<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-5604605</atom:id><lastBuildDate>Fri, 18 Oct 2024 07:17:17 +0000</lastBuildDate><title>NEWS2U International NewsConnecting the Dots</title><description>&lt;b&gt;To Have Blind Faith in Bad Leaders &lt;u&gt;IS NOT PATRIOTISM or LOYALTY&lt;/u&gt;&lt;br&gt; We will continue to be used by politicians and corporations as long as we remain silent to the lies that they hide behind which allow them to stay in power&lt;br&gt;&lt;p&gt;Lately we have all become aware of a significant loss of privacy and freedom by the rogue ruling goverment spy agencies, we will continue to shine a light on the dark activities as they surface.&lt;/p&gt;&lt;/b&gt;</description><link>http://news2u.blogspot.com/</link><managingEditor>noreply@blogger.com (Unknown)</managingEditor><generator>Blogger</generator><openSearch:totalResults>1457</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5604605.post-6873632244255275753</guid><pubDate>Thu, 10 Dec 2015 12:43:00 +0000</pubDate><atom:updated>2015-12-10T07:45:36.631-05:00</atom:updated><title></title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;The Paris Attacks Are Just The Beginning&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Storm Clouds Gathering&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Dec. 9. 2015&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div class=&quot;clear-block&quot; style=&quot;background-color: white; border: 0px none; color: black; display: block; font-family: &amp;quot;Roboto Slab&amp;quot;,Times,serif; font-stretch: inherit; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 21px; margin: 0px; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; vertical-align: baseline; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
&lt;iframe allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;270&quot; src=&quot;https://www.youtube.com/embed/nc4nabFH_aY?rel=0&quot; width=&quot;460&quot;&gt;&lt;/iframe&gt;

&lt;br /&gt;
&lt;div class=&quot;fullwidth_side&quot; style=&quot;border: 0px none; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;div class=&quot;teaser_wrap element_wrap&quot; style=&quot;border-bottom: 2px solid rgb(0, 0, 0); border-width: 0px 0px 2px; font-family: &amp;quot;Roboto Slab&amp;quot;,Helvetica,Arial,Verdana,sans-serif; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: 700; line-height: 1em; margin-bottom: 30px ! important; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding: 0px 0px 10px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;It might be tempting to react to this event emotionally without looking beyond the official narrative, without examining the evidence, without questioning where this is headed. You wouldn&#39;t be alone, but blind indignation lends itself to easy answers, half truths and comforting lies.&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;clear-block&quot; style=&quot;background-color: white; border: 0px none; color: black; display: block; font-family: &amp;quot;Roboto Slab&amp;quot;,Times,serif; font-stretch: inherit; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 21px; margin: 0px; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; vertical-align: baseline; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
&lt;div class=&quot;body_wrap element_wrap clear-block&quot; style=&quot;border: 0px none; display: block; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 50px ! important; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;div style=&quot;border: 0px none; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 20px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;On the evening of November 13th 2015, Paris was shaken by a series of coordinated attacks. 129 people were killed, hundreds more wounded. An ambience of fear gripped the country. Terrorists could strike anywhere at any time. Nothing was safe. Even the smallest venue could be targeted.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px none; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 20px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;It might be tempting to react to this event emotionally without looking beyond the official narrative, without examining the evidence, without questioning where this is headed. You wouldn&#39;t be alone, but blind indignation lends itself to easy answers, half truths and comforting lies.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px none; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 20px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Any time a population is attacked (or believes that they have been attacked) by an outside force, the reaction is as predictable as it is dangerous. New wars, and totalitarian laws that would have been unthinkable days before are easily justified, voices of reason are drowned out, and entire nations can be driven towards a cliff. Given the nature of this particular cliff it would behoove you to look a little deeper this time.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px none; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 20px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;There are several moving parts in this story: the Syrian war, ISIS and the push to remove Assad from power, the expansion of a militarized police state throughout Europe, and of course the refugee crisis. All of which has been conveniently tied together, by&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.telegraph.co.uk/news/worldnews/europe/france/11997523/Paris-attacks-Syrian-refugee-passport-found-at-stadium-bomb-scene.html&quot; rel=&quot;nofollow&quot; style=&quot;border: 0px none; color: #ed4d21; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px none; padding: 0px; text-decoration: none; vertical-align: baseline;&quot;&gt;a passport, carried by a suicide bomber&lt;/a&gt;, a passport which miraculously survived the blast unscathed. (Never mind the fact that German Interior Minister Thomas de Maiziere came forward to say that he had reason to suspect that&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.smh.com.au/world/paris-attacks-syrian-passport-in-paris-may-be-planted-says-german-minister-20151117-gl1jxc.html&quot; rel=&quot;nofollow&quot; style=&quot;border: 0px none; color: #ed4d21; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px none; padding: 0px; text-decoration: none; vertical-align: baseline;&quot;&gt;the passport had been planted.&lt;/a&gt;)&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px none; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 20px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Let&#39;s deconstruct this one piece at a time.&lt;/span&gt;&lt;/div&gt;
&lt;h1 id=&quot;evidenceofforeknowledge&quot; style=&quot;border: 0px none; color: black; font-family: &amp;quot;Open Sans&amp;quot;,Helvetica,Arial,Verdana,sans-serif; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: 800; line-height: 1em; margin: 0px 0px 14px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Evidence of Foreknowledge&lt;/span&gt;&lt;/h1&gt;
&lt;div style=&quot;border: 0px none; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 20px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Without even looking beyond mainstream sources, we find evidence that the French government knew that the attacks were coming. They were&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.ibtimes.co.uk/paris-attacks-iraq-warned-france-imminent-islamic-state-assault-day-before-paris-attack-1528868&quot; rel=&quot;nofollow&quot; style=&quot;border: 0px none; color: #ed4d21; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px none; padding: 0px; text-decoration: none; vertical-align: baseline;&quot;&gt;warned by the Iraqi government&lt;/a&gt;, they were&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.independent.co.uk/news/world/europe/paris-attacks-turkey-says-it-notified-france-twice-about-attacker-says-senior-official-a6736131.html&quot; rel=&quot;nofollow&quot; style=&quot;border: 0px none; color: #ed4d21; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px none; padding: 0px; text-decoration: none; vertical-align: baseline;&quot;&gt;warned by the Turkish government twice&lt;/a&gt;, and according to&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;https://archive.is/32puC&quot; rel=&quot;nofollow&quot; style=&quot;border: 0px none; color: #ed4d21; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px none; padding: 0px; text-decoration: none; vertical-align: baseline;&quot;&gt;this article from the Times of Israel&lt;/a&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;(which as since been edited), security officials in Paris were specifically warned of an impending attack that very morning. (The same article goes on to mention that the Bataclan theater had financial ties to the Israeli Military.)&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px none; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 20px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;And of course the French government just happened to be running&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.bloomberg.com/news/articles/2015-11-17/hours-before-the-terror-attacks-paris-practiced-for-a-mass-shooting&quot; rel=&quot;nofollow&quot; style=&quot;border: 0px none; color: #ed4d21; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px none; padding: 0px; text-decoration: none; vertical-align: baseline;&quot;&gt;an exercise simulating a mass shooting in Paris&lt;/a&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;just hours before the attacks began. Where have we seen that before?&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px none; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 20px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Could someone please explain how&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://news.yahoo.com/ap-newsbreak-iraq-warned-attacks-065557894.html&quot; rel=&quot;nofollow&quot; style=&quot;border: 0px none; color: #ed4d21; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px none; padding: 0px; text-decoration: none; vertical-align: baseline;&quot;&gt;Iraq&lt;/a&gt;, and the Turkey government (which are developing countries), were able to see this coming, while the NSA and French intelligence were caught completely off guard? Are we really to believe that this was just incompetence?&lt;/span&gt;&lt;/div&gt;
&lt;h1 id=&quot;thesetup&quot; style=&quot;border: 0px none; color: black; font-family: &amp;quot;Open Sans&amp;quot;,Helvetica,Arial,Verdana,sans-serif; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: 800; line-height: 1em; margin: 0px 0px 14px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;The Setup&lt;/span&gt;&lt;/h1&gt;
&lt;div style=&quot;border: 0px none; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 20px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Before the dust had even settled, the official narrative was clear. ISIS was responsible. This was war, and France was going to escalate that war, both at home and abroad. A&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.telegraph.co.uk/news/worldnews/europe/france/11995481/French-President-declares-state-of-emergency-following-Paris-shootings.html&quot; rel=&quot;nofollow&quot; style=&quot;border: 0px none; color: #ed4d21; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px none; padding: 0px; text-decoration: none; vertical-align: baseline;&quot;&gt;state of emergency was declared&lt;/a&gt;,&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.nytimes.com/live/paris-attacks-live-updates/french-police-request-checkpoint-locations-not-be-publicized/&quot; rel=&quot;nofollow&quot; style=&quot;border: 0px none; color: #ed4d21; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px none; padding: 0px; text-decoration: none; vertical-align: baseline;&quot;&gt;road blocks&lt;/a&gt;, border controls and a curfew were imposed,&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.pri.org/stories/2015-11-30/no-marches-france-tells-climate-activists-protesters-find-ways-make-their-voices&quot; rel=&quot;nofollow&quot; style=&quot;border: 0px none; color: #ed4d21; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px none; padding: 0px; text-decoration: none; vertical-align: baseline;&quot;&gt;freedom of assembly was restricted&lt;/a&gt;, and&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.newsweek.com/paris-attacks-france-deploys-115000-soldiers-and-police-secure-country-395333&quot; rel=&quot;nofollow&quot; style=&quot;border: 0px none; color: #ed4d21; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px none; padding: 0px; text-decoration: none; vertical-align: baseline;&quot;&gt;the military was deployed on the streets.&lt;/a&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;French President Francois Hollande soon announced that he intended&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.theguardian.com/world/2015/nov/19/french-mps-vote-to-extend-state-of-emergency-after-paris-terror&quot; rel=&quot;nofollow&quot; style=&quot;border: 0px none; color: #ed4d21; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px none; padding: 0px; text-decoration: none; vertical-align: baseline;&quot;&gt;to extend the state of emergency for three months&lt;/a&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;(some are even saying&lt;a href=&quot;http://www.independent.co.uk/news/world/europe/frances-state-of-emergency-could-be-extended-indefinitely-a6758686.html&quot; rel=&quot;nofollow&quot; style=&quot;border: 0px none; color: #ed4d21; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px none; padding: 0px; text-decoration: none; vertical-align: baseline;&quot;&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;it may be extended indefinitely&lt;/a&gt;), and to alter the French constitution.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px none; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 20px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;The state of emergency gives the police the power to detain people without trial, search without warrants and to block any website they see fit.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px none; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 20px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;France&#39;s parliament has already voted to extend&amp;nbsp;the country&#39;s state of emergency following the Paris attacks for three months,&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.independent.co.uk/news/world/europe/frances-state-of-emergency-could-be-extended-indefinitely-a6758686.html&quot; rel=&quot;nofollow&quot; style=&quot;border: 0px none; color: #ed4d21; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px none; padding: 0px; text-decoration: none; vertical-align: baseline;&quot;&gt;giving the police powers to keep people in their homes without trial, search the homes of people without a warrant from a judge and block any website deemed a problem.&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px none; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 20px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;These powers are already being used!&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;https://ca.news.yahoo.com/france-puts-green-activists-under-house-arrest-ahead-135654386.html&quot; rel=&quot;nofollow&quot; style=&quot;border: 0px none; color: #ed4d21; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px none; padding: 0px; text-decoration: none; vertical-align: baseline;&quot;&gt;Activist have already been placed under house arrest&lt;/a&gt;, and not for crimes that they have been accused of actually committing, but preemptively!&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px none; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 20px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;The attacks&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.euractiv.com/sections/justice-home-affairs/verhofstadt-calls-creation-eu-intelligence-agency-319630&quot; rel=&quot;nofollow&quot; style=&quot;border: 0px none; color: #ed4d21; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px none; padding: 0px; text-decoration: none; vertical-align: baseline;&quot;&gt;are also being used as a pretext to justify the establishment of a new European Intelligence Agency&lt;/a&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;modeled after the CIA. See also&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.independent.co.uk/news/world/europe/paris-attacks-eu-ministers-consider-europe-wide-intelligence-agency-and-increased-border-security-a6742111.html&quot; rel=&quot;nofollow&quot; style=&quot;border: 0px none; color: #ed4d21; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px none; padding: 0px; text-decoration: none; vertical-align: baseline;&quot;&gt;here&lt;/a&gt;.&lt;/span&gt;&lt;/div&gt;
&lt;h1 id=&quot;whocreatedisis&quot; style=&quot;border: 0px none; color: black; font-family: &amp;quot;Open Sans&amp;quot;,Helvetica,Arial,Verdana,sans-serif; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: 800; line-height: 1em; margin: 0px 0px 14px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Who Created ISIS?&lt;/span&gt;&lt;/h1&gt;
&lt;div style=&quot;border: 0px none; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 20px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;And speaking of the CIA... let&#39;s not forget who actually created ISIS.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;iframe width=&quot;460&quot; height=&quot;270&quot; src=&quot;https://www.youtube.com/embed/oMjXbuj7BPI?rel=0&quot; frameborder=&quot;0&quot; allowfullscreen&gt;&lt;/iframe&gt;
&lt;br /&gt;
&lt;div style=&quot;background-color: white; border: 0px none; color: black; font-family: &amp;quot;Roboto Slab&amp;quot;,Times,serif; font-stretch: inherit; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 21px; margin: 0px 0px 20px; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; vertical-align: baseline; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;France didn&#39;t seem too concerned about the rise of Islamic extremism when they joined the U.S.&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;https://sg.news.yahoo.com/cia-sends-teams-libya-us-considers-rebel-aid-20110331-065759-284.html&quot; rel=&quot;nofollow&quot; style=&quot;border: 0px none; color: #ed4d21; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px none; padding: 0px; text-decoration: none; vertical-align: baseline;&quot;&gt;in the 2011 regime change operation in Libya.&lt;/a&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;If mainstream news outlets were publishing&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.telegraph.co.uk/news/worldnews/africaandindianocean/libya/8407047/Libyan-rebel-commander-admits-his-fighters-have-al-Qaeda-links.html&quot; rel=&quot;nofollow&quot; style=&quot;border: 0px none; color: #ed4d21; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px none; padding: 0px; text-decoration: none; vertical-align: baseline;&quot;&gt;evidence of jihadists among the CIA backed rebels&lt;/a&gt;, (secondary confirmation from the BBC&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.bbc.com/news/world-africa-14728565&quot; rel=&quot;nofollow&quot; style=&quot;border: 0px none; color: #ed4d21; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px none; padding: 0px; text-decoration: none; vertical-align: baseline;&quot;&gt;here&lt;/a&gt;) it would be utterly naive to think that French intelligence services didn&#39;t know.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px none; color: black; font-family: &amp;quot;Roboto Slab&amp;quot;,Times,serif; font-stretch: inherit; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 21px; margin: 0px 0px 20px; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; vertical-align: baseline; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;France also didn&#39;t seem to mind the fact that&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.nytimes.com/2012/10/15/world/middleeast/jihadists-receiving-most-arms-sent-to-syrian-rebels.html?pagewanted=all&amp;amp;_r=0&quot; rel=&quot;nofollow&quot; style=&quot;border: 0px none; color: #ed4d21; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px none; padding: 0px; text-decoration: none; vertical-align: baseline;&quot;&gt;Islamic extremists were receiving the lion&#39;s share of the weapons&lt;/a&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;that were looted from Gaddafi&#39;s armories, and&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.thetimes.co.uk/tto/news/world/middleeast/article3537770.ece&quot; rel=&quot;nofollow&quot; style=&quot;border: 0px none; color: #ed4d21; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px none; padding: 0px; text-decoration: none; vertical-align: baseline;&quot;&gt;shipped through Turkey, and into Syria&lt;/a&gt;.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px none; color: black; font-family: &amp;quot;Roboto Slab&amp;quot;,Times,serif; font-stretch: inherit; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 21px; margin: 0px 0px 20px; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; vertical-align: baseline; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;France didn&#39;t stand up or speak out for years as the U.S. government continued arming, funding and training these extremists.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px none; color: black; font-family: &amp;quot;Roboto Slab&amp;quot;,Times,serif; font-stretch: inherit; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 21px; margin: 0px 0px 20px; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; vertical-align: baseline; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;There was no righteous indignation at the atrocities they were committing.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px none; color: black; font-family: &amp;quot;Roboto Slab&amp;quot;,Times,serif; font-stretch: inherit; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 21px; margin: 0px 0px 20px; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; vertical-align: baseline; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;There were no calls for criminal proceedings after those same rebels got caught using sarin gas against thousands of civilians, and the French government has never so much as verbally condemned the&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.thedailybeast.com/articles/2014/06/14/america-s-allies-are-funding-isis.html&quot; rel=&quot;nofollow&quot; style=&quot;border: 0px none; color: #ed4d21; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px none; padding: 0px; text-decoration: none; vertical-align: baseline;&quot;&gt;numerous state actors which have been caught assisting ISIS and/or its allies logistically&lt;/a&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;(Turkey, Jordan, Qatar and Saudi Arabia &amp;amp;&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.jpost.com/Middle-East/New-UN-report-reveals-collaboration-between-Israel-and-Syrian-rebels-383926&quot; rel=&quot;nofollow&quot; style=&quot;border: 0px none; color: #ed4d21; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px none; padding: 0px; text-decoration: none; vertical-align: baseline;&quot;&gt;Israel&lt;/a&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;for example).&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px none; color: black; font-family: &amp;quot;Roboto Slab&amp;quot;,Times,serif; font-stretch: inherit; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 21px; margin: 0px 0px 20px; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; vertical-align: baseline; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Why? Because ISIS serves a purpose. ISIS and its associates, Al-Nusra and the FSA are weakening the Syrian government, creating&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;https://www.washingtonpost.com/politics/assad-must-go-obama-says/2011/08/18/gIQAelheOJ_story.html&quot; rel=&quot;nofollow&quot; style=&quot;border: 0px none; color: #ed4d21; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px none; padding: 0px; text-decoration: none; vertical-align: baseline;&quot;&gt;a pretext for military intervention&lt;/a&gt;, and providing the perfect excuse for a massive power grab on the home front.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px none; color: black; font-family: &amp;quot;Roboto Slab&amp;quot;,Times,serif; font-stretch: inherit; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 21px; margin: 0px 0px 20px; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; vertical-align: baseline; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&quot;Whoah! That&#39;s not fair to equate the FSA with ISIS!&quot;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px none; color: black; font-family: &amp;quot;Roboto Slab&amp;quot;,Times,serif; font-stretch: inherit; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 21px; margin: 0px 0px 20px; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; vertical-align: baseline; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Really? Then explain this away:&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.telegraph.co.uk/news/worldnews/al-qaeda/10925602/Al-Qaeda-merges-with-Isis-at-Syria-Iraq-border-town.html&quot; rel=&quot;nofollow&quot; style=&quot;border: 0px none; color: #ed4d21; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px none; padding: 0px; text-decoration: none; vertical-align: baseline;&quot;&gt;ISIS and Al-Nusra have officially formed alliances&lt;/a&gt;, FSA commanders&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.memritv.org/clip/en/3875.htm.Download&quot; rel=&quot;nofollow&quot; style=&quot;border: 0px none; color: #ed4d21; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px none; padding: 0px; text-decoration: none; vertical-align: baseline;&quot;&gt;have gone on record&lt;/a&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;to say that they cooperate with,&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.independent.co.uk/news/world/middle-east/i-am-not-fighting-againstalqaida-itsnot-our-problem-says-wests-last-hope-in-syria-9233424.html&quot; rel=&quot;nofollow&quot; style=&quot;border: 0px none; color: #ed4d21; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px none; padding: 0px; text-decoration: none; vertical-align: baseline;&quot;&gt;and conduct joint operations with Al-Nusra&lt;/a&gt;, and it has been well established that the&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.reuters.com/article/2012/12/07/us-syria-crisis-rebels-idUSBRE8B60QX20121207&quot; rel=&quot;nofollow&quot; style=&quot;border: 0px none; color: #ed4d21; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px none; padding: 0px; text-decoration: none; vertical-align: baseline;&quot;&gt;FSA command is dominated by Islamic extremists&lt;/a&gt;. Do The Math.&lt;/span&gt;&lt;/div&gt;
&lt;h1 id=&quot;theriseoffascismineurope&quot; style=&quot;background-color: white; border: 0px none; color: black; font-family: &amp;quot;Open Sans&amp;quot;,Helvetica,Arial,Verdana,sans-serif; font-stretch: inherit; font-style: normal; font-variant: normal; font-weight: 800; letter-spacing: normal; line-height: 1em; margin: 0px 0px 14px; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; vertical-align: baseline; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;The Rise of Fascism in Europe&lt;/span&gt;&lt;/h1&gt;
&lt;div style=&quot;background-color: white; border: 0px none; color: black; font-family: &amp;quot;Roboto Slab&amp;quot;,Times,serif; font-stretch: inherit; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 21px; margin: 0px 0px 20px; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; vertical-align: baseline; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;What&#39;s happening in France should not be viewed in isolation. Xenophobic sentiment has been on the rise throughout Europe, and&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;https://www.washingtonpost.com/world/europe/frances-far-right-reaps-political-gains-as-fears-of-terrorism-grow/2015/11/24/d01838e8-92bd-11e5-befa-99ceebcbb272_story.html&quot; rel=&quot;nofollow&quot; style=&quot;border: 0px none; color: #ed4d21; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px none; padding: 0px; text-decoration: none; vertical-align: baseline;&quot;&gt;is gaining ground politically&lt;/a&gt;. This trend has clearly been exacerbated by the ongoing migrant crisis (which is obviously tied to the regime change policies of the West) but one variable in this equation that no one is talking about is the fact that the way immigration has been handled in Europe is not merely a question of short sightedness, it is a reflection of policy.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px none; color: black; font-family: &amp;quot;Roboto Slab&amp;quot;,Times,serif; font-stretch: inherit; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 21px; margin: 0px 0px 20px; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; vertical-align: baseline; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;In 2012 UN migration chief Peter Sutherland urged the EU to&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.bbc.com/news/uk-politics-18519395&quot; rel=&quot;nofollow&quot; style=&quot;border: 0px none; color: #ed4d21; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px none; padding: 0px; text-decoration: none; vertical-align: baseline;&quot;&gt;&quot;do its best to undermine&quot; the &quot;homogeneity&quot; of its member states.&lt;/a&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;Such a proposition may sound absurd, unless you take into account that breaking down the national identity of a country makes it much easier to dissolve political boundaries and independence. And that&#39;s precisely&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.bloombergview.com/articles/2015-07-27/europe-s-growing-desire-for-political-union&quot; rel=&quot;nofollow&quot; style=&quot;border: 0px none; color: #ed4d21; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px none; padding: 0px; text-decoration: none; vertical-align: baseline;&quot;&gt;what the technocrats in Brussels want&lt;/a&gt;.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px none; color: black; font-family: &amp;quot;Roboto Slab&amp;quot;,Times,serif; font-stretch: inherit; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 21px; margin: 0px 0px 20px; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; vertical-align: baseline; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;a href=&quot;http://news.sky.com/story/1521669/francois-hollande-calls-for-eurozone-government&quot; rel=&quot;nofollow&quot; style=&quot;border: 0px none; color: #ed4d21; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px none; padding: 0px; text-decoration: none; vertical-align: baseline;&quot;&gt;Hollande has been one of the most outspoken voices&lt;/a&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;in this push to hand over more power to a centralized European government, effectively stripping member states of any meaningful sovereignty. Give that European government&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.theguardian.com/world/2015/mar/08/jean-claude-juncker-calls-for-eu-army-european-commission-miltary&quot; rel=&quot;nofollow&quot; style=&quot;border: 0px none; color: #ed4d21; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px none; padding: 0px; text-decoration: none; vertical-align: baseline;&quot;&gt;a military&lt;/a&gt;, it&#39;s own surveillance apparatus and public which is&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.bloomberg.com/news/articles/2015-12-07/nobel-laureate-sees-much-worse-eu-economy-from-refugee-crisis&quot; rel=&quot;nofollow&quot; style=&quot;border: 0px none; color: #ed4d21; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px none; padding: 0px; text-decoration: none; vertical-align: baseline;&quot;&gt;struggling financially&lt;/a&gt;, looking for someone&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.dw.com/en/europes-far-right-blames-migration-crisis-for-paris-attacks/a-18854470&quot; rel=&quot;nofollow&quot; style=&quot;border: 0px none; color: #ed4d21; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px none; padding: 0px; text-decoration: none; vertical-align: baseline;&quot;&gt;to blame&lt;/a&gt;,&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.nbcnews.com/storyline/paris-terror-attacks/french-military-enrollment-triples-after-paris-terror-attacks-n474781&quot; rel=&quot;nofollow&quot; style=&quot;border: 0px none; color: #ed4d21; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px none; padding: 0px; text-decoration: none; vertical-align: baseline;&quot;&gt;and practically begging for war&lt;/a&gt;, and you have a recipe for the rise of overt fascism in Europe.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px none; color: black; font-family: &amp;quot;Roboto Slab&amp;quot;,Times,serif; font-stretch: inherit; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 21px; margin: 0px 0px 20px; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; vertical-align: baseline; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Many have remarked that recent moves by the French president&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.reuters.com/article/us-france-shooting-presidential-analysis-idUSKCN0T62PC20151117&quot; rel=&quot;nofollow&quot; style=&quot;border: 0px none; color: #ed4d21; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px none; padding: 0px; text-decoration: none; vertical-align: baseline;&quot;&gt;take several pages from the extreme right&lt;/a&gt;. Some have interpreted this as an attempt to prevent the right from capitalizing on the event, but&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.breitbart.com/london/2015/11/30/marine-le-pen-front-national-surge-french-regional-elections/&quot; rel=&quot;nofollow&quot; style=&quot;border: 0px none; color: #ed4d21; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px none; padding: 0px; text-decoration: none; vertical-align: baseline;&quot;&gt;it hasn&#39;t worked out that way&lt;/a&gt;, at all. (&lt;a href=&quot;http://www.france24.com/en/20151123-french-far-right-popularity-attacks-paris&quot; rel=&quot;nofollow&quot; style=&quot;border: 0px none; color: #ed4d21; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px none; padding: 0px; text-decoration: none; vertical-align: baseline;&quot;&gt;See also this article&lt;/a&gt;)&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px none; color: black; font-family: &amp;quot;Roboto Slab&amp;quot;,Times,serif; font-stretch: inherit; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 21px; margin: 0px 0px 20px; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; vertical-align: baseline; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Taken on its own one might be inclined to interpret this as a political miscalculation, but what if it&#39;s not? Hollande&#39;s actions don&#39;t make much sense if we view him as an independent leader, but they make perfect sense if you understand that he&#39;s just a puppet.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px none; color: black; font-family: &amp;quot;Roboto Slab&amp;quot;,Times,serif; font-stretch: inherit; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 21px; margin: 0px 0px 20px; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; vertical-align: baseline; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;The powers seized by Holland following the Charlie Hebdo and Paris Attacks, are not suited for the political left. The left is held back by the need to maintain a soft spoken, inclusive veneer. Those rising up to replace them will not be.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px none; color: black; font-family: &amp;quot;Roboto Slab&amp;quot;,Times,serif; font-stretch: inherit; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 21px; margin: 0px 0px 20px; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; vertical-align: baseline; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;The right will not scale back these powers. They will expand them, and they will use them, even more than they are being used now.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px none; color: black; font-family: &amp;quot;Roboto Slab&amp;quot;,Times,serif; font-stretch: inherit; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 21px; margin: 0px 0px 20px; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; vertical-align: baseline; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;It&#39;s the left, right, left, right two step to tyranny.&lt;/span&gt;&lt;/div&gt;
&lt;h1 id=&quot;problemreactionsolution&quot; style=&quot;background-color: white; border: 0px none; color: black; font-family: &amp;quot;Open Sans&amp;quot;,Helvetica,Arial,Verdana,sans-serif; font-stretch: inherit; font-style: normal; font-variant: normal; font-weight: 800; letter-spacing: normal; line-height: 1em; margin: 0px 0px 14px; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; vertical-align: baseline; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Problem, Reaction, Solution&lt;/span&gt;&lt;/h1&gt;
&lt;div style=&quot;background-color: white; border: 0px none; color: black; font-family: &amp;quot;Roboto Slab&amp;quot;,Times,serif; font-stretch: inherit; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 21px; margin: 0px 0px 20px; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; vertical-align: baseline; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;This formula is not new. These tactics are not original, nor are the motives or response. Like the American public following 9/11, it&#39;s going to take the European population quite some time to realize where they are being led, and they&#39;re only going to come to that realization if those who see what is happening have the courage to speak out.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px none; color: black; font-family: &amp;quot;Roboto Slab&amp;quot;,Times,serif; font-stretch: inherit; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 21px; margin: 0px 0px 20px; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; vertical-align: baseline; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;And make no mistake, this is just the beginning. They&#39;ll take it as far as you let them.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px none; color: black; font-family: &amp;quot;Roboto Slab&amp;quot;,Times,serif; font-stretch: inherit; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 21px; margin: 0px 0px 20px; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; vertical-align: baseline; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Source:&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px none; color: black; font-family: &amp;quot;Roboto Slab&amp;quot;,Times,serif; font-stretch: inherit; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 21px; margin: 0px 0px 20px; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; vertical-align: baseline; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;a href=&quot;http://stormcloudsgathering.com/paris-attacks&quot;&gt;http://stormcloudsgathering.com/paris-attacks&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px none; color: black; font-family: &amp;quot;Roboto Slab&amp;quot;,Times,serif; font-stretch: inherit; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 21px; margin: 0px 0px 20px; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; vertical-align: baseline; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;____________ &lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
</description><link>http://news2u.blogspot.com/2015_12_01_archive.html#6873632244255275753</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://img.youtube.com/vi/nc4nabFH_aY/default.jpg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5604605.post-3440808597999492912</guid><pubDate>Wed, 26 Aug 2015 01:04:00 +0000</pubDate><atom:updated>2015-08-25T20:04:43.246-05:00</atom:updated><title>UK Digital Surveillance Is &quot;Worse Than Orwell&quot;</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;New UN Privacy Chief Proclaims we are dealing with a world even worse that anything Orwell could have foreseen.&lt;/b&gt;&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;By Michael Krieger&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;August 25, 2015&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Liberty Blitzkrieg&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #232323; font-style: normal; font-variant: normal; font-weight: 500; letter-spacing: normal; line-height: 1.4rem; margin: 0px 0px 1.25rem; padding: 0px; text-align: start; text-indent: 0px; text-rendering: optimizelegibility; text-transform: none; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;strong style=&quot;box-sizing: border-box; font-weight: bold; line-height: inherit;&quot;&gt;&lt;em style=&quot;box-sizing: border-box; font-style: italic; line-height: inherit;&quot;&gt;Cannataci says we are dealing with a world even worse that anything Orwell could have foreseen. “It’s worse,” he said. “Because if you look at CCTV alone, at least Winston was able to go out in the countryside and go under a tree and expect there wouldn’t be any screen, as it was called. Whereas today there are many parts of the English countryside where there are more cameras than George Orwell could ever have imagined. So the situation in some cases is far worse already.&lt;/em&gt;&lt;/strong&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #232323; font-style: normal; font-variant: normal; font-weight: 500; letter-spacing: normal; line-height: 1.4rem; margin: 0px 0px 1.25rem; padding: 0px; text-align: start; text-indent: 0px; text-rendering: optimizelegibility; text-transform: none; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;– UN Privacy chief,&amp;nbsp;Joseph Cannataci&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #232323; font-style: normal; font-variant: normal; font-weight: 500; letter-spacing: normal; line-height: 1.4rem; margin: 0px 0px 1.25rem; padding: 0px; text-align: start; text-indent: 0px; text-rendering: optimizelegibility; text-transform: none; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;The UN special rapporteur on privacy, Joseph Cannataci, pulls no punches when it comes to privacy. It’s hard to disagree with what he has to say.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #232323; font-style: normal; font-variant: normal; font-weight: 500; letter-spacing: normal; line-height: 1.4rem; margin: 0px 0px 1.25rem; padding: 0px; text-align: start; text-indent: 0px; text-rendering: optimizelegibility; text-transform: none; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;From&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.theguardian.com/world/2015/aug/24/we-need-geneva-convention-for-the-internet-says-new-un-privacy-chief&quot; style=&quot;background: transparent none repeat scroll 0% 0%; box-sizing: border-box; color: #3473a6; line-height: inherit; text-decoration: none;&quot;&gt;the&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;em style=&quot;box-sizing: border-box; font-style: italic; line-height: inherit;&quot;&gt;Guardian&lt;/em&gt;&lt;/a&gt;:&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;blockquote style=&quot;background-color: white; border-left: 1px solid rgb(221, 221, 221); box-sizing: border-box; color: #6f6f6f; font-style: normal; font-variant: normal; font-weight: 300; letter-spacing: normal; line-height: 20px; margin: 0px 0px 1.75rem; padding: 0.5625rem 1.25rem 0px 1.1875rem; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
&lt;div style=&quot;box-sizing: border-box; color: #232323; font-weight: 500; line-height: 1.4rem; margin: 0px 0px 1.25rem; padding: 0px; text-rendering: optimizelegibility;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;em style=&quot;box-sizing: border-box; font-style: italic; line-height: inherit;&quot;&gt;The first UN privacy chief has said the world needs a Geneva convention style law for the internet to safeguard data and combat the threat of massive clandestine digital surveillance.&lt;/em&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; color: #232323; font-weight: 500; line-height: 1.4rem; margin: 0px 0px 1.25rem; padding: 0px; text-rendering: optimizelegibility;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;strong style=&quot;box-sizing: border-box; font-weight: bold; line-height: inherit;&quot;&gt;&lt;em style=&quot;box-sizing: border-box; font-style: italic; line-height: inherit;&quot;&gt;Speaking to the Guardian weeks after his appointment as the UN special rapporteur on privacy, Joseph Cannataci described British surveillance oversight as being “a joke”, and said the situation is worse than anything George Orwell could have foreseen.&lt;/em&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; color: #232323; font-weight: 500; line-height: 1.4rem; margin: 0px 0px 1.25rem; padding: 0px; text-rendering: optimizelegibility;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span id=&quot;more-26593&quot; style=&quot;box-sizing: border-box;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; color: #232323; font-weight: 500; line-height: 1.4rem; margin: 0px 0px 1.25rem; padding: 0px; text-rendering: optimizelegibility;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;em style=&quot;box-sizing: border-box; font-style: italic; line-height: inherit;&quot;&gt;He added that he doesn’t use&amp;nbsp;&lt;a class=&quot; u-underline&quot; data-component=&quot;auto-linked-tag&quot; data-link-name=&quot;auto-linked-tag&quot; href=&quot;http://www.theguardian.com/technology/facebook&quot; style=&quot;background: transparent none repeat scroll 0% 0%; box-sizing: border-box; color: #3473a6; line-height: inherit; text-decoration: none;&quot;&gt;Facebook&lt;/a&gt;&amp;nbsp;or Twitter, and said it was regrettable that vast numbers of people sign away their digital rights without thinking about it.&lt;/em&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; color: #232323; font-weight: 500; line-height: 1.4rem; margin: 0px 0px 1.25rem; padding: 0px; text-rendering: optimizelegibility;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;em style=&quot;box-sizing: border-box; font-style: italic; line-height: inherit;&quot;&gt;One thing that is certainly going to come up in my mandate is the business model that large corporations are using&lt;/em&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; color: #232323; font-weight: 500; line-height: 1.4rem; margin: 0px 0px 1.25rem; padding: 0px; text-rendering: optimizelegibility;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;em style=&quot;box-sizing: border-box; font-style: italic; line-height: inherit;&quot;&gt;“Some people were complaining because they couldn’t find me on Facebook. They couldn’t find me on&amp;nbsp;&lt;a class=&quot; u-underline&quot; data-component=&quot;auto-linked-tag&quot; data-link-name=&quot;auto-linked-tag&quot; href=&quot;http://www.theguardian.com/technology/twitter&quot; style=&quot;background: transparent none repeat scroll 0% 0%; box-sizing: border-box; color: #3473a6; line-height: inherit; text-decoration: none;&quot;&gt;Twitter&lt;/a&gt;. But since I believe in privacy, I’ve never felt the need for it,” Cannataci, a professor of technology law at University of Groningen in the Netherlands and head of the department of Information Policy &amp;amp; Governance at the University of Malta, said.&lt;/em&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; color: #232323; font-weight: 500; line-height: 1.4rem; margin: 0px 0px 1.25rem; padding: 0px; text-rendering: optimizelegibility;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;em style=&quot;box-sizing: border-box; font-style: italic; line-height: inherit;&quot;&gt;Appointed after concern about surveillance and privacy following&amp;nbsp;&lt;a class=&quot; u-underline&quot; data-component=&quot;in-body-link&quot; data-link-name=&quot;in body link&quot; href=&quot;http://www.theguardian.com/us-news/edward-snowden&quot; style=&quot;background: transparent none repeat scroll 0% 0%; box-sizing: border-box; color: #3473a6; line-height: inherit; text-decoration: none;&quot;&gt;the Edward Snowden revelations&lt;/a&gt;, Cannataci agreed that his notion of a new universal law on surveillance could embarrass those who may not sign up to it. “Some people may not want to buy into it,” he acknowledged. “But you know, if one takes the attitude that some countries will not play ball, then, for example, the chemical weapons agreement would never have come about.”&amp;nbsp;&lt;/em&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; color: #232323; font-weight: 500; line-height: 1.4rem; margin: 0px 0px 1.25rem; padding: 0px; text-rendering: optimizelegibility;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;em style=&quot;box-sizing: border-box; font-style: italic; line-height: inherit;&quot;&gt;&lt;a class=&quot; u-underline&quot; data-component=&quot;in-body-link&quot; data-link-name=&quot;in body link&quot; href=&quot;http://www.theguardian.com/world/2015/jul/04/estonian-blocked-as-uns-first-digital-privacy-investigator&quot; style=&quot;background: transparent none repeat scroll 0% 0%; box-sizing: border-box; color: #3473a6; line-height: inherit; text-decoration: none;&quot;&gt;Cannataci came into his new post in July after a controversial spat&lt;/a&gt;&amp;nbsp;involving the first-choice candidate, Katrin Nyman-Metcalf, who the Germans in particular thought might not be tough enough on the Americans.&lt;/em&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; color: #232323; font-weight: 500; line-height: 1.4rem; margin: 0px 0px 1.25rem; padding: 0px; text-rendering: optimizelegibility;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;em style=&quot;box-sizing: border-box; font-style: italic; line-height: inherit;&quot;&gt;&lt;strong style=&quot;box-sizing: border-box; font-weight: bold; line-height: inherit;&quot;&gt;But for Cannataci – well-known for having a mind of his own – it is not America but Britain that he singles out as having the weakest oversight in the western world: “&lt;/strong&gt;That is precisely one of the problems we have to tackle. That if your oversight mechanism’s a joke, and a rather bad joke at its citizens’ expense, for how long can you laugh it off as a joke?”&lt;/em&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; color: #232323; font-weight: 500; line-height: 1.4rem; margin: 0px 0px 1.25rem; padding: 0px; text-rendering: optimizelegibility;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;em style=&quot;box-sizing: border-box; font-style: italic; line-height: inherit;&quot;&gt;However, Cannataci says we are dealing with a world even worse that anything Orwell could have foreseen. “It’s worse,” he said. “Because if you look at CCTV alone, at least Winston [Winston Smith in Orwell’s novel 1984] was able to go out in the countryside and go under a tree and expect there wouldn’t be any screen, as it was called. Whereas today there are many parts of the English countryside where there are more cameras than George Orwell could ever have imagined. So the situation in some cases is far worse already.&lt;/em&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; color: #232323; font-weight: 500; line-height: 1.4rem; margin: 0px 0px 1.25rem; padding: 0px; text-rendering: optimizelegibility;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;em style=&quot;box-sizing: border-box; font-style: italic; line-height: inherit;&quot;&gt;“The way we handle it is going to be the difference. But Orwell foresaw a technology that was controlling. In our case we are looking at a technology that is ever-developing, and ever-developing possibly more sinister capabilities.” Because of this, the Snowden revelations were very important, he said.&lt;/em&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; color: #232323; font-weight: 500; line-height: 1.4rem; margin: 0px 0px 1.25rem; padding: 0px; text-rendering: optimizelegibility;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;em style=&quot;box-sizing: border-box; font-style: italic; line-height: inherit;&quot;&gt;“We have a number of corporations that have set up a business model that is bringing in hundreds of thousands of millions of euros and dollars every year and they didn’t ask anybody’s permission. T&lt;strong style=&quot;box-sizing: border-box; font-weight: bold; line-height: inherit;&quot;&gt;hey didn’t go out and say: ‘Oh, we’d like to have a licensing law.’ No, they just went out and created a model where people’s data has become the new currency. And unfortunately, the vast bulk of people sign their rights away without knowing or thinking too much about it,”&lt;/strong&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;he said.&amp;nbsp;&lt;/em&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/blockquote&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #232323; font-style: normal; font-variant: normal; font-weight: 500; letter-spacing: normal; line-height: 1.4rem; margin: 0px 0px 1.25rem; padding: 0px; text-align: start; text-indent: 0px; text-rendering: optimizelegibility; text-transform: none; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Now that we’ve got that out of the way…&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #232323; font-style: normal; font-variant: normal; font-weight: 500; letter-spacing: normal; line-height: 1.4rem; margin: 0px 0px 1.25rem; padding: 0px; text-align: start; text-indent: 0px; text-rendering: optimizelegibility; text-transform: none; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Yes, the UK is particularly bad when it comes to privacy, as has been noted on many occasions. See:&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #232323; font-style: normal; font-variant: normal; letter-spacing: normal; line-height: 1.4rem; margin: 0px 0px 1.25rem; padding: 0px; text-align: start; text-indent: 0px; text-rendering: optimizelegibility; text-transform: none; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;box-sizing: border-box; line-height: inherit;&quot;&gt;&lt;a href=&quot;http://libertyblitzkrieg.com/2015/07/10/top-computer-security-expert-warns-david-camerons-plan-to-ban-encryption-would-destroy-the-internet/&quot; rel=&quot;bookmark&quot; style=&quot;background: transparent none repeat scroll 0% 0%; box-sizing: border-box; color: #3473a6; line-height: inherit; text-decoration: none;&quot; title=&quot;Permanent Link to Top Computer Security Expert Warns – David Cameron’s Plan to Ban Encryption Would “Destroy the Internet”&quot;&gt;Top Computer Security Expert Warns – David Cameron’s Plan to Ban Encryption Would “Destroy the Internet”&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #232323; font-style: normal; font-variant: normal; letter-spacing: normal; line-height: 1.4rem; margin: 0px 0px 1.25rem; padding: 0px; text-align: start; text-indent: 0px; text-rendering: optimizelegibility; text-transform: none; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;box-sizing: border-box; line-height: inherit;&quot;&gt;&lt;a href=&quot;http://libertyblitzkrieg.com/2015/05/14/uk-prime-minister-david-cameron-proclaims-its-not-enough-to-follow-the-law-you-must-love-big-brother/&quot; rel=&quot;bookmark&quot; style=&quot;background: transparent none repeat scroll 0% 0%; box-sizing: border-box; color: #3473a6; line-height: inherit; text-decoration: none;&quot; title=&quot;Permanent Link to The Mindset of UK Prime Minister David Cameron – It’s Not Enough to Follow the Law, You Must Love Big Brother&quot;&gt;The Mindset of UK Prime Minister David Cameron – It’s Not Enough to Follow the Law, You Must Love Big Brother&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #232323; font-style: normal; font-variant: normal; letter-spacing: normal; line-height: 1.4rem; margin: 0px 0px 1.25rem; padding: 0px; text-align: start; text-indent: 0px; text-rendering: optimizelegibility; text-transform: none; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;box-sizing: border-box; line-height: inherit;&quot;&gt;&lt;a href=&quot;http://libertyblitzkrieg.com/2015/01/12/britains-war-on-terror-insanity-continues-david-cameron-declares-war-on-encryption/&quot; rel=&quot;bookmark&quot; style=&quot;background: transparent none repeat scroll 0% 0%; box-sizing: border-box; color: #3473a6; line-height: inherit; text-decoration: none;&quot; title=&quot;Permanent Link to Britain’s “War on Terror” Insanity Continues – David Cameron Declares War on Encryption&quot;&gt;Britain’s “War on Terror” Insanity Continues – David Cameron Declares War on Encryption&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #232323; font-style: normal; font-variant: normal; letter-spacing: normal; line-height: 1.4rem; margin: 0px 0px 1.25rem; padding: 0px; text-align: start; text-indent: 0px; text-rendering: optimizelegibility; text-transform: none; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;box-sizing: border-box; line-height: inherit;&quot;&gt;&lt;a href=&quot;http://libertyblitzkrieg.com/2015/08/11/minority-report-esque-big-brother-billboards-are-coming-to-england/&quot; rel=&quot;bookmark&quot; style=&quot;background: transparent none repeat scroll 0% 0%; box-sizing: border-box; color: #3473a6; line-height: inherit; text-decoration: none;&quot; title=&quot;Permanent Link to “Minority Report”-esque Big Brother Billboards are Coming to England&quot;&gt;“Minority Report”-esque Big Brother Billboards are Coming to England&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #232323; font-style: normal; font-variant: normal; letter-spacing: normal; line-height: 1.4rem; margin: 0px 0px 1.25rem; padding: 0px; text-align: start; text-indent: 0px; text-rendering: optimizelegibility; text-transform: none; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;box-sizing: border-box; line-height: inherit;&quot;&gt;&lt;a href=&quot;http://libertyblitzkrieg.com/2015/01/19/press-rebellion-in-the-uk-british-media-launches-protest-against-spying-as-gchq-places-investigative-journalism-in-same-category-as-terrorism/&quot; rel=&quot;bookmark&quot; style=&quot;background: transparent none repeat scroll 0% 0%; box-sizing: border-box; color: #3473a6; line-height: inherit; text-decoration: none;&quot; title=&quot;Permanent Link to Press Rebellion in the UK – British Media Launches Protest Against Spying, as GCHQ Places Investigative Journalism in Same Category as Terrorism&quot;&gt;Press Rebellion in the UK – British Media Launches Protest Against Spying, as GCHQ Places Investigative Journalism in Same Category as Terrorism&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #232323; font-style: normal; font-variant: normal; font-weight: 500; letter-spacing: normal; line-height: 1.4rem; margin: 0px 0px 1.25rem; padding: 0px; text-align: start; text-indent: 0px; text-rendering: optimizelegibility; text-transform: none; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;In Liberty,&lt;br style=&quot;box-sizing: border-box;&quot; /&gt;Michael Krieger&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #232323; display: inline-block; font-style: normal; font-variant: normal; font-weight: 300; letter-spacing: normal; line-height: 20px; margin: 0px; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Source:&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #232323; display: inline-block; font-style: normal; font-variant: normal; font-weight: 300; letter-spacing: normal; line-height: 20px; margin: 0px; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;a href=&quot;http://libertyblitzkrieg.com/2015/08/25/new-un-privacy-chief-proclaims-uk-digital-surveillance-is-worse-than-orwell/&quot;&gt;http://libertyblitzkrieg.com/2015/08/25/new-un-privacy-chief-proclaims-uk-digital-surveillance-is-worse-than-orwell/&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; background-color: white; box-sizing: border-box; color: #232323; display: inline-block; font-family: Merriweather; font-size: 13px; font-style: normal; font-variant: normal; font-weight: 300; letter-spacing: normal; line-height: 20px; margin: 0px; orphans: auto; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;_________________&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; background-color: white; box-sizing: border-box; color: #232323; display: inline-block; font-family: Merriweather; font-size: 13px; font-style: normal; font-variant: normal; font-weight: 300; letter-spacing: normal; line-height: 20px; margin: 0px; orphans: auto; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</description><link>http://news2u.blogspot.com/2015_08_01_archive.html#3440808597999492912</link><author>noreply@blogger.com (Unknown)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5604605.post-156822738236871749</guid><pubDate>Sun, 16 Aug 2015 15:30:00 +0000</pubDate><atom:updated>2015-08-16T10:33:39.946-05:00</atom:updated><title>Backdoors Won&#39;t Solve Comey&#39;s Going Dark Problem</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;CRYPTO-GRAM&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;August 15, 2015&lt;br /&gt;by Bruce Schneier&lt;br /&gt;CTO, Resilient Systems, Inc.&lt;br /&gt;schneier@schneier.com&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;background-color: white; border: 0px none; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 21px; margin: 0px 0px 1em; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;At the Aspen Security Forum two weeks ago, James Comey (and others) explicitly talked about the &quot;going dark&quot; problem, describing the specific scenario they are concerned about. Maybe others have heard the scenario before, but it was a first for me. It centers around ISIL operatives abroad and ISIL-inspired terrorists here in the US.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;The FBI knows who the Americans are, can get a court order to carry out surveillance on their communications, but cannot eavesdrop on the conversations, because they are encrypted. They can get the metadata, so they know who is talking to who, but they can&#39;t find out what&#39;s being said.&lt;/span&gt;&lt;/div&gt;
