (FNA)- The National Security Agency (NSA) is secretly intercepting, recording, and archiving the audio of virtually every cell phone conversation on the island nation of the Bahamas.
According to documents provided by NSA whistleblower Edward Snowden, the surveillance is part of a top-secret system – code-named SOMALGET – that was implemented without the knowledge or consent of the Bahamian government.
Instead, the agency appears to have used access legally obtained in cooperation with the US Drug Enforcement Administration to open a backdoor to the country’s cellular telephone network, enabling it to covertly record and store the “full-take audio” of every mobile call made to, from and within the Bahamas – and to replay those calls for up to a month, Ryan Devereaux, Glenn Greenwald and Laura Poitras said in a report released by ICH.
SOMALGET is part of a broader NSA program called MYSTIC, which The Intercept has learned is being used to secretly monitor the telecommunications systems of the Bahamas and several other countries, including Mexico, the Philippines, and Kenya. But while MYSTIC scrapes mobile networks for so-called “metadata” – information that reveals the time, source, and destination of calls – SOMALGET is a cutting-edge tool that enables the NSA to vacuum up and store the actual content of every conversation in an entire country.
All told, the NSA is using MYSTIC to gather personal data on mobile calls placed in countries with a combined population of more than 250 million people. And according to classified documents, the agency is seeking funding to export the sweeping surveillance capability elsewhere.
The program raises profound questions about the nature and extent of American surveillance abroad. The US intelligence community routinely justifies its massive spying efforts by citing the threats to national security posed by global terrorism and unpredictable rival nations. But the NSA documents indicate that SOMALGET has been deployed in the Bahamas to locate “international narcotics traffickers and special-interest alien smugglers” – traditional law-enforcement concerns, but a far cry from derailing terror plots or intercepting weapons of mass destruction.
“The Bahamas is a stable democracy that shares democratic principles, personal freedoms, and rule of law with the United States,” the State Department concluded in a crime and safety report published last year. “There is little to no threat facing Americans from domestic (Bahamian) terrorism, war, or civil unrest.”
By targeting the Bahamas’ entire mobile network, the NSA is intentionally collecting and retaining intelligence on millions of people who have not been accused of any crime or terrorist activity. Nearly five million Americans visit the country each year, and many prominent US citizens keep homes there, including Sen. Tom Harkin (D-Iowa), Bill Gates, and Oprah Winfrey.
In addition, the program is a serious – and perhaps illegal – abuse of the access to international phone networks that other countries willingly grant the United States for legitimate law-enforcement surveillance. If the NSA is using the Drug Enforcement Administration’s relationship to the Bahamas as a cover for secretly recording the entire country’s mobile phone calls, it could imperil the longstanding tradition of international law enforcement cooperation that the United States enjoys with its allies.
The NSA refused to comment on the program, but said in a statement that “the implication that NSA’s foreign intelligence collection is arbitrary and unconstrained is false.” The agency also insisted that it follows procedures to “protect the privacy of US people” whose communications are “incidentally collected.”
Informed about the NSA’s spying, neither the Bahamian prime minister’s office nor the country’s national security minister had any comment. The embassies of Mexico, Kenya, and the Philippines did not respond to phone messages and emails.
In March, The Washington Post revealed that the NSA had developed the capability to record and store an entire nation’s phone traffic for 30 days. The Post reported that the capacity was a feature of MYSTIC, which it described as a “voice interception program” that is fully operational in one country and proposed for activation in six others. (The Post also referred to NSA documents suggesting that MYSTIC was pulling metadata in some of those countries.) Citing government requests, the paper declined to name any of those countries.
The Intercept has confirmed that as of 2013, the NSA was actively using MYSTIC to gather cell-phone metadata in five countries, and was intercepting voice data in two of them. Documents show that the NSA has been generating intelligence reports from MYSTIC surveillance in the Bahamas, Mexico, Kenya, the Philippines, and one other country, which The Intercept is not naming in response to specific, credible concerns that doing so could lead to increased violence. The more expansive full-take recording capability has been deployed in both the Bahamas and the unnamed country.
MYSTIC was established in 2009 by the NSA’s Special Source Operations division, which works with corporate partners to conduct surveillance. Documents in the Snowden archive describe it as a “program for embedded collection systems overtly installed on target networks, predominantly for the collection and processing of wireless/mobile communications networks.”
If an entire nation’s cell-phone calls were a menu of TV shows, MYSTIC would be a cable programming guide showing which channels offer which shows, and when. SOMALGET would be the DVR that automatically records every show on every channel and stores them for a month. MYSTIC provides the access; SOMALGET provides the massive amounts of storage needed to archive all those calls so that analysts can listen to them at will after the fact. According to one NSA document, SOMALGET is “deployed against entire networks” in the Bahamas and the second country, and processes “over 100 million call events per day.”
