Monday, April 16, 2012

Deep State Surveillance, Death of Democratic Alternatives, Backdoor Wiretap Bills ....


Now just as American as apple pie . . .
Deep State Surveillance, Death of Democratic Alternatives, Backdoor Wiretap Bills Threaten Political and Privacy Rights in the Whole Zioconned and crumbling Western World and beyond...., no morals and no scruples left anywhere....




Over the decades, the maintenance of power and class privileges by corporate, financial and political elites have relied on covert and overt forms of violence, oftentimes in unspoken arrangements with transnational criminal networks (the global drug trade) or intelligence-connected far-right terrorists: the minions who staffed and profited from Operations Condor and Gladio come to mind.

Once viewed as the proverbial "tip" of the imperial spear that advanced elitist dreams of "full-spectrum dominance," the "plausibly deniable" puppeteering which formerly characterized such projects now take place in full-daylight with nary a peep from bought-off guardians of our ersatz democratic order, or a public narcotized by tawdry spectacles: Kony 2012 or American Idol, take your pick!

Mixing intellectual and moral squalor in equal measure with the latest high-tech gizmos on offer from Silicon Valley or Chengdu, the general societal drift towards data totalitarianism, once a hallmark of police states everywhere, is the backdrop where "too big to fail" is code for "too important to jail"!

With the current global economic crisis, brought on in no small part by private and public actors resorting to various frauds and market manipulations which reward privileged insiders, we have reached a social endpoint that analyst Michel Chossudovsky has accurately
described as the "criminalization of the state," that is, the historical juncture where "war criminals legitimately occupy positions of authority, which enable them to decide 'who are the criminals', when in fact they are the criminals."

It should hardly surprise us then that American "hero," Staff Sergeant Robert Bales, accused of murdering 17 innocent Afghan civilians, including 9 children and then burning their bodies, joined the Army after the 9/11 attacks not out of a sense of patriotic "duty," but because he was a thief and swindler who went on the lam to avoid accounting for his crimes.

Indeed,
ABC News reported that Bales "enlisted in the U.S. Army at the same time he was trying to avoid answering allegations he defrauded an elderly Ohio couple of their life savings in a stock fraud."

Meanwhile Bales' attorney John Henry Browne told CBS News that his client has "no memory" of the massacre and that it was "too early" to determine "what factors" may have led to the "incident."

Some hero.

Keeping Us 'Safe'

However, there are powerful institutional forces at work today which have extremely long--and exceedingly deep--memories, able to catalog and store everything we do electronically, "criminal evidence, ready for use in a trial," or, more in keeping with the preferences of our Hope and Change™ administration, a one-way ticket to
indefinite military detention for dissident Americans in the event of a "national security emergency" as a recent White House Executive Order threatened.

"In an Electronic Police State,"
Cryptohippie averred, "every surveillance camera recording, every email you send, every Internet site you surf, every post you make, every check you write, every credit card swipe, every cell phone ping... are all criminal evidence, and they are held in searchable databases, for a long, long time. Whoever holds this evidence can make you look very, very bad whenever they care enough to do so. You can be prosecuted whenever they feel like it--the evidence is already in their database."

In stark contrast to feckless promises to undo the egregious constitutional violations of the Bush regime, The New York Times reported that the "Obama administration is moving to relax restrictions on how counterterrorism analysts may access, store and search information about Americans gathered by government agencies for purposes other than national security threats."

On March 22, U.S. Attorney General Eric Holder signed-off on new
guidelines for the National Counterterrorism Center (NCTC) that "will lengthen to five years--from 180 days--the center's ability to retain private information about Americans when there is no suspicion that they are tied to terrorism," investigative journalist Charlie Savage wrote.

"The guidelines," the Times disclosed, "are also expected to result in the center making more copies of entire databases and 'data-mining them'--using complex algorithms to search for patterns that could indicate a threat--than it currently does."

We're told that the relaxation of existing guidelines "grew out of reviews launched after the failure to connect the dots about Umar Farouk Abdulmutallab, the so-called underwear bomber, before his Dec. 25, 2009, attempt to bomb a Detroit-bound airliner."

"'There is a genuine operational need to try to get us into a position where we can make the maximum use of the information the government already has to protect people,' said Robert S. Litt, the general counsel in the office of the Director of National Intelligence, which oversees the National Counterterrorism Center," the Times reported.

However, as Antifascist Calling disclosed in previous reports on the Abdulmutallab affair (see
here, here, here and here) former NCTC Director Michael E. Leiter made a startling admission during hearings before the Senate Homeland Security and Governmental Affairs Committee shortly after the incident.

During those hearings intelligence officials acknowledged that the secret state knowingly allows "watch-listed" individuals, including terrorists, to enter the country in order "to track their movements and activities."

Leiter told congressional grifters: "I will tell you, that when people come to the country and they are on the watch list, it is because we have generally made the choice that we want them here in the country for some reason or another."

As I wrote at the time: "An alternative explanation fully in line with well-documented inaction, or worse, by U.S. security agencies prior to the September 11, 2001 terrorist attacks and now, Christmas Day's aborted airline bombing, offers clear evidence that a ruthless 'choice' which facilitates the murder of American citizens are cynical pretexts in a wider game: advancing imperialism's geostrategic goals abroad and attacks on democratic rights at home."

Commenting on the ramp-up of new surveillance powers grabbed by the Obama administration, Michael German, a former FBI investigator now with the ACLU's legislative office
warned that "the 'temporary' retention of nonterrorism-related citizen and resident information for five years essentially removes the restraint against wholesale collection of our personal information by the government, and puts all Americans at risk of unjustified scrutiny."

Anonymous administration officials who spoke to The Washington Post tried to assure us that "a number different agencies looked at these [guidelines] to try to make sure that everyone was comfortable that we had the correct balance here between the information sharing that was needed to protect the country and protections for people's privacy and civil liberties."