&lt;blockquote style=&quot;background-color: white; border: 0px none; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 21px; margin: 0px 0px 1em 15px; padding: 0px 40px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;i&gt;&quot;ISIL&#39;s M.O. is to broadcast on Twitter, get people to follow them, then move them to Twitter Direct Messaging&quot; to evaluate if they are a legitimate recruit, he said. &quot;Then they&#39;ll move them to an encrypted mobile-messaging app so they go dark to us.&lt;/i&gt;&quot;&lt;/span&gt;&lt;/blockquote&gt;
&lt;blockquote style=&quot;background-color: white; border: 0px none; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 21px; margin: 0px 0px 1em 15px; padding: 0px 40px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
&lt;/blockquote&gt;
&lt;blockquote style=&quot;background-color: white; border: 0px none; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 21px; margin: 0px 0px 1em 15px; padding: 0px 40px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;The FBI can get court-approved access to Twitter exchanges, but not to encrypted communication, Comey said. Even when the FBI demonstrates probable cause and gets a judicial order to intercept that communication, it cannot break the encryption for technological reasons, according to Comey.&lt;/span&gt;&lt;/blockquote&gt;
&lt;div style=&quot;background-color: white; border: 0px none; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 21px; margin: 0px 0px 1em; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;b&gt;If this is what Comey and the FBI are actually concerned about, they&#39;re getting bad advice -- because their proposed solution won&#39;t solve the problem.&lt;/b&gt;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px none; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 21px; margin: 0px 0px 1em; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;Comey wants communications companies to give them the capability to eavesdrop on conversations without the conversants&#39; knowledge or consent; that&#39;s the &quot;backdoor&quot; we&#39;re all talking about. But the problem isn&#39;t that most encrypted communications platforms are securely encrypted, or even that some are -- the problem is that there exists at least one securely encrypted communications platform on the planet that ISIL can use.&lt;/span&gt;&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px none; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 21px; margin: 0px 0px 1em; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;Imagine that Comey got what he wanted. Imagine that iMessage and Facebook and Skype and everything else US-made had his backdoor. The ISIL operative would tell his potential recruit to use something else, something secure and non-US-made. Maybe an encryption program from Finland, or Switzerland, or Brazil. Maybe Mujahedeen Secrets. Maybe anything. (Sure, some of these will have flaws, and they&#39;ll be identifiable by their metadata, but the FBI already has the metadata, and the better software will rise to the top.)&lt;/span&gt;&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px none; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 21px; margin: 0px 0px 1em; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;As long as there is *something* that the ISIL operative can move them to, some software that the American can download and install on their phone or computer, or hardware that they can buy from abroad, the FBI still won&#39;t be able to eavesdrop.&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px none; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 21px; margin: 0px 0px 1em; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;And by pushing these ISIL operatives to non-US platforms, they lose access to the metadata they otherwise have.&lt;/span&gt;&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px none; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 21px; margin: 0px 0px 1em; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;Convincing US companies to install backdoors isn&#39;t enough; in order to solve this going dark problem, the FBI has to ensure that an American can only use backdoored software. And the only way to do that is to prohibit the use of non-backdoored software, which is the sort of thing that the UK&#39;s David Cameron said he wanted for his country in January:&lt;/span&gt;&lt;/div&gt;
&lt;blockquote style=&quot;background-color: white; border: 0px none; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 21px; margin: 0px 0px 1em 15px; padding: 0px 40px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;But the question is are we going to allow a means of communications which it simply isn&#39;t possible to read. My answer to that question is: no, we must not.&lt;/span&gt;&lt;/blockquote&gt;
&lt;div style=&quot;background-color: white; border: 0px none; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 21px; margin: 0px 0px 1em; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;And that, of course, is impossible. Jonathan Zittrain explained why. And Cory Doctorow outlined what trying would entail:&lt;/span&gt;&lt;/div&gt;
&lt;blockquote style=&quot;background-color: white; border: 0px none; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 21px; margin: 0px 0px 1em 15px; padding: 0px 40px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;For David Cameron&#39;s proposal to work, he will need to stop Britons from installing software that comes from software creators who are out of his jurisdiction. The very best in secure communications are already free/open source projects, maintained by thousands of independent programmers around the world. They are widely available, and thanks to things like cryptographic signing, it is possible to download these packages from any server in the world (not just big ones like Github) and verify, with a very high degree of confidence, that the software you&#39;ve downloaded hasn&#39;t been tampered with.&lt;/span&gt;&lt;/i&gt;&lt;/blockquote&gt;
&amp;nbsp;&lt;b&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;This, then, is what David Cameron is proposing:&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;blockquote style=&quot;background-color: white; border: 0px none; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 21px; margin: 0px 0px 1em 15px; padding: 0px 40px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;* All Britons&#39; communications must be easy for criminals, voyeurs and foreign spies to intercept.&lt;/span&gt;&lt;/i&gt;&lt;/blockquote&gt;
&lt;blockquote style=&quot;background-color: white; border: 0px none; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 21px; margin: 0px 0px 1em 15px; padding: 0px 40px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;* Any firms within reach of the UK government must be banned from producing secure software.&lt;/span&gt;&lt;/i&gt;&lt;/blockquote&gt;
&lt;blockquote style=&quot;background-color: white; border: 0px none; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 21px; margin: 0px 0px 1em 15px; padding: 0px 40px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;* All major code repositories, such as Github and Sourceforge, must be blocked.&lt;/span&gt;&lt;/i&gt;&lt;/blockquote&gt;
&lt;blockquote style=&quot;background-color: white; border: 0px none; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 21px; margin: 0px 0px 1em 15px; padding: 0px 40px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;* Search engines must not answer queries about web-pages that carry secure software.&lt;/span&gt;&lt;/i&gt;&lt;/blockquote&gt;
&lt;blockquote style=&quot;background-color: white; border: 0px none; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 21px; margin: 0px 0px 1em 15px; padding: 0px 40px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;* Virtually all academic security work in the UK must cease -- security research must only take place in proprietary research environments where there is no onus to publish one&#39;s findings, such as industry R&amp;amp;D and the security services.&lt;/span&gt;&lt;/i&gt;&lt;/blockquote&gt;
&lt;blockquote style=&quot;background-color: white; border: 0px none; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 21px; margin: 0px 0px 1em 15px; padding: 0px 40px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;* All packets in and out of the country, and within the country, must be subject to Chinese-style deep-packet inspection and any packets that appear to originate from secure software must be dropped.&lt;/span&gt;&lt;/i&gt;&lt;/blockquote&gt;
&lt;blockquote style=&quot;background-color: white; border: 0px none; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 21px; margin: 0px 0px 1em 15px; padding: 0px 40px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;* Existing walled gardens (like IOs and games consoles) must be ordered to ban their users from installing secure software.&lt;/span&gt;&lt;/i&gt;&lt;/blockquote&gt;
&lt;blockquote style=&quot;background-color: white; border: 0px none; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 21px; margin: 0px 0px 1em 15px; padding: 0px 40px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;* Anyone visiting the country from abroad must have their smartphones held at the border until they leave.&lt;/span&gt;&lt;/i&gt;&lt;/blockquote&gt;
&lt;blockquote style=&quot;background-color: white; border: 0px none; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 21px; margin: 0px 0px 1em 15px; padding: 0px 40px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;* Proprietary operating system vendors (Microsoft and Apple) must be ordered to redesign their operating systems as walled gardens that only allow users to run software from an app store, which will not sell or give secure software to Britons.&lt;/span&gt;&lt;/i&gt;&lt;/blockquote&gt;
&lt;blockquote style=&quot;background-color: white; border: 0px none; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 21px; margin: 0px 0px 1em 15px; padding: 0px 40px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;* Free/open source operating systems -- that power the energy, banking, ecommerce, and infrastructure sectors -- must be banned outright.&lt;/span&gt;&lt;/i&gt;&lt;/blockquote&gt;
&lt;div style=&quot;background-color: white; border: 0px none; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 21px; margin: 0px 0px 1em; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;As extreme as it reads, without all of that, the ISIL operative would be able to communicate securely with his potential American recruit. And all of this is not going to happen.&lt;/span&gt;&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px none; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 21px; margin: 0px 0px 1em; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;Last week, former NSA director Mike McConnell, former DHS secretary Michael Chertoff, and former deputy defense secretary William Lynn published a Washington Post op-ed opposing backdoors in encryption software.&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;They wrote:&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;blockquote style=&quot;background-color: white; border: 0px none; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 21px; margin: 0px 0px 1em 15px; padding: 0px 40px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;Today, with almost everyone carrying a networked device on his or her person, ubiquitous encryption provides essential security. If law enforcement and intelligence organizations face a future without assured access to encrypted communications, they will develop technologies and techniques to meet their legitimate mission goals.&lt;/span&gt;&lt;/i&gt;&lt;/blockquote&gt;
&lt;div style=&quot;background-color: white; border: 0px none; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 21px; margin: 0px 0px 1em; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;I believe this is true. Already one is being talked about in the academic literature: lawful hacking.&lt;/span&gt;&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px none; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 21px; margin: 0px 0px 1em; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;Perhaps the FBI&#39;s reluctance to accept this is based on their belief that all encryption software comes from the US, and therefore is under their influence.&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px none; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 21px; margin: 0px 0px 1em; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;Back in the 1990s, during the first Crypto Wars, the US government had a similar belief. To convince them otherwise, George Washington University surveyed the cryptography market in 1999 and found that there were over 500 companies in 70 countries manufacturing or distributing non-US cryptography products. Maybe we need a similar study today.&lt;/span&gt;&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px none; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 21px; margin: 0px 0px 1em; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;This essay previously appeared on Lawfare.&lt;br /&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;a href=&quot;http://www.lawfareblog.com/back-doors-wont-solve-comeys-going-dark-problem&quot; style=&quot;border: 0px none; margin: 0px; outline: medium none; padding: 0px; text-decoration: underline;&quot;&gt;http://www.lawfareblog.com/...&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px none; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 21px; margin: 0px 0px 1em; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;Aspen Security Forum:&lt;br /&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;a href=&quot;http://www.aspeninstitute.org/events/2015/07/22/aspen-security-forum-2015&quot; style=&quot;border: 0px none; margin: 0px; outline: medium none; padding: 0px; text-decoration: underline;&quot;&gt;http://www.aspeninstitute.org/events/2015/07/22/...&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px none; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 21px; margin: 0px 0px 1em; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;Comey&#39;s remarks at the forum:&lt;br /&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;a href=&quot;https://www.youtube.com/watch?v=7RyVXLKO0DM&quot; style=&quot;border: 0px none; margin: 0px; outline: medium none; padding: 0px; text-decoration: underline;&quot;&gt;https://www.youtube.com/watch?v=7RyVXLKO0DM&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;http://www.aspentimes.com/news/17381873-113/fbi-director-reveals-hidden-threat-of-isis-at&quot; style=&quot;border: 0px none; margin: 0px; outline: medium none; padding: 0px; text-decoration: underline;&quot;&gt;http://www.aspentimes.com/news/17381873-113/...&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px none; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 21px; margin: 0px 0px 1em; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;Mujahedeen Secrets:&lt;br /&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;a href=&quot;https://en.wikipedia.org/wiki/Mujahedeen_Secrets&quot; style=&quot;border: 0px none; margin: 0px; outline: medium none; padding: 0px; text-decoration: underline;&quot;&gt;https://en.wikipedia.org/wiki/Mujahedeen_Secrets&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px none; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 21px; margin: 0px 0px 1em; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;Identifying encryption programs from the metadata:&lt;br /&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;a href=&quot;https://www.schneier.com/blog/archives/2015/07/more_about_the_.html&quot; style=&quot;border: 0px none; margin: 0px; outline: medium none; padding: 0px; text-decoration: underline;&quot;&gt;https://www.schneier.com/blog/archives/2015/07/...&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px none; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 21px; margin: 0px 0px 1em; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;What Cameron wants:&lt;br /&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;a href=&quot;http://www.theguardian.com/uk-news/2015/jan/12/uk-spy-agencies-need-more-powers-says-cameron-paris-attacks&quot; style=&quot;border: 0px none; margin: 0px; outline: medium none; padding: 0px; text-decoration: underline;&quot;&gt;http://www.theguardian.com/uk-news/2015/jan/12/...&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px none; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 21px; margin: 0px 0px 1em; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;Zittrain&#39;s rebuttal:&lt;br /&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;a href=&quot;https://medium.com/message/dear-prime-minister-cameron-20th-century-solutions-wont-help-21st-century-surveillance-ff2d7a3d300c&quot; style=&quot;border: 0px none; margin: 0px; outline: medium none; padding: 0px; text-decoration: underline;&quot;&gt;https://medium.com/message/...&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px none; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 21px; margin: 0px 0px 1em; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;Doctorow&#39;s explanation:&lt;br /&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;a href=&quot;http://boingboing.net/2015/01/13/what-david-cameron-just-propos.html&quot; style=&quot;border: 0px none; margin: 0px; outline: medium none; padding: 0px; text-decoration: underline;&quot;&gt;http://boingboing.net/2015/01/13/...&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px none; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 21px; margin: 0px 0px 1em; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;Washington Post op-ed:&lt;br /&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;a href=&quot;https://www.washingtonpost.com/opinions/the-need-for-ubiquitous-data-encryption/2015/07/28/3d145952-324e-11e5-8353-1215475949f4_story.html&quot; style=&quot;border: 0px none; margin: 0px; outline: medium none; padding: 0px; text-decoration: underline;&quot;&gt;https://www.washingtonpost.com/opinions/...&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px none; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 21px; margin: 0px 0px 1em; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;Lawful hacking:&lt;br /&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;a href=&quot;http://scholarlycommons.law.northwestern.edu/cgi/viewcontent.cgi?article=1209&amp;amp;context=njtip&quot; style=&quot;border: 0px none; margin: 0px; outline: medium none; padding: 0px; text-decoration: underline;&quot;&gt;http://scholarlycommons.law.northwestern.edu/cgi/...&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px none; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 21px; margin: 0px 0px 1em; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;The First Crypto Wars:&lt;br /&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;a href=&quot;http://www.newamerica.org/oti/doomed-to-repeat-history-lessons-from-the-crypto-wars-of-the-1990s/&quot; style=&quot;border: 0px none; margin: 0px; outline: medium none; padding: 0px; text-decoration: underline;&quot;&gt;http://www.newamerica.org/oti/...&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px none; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 21px; margin: 0px 0px 1em; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;George Washington University survey from 1999:&lt;br /&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;a href=&quot;http://cryptome.org/cpi-survey.htm&quot; style=&quot;border: 0px none; margin: 0px; outline: medium none; padding: 0px; text-decoration: underline;&quot;&gt;http://cryptome.org/cpi-survey.htm&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px none; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 21px; margin: 0px 0px 1em; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;Source:&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px none; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 21px; margin: 0px 0px 1em; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;a href=&quot;https://www.schneier.com/crypto-gram/archives/2015/0815.html#1&quot;&gt;https://www.schneier.com/crypto-gram/archives/2015/0815.html#1&lt;/a&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px none; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 21px; margin: 0px 0px 1em; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;___________&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</description><link>http://news2u.blogspot.com/2015_08_01_archive.html#156822738236871749</link><author>noreply@blogger.com (Unknown)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5604605.post-7370879752858288548</guid><pubDate>Sat, 01 Aug 2015 20:30:00 +0000</pubDate><atom:updated>2015-08-01T15:30:45.224-05:00</atom:updated><title>The TPP - What You&#39;re Not Being Told</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;clear-block&quot; style=&quot;border: 0px none; display: block; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;div class=&quot;fullwidth_side&quot; style=&quot;border: 0px none; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;div class=&quot;teaser_wrap element_wrap&quot; style=&quot;border-bottom-color: rgb(0, 0, 0); border-bottom-style: solid; border-width: 0px 0px 2px; font-family: &#39;Roboto Slab&#39;, Helvetica, Arial, Verdana, sans-serif; font-size: 32px; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: 700; line-height: 1em; margin-bottom: 30px !important; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding: 0px 0px 10px; vertical-align: baseline;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;There&#39;s a reason this is being hidden from the public.&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;clear-block&quot; style=&quot;border: 0px; display: block; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;div class=&quot;body_wrap element_wrap clear-block&quot; style=&quot;border: 0px; display: block; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 30px !important; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; background-color: white; border: 0px; color: black; font-family: &#39;Roboto Slab&#39;, Times, serif; font-size: 20px; font-stretch: inherit; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 21px; margin: 0px 0px 20px; orphans: auto; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; vertical-align: baseline; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
Storm Clouds Gathering&amp;nbsp;&amp;nbsp; June 11. 2015&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;iframe allowfullscreen=&quot;&quot; class=&quot;YOUTUBE-iframe-video&quot; data-thumbnail-src=&quot;https://i.ytimg.com/vi/KnyPsKw_gak/0.jpg&quot; frameborder=&quot;0&quot; height=&quot;266&quot; src=&quot;https://www.youtube.com/embed/KnyPsKw_gak?feature=player_embedded&quot; width=&quot;420&quot;&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; background-color: white; border: 0px; color: black; font-family: &#39;Roboto Slab&#39;, Times, serif; font-size: 20px; font-stretch: inherit; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 21px; margin: 0px 0px 20px; orphans: auto; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; vertical-align: baseline; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; background-color: white; border: 0px; color: black; font-family: &#39;Roboto Slab&#39;, Times, serif; font-size: 20px; font-stretch: inherit; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 21px; margin: 0px 0px 20px; orphans: auto; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; vertical-align: baseline; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
&lt;br /&gt;
What is the TPP? The average person has never heard of it, and most of those who have couldn&#39;t tell you what it is. That&#39;s no accident.&lt;br /&gt;
&lt;/div&gt;
&lt;div class=&quot;pro_float&quot; style=&quot;-webkit-text-stroke-width: 0px; background-color: white; border: 0px; color: black; font-family: &#39;Roboto Slab&#39;, Times, serif; font-size: 20px; font-stretch: inherit; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 21px; margin: 0px; orphans: auto; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; vertical-align: baseline; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
&lt;div class=&quot;in_content_item float_right&quot; style=&quot;border: 0px; float: right; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 20px 20px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span class=&quot;pro_loader&quot; style=&quot;border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; background-color: white; border: 0px; color: black; font-family: &#39;Roboto Slab&#39;, Times, serif; font-size: 20px; font-stretch: inherit; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 21px; margin: 0px 0px 20px; orphans: auto; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; vertical-align: baseline; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
The TPP, or the Trans-Pacific Partnership, is a trade deal that has been negotiated in secret for years now. The deal encompasses the United States, Australia, Brunei, Canada, Chile, Japan, Malaysia, Mexico, New Zealand, Peru, Singapore, and Vietnam. A lot of people are going to be affected by this, but for some reason&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.politico.com/story/2015/05/secrecy-eroding-support-for-trade-pact-critics-say-117581.html&quot; rel=&quot;nofollow&quot; style=&quot;border: 0px; color: #ed4d21; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; text-decoration: none; vertical-align: baseline;&quot;&gt;the public is not allowed to see what&#39;s in it&lt;/a&gt;. In fact many of the lawmakers which are about to vote on this deal haven&#39;t even read it themselves. Those who have, are forbidden to expose what it contains. If that strikes you as fishy, you&#39;re not alone.&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; background-color: white; border: 0px; color: black; font-family: &#39;Roboto Slab&#39;, Times, serif; font-size: 20px; font-stretch: inherit; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 21px; margin: 0px 0px 20px; orphans: auto; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; vertical-align: baseline; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
&lt;a href=&quot;http://citizen.typepad.com/eyesontrade/2013/06/for-once-we-have-some-good-news-after-years-of-calling-for-release-of-the-secretive-draft-text-of-the-trans-pacific-partner.html&quot;&gt;http://citizen.typepad.com/eyesontrade/2013/06/for-once-we-have-some-good-news-after-years-of-calling-for-release-of-the-secretive-draft-text-of-the-trans-pacific-partner.html&lt;/a&gt;&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; background-color: white; border: 0px; color: black; font-family: &#39;Roboto Slab&#39;, Times, serif; font-size: 20px; font-stretch: inherit; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 21px; margin: 0px 0px 20px; orphans: auto; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; vertical-align: baseline; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
We the people don&#39;t get a word to say about the TPP, but multinational corporations do. There are 600 corporate representatives participating in these closed door negotiations.&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.theguardian.com/business/2015/may/27/corporations-paid-us-senators-fast-track-tpp&quot; rel=&quot;nofollow&quot; style=&quot;border: 0px; color: #ed4d21; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; text-decoration: none; vertical-align: baseline;&quot;&gt;Obviously&lt;/a&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;these representatives are looking after their employers&#39; interests not ours.&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; background-color: white; border: 0px; color: black; font-family: &#39;Roboto Slab&#39;, Times, serif; font-size: 20px; font-stretch: inherit; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 21px; margin: 0px 0px 20px; orphans: auto; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; vertical-align: baseline; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
Though the public doesn&#39;t have access to the full text of this agreement, the contents of&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://keionline.org/sites/default/files/tpp-10feb2011-us-text-ipr-chapter.pdf&quot; rel=&quot;nofollow&quot; style=&quot;border: 0px; color: #ed4d21; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; text-decoration: none; vertical-align: baseline;&quot;&gt;leaked drafts&lt;/a&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;make it pretty obvious why this is being pushed through in such a sneaky way.&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; background-color: white; border: 0px; color: black; font-family: &#39;Roboto Slab&#39;, Times, serif; font-size: 20px; font-stretch: inherit; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 21px; margin: 0px 0px 20px; orphans: auto; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; vertical-align: baseline; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
Now you might have heard some people focus on the probability that&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.huffingtonpost.com/robert-e-scott/fast-track-to-lost-jobs-a_b_7042270.html&quot; rel=&quot;nofollow&quot; style=&quot;border: 0px; color: #ed4d21; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; text-decoration: none; vertical-align: baseline;&quot;&gt;the TPP will cause the U.S. economy to loose jobs&lt;/a&gt;, much like NAFTA did, only worse. Though this concern may be valid, it&#39;s hardly the most dangerous part of the agreement.&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; background-color: white; border: 0px; color: black; font-family: &#39;Roboto Slab&#39;, Times, serif; font-size: 20px; font-stretch: inherit; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 21px; margin: 0px 0px 20px; orphans: auto; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; vertical-align: baseline; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
The real danger lies in the way that this agreement subverts the sovereignty of nations. The TPP would create a system of shadowy trade tribunals which would allow companies to to override and nullify laws in any member country.&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; background-color: white; border: 0px; color: black; font-family: &#39;Roboto Slab&#39;, Times, serif; font-size: 20px; font-stretch: inherit; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 21px; margin: 0px 0px 20px; orphans: auto; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; vertical-align: baseline; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
&lt;a href=&quot;http://www.citizen.org/tppinvestment&quot;&gt;http://www.citizen.org/tppinvestment&lt;/a&gt;&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; background-color: white; border: 0px; color: black; font-family: &#39;Roboto Slab&#39;, Times, serif; font-size: 20px; font-stretch: inherit; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 21px; margin: 0px 0px 20px; orphans: auto; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; vertical-align: baseline; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
These tribunals are extrajudicial. Their authority is outside above national justice systems.&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.washingtonpost.com/opinions/kill-the-dispute-settlement-language-in-the-trans-pacific-partnership/2015/02/25/ec7705a2-bd1e-11e4-b274-e5209a3bc9a9_story.html&quot; rel=&quot;nofollow&quot; style=&quot;border: 0px; color: #ed4d21; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; text-decoration: none; vertical-align: baseline;&quot;&gt;The arbitrators&lt;/a&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;are unelected, and completely unaccountable to the people.&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; background-color: white; border: 0px; color: black; font-family: &#39;Roboto Slab&#39;, Times, serif; font-size: 20px; font-stretch: inherit; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 21px; margin: 0px 0px 20px; orphans: auto; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; vertical-align: baseline; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
The laws which will be subject to this new agreement include (but are not limited to) intellectual property rights, food and product safety, environmental standards, and just about any regulation that may affect the way companies do business.&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; background-color: white; border: 0px; color: black; font-family: &#39;Roboto Slab&#39;, Times, serif; font-size: 20px; font-stretch: inherit; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 21px; margin: 0px 0px 20px; orphans: auto; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; vertical-align: baseline; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
Under the TPP,&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.acslaw.org/acsblog/trans-pacific-partnership%E2%80%99s-extrajudicial-dispute-system-could-undermine-domestic&quot; rel=&quot;nofollow&quot; style=&quot;border: 0px; color: #ed4d21; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; text-decoration: none; vertical-align: baseline;&quot;&gt;if a country passes a law to protect its citizens or reduce pollution in a particular sector&lt;/a&gt;, a multinational corporation which is affected by that law can take that country to a tribunal. The ruling will be legally binding. It doesn&#39;t matter what people voted for.&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; background-color: white; border: 0px; color: black; font-family: &#39;Roboto Slab&#39;, Times, serif; font-size: 20px; font-stretch: inherit; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 21px; margin: 0px 0px 20px; orphans: auto; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; vertical-align: baseline; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
An example of what this will look can be found in&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.npr.org/sections/goatsandsoda/2014/09/15/345540221/philip-morris-sues-uruguay-over-graphic-cigarette-packaging&quot; rel=&quot;nofollow&quot; style=&quot;border: 0px; color: #ed4d21; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; text-decoration: none; vertical-align: baseline;&quot;&gt;Uruguay, which has been sued by the Philip Morris tobacco company&lt;/a&gt;. You see, Uruguay passed a law requiring particularly aggressive warning labels on cigarettes. These warning labels have been very effective. Smoking in Uruguay has declined by about 4 percent annually. Obviously that&#39;s bad for business.&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; background-color: white; border: 0px; color: black; font-family: &#39;Roboto Slab&#39;, Times, serif; font-size: 20px; font-stretch: inherit; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 21px; margin: 0px 0px 20px; orphans: auto; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; vertical-align: baseline; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
The fact that intellectual property rights are covered by the&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;https://openmedia.org/blog/tpp-fast-track-internet-censorship&quot; rel=&quot;nofollow&quot; style=&quot;border: 0px; color: #ed4d21; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; text-decoration: none; vertical-align: baseline;&quot;&gt;TPP has grave implications for the future of the internet&lt;/a&gt;. Under this agreement companies claiming to be harmed by lenient copyright enforcement would have a&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2014/10/latest-tpp-leak-shows-us-still-pushing-terrible-drm-and-copyright-term-proposals&quot; rel=&quot;nofollow&quot; style=&quot;border: 0px; color: #ed4d21; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; text-decoration: none; vertical-align: baseline;&quot;&gt;backdoor means to push new draconian regulations&lt;/a&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;on every participating country. This would bypass normal legislative processes completely.&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; background-color: white; border: 0px; color: black; font-family: &#39;Roboto Slab&#39;, Times, serif; font-size: 20px; font-stretch: inherit; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 21px; margin: 0px 0px 20px; orphans: auto; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; vertical-align: baseline; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
Remember SOPA? Under the TPP they wouldn&#39;t even have to pass a new law. Unpopular measures like this could be imposed through a ruling. Politicians wouldn&#39;t have to risk anything.&lt;br /&gt;
&lt;/div&gt;
&lt;div class=&quot;pro_float&quot; style=&quot;-webkit-text-stroke-width: 0px; background-color: white; border: 0px; color: black; font-family: &#39;Roboto Slab&#39;, Times, serif; font-size: 20px; font-stretch: inherit; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 21px; margin: 0px; orphans: auto; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; vertical-align: baseline; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
&lt;div class=&quot;in_content_item float_right&quot; style=&quot;border: 0px; float: right; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 20px 20px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span class=&quot;pro_loader&quot; style=&quot;border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; background-color: white; border: 0px; color: black; font-family: &#39;Roboto Slab&#39;, Times, serif; font-size: 20px; font-stretch: inherit; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 21px; margin: 0px 0px 20px; orphans: auto; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; vertical-align: baseline; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
Don&#39;t live in one of the countries implicated in the TPP? Have no fear, chances are they&#39;re cooking something up for you as well. The TPP is only one of several alphabet soup trade agreements currently in the works. The TTIP (aka the Transatlantic Trade and Investment Partnership)&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.huffingtonpost.com/lori-wallach/trade-deal-would-elevate_b_4143626.html&quot; rel=&quot;nofollow&quot; style=&quot;border: 0px; color: #ed4d21; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; text-decoration: none; vertical-align: baseline;&quot;&gt;would extend this system of extrajudicial trade tribunals to the entire European Union&lt;/a&gt;.&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; background-color: white; border: 0px; color: black; font-family: &#39;Roboto Slab&#39;, Times, serif; font-size: 20px; font-stretch: inherit; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 21px; margin: 0px 0px 20px; orphans: auto; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; vertical-align: baseline; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
If they get away with phase one of this&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.independent.co.uk/voices/comment/what-is-ttip-and-six-reasons-why-the-answer-should-scare-you-9779688.html&quot; rel=&quot;nofollow&quot; style=&quot;border: 0px; color: #ed4d21; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; text-decoration: none; vertical-align: baseline;&quot;&gt;power grab&lt;/a&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;you can rest assured that there will be more to come.&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; background-color: white; border: 0px; color: black; font-family: &#39;Roboto Slab&#39;, Times, serif; font-size: 20px; font-stretch: inherit; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 21px; margin: 0px 0px 20px; orphans: auto; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; vertical-align: baseline; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
This isn&#39;t about trade. This isn&#39;t about jobs. This is about power, power that is being covertly shifted farther and farther away from the people.&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; background-color: white; border: 0px; color: black; font-family: &#39;Roboto Slab&#39;, Times, serif; font-size: 20px; font-stretch: inherit; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 21px; margin: 0px 0px 20px; orphans: auto; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; vertical-align: baseline; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
Isn&#39;t it beautiful, this rare&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.washingtontimes.com/news/2015/jun/3/obama-john-boehner-team-up-to-sell-trans-pacific-p/?page=all&quot; rel=&quot;nofollow&quot; style=&quot;border: 0px; color: #ed4d21; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; text-decoration: none; vertical-align: baseline;&quot;&gt;show of Bipartisanship&lt;/a&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;we&#39;re seeing. It&#39;s enough to give you the warm and fuzzies. Who would have guessed that the same Republicans who shut down the government over Obamacare would rally so enthusiastically to ram Obamatrade down our throats? It appears that those who line their pockets are in agreement on this one&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; background-color: white; border: 0px; color: black; font-family: &#39;Roboto Slab&#39;, Times, serif; font-size: 20px; font-stretch: inherit; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 21px; margin: 0px 0px 20px; orphans: auto; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; vertical-align: baseline; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
It isn&#39;t enough for the corporate ruling class to have the politicians in their pocket. Now they want the ability to bypass elections and constitutions completely. How does that make you feel?&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; background-color: white; border: 0px; color: black; font-family: &#39;Roboto Slab&#39;, Times, serif; font-size: 20px; font-stretch: inherit; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 21px; margin: 0px 0px 20px; orphans: auto; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; vertical-align: baseline; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
Well, don&#39;t waste your time telling me. The politicians who are pushing this bill have names and addresses. Look them up. Give them a ring. Rattle their cages. There is a time and a place for politeness. This isn&#39;t one of them.&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; background-color: white; border: 0px; color: black; font-family: &#39;Roboto Slab&#39;, Times, serif; font-size: 20px; font-stretch: inherit; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 21px; margin: 0px 0px 20px; orphans: auto; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; vertical-align: baseline; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
If you&#39;re a resident of any of the countries involved in the TTP or TTIP now is the time to put pressure on the walking haircuts presiding over your particular region. Let them know that&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.theguardian.com/commentisfree/2013/nov/04/us-trade-deal-full-frontal-assault-on-democracy&quot; rel=&quot;nofollow&quot; style=&quot;border: 0px; color: #ed4d21; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; text-decoration: none; vertical-align: baseline;&quot;&gt;you know what they are up to&lt;/a&gt;. Make it clear that you will hold them personally responsible if they don&#39;t back out.&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; background-color: white; border: 0px; color: black; font-family: &#39;Roboto Slab&#39;, Times, serif; font-size: 20px; font-stretch: inherit; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 21px; margin: 0px 0px 20px; orphans: auto; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; vertical-align: baseline; white-space: normal; widows: 1; word-spacing: 0px;&quot;&gt;
These trade agreements are just the beginning. They&#39;ll take this as far as you let them.&lt;br /&gt;
&lt;/div&gt;
&lt;div class=&quot;video_wrapper_outer&quot; style=&quot;-webkit-text-stroke-width: 0px; background-color: white; border: 0px; color: black; font-family: &#39;Roboto Slab&#39;, Times, serif; font-size: 20px; font-stretch: inherit; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 21px; margin: 0px 0px 30px; orphans: auto; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; vertical-align: baseline; white-space: normal; widows: 1; width: 564px; word-spacing: 0px;&quot;&gt;
George Carlin said it in 3 minutes!&lt;br /&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;iframe allowfullscreen=&quot;&quot; class=&quot;YOUTUBE-iframe-video&quot; data-thumbnail-src=&quot;https://i.ytimg.com/vi/5AKGIlt6cSI/0.jpg&quot; frameborder=&quot;0&quot; height=&quot;266&quot; src=&quot;https://www.youtube.com/embed/5AKGIlt6cSI?feature=player_embedded&quot; width=&quot;420&quot;&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;div class=&quot;video_wrapper_outer&quot; style=&quot;-webkit-text-stroke-width: 0px; background-color: white; border: 0px; color: black; font-family: &#39;Roboto Slab&#39;, Times, serif; font-size: 20px; font-stretch: inherit; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 21px; margin: 0px 0px 30px; orphans: auto; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; vertical-align: baseline; white-space: normal; widows: 1; width: 564px; word-spacing: 0px;&quot;&gt;
&lt;br class=&quot;Apple-interchange-newline&quot; /&gt;
&lt;br class=&quot;Apple-interchange-newline&quot; /&gt;
Source:&lt;br /&gt;
&lt;a href=&quot;http://stormcloudsgathering.com/the-tpp-what-youre-not-being-told#top_of_page&quot;&gt;http://stormcloudsgathering.com/the-tpp-what-youre-not-being-told#top_of_page&lt;/a&gt;&lt;br /&gt;
___________________&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
</description><link>http://news2u.blogspot.com/2015_08_01_archive.html#7370879752858288548</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://img.youtube.com/vi/KnyPsKw_gak/default.jpg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5604605.post-1562416188401880667</guid><pubDate>Mon, 25 May 2015 17:54:00 +0000</pubDate><atom:updated>2015-05-25T12:54:46.766-05:00</atom:updated><title>Memorial Day 2015</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;In Their Own Words&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
by Ron Forthofer&lt;br /&gt;
May 24th, 2015&lt;br /&gt;
Dissident Voice&lt;br /&gt;
&lt;br /&gt;
Here in the US, we have been led to believe that we are an exceptional people and the indispensable nation. During our lifetime we have been exposed to lots of myths about the US, particularly about how we are always on the side of good. Below are insider comments challenging this key myth.&lt;br /&gt;
&lt;br /&gt;
Before presenting the quotes, note that US crimes of stealing lands and resources and killing and exploiting people are, disturbingly, nothing new.&lt;br /&gt;
&lt;br /&gt;
Many other nations/empires have committed similar crimes throughout history. Morality, legality or altruism are not considerations that apply to the acts of powerful nations. The US is the most recent and perhaps the most successful incarnation of empire that skillfully uses puppet leaders, international organizations, financial means, and modern technology, including propaganda techniques, to expand, consolidate and to maintain its control.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Laudable words&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
In 1821, when he was US Secretary of State, John Quincy Adams wrote a “Warning Against the Search for “Monsters to Destroy”.  The excerpt below shows how America once viewed itself in the international arena.&lt;br /&gt;
&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&lt;i&gt;Wherever the standard of freedom and Independence has been or shall be unfurled, there will her heart, her benedictions and her prayers be. But she goes not abroad, in search of monsters to destroy…. The fundamental maxims of her policy would insensibly change from liberty to force…. She might become the dictatress of the world. She would be no longer the ruler of her own spirit….&amp;nbsp;&lt;/i&gt;&lt;/blockquote&gt;
&lt;br /&gt;
Unfortunately, Adams didn’t seem to recognize that US treatment of the Native Americans and African slaves had already undercut the high ideas of liberty and independence. The US certainly did not heed Adams’ warning as the use of force or coercion were the primary ways the US conducted foreign policy, especially on the North American continent.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&amp;nbsp;Use of the military&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Native American nations suffered incredible slaughter, dispossession and devastation at the hands of the US military and citizens. The widespread killing of Native Americans preceded and continued throughout the ‘Manifest Destiny’ era. &lt;i&gt;A Century of Dishonor&lt;/i&gt; by Helen Hunt Jackson, first published in 1881, provides details about this unconscionable mistreatment.