SOMALGET’s capabilities are further detailed in a May 2012 memo written by an official in the NSA’s International Crime and Narcotics division. The memo hails the “great success” the NSA’s drugs and crime unit has enjoyed through its use of the program, and boasts about how “beneficial” the collection and recording of every phone call in a given nation can be to intelligence analysts.
Rather than simply making “tentative analytic conclusions derived from metadata,” the memo notes, analysts can follow up on hunches by going back in time and listening to phone calls recorded during the previous month. Such “retrospective retrieval” means that analysts can figure out what targets were saying even when the calls occurred before the targets were identified. “(W)e buffer certain calls that MAY be of foreign intelligence value for a sufficient period to permit a well-informed decision on whether to retrieve and return specific audio content,” the NSA official reported.
“There is little reason,” the official added, that SOMALGET could not be expanded to more countries, as long as the agency provided adequate engineering, coordination and hardware. There is no indication in the documents that the NSA followed up on the official’s enthusiasm.
The documents don’t spell out how the NSA has been able to tap the phone calls of an entire country. But one memo indicates that SOMALGET data is covertly acquired under the auspices of “lawful intercepts” made through Drug Enforcement Administration (DEA) “accesses”– legal wiretaps of foreign phone networks that the DEA requests as part of international law enforcement cooperation.
When US drug agents need to tap a phone of a suspected drug kingpin in another country, they call up their counterparts and ask them set up an intercept. To facilitate those taps, many nations – including the Bahamas – have hired contractors who install and maintain so-called lawful intercept equipment on their telecommunications. With SOMALGET, it appears that the NSA has used the access those contractors developed to secretly mine the country’s entire phone system for “signals intelligence” –recording every mobile call in the country. “Host countries,” the document notes, “are not aware of NSA’s SIGINT collection.”
“Lawful intercept systems engineer communications vulnerabilities into networks, forcing the carriers to weaken,” says Christopher Soghoian, the principal technologist for the American Civil Liberties Union. “Host governments really should be thinking twice before they accept one of these Trojan horses.”
The DEA has long been in a unique position to help the NSA gain backdoor access to foreign phone networks. “DEA has close relationships with foreign government counterparts and vetted foreign partners,” the manager of the NSA’s drug-war efforts reported in a 2004 memo. Indeed, with more than 80 international offices, the DEA is one of the most widely deployed US agencies around the globe.
But what many foreign governments fail to realize is that US drug agents don’t confine themselves to simply fighting narcotics traffickers. “DEA is actually one of the biggest spy operations there is,” says Finn Selander, a former DEA special agent who works with the drug-reform advocacy group Law Enforcement Against Prohibition. “Our mandate is not just drugs. We collect intelligence.”
What’s more, Selander adds, the NSA has aided the DEA for years on surveillance operations. “On our reports, there’s drug information and then there’s non-drug information,” he says. “So countries let us in because they don’t view us, really, as a spy organization.”
Selander’s first-hand experience is echoed in the 2004 memo by the manager of the NSA’s drug-war efforts, which was titled “DEA: The Other Warfighter.” The DEA and the NSA “enjoy a vibrant two-way information-sharing relationship,” the memo observes, and cooperate so closely on counter-narcotics and counterterrorism that there is a risk of “blurring the lines between the two missions.”
Still, the ability to record and replay the phone calls of an entire country appears to be a relatively new weapon in the NSA’s arsenal. None of the half-dozen former US law enforcement officials interviewed by The Intercept said they had ever heard of a surveillance operation quite like the NSA’s Bahamas collection.
“I’m completely unfamiliar with the program,” says Joel Margolis, a former DEA official who is now executive vice president of government affairs for Subsentio, a Colorado-based company that installs lawful intercepts for telecommunications providers. “I used to work in DEA’s office of chief counsel, and I was their lead specialist on lawful surveillance matters. I wasn’t aware of anything like this.”
For nearly two decades, telecom providers in the United States have been legally obligated under the 1994 Communications Assistance for Law Enforcement Act to build their networks with wiretapping capabilities, providing law enforcement agencies with access to more efficient, centrally managed surveillance.
Since CALEA’s passage, many countries have adopted similar measures, making it easier to gather telecommunications intelligence for international investigations. A 2001 working group for the United Nations Office on Drugs and Crime went so far as to urge countries to consider permitting foreign law enforcement agencies to initiate international wiretaps directly from within their own territories.