However, as journalist Marcy Wheeler
pointed out "oversight" of the secret state's surveillance activities are being handled by the ODNI's Civil Liberties Protection Officer, Alexander Joel, a Bush appointee who was so "concerned" about protecting our privacy that he found no civil liberties violations when he reviewed NSA's illegal warrantless wiretapping programs.

Joel, a former attorney with the CIA's Office of General Counsel, told The Wall Street Journal that public fears about NSA's driftnet spying activities were "overblown."

"Although you might have concerns about what might potentially be going on, those potentials are not actually being realized and if you could see what was going on, you would be reassured just like everyone else," Joel said.

Despite Joel's soothing bromides spoon-fed to compliant media, Michael German warned that "such unfettered collection risks reviving the Bush administration's Total Information Awareness program, which Congress killed in 2003."

Documents obtained by the Electronic Privacy Information Center (
EPIC) through the Freedom of Information Act revealed that TIA aimed "to give law enforcement access to private data without suspicion of wrongdoing or a warrant."

EPIC learned that "The project called for the development of 'revolutionary technology for ultra-large all-source information repositories,' which would contain information from multiple sources to create a 'virtual, centralized, grand database.' This database would be populated by transaction data contained in current databases such as financial records, medical records, communication records, and travel records as well as new sources of information. Also fed into the database would be intelligence data."

Although Congress allegedly "killed" TIA in 2003 when it closed the Pentagon office, we now know from multiple investigations by journalists and from the government's own internal reports, Total Information Awareness never went away but rather, was hidden behind impenetrable layers of above top secret Special Access Programs and code-name protected projects, most of which are controlled by the National Security Agency.

'A Turnkey Totalitarian State'

The secret state's "virtual, centralized, grand database" will shortly come on line.

As investigative journalist James Bamford recently reported in Wired Magazine, "new pioneers" are taking up residence in the small Utah town of Bluffdale, home to the largest sect of renegade Mormon polygamists: the National Security Agency's Utah Data Center.

"A project of immense secrecy," Bamford wrote, "it is the final piece in a complex puzzle assembled over the past decade. Its purpose: to intercept, decipher, analyze, and store vast swaths of the world's communications as they zap down from satellites and zip through the underground and undersea cables of international, foreign, and domestic networks. The heavily fortified $2 billion center should be up and running in September 2013."

Wired disclosed that all manner of communications will flow into Bluffdale's "near-bottomless databases" including "the complete contents of private emails, cell phone calls, and Google searches, as well as all sorts of personal data trails--parking receipts, travel itineraries, bookstore purchases, and other digital 'pocket litter'."

Additionally, one top NSA official involved with the program told Bamford that the agency "made an enormous breakthrough several years ago in its ability to cryptanalyze, or break, unfathomably complex encryption systems employed by not only governments around the world but also many average computer users in the US. The upshot, according to this official: 'Everybody's a target; everybody with communication is a target'."

"For the first time since Watergate and the other scandals of the Nixon administration--the NSA has turned its surveillance apparatus on the US and its citizens," Bamford averred. "It has established listening posts throughout the nation to collect and sift through billions of email messages and phone calls, whether they originate within the country or overseas."

Since the dawn of the Cold War, the National Security Agency operated outside its charter, illegally spying on the communications of dissident Americans. In a companion piece for Wired, Bamford detailed how NSA denied that it was eavesdropping on Americans.

"For example," Bamford wrote, "NSA can intercept millions of domestic communications and store them in a data center like Bluffdale and still be able to say it has not 'intercepted' any domestic communications. This is because of its definition of the word. 'Intercept,' in NSA's lexicon, only takes place when the communications are 'processed' 'into an intelligible form intended for human inspection,' not as they pass through NSA listening posts and transferred to data warehouses."

NSA mendacity aside, "for decades," Bamford informed us, "the agency secretly hid from Congress the fact that it was copying, without a warrant, virtually every telegram traveling through the United States, a program known as
Project Shamrock. Then it hid from Congress the fact that it was illegally targeting the phone calls of anti-war protesters during the Vietnam War, known as Project Minaret."

But as we learned when The New York Times disclosed some aspects of the Bush regime's Stellar Wind program, the NSA was caught red-handed illegally spying on tens of thousands of Americans without benefit of a warrant and did so with the full cooperation of America's giant telecom firms and internet service providers who were then immunized by Congress under provisions of 2008's despicable FISA Amendments Act (
FAA).

Even as Congress granted retroactive immunity to telecoms and ISPs, and politicians, including President Obama, scrambled to downplay serious violations to individual political and privacy rights, the enormous reach of these programs are still misunderstood by the public.

William Binney, a former NSA official who was a senior "crypto-mathematician largely responsible for automating the agency's worldwide eavesdropping network," went on the record with Wired and denounced NSA's giant domestic eavesdropping machine.

Binney explained "that the agency could have installed its tapping gear at the nation's cable landing stations--the more than two dozen sites on the periphery of the US where fiber-optic cables come ashore. If it had taken that route, the NSA would have been able to limit its eavesdropping to just international communications, which at the time was all that was allowed under US law."

"Instead," Binney told Wired, the agency "chose to put the wiretapping rooms at key junction points throughout the country--large, windowless buildings known as switches--thus gaining access to not just international communications but also to most of the domestic traffic flowing through the US. The network of intercept stations goes far beyond the single room in an AT&T building in San Francisco exposed by a whistle-blower in 2006. 'I think there's 10 to 20 of them,' Binney says. 'That's not just San Francisco; they have them in the middle of the country and also on the East Coast'."

Readers will recall that back in 2006, former AT&T technician Marc Klein blew the lid off the technical details of Stellar Wind, disclosing internal AT&T documents on how the firm gave NSA free-reign to install ultra-secret Narus machines. Those devices split communications as they flowed into AT&T's "secret rooms" and diverted all internet traffic into NSA's bottomless maw.

Klein, the author of Wiring Up the Big Brother Machine said that the program "was just the tip of an eavesdropping iceberg" which is not only targeted at suspected "terrorists" but rather is "an untargeted, massive vacuum cleaner sweeping up millions of peoples' communications every second automatically."