Two other major US foreign 19th century campaigns were the war of conquest against Mexico (1846-1848) and, after the defeat of the Spanish during the Spanish-American War, the brutal US campaign against Philippine independence at the turn of the 20th century.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;President Ulysses S. Grant&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Regarding the war with Mexico, former President and General Ulysses S. Grant wrote in his autobiography:&lt;br /&gt;
&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&lt;i&gt;For myself, I was bitterly opposed to the measure, and to this day regard the war, which resulted, as one of the most unjust ever waged by a stronger against a weaker nation. It was an instance of a republic following the bad example of European monarchies, in not considering justice in their desire to acquire additional territory.&amp;nbsp;&lt;/i&gt;&lt;/blockquote&gt;
&lt;br /&gt;
&lt;b&gt;Major General Smedley Butler&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
US Marine Corps legend Major General Smedley Butler described his early 20th-century experiences in a powerful and telling speech in 1933.&lt;br /&gt;
&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&lt;i&gt;War is just a racket. A racket is best described, I believe, as something that is not what it seems to the majority of people. Only a small inside group knows what it is about. It is conducted for the benefit of the very few at the expense of the masses. …&amp;nbsp;&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;I wouldn’t go to war again as I have done to protect some lousy investment of the bankers. There are only two things we should fight for. One is the defense of our homes and the other is the Bill of Rights. …&amp;nbsp;&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;I spent thirty-three years and four months in active military service as a member of this country’s most agile military force, the Marine Corps. I served in all commissioned ranks from Second Lieutenant to Major-General. And during that period, I spent most of my time being a high class muscle-man for Big Business, for Wall Street and for the Bankers. In short, I was a racketeer, a gangster for capitalism.&amp;nbsp;&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;I helped make Mexico, especially Tampico, safe for American oil interests in 1914. I helped make Haiti and Cuba a decent place for the National City Bank boys to collect revenues in. I helped in the raping of half a dozen Central American republics for the benefits of Wall Street. The record of racketeering is long. I helped purify Nicaragua for the international banking house of Brown Brothers in 1909-1912. I brought light to the Dominican Republic for American sugar interests in 1916. In China I helped to see to it that Standard Oil went its way unmolested.&amp;nbsp;&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;During those years, I had, as the boys in the back room would say, a swell racket. Looking back on it, I feel that I could have given Al Capone a few hints. The best he could do was to operate his racket in three districts. I operated on three continents.&amp;nbsp;&lt;/i&gt;&lt;/blockquote&gt;
&lt;br /&gt;
&lt;b&gt;General David M. Shoup&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
An echo of Butler’s comments is found in a 1967 speech by General David M. Shoup, former Commandant of the USMC (the US Congressional Record from February 20, 1967). General Shoup said:&lt;br /&gt;
&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&lt;i&gt;I believe that if we had and would keep our dirty, bloody, dollar-crooked fingers out of the business of these nations so full of depressed, exploited people, they will arrive at a solution of their own. That they design and want. That they fight and work for.&amp;nbsp;&lt;/i&gt;&lt;/blockquote&gt;
&lt;br /&gt;
&lt;b&gt;&amp;nbsp;Thomas Friedman&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
In a 1999 column, New York Times columnist Thomas Friedman also echoed General Butler’s comments when he admitted the linkage between the military and the ability of US corporations to thrive internationally. Friedman wrote:&lt;br /&gt;
&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&lt;i&gt;&amp;nbsp;For globalization to work, America can’t be afraid to act like the almighty superpower that it is…The hidden hand of the market will never work without a hidden fist–McDonald’s cannot flourish without McDonnell Douglas, the builder of the F-15. And the hidden fist that keeps the world safe for Silicon Valley’s technologies is called the United States Army, Air Force Navy and Marine Corps.&amp;nbsp;&lt;/i&gt;&lt;/blockquote&gt;
&lt;br /&gt;
&lt;b&gt;General Douglas MacArthur&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
In 1957, another of the leading US military figures during the 20th century,&lt;br /&gt;
General Douglas MacArthur, explained the support for increasing military budgets.&lt;br /&gt;
&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&lt;i&gt;Our swollen budgets constantly have been misrepresented to the public. Our government has kept us in a perpetual state of fear … with the cry of grave national emergency. Always there has been some terrible evil at home or some monstrous foreign power that was going to gobble us up if we did not blindly rally behind it by furnishing the exorbitant funds demanded. Yet, in retrospect, these disasters seem never to have happened, seem never to have been quite real.&lt;/i&gt;&amp;nbsp;&lt;/blockquote&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Oil — a great prize&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
A 1945 memorandum to President Truman written by the Chief of the Division of Near Eastern Affairs in the U.S. State Department, Gordon Merriam, stated:&lt;br /&gt;
&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&lt;i&gt;In Saudi Arabia, where the oil resources constitute a stupendous source of strategic power, and one of the greatest material prizes in world history, a concession covering this oil is nominally in American control.&amp;nbsp;&lt;/i&gt;&lt;/blockquote&gt;
&lt;br /&gt;
Adolf A. Berle, one of Franklin Roosevelt’s closest advisers, particularly in relation to the construction of the post-WWII world, later remarked that controlling the oil reserves of the Middle East would mean obtaining “substantial control of the world.”&lt;br /&gt;
&lt;br /&gt;
The US and its oil industry have worked assiduously to extend their influence over nations with large supplies of oil and natural gas or along possible pipeline routes.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Maintaining US standard of living&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;A 1948 State Department Policy Planning Paper by George Kennan, architect of the ‘containment’ policy toward the USSR, discussed the rationale behind US foreign policy. Kennan explained that, following World War II, America held 50% of the world’s wealth, yet had only 6.3% of the world’s population. According to Kennan, the real task for America:&lt;br /&gt;
&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&lt;i&gt;&amp;nbsp;… is to devise a pattern of relationships which will permit us to maintain this position of disparity without positive detriment to our national security. To do so, we will have to dispense with all sentimentality and day-dreaming; and our attention will have to be concentrated everywhere on our immediate national objectives. We need not deceive ourselves that we can afford today the luxury of altruism and world-benefaction&lt;/i&gt;.&amp;nbsp;&lt;/blockquote&gt;
&lt;br /&gt;
&lt;b&gt;By overthrowing governments&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Consistent with Kennan’s recommendation, the US used the Central Intelligence Agency to overthrow or to assassinate democratically elected leaders. More recently, the Agency for International Development and non-governmental organizations such as the National Endowment for Democracy prepare the ground for coups.&lt;br /&gt;
&lt;br /&gt;
Amazingly, leaders more amenable to the US usually came to power after these coups! Examples of coups welcomed by the US include Iran (1953), Guatemala (1954), Brazil (1964), Indonesia (1965), Chile (1973), Honduras (2009) and Ukraine (2014).&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://williamblum.org/essays&quot;&gt;William Blum&lt;/a&gt;‘s book Killing Hope: U.S. Military and CIA Intervention Since World War II examines this topic in detail.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Through economic agreements&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
In 1944, a conference of the 44 Allied nations was held at Bretton Woods, New Hampshire to establish regulation of the international monetary and financial systems after the war. Britain and the US had competing versions for a reserve currency and other issues. Due to overwhelming US power and wealth, the nations went along with the US version that effectively resulted in making the US dollar the reserve currency, a decision with major implications for the world. (See Linda McQuaig’s excellent book The Cult of Impotence: Selling the Myth of Powerlessness in the Global Economy, pages 214-224 for more on Bretton Woods and the role played by the US banking industry.)&lt;br /&gt;
&lt;br /&gt;
The International Monetary Fund and the International Bank for Reconstruction and Development (now part of the World Bank) were also created at Bretton Woods. The US has used these institutions and their structural adjustment programs along with its trade policies and foreign aid to, in effect, keep third-world nations as colonies. These policies simultaneously expanded the power of  Western corporations and Wall Street banks. (See Confessions of an Economic Hit Man by John Perkins for more information.)&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;A coup led by Wall Street and transnational corporations&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
US policy has morphed into a policy that puts the interests of giant financial institutions and transnational corporations ahead of US national interests. The Bretton Woods plan along with so-called trade agreements clearly demonstrate this point as these agreements really focus on the expansion and consolidation of the power of giant banks and corporations.&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://www.nomiprins.com/&quot;&gt;Nomi Prins&lt;/a&gt;‘ exceptional book All the Presidents’ Bankers: The Hidden Alliances that Drive American Power strongly makes the case that the power of leading US bankers to influence US domestic and foreign policy has existed since at least the beginning of the 20th century.&lt;br /&gt;
&lt;br /&gt;
The Trans-Pacific Partnership is the latest predatory scheme that reflects the power of Wall Street and transnational corporations. The TPP expands the power of these groups at the public’s expense. Among the rules being secretly negotiated is the particularly egregious ‘Investor State Dispute Settlement’ process. This process would allow a foreign corporation to sue a government over profits it could potentially lose due to a law that protects, for example, the environment or labor rights or buy local programs. Fortunately there is a good chance that this scheme may be defeated due to strong public pressure.&lt;br /&gt;
&lt;br /&gt;
Also under current negotiation is another part of the corporate coup, the Transatlantic Trade and Investment Partnership (TTIP) between the US and European nations. Again there is strong opposition, mostly in Europe so far, to this predatory scheme.&lt;br /&gt;
&lt;br /&gt;
Clearly US foreign policies seldom have little relation to the fine sounding line spouted by our elected officials and corporate dominated mainstream news media. The officials and the media work in tandem to convince the US public to support wars or other policies that are harmful to people here and around the world.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Backlash to this Wall Street/corporate coup&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
There is rising opposition to the Washington consensus of neo-liberal policies. A number of South American nations are showing that an alternative path can be charted. Several of the democratically elected leaders there have enacted policies benefiting the public interest, not just the interest of the elite. Unfortunately, by adopting these policies, these leaders become targets of the US and at risk of being overthrown.&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;Russia and China are working more closely together in response to US policies/provocations in Ukraine and Southeast Asia. The BRICS nations (Brazil, Russia, India, China and South Africa) have formed institutions to offer an alternative to the World Bank and the IMF. A number of nations are using their own currencies instead of the dollar in their trade transactions with one another. The Shanghai Cooperation Organization is another political, economic and military group working together outside of the orbit of the US and the West.&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;The financial catastrophe of 2008 further undercut confidence in the neoliberal policies of the West. The immediate bailout of the gigantic banks without concurrent action to help the public provided another demonstration of the power of the banks over governments. As a result of the crisis and bank bailout, more and more people in Western Europe and the US are beginning to recognize that the predatory policies of the Wall Street-led US are taking us down the wrong path. For example, in Greece and Spain, the mandated austerity programs have caused people to challenge the existing order.&lt;br /&gt;
&lt;br /&gt;
Unbridled capitalism is slowly destroying the environment as well as the economic well being of the public. If we want future generations to have any chance at a decent life, an alternative path to the neoliberal model must be pursued. Fortunately, the seeds of a seismic shift are being planted. Whether or not, they will sprout in time is still unknown.&lt;br /&gt;
&lt;br /&gt;
Ron Forthofer is a retired professor of biostatistics from the University of Texas School of Public Health in Houston and was a Green Party candidate for Congress and also for governor of Colorado. Read other articles by Ron.&lt;br /&gt;
&lt;br /&gt;
This article was posted on Sunday, May 24th, 2015 at 10:21pm and is filed under &lt;a href=&quot;http://dissidentvoice.org/category/economics/brics/&quot;&gt;BRICS&lt;/a&gt;, &lt;a href=&quot;http://dissidentvoice.org/category/finance/&quot;&gt;Finance&lt;/a&gt;, &lt;a href=&quot;http://dissidentvoice.org/category/finance/imf/&quot;&gt;IMF&lt;/a&gt;, &lt;a href=&quot;http://dissidentvoice.org/category/militarism/&quot;&gt;Militarism&lt;/a&gt;, &lt;a href=&quot;http://dissidentvoice.org/category/original-peoples/&quot;&gt;Original Peoples&lt;/a&gt;,&lt;a href=&quot;http://dissidentvoice.org/category/economics/tpp/&quot;&gt; TPP&lt;/a&gt;, &lt;a href=&quot;http://dissidentvoice.org/category/finance/wall-street/&quot;&gt;Wall Street&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
Source:&lt;br /&gt;
&lt;a href=&quot;http://dissidentvoice.org/2015/05/in-their-own-words/&quot;&gt;http://dissidentvoice.org/2015/05/in-their-own-words/&lt;/a&gt;&lt;br /&gt;
_____________&lt;/div&gt;
</description><link>http://news2u.blogspot.com/2015_05_01_archive.html#1562416188401880667</link><author>noreply@blogger.com (Unknown)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5604605.post-5772256531006556438</guid><pubDate>Tue, 07 Apr 2015 17:01:00 +0000</pubDate><atom:updated>2015-04-07T12:10:13.353-05:00</atom:updated><title>Bust of Edward Snowden Stuck to a War Monument in Brooklyn</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;iframe allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;300&quot; src=&quot;https://www.youtube.com/embed/n7rAhEpft5g&quot; width=&quot;460&quot;&gt;&lt;/iframe&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: lime; font-size: x-small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;header class=&quot;post-headline&quot; style=&quot;border: 0px; font-stretch: inherit; line-height: 18px; margin: 0px 0px 24px; padding: 0px; text-align: center; vertical-align: baseline;&quot;&gt;&lt;hgroup style=&quot;border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;background-color: white; font-size: x-small;&quot;&gt;&lt;h1 class=&quot;title&quot; style=&quot;background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; box-shadow: rgb(255, 234, 3) 6px 0px 0px, rgb(255, 234, 3) -6px 0px 0px; display: inline; font-family: Raisonne, sans-serif; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: 1.25em; margin: 0px; padding: 2px 0px; text-transform: uppercase; vertical-align: baseline;&quot;&gt;
THERE’S A MASSIVE, ILLICIT BUST OF EDWARD SNOWDEN STUCK TO A WAR MONUMENT IN BROOKLYN&lt;/h1&gt;
&lt;br /&gt;&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;, Courier, sans-serif; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: 1.25em;&quot;&gt;By&lt;/span&gt;&lt;span style=&quot;font-family: &#39;Courier New&#39;, Courier, sans-serif; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: 1.25em;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://animalnewyork.com/author/buckyturco/&quot; rel=&quot;author&quot; style=&quot;border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; color: black; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;&quot; title=&quot;Posts by Bucky Turco&quot;&gt;Bucky Turco&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;time style=&quot;border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;April 6, 2015 - 11:03AM&lt;/time&gt;&lt;/div&gt;
&lt;/span&gt;&lt;/hgroup&gt;&lt;/header&gt;&lt;br /&gt;
&lt;div class=&quot;post-content&quot; style=&quot;background-color: white; border: 0px; font-stretch: inherit; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;div style=&quot;border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 12px; padding: 0px; vertical-align: baseline;&quot;&gt;
While most people slept, a trio of artists and some helpers installed a bust of NSA whistleblower&lt;a href=&quot;http://animalnewyork.com/tag/edward-snowden/&quot; style=&quot;border: 0px; color: black; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Edward Snowden&lt;/a&gt;&amp;nbsp;in Brooklyn on Monday morning. The group, which allowed ANIMAL to exclusively document the installation on the condition that we hide their identities, hauled the 100-pound sculpture into Fort Greene Park and up its hilly terrain just before dawn. They fused it to part of the&amp;nbsp;&lt;a href=&quot;http://www.nycgovparks.org/parks/fort-greene-park/monuments/1222&quot; style=&quot;border: 0px; color: black; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Prison Ship Martyrs Monument&lt;/a&gt;, a memorial to Revolutionary War soldiers. As of press time, the sculpture was still there.&amp;nbsp;&lt;span style=&quot;border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: 600; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;UPDATE&lt;/span&gt;: Parks Department&amp;nbsp;&lt;a href=&quot;https://twitter.com/KeeganNYC/status/585112880506396672&quot; style=&quot;border: 0px; color: black; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;put a tarp over the bust&lt;/a&gt;&amp;nbsp;and removed it this afternoon.&lt;/div&gt;
&lt;div style=&quot;border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 12px; padding: 0px; vertical-align: baseline;&quot;&gt;
The idea for the Snowden tribute was conceived about a year ago by two New York City-based artists with a history of pulling off notable public interventions. They linked up with a renowned sculptor on the West Coast who was sympathetic to their cause.&lt;/div&gt;
&lt;div style=&quot;border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 12px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; line-height: 18px; text-align: center;&quot;&gt;
&lt;a href=&quot;http://content.animalnewyork.com/wp-content/uploads/snowdenbust-apr6-5531.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://content.animalnewyork.com/wp-content/uploads/snowdenbust-apr6-5531.jpg&quot; height=&quot;250&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 12px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 12px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 12px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 12px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 12px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 12px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 12px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 12px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 12px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; font-size: 15px; font-stretch: inherit; line-height: 18px; margin-bottom: 12px; padding: 0px; vertical-align: baseline;&quot;&gt;
The artists admit that Snowden probably wouldn’t approve of the project, since he never wanted the leaks to be about him, but they hope he’d understand why they did it. In a statement about the project, which they have entitled, “Prison Ship Martyrs Monument 2.0,” they wrote:&lt;/div&gt;
&lt;blockquote style=&quot;border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; font-size: 15px; font-stretch: inherit; line-height: 18px; margin: 2em 40px; padding: 0px; position: relative; quotes: none; vertical-align: baseline;&quot;&gt;
&lt;div style=&quot;border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 12px; padding: 0px; vertical-align: baseline;&quot;&gt;
Fort Greene’s Prison Ship Martyrs Monument is a memorial to American POWs who lost their lives during the Revolutionary War. We have updated this monument to highlight those who sacrifice their safety in the fight against modern-day tyrannies. It would be a dishonor to those memorialized here to not laud those who protect the ideals they fought for, as Edward Snowden has by bringing the NSA’s 4th-Amendment-violating surveillance programs to light. All too often, figures who strive to uphold these ideals have been cast as criminals rather than in bronze.&lt;/div&gt;
&lt;div style=&quot;border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; padding: 0px; vertical-align: baseline;&quot;&gt;
Our goal is to bring a renewed vitality to the space and prompt even more visitors to ponder the sacrifices made for their freedoms. We hope this inspires them to reflect upon the responsibility we all bear to ensure our liberties exist long into the future.&lt;/div&gt;
&lt;/blockquote&gt;
&lt;div style=&quot;border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; font-size: 15px; font-stretch: inherit; line-height: 18px; margin-bottom: 12px; padding: 0px; vertical-align: baseline;&quot;&gt;
In 2013, the Snowden leaks exposed an expansive, covert surveillance program that spied on U.S. citizens, residents and even persons abroad, the likes of which the world had never before seen. While activists and a number of journalists have hailed Snowden as a hero, conservatives and politicians have called him&amp;nbsp;&lt;a href=&quot;http://www.mediaite.com/tv/fox-contributor-snowden-not-a-hero-hes-a-coward-fugitive-and-traitor/&quot; style=&quot;border: 0px; color: black; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;a “coward”&lt;/a&gt;&amp;nbsp;and a&amp;nbsp;&lt;a href=&quot;http://www.politico.com/story/2014/05/edward-snowden-coward-john-kerry-msnbc-interview-nsa-107157.html&quot; style=&quot;border: 0px; color: black; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;“traitor.”&lt;/a&gt;&amp;nbsp;Snowden sought asylum in Moscow, where he remains in exile.&lt;/div&gt;
&lt;div style=&quot;border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; font-size: 15px; font-stretch: inherit; line-height: 18px; margin-bottom: 12px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; line-height: 18px; text-align: center;&quot;&gt;
&lt;a href=&quot;http://content.animalnewyork.com/wp-content/uploads/snowdenbust-apr6-5557.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://content.animalnewyork.com/wp-content/uploads/snowdenbust-apr6-5557.jpg&quot; height=&quot;250&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 12px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 12px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 12px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 12px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 12px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 12px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 12px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 12px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 12px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; font-size: 15px; font-stretch: inherit; line-height: 18px; margin-bottom: 12px; padding: 0px; vertical-align: baseline;&quot;&gt;
The artists said they’re dismayed that despite the trove of damning evidence the leaks exposed, the public has largely moved on from the story and&amp;nbsp;&lt;a href=&quot;http://gizmodo.com/one-year-after-the-first-snowden-leak-whats-really-cha-1586213046&quot; style=&quot;border: 0px; color: black; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;no substantial actions&lt;/a&gt;&amp;nbsp;have been taken against the NSA. “There’s a media landscape that has painted him as a criminal,” said one of the two New York artists. “You need something theatrical and large to counterbalance the Fox News-iness of the texture of the conversation out there.” At first, the pair thought about making a full-size statue of the former NSA contractor, but were later talked down from that idea by the sculptor. He recommended a bust.&lt;/div&gt;
&lt;div style=&quot;border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; font-size: 15px; font-stretch: inherit; line-height: 18px; margin-bottom: 12px; padding: 0px; vertical-align: baseline;&quot;&gt;
Measuring 4-feet tall, Snowden’s head was placed atop one of the four columns that lie at the monument’s edge, above the eagles. The bust is made of hydrocal, a high quality sculpting material that’s commonly used in places like Las Vegas to create Roman-looking things, castles and other mega props casinos incorporate into their facades. Seeing it up close, you could never tell that you were looking at a plaster-like substance. In fact, over a dozen people walking their dogs passed by the new bust on Monday morning without noticing the unsanctioned piece. Both the color and design of the bust expertly matches the existing sculptures there, from its bronze patina finish to Snowden’s hair — which mimics the texture of the feather on the eagle. The artists also added letters spelling out Snowden’s name in an official-looking font befitting of a monument.&lt;/div&gt;
&lt;div style=&quot;border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; font-size: 15px; font-stretch: inherit; line-height: 18px; margin-bottom: 12px; padding: 0px; vertical-align: baseline;&quot;&gt;
While it was very important that the piece be more than just a prop or paper mache effigy, the artists didn’t want to damage the surface that the bust would be bound to, either. After some debate, they decided on an adhesive that would firmly hold the head in place, yet could be removed without marring the monument.&lt;/div&gt;
&lt;div style=&quot;border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; font-size: 15px; font-stretch: inherit; line-height: 18px; margin-bottom: 12px; padding: 0px; vertical-align: baseline;&quot;&gt;
The materials needed to create a bust of this type cost thousands of dollars, and the pair ponied up the cash. It then took a little over six months to sculpt, mold, cast and ship to New York. Had the sculptor charged market rates, he said it would have cost tens of thousands of dollars. “The amount of work that goes into this kind of stuff, it’s easily a 30 grand project,” said the 30-something sculptor. “If it were bronze, it could be a $100,000 piece of artwork, maybe more.”&lt;/div&gt;
&lt;div style=&quot;border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; font-size: 15px; font-stretch: inherit; line-height: 18px; margin-bottom: 12px; padding: 0px; vertical-align: baseline;&quot;&gt;
The artists are fully aware of the bust’s inevitable destruction and have left themselves a few options, including one that involves deploying an army of mini-Snowden heads. “We have a full size mold that can be poured again and its been 3D rendered, so we have the ability to print smaller ones at scale,” they said.&lt;/div&gt;
&lt;div style=&quot;border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; font-size: 15px; font-stretch: inherit; line-height: 18px; margin-bottom: 12px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; font-size: 15px; font-stretch: inherit; line-height: 18px; margin-bottom: 12px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;a href=&quot;http://content.animalnewyork.com/wp-content/uploads/snowdenbust-apr6-5571.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; display: inline !important; margin-bottom: 1em; margin-right: 1em; text-align: center;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://content.animalnewyork.com/wp-content/uploads/snowdenbust-apr6-5571.jpg&quot; height=&quot;225&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; font-size: 15px; font-stretch: inherit; line-height: 18px; margin-bottom: 12px; padding: 0px; vertical-align: baseline;&quot;&gt;
(&lt;em style=&quot;border: 0px; font-stretch: inherit; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Video/Photos: Aymann Ismail/ANIMALNewYork&lt;/em&gt;)&lt;/div&gt;
&lt;div style=&quot;border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; font-size: 15px; font-stretch: inherit; line-height: 18px; margin-bottom: 12px; padding: 0px; vertical-align: baseline;&quot;&gt;
Source:&lt;/div&gt;
&lt;div style=&quot;border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; font-stretch: inherit; margin-bottom: 12px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-size: 15px; line-height: 18px;&quot;&gt;&lt;a href=&quot;http://animalnewyork.com/2015/theres-a-massive-illicit-bust-of-edward-snowden-stuck-to-a-war-monument-in-brooklyn/&quot;&gt;http://animalnewyork.com/2015/theres-a-massive-illicit-bust-of-edward-snowden-stuck-to-a-war-monument-in-brooklyn/&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; font-stretch: inherit; margin-bottom: 12px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-size: 15px; line-height: 18px;&quot;&gt;____________&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
</description><link>http://news2u.blogspot.com/2015_04_01_archive.html#5772256531006556438</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://img.youtube.com/vi/n7rAhEpft5g/default.jpg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5604605.post-665674658122564844</guid><pubDate>Fri, 20 Feb 2015 15:03:00 +0000</pubDate><atom:updated>2015-02-20T15:09:34.559-05:00</atom:updated><title>The Great SIM Heist“We need to stop assuming that the phone companies will provide us with a secure method of making calls or exchanging text messages”</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;The Intercept&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;by Jeremy Scahill and Josh Begley &lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;Feb19, 2015&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 22px; margin: 0px 0px 28px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;b style=&quot;box-sizing: border-box; font-weight: bold;&quot;&gt;&lt;span class=&quot;dropcap&quot; style=&quot;box-sizing: border-box; float: left; line-height: 44px; padding-right: 6px;&quot;&gt;&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&lt;/span&gt;American and British spies hacked into the internal computer network of the largest manufacturer of SIM cards in the world, stealing encryption keys used to protect the privacy of cellphone communications across the globe, according to top-secret documents provided to&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;i style=&quot;box-sizing: border-box; font-style: italic;&quot;&gt;The Intercept&lt;/i&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;by National Security Agency whistleblower Edward Snowden.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 22px; margin: 0px 0px 28px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;The hack was perpetrated by a joint unit consisting of operatives from the NSA and its British counterpart Government Communications Headquarters, or GCHQ. The breach, detailed in a secret 2010 GCHQ &lt;a href=&quot;https://firstlook.org/theintercept/document/2015/02/19/cne-access-core-mobile-networks-2/&quot; style=&quot;background: none repeat scroll 0% 0% transparent; box-sizing: border-box; color: #df3f3d; text-decoration: none;&quot;&gt;document&lt;/a&gt;, gave the surveillance agencies the potential to secretly monitor a large portion of the world’s cellular communications, including both voice and data.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 22px; margin: 0px 0px 28px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;The company targeted by the intelligence agencies,&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.gemalto.com/&quot; style=&quot;background: none repeat scroll 0% 0% transparent; box-sizing: border-box; color: #df3f3d; text-decoration: none;&quot;&gt;Gemalto&lt;/a&gt;, is a multinational firm incorporated in the Netherlands that makes the chips used in mobile phones and next-generation credit cards. Among its clients are AT&amp;amp;T, T-Mobile, Verizon, Sprint and some 450 wireless network providers around the world. The company operates in 85 countries and has more than 40 manufacturing facilities. One of its three global headquarters is in Austin, Texas and it has a large factory in Pennsylvania.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 22px; margin: 0px 0px 28px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;In all, Gemalto produces some 2 billion SIM cards a year. Its motto is “Security to be Free.”&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 22px; margin: 0px 0px 28px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;With these stolen encryption keys, intelligence agencies can monitor mobile communications without seeking or receiving approval from telecom companies and foreign governments. Possessing the keys also sidesteps the need to get a warrant or a wiretap, while leaving no trace on the wireless provider’s network that the communications were intercepted. Bulk key theft additionally enables the intelligence agencies to unlock any previously encrypted communications they had already intercepted, but did not yet have the ability to decrypt.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 22px; margin: 0px 0px 28px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;As part of the covert operations against Gemalto, spies from GCHQ — with support from the NSA — mined the private communications of unwitting engineers and other company employees in multiple countries.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 22px; margin: 0px 0px 28px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;Gemalto was totally oblivious to the penetration of its systems — and the spying on its employees. “I’m disturbed, quite concerned that this has happened,” Paul Beverly, a Gemalto executive vice president, told&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;i style=&quot;box-sizing: border-box; font-style: italic;&quot;&gt;The Intercept&lt;/i&gt;. “The most important thing for me is to understand exactly how this was done, so we can take every measure to ensure that it doesn’t happen again, and also to make sure that there’s no impact on the telecom operators that we have served in a very trusted manner for many years. What I want to understand is what sort of ramifications it has, or could have, on any of our customers.” He added that “the most important thing for us now is to understand the degree” of the breach.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 22px; margin: 0px 0px 28px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;Leading privacy advocates and security experts say that the theft of encryption keys from major wireless network providers is tantamount to a thief obtaining the master ring of a building superintendent who holds the keys to every apartment. “Once you have the keys, decrypting traffic is trivial,” says Christopher Soghoian, the principal technologist for the American Civil Liberties Union. “The news of this key theft will send a shock wave through the security community.”&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 22px; margin: 0px 0px 28px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;THE MASSIVE KEY THEFT IS “BAD NEWS FOR PHONE SECURITY. REALLY BAD NEWS.”&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 22px; margin: 0px 0px 28px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;Beverly said that after being contacted by&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;i style=&quot;box-sizing: border-box; font-style: italic;&quot;&gt;The Intercept&lt;/i&gt;, Gemalto’s internal security team began on Wednesday to investigate how their system was penetrated and could find no trace of the hacks. When asked if the NSA or GCHQ had ever requested access to Gemalto-manufactured encryption keys, Beverly said, “I am totally unaware. To the best of my knowledge, no.”&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 22px; margin: 0px 0px 28px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;According to one secret GCHQ&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;https://firstlook.org/theintercept/document/2015/02/19/cne-access-core-mobile-networks-2/&quot; style=&quot;background: none repeat scroll 0% 0% transparent; box-sizing: border-box; color: #df3f3d; text-decoration: none;&quot;&gt;slide&lt;/a&gt;, the British intelligence agency penetrated Gemalto’s internal networks, planting malware on several computers, giving GCHQ secret access. We “believe we have their entire network,” the slide’s author boasted about the operation against Gemalto.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 22px; margin: 0px 0px 28px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;Additionally, the spy agency targeted unnamed cellular companies’ core networks, giving it access to “sales staff machines for customer information and network engineers machines for network maps.” GCHQ also claimed the ability to manipulate the billing servers of cell companies to “suppress” charges in an effort to conceal the spy agency’s secret actions against an individual’s phone. Most significantly, GCHQ also penetrated “authentication servers,” allowing it to decrypt data and voice communications between a targeted individual’s phone and his or her&amp;nbsp;telecom provider’s network. A note accompanying the slide asserted that the spy agency was “very happy with the data so far and [was] working through the vast quantity of product.”&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 22px; margin: 0px 0px 28px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;The Mobile Handset Exploitation Team (MHET), whose existence has never before been disclosed, was formed in April 2010 to target vulnerabilities in cellphones. One of its main missions was to covertly penetrate computer networks of corporations that manufacture SIM cards, as well as those of wireless network providers. The team included operatives from both GCHQ and the NSA.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 22px; margin: 0px 0px 28px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;While the FBI and other U.S. agencies can obtain court orders compelling U.S.-based telecom companies to allow them to wiretap or intercept the communications of their customers, on the international front this type of data collection is much more challenging. Unless a foreign telecom or foreign government grants access to their citizens’ data to a U.S. intelligence agency, the NSA or CIA would have to hack into the network or specifically target the user’s device for a more risky “active” form of surveillance that could be detected by sophisticated targets. Moreover, foreign intelligence agencies would not allow U.S. or U.K. spy agencies access to the mobile communications of their heads of state or other government officials.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 22px; margin: 0px 0px 28px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;“It’s unbelievable. Unbelievable,” said Gerard Schouw, a member of the Dutch Parliament, when told of the spy agencies’ actions. Schouw, the intelligence spokesperson for D66, the largest opposition party in the Netherlands, told&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;i style=&quot;box-sizing: border-box; font-style: italic;&quot;&gt;The Intercept&lt;/i&gt;, “We don’t want to have the secret services from other countries doing things like this.” Schouw added that he and other lawmakers will ask the Dutch government to provide an official explanation and to clarify whether the country’s intelligence services were aware of the targeting of Gemalto, whose official headquarters is in Amsterdam.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 22px; margin: 0px 0px 28px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;Last November, the Dutch government&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.government.nl/ministries/bzk/news/2014/07/16/constitution-to-extend-protection-to-e-mails.html&quot; style=&quot;background: none repeat scroll 0% 0% transparent; box-sizing: border-box; color: #df3f3d; text-decoration: none;&quot;&gt;amended&lt;/a&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;its constitution to include explicit protection for the privacy of digital communications, including those made on mobile devices. “We have, in the Netherlands, a law on the [activities] of secret services. And hacking is not allowed,” Schouw&amp;nbsp;said. Under Dutch law, the interior minister would have to sign off on such operations by foreign governments’ intelligence agencies. “I don’t believe that he has given his permission for these kind of actions.”&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 22px; margin: 0px 0px 28px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;The U.S. and British intelligence agencies pulled off the encryption key heist in great stealth, giving them the ability to intercept and decrypt communications without alerting the wireless network provider, the foreign government or the individual user that they have been targeted. “Gaining access to a database of keys is pretty much game over for cellular encryption,” says Matthew Green, a cryptography specialist at the Johns Hopkins Information Security Institute. The massive key theft is “bad news for phone security. Really bad news.”&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;img-wrap align-bleed width-auto&quot; style=&quot;background-clip: padding-box; background-color: white; border-radius: 0px; box-sizing: border-box; color: #222222; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 22px; margin-bottom: 32px; margin-left: -223px; margin-right: 0px; max-width: none; overflow: hidden; position: relative; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; width: 1056px; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;clear: left; float: left; font-family: Arial,Helvetica,sans-serif; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;att_sim&quot; class=&quot;aligncenter size-article-large wp-image-14199&quot; height=&quot;107&quot; src=&quot;https://prod01-cdn00.cdn.firstlook.org/wp-uploads/sites/1/2015/02/att_sim.jpg&quot; style=&quot;background-clip: padding-box; border-radius: 0px; border: 0px none; box-sizing: border-box; display: block; height: auto ! important; margin: 0px; max-width: 100%; width: 1056px;&quot; width=&quot;200&quot; /&gt;&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 22px; margin: 0px 0px 28px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;b style=&quot;box-sizing: border-box; font-weight: bold;&quot;&gt;&lt;span class=&quot;dropcap&quot; style=&quot;box-sizing: border-box; float: left; line-height: 44px; padding-right: 6px;&quot;&gt;&lt;/span&gt;&lt;/b&gt; As consumers began to adopt cellular phones en masse in the mid-1990s, there were no effective privacy protections in place. Anyone could buy a cheap device from RadioShack capable of intercepting calls placed on mobile phones. The shift from analog to digital networks introduced basic encryption technology, though it was still crackable by tech savvy computer science graduate students, as well as the FBI and other law enforcement agencies, using readily available equipment.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 22px; margin: 0px 0px 28px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;Today, second-generation (2G) phone technology, which relies on a deeply flawed encryption system, remains the dominant platform globally, though U.S. and European cellphone companies now use 3G, 4G and LTE technology in urban areas. These include more secure, though not invincible, methods of encryption, and wireless carriers throughout the world are upgrading their networks to use these newer technologies.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 22px; margin: 0px 0px 28px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;It is in the context of such growing technical challenges to data collection that intelligence agencies, such as the NSA, have become interested in acquiring cellular encryption keys. “With old-fashioned [2G], there are other ways to work around cellphone security without those keys,” says Green, the Johns Hopkins cryptographer. “With newer 3G, 4G and LTE protocols, however, the algorithms aren’t as vulnerable, so getting those keys would be essential.”&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 22px; margin: 0px 0px 28px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;The privacy of all mobile communications — voice calls, text messages and Internet access — depends on an encrypted connection between the cellphone and the wireless carrier’s network, using keys stored on the SIM, a tiny chip smaller than a postage stamp, which is inserted into the phone. All mobile communications on the phone depend on the SIM, which stores and guards the encryption keys created by companies like Gemalto. SIM cards can be used to store contacts, text messages, and other important data, like one’s phone number. In some countries, SIM cards are used to transfer money. As&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;i style=&quot;box-sizing: border-box; font-style: italic;&quot;&gt;The Intercept&lt;/i&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;https://firstlook.org/theintercept/2014/02/10/the-nsas-secret-role/&quot; style=&quot;background: none repeat scroll 0% 0% transparent; box-sizing: border-box; color: #df3f3d; text-decoration: none;&quot;&gt;reported&lt;/a&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;last year, having the wrong SIM card can make you the target of a drone strike.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 22px; margin: 0px 0px 28px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;SIM cards were not invented to protect individual communications — they were designed to do something much simpler: ensure proper billing and prevent fraud, which was pervasive in the early days of cellphones. Soghoian compares the use of encryption keys on SIM cards to the way Social Security numbers are used today. “Social security numbers were designed in the 1930s to track your contributions to your government pension,” he says. “Today they are used as a quasi national identity number, which was never their intended purpose.”&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 22px; margin: 0px 0px 28px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;Because the SIM card wasn’t created with call confidentiality in mind, the manufacturers and wireless carriers don’t make a great effort to secure their supply chain. As a result, the SIM card is an extremely vulnerable component of a mobile phone. “I doubt anyone is treating those things very carefully,” says Green. “Cell companies probably don’t treat them as essential security tokens. They probably just care that nobody is defrauding their networks.” The ACLU’s Soghoian adds, “These keys are so valuable that it makes sense for intel agencies to go after them.”&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 22px; margin: 0px 0px 28px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;As a general rule, phone companies do not manufacture SIM cards, nor program them with secret encryption keys. It is cheaper and more efficient for them to outsource this sensitive step in the SIM card production process. They purchase them in bulk with the keys pre-loaded by other corporations. Gemalto is the largest of these SIM “personalization” companies.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 22px; margin: 0px 0px 28px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;After a SIM card is manufactured, the encryption key, known as a “Ki,” is burned directly onto the chip. A copy of the key is also given to the cellular provider, allowing its network to recognize an individual’s phone. In order for the phone to be able to connect to the wireless carrier’s network, the phone — with the help of the SIM — authenticates itself using the Ki that has been programmed onto the SIM. The phone conducts a secret “handshake” that validates that the Ki on the SIM matches the Ki held by the mobile company. Once that happens, the communications between the phone and the network are encrypted. Even if GCHQ or the NSA were to intercept the phone signals as they are transmitted through the air, the intercepted data would be a garbled mess. Decrypting it can be challenging and time-consuming. Stealing the keys, on the other hand, is beautifully simple, from the intelligence agencies’ point of view, as the pipeline for producing and distributing SIM cards was never designed to thwart mass surveillance efforts.