The process for setting up lawful intercepts in foreign countries is largely the same as in the United States. “Law enforcement issues a warrant or other authorization, a carrier or a carrier’s agent responds to the warrant by provisioning the intercept, and the information is sent in sort of a one-way path to the law enforcement agency,” says Marcus Thomas, a former FBI assistant director who now serves as chief technology officer for Subsentio.
When US drug agents wiretap a country’s phone networks, they must comply with the host country’s laws and work alongside their law enforcement counterparts. “The way DEA works with our allies – it could be Bahamas or Jamaica or anywhere – the host country has to invite us,” says Margolis. “We come in and provide the support, but they do the intercept themselves.”
The Bahamas’ Listening Devices Act requires all wiretaps to be authorized in writing either by the minister of national security or the police commissioner in consultation with the attorney general. The individuals to be targeted must be named. Under the nation’s Data Protection Act, personal data may only be “collected by means which are both lawful and fair in the circumstances of the case.” The office of the Bahamian data protection commissioner, which administers the act, said in a statement that it “was not aware of the matter you raise.”
Countries like the Bahamas don’t install lawful intercepts on their own. With the adoption of international standards, a thriving market has emerged for private firms that are contracted by foreign governments to install and maintain lawful intercept equipment. Currently valued at more than $128 mln, the global market for private interception services is expected to skyrocket to more than $970 mln within the next four years, according to a 2013 report from the research firm Markets and Markets.
“Most telecom hardware vendors will have some solutions for legal interception,” says a former mobile telecommunications engineer who asked not to be named because he is currently working for the British government. “That’s pretty much because legal interception is a requirement if you’re going to operate a mobile phone network.”
The proliferation of private contractors has apparently provided the NSA with direct access to foreign phone networks. According to the documents, MYSTIC draws its data from “collection systems” that were overtly installed on the telecommunications systems of targeted countries, apparently by corporate “partners” cooperating with the NSA.
One NSA document spells out that “the overt purpose” given for accessing foreign telecommunications systems is “for legitimate commercial service for the Telco’s themselves.” But the same document adds: “Our covert mission is the provision of SIGINT,” or signals intelligence.
The classified 2013 intelligence budget also describes MYSTIC as using “partner-enabled” access to both cellular and landline phone networks. The goal of the access, the budget says, is to “provide comprehensive metadata access and content against targeted communications” in the Caribbean, Mexico, Kenya, the Philippines, and the unnamed country. The budget adds that in the Bahamas, Mexico, and the Philippines, MYSTIC requires “contracted services” for its “operational sustainment.”
Definitions of terms related to the MYSTIC program, drawn from an NSA glossary
The NSA documents don’t specify who is providing access in the Bahamas. But they do describe SOMALGET as an “umbrella term” for systems provided by a private firm, which is described elsewhere in the documents as a “MYSTIC access provider.” (The documents don’t name the firm, but rather refer to a cover name that The Intercept has agreed not to publish in response to a specific, credible concern that doing so could lead to violence.) Communications experts consulted by The Intercept say the descriptions in the documents suggest a company able to install lawful intercept equipment on phone networks.
Though it is not the “access provider,” the behemoth NSA contractor General Dynamics is directly involved in both MYSTIC and SOMALGET. According to documents, the firm has an eight-year, $51 million contract to process “all MYSTIC data and data for other NSA accesses” at a facility in Annapolis Junction, Maryland, down the road from NSA’s headquarters. NSA logs of SOMALGET collection activity – communications between analysts about issues such as outages and performance problems – contain references to a technician at a “SOMALGET processing facility” who bears the same name as a LinkedIn user listing General Dynamics as his employer. Reached for comment, a General Dynamics spokesperson referred questions to the NSA.
According to the NSA documents, MYSTIC targets calls and other data transmitted on Global System for Mobile Communications networks – the primary framework used for cell phone calls worldwide. In the Philippines, MYSTIC collects “GSM, Short Message Service (SMS) and Call Detail Records” via access provided by a “DSD asset in a Philippine provider site.” (The DSD refers to the Defence Signals Directorate, an arm of Australian intelligence. The Australian consulate in New York declined to comment.) The operation in Kenya is “sponsored” by the CIA, according to the documents, and collects “GSM metadata with the potential for content at a later date.” The Mexican operation is likewise sponsored by the CIA. The documents don’t say how or under what pretenses the agency is gathering call data in those countries.