Narus, an Israeli firm founded by retired members of the IDF's secretive Unit 8200, now owned by The Boeing Corporation, and Verint, now Comverse Infosys, another Israeli firm, were close partners alongside NSA in these illegal projects; one more facet of the U.S. and Israel's "special relationship."

The former official turned whistleblower told Wired that "Stellar Wind was far larger than has been publicly disclosed and included not just eavesdropping on domestic phone calls but the inspection of domestic email."

"At the outset the program recorded 320 million calls a day," Bamford wrote, "which represented about 73 to 80 percent of the total volume of the agency's worldwide intercepts. The haul only grew from there. According to Binney--who has maintained close contact with agency employees until a few years ago--the taps in the secret rooms dotting the country are actually powered by highly sophisticated software programs that conduct 'deep packet inspection,' examining Internet traffic as it passes through the 10-gigabit-per-second cables at the speed of light."

"Once a name is entered into the Narus database," Binney said, "all phone calls and other communications to and from that person are automatically routed to the NSA's recorders."

"'Anybody you want, route to a recorder,' Binney says. 'If your number's in there? Routed and gets recorded.' He adds, 'The Narus device allows you to take it all.' And when Bluffdale is completed, whatever is collected will be routed there for storage and analysis."

Chillingly, Binney "held his thumb and forefinger close together" and told Bamford: "'We are that far from a turnkey totalitarian state'."

Main Core

During World War II, the Roosevelt administration issued
Executive Order 9066 which granted the military carte blanche to circumvent the constitutional rights of some 120,000 Japanese-American citizens and led to their mass incarceration in remote, far-flung camps surrounded by barbed wire and armed guards.

Will history repeat, this time under the rubric of America's endless "War on Terror"?

In 2008, investigative journalists Christopher Ketchum reported in the now-defunct Radar Magazine and Tim Shorrock, writing in Salon, provided details on a frightening "Continuity of Government" database known as Main Core.

According to Ketchum, a senior government official told him that "there exists a database of Americans, who, often for the slightest and most trivial reason, are considered unfriendly, and who, in a time of panic, might be incarcerated. The database can identify and locate perceived 'enemies of the state' almost instantaneously."

That official and other sources told Radar that "the database is sometimes referred to by the code name Main Core. One knowledgeable source claims that 8 million Americans are now listed in Main Core as potentially suspect. In the event of a national emergency, these people could be subject to everything from heightened surveillance and tracking to direct questioning and possibly even detention."

For his part, Shorrock revealed that several government officials with above top secret security clearances told him that "Main Core in its current incarnation apparently contains a vast amount of personal data on Americans, including NSA intercepts of bank and credit card transactions and the results of surveillance efforts by the FBI, the CIA and other agencies."

"One former intelligence official," Shorrock reported, "described Main Core as 'an emergency internal security database system' designed for use by the military in the event of a national catastrophe, a suspension of the Constitution or the imposition of martial law. Its name, he says, is derived from the fact that it contains 'copies of the 'main core' or essence of each item of intelligence information on Americans produced by the FBI and the other agencies of the U.S. intelligence community'."

It now appears that Main Core, or some other code-word protected iteration of the secret state's administrative detention database will in all likelihood soon reside at Bluffdale.

While conservative and liberal supporters of the Bush and Obama administrations have derided these reports as the lunatic ravings of "conspiracy theorists," analysts such as Peter Dale Scott have
made clear that a decade after the 9/11 attacks, "some aspects of COG remain in effect. COG plans are still authorized by a proclamation of emergency that has been extended each year by presidential authority, most recently by President Obama in September 2009. COG plans are also the probable source for the 1000-page Patriot Act presented to Congress five days after 9/11, and also for the Department of Homeland Security's Project Endgame--a ten-year plan, initiated in September 2001, to expand detention camps, at a cost of $400 million in Fiscal Year 2007 alone."

"At the same time," Scott wrote, "we have seen the implementation of the plans outlined by [Miami Herald journalist Alfonso] Chardy in 1987: the warrantless detentions that Oliver North had planned for in Rex 1984, the warrantless eavesdropping that is their logical counterpart, and the militarization of the domestic United States under a new military command, NORTHCOM. Through NORTHCOM the U.S. Army now is engaged with local enforcement to control America, in the same way that through CENTCOM it is engaged with local enforcement to control Afghanistan and Iraq."

Indeed, as the Associated Press recently disclosed in their multipart investigation into illegal spying by the New York Police Department (NYPD), undercover officers "attended meetings of liberal political organizations and kept intelligence files on activists who planned protests around the U.S., according to interviews and documents that show how police have used counterterrorism tactics to monitor even lawful activities."

A 2008
intelligence report obtained by AP revealed "how, in the name of fighting terrorism, law enforcement agencies around the country have scrutinized groups that legally oppose government policies."

"The FBI for instance," investigative journalists Adam Goldman and Matt Apuzzo averred, "has collected information on anti-war demonstrators. The Maryland state police infiltrated meetings of anti-death penalty groups. Missouri counterterrorism analysts suggested that support for Republican Rep. Ron Paul might indicate support for violent militias--an assertion for which state officials later apologized. And Texas officials urged authorities to monitor lobbying efforts by pro Muslim-groups."

"The April 2008 memo offers an unusually candid view of how political monitoring fit into the NYPD's larger, post-9/11 intelligence mission. As the AP has reported previously, [David] Cohen's unit has transformed the NYPD into one of the most aggressive domestic intelligence agencies in the United States, one that infiltrated Muslim student groups, monitored their websites and used informants as listening posts inside mosques."

Nor should we forget how the Pentagon's own domestic intelligence unit, the Counterintelligence Field Activity or CIFA, routinely monitored antiwar activists and other dissidents.