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 22px; margin: 0px 0px 28px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;One of the creators of the encryption protocol that is widely used today for securing emails, Adi Shamir, famously asserted: “Cryptography is typically bypassed, not penetrated.” In other words, it is much easier (and sneakier) to open a locked door when you have the key than it is to break down the door using brute force. While the NSA and GCHQ have substantial resources dedicated to breaking encryption, it is not the only way — and certainly not always the most efficient — to get at the data they want. “NSA has more mathematicians on its payroll than any other entity in the U.S.,” says the ACLU’s Soghoian. “But the NSA’s hackers are way busier than its mathematicians.”&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 22px; margin: 0px 0px 28px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;GCHQ and the NSA could have taken any number of routes to steal SIM encryption keys and other data. They could have physically broken into a manufacturing plant. They could have broken into a wireless carrier’s office. They could have bribed, blackmailed or coerced an employee of the manufacturer or cellphone provider. But all of that comes with substantial risk of exposure. In the case of Gemalto, hackers working for GCHQ remotely penetrated the company’s computer network in order to steal the keys in bulk as they were en route to the wireless network providers.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 22px; margin: 0px 0px 28px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;SIM card “personalization” companies like Gemalto ship hundreds of thousands of SIM cards at a time to mobile phone operators across the world. International shipping records obtained by&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;i style=&quot;box-sizing: border-box; font-style: italic;&quot;&gt;The Intercept&lt;/i&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;show that in 2011, Gemalto shipped 450,000 smart cards from its plant in Mexico to Germany’s Deutsche Telekom in just one shipment.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 22px; margin: 0px 0px 28px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;In order for the cards to work and for the phones’ communications to be secure, Gemalto also needs to provide the mobile company with a file containing the encryption keys for each of the new SIM cards. These master key files could be shipped via FedEx, DHL, UPS or another snail mail provider. More commonly, they could be sent via email or through File Transfer Protocol, FTP, a method of sending files over the Internet.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 22px; margin: 0px 0px 28px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;The moment the master key set is generated by Gemalto or another personalization company, but before it is sent to the wireless carrier, is the most vulnerable moment for interception. “The value of getting them at the point of manufacture is you can presumably get a lot of keys in one go, since SIM chips get made in big batches,” says Green, the cryptographer. “SIM cards get made for lots of different carriers in one facility.” In Gemalto’s case, GCHQ hit the jackpot, as the company manufactures SIMs for hundreds of wireless network providers, including all of the leading U.S.— and many of the largest European — companies.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 22px; margin: 0px 0px 28px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;But obtaining the encryption keys while Gemalto still held them required finding a way into the company’s internal systems.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;img-wrap align-center width-fixed&quot; style=&quot;background-clip: padding-box; background-color: white; border-radius: 2px; box-sizing: border-box; color: #222222; display: block; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 22px; margin-bottom: 28px; margin-left: auto ! important; margin-right: auto ! important; max-width: 100%; overflow: hidden; position: relative; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; width: 540px; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;clear: left; float: left; font-family: Arial,Helvetica,sans-serif; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;&quot; class=&quot;aligncenter size-article-medium wp-image-14257&quot; height=&quot;260&quot; src=&quot;https://prod01-cdn00.cdn.firstlook.org/wp-uploads/sites/1/2015/02/key-slide-540x351.png&quot; style=&quot;background-clip: padding-box; border-radius: 3px; border: 0px none; box-sizing: border-box; display: block; height: auto ! important; margin: 0px; max-width: 100%;&quot; width=&quot;400&quot; /&gt;&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;caption&quot; style=&quot;box-sizing: border-box; color: #999999; font-style: italic; margin: 0px;&quot;&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;Diagram from a top-secret GCHQ slide.&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 22px; margin: 0px 0px 28px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;b style=&quot;box-sizing: border-box; font-weight: bold;&quot;&gt;&lt;span class=&quot;dropcap&quot; style=&quot;box-sizing: border-box; float: left; line-height: 44px; padding-right: 6px;&quot;&gt;&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&lt;/span&gt;Top-Secret GCHQ documents reveal that the intelligence agencies accessed the email and Facebook accounts of engineers and other employees of major telecom corporations and SIM card manufacturers in an effort to secretly obtain information that could give them access to millions of encryption keys. They did this by utilizing the NSA’s X-KEYSCORE program, which allowed them access to private emails hosted by the SIM card and mobile companies’ servers, as well as those of major tech corporations, including Yahoo and Google.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 22px; margin: 0px 0px 28px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;In effect, GCHQ clandestinely&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;https://firstlook.org/theintercept/document/2015/02/19/dapino-gamma-gemalto-yuaawaa-wiki/&quot; style=&quot;background: none repeat scroll 0% 0% transparent; box-sizing: border-box; color: #df3f3d; text-decoration: none;&quot;&gt;cyberstalked&lt;/a&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;Gemalto employees, scouring their emails in an effort to find people who may have had access to the company’s core networks and Ki-generating systems. The intelligence agency’s goal was to find information that would aid in breaching Gemalto’s systems, making it possible to steal large quantities of encryption keys. The agency hoped to intercept the files containing the keys as they were transmitted between Gemalto and its wireless network provider customers.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 22px; margin: 0px 0px 28px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;GCHQ operatives identified key individuals and their positions within Gemalto and then dug into their emails. In one instance, GCHQ zeroed in on a Gemalto employee in Thailand who they&amp;nbsp;observed sending PGP-encrypted files, noting that if GCHQ wanted to expand its Gemalto operations, “he would certainly be a good place to start.” They did not claim to have decrypted the employee’s communications, but noted that the use of PGP could mean the contents were potentially valuable.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 22px; margin: 0px 0px 28px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;The cyberstalking was not limited to Gemalto. GCHQ operatives wrote a script that allowed the agency to mine the private communications of employees of major telecommunications and SIM “personalization” companies for technical terms used in the assigning of secret keys to mobile phone customers. Employees for the SIM card manufacturers and wireless network providers were labeled as “known individuals and operators targeted” in a top-secret GCHQ document.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 22px; margin: 0px 0px 28px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;According to that April 2010&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;https://firstlook.org/theintercept/document/2015/02/19/pcs-harvesting-scale/&quot; style=&quot;background: none repeat scroll 0% 0% transparent; box-sizing: border-box; color: #df3f3d; text-decoration: none;&quot;&gt;document&lt;/a&gt;, “PCS Harvesting at Scale,” hackers working for GCHQ focused on “harvesting” massive amounts of individual encryption keys “in transit between mobile network operators and SIM card personalisation centres” like Gemalto. The spies “developed a methodology for intercepting these keys as they are transferred between various network operators and SIM card providers.” By that time, GCHQ had developed “an automated technique with the aim of increasing the volume of keys that can be harvested.”&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 22px; margin: 0px 0px 28px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;The PCS Harvesting document acknowledged that, in searching for information on encryption keys, GCHQ operatives would undoubtedly vacuum up “a large number of unrelated items” from the private communications of targeted employees. “[H]owever an analyst with good knowledge of the operators involved can perform this trawl regularly and spot the transfer of large batches of [keys].”&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 22px; margin: 0px 0px 28px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;The document noted that many SIM card manufacturers transferred the encryption keys to wireless network providers “by email or FTP with simple encryption methods that can be broken … or occasionally with no encryption at all.” To get bulk access to encryption keys, all the NSA or GCHQ needed to do was intercept emails or file transfers as they were sent over the Internet — something both agencies already do millions of times per day. A footnote in the 2010 document observed that the use of “strong encryption products … is becoming increasingly common” in transferring the keys.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 22px; margin: 0px 0px 28px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;In its key harvesting “trial” operations in the first quarter of 2010, GCHQ successfully&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;https://firstlook.org/theintercept/document/2015/02/19/imsis-identified-ki-data-network-providers-jan10-mar10-trial/&quot; style=&quot;background: none repeat scroll 0% 0% transparent; box-sizing: border-box; color: #df3f3d; text-decoration: none;&quot;&gt;intercepted&lt;/a&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;keys used by wireless network providers in Iran, Afghanistan, Yemen, India, Serbia, Iceland and Tajikistan. But, the agency noted, its automated key harvesting system failed to produce results against Pakistani networks, denoted as “priority targets” in the document, despite the fact that GCHQ had a store of Kis from two providers in the country, Mobilink and Telenor. “[I]t is possible that these networks now use more secure methods to transfer Kis,” the document concluded.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 22px; margin: 0px 0px 28px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;From December 2009 through March 2010, a month before the Mobile Handset Exploitation Team was formed, GCHQ conducted a number of trials aimed at extracting encryption keys and other personalized data for individual phones. In one two-week period, they accessed the emails of 130 people associated with wireless network providers or SIM card manufacturing and personalization. This operation produced nearly 8,000 keys matched to specific phones in 10 countries. In another two-week period, by mining just six email addresses, they produced 85,000 keys. At one point in March 2010, GCHQ intercepted nearly 100,000 keys for mobile phone users in Somalia. By June, they’d&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;https://firstlook.org/theintercept/document/2015/02/19/ccne-successes-jan10-mar10-trial/&quot; style=&quot;background: none repeat scroll 0% 0% transparent; box-sizing: border-box; color: #df3f3d; text-decoration: none;&quot;&gt;compiled&lt;/a&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;300,000. “Somali providers are not on GCHQ’s list of interest,” the document noted. “[H]owever, this was usefully shared with NSA.”&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 22px; margin: 0px 0px 28px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;The GCHQ documents only contain statistics for three months of encryption key theft in 2010. During this period, millions of keys were harvested. The documents stated explicitly that GCHQ had already created a constantly evolving automated process for bulk harvesting of keys. They describe active operations targeting Gemalto’s personalization centers across the globe, as well as other major SIM card manufacturers and the private communications of their employees.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 22px; margin: 0px 0px 28px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;A top-secret NSA document asserted that, as of 2009, the U.S. spy agency already had the capacity to process between 12 and 22 million keys per second for later use against surveillance targets. In the future, the agency predicted, it would be capable of processing more than 50 million per second. The document did not state how many keys were actually processed, just that the NSA had the technology to perform such swift, bulk operations. It is impossible to know how many keys have been stolen by the NSA and GCHQ to date, but, even using conservative math, the numbers are likely staggering.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 22px; margin: 0px 0px 28px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;GCHQ assigned “scores” to more than 150 individual email addresses based on how often the users mentioned certain technical terms, and then intensified the mining of those individuals’ accounts based on priority. The highest-scoring email address was that of an employee of Chinese tech giant Huawei, which the U.S. has repeatedly accused of collaborating with Chinese intelligence. In all, GCHQ harvested the emails of employees of hardware companies that manufacture phones, such as Ericsson and Nokia; operators of mobile networks, such as MTN Irancell and Belgacom; SIM card providers, such as Bluefish and Gemalto; and employees of targeted companies who used email providers, such as Yahoo and Google. During the three-month trial, the largest number of email addresses harvested were those belonging to Huawei employees, followed by MTN Irancell. The third largest class of emails harvested in the trial were private Gmail accounts, presumably belonging to employees at targeted companies.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;blockquote class=&quot;stylized pull-center&quot; style=&quot;background-color: white; border-bottom: 1px dotted rgba(0, 0, 0, 0.098); border-left-style: none; border-top: 1px dotted rgba(0, 0, 0, 0.098); box-sizing: border-box; color: #222222; font-style: italic; font-variant: normal; font-weight: bold; letter-spacing: normal; line-height: 28px; margin-bottom: 20px; margin-left: 15px; padding: 20px 0px; text-align: start; text-indent: 0px; text-transform: uppercase; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;“PEOPLE WERE SPECIFICALLY HUNTED AND TARGETED BY INTELLIGENCE AGENCIES, NOT BECAUSE THEY DID ANYTHING WRONG, BUT BECAUSE THEY COULD BE USED.”&lt;/span&gt;&lt;/span&gt;&lt;/blockquote&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 22px; margin: 0px 0px 28px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;The GCHQ program targeting Gemalto was called DAPINO GAMMA. In 2011, GCHQ launched operation HIGHLAND FLING to mine the email accounts of Gemalto employees in France and Poland. A top-secret document on the operation stated that one of the aims was “getting into French HQ” of Gemalto “to get in to core data repositories.” France, home to one of Gemalto’s global headquarters, is the nerve center of the company’s worldwide operations. Another goal was to intercept private communications of employees in Poland that “could lead to penetration into one or more personalisation centers” — the factories where the encryption keys are burned onto SIM cards.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 22px; margin: 0px 0px 28px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;As part of these operations, GCHQ operatives acquired the usernames and passwords for Facebook accounts of Gemalto targets. An internal top-secret GCHQ wiki on the program from May 2011 indicated that GCHQ was in the process of “targeting” more than a dozen Gemalto facilities across the globe, including in Germany, Mexico, Brazil, Canada, China, India, Italy, Russia, Sweden, Spain, Japan and Singapore.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 22px; margin: 0px 0px 28px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;The document also stated that GCHQ was preparing similar key theft operations against one of Gemalto’s competitors, Germany-based SIM card giant Giesecke and Devrient.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 22px; margin: 0px 0px 28px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;On January 17, 2014, President Barack Obama gave a major address on the NSA spying scandal. “The bottom line is that people around the world, regardless of their nationality, should know that the United States is not spying on ordinary people who don’t threaten our national security and that we take their privacy concerns into account in our policies and procedures,” he said.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 22px; margin: 0px 0px 28px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;The monitoring of the lawful communications of employees of major international corporations shows that such statements by Obama, other U.S. officials and British leaders — that they only intercept and monitor the communications of known or suspected criminals or terrorists — were untrue. “The NSA and GCHQ view the private communications of people who work for these companies as fair game,” says the ACLU’s Soghoian. “These people were specifically hunted and targeted by intelligence agencies, not because they did anything wrong, but because they could be used as a means to an end.”&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;img-wrap align-bleed width-auto&quot; style=&quot;background-clip: padding-box; background-color: white; border-radius: 0px; box-sizing: border-box; color: #222222; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 22px; margin-bottom: 32px; margin-left: -223px; margin-right: 0px; max-width: none; overflow: hidden; position: relative; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; width: 1056px; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;clear: left; float: left; font-family: Arial,Helvetica,sans-serif; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;key-slide2&quot; class=&quot;aligncenter size-article-large wp-image-14294&quot; height=&quot;109&quot; src=&quot;https://prod01-cdn01.cdn.firstlook.org/wp-uploads/sites/1/2015/02/key-slide2.png&quot; style=&quot;background-clip: padding-box; border-radius: 0px; border: 0px none; box-sizing: border-box; display: block; height: auto ! important; margin: 0px; max-width: 100%; width: 1056px;&quot; width=&quot;200&quot; /&gt;&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 22px; margin: 0px 0px 28px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;b style=&quot;box-sizing: border-box; font-weight: bold;&quot;&gt;&lt;span class=&quot;dropcap&quot; style=&quot;box-sizing: border-box; float: left; line-height: 44px; padding-right: 6px;&quot;&gt;&lt;/span&gt;&lt;/b&gt;There are two basic types of electronic or digital surveillance: passive and active. All intelligence agencies engage in extensive passive surveillance, which means they collect bulk data by intercepting communications sent over fiber-optic cables, radio waves or wireless devices.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 22px; margin: 0px 0px 28px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;Intelligence agencies place high-power antennas, known as “spy nests,” on the top of their countries’ embassies and consulates, which are capable of vacuuming up data sent to or from mobile phones in the surrounding area. The joint NSA/CIA Special Collection Service is the lead entity that installs and mans these nests for the United States. An embassy situated near a parliament or government agency could easily intercept the phone calls and data transfers of the mobile phones used by foreign government officials. The U.S. embassy in Berlin, for instance, is located a stone’s throw from the Bundestag. But if the wireless carriers are using stronger encryption, which is built into modern 3G, 4G and LTE networks, then intercepted calls and other data would be more difficult to crack, particularly in bulk. If the intelligence agency wants to actually listen to or read what is being transmitted, they would need to decrypt the encrypted data.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 22px; margin: 0px 0px 28px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;Active surveillance is another option. This would require government agencies to “jam” a 3G or 4G network, forcing nearby phones onto 2G. Once forced down to the less secure 2G technology, the phone can be tricked into connecting to a fake cell tower operated by an intelligence agency. This method of surveillance, though effective, is risky, as it leaves a digital trace that counter-surveillance experts from foreign governments could detect.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 22px; margin: 0px 0px 28px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;Stealing the Kis solves all of these problems. This way, intelligence agencies can safely engage in passive, bulk surveillance without having to decrypt data and without leaving any trace whatsoever.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 22px; margin: 0px 0px 28px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;“Key theft enables the bulk, low-risk surveillance of encrypted communications,” the ACLU’s Soghoian says. “Agencies can collect all the communications and then look through them later. With the keys, they can decrypt whatever they want, whenever they want. It’s like a time machine, enabling the surveillance of communications that occurred before someone was even a target.”&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 22px; margin: 0px 0px 28px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;Neither the NSA nor GCHQ would comment specifically on the key theft operations. In the past, they have argued more broadly that breaking encryption is a necessary part of tracking terrorists and other criminals. “It is longstanding policy that we do not comment on intelligence matters,” a GCHQ official stated in an email, adding that the agency’s work is conducted within a “strict legal and policy framework” that ensures its activities are “authorized, necessary and proportionate,” with proper oversight, which is the standard response the agency has provided for previous stories published by&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;i style=&quot;box-sizing: border-box; font-style: italic;&quot;&gt;The Intercept&lt;/i&gt;. The agency also said, “[T]he UK’s interception regime is entirely compatible with the European Convention on Human Rights.” The NSA declined to offer any comment.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 22px; margin: 0px 0px 28px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;It is unlikely that GCHQ’s pronouncement about the legality of its operations will be universally embraced in Europe. “It is governments massively engaging in illegal activities,” says Sophie in’t Veld, a Dutch member of the European Parliament. “If you are not a government and you are a student doing this, you will end up in jail for 30 years.” Veld, who chaired the European Parliament’s recent inquiry into mass surveillance exposed by Snowden, told&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;i style=&quot;box-sizing: border-box; font-style: italic;&quot;&gt;The Intercept&lt;/i&gt;: “The secret services are just behaving like cowboys. Governments are behaving like cowboys and nobody is holding them to account.”&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 22px; margin: 0px 0px 28px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;i style=&quot;box-sizing: border-box; font-style: italic;&quot;&gt;The Intercept&lt;/i&gt;’s Laura Poitras has&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.nytimes.com/2014/02/16/us/eavesdropping-ensnared-american-law-firm.html&quot; style=&quot;background: none repeat scroll 0% 0% transparent; box-sizing: border-box; color: #df3f3d; text-decoration: none;&quot;&gt;previously reported&lt;/a&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;that in 2013 Australia’s signals intelligence agency, a close partner of the NSA, stole some 1.8 million encryption keys from an Indonesian wireless carrier.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 22px; margin: 0px 0px 28px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;A few years ago, the FBI&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.amazon.com/Deep-State-Government-Secrecy-Industry/dp/1118146689&quot; style=&quot;background: none repeat scroll 0% 0% transparent; box-sizing: border-box; color: #df3f3d; text-decoration: none;&quot;&gt;reportedly&lt;/a&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;dismantled several transmitters set up by foreign intelligence agencies around the Washington, D.C. area, which could be used to intercept cellphone communications. Russia, China, Israel and other nations use similar technology as the NSA across the world. If those governments had the encryption keys for major U.S. cellphone companies’ customers, such as those manufactured by Gemalto, mass snooping would be simple. “It would mean that with a few antennas placed around Washington, D.C., the Chinese or Russian governments could sweep up and decrypt the communications of members of Congress, U.S. agency heads, reporters, lobbyists and everyone else involved in the policymaking process and decrypt their telephone conversations,” says Soghoian.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 22px; margin: 0px 0px 28px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;“Put a device in front of the U.N., record every bit you see going over the air. Steal some keys, you have all those conversations,” says Green, the Johns Hopkins cryptographer. And it’s not just spy agencies that would benefit from stealing encryption keys. “I can only imagine how much money you could make if you had access to the calls made around Wall Street,” he adds.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;img-wrap align-center width-fixed&quot; style=&quot;background-clip: padding-box; background-color: white; border-radius: 2px; box-sizing: border-box; color: #222222; display: block; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 22px; margin-bottom: 28px; margin-left: auto ! important; margin-right: auto ! important; max-width: 100%; overflow: hidden; position: relative; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; width: 540px; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;clear: left; float: left; font-family: Arial,Helvetica,sans-serif; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;&quot; class=&quot;aligncenter size-article-medium wp-image-14315&quot; height=&quot;239&quot; src=&quot;https://prod01-cdn02.cdn.firstlook.org/wp-uploads/sites/1/2015/02/gemalto-slide-540x404.png&quot; style=&quot;background-clip: padding-box; border-radius: 3px; border: 0px none; box-sizing: border-box; display: block; height: auto ! important; margin: 0px; max-width: 100%;&quot; width=&quot;320&quot; /&gt;&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;caption&quot; style=&quot;box-sizing: border-box; color: #999999; font-style: italic; margin: 0px;&quot;&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;GCHQ slide.&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 22px; margin: 0px 0px 28px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;b style=&quot;box-sizing: border-box; font-weight: bold;&quot;&gt;&lt;span class=&quot;dropcap&quot; style=&quot;box-sizing: border-box; float: left; line-height: 44px; padding-right: 6px;&quot;&gt;&lt;/span&gt;&lt;/b&gt; The breach of Gemalto’s computer network by GCHQ has far-reaching global implications. The company, which brought in $2.7 billion in revenue in 2013, is a global leader in digital security, producing banking cards, mobile payment systems, two-factor authentication devices used for online security, hardware tokens used for securing buildings and offices, electronic passports and identification cards. It provides chips to Vodafone in Europe and France’s Orange, as well as EE, a joint venture in the U.K. between France Telecom and Deutsche Telekom. Royal KPN, the largest Dutch wireless network provider, also uses Gemalto technology.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 22px; margin: 0px 0px 28px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;In Asia, Gemalto’s chips are used by China Unicom, Japan’s NTT and Taiwan’s Chungwa Telecom, as well as scores of wireless network providers throughout Africa and the Middle East. The company’s security technology is used by more than 3,000 financial institutions and 80 government organizations. Among its clients are Visa, Mastercard, American Express, JP Morgan Chase and Barclays. It also provides chips for use in luxury cars, including those made by Audi and BMW.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 22px; margin: 0px 0px 28px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;In 2012, Gemalto won a sizable contract, worth $175 million, from the U.S. government to produce the covers for electronic U.S. passports, which contain chips and antennas that can be used to better authenticate travelers. As part of its contract, Gemalto provides the personalization and software for the microchips implanted in the passports. The U.S. represents Gemalto’s single largest market, accounting for some 15 percent of its total business. This raises the question of whether GCHQ, which was able to bypass encryption on mobile networks, has the ability to access private data protected by other Gemalto products created for banks and governments.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 22px; margin: 0px 0px 28px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;As smart phones become smarter, they are increasingly replacing credit cards and cash as a means of paying for goods and services. When Verizon, AT&amp;amp;T and T-Mobile formed an alliance in 2010 to jointly build an electronic pay system to challenge Google Wallet and Apple Pay, they purchased Gemalto’s technology for their program, known as Softcard. (Until July 2014, it previously went by the unfortunate name of “ISIS Mobile Wallet.”) Whether data relating to that, and other Gemalto security products, has been compromised by GCHQ and the NSA is unclear. Both intelligence agencies declined to answer any specific questions for this story.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;img-wrap align-center width-fixed&quot; style=&quot;background-clip: padding-box; background-color: white; border-radius: 2px; box-sizing: border-box; color: #222222; display: block; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 22px; margin-bottom: 28px; margin-left: auto ! important; margin-right: auto ! important; max-width: 100%; overflow: hidden; position: relative; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; width: 540px; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;clear: left; float: left; font-family: Arial,Helvetica,sans-serif; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;&quot; class=&quot;aligncenter size-article-medium wp-image-14198&quot; height=&quot;200&quot; src=&quot;https://prod01-cdn01.cdn.firstlook.org/wp-uploads/sites/1/2015/02/signal.jpg&quot; style=&quot;background-clip: padding-box; border-radius: 3px; border: 0px none; box-sizing: border-box; display: block; height: auto ! important; margin: 0px; max-width: 100%;&quot; width=&quot;320&quot; /&gt;&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;caption&quot; style=&quot;box-sizing: border-box; color: #999999; font-style: italic; margin: 0px;&quot;&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;Signal, iMessage, WhatsApp, Silent Phone.&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 22px; margin: 0px 0px 28px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;b style=&quot;box-sizing: border-box; font-weight: bold;&quot;&gt;&lt;span class=&quot;dropcap&quot; style=&quot;box-sizing: border-box; float: left; line-height: 44px; padding-right: 6px;&quot;&gt;&lt;/span&gt;&lt;/b&gt; Privacy advocates and security experts say it would take billions of dollars, significant political pressure, and several years to fix the fundamental security flaws in the current mobile phone system that NSA, GCHQ and other intelligence agencies regularly exploit.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 22px; margin: 0px 0px 28px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;A current gaping hole in the protection of mobile communications is that cellphones and wireless network providers do not support the use of Perfect Forward Security (PFS), a form of encryption designed to limit the damage caused by theft or disclosure of encryption keys. PFS, which is now built into modern web browsers and used by sites like Google and Twitter, works by generating unique encryption keys for each communication or message, which are then discarded. Rather than using the same encryption key to protect years’ worth of data, as the permanent Kis on SIM cards can, a new key might be generated each minute, hour or day, and then promptly destroyed. Because cellphone communications do not utilize PFS, if an intelligence agency has been “passively” intercepting someone’s communications for a year and later acquires the permanent encryption key, it can go back and decrypt all of those communications. If mobile phone networks were using PFS, that would not be possible — even if the permanent keys were later stolen.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 22px; margin: 0px 0px 28px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;The only effective way for individuals to protect themselves from Ki theft-enabled surveillance is to use secure communications software, rather than relying on SIM card-based security. Secure software includes email and other apps that use Transport Layer Security (TLS), the mechanism underlying the secure HTTPS web protocol. The email clients included with Android phones and iPhones support TLS, as do large email providers like Yahoo and Google.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 22px; margin: 0px 0px 28px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;Apps like TextSecure and Silent Text are secure alternatives to SMS messages, while Signal, RedPhone and Silent Phone encrypt voice communications. Governments still may be able to intercept communications, but reading or listening to them would require hacking a specific handset, obtaining internal data from an email provider, or installing a bug in a room to record the conversations.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 22px; margin: 0px 0px 28px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;“We need to stop assuming that the phone companies will provide us with a secure method of making calls or exchanging text messages,” says Soghoian.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; background-color: white; box-sizing: border-box; color: #222222; font-family: pt-serif, Helvetica, Arial, sans-serif; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 22px; margin: 0px 0px 28px; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
&lt;i style=&quot;box-sizing: border-box; font-style: italic;&quot;&gt;Documents published with this article:&lt;/i&gt;&lt;/div&gt;
&lt;ul style=&quot;-webkit-text-stroke-width: 0px; background-color: white; box-sizing: border-box; color: #222222; font-family: pt-serif, Helvetica, Arial, sans-serif; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 22px; margin: 0px 0px 28px; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
&lt;li style=&quot;box-sizing: border-box;&quot;&gt;&lt;a href=&quot;https://firstlook.org/theintercept/document/2015/02/19/cne-access-core-mobile-networks-2/&quot; style=&quot;background: transparent; box-sizing: border-box; color: #df3f3d; text-decoration: none;&quot;&gt;CNE Access to Core Mobile Networks&lt;/a&gt;&lt;/li&gt;
&lt;li style=&quot;box-sizing: border-box;&quot;&gt;&lt;a href=&quot;https://firstlook.org/theintercept/document/2015/02/19/keys/&quot; style=&quot;background: transparent; box-sizing: border-box; color: #df3f3d; text-decoration: none;&quot;&gt;Where Are These Keys?&lt;/a&gt;&lt;/li&gt;
&lt;li style=&quot;box-sizing: border-box;&quot;&gt;&lt;a href=&quot;https://firstlook.org/theintercept/document/2015/02/19/ccne-successes-jan10-mar10-trial/&quot; style=&quot;background: transparent; box-sizing: border-box; color: #df3f3d; text-decoration: none;&quot;&gt;CCNE Successes Jan10-Mar10 Trial&lt;/a&gt;&lt;/li&gt;
&lt;li style=&quot;box-sizing: border-box;&quot;&gt;&lt;a href=&quot;https://firstlook.org/theintercept/document/2015/02/19/dapino-gamma-cne-presence-wiki/&quot; style=&quot;background: transparent; box-sizing: border-box; color: #df3f3d; text-decoration: none;&quot;&gt;DAPINO GAMMA CNE Presence Wiki&lt;/a&gt;&lt;/li&gt;
&lt;li style=&quot;box-sizing: border-box;&quot;&gt;&lt;a href=&quot;https://firstlook.org/theintercept/document/2015/02/19/dapino-gamma-gemalto-yuaawaa-wiki/&quot; style=&quot;background: transparent; box-sizing: border-box; color: #df3f3d; text-decoration: none;&quot;&gt;DAPINO GAMMA Gemalto Yuaawaa Wiki&lt;/a&gt;&lt;/li&gt;
&lt;li style=&quot;box-sizing: border-box;&quot;&gt;&lt;a href=&quot;https://firstlook.org/theintercept/document/2015/02/19/dapino-gamma-target-personalisation-centres-gemalto-wiki/&quot; style=&quot;background: transparent; box-sizing: border-box; color: #df3f3d; text-decoration: none;&quot;&gt;DAPINO GAMMA Target Personalisation Centres Gemalto Wiki&lt;/a&gt;&lt;/li&gt;
&lt;li style=&quot;box-sizing: border-box;&quot;&gt;&lt;a href=&quot;https://firstlook.org/theintercept/document/2015/02/19/imsis-identified-ki-data-network-providers-jan10-mar10-trial/&quot; style=&quot;background: transparent; box-sizing: border-box; color: #df3f3d; text-decoration: none;&quot;&gt;IMSIs Identified with Ki Data for Network Providers Jan10-Mar10 Trial&lt;/a&gt;&lt;/li&gt;
&lt;li style=&quot;box-sizing: border-box;&quot;&gt;&lt;a href=&quot;https://firstlook.org/theintercept/document/2015/02/19/ccne-stats-summaries-jan10-mar10-trial/&quot; style=&quot;background: transparent; box-sizing: border-box; color: #df3f3d; text-decoration: none;&quot;&gt;CCNE Stats Summaries Jan10-Mar10 Trial&lt;/a&gt;&lt;/li&gt;
&lt;li style=&quot;box-sizing: border-box;&quot;&gt;&lt;a href=&quot;https://firstlook.org/theintercept/document/2015/02/19/ccne-email-harvesting-jan10-mar10-trial/&quot; style=&quot;background: transparent; box-sizing: border-box; color: #df3f3d; text-decoration: none;&quot;&gt;CCNE Email Harvesting Jan10-Mar10 Trial&lt;/a&gt;&lt;/li&gt;
&lt;li style=&quot;box-sizing: border-box;&quot;&gt;&lt;a href=&quot;https://firstlook.org/theintercept/document/2015/02/19/ccne-email-addresses-jan10-mar10-trial/&quot; style=&quot;background: transparent; box-sizing: border-box; color: #df3f3d; text-decoration: none;&quot;&gt;CCNE Email Addresses Jan10-Mar10 Trial&lt;/a&gt;&lt;/li&gt;
&lt;li style=&quot;box-sizing: border-box;&quot;&gt;&lt;a href=&quot;https://firstlook.org/theintercept/document/2015/02/19/pcs-harvesting-scale/&quot; style=&quot;background: transparent; box-sizing: border-box; color: #df3f3d; text-decoration: none;&quot;&gt;PCS Harvesting at Scale&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; background-color: white; box-sizing: border-box; color: #222222; font-family: pt-serif, Helvetica, Arial, sans-serif; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 22px; margin: 0px 0px 28px; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
&lt;i style=&quot;box-sizing: border-box; font-style: italic;&quot;&gt;Additional reporting by Andrew Fishman and Ryan Gallagher. Sheelagh McNeill, Morgan Marquis-Boire, Alleen Brown, Margot Williams, Ryan Devereaux and Andrea Jones contributed to this story. Erin O’Rourke provided additional assistance&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 22px; margin: 0px 0px 28px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;Article Source:&amp;nbsp; &lt;a href=&quot;https://firstlook.org/theintercept/2015/02/19/great-sim-heist/&quot;&gt;https://firstlook.org/theintercept/2015/02/19/great-sim-heist/&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 22px; margin: 0px 0px 28px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;______________&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</description><link>http://news2u.blogspot.com/2015_02_01_archive.html#665674658122564844</link><author>noreply@blogger.com (Unknown)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5604605.post-7659945509389416795</guid><pubDate>Sun, 01 Feb 2015 22:25:00 +0000</pubDate><atom:updated>2015-02-01T17:25:11.197-05:00</atom:updated><title>Government Health Care Website Quietly Sharing Personal Data</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
Associated Prewss&lt;br /&gt;By Ricardo Alonso-Zaldivar and Jack Gillum&lt;br /&gt;Jan 20, 2015&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; background-color: white; color: black; font-family: Helvetica; font-size: 14.6666669845581px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
The government&#39;s health insurance website is quietly sending consumers&#39; personal data to private companies that specialize in advertising and analyzing Internet data for performance and marketing, The Associated Press has learned.&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; background-color: white; color: black; font-family: Helvetica; font-size: 14.6666669845581px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; background-color: white; color: black; font-family: Helvetica; font-size: 14.6666669845581px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
The scope of what is disclosed or how it might be used was not immediately clear, but it can include age, income, ZIP code, whether a person smokes, and if a person is pregnant. It can include a computer&#39;s Internet address, which can identify a person&#39;s name or address when combined with other information collected by sophisticated online marketing or advertising firms.&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; background-color: white; color: black; font-family: Helvetica; font-size: 14.6666669845581px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; background-color: white; color: black; font-family: Helvetica; font-size: 14.6666669845581px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
The Obama administration says HealthCare.gov&#39;s connections to data firms were intended to help improve the consumer experience. Officials said outside firms are barred from using the data to further their own business interests.&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; background-color: white; color: black; font-family: Helvetica; font-size: 14.6666669845581px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; background-color: white; color: black; font-family: Helvetica; font-size: 14.6666669845581px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
There is no evidence that personal information has been misused. But connections to dozens of third-party tech firms were documented by technology experts who analyzed HealthCare.gov and then confirmed by AP. A handful of the companies were also collecting highly specific information. That combination is raising concerns.&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; background-color: white; color: black; font-family: Helvetica; font-size: 14.6666669845581px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; background-color: white; color: black; font-family: Helvetica; font-size: 14.6666669845581px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
Leading lawmakers on Tuesday asked the administration to explain how it oversees the data firms to make sure no personally identifiable information is improperly used or shared.&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; background-color: white; color: black; font-family: Helvetica; font-size: 14.6666669845581px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; background-color: white; color: black; font-family: Helvetica; font-size: 14.6666669845581px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
&quot;&lt;i&gt;This new information is extremely concerning, not only because it violates the privacy of millions of Americans, but because it may potentially compromise their security,&lt;/i&gt;&quot; Sens. Orrin Hatch, R-Utah, and Charles Grassley, R-Iowa, wrote to the administration.&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; background-color: white; color: black; font-family: Helvetica; font-size: 14.6666669845581px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; background-color: white; color: black; font-family: Helvetica; font-size: 14.6666669845581px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
Created under the president&#39;s health care law, HealthCare.gov is the online gateway to government-subsidized private insurance for people who lack coverage on the job. It serves consumers in 37 states, while the remaining states operate their own insurance markets.&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; background-color: white; color: black; font-family: Helvetica; font-size: 14.6666669845581px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; background-color: white; color: black; font-family: Helvetica; font-size: 14.6666669845581px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
A former White House chief information officer, Theresa Payton, said third-party vendors are a weak link on any website. She questioned both the number of vendors on HealthCare.gov and the specific details some of them are collecting.&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; background-color: white; color: black; font-family: Helvetica; font-size: 14.6666669845581px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; background-color: white; color: black; font-family: Helvetica; font-size: 14.6666669845581px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
&quot;&lt;i&gt;You don&#39;t need all of that data to do customer service&lt;/i&gt;,&quot; said Payton, who served under President George W. Bush. &quot;&lt;i&gt;We know hackers are just waiting at the door, salivating to get at this data&lt;/i&gt;.&quot;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; background-color: white; color: black; font-family: Helvetica; font-size: 14.6666669845581px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; background-color: white; color: black; font-family: Helvetica; font-size: 14.6666669845581px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
The privacy concerns come against the backdrop of President Barack Obama&#39;s new initiative to protect personal data online. Separately, the administration is getting the health care website ready for the final enrollment drive of 2015, aiming to have more than 9 million people signed up by Feb. 15 for subsidized private coverage.&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; background-color: white; color: black; font-family: Helvetica; font-size: 14.6666669845581px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; background-color: white; color: black; font-family: Helvetica; font-size: 14.6666669845581px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
Administration spokesman Aaron Albright said outside vendors &quot;&lt;i&gt;are prohibited from using information from these tools on HealthCare.gov for their companies&#39; purposes&lt;/i&gt;.&quot; The government uses them to measure the performance of HealthCare.gov so consumers get &lt;i&gt;&quot;a simpler, more streamlined and intuitive experience&lt;/i&gt;,&quot; he said.&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; background-color: white; color: black; font-family: Helvetica; font-size: 14.6666669845581px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; background-color: white; color: black; font-family: Helvetica; font-size: 14.6666669845581px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
&lt;b&gt;The administration did not explain how it ensures that companies were following the government&#39;s privacy and security policies.&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; background-color: white; color: black; font-family: Helvetica; font-size: 14.6666669845581px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; background-color: white; color: black; font-family: Helvetica; font-size: 14.6666669845581px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
Albright said HealthCare.gov comports with standards set by the federal National Institute for Standards and Technology. But recent NIST guidance cautions that collecting bits of seemingly random data can be used to piece together someone&#39;s identity.&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; background-color: white; color: black; font-family: Helvetica; font-size: 14.6666669845581px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; background-color: white; color: black; font-family: Helvetica; font-size: 14.6666669845581px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
In a recent visit to the site, AP found that certain personal details - including age, income and smoking habits - were being passed along, likely without consumers&#39; knowledge, to advertising and Web analytics sites.&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; background-color: white; color: black; font-family: Helvetica; font-size: 14.6666669845581px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; background-color: white; color: black; font-family: Helvetica; font-size: 14.6666669845581px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