In the Bahamas, the documents say, the NSA intercepts GSM data that is transmitted over what is known as the “A link”–or “A interface”–a core component of many mobile networks. The A link transfers data between two crucial parts of GSM networks – the base station subsystem, where phones in the field communicate with cell towers, and the network subsystem, which routes calls and text messages to the appropriate destination. “It’s where all of the telephone traffic goes,” says the former engineer.
Punching into this portion of a county’s mobile network would give the NSA access to a virtually non-stop stream of communications. It would also require powerful technology.
“I seriously don’t think that would be your run-of-the-mill legal interception equipment,” says the former engineer, who worked with hardware and software that typically maxed out at 1,000 intercepts. The NSA, by contrast, is recording and storing tens of millions of calls – “mass surveillance,” he observes, that goes far beyond the standard practices for lawful interception recognized around the world.
The Bahamas Telecommunications Company did not respond to repeated phone calls and emails.
If the US government wanted to make a case for surveillance in the Bahamas, it could point to the country’s status as a leading haven for tax cheats, corporate shell games, and a wide array of black-market traffickers. The State Department considers the Bahamas both a “major drug-transit country” and a “major money laundering country” (a designation it shares with more than 60 other nations, including the US). According to the International Monetary Fund, as of 2011 the Bahamas was home to 271 banks and trust companies with active licenses. At the time, the Bahamian banks held $595 billion in US assets.
But the NSA documents don’t reflect a concerted focus on the money launderers and powerful financial institutions – including numerous Western banks – that underpin the black market for narcotics in the Bahamas. Instead, an internal NSA presentation from 2013 recounts with pride how analysts used SOMALGET to locate an individual who “arranged Mexico-to-United States marijuana shipments” through the US Postal Service.
The presentation doesn’t say whether the NSA shared the information with the DEA. But the drug agency’s Special Operations Divison has come under fire for improperly using classified information obtained by the NSA to launch criminal investigations – and then creating false narratives to mislead courts about how the investigations began. The tactic – known as parallel construction – was first reported by Reuters last year, and is now under investigation by the Justice Department’s inspector general.
So: Beyond a desire to bust island pot dealers, why would the NSA choose to apply a powerful collection tool such as SOMALGET against the Bahamas, which poses virtually no threat to the United States?
The answer may lie in a document that characterizes the Bahamas operation as a “test bed for system deployments, capabilities, and improvements” to SOMALGET. The country’s small population – fewer than 400,000 residents – provides a manageable sample to try out the surveillance system’s features. Since SOMALGET is also operational in one other country, the Bahamas may be used as a sort of guinea pig to beta-test improvements and alterations without impacting the system’s operations elsewhere.
“From an engineering point of view it makes perfect sense,” says the former engineer. “Absolutely.”
Beyond the Bahamas, the other countries being targeted by MYSTIC are more in line with the NSA’s more commonly touted priorities. In Kenya, the US works closely with local security forces in combating the militant fundamentalist group Al-Shabab, based in neighboring Somalia. In the Philippines, the US continues to support a bloody shadow war against Islamist extremists launched by the Bush administration in 2002. Last month, President Barack Obama visited Manila to sign a military pact guaranteeing that US operations in Southeast Asia will continue and expand for at least another decade.
Mexico, another country targeted by MYSTIC, has received billions of dollars in police, military, and intelligence aid from the US government over the past seven years to fight the war on drugs, a conflict that has left more than 70,000 Mexicans dead by some estimates. Attorney General Eric Holder has described Mexican drug cartels as a US “national security threat,” and in 2009, then-CIA director Michael Hayden said the violence and chaos in Mexico would soon be the second greatest security threat facing the US behind Al Qaeda.
The legality of the NSA’s sweeping surveillance in the Bahamas is unclear, given the permissive laws under which the US intelligence community operates. Earlier this year, President Obama issued a policy directive imposing “new limits” on the US intelligence community’s use of “signals intelligence collected in bulk.” In addition to threats against military or allied personnel, the directive lists five broad conditions under which the agency would be permitted to trawl for data in unrestricted dragnets: threats posed by foreign powers, terrorism, weapons of mass destruction, cybersecurity, and “transnational criminal threats, including illicit finance and sanctions evasion.”
SOMALGET operates under Executive Order 12333, a Reagan-era rule establishing wide latitude for the NSA and other intelligence agencies to spy on other countries, as long as the attorney general is convinced the efforts are aimed at gathering foreign intelligence. In 2000, the NSA assured Congress that all electronic surveillance performed under 12333 “must be conducted in a manner that minimizes the acquisition, retention, and dissemination of information about unconsenting US persons.” In reality, many legal experts point out, the lack of judicial oversight or criminal penalties for violating the order render the guidelines meaningless.