As Antifascist Calling previously reported, multiple news reports beginning in late 2005 revealed that CIFA with 400 full-time DoD workers and 900 "outsourced" contractor employees and a classified budget, had been authorized to track "potential terrorist threats" against DoD through reports known as Threat and Local Observation Notices (TALON).

Although that office was shuttered in 2008, its domestic security functions were transferred to the Defense Intelligence Agency's Defense Counterintelligence and Human Intelligence Center and the TALON database along with future "threat reports" would now be funneled to an FBI database known as "Guardian."

However, as SourceWatch noted, "in accordance with intelligence oversight requirements," even though CIFA was closed down, DoD "will maintain a record copy of the collected data." In other words TALON reports, including data illegally collected on antiwar activists, will continue to exist somewhere deep in the bowels of the Defense Department, more likely than not in a Bluffdale database administered by NSA.

When President Obama signed the National Defense Authorization Act (
NDAA) into law on December 31, he did more than simply facilitate multibillion dollar Pentagon boondoggles for the current fiscal year; he set the stage for what journalist Christopher Ketchum called "The Last Roundup," and what James Bamford's source denounced as our approaching "turnkey totalitarian state."

We need not speculate as to when an American police state will be fully functional, it already is....






Under the guise of "cybersecurity," the new all-purpose bogeyman to increase the secret state's already-formidable reach, the Obama administration and their congressional allies are crafting legislation that will open new backdoors for even more intrusive government surveillance: portals into our lives that will never be shut.

As Antifascist Calling has frequently warned, with the endless "War on Terror" as a backdrop the federal government, most notably the 16 agencies that comprise the so-called "Intelligence Community" (IC), have been constructing vast centralized databases that scoop-up and store all things digital--from financial and medical records to the totality of our electronic communications online--and do so without benefit of a warrant or probable cause.

The shredding of constitutional protections afforded by the Fourth Amendment, granted to the Executive Branch by congressional passage of the Authorization for Use of Military Force (
AUMF) after the 9/11 attacks, followed shortly thereafter by the oxymoronic USA Patriot Act set the stage for today's depredations.

Under provisions of multiple bills under consideration by the House and Senate, federal officials will be given broad authority over private networks that will almost certainly hand security officials wide latitude over what is euphemistically called "information-sharing" amongst corporate and government securocrats.

As The Washington Post reported in February, the National Security Agency "has pushed repeatedly over the past year to expand its role in protecting private-sector computer networks from cyberattacks" but has allegedly "been rebuffed by the White House, largely because of privacy concerns."

"The most contentious issue," Post reporter Ellen Nakashima wrote, "was a legislative proposal last year that would have required hundreds of companies that provide such critical services as electricity generation to allow their Internet traffic to be continuously scanned using computer threat data provided by the spy agency. The companies would have been expected to turn over evidence of potential cyberattacks to the government."

Both the White House and Justice Department have argued, according to the Post, that the "proposal would permit unprecedented government monitoring of routine civilian Internet activity."

National Security Agency chief General Keith Alexander, the dual-hatted commander of NSA and U.S. Cyber Command (USCYBERCOM), the Pentagon satrapy that wages offensive cyberwar, was warned to "restrain his public comments after speeches in which he argued that more expansive legal authority was necessary to defend the nation against cyberattacks."

While we can take White House "objections" with a proverbial grain of salt, they do reveal however that NSA, the largest and most well-funded of the secret state's intel shops will use their formidable surveillance assets to increase their power while undermining civilian control over the military in cahoots with shadowy security corporations who do their bidding. (Readers are well-advised to peruse
The Surveillance Catalog posted by The Wall Street Journal as part of their excellent What They Know series for insight into the burgeoning Surveillance-Industrial Complex).

As investigative journalist James Bamford pointed out recently in Wired Magazine, "the exponential growth in the amount of intelligence data being produced every day by the eavesdropping sensors of the NSA and other intelligence agencies" is "truly staggering."

In a follow-up piece for Wired, Bamford informed us that when questioned by Congress, Alexander stonewalled a congressional subcommittee when asked whether NSA "has the capability of monitoring the communications of Americans, he never denies it--he simply says, time and again, that NSA can't do it 'in the United States.' In other words it can monitor those communications from satellites in space, undersea cables, or from one of its partner countries, such as Canada or Britain, all of which it has done in the past."

Call it
Echelon on steroids, the massive, secret surveillance program first exposed by journalists Duncan Campbell and Nicky Hager.

And with the eavesdropping agency angling for increased authority to monitor the electronic communications of Americans, the latest front in the secret state's ongoing war against privacy is "cybersecurity" and "infrastructure protection."

'Information Sharing' or Blanket Surveillance?

Among the four bills currently competing for attention, the most egregious threat to civil liberties is the Cyber Intelligence Sharing and Protection Act of 2011 (CISPA,
H.R. 3523).

Introduced by Mike Rogers (R-MI) and Dutch Ruppersberger (D-MD), the bill amends the National Security Act of 1947, adding language concerning so-called "cyber threat intelligence and information sharing."

"Cyber threat intelligence" is described as "information in the possession of an element of the intelligence community directly pertaining to a vulnerability of, or threat to, a system or network of a government or private entity, including information pertaining to the protection of a system or network from: (1) efforts to degrade, disrupt, or destroy such system or network; or (2) theft or misappropriation of private or government information, intellectual property, or personally identifiable information."

In keeping with other "openness" mandates of our Transparency Administration™ the Rogers bill will require the Director of National Intelligence (DNI) to establish procedures that permit IC elements to "share cyber threat intelligence with private-sector entities, and (2) encourage the sharing of such intelligence."

These measures however, will not protect the public at large from attacks by groups of organized cyber criminals since such intelligence is only "shared with certified entities or a person with an appropriate security clearance," gatekeepers empowered by the state who ensure that access to information is "consistent with the need to protect U.S. national security, and used in a manner that protects such intelligence from unauthorized disclosure."