Third-party outfits that track website performance are a standard part of e-commerce. HealthCare.gov&#39;s privacy policy says in boldface that &quot;&lt;i&gt;no personally identifiable information is collected&lt;/i&gt;&quot; by these Web measurement tools.&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; background-color: white; color: black; font-family: Helvetica; font-size: 14.6666669845581px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; background-color: white; color: black; font-family: Helvetica; font-size: 14.6666669845581px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
Google said it doesn&#39;t allow its systems to target ads based on health or medical history information. &lt;i&gt;&quot;When we learn of possible violations of this policy, we investigate and take swift action,&quot;&lt;/i&gt; the company said in a statement.&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; background-color: white; color: black; font-family: Helvetica; font-size: 14.6666669845581px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; background-color: white; color: black; font-family: Helvetica; font-size: 14.6666669845581px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
Still, the outside connections surprised a tech expert who evaluated HealthCare.gov&#39;s performance for the AP.&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; background-color: white; color: black; font-family: Helvetica; font-size: 14.6666669845581px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; background-color: white; color: black; font-family: Helvetica; font-size: 14.6666669845581px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
&quot;&lt;i&gt;Personally, I look at this ... and I don&#39;t know what is going on between the government and Facebook, and Google, and Twitter&lt;/i&gt;,&quot; said Mehdi Daoudi, CEO of Catchpoint Systems. &quot;&lt;i&gt;Why is that there?&quot;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; background-color: white; color: black; font-family: Helvetica; font-size: 14.6666669845581px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; background-color: white; color: black; font-family: Helvetica; font-size: 14.6666669845581px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
Tracking consumers&#39; Internet searches is a lucrative business, helping Google, Facebook and others tailor ads to customers&#39; interests. Because your computer and mobile devices can be assigned an individual signature, profiles of Internet users can be pieced together, generating lists that have commercial value.&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; background-color: white; color: black; font-family: Helvetica; font-size: 14.6666669845581px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; background-color: white; color: black; font-family: Helvetica; font-size: 14.6666669845581px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
Third-party sites embedded on HealthCare.gov can&#39;t see your name, birth date or Social Security number. But they may be able to correlate the fact that your computer accessed the government website with your other Internet activities.&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; background-color: white; color: black; font-family: Helvetica; font-size: 14.6666669845581px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; background-color: white; color: black; font-family: Helvetica; font-size: 14.6666669845581px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
Have you been researching a chronic illness like coronary artery blockage? Do you shop online for smoking-cessation aids? Are you investigating genetic markers for a certain type of breast cancer? Are you seeking help for financial problems, or for an addiction?&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; background-color: white; color: black; font-family: Helvetica; font-size: 14.6666669845581px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; background-color: white; color: black; font-family: Helvetica; font-size: 14.6666669845581px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
Daoudi&#39;s company, Catchpoint Systems, came across some 50 third-party connections embedded on HealthCare.gov. They work in the background, unseen to most consumers.&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; background-color: white; color: black; font-family: Helvetica; font-size: 14.6666669845581px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; background-color: white; color: black; font-family: Helvetica; font-size: 14.6666669845581px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
The AP replicated the results. In one 10-minute visit to HealthCare.gov recently, dozens of websites were accessed behind the scenes. They included Google&#39;s data-analytics service, Twitter, Facebook and a host of online advertising providers.&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; background-color: white; color: black; font-family: Helvetica; font-size: 14.6666669845581px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; background-color: white; color: black; font-family: Helvetica; font-size: 14.6666669845581px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
&quot;&lt;i&gt;I think that this could erode ... confidentiality when dealing with medical data and medical information&lt;/i&gt;,&quot; said Cooper Quintin, a staff technologist with the Electronic Frontier Foundation, a civil liberties group.&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; background-color: white; color: black; font-family: Helvetica; font-size: 14.6666669845581px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgkPScNGIgWM-M8j6I3pv4MC3dKnh9F7lbWiUPI63GFR8s_2D6JFWaIDASS2T-fbGv7LQput3pb206jGhaBP8ysDte1OCRNiewTfACkR8b2pf-SeBMplepKpZ0cPoJc6EnLragu/s1600/effdomains.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgkPScNGIgWM-M8j6I3pv4MC3dKnh9F7lbWiUPI63GFR8s_2D6JFWaIDASS2T-fbGv7LQput3pb206jGhaBP8ysDte1OCRNiewTfACkR8b2pf-SeBMplepKpZ0cPoJc6EnLragu/s1600/effdomains.jpg&quot; height=&quot;230&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; background-color: white; color: black; font-family: Helvetica; font-size: 14.6666669845581px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; background-color: white; color: black; font-family: Helvetica; font-size: 14.6666669845581px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; background-color: white; color: black; font-family: Helvetica; font-size: 14.6666669845581px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; background-color: white; color: black; font-family: Helvetica; font-size: 14.6666669845581px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; background-color: white; color: black; font-family: Helvetica; font-size: 14.6666669845581px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; background-color: white; color: black; font-family: Helvetica; font-size: 14.6666669845581px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; background-color: white; color: black; font-family: Helvetica; font-size: 14.6666669845581px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; background-color: white; color: black; font-family: Helvetica; font-size: 14.6666669845581px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; background-color: white; color: black; font-family: Helvetica; font-size: 14.6666669845581px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; background-color: white; color: black; font-family: Helvetica; font-size: 14.6666669845581px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; background-color: white; color: black; font-family: Helvetica; font-size: 14.6666669845581px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; background-color: white; color: black; font-family: Helvetica; font-size: 14.6666669845581px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; background-color: white; color: black; font-family: Helvetica; font-size: 14.6666669845581px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; background-color: white; color: black; font-family: Helvetica; font-size: 14.6666669845581px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
Sending such personal information raises significant privacy concerns. A company like Doubleclick, for example, could match up the personal data provided by healthcare.gov with an already extensive trove of information about what you read online and what your buying preferences are to create an extremely detailed profile of exactly who you are and what your interests are. It could do all this based on a tracking cookie that it sets which would be the same across any site you visit. Based on this data, Doubleclick could start showing you smoking ads or infer your risk of cancer based on where you live, how old you are and your status as a smoker.1 Doubleclick might start to show you ads related to pregnancy, which could have embarrassing and potentially dangerous consequences such as &lt;b&gt;when Target notified a woman&#39;s family that she was pregnant before she even told them. &lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; background-color: white; color: black; font-family: Helvetica; font-size: 14.6666669845581px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; background-color: white; color: black; font-family: Helvetica; font-size: 14.6666669845581px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
Sources:&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; background-color: white; color: black; font-family: Helvetica; font-size: 14.6666669845581px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
&lt;a href=&quot;https://www.eff.org/deeplinks/2015/01/healthcare.gov-sends-personal-data&quot;&gt;https://www.eff.org/deeplinks/2015/01/healthcare.gov-sends-personal-data &lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; background-color: white; color: black; font-family: Helvetica; font-size: 14.6666669845581px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
&lt;a href=&quot;http://m.apnews.com/ap/db_289563/contentdetail.htm?contentguid=Py6rd7WO&quot;&gt;http://m.apnews.com/ap/db_289563/contentdetail.htm?contentguid=Py6rd7WO&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; background-color: white; color: black; font-family: Helvetica; font-size: 14.6666669845581px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; background-color: white; color: black; font-family: Helvetica; font-size: 14.6666669845581px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
___________________ &lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
</description><link>http://news2u.blogspot.com/2015_02_01_archive.html#7659945509389416795</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgkPScNGIgWM-M8j6I3pv4MC3dKnh9F7lbWiUPI63GFR8s_2D6JFWaIDASS2T-fbGv7LQput3pb206jGhaBP8ysDte1OCRNiewTfACkR8b2pf-SeBMplepKpZ0cPoJc6EnLragu/s72-c/effdomains.jpg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5604605.post-1026716390842283923</guid><pubDate>Mon, 10 Feb 2014 12:33:00 +0000</pubDate><atom:updated>2014-02-10T07:33:01.191-05:00</atom:updated><title></title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;script src=&quot;http://twibbon.com/embed/the-day-we-fight-back-2&quot; type=&quot;text/javascript&quot;&gt;&lt;/script&gt;

&lt;span style=&quot;font-size: x-large;&quot;&gt;&lt;b&gt;&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: x-large;&quot;&gt;&lt;b&gt;FEBRUARY 11TH 2014 IS&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;font-size: x-large;&quot;&gt;&lt;b&gt;The Day We Fight Back&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;font-size: x-large;&quot;&gt;&lt;b&gt;AGAINST MASS SURVEILLANCE

&lt;/b&gt;&lt;/span&gt;&lt;!--[if !(lt IE 8)]&gt;&lt;!--&gt;
   &lt;script type=&quot;text/javascript&quot;&gt;
     (function(){var e=document.createElement(&quot;script&quot;);e.type=&quot;text/javascript&quot;;e.async=true;e.src=document.location.protocol+&quot;//d1agz031tafz8n.cloudfront.net/thedaywefightback.js/widget.min.js&quot;;var t=document.getElementsByTagName(&quot;script&quot;)[0];t.parentNode.insertBefore(e,t)})()
   &lt;/script&gt;
&lt;!--&lt;![endif]--&gt;&lt;/div&gt;
&lt;/div&gt;
</description><link>http://news2u.blogspot.com/2014_02_01_archive.html#1026716390842283923</link><author>noreply@blogger.com (Unknown)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5604605.post-8092067609168870533</guid><pubDate>Mon, 27 Jan 2014 03:14:00 +0000</pubDate><atom:updated>2014-01-26T22:15:55.325-05:00</atom:updated><title>Battles on streets of Kiev,  everything you&#39;ve read and saw in TV news reports is TOTAL CRAP.</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;span style=&quot;font-size: x-large;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;b&gt;Revolution in Kiev, Ukraine&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://rendering.ru/media/varlamov/maidan1/15.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://rendering.ru/media/varlamov/maidan1/15.jpg&quot; height=&quot;265&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;background-color: white; color: black; display: inline ! important; float: none; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 19px; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;by Ilya Varlamov&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 19px; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;January 22, 2014&lt;/span&gt;&lt;u style=&quot;background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 19px; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt; &lt;/u&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;In the last days I received multiple requests to translate my posts for foreign readers, as they have very limited information about the happenings in Ukraine.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;This material describes events which took place in Kyev on January 22 and 23.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Please click link below to see photos of the &lt;span style=&quot;background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 19px; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;Battles on streets of Kiev.&lt;/span&gt;&lt;span style=&quot;background-color: white; color: black; display: inline ! important; float: none; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 19px; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;background-color: white; color: black; display: inline ! important; float: none; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 19px; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt; &lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;a href=&quot;http://zyalt.livejournal.com/984735.html&quot;&gt;Sharing and distribution is appreciated&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;background-color: white; color: black; display: inline ! important; float: none; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 19px; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;I came to Kiev. I came to see for myself what is happening here. Of course, an hour after arriving at Maidan, you begin to understand that everything what you&#39;ve read in dozens of articles, saw in TV news reports is total crap. In the upcoming reports I will try to, as objectively as possible, to sort out this new wave of Kiev revolution.&lt;/span&gt;&lt;br style=&quot;background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 19px; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;br style=&quot;background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 19px; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;span style=&quot;background-color: white; color: black; display: inline ! important; float: none; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 19px; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;Usually reporters try to answer the question: “&lt;i&gt;Who came out to Maidan and why.&lt;/i&gt;” Depending on the political leaning of MSM, the answers are different.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;background-color: white; color: black; display: inline ! important; float: none; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 19px; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;Some say it&#39;s “&lt;i&gt;fascists who came out to lynch the Moscali (Ukranian derogatory for Moscovites and Russians in general)&lt;/i&gt;.”, some say “&lt;i&gt;they&#39;re bums and slackers, who&#39;ve got nothing better to do&lt;/i&gt;” and “&lt;i&gt;instigators on the government payroll&lt;/i&gt;.” In reality, there is no answer. Those who came out are completely different.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;background-color: white; color: black; display: inline ! important; float: none; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 19px; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;Remember, how a couple of years in Moscow there was a MSM buzzword “&lt;i&gt;angry townspeople&lt;/i&gt;.” Here you see football fans, retirees, office plankton. And everyone is standing together. A sweet, ol&#39; grandmother is pouring Molotv cocktail in a nationalists&#39; bottles; and a manager of a large company is carrying ammunition to the student. And as it seems to me at this time, these people do not have a specific plan, nor idea of what to do next. Of course, individually, everyone has their own plan to “save Ukraine.” For some its “&lt;i&gt;we need a couple of crates of AKs and grenades, we&#39;ll sort things out here quickly&lt;/i&gt;.” Others “&lt;i&gt;need to ask the world community for help and bring in the UN troops&lt;/i&gt;.” At this time there is no central idea of what to do, an idea that can unite and point in one direction the people at Maidan.&lt;/span&gt;&lt;br style=&quot;background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 19px; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;br style=&quot;background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 19px; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;b&gt;&lt;span style=&quot;background-color: white; color: black; display: inline ! important; float: none; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 19px; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;&lt;b&gt;The only thing that is completely clear – people came out against Yanukovich.&lt;/b&gt;&lt;/span&gt;&lt;/b&gt;&lt;br style=&quot;background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 19px; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;br style=&quot;background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 19px; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;span style=&quot;background-color: white; color: black; display: inline ! important; float: none; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 19px; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;The burning barricades are visited by people who have come to let out anger and resentment that have accumulated over the years – for the excesses of cops; for the corruption; for the &#39;golden toilet&#39;; for the stupidity of the sell-out officials.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;background-color: white; color: black; display: inline ! important; float: none; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 19px; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;An elderly man, 80 years of age, walks up to young guys in masks and asks them for a bottle of flaming liquid. They ask him:&lt;/span&gt;&lt;br style=&quot;background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 19px; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;br style=&quot;background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 19px; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;span style=&quot;background-color: white; color: black; display: inline ! important; float: none; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 19px; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;“-&lt;i&gt; Grandad, you wont be able to throw it far enough!&lt;/i&gt;&lt;/span&gt;&lt;i&gt;&lt;br style=&quot;background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 19px; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;/i&gt;&lt;span style=&quot;background-color: white; color: black; display: inline ! important; float: none; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 19px; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;&lt;i&gt;- Just give me one, I want to show these beasts that they cannot treat me like this&lt;/i&gt;”&lt;/span&gt;&lt;br style=&quot;background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 19px; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;br style=&quot;background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 19px; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;span style=&quot;background-color: white; color: black; display: inline ! important; float: none; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 19px; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;Unfortunately, the Ukranians had bad luck with opposition. The street mob is not controlled by anyone. Klichko and his company met with Yanukovch yesterday.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;background-color: white; color: black; display: inline ! important; float: none; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 19px; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;Later they came out to the people, began to say something, but no one believes them. And no one wants to follow them. The main mass of people are completely non-political. They come out to kick Yanukovich and his company&#39;s ass.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;background-color: white; color: black; display: inline ! important; float: none; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 19px; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;Everyone has their own grievances and vision of the future.&lt;/span&gt;&lt;br style=&quot;background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 19px; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;br style=&quot;background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 19px; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;span style=&quot;background-color: white; color: black; display: inline ! important; float: none; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 19px; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;There are very real battles on the streets of Kiev right now. Unfortunately, Yanukovich is far away, so the Berkut (Ukranian SWAT) and soldiers have to play the role of Yanukovich&#39; ass. The scenery in Kiev is scary. Black smoke, burning barricades and constant explosions. Berkut&#39;s flashbangs and the protestors&#39; fireworks explode in the streets. Each side is shooting at the other and there are already first casualties(2 to 5 based on different sources).&lt;/span&gt;&lt;br style=&quot;background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 19px; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;br style=&quot;background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 19px; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;span style=&quot;background-color: white; color: black; display: inline ! important; float: none; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 19px; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;Let&#39;s go to the barricades?&lt;/span&gt;&lt;br style=&quot;background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 19px; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;br style=&quot;background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 19px; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;a href=&quot;https://www.blogger.com/null&quot; name=&quot;cutid1&quot; style=&quot;background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 19px; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;&lt;/a&gt;&lt;span style=&quot;background-color: white; color: black; display: inline ! important; float: none; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 19px; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;I rented a room in the hotel &quot;Dnepr&quot;, the very center on the European square. I come up to the main entrance, all doors are locked, lights are out. A group of men in helmets and protection, hanging nearby, greet me “Welcome to Kiev, Mister.” - they&#39;ve confused me with a foreign tourist. Everyone&#39;s laughing. It turns out that the entrance to the hotel is through a local bar. The security guy opens the door and leads me through dark hallways to the lobby. The lights are off, so as not to attract attention. After all, the hotel is almost at the front line.&lt;/span&gt;&lt;br style=&quot;background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 19px; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;span style=&quot;background-color: white; color: black; display: inline ! important; float: none; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 19px; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;background-color: white; color: black; display: inline ! important; float: none; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 19px; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;Back when it was all starting, there was a stage here, from which politicians pontificated their smart ideas about the future of Ukraine. Now the politicians have move on to Maidan, and the European square has become the rear base of the revolution. Cars with food arrive here; old tires for the bonfires, wood, medicine and reinforcements.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Please click link below to see photos of the &lt;span style=&quot;background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 19px; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;Battles on streets of Kiev.&lt;/span&gt;&lt;span style=&quot;background-color: white; color: black; display: inline ! important; float: none; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 19px; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;background-color: white; color: black; display: inline ! important; float: none; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 19px; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;background-color: white; color: black; display: inline ! important; float: none; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 19px; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;a href=&quot;http://zyalt.livejournal.com/984735.html&quot;&gt;Sharing and distribution is appreciated&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;background-color: white; color: black; display: inline ! important; float: none; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 19px; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Source:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;background-color: white; color: black; display: inline ! important; float: none; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 19px; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;a href=&quot;http://zyalt.livejournal.com/984735.html&quot;&gt;http://zyalt.livejournal.com/984735.html&lt;/a&gt; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;background-color: white; color: black; display: inline ! important; float: none; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 19px; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;______________________&lt;/span&gt;&lt;/span&gt;&lt;/span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
</description><link>http://news2u.blogspot.com/2014_01_01_archive.html#8092067609168870533</link><author>noreply@blogger.com (Unknown)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5604605.post-4284856083383076156</guid><pubDate>Mon, 20 Jan 2014 12:46:00 +0000</pubDate><atom:updated>2014-01-20T07:46:17.627-05:00</atom:updated><title>CSEC set up &#39;covert sites at the request of NSA</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;span style=&quot;font-size: x-large;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Canada&#39;s spooks were NSA bagmen, established spy-posts in 20+ countries and &quot;transnational targets&quot;&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;By Greg Weston, Glenn Greenwald, Ryan Gallagher&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;CBC&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Dec 9, 201&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;story-content&quot; style=&quot;background-color: white; color: #333333; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 18.8906px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;div style=&quot;line-height: 1.35em; margin-bottom: 1rem; margin-top: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;A top secret document retrieved by American whistleblower Edward Snowden reveals Canada has set up covert spying posts around the world and conducted espionage against trading partners at the request of the U.S. National Security Agency.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;line-height: 1.35em; margin-bottom: 1rem; margin-top: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;The leaked NSA document being reported exclusively by CBC News reveals Canada is involved with the huge American intelligence agency in clandestine surveillance activities in “approximately 20 high-priority countries.&quot;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;line-height: 1.35em; margin-bottom: 1rem; margin-top: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Much of the document contains hyper-sensitive operational details which CBC News has chosen not to make public.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;line-height: 1.35em; margin-bottom: 1rem; margin-top: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Sections of the document with the highest classification make it clear in some instances why American spymasters are particularly keen about enlisting their Canadian counterparts, the Communications Security Establishment Canada.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;line-height: 1.35em; margin-bottom: 1rem; margin-top: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&quot;CSEC shares with the NSA their unique geographic access to areas unavailable to the U.S,&quot; the document says.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;line-height: 1.35em; margin-bottom: 1rem; margin-top: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;The briefing paper describes a &quot;close co-operative relationship&quot; between the NSA and its Canadian counterpart, the Communications Security Establishment Canada, or CSEC — a relationship &quot;both sides would like to see expanded and strengthened.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;line-height: 1.35em; margin-bottom: 1rem; margin-top: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&quot;The intelligence exchange with CSEC covers worldwide national and transnational targets.&quot;The four-page missive is stamped “Top Secret” and dated April 3, 2013. That makes it one of the freshest documents Snowden was able to walk away with before he went public in June.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;line-height: 1.35em; margin-bottom: 1rem; margin-top: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;The briefing notes make it clear that Canada plays a very robust role in intelligence-gathering around the world in a way that has won respect from its American equivalents.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;line-height: 1.35em; margin-bottom: 1rem; margin-top: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Wesley Wark, a Canadian security and intelligence expert at the University of Ottawa, says the document makes it clear Canada can take advantage of its relatively benign image internationally to covertly amass a vast amount of information abroad.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;line-height: 1.35em; margin-bottom: 1rem; margin-top: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&quot;I think we still trade on a degree of an international brand as an innocent partner in the international sphere,&quot; Wark said. &quot;There&#39;s not that much known about Canadian intelligence.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;line-height: 1.35em; margin-bottom: 1rem; margin-top: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&quot;In that sense, Canadian operations might escape at least the same degree of notice and surveillance that the operations of the U.S. or Britain in foreign states would be bound to attract.&quot;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;line-height: 1.35em; margin-bottom: 1rem; margin-top: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;The intimate Canada-U.S. electronic intelligence relationship dates back more than 60 years. Most recently,&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.cbc.ca/news/politics/read-snowden-nsa-document-on-g8-g20-summit-surveillance-1.2447387&quot; style=&quot;color: #115278; font-weight: bold; text-decoration: none;&quot;&gt;another Snowden document reported by CBC News&lt;/a&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;showed the two agencies co-operated to&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.cbc.ca/news/politics/new-snowden-docs-show-u-s-spied-during-g20-in-toronto-1.2442448&quot; style=&quot;color: #115278; font-weight: bold; text-decoration: none;&quot;&gt;allow the NSA to spy on the G20 summit of international leaders&lt;/a&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;in Toronto in 2010.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;line-height: 1.35em; margin-bottom: 1rem; margin-top: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;But what the latest secret document reveals for the first time is just how expansive Canada&#39;s international espionage activities have become.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;h2 style=&quot;color: black; font-weight: bold; line-height: 1.25; margin-bottom: 1rem; margin-top: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;CSEC set up &#39;covert sites at the request of NSA&#39;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;line-height: 1.35em; margin-bottom: 1rem; margin-top: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;The NSA document depicts CSEC as a sophisticated, capable and highly respected intelligence partner involved in all manner of joint spying missions, including setting up listening posts at the request of the Americans.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;line-height: 1.35em; margin-bottom: 1rem; margin-top: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&quot;CSEC offers resources for advanced collection, processing and analysis, and has opened covert sites at the request of NSA,&quot; the document states.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;line-height: 1.35em; margin-bottom: 1rem; margin-top: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Thomas Drake, a former NSA executive turned whistleblower, says it&#39;s no surprise Canada would accede to the U.S. agency&#39;s requests: &quot;That&#39;s been the case for years.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;line-height: 1.35em; margin-bottom: 1rem; margin-top: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&quot;Just think of certain foreign agreements or relationships that Canada actually enjoys that the United States doesn&#39;t, and under the cover of those relationships, guess what you can conduct? These kinds of secret surveillance or collection efforts.&quot;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;line-height: 1.35em; margin-bottom: 1rem; margin-top: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Drake says he worked with CSEC on various projects while he was at the NSA, and the Canadians were &quot;extraordinarily capable.&quot;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;line-height: 1.35em; margin-bottom: 1rem; margin-top: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;CSEC conducts much of its foreign cyber-spying operations from its headquarters in Ottawa, using some of the most powerful computing equipment in the country to intercept foreign phone calls and monitor internet communications in nations around the globe.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;line-height: 1.35em; margin-bottom: 1rem; margin-top: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Its American counterpart does the same, but is itself currently the target of a widespread internal probe by the U.S. administration in the wake of leaked documents from Snowden showing the NSA has been collecting masses of information on millions of ordinary Americans.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;line-height: 1.35em; margin-bottom: 1rem; margin-top: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Wark reviewed the leaked document at the invitation of CBC News, and says he isn&#39;t surprised CSEC would be asked by the NSA to set up covert foreign spying operations.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;line-height: 1.35em; margin-bottom: 1rem; margin-top: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;He says it is not uncommon for embassies and consulates to be used as listening posts when a close proximity to targets is required.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;line-height: 1.35em; margin-bottom: 1rem; margin-top: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;But he also points out it all comes with significant risks to Canada — namely, getting caught &quot;can create huge diplomatic fallout.&quot;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;h2 style=&quot;color: black; font-weight: bold; line-height: 1.25; margin-bottom: 1rem; margin-top: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;High-level approval required&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;line-height: 1.35em; margin-bottom: 1rem; margin-top: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Aside from compromising the actual intelligence operation, Wark says, an exposed spy mission can imperil Canada&#39;s other diplomatic operations — &quot;the political contacts, the trade contacts, the generation of goodwill between the countries and any sense of co-operation.&quot;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;line-height: 1.35em; margin-bottom: 1rem; margin-top: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Wark says if a country feels targeted by a Canadian embassy, it can put everyone working there under a cloud of suspicion: “Are they really diplomats or are they spies?”&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;line-height: 1.35em; margin-bottom: 1rem; margin-top: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;As a result of those risks, Wark says, approval for CSEC to establish a covert spying post at the request of the NSA would have to come from the ministerial level of the Canadian government — or even from the prime minister himself.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;line-height: 1.35em; margin-bottom: 1rem; margin-top: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&quot;It&#39;s far too politically and diplomatically sensitive, and the consequences of being discovered are far too great, for it to be simply an operational matter for an intelligence agency,&quot; he says.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;line-height: 1.35em; margin-bottom: 1rem; margin-top: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&quot;In the past, it certainly has been and it should be today, a matter of very senior political sign-off.&quot;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;line-height: 1.35em; margin-bottom: 1rem; margin-top: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Canada and the U.S. have long shared security intelligence with sister agencies in the U.K., Australia and New Zealand – the so-called &quot;Five Eyes&quot; partnership.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;line-height: 1.35em; margin-bottom: 1rem; margin-top: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;But the latest secret Snowden missive shows CSEC and the NSA becoming physically intertwined.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;line-height: 1.35em; margin-bottom: 1rem; margin-top: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&quot;Co-operative efforts include the exchange of liaison officers and integrees,&quot; the document reveals, a reference to CSEC operatives working inside the NSA, and vice-versa.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;line-height: 1.35em; margin-bottom: 1rem; margin-top: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;It notes the NSA also supplies much of the computer hardware and software CSEC uses for encryption, decoding and other state-of-the-art essentials of electronic spying needed for &quot;collection, processing and analytic efforts.&quot;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;line-height: 1.35em; margin-bottom: 1rem; margin-top: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;In return, the NSA acknowledges that its Canadian counterpart provides the partnership with its own &quot;cryptographic products, cryptanalysis, technology and software.&quot;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;line-height: 1.35em; margin-bottom: 1rem; margin-top: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Finally, the U.S. agency says CSEC has increased its investment in research and development projects &quot;of mutual interest.&quot;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;line-height: 1.35em; margin-bottom: 1rem; margin-top: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;CSEC employs about 2,000 people, has an annual budget of roughly $450 million and will soon move into an architecturally spectacular new Ottawa headquarters&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.cbc.ca/news/politics/inside-canada-s-top-secret-billion-dollar-spy-palace-1.1930322&quot; style=&quot;color: #115278; font-weight: bold; text-decoration: none;&quot;&gt;costing Canadian taxpayers almost $1.2 billion&lt;/a&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;line-height: 1.35em; margin-bottom: 1rem; margin-top: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;By comparison, the NSA employs an estimated 40,000 people plus thousands of private contractors, and spends over $40 billion a year&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;line-height: 1.35em; margin-bottom: 1rem; margin-top: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;NSA whistleblower Drake says the problem is that both CSEC and the NSA lack proper oversight, and without it, they have morphed into runaway surveillance.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;line-height: 1.35em; margin-bottom: 1rem; margin-top: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&quot;There is a clear and compelling danger to democracy in Canada by virtue of how far these secret surveillance operations have gone.&quot;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;line-height: 1.35em; margin-bottom: 1rem; margin-top: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;The office of Defence Minister Rob Nicholson, who is responsible for CSEC, issued a written statement saying CSEC’s activities are subject to review by an independent commissioner.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;line-height: 1.35em; margin-bottom: 1rem; margin-top: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;A spokesperson for the U.S. government said: &quot;While we are not going to comment publicly on every specific alleged activity, we have made clear that the United States gathers foreign intelligence of the type gathered by all nations.&quot;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;line-height: 1.35em; margin-bottom: 1rem; margin-top: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Source:&lt;/span&gt;&lt;/span&gt;&amp;nbsp;&lt;/div&gt;
&lt;div style=&quot;line-height: 1.35em; margin-bottom: 1rem; margin-top: 0px;&quot;&gt;
&lt;a href=&quot;http://www.cbc.ca/news/politics/snowden-document-shows-canada-set-up-spy-posts-for-nsa-1.2456886&quot;&gt;http://www.cbc.ca/news/politics/snowden-document-shows-canada-set-up-spy-posts-for-nsa-1.2456886&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;line-height: 1.35em; margin-bottom: 1rem; margin-top: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&amp;nbsp;_______________________ &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;storytools module share-hidecount sclt-share&quot; id=&quot;storytools&quot; style=&quot;background-color: white; color: #333333; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 18.8906px; margin-bottom: 2rem; padding-bottom: 0px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;h3 class=&quot;storytools-head storytools-heading module-head module-heading metanav offscreen&quot; style=&quot;border: 0px none ! important; clip: rect(0px, 0px, 0px, 0px) ! important; color: black; font-weight: bold; height: 1px ! important; line-height: 1.25; margin: -1px ! important; overflow: hidden ! important; padding: 0px ! important; position: absolute ! important; width: 1px ! important;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Share To&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;
&lt;/div&gt;
&lt;/div&gt;
</description><link>http://news2u.blogspot.com/2014_01_01_archive.html#4284856083383076156</link><author>noreply@blogger.com (Unknown)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5604605.post-5113409945038816853</guid><pubDate>Fri, 03 Jan 2014 02:47:00 +0000</pubDate><atom:updated>2014-01-05T20:19:54.477-05:00</atom:updated><title>NSA Racing To Build Freakishly Powerful Computer</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;span style=&quot;font-size: x-large;&quot;&gt;&lt;b&gt;NSA seeks to build quantum computer capable of breaking all forms of encryptio&lt;/b&gt;&lt;b&gt;n&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
RT.com&lt;br /&gt;
January 2, 2014&lt;br /&gt;
&lt;br /&gt;
In room-size metal boxes, secure against electromagnetic leaks, the National Security Agency is racing to build a computer that could break nearly every kind of encryption used to protect banking, medical, business and government records around the world.
&lt;br /&gt;
&lt;br /&gt;
According to documents provided by former NSA contractor Edward Snowden, the effort to build “&lt;i&gt;a cryptologically useful quantum computer&lt;/i&gt;” — a machine exponentially faster than classical computers — is part of a $79.7 million research program titled, “&lt;a href=&quot;http://apps.washingtonpost.com/g/page/world/a-description-of-the-penetrating-hard-targets-project/691/&quot;&gt;Penetrating Hard Targets&lt;/a&gt;.” Much of the work is hosted under classified contracts at a &lt;a href=&quot;http://www.lps.umd.edu/&quot;&gt;laboratory in College Park&lt;/a&gt;.
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The development of a quantum computer has long been a goal of many in the scientific community, with revolutionary implications for fields like medicine as well as for the NSA’s code-breaking mission. With such technology, all current forms of public key encryption would be broken, including those used on many secure Web sites as well as the type used to protect state secrets.
&lt;br /&gt;
&lt;br /&gt;
Physicists and computer scientists have long speculated whether the NSA’s efforts are more advanced than those of the best civilian labs. Although the full extent of the agency’s research remains unknown, the documents provided by Snowden suggest that the NSA is no closer to success than others in the scientific community.
&lt;br /&gt;
&lt;br /&gt;
“&lt;i&gt;It seems improbable that the NSA could be that far ahead of the open world without anybody knowing it&lt;/i&gt;,” said Scott Aaronson, an associate professor of electrical engineering and computer science at MIT.
&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://apps.washingtonpost.com/g/page/world/from-the-nsas-wiki-analysis-of-quantum-encryption/693/&quot;&gt;The NSA appears to regard itself &lt;/a&gt;as running neck and neck with quantum computing labs sponsored by the European Union and the Swiss government, with steady progress but little prospect of an immediate breakthrough. 
&lt;br /&gt;
&lt;br /&gt;
“&lt;i&gt;The geographic scope has narrowed from a global effort to a discrete focus on the European Union and Switzerland,&lt;/i&gt;” one NSA document states.
&lt;br /&gt;
&lt;br /&gt;
Seth Lloyd, professor of quantum mechanical engineering at MIT, said the NSA’s focus is not misplaced. “&lt;i&gt;The E.U. and Switzerland have made significant advances over the last decade and have caught up to the U.S. in quantum computing technology,&lt;/i&gt;” he said.
&lt;br /&gt;
&lt;br /&gt;
The NSA declined to comment for this story.
&lt;br /&gt;
&lt;br /&gt;
The documents, however, indicate that the agency carries out some of its research in large, shielded rooms known as Faraday cages, which are designed to prevent electromagnetic energy from coming in or out. Those, according to one brief description, are required “to keep delicate quantum computing experiments running.”
&lt;br /&gt;
&lt;br /&gt;
[&lt;a href=&quot;http://apps.washingtonpost.com/g/page/world/classifying-nsa-quantum-computing-efforts/692/&quot;&gt;Read a document describing classification levels related to quantum computing efforts&lt;/a&gt;]
&lt;br /&gt;
&lt;br /&gt;
The basic principle underlying quantum computing is known as “&lt;i&gt;quantum superposition&lt;/i&gt;,” the idea that an object simultaneously exists in all states. A classical computer uses binary bits, which are either zeroes or ones. A quantum computer uses quantum bits, or qubits, which are simultaneously zero and one.
&lt;br /&gt;
&lt;br /&gt;
This seeming impossibility is part of the mystery that lies at the heart of quantum theory, which even theoretical physicists say no one completely understands.
&lt;br /&gt;
&lt;br /&gt;
“&lt;i&gt;If you think you understand quantum mechanics, you don’t understand quantum mechanics,&lt;/i&gt;” said the late Nobel laureate &lt;a href=&quot;http://www.feynman.com/&quot;&gt;Richard Feynman&lt;/a&gt;, who is widely regarded as the pioneer in quantum computing.
&lt;br /&gt;
&lt;br /&gt;
Here’s how it works, in theory: While a classical computer, however fast, must do one calculation at a time, a quantum computer can sometimes avoid having to make calculations that are unnecessary to solving a problem. That allows it to home in on the correct answer much more quickly and efficiently.