“I think it would be open, whether it was legal or not,” says German, the former FBI agent. “Because we don’t have all the facts about how they’re doing it. For a long time, the NSA has been interpreting their authority in the broadest possible way, even beyond what an objective observer would say was reasonable.”
“An American citizen has Fourth Amendment rights wherever they are,” adds Kurt Opsahl, an attorney with the Electronic Frontier Foundation. “Nevertheless, there have certainly been a number of things published over the last year which suggest that there are broad, sweeping programs that the NSA and other government agencies are doing abroad that sweep up the communications of Americans.”
Legal or not, the NSA’s covert surveillance of an entire nation suggests that it will take more than the president’s tepid “limits” to rein in the ambitions of the intelligence community. “It’s almost like they have this mentality – if we can, we will,” says German. “There’s no analysis of the long-term risks of doing it, no analysis of whether it’s actually worth the effort, no analysis of whether we couldn’t take those resources and actually put them on real threats and do more good.”
It’s not surprising, German adds, that the government’s covert program in the Bahamas didn’t remain covert. “The undermining of international law and international cooperation is such a long-term negative result of these programs that they had to know would eventually be exposed, whether through a leak, whether through a spy, whether through an accident,” he says. “Nothing stays secret forever. It really shows the arrogance of these agencies – they were just going to do what they were going to do, and they weren’t really going to consider any other important aspects of how our long-term security needs to be addressed.”"
from: http://english.farsnews.com/newstext.aspx?nn=13930230001122
|
|
TomCochrane
Trad climber
Santa Cruz Mountains and Monterey Bay
|
|
May 27, 2014 - 11:11pm PT
|
Why War Is Inevitable — Paul Craig Roberts
Memorial Day is when we commemorate our war dead. Like the Fourth of July, Memorial Day is being turned into a celebration of war.
Those who lose family members and dear friends to war don’t want the deaths to have been in vain. Consequently, wars become glorious deeds performed by noble soldiers fighting for truth, justice, and the American way. Patriotic speeches tell us how much we owe to those who gave their lives so that America could remain free.
The speeches are well-intentioned, but the speeches create a false reality that supports ever more wars. None of America’s wars had anything to do with keeping America free. To the contrary, the wars swept away our civil liberties, making us unfree.
President Lincoln issued an executive order for the arrest and imprisonment of northern newspaper reporters and editors. He shut down 300 northern newspapers and held 14,000 political prisoners. Lincoln arrested war critic US Representative Clement Vallandigham from Ohio and exiled him to the Confederacy. President Woodrow Wilson used WWI to suppress free speech, and President Franklin D. Roosevelt used WWII to intern 120,000 US citizens of Japanese descent on the grounds that race made them suspect. Professor Samuel Walker concluded that President George W. Bush used the “war on terror” for an across the board assault on US civil liberty, making the Bush regime the greatest danger American liberty has ever faced.
Lincoln forever destroyed states’ rights, but the suspension of habeas corpus and free speech that went hand in hand with America’s three largest wars was lifted at war’s end. However, President George W. Bush’s repeal of the Constitution has been expanded by President Obama and codified by Congress and executive orders into law. Far from defending our liberties, our soldiers who died in “the war on terror” died so that the president can indefinitely detain US citizens without due process of law and murder US citizens on suspicion alone without any accountability to law or the Constitution.
The conclusion is unavoidable that America’s wars have not protected our liberty but, instead, destroyed liberty. As Alexander Solzhenitsyn said, “A state of war only serves as an excuse for domestic tyranny.”
Southern secession did pose a threat to Washington’s empire, but not to the American people. Neither the Germans of WWI vintage nor the Germans and Japanese of WWII vintage posed any threat to the US. As historians have made completely clear, Germany did not start WWI and did not go to war for the purpose of territorial expansion. Japan’s ambitions were in Asia. Hitler did not want war with England and France. Hitler’s territorial ambitions were mainly to restore German provinces stripped from Germany as WWI booty in violation of President Wilson’s guarantees. Any other German ambitions were to the East. Neither country had any plans to invade the US. Japan attacked the US fleet at Pearl Harbor hoping to remove an obstacle to its activities in Asia, not as a precursor to an invasion of America.
Certainly the countries ravaged by Bush and Obama in the 21st century–Iraq, Afghanistan, Libya, Somalia, Syria, Pakistan, and Yemen posed no military threat to the US. Indeed, these were wars used by a tyrannical executive branch to establish the basis of the Stasi State that now exists in the US.