In other words, should "cleared" cyber spooks be directed by their corporate or government masters to install
state-approved malware on private networks as we discovered last year as a result of the HBGary hack by Anonymous, it would be a crime punishable by years in a federal gulag if official lawbreaking were disclosed.

The bill authorizes "a cybersecurity provider (a non-governmental entity that provides goods or services intended to be used for cybersecurity purposes)," i.e., an outsourced contractor from any one of thousands of spooky "cybersecurity" firms, to use "cybersecurity systems to identify and obtain cyber threat information in order to protect the rights and property of the protected entity; and share cyber threat information with any other entity designated by the protected entity, including the federal government."

Furthermore, the legislation aims to regulate "the use and protection of shared information, including prohibiting the use of such information to gain a competitive advantage and, if shared with the federal government, exempts such information from public disclosure."

And should the public object to the government or private entities trolling through their personal data in the interest of "keeping us safe" well, there's an app for that too! The bill "prohibits a civil or criminal cause of action against a protected entity, a self-protected entity (an entity that provides goods or services for cybersecurity purposes to itself), or a cybersecurity provider acting in good faith under the above circumstances."

One no longer need wait until constitutional violations are uncovered, the Rogers bill comes with a get-out-of-jail-free card already in place for state-approved scofflaws.

Additionally, the bill also "preempts any state statute that restricts or otherwise regulates an activity authorized by the Act." In other words, in states like California where residents have "an inalienable right to privacy" under Article 1, Section 1 of the State Constitution, the Rogers bill would be abolish that right and effectively "legalize" unaccountable snooping by the federal government or other "self-protected," i.e., private entities deputized to do so by the secret state.

Social Media Spying

How would this play out in the real world? As Government Computer News reported, hyped-up threats of an impending "cyber-armageddon" have spawned a host of new actors constellating America's Surveillance-Industrial Complex: the social media analyst.

"Companies and government agencies alike are using tools to sweep the Internet--blogs, websites, and social media such as Facebook and Twitter feeds--to find out what people are saying about, well, just about anything."

Indeed, as researchers Jerry Brito and Tate Watkins pointed out last year in Loving the Cyber Bomb?, "An industrial complex reminiscent of the Cold War's may be emerging in cybersecurity today."

Brito and Watkins averred that "the military-industrial complex was born out of exaggerated Soviet threats, a defense industry closely allied with the military and Department of Defense, and politicians striving to bring pork and jobs home to constituents. A similar cyber-industrial complex may be emerging today, and its players call for government involvement that may be superfluous and definitely allows for rent seeking and pork barreling."

Enter social media analysis and the private firms out to make a buck--at our expense.

"Not surprisingly," GCN's Patrick Marshall wrote, "intelligence agencies have already been looking at social media as a source of information. The Homeland Security Department has been analyzing traffic on social networks for at least the past three years."

While DHS claims it does not routinely monitor Facebook or Twitter, and only responds when it receives a "tip," such assertions are demonstrably false.

Ginger McCall, the director of the Electronic Electronic Privacy Information Center's Open Government Program told GCN that the department is "explicitly monitoring for criticism of the government, for reports that reflect adversely on the agency, for public reaction to policy proposals."

But DHS isn't the only agency monitoring social media sites such as Facebook and Google+.

As Antifascist Calling reported back in 2009, according to New Scientist the National Security Agency "is funding research into the mass harvesting of the information that people post about themselves on social networks."

Not to be outdone, the CIA's venture capital investment arm,
In-Q-Tel, has poured millions of dollars into Visible Technologies, a Bellevue, Washington-based firm specializing in "integrated marketing, social servicing, digital experience management, and consumer intelligence."

According to
In-Q-Tel "Visible Technologies has developed TruCast®, which takes an innovative and holistic approach to social media management. TruCast has been architected as an enterprise-level solution that provides the ability to track, analyze, and respond to social media from a single, Web-based platform."

Along similar lines, the CIA has heavily invested in
Recorded Future, a firm which "extracts time and event information from the web. The company offers users new ways to analyze the past, present, and the predicted future."

The firm's defense and intelligence analytics
division promises to "help analysts understand trends in big data, and foresee what may happen in the future. Groundbreaking algorithms extract temporal and predictive signals from unstructured text. Recorded Future organizes this information, delineates results over interactive timelines, visualizes past trends, and maps future events--all while providing traceability back to sources. From OSINT to classified data, Recorded Future offers innovative, massively scalable solutions."

As Government Computer News pointed out, in January the FBI "put out a request for vendors to provide information about available technologies for monitoring and analyzing social media." Accordingly, the Bureau is seeking the ability to:

• Detect specific, credible threats or monitor adversarial situations.
• Geospatially locate bad actors or groups and analyze their movements, vulnerabilities, limitations, and possible adverse actions.
• Predict likely developments in the situation or future actions taken by bad actors (by conducting trend, pattern, association, and timeline analysis).
• Detect instances of deception in intent or action by bad actors for the explicit purpose of misleading law enforcement.
• Develop domain assessments for the area of interest (more so for routine scenarios and special events).


So much for privacy in our Orwellian New World Order!

Backdoor Official Secrets Act

Social media "harvesting" by private firms hot-wired into the state's Surveillance-Industrial Complex will be protected from challenges under provisions of CISPA.

As the Electronic Frontier Foundation (
EFF) pointed out, "a company that protects itself or other companies against 'cybersecurity threats' can 'use cybersecurity systems to identify and obtain cyber threat information to protect the rights and property' of the company under threat. But because 'us[ing] cybersecurity systems' is incredibly vague, it could be interpreted to mean monitoring email, filtering content, or even blocking access to sites. A company acting on a 'cybersecurity threat' would be able to bypass all existing laws, including laws prohibiting telcos from routinely monitoring communications, so long as it acted in 'good faith'."

And as EFF's Rainey Reitman and Lee Tien aver, the "broad language" concerning what constitutes a cybersecurity "threat," is an invitation for the secret state and their private "partners" to include "theft or misappropriation of private or government information, intellectual property, or personally identifiable information."