&lt;br /&gt;
&lt;br /&gt;
Quantum computing is so difficult to attain because of the fragile nature of such computers. In theory, the building blocks of such a computer might include individual atoms, photons or electrons. To maintain the quantum nature of the computer, these particles would need to be carefully isolated from their external environments.
&lt;br /&gt;
&lt;br /&gt;
“&lt;i&gt;Quantum computers are extremely delicate, so if you don’t protect them from their environment, then the computation will be useless,&lt;/i&gt;” said Daniel Lidar, a professor of electrical engineering and the director of the Center for Quantum Information Science and Technology at the University of Southern California.
&lt;br /&gt;
&lt;br /&gt;
A working quantum computer would open the door to easily breaking the strongest encryption tools in use today, including a standard known as RSA, named for the initials of its creators. RSA scrambles communications, making them unreadable to anyone but the intended recipient, without requiring the use of a shared password. It is commonly used in Web browsers to secure financial transactions and in encrypted e-mails. RSA is used because of the difficulty of factoring the product of two large prime numbers. Breaking the encryption involves finding those two numbers. This cannot be done in a reasonable amount of time on a classical computer.
&lt;br /&gt;
&lt;br /&gt;
In 2009, computer scientists using classical methods were able to &lt;a href=&quot;http://eprint.iacr.org/2010/006.pdf&quot;&gt;discover the primes&lt;/a&gt; within a 768-bit number, but it took almost two years and hundreds of computers to factor it. The scientists estimated that it would take 1,000 times longer to break a 1,024-bit encryption key, which is commonly used for online transactions.
&lt;br /&gt;
&lt;br /&gt;
A large-scale quantum computer, however, could theoretically break a 1,024-bit encryption much faster. Some leading Internet companies are moving to 2,048-bit keys, but even those are thought to be vulnerable to rapid decryption with a quantum computer.
&lt;br /&gt;
&lt;br /&gt;
Quantum computers have many applications for today’s scientific community, including the creation of artificial intelligence. But the NSA fears the implications for national security.
&lt;br /&gt;
&lt;br /&gt;
“&lt;i&gt;The application of quantum technologies to encryption algorithms threatens to dramatically impact the US government’s ability to both protect its communications and eavesdrop on the communications of foreign governments,&lt;/i&gt;” according to an internal document provided by Snowden.
&lt;br /&gt;
&lt;br /&gt;
Experts are not sure how soon a quantum computer would be feasible. A decade ago, some experts said that developing a large quantum computer was likely 10 to 100 years in the future. Five years ago, Lloyd said the goal was at least 10 years away.
&lt;br /&gt;
&lt;br /&gt;
Last year, Jeff Forshaw, a professor at the University of Manchester, told Britain’s Guardian newspaper, “&lt;i&gt;It is probably too soon to speculate on when the first full-scale quantum computer will be built but recent progress indicates that there is every reason to be optimistic&lt;/i&gt;.”
&lt;br /&gt;
&lt;br /&gt;
“&lt;i&gt;I don’t think we’re likely to have the type of quantum computer the NSA wants within at least five years, in the absence of a significant breakthrough maybe much longer&lt;/i&gt;,” Lloyd told The Post in a recent interview.
&lt;br /&gt;
&lt;br /&gt;
However, some companies claim to already be producing small quantum computers. A Canadian company, &lt;a href=&quot;http://www.dwavesys.com/en/dw_homepage.html&quot;&gt;D-Wave Systems&lt;/a&gt; , says it has been making quantum computers since 2009. In 2012, it sold a $10 million version to Google, NASA and the Universities Space Research Association, according to news reports.
&lt;br /&gt;
&lt;br /&gt;
That quantum computer, however, would never be useful for breaking public key encryption like RSA.
&lt;br /&gt;
&lt;br /&gt;
“&lt;i&gt;Even if everything they’re claiming is correct, that computer, by its design, cannot run &lt;a href=&quot;http://www.princeton.edu/~achaney/tmve/wiki100k/docs/Shor_s_algorithm.html&quot;&gt;Shor’s algorithm,”&lt;/a&gt; &lt;/i&gt;said Matthew Green, a research professor at the Johns Hopkins Information Security Institute, referring to the algorithm that could be used to break encryption like RSA.
&lt;br /&gt;
&lt;br /&gt;
Experts think that one of the largest hurdles to breaking encryption with a quantum computer is building a computer with enough qubits, which is difficult given the very fragile state of quantum computers. By the end of September, the NSA expected to be able to have some basic building blocks, which it described in a document as “&lt;i&gt;dynamical decoupling and complete quantum control on two semiconductor qubits&lt;/i&gt;.”
&lt;br /&gt;
&lt;br /&gt;
“&lt;i&gt;That’s a great step, but it’s a pretty small step on the road to building a large-scale quantum computer,&lt;/i&gt;” Lloyd said.
&lt;br /&gt;
&lt;br /&gt;
A quantum computer capable of breaking cryptography would need hundreds or thousands more qubits than that.
&lt;br /&gt;
&lt;br /&gt;
The budget for the National Intelligence Program, commonly referred to as the “&lt;i&gt;black budget,&lt;/i&gt;” details the “&lt;i&gt;Penetrating Hard Targets&lt;/i&gt;” project and noted that this step “&lt;i&gt;will enable initial scaling towards large systems in related and follow-on efforts.&lt;/i&gt;”
&lt;br /&gt;
&lt;br /&gt;
Another project, called the “Owning the Net,” is using quantum research to support the creation of new quantum-based attacks on encryptions like RSA, documents show.
&lt;br /&gt;
&lt;br /&gt;
“&lt;i&gt;The irony of quantum computing is that if you can imagine someone building a quantum computer that can break encryption a few decades into the future, then you need to be worried right now&lt;/i&gt;,” Lidar said.
&lt;br /&gt;
&lt;br /&gt;
Source:&lt;br /&gt;
&lt;a href=&quot;http://www.rt.com/usa/quantum-computer-nsa-encryption-100/&quot;&gt;http://www.rt.com/usa/quantum-computer-nsa-encryption-100/&lt;/a&gt;&lt;br /&gt;
___________________________&lt;/div&gt;
</description><link>http://news2u.blogspot.com/2014_01_01_archive.html#5113409945038816853</link><author>noreply@blogger.com (Unknown)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5604605.post-7814961278695498341</guid><pubDate>Fri, 29 Nov 2013 03:19:00 +0000</pubDate><atom:updated>2013-11-28T22:19:04.811-05:00</atom:updated><title>America wants to make sure it preserves the right to spy overseas. </title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-size: x-large;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Inside America&#39;s Plan to Kill Online Privacy Rights Everywhere&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;By Colum Lynch&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Foreign Policy&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;November 20, 2013&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;[Emphasis added] &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;The United States
and its key intelligence allies are quietly working behind the scenes
to kneecap a mounting movement in the United Nations to promote a
universal human right to online privacy, according to diplomatic
sources and an internal American government document obtained by The
Cable.
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;The diplomatic
battle is playing out in an obscure U.N. General Assembly committee
that is considering a proposal by Brazil and Germany to place
constraints on unchecked internet surveillance by the National Security
Agency and other foreign intelligence services.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;American
representatives have made it clear that they won&#39;t tolerate such checks
on their global surveillance network.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;The stakes are high, particularly
in Washington -- which is seeking to contain an &lt;a href=&quot;http://thecable.foreignpolicy.com/posts/2013/10/25/exclusive_21_nations_line_up_behind_un_effort_to_restrain_nsa&quot;&gt;&lt;b&gt;internationalbacklash against NSA spying&lt;/b&gt;&lt;/a&gt; -- and in Brasilia, where
Brazilian President Dilma Roussef is personally involved in monitoring
the U.N. negotiations.
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;The Brazilian and
German initiative seeks to apply the right to privacy, which is
enshrined in the International Covenant on Civil and Political Rights
(ICCPR), to online communications. Their proposal, &lt;a href=&quot;http://thecable.foreignpolicy.com/posts/2013/10/24/exclusive_germany_brazil_turn_to_un_to_restrain_american_spies&quot;&gt;&lt;b&gt;firstrevealed by The Cable&lt;/b&gt;&lt;/a&gt;, affirms a &quot;&lt;i&gt;right to privacy that is
not to be subjected to arbitrary or unlawful interference with their
privacy, family, home, or correspondence.&lt;/i&gt;&quot; It notes that while public
safety may &quot;&lt;i&gt;justify the gathering and protection of certain sensitive
information&lt;/i&gt;,&quot; nations &quot;&lt;i&gt;must ensure full compliance&lt;/i&gt;&quot; with international
human rights laws. A final version the text is scheduled to be
presented to U.N. members on Wednesday evening and the resolution is
expected to be adopted next week.
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;A draft of the
resolution, which was obtained by The Cable, calls on states to &quot;&lt;i&gt;to
respect and protect the right to privacy&lt;/i&gt;,&quot; asserting that the &quot;&lt;i&gt;same
rights that people have offline must also be protected online,
including the right to privacy&lt;/i&gt;.&quot; It also requests the U.N. high
commissioner for human rights, Navi Pillay, present the U.N. General
Assembly next year with a report on the protection and promotion of the
right to privacy, a provision that will ensure the issue remains on the
front burner.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Publicly, U.S.
representatives say they&#39;re open to an affirmation of privacy rights.
&quot;&lt;i&gt;The United States takes very seriously our international legal
obligations, including those under the International Covenant on Civil
and Political Rights,&lt;/i&gt;&quot; Kurtis Cooper, a spokesman for the U.S. mission
to the United Nations, said in an email. &quot;&lt;i&gt;We have been actively and
constructively negotiating to ensure that the resolution promotes human
rights and is consistent with those obligations.&lt;/i&gt;&quot; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;b&gt;But privately,
American diplomats are pushing hard to kill a provision of the
Brazilian and German draft which states that &lt;i&gt;&quot;extraterritorial
surveillance&lt;/i&gt;&quot; and mass interception of communications, personal
information, and metadata may constitute a violation of human rights.
The United States and its allies, according to diplomats, outside
observers, and documents, contend that the Covenant on Civil and
Political Rights does not apply to foreign espionage.&lt;/b&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;In recent days, the
United States circulated to its allies a confidential &lt;b&gt;&lt;a href=&quot;http://columlynch.tumblr.com/post/67588682409/right-to-privacy-in-the-digital-age-u-s&quot;&gt;paper&lt;/a&gt;
&lt;/b&gt;highlighting American objectives in the negotiations, &quot;&lt;i&gt;Right
to Privacy in the Digital Age -- U.S. Redlines.&lt;/i&gt;&quot; It calls for changing
the Brazilian and German text so &quot;&lt;i&gt;that references to privacy rights are
referring explicitly to States&#39; obligations under ICCPR and remove
suggestion that such obligations apply extraterritorially.&lt;/i&gt;&quot;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;In other
words: America wants to make sure it preserves the right to spy
overseas. &lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;The U.S. paper also
calls on governments to promote amendments that would weaken Brazil&#39;s
and Germany&#39;s contention that some &quot;&lt;i&gt;highly intrusive&lt;/i&gt;&quot; acts of online
espionage may constitute a violation of freedom of expression. Instead,
the United States wants to limit the focus to illegal surveillance --
which the American government claims it never, ever does. &lt;b&gt;&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;b&gt;Collecting
information on tens of millions of people around the world is perfectly
acceptable, the Obama administration has repeatedly said. It&#39;s
authorized by U.S. statute, overseen by Congress, and approved by
American courts&lt;/b&gt;.
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&quot;&lt;i&gt;Recall that the
USG&#39;s [U.S. government&#39;s] collection activities that have been
disclosed are lawful collections done in a manner protective of privacy
rights&lt;/i&gt;,&quot; the paper states. &quot;&lt;i&gt;So a paragraph expressing concern about
illegal surveillance is one with which we would agree&lt;/i&gt;.&quot; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;The privacy
resolution, like most General Assembly decisions, is neither legally
binding nor enforceable by any international court.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;But international
lawyers say it is important because it creates the basis for an
international consensus -- referred to as &quot;soft law&quot; -- that over time
will make it harder and harder for the United States to argue that its
mass collection of foreigners&#39; data is lawful and in conformity with
human rights norms.
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&quot;&lt;i&gt;They want to be
able to say ‘we haven&#39;t broken the law, we&#39;re not breaking the law, and
we won&#39;t break the law&lt;/i&gt;,&#39;&quot; said Dinah PoKempner, the general counsel for
Human Rights Watch, who has been tracking the negotiations. &lt;b&gt;&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;b&gt;The United
States, she added, wants to be able to maintain that &quot;&lt;i&gt;we have the
freedom to scoop up anything we want through the massive surveillance
of foreigners because we have no legal obligations.&lt;/i&gt;&quot;
&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;The United States
negotiators have been pressing their case behind the scenes, raising
concerns that the assertion of extraterritorial human rights could
constrain America&#39;s effort to go after international terrorists. But
Washington has remained relatively muted about their concerns in the
U.N. negotiating sessions. According to one diplomat, &quot;&lt;i&gt;the United
States has been very much in the backseat,&lt;/i&gt;&quot; leaving it to its allies,
Australia, Britain, and Canada, to take the lead. &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;There is no
extraterritorial obligation on states &quot;&lt;i&gt;to comply with human rights&lt;/i&gt;,&quot;
explained one diplomat who supports the U.S. position. &quot;&lt;i&gt;The obligation
is on states to uphold the human rights of citizens within their
territory and areas of their jurisdictions&lt;/i&gt;.&quot; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;The position,
according to Jamil Dakwar, the director of the American Civil Liberties
Union&#39;s Human Rights Program, has little international backing. The
International Court of Justice, the U.N. Human Rights Committee, and
the European Court have all asserted that states do have an obligation
to comply with human rights laws beyond their own borders, he noted.
&quot;&lt;i&gt;Governments do have obligation beyond their territories&lt;/i&gt;,&quot; said Dakwar,
particularly in situations, like the Guantanamo Bay detention center,
where the United States exercises &quot;&lt;i&gt;effective control&lt;/i&gt;&quot; over the lives of
the detainees.
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Both PoKempner and
Dakwar suggested that courts may also judge that the U.S. dominance of
the Internet places special legal obligations on it to ensure the
protection of users&#39; human rights.
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&quot;&lt;i&gt;It&#39;s clear that
when the United States is conducting surveillance, these decisions and
operations start in the United States, the servers are at NSA
headquarters, and the capabilities are mainly in the United States&lt;/i&gt;,&quot; he
said. &quot;&lt;i&gt;To argue that they have no human rights obligations overseas is
dangerous because it sends a message that there is void in terms of
human rights protection outside countries territory. It&#39;s going back to
the idea that you can create a legal black hole where there is no
applicable law&lt;/i&gt;.&quot; There were signs emerging on Wednesday that America
may have been making ground in pressing the Brazilians and Germans to
back on one of its toughest provisions. In an effort to address the
concerns of the U.S. and its allies, Brazil and Germany agreed to
soften the language suggesting that mass surveillance may constitute a
violation of human rights. Instead, it simply deep &quot;&lt;i&gt;concern at the
negative impact&lt;/i&gt;&quot; that extraterritorial surveillance &quot;&lt;i&gt;may have on the
exercise of and enjoyment of human rights&lt;/i&gt;.&quot; The U.S., however, has not
yet indicated it would support the revised proposal.
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;The concession &quot;&lt;i&gt;is
regrettable. But it’s not the end of the battle by any means&lt;/i&gt;,&quot; said
Human Rights Watch’s PoKempner. &lt;b&gt;&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;b&gt;She added that there will soon be
another opportunity to corral America&#39;s spies: a U.N. discussion on
possible human rights violations as a result of extraterritorial
surveillance will soon be taken up by the U.N. High commissioner.
&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;(Access may require login)&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Source:&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;a href=&quot;http://thecable.foreignpolicy.com/posts/2013/11/20/exclusive_inside_americas_plan_to_kill_online_privacy_rights_everywhere&quot;&gt;http://thecable.foreignpolicy.com/posts/2013/11/20/exclusive_inside_americas_plan_to_kill_online_privacy_rights_everywhere&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;_________________________ &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
</description><link>http://news2u.blogspot.com/2013_11_01_archive.html#7814961278695498341</link><author>noreply@blogger.com (Unknown)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5604605.post-4359726218493029191</guid><pubDate>Fri, 22 Nov 2013 12:33:00 +0000</pubDate><atom:updated>2013-11-22T07:53:26.337-05:00</atom:updated><title>JFK Assasination Anniversary</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-size: x-large;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Just Who Was Lee Harvey Oswald?&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;/span&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;a href=&quot;http://www.savingjackiek.com/pictures/lho_lee_harvey_oswald_as_Marine.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;200&quot; src=&quot;http://www.savingjackiek.com/pictures/lho_lee_harvey_oswald_as_Marine.jpg&quot; width=&quot;156&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;By Joseph Lazzaro&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;International Business Times&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;November 18 2013&amp;nbsp;&lt;span style=&quot;font-size: xx-small;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;font-size: xx-small;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;

&lt;br /&gt;
&lt;div class=&quot;article-node-title&quot; style=&quot;background-color: white; border: 0px none; color: black; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 26px; margin: 0px; outline: 0px none; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; vertical-align: baseline; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;div style=&quot;border: 0px none; color: black; font-style: normal; font-variant: normal; font-weight: normal; line-height: 26px; margin: 0px 0px 24px; outline: 0px none; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;In September 1964, the Warren Commission concluded that Lee Harvey Oswald acted alone when he assassinated President John F. Kennedy, the 35th president of the United States and the only Roman Catholic elected to the office.&amp;nbsp; &lt;/span&gt;&lt;/span&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Warren_commission&quot; rel=&quot;nofollow&quot; style=&quot;border: 0px none; color: #d84b0e; font-style: normal; font-variant: normal; font-weight: normal; line-height: 26px; margin: 0px; outline: 0px none; padding: 0px; text-decoration: underline; vertical-align: baseline;&quot; target=&quot;_blank&quot;&gt;The commission said&lt;/a&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;that on Nov. 22, 1963, at about 12:30 p.m. Central Time, Oswald fired three shots from behind the presidential motorcade on the sixth floor in the Texas School Book Depository building using a Mannlicher-Carcano rifle, as the presidential motorcade passed through Dealey Plaza in Dallas.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;article-content&quot; style=&quot;background-color: white; border: 0px none; color: #333333; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 26px; margin: 12px 0px 0px; outline: 0px none; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; vertical-align: baseline; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;div class=&quot;field field-name-body field-type-text-with-summary field-label-hidden&quot; style=&quot;border: 0px none; color: #555555; font-style: normal; font-variant: normal; font-weight: normal; line-height: 17px; margin: 0px; outline: 0px none; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;div class=&quot;field-items&quot; style=&quot;border: 0px none; font-style: inherit; font-weight: inherit; margin: 0px; outline: 0px none; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;div class=&quot;field-item even&quot; style=&quot;border: 0px none; font-style: inherit; font-weight: inherit; margin: 0px; outline: 0px none; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;div style=&quot;border: 0px none; color: black; font-style: normal; font-variant: normal; font-weight: normal; line-height: 26px; margin: 0px 0px 24px; outline: 0px none; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;The report concluded the following: One shot struck Kennedy in the back of the neck and exited through his throat and then hit Texas Gov. John Connally, creating five wounds in Connally’s body. A shot after the aforementioned shot struck Kennedy in the rear portion of his head, killing him. Another shot missed the motorcade, but its ricochet injured bystander James Tague in the cheek as he stood 270 feet west of the motorcade on the Stemmons Freeway Overpass; the commission did not specify whether the missed shot was the first or third shot.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px none; color: black; font-style: normal; font-variant: normal; font-weight: normal; line-height: 26px; margin: 0px 0px 24px; outline: 0px none; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;b style=&quot;border: 0px none; font-style: inherit; font-weight: bold; margin: 0px; outline: 0px none; padding: 0px; vertical-align: baseline;&quot;&gt;Accused Assassin Arrested In 90 Minutes&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px none; color: black; font-style: normal; font-variant: normal; font-weight: normal; line-height: 26px; margin: 0px 0px 24px; outline: 0px none; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Approximately 90 minutes after the assassination, Oswald was captured in the Texas Theatre in Dallas. He was arrested first for the handgun murder of Dallas police officer J.D. Tippit, whom the Warren Commission concluded Oswald had also killed after the Dealey Plaza shooting, and he was later charged with murdering President Kennedy. However, the accused Oswald did not get to stand trial because Dallas strip club/nightclub owner&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Jack_Ruby&quot; rel=&quot;nofollow&quot; style=&quot;border: 0px none; color: #d84b0e; font-style: normal; font-variant: normal; font-weight: normal; line-height: 26px; margin: 0px; outline: 0px none; padding: 0px; text-decoration: underline; vertical-align: baseline;&quot; target=&quot;_blank&quot;&gt;Jack Ruby&lt;/a&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;shot and killed Oswald two days later, on Nov. 24, 1963, at 11:21 a.m. Central Time, as Oswald was being transferred by police from a Dallas police station cell to a nearby county jail.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px none; color: black; font-style: normal; font-variant: normal; font-weight: normal; line-height: 26px; margin: 0px 0px 24px; outline: 0px none; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Further, the accepted and widely published profile of Oswald in the initial months and years after the assassination was that of a “low-achievement, socially isolated, ill-educated Communist determined to kill someone of significance in the United States.” He was portrayed in the media as “a revolutionary who sought a change in the economic order from capitalism to communism by violent means,” or as a “mentally unstable/crazy person,” or some combination of the above.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px none; color: black; font-style: normal; font-variant: normal; font-weight: normal; line-height: 26px; margin: 0px 0px 24px; outline: 0px none; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;b style=&quot;border: 0px none; font-style: inherit; font-weight: bold; margin: 0px; outline: 0px none; padding: 0px; vertical-align: baseline;&quot;&gt;A Second Commission, A Different Conclusion&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px none; color: black; font-style: normal; font-variant: normal; font-weight: normal; line-height: 26px; margin: 0px 0px 24px; outline: 0px none; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Later, in 1979, a second U.S. government commission rendered a different conclusion regarding who killed President Kennedy. The&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/HSCA&quot; rel=&quot;nofollow&quot; style=&quot;border: 0px none; color: #d84b0e; font-style: normal; font-variant: normal; font-weight: normal; line-height: 26px; margin: 0px; outline: 0px none; padding: 0px; text-decoration: underline; vertical-align: baseline;&quot; target=&quot;_blank&quot;&gt;House Select Committee on Assassinations&lt;/a&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;(HSCA) concluded that Kennedy was very likely assassinated as a result of a plot/conspiracy, and that scientific acoustical evidence established a high probability that at least two gunman fired at the president -- with three shots fired from the TSBD (the book depository) and one shot from the grassy knoll. However, the HSCA was unable to identify the other gunman or the extent of the conspiracy.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px none; color: black; font-style: normal; font-variant: normal; font-weight: normal; line-height: 26px; margin: 0px 0px 24px; outline: 0px none; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Also, the HSCA agreed with the Warren Commission regarding Oswald’s role, but it specified which rifle shot from the TSBD missed the motorcade. The HSCA concluded that Oswald had fired three rifle shots at Kennedy, with the first missing the motorcade and the next two hitting it, the last of which struck Kennedy in the head, killing him.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px none; color: black; font-style: normal; font-variant: normal; font-weight: normal; line-height: 26px; margin: 0px 0px 24px; outline: 0px none; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;However, rather than close the JFK assassination case, the Warren Commission’s and the HSCA’s work and conclusions did just the opposite.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px none; color: black; font-style: normal; font-variant: normal; font-weight: normal; line-height: 26px; margin: 0px 0px 24px; outline: 0px none; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;In particular, questions remain about the Warren Commission’s failure to: interview some Dealey Plaza witnesses; review discrepancies between the conclusions of the Parkland Hospital physicians’ examination and the evidence provided by the Bethesda [Maryland] Naval Hospital’s autopsy photos; investigate the destruction of vital forensic presidential limousine evidence; evaluate the Dallas Police Department’s interrogation of Oswald.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px none; color: black; font-style: normal; font-variant: normal; font-weight: normal; line-height: 26px; margin: 0px 0px 24px; outline: 0px none; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;These and other concerns have led many&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.ctka.net/home.html&quot; rel=&quot;nofollow&quot; style=&quot;border: 0px none; color: #d84b0e; font-style: normal; font-variant: normal; font-weight: normal; line-height: 26px; margin: 0px; outline: 0px none; padding: 0px; text-decoration: underline; vertical-align: baseline;&quot; target=&quot;_blank&quot;&gt;assassination researchers to reject the Warren Commission&#39;s conclusions&lt;/a&gt;, either in whole or in part, and argue, like the HSCA, that more than one person fired gunshots at President Kennedy that day in a plot or conspiracy to kill the president.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px none; color: black; font-style: normal; font-variant: normal; font-weight: normal; line-height: 26px; margin: 0px 0px 24px; outline: 0px none; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Conversely, lone-gunman supporters stand by the Warren Commission’s report and conclusion, on the grounds that not enough hard evidence exists to undermine the commission’s conclusion that Oswald acted alone.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px none; color: black; font-style: normal; font-variant: normal; font-weight: normal; line-height: 26px; margin: 0px 0px 24px; outline: 0px none; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Hence, one can summarize the state of the research and investigation into the assassination of President Kennedy as this:&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px none; color: black; font-style: normal; font-variant: normal; font-weight: normal; line-height: 26px; margin: 0px 0px 24px; outline: 0px none; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;To date, there’s no “smoking gun,” or, in other words, while there’s no incontrovertible evidence of a plot or conspiracy to assassinate President Kennedy, there is a pattern of suspicious activity, along with a series of anomalies and a commonality of interests among key parties, that compel additional research and the release to the public of key documents.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px none; color: black; font-style: normal; font-variant: normal; font-weight: normal; line-height: 26px; margin: 0px 0px 24px; outline: 0px none; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;b style=&quot;border: 0px none; font-style: inherit; font-weight: bold; margin: 0px; outline: 0px none; padding: 0px; vertical-align: baseline;&quot;&gt;Researchers&#39; Work, Released Documents Revealing More Information&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px none; color: black; font-style: normal; font-variant: normal; font-weight: normal; line-height: 26px; margin: 0px 0px 24px; outline: 0px none; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Of course, lone-gunman supporters argue that as far as who assassinated President Kennedy, there’s nothing more to research: for them, it’s a settled issue. Even so, each year, new evidence becomes available -- on a variety of aspects in the case -- that tell us more than we knew previously about what really happened on that ignominious and fateful day in Dallas.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px none; color: black; font-style: normal; font-variant: normal; font-weight: normal; line-height: 26px; margin: 0px 0px 24px; outline: 0px none; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Further, one current research trend concerns the life of Lee Harvey Oswald -- in addition to research into witness evidence, forensic evidence, Parkland medical exam/Bethesda autopsy evidence, ballistic evidence, limousine evidence and interrogation evidence.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px none; color: black; font-style: normal; font-variant: normal; font-weight: normal; line-height: 26px; margin: 0px 0px 24px; outline: 0px none; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;As mentioned, in the initial months and years after the assassination, the accepted and widely circulated profile of Oswald was that of a “low-achievement, socially isolated, communist” or a “radical who sought a change in the economic order from capitalism to communism by violent means” or a “mentally unstable/crazy person,” or some combination thereof.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px none; color: black; font-style: normal; font-variant: normal; font-weight: normal; line-height: 26px; margin: 0px 0px 24px; outline: 0px none; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;However, the release of documents and research by historians, assassination researchers and other investigators indicates that Oswald was a much different person than the one who was initially portrayed after the assassination of President Kennedy.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px none; color: black; font-style: normal; font-variant: normal; font-weight: normal; line-height: 26px; margin: 0px 0px 24px; outline: 0px none; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Further,&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://jfkfacts.org/assassination/news/cia-admits-joannides-had-a-residence-in-new-orleans/&quot; rel=&quot;nofollow&quot; style=&quot;border: 0px none; color: #d84b0e; font-style: normal; font-variant: normal; font-weight: normal; line-height: 26px; margin: 0px; outline: 0px none; padding: 0px; text-decoration: underline; vertical-align: baseline;&quot; target=&quot;_blank&quot;&gt;some of the recent, hard evidence on Oswald&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/a&gt;-- far from confirming a low-achievement individual -- reveals that he was a multiskilled individual who had a number of accomplishments. And while other pieces of hard evidence increase historians&#39; clarity about various periods in Oswald’s life, much of it nevertheless begs other questions.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px none; color: black; font-style: normal; font-variant: normal; font-weight: normal; line-height: 26px; margin: 0px 0px 24px; outline: 0px none; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;b style=&quot;border: 0px none; font-style: inherit; font-weight: bold; margin: 0px; outline: 0px none; padding: 0px; vertical-align: baseline;&quot;&gt;18 Questions That May Get the Nation Closer To The Truth&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px none; color: black; font-style: normal; font-variant: normal; font-weight: normal; line-height: 26px; margin: 0px 0px 24px; outline: 0px none; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;It’s those questions -- 18 of which are listed below -- that, when answered, will give the American people and others around the world a better understanding of who Lee Harvey Oswald was.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px none; color: black; font-style: normal; font-variant: normal; font-weight: normal; line-height: 26px; margin: 0px 0px 24px; outline: 0px none; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;b&gt;1)&lt;/b&gt; The United States Navy Base at Atsugi, Japan, to which U. S. Marine Corps member Oswald was assigned from September 1957 to November 1958, was not just a run-of-the-mill U.S. Navy-operated defense base. It was and is a Central Intelligence Agency (CIA) base. Among other intelligence operations, the Atsugi base was one of two bases from which the CIA operated the top secret U-2 spy plane, which flew reconnaissance and surveillance missions over the Soviet Union and China. Why was the low-achieving, nondescript Oswald assigned to such a top secret and important base?&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px none; color: black; font-style: normal; font-variant: normal; font-weight: normal; line-height: 26px; margin: 0px 0px 24px; outline: 0px none; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;b&gt;2)&lt;/b&gt; When Oswald defected to the Soviet Union in October 1959, as a former Marine, a 201 File on him containing personnel documents should have been created by the CIA, because he had been stationed at a top secret naval base. No such file was immediately opened; instead, it was delayed. Why?&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px none; color: black; font-style: normal; font-variant: normal; font-weight: normal; line-height: 26px; margin: 0px 0px 24px; outline: 0px none; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Rather, a 201 File on him was created a year later, in December 1960, and that late opening compels questions regarding how the CIA interpreted Oswald’s defection.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px none; color: black; font-style: normal; font-variant: normal; font-weight: normal; line-height: 26px; margin: 0px 0px 24px; outline: 0px none; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;To underscore, the CIA’s treatment of Oswald’s defection was an anomaly -- it says something about who Oswald was, or, minimally, how his file was viewed by the CIA. If a former U.S. Marine defected from the United States to the Soviet Union at the height of the Cold War, and if he truly posed a risk of giving U.S. radar secrets and other sensitive information to the Russians, then why did the CIA did not immediately open a 201 File on him?&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px none; color: black; font-style: normal; font-variant: normal; font-weight: normal; line-height: 26px; margin: 0px 0px 24px; outline: 0px none; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;b&gt;3) &lt;/b&gt;Oswald traveled through four nations in Europe en route to his defection to the Soviet Union, but he had virtually no money. As a person of modest means, how did Oswald finance his complicated defection trip?&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px none; color: black; font-style: normal; font-variant: normal; font-weight: normal; line-height: 26px; margin: 0px 0px 24px; outline: 0px none; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;b&gt;4) &lt;/b&gt;During his trip through Europe to the Soviet Union, Oswald traveled from England to Helsinki, Finland, and initially checked in to the Hotel Torni&amp;nbsp; -- which was roughly equivalent to staying at the Ritz Carlton. Where did the cash-strapped, low-resource, working-class Oswald get the money to stay at such a high-class hotel?&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px none; color: black; font-style: normal; font-variant: normal; font-weight: normal; line-height: 26px; margin: 0px 0px 24px; outline: 0px none; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Perhaps Oswald underestimated the Torni’s hotel fees, because he soon checked out and sought another hotel -- but his second choice wasn’t much cheaper: the Klaus Kurki Hotel -- another four-star hotel -- which was similar in quality to the Four Seasons.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px none; color: black; font-style: normal; font-variant: normal; font-weight: normal; line-height: 26px; margin: 0px 0px 24px; outline: 0px none; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;b&gt;5) &lt;/b&gt;Upon arriving in the Soviet Union, Oswald said he was a U.S. Marine Corp. radar operator, and that he knew some “classified things” that he planned to give to the Soviets. However, Oswald was never punished by the U.S. government for making these disloyal statements. Why?&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px none; color: black; font-style: normal; font-variant: normal; font-weight: normal; line-height: 26px; margin: 0px 0px 24px; outline: 0px none; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;b&gt;6) &lt;/b&gt;Oswald, despite his Marxist beliefs and defection to the Soviet Union, was later allowed to return to the United States after he decided he was wrong to defect and had become disillusioned with the form of communism practiced by the Russians. Despite his defection and all-but abandoned Soviet sympathies, and despite it being the height of the Cold War, Oswald was permitted by the U.S. government to return to the United States. Why?&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px none; color: black; font-style: normal; font-variant: normal; font-weight: normal; line-height: 26px; margin: 0px 0px 24px; outline: 0px none; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;b&gt;7) &lt;/b&gt;Just before he re-defected to the United States, Oswald wrote to his mother, Marguerite Oswald, telling her that before he traveled to his home in New Orleans, “I plan to stop over in Washington for a while.” Why did Oswald stop in Washington, D.C.? What did he do there?&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px none; color: black; font-style: normal; font-variant: normal; font-weight: normal; line-height: 26px; margin: 0px 0px 24px; outline: 0px none; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;b&gt;8) &lt;/b&gt;After he defected back to the United States from the Soviet Union, Oswald was de-briefed by the CIA, which the CIA initially lied about by claiming the interview did not occur. The CIA, when documents later surfaced that it had de-briefed Oswald, revised its story and called this meeting a “routine contact” for anyone who re-defected to the United States. Was this a routine contact? Or something more substantial? And why did the CIA initially lie about its contact with Oswald?&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px none; color: black; font-style: normal; font-variant: normal; font-weight: normal; line-height: 26px; margin: 0px 0px 24px; outline: 0px none; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;b&gt;9) &lt;/b&gt;Some “Hands Off Cuba” leaflets, which Oswald distributed in August 1963 on the day of his arrest in New Orleans following a scuffle with anti-Castro protesters, were stamped with the address 544 Camp Street, which had no connection to any pro-Castro organization but did identify the building in which the offices of Guy Bannister, a private investigator involved in anti-Castro activities, were located. Why did they have a 544 Camp Street address?&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px none; color: black; font-style: normal; font-variant: normal; font-weight: normal; line-height: 26px; margin: 0px 0px 24px; outline: 0px none; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;b&gt;10) &lt;/b&gt;The Warren Commission portrayed Oswald as a disgruntled, low-achievement loner. But the record shows that Oswald was a Civil Air Patrol cadet and a U.S. Marine Corps radar operator who was also trained in electronics, interrogation techniques and the Russian language. Oswald was also able to defect to the Soviet Union, live in Russia for two years and re-defect with a Russian wife … and gain re-admission to the United States in a matter of days after applying for re-defection. That’s a remarkable training, skills and accomplishment record for a low-achievement, low-resource citizen. How can one reconcile the Warren Commission’s profile with what the Oswald record shows?&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px none; color: black; font-style: normal; font-variant: normal; font-weight: normal; line-height: 26px; margin: 0px 0px 24px; outline: 0px none; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;b&gt;11) &lt;/b&gt;The U.S. State Department extended Oswald a loan to pay for his travel expenses to return to the United States. As&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.youtube.com/watch?v=wD9wrSM8bwo&quot; rel=&quot;nofollow&quot; style=&quot;border: 0px none; color: #d84b0e; font-style: normal; font-variant: normal; font-weight: normal; line-height: 26px; margin: 0px; outline: 0px none; padding: 0px; text-decoration: underline; vertical-align: baseline;&quot; target=&quot;_blank&quot;&gt;JFK Assassination Researcher Bob Harris points out,&lt;/a&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;that’s pretty generous treatment during the height of the Cold War for someone with a Marxist past, who could have been a potential subversive and traitor to his country. Why did the State Department extend the loan?&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px none; color: black; font-style: normal; font-variant: normal; font-weight: normal; line-height: 26px; margin: 0px 0px 24px; outline: 0px none; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;b&gt;12) &lt;/b&gt;After returning to the United States, Oswald contacted these three organizations within 90 days: the Fair Play For Cuba Committee, the American Civil Liberties Union and the Congress of Racial Equality -- three organizations at the top of FBI Director J. Edgar Hoover’s subversive list. Why did Oswald contact the organizations Hoover was trying to infiltrate and undermine the most?&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px none; color: black; font-style: normal; font-variant: normal; font-weight: normal; line-height: 26px; margin: 0px 0px 24px; outline: 0px none; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;b&gt;13) &lt;/b&gt;Despite being, arguably, the most important crime case in modern U.S. history, crime investigators in Dallas did not have a legal, stenographic record made of the interrogation of Oswald after his arrest, aside from memoranda written by interrogators. And the two forms of records are not remotely the same: The actual interrogation time of Oswald was about 10-12 hours -- why was there no stenographic record made that reflects that amount of time for the interrogation? And given the importance of the case, why wasn’t a professional stenographer used? And why wasn’t an audio recording of the interrogation sessions made?&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px none; color: black; font-style: normal; font-variant: normal; font-weight: normal; line-height: 26px; margin: 0px 0px 24px; outline: 0px none; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;b&gt;14) &lt;/b&gt;As noted, Oswald was portrayed by the Warren Commission as being a low-achievement loner and a very ordinary person. Yet, throughout his life, Oswald was surrounded by high-achievement, extraordinary people: David Ferrie, Priscilla Johnson McMillan, George de Mohrenschildt, Ruth Hyde Paine and Michael Paine, to list a few. How can one reconcile the Warren Commission’s profile of Oswald with the relationships Oswald had with these accomplished individuals during his adult life?&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px none; color: black; font-style: normal; font-variant: normal; font-weight: normal; line-height: 26px; margin: 0px 0px 24px; outline: 0px none; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;b&gt;15) &lt;/b&gt;The Warren Commission also portrays Oswald as a mentally unstable/crazy person, but Oswald was nevertheless able to attract and court -- in a foreign country, no less -- Marina Prusakova, a pharmacy employee, of Minsk, Russia (then the Soviet Union), whom he married in 1959. How can one reconcile the Warren Commission’s conclusion that Oswald was mentally unstable -- which generally is not viewed as a quality likely to attract a mate -- with Marina Prusakova’s willingness to marry Oswald?&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px none; color: black; font-style: normal; font-variant: normal; font-weight: normal; line-height: 26px; margin: 0px 0px 24px; outline: 0px none; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Oswald was also able to re-defect to the United States with his Russian wife, quickly, after he requested to return to his native country. Why was he able to do so with such speed and ease?&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px none; color: black; font-style: normal; font-variant: normal; font-weight: normal; line-height: 26px; margin: 0px 0px 24px; outline: 0px none; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;b&gt;16)&lt;/b&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://jfkfacts.org/assassination/who-was-george-joannides-and-why-is-his-story-important/#more-8987&quot; rel=&quot;nofollow&quot; style=&quot;border: 0px none; color: #d84b0e; font-style: normal; font-variant: normal; font-weight: normal; line-height: 26px; margin: 0px; outline: 0px none; padding: 0px; text-decoration: underline; vertical-align: baseline;&quot; target=&quot;_blank&quot;&gt;CIA Operations Officer George Joannides&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/a&gt;of Miami, now deceased, guided and monitored the New Orleans chapter of an anti-Castro Cuban exile group, the Directorio Revolucionario Estudiantil (DRE), that Oswald had a series of encounters with in the summer of 1963, three months before Kennedy was murdered.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px none; color: black; font-style: normal; font-variant: normal; font-weight: normal; line-height: 26px; margin: 0px 0px 24px; outline: 0px none; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Later, in 1978, Joannides served as CIA liaison to the House Select Committee on Assassinations, but he did not disclose this obvious conflict-of-interest to the HSCA regarding his role in the events of 1963. Why?