The truth is hard to bear, but the facts are clear. America’s wars have been fought in order to advance Washington’s power, the profits of bankers and armaments industries, and the fortunes of US companies. Marine General Smedley Butler said, “I served in all commissioned ranks from a second Lieutenant to a Major General. And during that time, I spent most of my time being a high-class muscle man for Big Business, for Wall Street, and for the bankers. In short, I was a racketeer for capitalism.”
It is more or less impossible to commemorate the war dead without glorifying them, and it is impossible to glorify them without glorifying their wars.
For the entirety of the 21st century the US has been at war, not war against massed armies or threats to American freedom, but wars against civilians, against women, children, and village elders, and wars against our own liberty. Elites with a vested interest in these wars tell us that the wars will have to go on for another 20 to 30 years before we defeat “the terrorist threat.”
This, of course, is nonsense. There was no terrorist threat until Washington began trying to create terrorists by military attacks, justified by lies, on Muslim populations.
Washington succeeded with its war lies to the point that Washington’s audacity and hubris have outgrown Washington’s judgment.
By overthrowing the democratically elected government in Ukraine, Washington has brought the United States into confrontation with Russia. This is a confrontation that could end badly, perhaps for Washington and perhaps for the entire world.
If Gaddafi and Assad would not roll over for Washington, why does Washington think Russia will? Russia is not Libya or Syria. Washington is the bully who having beat up the kindergarten kid, now thinks he can take on the college linebacker.
The Bush and Obama regimes have destroyed America’s reputation with their incessant lies and violence against other peoples. The world sees Washington as the prime threat.
Worldwide polls consistently show that people around the world regard the US and Israel as the two countries that pose the greatest threat to peace. http://www.ibtimes.com/gallup-poll-biggest-threat-world-peace-america-1525008 and
http://www.jewishfederations.org/european-poll-israel-biggest-threat-to-world-peace.aspx
The countries that Washington’s propaganda declares to be “rogue states” and the “axis of evil,” such as Iran and North Korea, are far down the list when the peoples in the world are consulted. It could not be more clear that the world does not believe Washington’s self-serving propaganda. The world sees the US and Israel as the rogue states.
The US and Israel are the only two countries in the world that are in the grip of ideologies. The US is in the grip of the Neoconservative ideology which has declared the US to be the “exceptional, indispensable country” chosen by history to exercise hegemony over all others. This ideology is buttressed by the Brzezinski and Wolfowitz doctrines that are the basis of US foreign policy.
The Israeli government is in the grip of the Zionist ideology that declares a “greater Israel” from the Nile to the Euphrates. Many Israelis themselves do not accept this ideology, but it is the ideology of the “settlers” and those who control the Israeli government.
Ideologies are important causes of war. Just as the Hitlerian ideology of German superiority is mirrored in the Neoconservative ideology of US superiority, the Communist ideology that the working class is superior to the capitalist class is mirrored in the Zionist ideology that Israelis are superior to Palestinians. Zionists have never heard of squatters’ rights and claim that recent Jewish immigrants into Palestine–invaders really–have the right to land occupied by others for millenniums.
Washington’s and Israel’s doctrines of superiority over others do not sit very well with the ”others.” When Obama declared in a speech that Americans are the exceptional people, Russia’s President Putin responded, “God created us all equal.”
To the detriment of its population, the Israeli government has made endless enemies. Israel has effectively isolated itself in the world. Israel’s continued existence depends entirely on the willingness and ability of Washington to protect Israel. This means that Israel’s power is derivative of Washington’s power.
Washington’s power is a different story. As the only economy standing after WWII, the US dollar became the world money. This role for the dollar has given Washington financial hegemony over the world, the main source of Washington’s power. As other countries rise, Washington’s hegemony is imperiled.
To prevent other countries from rising, Washington invokes the Brzezinski and Wolfowitz doctrines. To be brief, the Brzezinski doctrine says that in order to remain the only superpower, Washington must control the Eurasian land mass. Brzezinski is willing for this to occur peacefully by suborning the Russian government into Washington’s empire. ”A loosely confederated Russia . . . a decentralized Russia would be less susceptible to imperial mobilization.” In other words, break up Russia into associations of semi-autonomous states whose politicians can be suborned by Washington’s money.
Brzezinski propounded “a geo-strategy for Eurasia.” In Brzezinski’s strategy, China and “a confederated Russia” are part of a “transcontinental security framework,” managed by Washington in order to perpetuate the role of the US as the world’s only superpower.
I once asked my colleague, Brzezinski, that if everyone was allied with us, who were we organized against? My question surprised him, because I think that Brzezinski remains caught up in Cold War strategy even after the demise of the Soviet Union. In Cold War thinking it was important to have the upper hand or else be at risk of being eliminated as a player. The importance of prevailing became all consuming, and this consuming drive survived the Soviet collapse. Prevailing over others is the only foreign policy that Washington knows.