"Yes," Reitman and Tien wrote, "intellectual property. It's a little piece of SOPA wrapped up in a bill that's supposedly designed to facilitate detection of and defense against cybersecurity threats. The language is so vague that an ISP could use it to monitor communications of subscribers for potential infringement of intellectual property. An ISP could even interpret this bill as allowing them to block accounts believed to be infringing, block access to websites like The Pirate Bay believed to carry infringing content, or take other measures provided they claimed it was motivated by cybersecurity concerns."

More troubling, "the government and Internet companies could use this language to block sites like WikiLeaks and NewYorkTimes.com, both of which have published classified information."

Should CISPA pass muster it could serve as the basis for establishing an American "Official Secrets Act." In the United Kingdom, the Act has been used against whistleblowers to prohibit disclosure of government crimes. But it does more than that. The state can also issue restrictive "D-Notices" that "advise" editors not to publish material on subjects deemed sensitive to the "national security."

EFF warns that "online publishers like WikiLeaks are currently afforded protection under the First Amendment; receiving and publishing classified documents from a whistleblower is a common journalistic practice. While there's uncertainty about whether the Espionage Act could be brought to bear against WikiLeaks, it is difficult to imagine a situation where the Espionage Act would apply to WikiLeaks without equally applying to the New York Times, the Washington Post, and in fact everyone who reads about the cablegate releases."

And with the Obama regime's crusade to prosecute and punish whistleblowers, as the recent indictment of former CIA officer
John Kiriakou for alleged violations of the Espionage Act and the Intelligence Identities Protection Act for disclosing information on the CIA's torture programs, we have yet another sterling example of administration "transparency"! While Kiriakou faces 30 years in prison, the former head of the CIA's Directorate of Operations, Jose A. Rodriguez Jr., who was responsible for the destruction of 92 torture videotapes held by the Agency, was not charged by the government and was given a free pass by the Justice Department.

As the World Socialist Web Site points out: "More fundamentally, the prosecution of Kiriakou is part of a policy of state secrecy and repression that pervades the US government under Obama, who came into office promising 'the most transparent administration in history.'"

Critic Bill Van Auken observed that Kiriakou's prosecution "marks the sixth government whistleblower to be charged by the Obama administration under the Espionage Act, twice as many such prosecutions as have been brought by all preceding administrations combined. Prominent among them is Private Bradley Manning, who is alleged to have leaked documents exposing US war crimes to WikiLeaks. He has been held under conditions tantamount to torture and faces a possible death penalty."

"In all of these cases," the World Socialist Web Site noted, "the World War I-era Espionage Act is being used to punish not spying on behalf of a foreign government, but exposing the US government's own crimes to the American people. The utter lawlessness of US foreign policy goes hand in hand with the collapse of democracy at home."

The current crop of "cybersecurity" bills are sure to hasten that collapse.

Under Rogers' legislation, "the government would have new, powerful tools to go after WikiLeaks," or anyone else who challenges the lies of the U.S. government by publishing classified information that contradicts the dominant narrative.

"By claiming that WikiLeaks constituted 'cyber threat intelligence' (aka 'theft or misappropriation of private or government information')," EFF avers, "the government may be empowering itself and other companies to monitor and block the site. This means that the previous tactics used to silence WikiLeaks--including a financial blockade and shutting down their accounts with online service providers--could be supplemented by very direct means. The government could proclaim that WikiLeaks constitutes a cybersecurity threat and have new, broad powers to filter and block communication with the journalistic website."

Since January, Obama has signed legislation (
NDAA) granting the Executive Branch authority to condemn alleged "enemy combatants," including U.S. citizens detained in America, indefinite military detention without charges or trials, and with U.S. Attorney General Eric Holder asserting that the president has the "right" to assassinate American citizens anywhere on earth, it clear to anyone who hasn't drunk the Hope and Change™ Kool-Aid, that the architecture of an American and European/Canadian/Australian-ZIOCONNED police state is now in place.....



Tuesday, February 21, 2012

Gods of Money: Wall Street and the Death of the American Century....


Gods of Money: Wall Street and the Death of the American Century....


http://coto2.wordpress.com/2011/02/25/william-engdahl-gods-of-money-wall-street-and-the-death-of-the-american-century/