&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px none; color: black; font-style: normal; font-variant: normal; font-weight: normal; line-height: 26px; margin: 0px 0px 24px; outline: 0px none; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/G._Robert_Blakey&quot; rel=&quot;nofollow&quot; style=&quot;border: 0px none; color: #d84b0e; font-style: normal; font-variant: normal; font-weight: normal; line-height: 26px; margin: 0px; outline: 0px none; padding: 0px; text-decoration: underline; vertical-align: baseline;&quot; target=&quot;_blank&quot;&gt;HSCA Chief Counsel G. Robert Blakey&lt;/a&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;said that had he known who Joannides was at that time, Joannides would have not continued as CIA liaison&lt;i style=&quot;border: 0px none; font-style: italic; font-weight: inherit; margin: 0px; outline: 0px none; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/i&gt;&lt;i style=&quot;border: 0px none; font-style: italic; font-weight: inherit; margin: 0px; outline: 0px none; padding: 0px; vertical-align: baseline;&quot;&gt;and instead&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/i&gt;&lt;i style=&quot;border: 0px none; font-style: italic; font-weight: inherit; margin: 0px; outline: 0px none; padding: 0px; vertical-align: baseline;&quot;&gt;would have become a witness who would have been interrogated under oath by the HSCA staff or by the committee.&lt;/i&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px none; color: black; font-style: normal; font-variant: normal; font-weight: normal; line-height: 26px; margin: 0px 0px 24px; outline: 0px none; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;b&gt;17) &lt;/b&gt;Thirty-five years later, the CIA continues to oppose the release of Joannides’ files that relate to the JFK assassination. Why? (The public release of these files, among other classified JFK files, is being sought by&lt;a href=&quot;http://www.nytimes.com/2009/10/17/us/17inquire.html?pagewanted=all&quot; rel=&quot;nofollow&quot; style=&quot;border: 0px none; color: #d84b0e; font-style: normal; font-variant: normal; font-weight: normal; line-height: 26px; margin: 0px; outline: 0px none; padding: 0px; text-decoration: underline; vertical-align: baseline;&quot; target=&quot;_blank&quot;&gt;author/researcher Jefferson Morley&lt;/a&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;in the ongoing&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://jfkfacts.org/assassination/morley-v-cia-jfk-at-issue-in-federal-court-next-week/&quot; rel=&quot;nofollow&quot; style=&quot;border: 0px none; color: #d84b0e; font-style: normal; font-variant: normal; font-weight: normal; line-height: 26px; margin: 0px; outline: 0px none; padding: 0px; text-decoration: underline; vertical-align: baseline;&quot; target=&quot;_blank&quot;&gt;Morley v. CIA suit.&lt;/a&gt;) The CIA says the Joannides files must remain classified due to “national security.” Why?&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px none; color: black; font-style: normal; font-variant: normal; font-weight: normal; line-height: 26px; margin: 0px 0px 24px; outline: 0px none; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;b&gt;18)&lt;/b&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://jfkfacts.org/assassination/top-6-jfk-files-the-cia-still-keeps-secret/#more-6804&quot; rel=&quot;nofollow&quot; style=&quot;border: 0px none; color: #d84b0e; font-style: normal; font-variant: normal; font-weight: normal; line-height: 26px; margin: 0px; outline: 0px none; padding: 0px; text-decoration: underline; vertical-align: baseline;&quot; target=&quot;_blank&quot;&gt;The classified files&lt;/a&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;of CIA officers&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://jfkfacts.org/assassination/top-6-jfk-files-the-cia-still-keeps-secret/#more-6804&quot; rel=&quot;nofollow&quot; style=&quot;border: 0px none; color: #d84b0e; font-style: normal; font-variant: normal; font-weight: normal; line-height: 26px; margin: 0px; outline: 0px none; padding: 0px; text-decoration: underline; vertical-align: baseline;&quot; target=&quot;_blank&quot;&gt;David Atlee Philips&lt;/a&gt;, who was involved in pre-assassination surveillance of Oswald; Birch D O’Neal, who as counter-intelligence head of the CIA opened a file on defector Oswald;&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://jfkfacts.org/assassination/top-6-jfk-files-the-cia-still-keeps-secret/#more-6804&quot; rel=&quot;nofollow&quot; style=&quot;border: 0px none; color: #d84b0e; font-style: normal; font-variant: normal; font-weight: normal; line-height: 26px; margin: 0px; outline: 0px none; padding: 0px; text-decoration: underline; vertical-align: baseline;&quot; target=&quot;_blank&quot;&gt;E. Howard Hunt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/a&gt;&lt;a href=&quot;http://jfkfacts.org/assassination/top-6-jfk-files-the-cia-still-keeps-secret/#more-6804&quot; rel=&quot;nofollow&quot; style=&quot;border: 0px none; color: #d84b0e; font-style: normal; font-variant: normal; font-weight: normal; line-height: 26px; margin: 0px; outline: 0px none; padding: 0px; text-decoration: underline; vertical-align: baseline;&quot; target=&quot;_blank&quot;&gt;William King Harvey;&lt;/a&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://jfkfacts.org/assassination/top-6-jfk-files-the-cia-still-keeps-secret/#more-6804&quot; rel=&quot;nofollow&quot; style=&quot;border: 0px none; color: #d84b0e; font-style: normal; font-variant: normal; font-weight: normal; line-height: 26px; margin: 0px; outline: 0px none; padding: 0px; text-decoration: underline; vertical-align: baseline;&quot; target=&quot;_blank&quot;&gt;Anne Goodpasture&lt;/a&gt;; and&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://jfkfacts.org/assassination/top-6-jfk-files-the-cia-still-keeps-secret/#more-6804&quot; rel=&quot;nofollow&quot; style=&quot;border: 0px none; color: #d84b0e; font-style: normal; font-variant: normal; font-weight: normal; line-height: 26px; margin: 0px; outline: 0px none; padding: 0px; text-decoration: underline; vertical-align: baseline;&quot; target=&quot;_blank&quot;&gt;David Sanchez Morales&lt;/a&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;-- when made public, these files will also help the nation determine what really happened in Dallas, who Oswald was, and how the CIA treated and handled his file. But as with Joannides’ files, the CIA said these files must remain classified until at least 2017, and perhaps longer, due to U.S. national security. Why? It has been 50 years. What event or act that occurred 50 years ago could possibly be in these files that could hurt U.S. national security?&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px none; color: black; font-style: normal; font-variant: normal; font-weight: normal; line-height: 26px; margin: 0px 0px 24px; outline: 0px none; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;b style=&quot;border: 0px none; font-style: inherit; font-weight: bold; margin: 0px; outline: 0px none; padding: 0px; vertical-align: baseline;&quot;&gt;Determining Factor On Oswald - The Record&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px none; color: black; font-style: normal; font-variant: normal; font-weight: normal; line-height: 26px; margin: 0px 0px 24px; outline: 0px none; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Answers to these questions, and others, will not incontrovertibly prove that there was -- or was not -- a second gunman in Dealey Plaza during the assassination of President John F. Kennedy.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px none; color: black; font-style: normal; font-variant: normal; font-weight: normal; line-height: 26px; margin: 0px 0px 24px; outline: 0px none; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;But they will give the American people a better idea about whether the initial portrayal of Lee Harvey Oswald by the media and authorities was the truth. Or a lie.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Source:&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.ibtimes.com/jfk-assassination-just-who-was-lee-harvey-oswald-1474038&quot;&gt;http://www.ibtimes.com/jfk-assassination-just-who-was-lee-harvey-oswald-1474038&lt;/a&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;__________________________&amp;nbsp;&lt;/span&gt;&lt;/b&gt; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
</description><link>http://news2u.blogspot.com/2013_11_01_archive.html#4359726218493029191</link><author>noreply@blogger.com (Unknown)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5604605.post-5840531263937678288</guid><pubDate>Sat, 09 Nov 2013 01:46:00 +0000</pubDate><atom:updated>2013-11-08T20:48:14.405-05:00</atom:updated><title>Israel Gave Birth Control to Ethiopian Immigrants Without Their Consent</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div style=&quot;background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: 300; letter-spacing: normal; line-height: 24px; margin: 0px 0px 25px; padding: 0px; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;In January 2013, Israel acknowledged that medical authorities have been giving Ethiopian immigrants long-term birth-control injections, often without their knowledge or consent.&lt;span id=&quot;more-6891&quot; style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/span&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;The Israeli government had previously denied the charges, which were first brought to light by investigative reporter Gal Gabbay in a December 8, 2012, broadcast of Israeli Educational Television’s news program,&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;i style=&quot;margin: 0px; padding: 0px;&quot;&gt;Vacuum&lt;/i&gt;. In January, the Israeli Health Ministry’s director-general, Ron Gamzu, ordered all gynecologists to stop administering the drugs.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: 300; letter-spacing: normal; line-height: 24px; margin: 0px 0px 25px; padding: 0px; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Gabbay interviewed over thirty women from Ethiopia in an attempt to discover why birth rates in the immigrant community were so low. Israeli medical authorities had been injecting women of Ethiopian origin with a drug alleged to be Depo-Provera, a highly effective and long-lasting form of contraception. In some cases, the drugs were reportedly administered to women waiting in transit camps for permission to immigrate to Israel. Writing for the&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;i style=&quot;margin: 0px; padding: 0px;&quot;&gt;Electronic Intifada&lt;/i&gt;, Ali Abunimah makes the case that, “if the allegations are proven, this practice may fit the legal definition of genocide.”&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: 300; letter-spacing: normal; line-height: 24px; margin: 0px 0px 25px; padding: 0px; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Nearly 100,000 Ethiopian Jews have moved to Israel under the Law of Return since the 1980s, but some rabbis have questioned their Jewishness. In May 2012, Israeli prime minister Benjamin Netanyahu ignited controversy when he warned that illegal immigrants from Africa “threaten our existence as a Jewish and democratic state.”&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Sources:&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: 300; letter-spacing: normal; line-height: 24px; margin: 0px 0px 25px; padding: 0px; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Alistair Dawber, “Israel Gave Birth Control to Ethiopian Jews without Their Consent,”&lt;i style=&quot;margin: 0px; padding: 0px;&quot;&gt;Independent&lt;/i&gt;, January 27, 2013,&amp;nbsp;&lt;a href=&quot;http://www.independent.co.uk/news/world/middle-east/israel-gave-birth-control-to-ethiopian-jews-without-their-consent-8468800.html&quot; style=&quot;color: #701701; font-weight: 300; margin: 0px; padding: 0px; text-decoration: none; text-rendering: optimizelegibility;&quot;&gt;http://www.independent.co.uk/news/world/middle-east/israel-gave-birth-control-to-ethiopian-jews-without-their-consent-8468800.html&lt;/a&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: 300; letter-spacing: normal; line-height: 24px; margin: 0px 0px 25px; padding: 0px; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Ali Abunimah, “Did Israel Violate the Genocide Convention by Forcing Contraceptives on Ethiopian Women?”&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;i style=&quot;margin: 0px; padding: 0px;&quot;&gt;Electronic Intifada&lt;/i&gt;, January 28, 2013,&lt;a href=&quot;http://electronicintifada.net/blogs/ali-abunimah/did-israel-violate-genocide-convention-forcing-contraceptives-ethiopian-women&quot; style=&quot;color: #701701; font-weight: 300; margin: 0px; padding: 0px; text-decoration: none; text-rendering: optimizelegibility;&quot;&gt;http://electronicintifada.net/blogs/ali-abunimah/did-israel-violate-genocide-convention-forcing-contraceptives-ethiopian-women&lt;/a&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: 300; letter-spacing: normal; line-height: 24px; margin: 0px 0px 25px; padding: 0px; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Beth Brogan, “Israel Admits Forced Birth Control For Ethiopian Immigrants,”&amp;nbsp;Common Dreams, January 29, 2013,&amp;nbsp;&lt;a href=&quot;http://www.commondreams.org/headline/2013/01/29-0&quot; style=&quot;color: #701701; font-weight: 300; margin: 0px; padding: 0px; text-decoration: none; text-rendering: optimizelegibility;&quot;&gt;http://www.commondreams.org/headline/2013/01/29-0&lt;/a&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: 300; letter-spacing: normal; line-height: 24px; margin: 0px 0px 25px; padding: 0px; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;b style=&quot;margin: 0px; padding: 0px;&quot;&gt;Student Researchers:&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/b&gt;Shanti Williams (College of Marin); Elizabeth Saechao (Sonoma State University)&lt;b style=&quot;margin: 0px; padding: 0px;&quot;&gt;&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;b style=&quot;margin: 0px; padding: 0px;&quot;&gt;Faculty Evaluator:&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/b&gt;Andy Lee Roth (College of Marin); Noel Byrne (Sonoma State University)&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: 300; letter-spacing: normal; line-height: 24px; margin: 0px 0px 25px; padding: 0px; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;a href=&quot;http://www.projectcensored.org/25-israel-gave-birth-control-ethiopian-immigrants-without-consent/&quot;&gt;http://www.projectcensored.org/25-israel-gave-birth-control-ethiopian-immigrants-without-consent/&lt;/a&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;_________________________ &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</description><link>http://news2u.blogspot.com/2013_11_01_archive.html#5840531263937678288</link><author>noreply@blogger.com (Unknown)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5604605.post-7071336083357518791</guid><pubDate>Wed, 23 Oct 2013 01:11:00 +0000</pubDate><atom:updated>2013-10-22T20:16:54.270-05:00</atom:updated><title></title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;h1 class=&quot;title-news&quot; style=&quot;-webkit-text-stroke-width: 0px; background-color: white; border: 0px; color: #111111; font-family: Georgia, Century, Times, serif; font-size: 30px !important; font-style: normal; font-variant: normal; font-weight: bold !important; letter-spacing: normal; line-height: 36px; list-style: none; margin: 0px 0px 10px; orphans: auto; overflow: visible; padding: 20px 0px 0px; text-align: left; text-decoration: none; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
Congress Considers Letting Pension Trustees Slash Benefits For Retirees: Report&lt;/h1&gt;
&lt;div class=&quot;comments_datetime_new border_none relative v05&quot; data-beacon=&quot;{&amp;quot;p&amp;quot;:{&amp;quot;mnid&amp;quot;:&amp;quot;entryByline&amp;quot;}}&quot; style=&quot;background-color: white; border: 0px none; color: black; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 15.9943px; list-style: none outside none; margin: 0px; overflow: visible; padding: 0px; position: relative; text-align: left; text-decoration: none; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;div style=&quot;border: 0px none; color: #999999; line-height: 16px; list-style: none outside none; margin: 0px; overflow: visible; padding: 0px; text-align: justify; text-decoration: none; text-indent: 1.5em;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;b style=&quot;border: 0px none; color: rgb(0, 0, 0) ! important; list-style: none outside none; margin: 0px; overflow: visible; padding: 0px; text-decoration: none; text-indent: 0px ! important;&quot;&gt;The Huffington Post&lt;/b&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&amp;nbsp;|&amp;nbsp; By&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.huffingtonpost.com/dave-jamieson&quot; rel=&quot;author&quot; style=&quot;border: 0px none; color: #999999; list-style: none outside none; margin: 0px; outline: 0px none; overflow: visible; padding: 0px; text-decoration: none; text-indent: 0px ! important;&quot;&gt;Dave Jamieson&lt;/a&gt; &lt;span class=&quot;follow-author-mini&quot; style=&quot;border: 0px none; color: black; list-style: none outside none; margin: 0px; overflow: hidden; padding: 0px 0px 0px 3px; text-decoration: none; text-indent: 0px ! important;&quot;&gt;&lt;/span&gt;&lt;span class=&quot;posted-and-updated&quot; style=&quot;border: 0px none; color: rgb(0, 0, 0) ! important; display: block; list-style: none outside none; margin: 0px; overflow: visible; padding: 0px; text-decoration: none; text-indent: 0px ! important;&quot;&gt;Posted:&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span itemprop=&quot;datePublished&quot; style=&quot;border: 0px none; color: black; list-style: none outside none; margin: 0px; overflow: visible; padding: 0px; text-decoration: none; text-indent: 0px ! important;&quot;&gt;10/22/2013 2:32 pm EDT&lt;/span&gt;&amp;nbsp;&amp;nbsp;|&amp;nbsp;&amp;nbsp;Updated:&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span itemprop=&quot;dateModified&quot; style=&quot;border: 0px none; color: black; list-style: none outside none; margin: 0px; overflow: visible; padding: 0px; text-decoration: none; text-indent: 0px ! important;&quot;&gt;10/22/2013 4:59 pm EDT&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;entry_content&quot; style=&quot;-webkit-text-stroke-width: 0px; background-color: white; border-top-color: rgb(205, 205, 205); border-top-style: solid; border-width: 2px 0px 0px; color: black; font-family: Helvetica, sans-serif; font-size: 16.363636016845703px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 15.994318008422852px; list-style: none; margin: 15px 0px 0px; orphans: auto; overflow: visible; padding: 15px 0px 0px; text-align: left; text-decoration: none; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
&lt;div class=&quot;entry_body_text&quot; style=&quot;border: 0px; color: black; list-style: none; margin: 0px; overflow: visible; padding: 0px; text-decoration: none; text-indent: 0px !important;&quot;&gt;
&lt;div class=&quot;articleBody&quot; itemprop=&quot;articleBody&quot; style=&quot;border: 0px; color: black; list-style: none; margin: 0px; overflow: visible; padding: 0px; text-decoration: none; text-indent: 0px !important;&quot;&gt;
&lt;div style=&quot;border: 0px none; color: #333333; font-style: normal; font-variant: normal; font-weight: normal; line-height: 21px; list-style: none outside none; margin: 0px 0px 15px; overflow: visible; padding: 0px; text-align: justify; text-decoration: none; text-indent: 1.5em;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;In the coming weeks, Congress will consider legislation that would reform pension laws in a way that could slash benefits already promised to retirees,&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;b&gt;&lt;a href=&quot;http://inthesetimes.com/article/15752/the_war_on_pensions_goes_federal/&quot; style=&quot;border: 0px none; color: rgb(0, 136, 195) ! important; list-style: none outside none; margin: 0px; outline: 0px none; overflow: visible; padding: 0px; text-decoration: underline; text-indent: 0px ! important;&quot; target=&quot;_hplink&quot;&gt;In These Times reports&lt;/a&gt;.&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px none; color: #333333; font-style: normal; font-variant: normal; font-weight: normal; line-height: 21px; list-style: none outside none; margin: 0px 0px 15px; overflow: visible; padding: 0px; text-align: justify; text-decoration: none; text-indent: 1.5em;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;b&gt;The proposal, which hasn&#39;t been made public yet, would give trustees of multi-employer pension plans the discretion to cut guaranteed benefits, so long as those cuts were done as &quot;early corrective actions&quot; to financially troubled plans.&lt;/b&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px none; color: #333333; font-style: normal; font-variant: normal; font-weight: normal; line-height: 21px; list-style: none outside none; margin: 0px 0px 15px; overflow: visible; padding: 0px; text-align: justify; text-decoration: none; text-indent: 1.5em;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;While corporations in the past have been able to wiggle out of guarantees for future retirees, the promises to current retirees have generally been untouchable.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px none; color: #333333; font-style: normal; font-variant: normal; font-weight: normal; line-height: 21px; list-style: none outside none; margin: 0px 0px 15px; overflow: visible; padding: 0px; text-align: justify; text-decoration: none; text-indent: 1.5em;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;That would change under the plan Congress will soon consider. &quot;If adopted, the proposal would strike at the core&quot; of U.S. pension law, reporter Cole Stangler writes.&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px none; color: #333333; font-style: normal; font-variant: normal; font-weight: normal; line-height: 21px; list-style: none outside none; margin: 0px 0px 15px; overflow: visible; padding: 0px; text-align: justify; text-decoration: none; text-indent: 1.5em;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;The proportion of U.S. private-sector workers who enjoy defined-benefit pension plans has eroded significantly in recent years, as corporations switch to cheaper 401(k) plans to shift risks to their employees. Despite having fewer workers paying into such plans, and despite nearly being drained by the financial crisis, a lot of once-endangered multi-employer pension plans have&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.gpo.gov/fdsys/pkg/CHRG-112hhrg74621/pdf/CHRG-112hhrg74621.pdf&quot; style=&quot;border: 0px none; color: rgb(0, 136, 195) ! important; list-style: none outside none; margin: 0px; outline: 0px none; overflow: visible; padding: 0px; text-decoration: underline; text-indent: 0px ! important;&quot; target=&quot;_hplink&quot;&gt;since returned to stability&lt;/a&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px none; color: #333333; font-style: normal; font-variant: normal; font-weight: normal; line-height: 21px; list-style: none outside none; margin: 0px 0px 15px; overflow: visible; padding: 0px; text-align: justify; text-decoration: none; text-indent: 1.5em;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;According to Stangler, in addition to slashing benefits for many retirees, giving trustees the leeway to cut benefits in multi-employer plans could embolden corporations to argue for the same discretion in their own, smaller plans, which are subject to different rules.&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px none; color: #333333; font-style: normal; font-variant: normal; font-weight: normal; line-height: 21px; list-style: none outside none; margin: 0px 0px 15px; overflow: visible; padding: 0px; text-align: justify; text-decoration: none; text-indent: 1.5em;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&quot;&lt;i&gt;If this legislation included proposals to allow cuts to retiree benefits it would set a very bad precedent for all pension plans, large and small, public and private sector, troubled and well-funded, single-employer as well as multi-employer&lt;/i&gt;,&quot; Frank Larkin, of the International Association of Machinists and Aerospace Workers, told In These Times.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px none; color: #333333; font-style: normal; font-variant: normal; font-weight: normal; line-height: 21px; list-style: none outside none; margin: 0px 0px 15px; overflow: visible; padding: 0px; text-align: justify; text-decoration: none; text-indent: 1.5em;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;The National Coordinating Committee for Multi-Employer Plans, which is made up of unions as well as employers, has already spent hundreds of thousands of dollars lobbying on the proposal.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px none; color: #333333; font-style: normal; font-variant: normal; font-weight: normal; line-height: 21px; list-style: none outside none; margin: 0px 0px 15px; overflow: visible; padding: 0px; text-align: justify; text-decoration: none; text-indent: 1.5em;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Source:&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px none; color: #333333; font-style: normal; font-variant: normal; font-weight: normal; line-height: 21px; list-style: none outside none; margin: 0px 0px 15px; overflow: visible; padding: 0px; text-align: justify; text-decoration: none; text-indent: 1.5em;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;a href=&quot;http://www.huffingtonpost.com/2013/10/22/pension-cuts-in-these-times_n_4143938.html?utm_hp_ref=politics&quot;&gt;http://www.huffingtonpost.com/2013/10/22/pension-cuts-in-these-times_n_4143938.html?utm_hp_ref=politics&lt;/a&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px; color: #333333; font-family: Georgia, Century, Times, serif; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; line-height: 21px; list-style: none; margin: 0px 0px 15px; overflow: visible; padding: 0px; text-align: justify; text-decoration: none; text-indent: 1.5em;&quot;&gt;
________________ &lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
</description><link>http://news2u.blogspot.com/2013_10_01_archive.html#7071336083357518791</link><author>noreply@blogger.com (Unknown)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5604605.post-8282039963470429901</guid><pubDate>Mon, 14 Oct 2013 22:42:00 +0000</pubDate><atom:updated>2013-10-14T17:42:44.783-05:00</atom:updated><title></title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;h1 class=&quot;entry-title&quot; style=&quot;background-color: white; color: #333333; font-style: normal; font-variant: normal; letter-spacing: normal; line-height: 40px; margin: 0px 0px 10px; padding: 0px; text-align: start; text-decoration: none; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;font-size: x-large;&quot;&gt;China Lost 14 Million People in World War II. Why Is This Forgotten?&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h1&gt;
&lt;div class=&quot;title_excerpt&quot; style=&quot;background-color: white; border: medium none; color: #333333; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; margin: 0px 0px 15px; padding: 5px 10px 0px 0px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;div style=&quot;color: black; font-weight: normal; line-height: 20px; margin: 0px; padding: 0px; text-decoration: none;&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Historian Rana Mitter believes a better understanding of China&#39;s future actions can follow a truer understanding of its World War II past.&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;post-info&quot; style=&quot;background-color: white; color: #333333; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; margin: 0px 0px 15px; min-width: 500px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span class=&quot;date published time&quot; title=&quot;2013-09-17T14:40:14+00:00&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt; By&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;author vcard&quot;&gt;&lt;span class=&quot;fn&quot;&gt;&lt;a class=&quot;fn n&quot; href=&quot;http://www.psmag.com/author/mtodd/&quot; rel=&quot;author&quot; style=&quot;color: purple; text-decoration: none;&quot; title=&quot;Michael Todd&quot;&gt;Michael Todd&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;post-info&quot; style=&quot;background-color: white; color: #333333; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; margin: 0px 0px 15px; min-width: 500px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span class=&quot;date published time&quot; title=&quot;2013-09-17T14:40:14+00:00&quot;&gt;September 17, 2013&lt;/span&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&lt;/span&gt;&lt;span class=&quot;author vcard&quot;&gt;&lt;span class=&quot;fn&quot;&gt;&lt;a class=&quot;fn n&quot; href=&quot;http://www.psmag.com/author/mtodd/&quot; rel=&quot;author&quot; style=&quot;color: purple; text-decoration: none;&quot; title=&quot;Michael Todd&quot;&gt;&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;entry-content&quot; style=&quot;background-color: white; color: #333333; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; overflow: hidden; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;div class=&quot;flare-horizontal flare-backgroundcolor-none enablecounters enabletotal flare-hidden&quot; data-humbleflarecount=&quot;5&quot; style=&quot;clear: both; height: 0px ! important; min-height: 0px ! important; overflow: hidden; padding-bottom: 10px; position: relative; text-align: right; visibility: hidden; width: 0px ! important;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span class=&quot;loading&quot;&gt;&lt;span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;flare-total first&quot; style=&quot;border-right: 1px solid rgb(80, 80, 80); clear: both; color: #505050; display: inline-block; font-style: normal; font-variant: normal; font-weight: normal; height: 45px; line-height: 1em; margin-right: 7px; min-width: 55px; opacity: 1; padding-left: 0px; padding-right: 7px; position: relative; text-align: center; text-transform: uppercase; top: 12px; transition: opacity 0.5s ease 0s; width: auto;&quot;&gt;&lt;strong style=&quot;display: block; font-style: normal; font-variant: normal; font-weight: 700; line-height: 1.2em;&quot;&gt;&lt;/strong&gt;&lt;/span&gt;&lt;span class=&quot;flare-button button-type-filament flare-iconstyle-round-bevel last&quot; data-type=&quot;filament&quot; style=&quot;background-color: #9848b5; border-radius: 32px 32px 32px 32px; box-shadow: 0px 1px 4px 1px rgba(0, 0, 0, 0.098); display: inline-block; height: 24px; margin-right: 2px; position: relative; transition: border-radius 0.25s ease 0s; width: 24px; z-index: 0;&quot;&gt;&lt;span class=&quot;flare-button-wrap&quot; style=&quot;background-image: linear-gradient(rgba(255, 255, 255, 0) 0%, rgba(255, 255, 255, 0) 1%, rgba(0, 0, 0, 0.15) 100%); border-radius: 32px 32px 32px 32px; border: 1px solid rgba(0, 0, 0, 0.2); bottom: 0px; box-shadow: 0px 1px 2px 1px rgba(0, 0, 0, 0.098); display: block; left: 0px; position: absolute; right: 0px; top: 0px; transition: border-radius 0.25s ease 0s;&quot;&gt;&lt;span class=&quot;flare-button-icon&quot; style=&quot;background-image: url(&amp;quot;http://www.psmag.com/wp-content/plugins/flare/images/sprite-social-icons-horizontal-1.2.3.png&amp;quot;); background-position: -213px 0px; border-radius: 32px 32px 32px 32px; bottom: 0px; display: block; left: 0px; position: absolute; right: 0px; text-align: left; text-indent: -999em; top: 0px;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;flare-flyout flare-flyout-filament&quot; style=&quot;bottom: 40px; height: 0px; margin-bottom: 0px; margin-left: -6px; margin-top: -15px; min-width: 0px; overflow: hidden; padding: 6px 0px 0px 6px; position: absolute; width: 145px; z-index: 10;&quot;&gt;&lt;span _trackevent=&quot;&quot; class=&quot;flare-iframe-wrapper&quot; data-code-snippet=&quot;&amp;lt;a href=&amp;quot;https://filament.io/applications/flare?utm_source=flare_wp&amp;amp;utm_medium=deployment&amp;amp;utm_content=flarebar&amp;amp;utm_campaign=filament&amp;quot; onclick=&amp;quot;javascript:_gaq.push([&quot; http:=&quot;&quot; outbound-article=&quot;&quot; style=&quot;bottom: 10px; left: 13px; line-height: 15px; min-height: 15px; position: absolute; text-align: left; top: 11px; width: 105px;&quot; target=&quot;_blank&quot;&gt;&lt;strong&gt;&lt;/strong&gt;&lt;span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div align=&quot;center&quot; style=&quot;color: #333333; font-weight: normal; line-height: 22px; margin: 0px; padding: 0px 0px 15px; text-align: left; text-decoration: none;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;When looking back at World War II, the victors see their own military contributions the clearest. Hence the United Kingdom spotlights the Battle of Britain and El Alamein, the Russians Stalingrad and Kursk, and the Americans D-Day and Midway. The contribution of China, whose war was the longest and among the bloodiest, tends to be forgotten in the West, and for years was little commemorated even in China.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-weight: normal; line-height: 22px; margin: 0px; padding: 0px 0px 15px; text-decoration: none;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;A new book,&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.hmhco.com/shop/books/Forgotten-Ally/9780618894253&quot; style=&quot;color: purple; text-decoration: none;&quot; target=&quot;_blank&quot;&gt;&lt;i&gt;Forgotten Ally: China&#39;s World War II, 1937-1945&lt;/i&gt;&lt;/a&gt;, by&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.orinst.ox.ac.uk/staff/ea/chinese/rmitter.html&quot; style=&quot;color: purple; text-decoration: none;&quot; target=&quot;_blank&quot;&gt;Oxford historian Rana Mitter&lt;/a&gt;, aims to sharpen this fuzzy picture by presenting the Middle Kingdom’s eight-year war against an invading Japan—a war that had been under way more than two years before the Nazis invaded Poland, which is the usual starting point for histories of World War II. “Essentially,” Mitter explained in an interview with&lt;i&gt;Pacific Standard&lt;/i&gt;, “the politics of the Cold War covered over that what is coming to be realized, I think, as one of the great missing pieces of the jigsaw puzzle of World War II.” Now, however, a combination of archives in China opening up and a new political attitude by its leaders has cracked the historical window.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-weight: normal; line-height: 22px; margin: 0px; padding: 0px 0px 15px; text-decoration: none;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;For an American audience whose knowledge of China in the war might start with the 1937 Rape of Nanking and end with the volunteer American fighter pilots known as the Flying Tigers, the book offers a number of eye-openers:&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-weight: normal; line-height: 22px; margin: 0px; padding: 0px 0px 15px 30px; text-decoration: none;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;• The contribution of the Soviet Union to the Chinese Nationalists,&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;who were actively battling the Chinese Communists, was large and sustained. While it might have been ideologically unexpected, it fit in with Josef Stalin’s desire to most effectively check Japanese designs on the USSR. The two countries actually fought a sustained series of battles in Mongolia in 1939 which left thousands dead on both sides.&lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-weight: normal; line-height: 22px; margin: 0px; padding: 0px 0px 15px 30px; text-decoration: none;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;• While the Nationalist leader Chiang Kai-shek and Communist Mao Zedong are usually depicted as the titans of China’s resistance and its on-again, off-again civil war, Mitter details the rise and eclipse of a third figure, Wang Jingwei, whose stature and influence long equaled Chiang and Mao’s—until he made accommodation with the Japanese.&lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-weight: normal; line-height: 22px; margin: 0px; padding: 0px 0px 15px 30px; text-decoration: none;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;• The scale of China’s involvement in the war was massive. Chiang, for example, fielded four million troops at the Nationalist’s height, while China as a whole lost an estimated 14 million in the war. Had China folded, Japan’s capacity to fight the U.S. or even the Soviets would have been vastly amplified.&lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-weight: normal; line-height: 22px; margin: 0px; padding: 0px 0px 15px; text-decoration: none;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Why does any of this matter now? Mitter says the experience of World War II shapes Chinese attitudes today, especially between China and the United States and China and Japan, “two of the legs of a very important set of relationships in the Asiatic region. … I would argue very strongly that by looking at what happened in terms of a history in those years, you get a great deal of insight into what is important in that region now to people there and what will be important for the next decade to come.”&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-weight: normal; line-height: 22px; margin: 0px; padding: 0px 0px 15px; text-decoration: none;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;This has been edited for length and clarity.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-weight: normal; line-height: 22px; margin: 0px; padding: 0px 0px 15px; text-decoration: none;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;b&gt;The British title of the book is&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;i&gt;China’s War With Japan.&lt;/i&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;In the U.S. it’s&lt;i&gt;Forgotten Ally&lt;/i&gt;. Can you tell me what was the decision-making process in choosing titles?&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-weight: normal; line-height: 22px; margin: 0px; padding: 0px 0px 15px; text-decoration: none;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;b&gt;&lt;/b&gt;To some extent it has to do with the way in which some things are marketed.&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;i&gt;China’s War With Japan&lt;/i&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;is not just the U.K. edition; it’s also the edition that’s being sold in East Asia, India, Australia, and a whole variety of places. And I think it’s fair to say, for instance, that if you were to buy the book in Hong Kong or Singapore, it’s probably not fair to say that China is the forgotten ally, because there, of course, the memory of the Asian war is still strong. So in that sense, it’s more of a descriptive title of what the book is about. The North American market, and the United States in particular, the title&lt;i&gt;Forgotten Ally&lt;/i&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;was chosen in quite an intentional way because obviously you know it’s a history of China and why it matters today in terms of that period.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-weight: normal; line-height: 22px; margin: 0px; padding: 0px 0px 15px; text-decoration: none;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;But it’s also a reminder to the American public that there was this very important historical moment that has been forgotten and which is important for two reasons, one of which has to do with the very contemporary significance of understanding why Sino-American relations and Sino-Japanese relations, which are crucial to the shaping of the world, let alone the region, remain very volatile.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-weight: normal; line-height: 22px; margin: 0px; padding: 0px 0px 15px; text-decoration: none;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;But the second reason actually has to do something with historical justice. Regardless of the many flaws of the Chinese government at the time, Chiang Kai-shek’s government, I think it’s fair to say that they never, neither then nor now, have been given sufficient credit for what has often been regarded as a purely American victory in Asia, and particularly the Pacific.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-weight: normal; line-height: 22px; margin: 0px; padding: 0px 0px 15px; text-decoration: none;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;But the Chinese contribution up to now has generally been mostly dismissed or regarded as very minor, secondary, and not really worth bothering with. I think as we move decades and decades away from the events themselves, it’s no longer tenable to retain that position.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-weight: normal; line-height: 22px; margin: 0px; padding: 0px 0px 15px; text-decoration: none;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;b&gt;So why did this 
get lost? China was one of the Big Four at the end of the conflict, and 
the China lobby was very strong in the U.S. And then 14 million people 
who died make another fairly compelling argument. What happened?&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-weight: normal; line-height: 22px; margin: 0px; padding: 0px 0px 15px; text-decoration: none;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;b&gt;&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;It’s a good reason to remember that on its own. I would say that one of the single facts, which is worth remembering if you want to annoy an official in the Chinese Communist Party, is to remind them that the reason, the primary reason, that China today has a seat in the permanent five on the United Nations Security Council, the top table of global diplomacy, is not because of anything that Chairman Mao did. It was because of the wartime efforts of Chiang Kai-shek, and essentially as a direct result of China’s involvement on the Allied side in World War II.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-weight: normal; line-height: 22px; margin: 0px; padding: 0px 0px 15px; text-decoration: none;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;China now finds itself—more than 65, 70 years nearly after the end of World War II—as the only non-European, non-white power to sit at that top table. So these things do have a great deal of significance today.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-weight: normal; line-height: 22px; margin: 0px; padding: 0px 0px 15px; text-decoration: none;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;When were they forgotten? Put very simply, China’s wartime experience, suffering, and contribution to the Allied cause fell into a hole created by the Cold War. Neither side had an interest in recalling what China did.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-weight: normal; line-height: 22px; margin: 0px; padding: 0px 0px 15px; text-decoration: none;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;On the Chinese side, after 1949 when the civil war was over, the Nationalists had been exiled to Taiwan, and Mao was victorious on the mainland, you had essentially a virgin history in the mainland of China—that the only people who had made a contribution to fighting and defeating the Japanese were the Chinese communists.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-weight: normal; line-height: 22px; margin: 0px; padding: 0px 0px 15px; text-decoration: none;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;The contribution that had actually been made by the much larger Nationalist army was essentially either dismissed or wiped out of the official history that was taught in China itself. So there’s sort of an historical black hole there.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-weight: normal; line-height: 22px; margin: 0px; padding: 0px 0px 15px; text-decoration: none;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;But we can’t put any of the responsibility by any means on the Chinese communists on the mainland. You have to remember that in the West, we very quickly forgot about that wartime contribution as well. The reason is that Chiang Kai-shek, the Chinese wartime leader, was essentially seen as a sort of embarrassment—this Cold War relic remaining on Taiwan, looking more and more irrelevant year by year, associated with incompetence and corruption, with a whole variety of qualities that the West didn’t find very attractive.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-weight: normal; line-height: 22px; margin: 0px; padding: 0px 0px 15px; text-decoration: none;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;But what was forgotten was the leader, through a whole swath of decisions, many of them very problematic and difficult, had nonetheless kept China in the war against Japan. First of all, on his own for about four and half years, and then of course as part of the very difficult alliance with the West for another four years after that.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-weight: normal; line-height: 22px; margin: 0px; padding: 0px 0px 15px; text-decoration: none;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;b&gt;One thing that came out in your book that was surprising to me is the idea that China as a geographical construct, at least modern China as a geographical construct, seems to have arisen out of the war. Their west was not considered part of the main area. Is that a correct reading?&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-weight: normal; line-height: 22px; margin: 0px; padding: 0px 0px 15px; text-decoration: none;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;b&gt;&lt;/b&gt;I think it’s actually one of the most important elements of the question: Why on Earth does World War II matter for China? And the answer, well one of the answers, is geography.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-weight: normal; line-height: 22px; margin: 0px; padding: 0px 0px 15px; text-decoration: none;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;It happens for a variety of reasons. But at its most basic, there’s a sort of irony that China’s moment of greatest crisis in the 20th century in terms of foreign invasion, the Japanese invasion, actually forces the government, particularly the Nationalist government at the time, to centralize the authority. It has to finally eliminate one of the big problems of the era, which was the warlordism—the different military leaders who control different parts of China at that stage. Some of them have been done away with in a pretty brutal manner.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-weight: normal; line-height: 22px; margin: 0px; padding: 0px 0px 15px; text-decoration: none;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;And as a result, at the end of the war, even though China was smashed beyond recognition in many ways and of course was about to launch into a civil war, the problem that existed between the late 19th century and the outbreak of World War II, which was the splitting up into different warlord regions, was mostly resolved by the fact that the government had had to retreat into the interior and consolidate its rule during that period. So yet again, one of the legacies of Chiang’s period that Mao probably ought to have been grateful for but is unlikely to have mentioned at any encomium.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-weight: normal; line-height: 22px; margin: 0px; padding: 0px 0px 15px; text-decoration: none;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;b&gt;The West had a blind spot that’s been addressed fairly elaborately in recent years concerning the Soviet contribution to defeating Nazi Germany. Do you see the same dynamic happening here?&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-weight: normal; line-height: 22px; margin: 0px; padding: 0px 0px 15px; text-decoration: none;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;b&gt;&lt;/b&gt;Yes, and partly for the same reasons. And I’ll say one word that summarizes what that reason is, and that is&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;i&gt;archives&lt;/i&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-weight: normal; line-height: 22px; margin: 0px; padding: 0px 0px 15px; text-decoration: none;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;After 1991, after the fall of the Soviet Union, at least for a while, it became easier for Russian and Western researchers to look for the first time at the massive amounts of documentation that were kept in the old Soviet Union in Russia about Russia’s wartime contribution.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-weight: normal; line-height: 22px; margin: 0px; padding: 0px 0px 15px; text-decoration: none;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Now we haven’t had the kind of fall-of-the-Berlin-Wall, fall-of-Gorbachev-type moment in China. But what is undeniable is that for the last 20 years or so, is that China’s archives have been opened up more and more. And the big difference is that for the first time, people are allowed to look at the Nationalist, the Guomindang [or&lt;a href=&quot;http://www.kmt.org.tw/english/page.aspx?type=para&amp;amp;mnum=108&quot; style=&quot;color: purple; text-decoration: none;&quot;&gt;Kuomintang&lt;/a&gt;] side of the experience. One of the things I’ve always said about that research topic—and this often surprises people—is that it is not a case of brave Western researchers knocking on the door and demanding access to the hidden files. This is a trend that has emerged within China itself.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-weight: normal; line-height: 22px; margin: 0px; padding: 0px 0px 15px; text-decoration: none;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;China’s own researchers in the mainland are rediscovering the hidden parts of their own history, including the actually very creditable, very important wartime contribution of the old ideological ally, the Nationalist party, which is one of the reasons even Chiang Kai-shek has been partly rehabilitated in the mainland in a way that was unimaginable 25 or 30 years ago.