The mindset that America must prevail set the stage for the Neoconservatives and their 21st century wars, which, with Washington’s overthrow of the democratically elected government of Ukraine, has resulted in a crisis that has brought Washington into direct conflict with Russia.
I know the strategic institutes that serve Washington. I was the occupant of the William E.Simon Chair in Political Economy, Center for Strategic and International Studies, for a dozen years. The idea is prevalent that Washington must prevail over Russia in Ukraine or Washington will lose prestige and its superpower status.
The idea of prevailing always leads to war once one power thinks it has prevailed.
The path to war is reinforced by the Wolfowitz Doctrine. Paul Wolfowitz, the neoconservative intellectual who formulated US military and foreign policy doctrine, wrote among many similar passages:
“Our first objective is to prevent the re-emergence of a new rival, either on the territory of the former Soviet Union or elsewhere [China], that poses a threat on the order of that posed formerly by the Soviet Union. This is a dominant consideration underlying the new regional defense strategy and requires that we endeavor to prevent any hostile power from dominating a region whose resources would, under consolidated control, be sufficient to generate global power.”
In the Wolfowitz Doctrine, any other strong country is defined as a threat and a power hostile to the US regardless of how willing that country is to get along with the US for mutual benefit.
The difference between Brzezinski and the Neoconservatives is that Brzezinski wants to suborn Russia and China by including them in the empire as important elements whose voices would be heard, If only for diplomatic reasons, whereas the Neoconservatives are prepared to rely on military force combined with internal subversion orchestrated with US financed NGOs and even terrorist organizations.
Neither the US nor Israel is embarrassed by their worldwide reputations as the two countries that pose the greatest threat. In fact, both countries are proud to be recognized as the greatest threats. The foreign policy of both countries is devoid of any diplomacy. US and Israeli foreign policy rests on violence alone. Washington tells countries to do as Washington says or be “bombed into the stone age.” Israel declares all Palestinians, even women and children, to be “terrorists,” and proceeds to shoot them down in the streets, claiming that Israel is merely protecting itself against terrorists. Israel, which does not recognize the existence of Palestine as a country, covers up its crimes with the claim that Palestinians do not accept the existence of Israel.
“We don’t need no stinking diplomacy. We got power.”
This is the attitude that guarantees war, and that is where the US is taking the world. The prime minister of Britain, the chancellor of Germany, and the president of France are Washington’s enablers. They provide the cover for Washington. Instead of war crimes, Washington has “coalitions of the willing” and military invasions that bring “democracy and women’s rights” to non-compliant countries.
China gets much the same treatment. A country with four times the US population but a smaller prison population, China is constantly criticized by Washington as an “authoritarian state.” China is accused of human rights abuses while US police brutalize the US population.
The problem for humanity is that Russia and China are not Libya and Iraq. These two countries possess strategic nuclear weapons. Their land mass greatly exceeds that of the US. The US, which was unable to successfully occupy Baghdad or Afghanistan, has no prospect of prevailing against Russia and China in conventional warfare. Washington will push the nuclear button. What else can we expect from a government devoid of morality?
The world has never experienced rogue states comparable to Washington and Israel. Both governments are prepared to murder anyone and everyone. Look at the crisis that Washington has created in Ukraine and the dangers thereof. On May 23, 2014, Russia’s President Putin spoke to the St. Petersburg International Economic Forum, a three-day gathering of delegations from 62 countries and CEOs from 146 of the largest Western corporations.
Putin did not speak of the billions of dollars in trade deals that were being formalized. Instead Putin spoke of the crisis that Washington had brought to Russia, and he criticized Europe for being Washington’s vassals for supporting Washington’s propaganda against Russia and Washington’s interference in vital Russian interests.
Putin was diplomatic in his language, but the message that powerful economic interests from the US and Europe received is that it will lead to trouble if Washington and European governments continue to ignore Russia’s concerns and continue to act as if they can interfere in Russia’s vital interests as if Russia did not exist.
The heads of these large corporations will carry this message back to Washington and European capitals. Putin made it clear that the lack of dialogue with Russia could lead to the West making the mistake of putting Ukraine in NATO and establishing missile bases on Russia’s border with Ukraine. Putin has learned that Russia cannot rely on good will from the West, and Putin made it clear, short of issuing a threat, that Western military bases in Ukraine are unacceptable.
Washington will continue to ignore Russia. However, European capitals will have to decide whether Washington is pushing them into conflict with Russia that is against European interests. Thus, Putin is testing European politicians to determine if there is sufficient intelligence and independence in Europe for a rapprochement.