William Engdahl,


Globalization and de-industrialization were the opening moves of the trap- privatization is the trap closing on our necks. Of course the rest of the world has been experiencing all this for a long time; but we are no longer the minor beneficiaries of American Imperialism, we have become the next course in its move to devour the world.- Claudia
Find the book at:
Amazon Review of: Gods of Money: Wall Street and the Death of the American Century (Paperback) by Reg Little
William Engdahl’s latest book is another awesome exploration and explanation of the boldness and failings of Anglo-American global strategy over most of the past century and a half. Engdahl recalls in his introduction a statement from the 1970′s attributed to then-Secretary of State Henry Kissinger, a protégé of the powerful Rockefeller circles, in which he declared, “If you control the oil, you control entire nations; if you control the food, you control the people; if you control the money, you control the entire world.”
With Gods of Money, Engdahl completes the trilogy, which with
A Century of War: Anglo-American Oil Politics and the New World Order, and Seeds of Destruction: The Hidden Agenda of Genetic Manipulation explores the ways in which the Rockefellers and the people around them would appear to have sought to control oil, food and money in seeking to establish their sense of global order.
For anyone interested in the contemporary world, its politics and its tragedies, Engdahl’s books are obligatory reading. He explains the reasons for linking Abraham Lincoln’s assassination to British and European banking interests but shows how, as wealth concentrated into the hands of a few American families, notably those of the Morgans and Rockefellers, the United States developed a remarkable strategy that concentrated power through the mastery of global finance, backed by military expedience. Like a growing number of other writers, however, he leaves no doubt that this strategy has run into serious troubles, devastating Americans as much as the intended subjects of American Empire, or of a New American Century.
He highlights early the reality that “power, together with control over the nation’s economy, was being ruthlessly centralized in the hands of the wealthy few, every bit as much as it had been in the days of Imperial Rome.” In fleshing out this theme Engdahl leaves little doubt that the values of the European Enlightenment, with which America has promoted itself to the world, have simply been a useful disguise for a rapacious plutocracy.
He puts in brutally in these words:
“Some 60 families–names like Rockefeller, Morgan, Dodge, Mellon, Pratt, Harkness, Whitney, Duke, Harriman, Carnegie, Vanderbilt, DuPont, Guggenheim, Astor, Lehman, Warburg, Taft, Huntington, Baruch and Rosenwald– formed a close network of plutocratic wealth that manipulated, bribed, and bullied its way to control the destiny of the United States.”
He continues:
“They operated in absolute secrecy, lest the general public understand how the banks’ money manipulated political decisions behind the scenes, including decisions to go to war or to keep the peace.”
The shock of these passages rests in the realization that these forces defined the 20th Century and are threatening various disasters for large populations at the beginning of the 21st Century, and yet remain largely unidentified in the mind of the voting electorate. Central to the story are the consequences of the legislation that established the Federal Reserve in 1913, placing it under the control of private bankers able to access the taxes of ordinary citizens
Also central to the story was the use by the United States of the challenge posed to Britain by the rise of Germany to assume the dominant role in global finance and politics. Germany’s industrial growth, its educational system and its science were already leaving England far behind. The dominant role of the City of London over the terms of world trade was lost to the United States in the two great wars of the 20th Century.
A central element of the story was the “extraordinary techniques of mass manipulation of opinion” initiated during World War I, which “greatly assisted the transformation of America into a democracy by-outward-appearance, ruled deceptively by a plutocratic elite in its own self interest”.
Engdahl draws attention to the fact that “America was to be an empire in much the same way that Great Britain had been an Empire after 1815, with one significant difference. America’s economic imperialism would disguise itself under the rhetorical cover of ` spreading free enterprise,’ and supporting `national self-determination’ and `democracy.’ The term `empire’ was to be scrupulously avoided.”
He captures the quality of American political strategy in several paragraphs:
“The policy makers from the Council on Foreign Relations (CFR) and the internationalists around the Rockefeller group engaged in seemingly paradoxical and contradictory policies. They were simultaneously financing and staffing the CFR War & Peace Studies–intended to be a detailed blueprint for a postwar US global domination, an American Century–while at the same time they were going to extraordinary lengths supporting the Third Reich’s war buildup, accruing huge profits from the sales to their `enemy’ that soared far beyond anything normal. It appeared that Rockefellers’ Standard Oil and allied companies like Dow Chemical and DuPont went to extraordinary lengths to support Hitler’s war machine.
“The resolution to the paradox lay in appreciating American geopolitical strategy as formulated by people like Isaiah Bowman of the CFR and Yale University’s geopolitical strategist, Nicholas Spykman. They had developed a uniquely American synthesis of Halford Mackinder’s British geopolitics -identifying the most vital, `pivotal’ nations needed for the support of an American postwar global domination, an American Empire.
“For the influential US elites grouped around the CFR, war was merely an instrument through which to extend their financial power in the postwar world and create an American imperium, one displacing not only the British Empire, but also the German Reich and any other potential European competitor.”
As Engdahl’s account progresses, it becomes clear that America repeated Britain’s mistake in neglecting to develop a leadership role in industry, education and science. This left it vulnerable, of course, not to Germany but to the economies of East Asia, beginning with Japan and concluding with China. Engdahl shows how American strategists focused on financial manipulation and how they neglected any concern with American decline in industrial, educational and scientific competitiveness. This made inevitable and predictable the off-shoring of American industry, something that remains poorly, if at all, understood in America. It is, of course well understood in Japan, China and elsewhere in Asia.
Engdhal recounts how Americans believed propaganda that asserted America’s God-given `Manifest Destiny’ and `Divine Right” to expand its frontiers and plunder other countries. He notes how for “the Rockefellers, the most prominent proponent of the Manifest Destiny idea in the post-war period, the entire world was considered their `frontier.’” The Cold War was fought by `American democracy’ against `Godless Communism’ and gave the advance of American interests “a messianic religious cover that was astonishingly effective for decades.”
Paired with this propaganda mechanism was the construction of new International Financial Institutions after the Second World War, where the IMF became the global financial `policeman,’ under the control of America and, to a lesser degree, Britain. This was used to enforce the payment of “usurious debts through imposition of the most draconian austerity in history.” The IMF became an arm of “a de facto Anglo-American neo-colonial monetary and economic dictatorship”. `Free trade’ and a `level playing field’ continued to be “the rallying cry of the strongest, most advanced economies, seeking to open up less developed markets for their goods.”
The price was, however, America’s industrial base went into terminal decline and the nation’s most talented scientific minds were drawn into Wall Street. The consequence of all this is today all too clear to see. Over forty years, the financial sector’s share of total profits has grown from 2% to 40%, as industrial output has declined, education has deteriorated, technology has stagnated and indebtedness has exploded.
The system was maintained by Wall Street expenditure of at least $5 billion from 1998 to 2008 “buying the votes of the US Congress through campaign contributions and `lobbying’ expenses.”
A former US bank regulator, William Black, noted that:
“Corporate stock repurchases and grants of stock to officers have exceeded new capital raised by the US capital markets this decade. That means that the capital markets decapitalize the real economy. Too often, they do so in order to enrich corrupt corporate insiders through accounting fraud or backdated stock options….The US real economy suffers from critical shortages of employees with strong mathematical, engineering, and scientific backgrounds. Graduates in these three fields all too frequently choose careers in finance rather than the real economy because the financial sector provides far greater executive compensation…. The financial sector’s fixation on accounting earnings leads it to pressure US manufacturing and service firms to export jobs abroad, to deny capital to firms that are unionized, and to encourage firms to use foreign tax havens to evade paying US taxes.”
Yet, between 2000 and 2007 American consumption made up one third of growth in global consumption. This highlights the manner in which American abuse of its global power in organizations like the IMF harmed the United States as much as anyone, although in a unique manner. Indeed, by 2009, one estimate put America’s annual deficit at more than $5 trillion.
Engdahl concludes with a review of the decline of the Roman Empire, a process that took much longer than now seems likely with American Empire. He remarks pertinently on paid professional career soldiers, on unpopular distant wars, on gaining citizenship in exchange for military service, and on an increasingly degenerate oligarchy.
He recalls that the American Century had been based as had Rome on a system of looting and plunder of foreign lands. It took a different form, of course, in using the supranational technocrats of the IMF to plunder the wealth of countries from Latin America to Africa while simultaneously exploiting the world’s reserve currency. Being an unchallenged military superpower, it has enjoyed consumption far beyond what its internal economy could have sustained and has used a “free-floating dollar and virtual money in the form of financial derivatives to maintain a facade of solvency.”
– REG LITTLE was an Australian diplomat for over 25 years.

Monday, January 23, 2012

إلى روح شهيدنا البطل الرئيس ايلي حبيقة


في مثل هذا اليوم في الذّكرى العاشرة لإستشهاد إيلي حبيقة .... إلى روح شهيدنا البطل الرئيس ايلي حبيقة
ايلي حبيقة قائدا وسلاحو كان لبنان
كان قائدا بكل معنى الكلمة وسيبقى.... رحمه الله وصبّر اهله
....وحدهم الأبطال يستشهدون بصمت
الوزير الراحل شهيدنا البطل الرئيس ايلي حبيقة صرف عمره على العمل والتعب, اغتيلت حقيقة عشرين عاماً وأكثر، عبثاً تبحث عنها محاكم محلية مقصِّرة أو أخرى دولية مسيَّسة
....خلية امنية لبنانية يتقاطع عملها مع الموساد وسوريا وقرارها اميركياً
للحقيقة الحقيقة هو شهيد لبنان المظبوط
صح ذلك في زمن نضال شهيدنا البطل الرئيس ايلي حبيقة ومن سبقه وواكبه ولحق به على درب الشهادة
في مثل هذا اليوم، علّق شهيدنا البطل الرئيس ايلي حبيقة على أرزة ... في مثل هذا اليوم، كفّن بالأبيض والأحمر والأخضر ... في مثل هذا اليوم، رقد على رجاء قيامة لبنان

شهيدنا البطل الرئيس ايلي حبيقة ، سلام عليك وسلام على روحك وسلام على الأرض التي تحضنك وسلام يوم تبعث لتحلّق بطائر الفينيق في سماء الحرية والشهادة والحقيقة

رحمك الله شهيدنا البطل الرئيس ايلي حبيقة ، الإنسان والأب والقائد، وأعان عائلتك التي وقفت عند حدود الشهادة ...وهذه هي القمة... وفاء لك، سلام وتحية
من حق رفاق الدرب، وهم على وفرة كبيرة مقدارَ ما كان صاحب الذكرى أخّاذاً ومستقطباً وكاريسمياً، ان يعلوا في سنة غيابه العاشرة تحديدا رمزية الذكرى ملتصقة بـ"الربيع العربي"، فهو حين كان لبنان يرزح تحت جاهليته الاهلية في لغة الدمار والدماء وقبع العرب مع العالم متفرجين عليه في السبعينيات والثمانينيات، راح يصدر تلك الاحلام "المجنونة" آنذاك، احلام المواطنة أو العلمانية الحرية والانعتاق
الانعتاق العربي بصورة ملبننة خالصة اسقط عليها خصوصيات بلده وثقافته الموروثة جيلا اثر جيل
مثل هذا المفهوم يساور معظمنا اليوم، فيما الايدي على القلوب لرؤية اخطار هائلة ومحاذير واقعية في زحف بعض الظواهر المتطرفة المحمولة مع الثورات
" شهدنا في السنوات الاخيرة محاولات كثيرة للسي آي إي لحل المشاكل السياسية باستخدام القوة، وحان الوقت لاستخلاص العبر"
اسقاط الطغاة والمستبدين والديكتاتوريين وعدم احلال من يتناسلون انماطهم تحت اي عنوان او ظاهرة او تواطؤ دولي واقليمي وما شابه، حتى لو هلل العالم لتغيير كهذا
واوكد بان الشعلة التي اوقدها الوزير الراحل شهيدنا البطل الرئيس ايلي حبيقة متألقة وخالدة الى الابد، ان شهداءنا قد ضمنوا الثورة بدمائهم وينبغي اليوم العمل في ظل الجهد وبذل الهمة لجعل ثقافة الشهداء تموج في التربية والتعليم
من ثوابت الموت وتوابعه الراسخة، غربان ونعيق. يندهها عزرائيل من آخر الظلمات، فتحضر فوراً. كأنها تحمله بأجنحتها السوداء، كأنها تنهب الروح الصاعدة بصوتها المقلوب شؤماً. هذا في غابات الأرض. أما في أدغال العهر والفجور، فغربان موتنا سياسيون، ونعيقهم تصاريح متلفزة، لا يُفهم منها إلا رائحة الموت ولونه، وشهيتهم لجثاميننا موتى، كأنهم لا يكفيهم نهشنا ونحن أحياء
في الخلاصة إن قيامة لبنان من أوحاله والفخاخ ليعود وطناً للرسالة والقداسة والكرامات يكمن هو في عودة المواطن اللبناني أولاً إلى ينابيع الحرية والإيمان والصدق والحق، والرجوع دون تردد إلى مفاهيم ثقافة احترام الذات والغير وإلى التصرف على أساس أنه مخلوق حر وليس عبداً، وإلا "فالج لا تعالج
الدولة اللبنانية تعاقب الضحايا وتبرّئ القتلة
واللدغ سيتكرر وعلى كل المسيحببن أن يفهموا هذا
و لتبقَ ذكرياتنا صامدة