If Washington in its overbearing arrogance and hubris forces Putin to write off the West, the Russian/Chinese strategic alliance, which is forming to counteract Washington’s hostile policy of surrounding both countries with military bases, will harden into preparation for the inevitable war.
The survivors, if any, can thank the Neoconservatives, the Wolfowitz doctrine, and the Brzezinski strategy for the destruction of life on earth.
The American public contains a large number of misinformed people who think they know everything. These people have been programmed by US and Israeli propaganda to equate Islam with political ideology. They believe that Islam, a religion, is instead a militarist doctrine that calls for the overthrow of Western civilization, as if anything remains of Western civilization.
Many believe this propaganda even in the face of complete proof that the Sunnis and Shi’ites hate one another far more than they hate their Western oppressors and occupiers. The US has departed Iraq, but the carnage today is as high or higher than during the US invasion and occupation. The daily death tolls from the Sunni/Shi’ite conflict are extraordinary. A religion this disunited poses no threat to anyone except Islamists themselves. Washington successfully used Islamist disunity to overthrow Gaddafi, and is currently using Islamist disunity in an effort to overthrow the government of Syria. Islamists cannot even unite to defend themselves against Western aggression. There is no prospect of Islamists uniting in order to overthrow the West.
Even if Islam could do so, it would be pointless for Islam to overthrow the West. The West has overthrown itself. In the US the Constitution has been murdered by the Bush and Obama regimes. Nothing remains. As the US is the Constitution, what was once the United States no longer exists. A different entity has taken its place.
Europe died with the European Union, which requires the termination of sovereignty of all member countries. A few unaccountable bureaucrats in Brussels have become superior to the wills of the French, German, British, Italian, Dutch, Spanish, Greek, and Portuguese peoples.
Western civilization is a skeleton. It still stands, barely, but there is no life in it. The blood of liberty has departed. Western peoples look at their governments and see nothing but enemies. Why else has Washington militarized local police forces, equipping them as if they were occupying armies? Why else has Homeland Security, the Department of Agriculture, and even the Postal Service and Social Security Administration ordered billions of rounds of ammunition and even submachine guns? What is this taxpayer-paid-for arsenal for if not to suppress US citizens?
As the prominent trends forecaster Gerald Celente spells out in the current Trends Journal, “uprisings span four corners of the globe.” Throughout Europe angry, desperate and outraged peoples march against EU financial policies that are driving the peoples into the ground. Despite all of Washington’s efforts with its well-funded fifth columns known as NGOs to destabilize Russia and China, both the Russian and Chinese governments have far more support from their people than do the US and Europe.
In the 20th century Russia and China learned what tyranny is, and they have rejected it.
In the US tyranny has entered under the guise of the “war on terror,” a hoax used to scare the sheeple into abandoning their civil liberties, thus freeing Washington from accountability to law and permitting Washington to erect a militarist police state. Ever since WWII Washington has used its financial hegemony and the “Soviet threat,” now converted into the “Russian threat,” to absorb Europe into Washington’s empire.
Putin is hoping that the interests of European countries will prevail over subservience to Washington. This is Putin’s current bet. This is the reason Putin remains unprovoked by Washington’s provocations in Ukraine.
If Europe fails Russia, Putin and China will prepare for the war that Washington’s drive for hegemony makes inevitable.
|
|
karen roseme
Mountain climber
san diego
|
|
May 28, 2014 - 04:33pm PT
|
Nothing to Hide: The False Tradeoff between Privacy and Security, Solove, Daniel J.
"If you've got nothing to hide," many people say, "you shouldn't worry about government surveillance." Others argue that we must sacrifice privacy for security. But as Daniel J. Solove argues in this important book, these arguments and many others are flawed. They are based on mistaken views about what it means to protect privacy and the costs and benefits of doing so. The debate between privacy and security has been framed incorrectly as a zero-sum game in which we are forced to choose between one value and the other. Why can't we have both?
In this concise and accessible book, Solove exposes the fallacies of many pro-security arguments that have skewed law and policy to favor security at the expense of privacy. Protecting privacy isn't fatal to security measures; it merely involves adequate oversight and regulation. Solove traces the history of the privacy-security debate from the Revolution to the present day. He explains how the law protects privacy and examines concerns with new technologies. He then points out the failings of our current system and offers specific remedies. "Nothing to Hide" makes a powerful and compelling case for reaching a better balance between privacy and security and reveals why doing so is essential to protect our freedom and democracy.
|
|
|
SuperTopo on the Web
|