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-weight: normal; line-height: 22px; margin: 0px; padding: 0px 0px 15px; text-decoration: none;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;b&gt;In the Eastern bloc, the Great Patriotic War is always an important cultural touchstone. You’re suggesting to me that in China itself in World War II, their version of the &quot;great patriotic war&quot; was not as much a cultural touchstone.&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-weight: normal; line-height: 22px; margin: 0px; padding: 0px 0px 15px; text-decoration: none;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;b&gt;&lt;/b&gt;Exactly. And that’s a big difference from the Soviet Union; you’re exactly right there. Basically, although it was distortive propaganda reasons in many ways, Stalin, Khrushchev, and his successors did use the patriotic war where the Soviets fight back against the Nazis as a key patriotic narrative. And the narrative of World War II didn’t disappear exactly in China. It was a relatively minor part of the way in which patriotism was constructed. You’ve got occasional signs of it—for example, the Japanese who turn up as sort of stage villains in some of the model operas in the cultural revolution period in the 1960s. But it’s clear that during most of Mao’s period, the real enemies were these Goumindang nationalists and not really the Japanese.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-weight: normal; line-height: 22px; margin: 0px; padding: 0px 0px 15px; text-decoration: none;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Why was that? Well, there are a variety reasons, but the Cold War is really the major one. During the Cold War period, Taiwan and Chiang kai-Shek was a clear and present danger to the Communist regime. They had to keep the population whipped up in a fever of fear against the possibility that the invaders might come back from Taiwan and essentially start World War III.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-weight: normal; line-height: 22px; margin: 0px; padding: 0px 0px 15px; text-decoration: none;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;In contrast, Japan was not a near defeated enemy, but one with which the Chinese Communists actually wanted to try and get closer. They realized that for a very poor, agrarian society like post-1947 China, it was important to try and gain technological know-how. With an American boycott, the chances of that coming from the U.S. were not that great [while] the Soviet Union was a rather different sort of partner. And so their answer sort of became Japan. There was a certain amount of non-official contact between China and Japan. This meant that there was a great interest in Chinese official circles in not stressing too much Japanese war crimes, in not making Tokyo feel that there was this great atmosphere of hostility.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-weight: normal; line-height: 22px; margin: 0px; padding: 0px 0px 15px; text-decoration: none;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;So again, rather bizarrely, the atrocities, which have since become better known at the Raid of Nanking and the wartime bombing at the temporary capital in Chongqing is another one…. Things simply weren’t publicized. You had to look very long and hard between the 1950s and the 1980s to find major mentions of anywhere in China of something like the Nanking Massacre of 1937. And this is essentially done to detach the Japanese from the wartime Cold War embrace of the United States in the Asia Pacific by backpedaling a bit on reminding them of what happened in the wartime years itself.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-weight: normal; line-height: 22px; margin: 0px; padding: 0px 0px 15px; text-decoration: none;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;This began to change in the 1980s, but during the Cold War there was a vested interest in Beijing in not stressing Japanese war crimes too much.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-weight: normal; line-height: 22px; margin: 0px; padding: 0px 0px 15px; text-decoration: none;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;b&gt;Something that isn’t unknown, but was relatively new to me was the Soviet contribution to the Nationalists, particularly the air power. In the U.S., we grow up thinking the Flying Tigers won the war, as opposed to having almost no effect. But it would appear to me that the Russian air power was significantly greater until the 14th U.S. Air Force arrived.&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-weight: normal; line-height: 22px; margin: 0px; padding: 0px 0px 15px; text-decoration: none;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;b&gt;&lt;/b&gt;I would say actually that the Flying Tigers, the American Volunteer Group, weren’t irrelevant at all. The contributions in terms of flying over the skies of Chongqing were not that many, but I mean in terms of psychology and in terms of morale boosting, they were important. And Claire Chennault, the leader of the AVG, actually played an important part in advising Chiang Kai-shek. So I wouldn’t underplay their role.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-weight: normal; line-height: 22px; margin: 0px; padding: 0px 0px 15px; text-decoration: none;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;But the fact is, as you said, that rather oddly in ideological terms, the major contribution at the beginning of the war in terms of unofficial, but real, military assistance came from the Soviet Union. And this was essentially one of those strange pieces of ideological cross-dressings that you get during that period. Not only do you get a Nazi-Soviet pact, which is the most astounding ideological reverse of the century. But on a fuller level, the strongly anti-Communist Chiang Kai-shek finds himself essentially taking aid from the Soviet Union, the reason being that Stalin obviously was supportive of the Chinese Communists, but he was much more terrified about losing Chiang Kai-shek as China’s leader.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-weight: normal; line-height: 22px; margin: 0px; padding: 0px 0px 15px; text-decoration: none;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Had Chiang fallen and had China become pro-Japanese, then Japan would have had a perfect launch pad to attack the Soviet Union in the late 1930s, early 1940s. And he was much more worried about that. So it was a very practical, non-altruistic reason for Stalin to essentially give assistance to the Chinese nationalists during that period.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-weight: normal; line-height: 22px; margin: 0px; padding: 0px 0px 15px; text-decoration: none;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;But the fact is that it was very helpful during the early campaign from battles including central China, in the Yangtze delta around Shanghai, and so forth. Although it was not able to prevent the Nationalists from having to withdraw to the interior of China, Soviet air force support and military assistance and material was important in making sure that the Nationalists at least managed to stand up against the Japanese.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-weight: normal; line-height: 22px; margin: 0px; padding: 0px 0px 15px; text-decoration: none;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;b&gt;One thing you mention in the book that is almost never written about were the clashes between the Japanese and the Soviets. That doesn’t ever get mentioned, and yet those were not mere border clashes.&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-weight: normal; line-height: 22px; margin: 0px; padding: 0px 0px 15px; text-decoration: none;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;b&gt;&lt;/b&gt;Oh no, they were very real and very major. And they happened over many weeks and months.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-weight: normal; line-height: 22px; margin: 0px; padding: 0px 0px 15px; text-decoration: none;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;This is one of the lesser known elements of the wider World War II experience, and I think the fact that we’re paying attention to it [&lt;a href=&quot;http://www.antonybeevor.com/&quot; style=&quot;color: purple; text-decoration: none;&quot;&gt;as in Anthony Beevor’s new history of World War II&lt;/a&gt;] does suggest that we’re beginning to realize that the whole Asian front is a lot more important than we’ve realized. Because in a sense what we’re talking about here is the event that doesn’t happen, the fact that the Soviet Union and Japan are&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;i&gt;not&lt;/i&gt;in conflict with each other, are&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;i&gt;not&lt;/i&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;at war, for most of the period that we think of as World War. The reason being that at&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Battles_of_Khalkhin_Gol&quot; style=&quot;color: purple; text-decoration: none;&quot;&gt;Nomonhan&lt;/a&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;essentially you had this confrontation between the Russians and the Japanese. The Japanese think that the Russians are weak because, of course, the purges of the Red Army are things that are going to completely eviscerate this particular army, only to find, in fact, that they are pushed back pretty steadily by the Soviets and hastily have to reach a compromise.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-weight: normal; line-height: 22px; margin: 0px; padding: 0px 0px 15px; text-decoration: none;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;And this was, of course, very bad news for the Chinese who have been fighting for the better part of a year before that. Chiang Kai-shek’s desperate hope was indeed that that the Soviets and the Japanese would go to war with each other and that he would get full-blooded, full-throated Soviet assistance for the Chinese cause.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-weight: normal; line-height: 22px; margin: 0px; padding: 0px 0px 15px; text-decoration: none;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;b&gt;When Chiang blew up the Yellow River dikes to slow down the advancing Japanese army—that ranks among the great atrocities of the war, yet I have never heard of it.&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-weight: normal; line-height: 22px; margin: 0px; padding: 0px 0px 15px; text-decoration: none;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;b&gt;&lt;/b&gt;No, that’s absolutely fair enough. And I mean this is one of the astounding things because, of course, it is also a sign of the moral ambiguities that went on in this war. At one level, as with all of the Allied and the Axis elements of World War II, we know exactly who to root for. We’re on the side of the Allies; we’re against the Axis. That’s very obvious.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-weight: normal; line-height: 22px; margin: 0px; padding: 0px 0px 15px; text-decoration: none;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;But what we’ve often had to cover over is that the Allies in some cases, whether through force or choice, made some choices that were absolutely devastating and meant death for their own people. And in this case, we’re talking about Chiang Kai-shek making this particular choice for his own two tragic and appalling decisions: either to let the Japanese invade and occupy central China in the summer of 1938, or take what he regarded as the ultimate last move and breach this massive hole in the dikes, which had held back this huge force of nature, the Yellow River, for decades and decades before at that point, and in doing so, stop the Japanese from advancing.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-weight: normal; line-height: 22px; margin: 0px; padding: 0px 0px 15px; text-decoration: none;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;And one has to say that in the short term it was successful in doing that. It’s a terrible thing to say, but it worked in strategic terms. The results: drowning or allowing to starve to death, and/or die of disease, some hundreds of thousands of Chinese farmers, who were given absolutely no warning of what was going to happen.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-weight: normal; line-height: 22px; margin: 0px; padding: 0px 0px 15px; text-decoration: none;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;The person who did notice and this at the time and was one of the things that set him on the path of opposition, was&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;em&gt;Time&lt;/em&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;magazine’s correspondent, Theodore White. And by the end of the war, he was one of the strongest critics and opponents of Chiang Kai-shek. And the breaching of the dams, if you read back into some of his sort of disillusionment with China was in retrospect I think the first moment where he began to think that Chiang Kai-shek was not a leader who he or his reports could support.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-weight: normal; line-height: 22px; margin: 0px; padding: 0px 0px 15px; text-decoration: none;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;b&gt;You seem to paint an almost likeable portrait of Chiang.&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-weight: normal; line-height: 22px; margin: 0px; padding: 0px 0px 15px; text-decoration: none;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;b&gt;&lt;/b&gt;It’s interesting you say that. People will read it and make up their own minds. But it is nonetheless important to understand him not as either a monster or a failure, but as a flawed human being like many of the other flawed human beings of the time.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-weight: normal; line-height: 22px; margin: 0px; padding: 0px 0px 15px; text-decoration: none;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;I think one of the important ways to understand is as a wartime leader who was forced to make a series of choices between one bad and another appalling choice over and over again. I tend to think that the whole China war story and Chiang’s part in it is written as a sort of melodrama or a sort of black versus white. I think it’s more like a Greek tragedy. There’s a sort of inexorability but with awful choices being made along the way. So it’s interesting you found him likeable, but I think more what I want to say is that he needs to be understood and come over as a human and flawed leader, but one who makes decisions that were rational and were able to be justified at the time.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-weight: normal; line-height: 22px; margin: 0px; padding: 0px 0px 15px; text-decoration: none;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;In terms of his own primary goal, which was at all costs—it was a huge and massive cost as you see in the book—to keep China fighting in the war. Winston Churchill is praised for his speech about “never surrender” in terms of Britain—regardless of whatever else might happen, it was important to keep fighting the Nazis the whole time. It’s often that [same] sort of determination against any logic that kept Chiang going. But Chiang has never really been given any credit for that all, whereas Churchill of course lives on in legend in terms of his resistance.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-weight: normal; line-height: 22px; margin: 0px; padding: 0px 0px 15px; text-decoration: none;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;One of the ironies is not only have the up-to-now unsympathetic American portraits of Chiang been revised significantly, the more heinous picture of him that you got in Mao’s China is now being reversed in his own homeland such that, as I have done, if you go to his birthplace, which is in a place called Xikou, in Zhejiang province, it’s like a shrine to the man. Even though it’s on the mainland, you would never know that he’d actually lost the civil war because as a hometown boy, he’s able to be celebrated by the locals in a way that would’ve gotten them all carted off to prison just 20 or 30 years ago.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-weight: normal; line-height: 22px; margin: 0px; padding: 0px 0px 15px; text-decoration: none;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;b&gt;You talk about Theodore White’s disenchantment, which brings up the larger question: Could there have been a re-enchantment between the United States and Mao at some point, even in 1949?&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-weight: normal; line-height: 22px; margin: 0px; padding: 0px 0px 15px; text-decoration: none;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;b&gt;&lt;/b&gt;That’s actually called the “last chance” in China. And there are still people who speak strongly in favor of it. My inclination is to say that I don’t think so—not in the terms of actually having a genuinely friendly and cordial engagement between the two sides.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-weight: normal; line-height: 22px; margin: 0px; padding: 0px 0px 15px; text-decoration: none;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Mao and his followers did claim that they wanted this, but we also know a lot more from archives and other sources about Mao’s own motivations. And it’s very clear that his ideology was such that he had to be oriented toward Chinese indigenous revolution and toward Moscow. He did not have a genuine affinity toward the United States. So I think in terms of a genuine alliance, there is actually very little chance that actually could have happened. What I would say, and should have happened and didn’t though, was something rather different, which was a way for China and the United States to at least engage with each other diplomatically, rather unlike the way the Americans and the Soviets did.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-weight: normal; line-height: 22px; margin: 0px; padding: 0px 0px 15px; text-decoration: none;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;The Cold War became very, very cold during much of that period. But there was never a period when Moscow and Washington weren’t talking to each other.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-weight: normal; line-height: 22px; margin: 0px; padding: 0px 0px 15px; text-decoration: none;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;But I think the fact that for the better part of a quarter century or more, down until Nixon and Kissinger come along, the Chinese and the Americans do not have a regular, proper, and open channel of discussion, was one of the great diplomatic missed opportunities of that period—one of many messy pieces of inheritance from that whole wartime alliance.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-weight: normal; line-height: 22px; margin: 0px; padding: 0px 0px 15px; text-decoration: none;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;b&gt;Speaking of alliances, it seems like China/Burma/India was where the &quot;special relationship&quot; between the U.S. and Great Britain showed its seams most clearly.&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-weight: normal; line-height: 22px; margin: 0px; padding: 0px 0px 15px; text-decoration: none;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;b&gt;&lt;/b&gt;[Laughing] Yes, if you mean a special relationship of mistrust and lack of understanding. Winston Churchill was probably one of the people who felt most strongly during that period that the war in Asia showed that the British and the Americans essentially had rather different aims in terms of what they wanted from World War II.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-weight: normal; line-height: 22px; margin: 0px; padding: 0px 0px 15px; text-decoration: none;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;What the Americans wanted was a re-worked world order in which imperialism in the British and French sense would be ended and some of the non-European powers would be raised to a rather higher level. What the British wanted was the restoration of the empire. And these proved to be fundamentally incompatible goals.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-weight: normal; line-height: 22px; margin: 0px; padding: 0px 0px 15px; text-decoration: none;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;And that’s why to me that was one of the most interesting things in terms of writing the book—looking at the war through Chiang Kai-shek’s eyes, through his diaries, was to see quite how strongly British imperialism, in particular, became a target for his anger. And his conversations with Nehru and to some extent with Mahatma Gandhi were an important element of that sort of anti-imperialism. But it’s one of those things that sort of meant that while he had a huge number of problems with the Americans, ultimately his orientation was toward the United States as being a dominant power in the region, rather than allowing the British any chance to come back.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-weight: normal; line-height: 22px; margin: 0px; padding: 0px 0px 15px; text-decoration: none;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;And I think actually that the British realized this very well. They realized that the British and American aims in China were related but not identical. It helped create even more confusion and, I think, lack of trust between the various sides, leading to things like the tragedy in Burma, which is an example of all sides essentially doing very badly. By the time you get to 1944, although ultimately the Japanese are defeated, in some ways the fighting was even more vicious and brutal than it might have been because all of the major Allies—the Chinese, the British, and the Americans—still didn’t really trust each other.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-weight: normal; line-height: 22px; margin: 0px; padding: 0px 0px 15px; text-decoration: none;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;b&gt;Shanghai is such an interesting story with its international community and the international communities that were in the other coastal Chinese cities. And this was the death knell of that imperial system, clearly.&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-weight: normal; line-height: 22px; margin: 0px; padding: 0px 0px 15px; text-decoration: none;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;b&gt;&lt;/b&gt;Very much so. Shanghai then was one of the most cosmopolitan cities anywhere in the world. And even though Shanghai is a great city today, and you know, lively in a whole variety of ways, it still hasn’t captured that absolute cosmopolitanism it had during imperialism back in the 1930s and ’40s. Again, of course, the war was the death knell, as you say, of that particular system, for reasons both good and bad.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-weight: normal; line-height: 22px; margin: 0px; padding: 0px 0px 15px; text-decoration: none;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;The good is that, indirectly but genuinely, the war forced the end of the old imperial Shanghai—the Shanghai where the white British customers could beat Chinese rickshaw drivers around the ears if they didn’t like the fare they were being charged, the kind of brutal, everyday racism of imperialism that you certainly saw frequently in the city. That had come to an end with China’s ultimate victory in 1945. But the downside was that it led to a much narrower, much grayer vision of Shanghai for the next 40 or 50 years.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-weight: normal; line-height: 22px; margin: 0px; padding: 0px 0px 15px; text-decoration: none;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;The idea that this was one of the few cities in the world where people could come, whether they were artists or refugees, or Nationalists or Communists, people from all sorts of backgrounds, and create this immense melting pot in which literature, culture, food, all these things, were coming together in a way that astounded the Chinese who lived there in the country as much as it did foreigners. All that was lost for a very long time.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-weight: normal; line-height: 22px; margin: 0px; padding: 0px 0px 15px; text-decoration: none;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;b&gt;The Japanese seem to have been particularly egregious violators of human rights. Is that generally accurate?&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-weight: normal; line-height: 22px; margin: 0px; padding: 0px 0px 15px; text-decoration: none;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;b&gt;&lt;/b&gt;I mean, the ideas and concept and understanding of human rights we have now have been very much shaped by the experience of that war and that period around the world. But I don’t think it’s necessarily true that there is something immensely distinctive about the Japanese. What made the Japanese war effort against China so brutal were things that we saw elsewhere. For instance a very strong sense of racial superiority, which we also saw, of course, among fascist Italy, Nazi Germany, and so forth.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-weight: normal; line-height: 22px; margin: 0px; padding: 0px 0px 15px; text-decoration: none;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;At the same time, there is one very important, and I think it a very significant difference between the Japanese atrocities in China and the Nazi experience in Europe: The Japanese never had any program of organized genocide. That is a&lt;i&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;very&lt;/i&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;significant difference than in the European case. The Japanese were brutal; they carried out all sorts of horrific acts, you know the Rape of Nanking, the bombing of Chongqing, and others, but to some extent, you can see similarities with other brutal campaigns, which took place elsewhere. And the Japanese themselves often said in terms of their tactics as imperialists and invaders that they had learned a very great deal of what they knew from Western mentors. So we have to look at what the competition was as well.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-weight: normal; line-height: 22px; margin: 0px; padding: 0px 0px 15px; text-decoration: none;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;b&gt;I realize you’re a historian of China and not of Japan, but every once in a while, I read pieces about textbooks in Japan that gloss over certain inconvenient facts. Is that widespread?&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-weight: normal; line-height: 22px; margin: 0px; padding: 0px 0px 15px; text-decoration: none;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;b&gt;&lt;/b&gt;Some of them possibly written by me, in fact. I think the important thing to understand about Japanese public attitudes in textbooks, television, and so forth toward the wartime period is that is very ambivalent. There is a significant and very loud-mouthed right wing that essentially denies or downplays the wartime atrocities. But although this voice is loud, it is by no means the only one or the most important one in Japan.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-weight: normal; line-height: 22px; margin: 0px; padding: 0px 0px 15px; text-decoration: none;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;It’s important to note that, for instance, the very first group of people who brought the Rape of Nanking to the world’s attention in the postwar period were not the Americans and not the Chinese themselves, but in fact the Japanese left wing.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-weight: normal; line-height: 22px; margin: 0px; padding: 0px 0px 15px; text-decoration: none;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Japanese school teaching unions are often pretty left wing and certainly they have agitated pretty strongly in terms of not using textbooks that deny or downplay the wartime period. You’ll find that although these textbooks are published, and many of them are very offensive in terms of trying to downplay the China war, the mainstream ones that are used in most Japanese schools in fact have a great deal more about the war than the popular newspapers sometimes let on.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-weight: normal; line-height: 22px; margin: 0px; padding: 0px 0px 15px; text-decoration: none;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;So I think it’s important to remember that Japan is a pluralist democracy. There are plenty of people, not the least of which are professional historians, who spend a great deal of time working in great detail on Japan’s wartime atrocities and their significance in history. And in that sense, there is no great conspiracy of silence.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-weight: normal; line-height: 22px; margin: 0px; padding: 0px 0px 15px; text-decoration: none;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;b&gt;Was there ever a formal intent in Japan to attempt to take over China? It seems like in Manchuria, yes there was absolute intent. [Japan invaded Manchuria in 1931 and by 1933 had consolidated its hold via the puppet state of Manchukuo.] But was the whole Chinese misadventure beyond that something that was stumbled upon or pushed upon by militarists?&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-weight: normal; line-height: 22px; margin: 0px; padding: 0px 0px 15px; text-decoration: none;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;b&gt;&lt;/b&gt;That’s a pretty sharp assessment; I think you put your finger on it. I would say this: Manchuria was planned. But oddly enough, some of the top Chinese officers who planned the Manchuria coup were furious at the thought that is was going to expand further into the mainland of China. They thought that was a very bad idea; they thought the Japanese should actually stick to Manchuria.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-weight: normal; line-height: 22px; margin: 0px; padding: 0px 0px 15px; text-decoration: none;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;The actual outbreak of war, and again I hope I brought this out in the book, was not so much in 1939, Hitler invades Poland, but more 1914 Archduke Franz Ferdinand gets shot in Sarajevo. In other words, a small set of events in the Chinese case, the shootings outside in the little village of Wanping in Beijing at the Marco Polo bridge [on July 7, 1937], would trigger off in the next few days and weeks, the sequence of events that eventually bring the two countries to war with each other.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-weight: normal; line-height: 22px; margin: 0px; padding: 0px 0px 15px; text-decoration: none;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;And the Japanese were not expecting the Marco Polo bridge incident would in fact trigger an all out continental war. Once it had then, they did certainly make the decision that they were going to teach China a lesson that they were really going to actually push their troops in and take over the whole thing. But the expectation in the summer of 1937 in July was not on Tokyo’s part that they were going to invade there and now.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-weight: normal; line-height: 22px; margin: 0px; padding: 0px 0px 15px; text-decoration: none;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;On the other hand, I think that there is a significant amount of evidence, and this is one of the things that Chiang Kai-shek weighed when he was making the decision whether or not to expand the campaign, was that Japan would be trying, slice by slice, to get more and more of China. So first Manchuria, then the sort of part just below the Great Wall, then much of North China; then within five, 10, 15 years after that point, it would have seemed very plausible scenario by which they were lapping at the gates of central China, and then finally the south. So in terms of intent or method, you’re probably not talking about a kind of intentional all-out invasion in 1937. In terms of the end goal of domination of China, I think there was very little doubt that that was the intent of Tokyo.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-weight: normal; line-height: 22px; margin: 0px; padding: 0px 0px 15px; text-decoration: none;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;b&gt;It’s almost a Napoleonic mistake or as Hitlerian mistake, the idea of trying to invade this geographically gigantic place and having space destroy you.&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-weight: normal; line-height: 22px; margin: 0px; padding: 0px 0px 15px; text-decoration: none;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;b&gt;&lt;/b&gt;I think that’s true. But again one of the things that must be considered is ideological conviction. The Japanese army—bizarrely, delusionally—were rational in their own minds. They genuinely thought first of all that they had this leadership role, that they were going to be able to act as the brother that was going to lead the fellow Asian countries including China to some sort of anti-Western, post-imperialist future.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-weight: normal; line-height: 22px; margin: 0px; padding: 0px 0px 15px; text-decoration: none;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;And they also believed very strongly that it was their destiny to expand onto the mainland. This was, of course, a period when empires were competing against each other. They saw the British empire; they saw the French empire; they saw this sort of American domination in parts of the Pacific as well. It was supposed to be this sort of social Darwinist world, where you couldn’t stand still. Either you had to expand, or you would be conquered.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-weight: normal; line-height: 22px; margin: 0px; padding: 0px 0px 15px; text-decoration: none;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;This seems like a pretty irrational way of thinking from the point of view of our own minds in the early 21st century, but in the 1930s the world the Japanese saw around them was one in which this seemed to make perfect sense to them.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-weight: normal; line-height: 22px; margin: 0px; padding: 0px 0px 15px; text-decoration: none;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;b&gt;If I could ask you to speculate: Did Japan have the wherewithal to defeat China? Or was it a doomed experiment from the beginning, independent of any U.S. or Soviet intervention?&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-weight: normal; line-height: 22px; margin: 0px; padding: 0px 0px 15px; text-decoration: none;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;b&gt;&lt;/b&gt;I think the Japanese knew from a very early phase that this was a very, very big proposition they were taking on, and their chances of success were a very long way from being guaranteed.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-weight: normal; line-height: 22px; margin: 0px; padding: 0px 0px 15px; text-decoration: none;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Speculation: I think the answer is, had the Japanese managed to essentially conquer and tame China very early in the war, let’s say within the first year or year and a half, and bring it to surrender, then they would’ve had a chance of getting some sort of settlement that would’ve lasted for a while.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-weight: normal; line-height: 22px; margin: 0px; padding: 0px 0px 15px; text-decoration: none;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;That was one of the reasons why even when they continued to push into China over and over again in the 1937-38 period, they were also sending out feelers to Chiang Kai-shek, desperately trying to get him to negotiate.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-weight: normal; line-height: 22px; margin: 0px; padding: 0px 0px 15px; text-decoration: none;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;b&gt;So if I flipped the question: Could China at any point have defeated imperial Japan?&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-weight: normal; line-height: 22px; margin: 0px; padding: 0px 0px 15px; text-decoration: none;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;b&gt;&lt;/b&gt;I think that would have been tough because Japan was the most technologically able society in Asia. It had hugely superior industrialization. You know by the eve of war, something like 70 percent of Japan’s GDP was going toward the military state in one sense or another.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-weight: normal; line-height: 22px; margin: 0px; padding: 0px 0px 15px; text-decoration: none;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Japan was much richer than China, and it had this extremely well-trained, conscripted, and, frankly, brutalized conscript army, which was of extremely high quality. Compared to that, China had more people, but was an internally split, very poor agrarian society, with only a very partially trained army. And it had huge amounts of territory, a quagmire that’s very hard for the Japanese to conquer&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;i&gt;and&lt;/i&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;hard for the Chinese government to control. The size issue went both ways.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-weight: normal; line-height: 22px; margin: 0px; padding: 0px 0px 15px; text-decoration: none;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;If you ask the same question, of course, and compare it to that of the British Empire, I think it’s fair to say that Winston Churchill and the British could not have defeated Hitler without American assistance, either. But people do not, on those grounds, give Britain a hard time for continuing to resist the Germans.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-weight: normal; line-height: 22px; margin: 0px; padding: 0px 0px 15px; text-decoration: none;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;So an all-out defeat of the Japanese by the Chinese would have been near impossible to manage. It’s the feat of resistance that really needs to be looked at.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-weight: normal; line-height: 22px; margin: 0px; padding: 0px 0px 15px; text-decoration: none;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Source:&amp;nbsp;&amp;nbsp; &lt;a href=&quot;http://www.psmag.com/politics/china-lost-14-million-people-world-war-ii-forgotten-66482/&quot;&gt;http://www.psmag.com/politics/china-lost-14-million-people-world-war-ii-forgotten-66482/&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-weight: normal; line-height: 22px; margin: 0px; padding: 0px 0px 15px; text-decoration: none;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;______________________ &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
</description><link>http://news2u.blogspot.com/2013_10_01_archive.html#8282039963470429901</link><author>noreply@blogger.com (Unknown)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5604605.post-4928951997785841164</guid><pubDate>Mon, 14 Oct 2013 01:47:00 +0000</pubDate><atom:updated>2013-10-13T20:47:39.222-05:00</atom:updated><title></title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;span style=&quot;font-size: x-large;&quot;&gt;&lt;b&gt;A Federal Budget Crisis Months in the Planning&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
By Sheryl Gay Stolber &amp;amp; Mike McIntire&lt;br /&gt;
The New York Times&lt;br /&gt;
October 5, 2013&lt;br /&gt;
&lt;br /&gt;
Shortly after President Obama started his second term, a loose-knit coalition of conservative activists led by former Attorney General Edwin Meese III gathered in the capital to plot strategy. Their push to repeal Mr. Obama’s health care law was going nowhere, and they desperately needed a new plan.
&lt;br /&gt;
&lt;br /&gt;
Out of that session, held one morning in a location the members insist on keeping secret, came a little-noticed “&lt;i&gt;blueprint to defunding Obamacare&lt;/i&gt;,” signed by Mr. Meese and leaders of more than three dozen conservative groups.
&lt;br /&gt;
&lt;br /&gt;
It articulated a take-no-prisoners legislative strategy that had long percolated in conservative circles: that Republicans could derail the health care overhaul if conservative lawmakers were willing to push fellow Republicans — including their cautious leaders — into cutting off financing for the entire federal government.
&lt;br /&gt;
&lt;br /&gt;
“&lt;i&gt;We felt very strongly at the start of this year that the House needed to use the power of the purse&lt;/i&gt;,” said one coalition member, Michael A. Needham, who runs Heritage Action for America, the political arm of the Heritage Foundation. “&lt;i&gt;At least at Heritage Action, we felt very strongly from the start that this was a fight that we were going to pick&lt;/i&gt;.”
&lt;br /&gt;
&lt;br /&gt;
Last week the country witnessed the fallout from that strategy: a standoff that has shuttered much of the federal bureaucracy and unsettled the nation.
&lt;br /&gt;
&lt;br /&gt;
To many Americans, the shutdown came out of nowhere. But interviews with a wide array of conservatives show that the confrontation that precipitated the crisis was the outgrowth of a long-running effort to undo the law, the Affordable Care Act, since its passage in 2010 — waged by a galaxy of conservative groups with more money, organized tactics and interconnections than is commonly known.
&lt;br /&gt;
&lt;br /&gt;
With polls showing Americans deeply divided over the law, conservatives believe that the public is behind them. Although the law’s opponents say that shutting down the government was not their objective, the activists anticipated that a shutdown could occur — and worked with members of the Tea Party caucus in Congress who were excited about drawing a red line against a law they despise.
&lt;br /&gt;
&lt;br /&gt;
A defunding “tool kit” created in early September included talking points for the question, “&lt;i&gt;What happens when you shut down the government and you are blamed for it?&lt;/i&gt;” The suggested answer was the one House Republicans give today: “&lt;i&gt;We are simply calling to fund the entire government except for the Affordable Care Act/Obamacare.&lt;/i&gt;”
&lt;br /&gt;
&lt;br /&gt;
The current budget brinkmanship is just the latest development in a well-financed, broad-based assault on the health law, Mr. Obama’s signature legislative initiative. Groups like Tea Party Patriots, Americans for Prosperity and FreedomWorks are all immersed in the fight, as is Club for Growth, a business-backed nonprofit organization. Some, like Generation Opportunity and Young Americans for Liberty, both aimed at young adults, are upstarts. Heritage Action is new, too, founded in 2010 to advance the policy prescriptions of its sister group, the Heritage Foundation.
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;The billionaire Koch brothers, Charles and David, have been deeply involved with financing the overall effort.&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;A group linked to the Kochs, Freedom Partners Chamber of Commerce, disbursed more than $200 million last year to nonprofit organizations involved in the fight.&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Included was $5 million to Generation Opportunity, which created a buzz last month with an Internet advertisement showing a menacing Uncle Sam figure popping up between a woman’s legs during a gynecological exam.
&lt;br /&gt;
&lt;br /&gt;
The groups have also sought to pressure vulnerable Republican members of Congress with scorecards keeping track of their health care votes; have burned faux “Obamacare cards” on college campuses; and have distributed scripts for phone calls to Congressional offices, sample letters to editors and Twitter and Facebook offerings for followers to present as their own.
&lt;br /&gt;
&lt;br /&gt;
One sample Twitter offering — “Obamacare is a train wreck” — is a common refrain for Speaker John A. Boehner.
&lt;br /&gt;
&lt;br /&gt;
As the defunding movement picked up steam among outside advocates, Republicans who sounded tepid became targets. The Senate Conservatives Fund, a political action committee dedicated to “electing true conservatives,” ran radio advertisements against three Republican incumbents.
&lt;br /&gt;
&lt;br /&gt;
Heritage Action ran critical Internet advertisements in the districts of 100 Republican lawmakers who had failed to sign a letter by a North Carolina freshman, Representative Mark Meadows, urging Mr. Boehner to take up the defunding cause.
&lt;br /&gt;
&lt;br /&gt;
“&lt;i&gt;They’ve been hugely influential&lt;/i&gt;,” said David Wasserman, who tracks House races for the nonpartisan Cook Political Report. “&lt;i&gt;When else in our history has a freshman member of Congress from North Carolina been able to round up a gang of 80 that’s essentially ground the government to a halt?&lt;/i&gt;”
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;On Capitol Hill, the advocates found willing partners in Tea Party conservatives, who have repeatedly threatened to shut down the government if they do not get their way on spending issues&lt;/b&gt;.&lt;br /&gt;
&lt;br /&gt;
This time they said they were so alarmed by the health law that they were willing to risk a shutdown over it. (&lt;i&gt;“This is exactly what the public wants,” Representative Michele Bachmann of Minnesota, founder of the House Tea Party Caucus, said on the eve of the shutdown.&lt;/i&gt;)
&lt;br /&gt;
&lt;br /&gt;
Despite Mrs. Bachmann’s comments, not all of the groups have been on board with the defunding campaign. Some, like the Koch-financed Americans for Prosperity, which spent $5.5 million on health care television advertisements over the past three months,&lt;b&gt; are more focused on sowing public doubts about the law. But all have a common goal, which is to cripple a measure that Senator Ted Cruz, a Texas Republican and leader of the defunding effort, has likened to a horror movie.
&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
“&lt;i&gt;We view this as a long-term effort&lt;/i&gt;,” said Tim Phillips, the president of Americans for Prosperity. He said his group expected to spend “tens of millions” of dollars on a “multifront effort” that includes working to prevent states from expanding Medicaid under the law. The group’s goal is not to defund the law.
&lt;br /&gt;
&lt;br /&gt;
“&lt;i&gt;We want to see this law repealed&lt;/i&gt;,” Mr. Phillips said.
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;A Familiar Tactic
&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
The crowd was raucous at the Hilton Anatole, just north of downtown Dallas, when Mr. Needham’s group, Heritage Action, arrived on a Tuesday in August for the second stop on a nine-city “Defund Obamacare Town Hall Tour.” Nearly 1,000 people turned out to hear two stars of the Tea Party movement: Mr. Cruz, and Jim DeMint, a former South Carolina senator who runs the Heritage Foundation.
&lt;br /&gt;
&lt;br /&gt;
“&lt;i&gt;You’re here because now is the single best time we have to defund Obamacare,&lt;/i&gt;” declared Mr. Cruz, who would go on to rail against the law on the Senate floor in September with a monologue that ran for 21 hours. “&lt;i&gt;This is a fight we can win&lt;/i&gt;.”
&lt;br /&gt;
&lt;br /&gt;
Although Mr. Cruz is new to the Senate, the tactic of defunding in Washington is not. For years, Congress has banned the use of certain federal money to pay for abortions, except in the case of incest and rape, by attaching the so-called Hyde Amendment to spending bills.
&lt;br /&gt;
&lt;br /&gt;
After the health law passed in 2010, Todd Tiahrt, then a Republican congressman from Kansas, proposed defunding bits and pieces of it. He said he spoke to Mr. Boehner’s staff about the idea while the Supreme Court, which upheld the central provision, was weighing the law’s constitutionality.
&lt;br /&gt;
&lt;br /&gt;
“&lt;i&gt;There just wasn’t the appetite for it at the time&lt;/i&gt;,” Mr. Tiahrt said in an interview. “&lt;i&gt;They thought, we don’t need to worry about it because the Supreme Court will strike it down&lt;/i&gt;.”
&lt;br /&gt;
&lt;br /&gt;
But the idea of using the appropriations process to defund an entire federal program, particularly one as far-reaching as the health care overhaul, raised the stakes considerably. In an interview, Mr. DeMint, who left the Senate to join the Heritage Foundation in January, said he had been thinking about it since the law’s passage, in part because Republican leaders were not more aggressive.
&lt;br /&gt;
&lt;br /&gt;
“&lt;i&gt;They’ve been through a series of C.R.s and debt limits&lt;/i&gt;,” Mr. DeMint said, referring to continuing resolutions on spending, “&lt;i&gt;and all the time there was discussion of ‘O.K., we’re not going to fight the Obamacare fight, we’ll do it next time.’ The conservatives who ran in 2010 promising to repeal it kept hearing, ‘This is not the right time to fight this battle.’ &lt;/i&gt;”
&lt;br /&gt;
&lt;br /&gt;
Mr. DeMint is hardly alone in his distaste for the health law, or his willingness to do something about it. In the three years since Mr. Obama signed the health measure, &lt;b&gt;Tea Party-inspired groups have mobilized, aided by a financing network that continues to grow, both in its complexity and the sheer amount of money that flows through it.
&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
A review of tax records, campaign finance reports and corporate filings shows that hundreds of millions of dollars have been raised and spent since 2012 by organizations, many of them loosely connected, leading opposition to the measure.
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;One of the biggest sources of conservative money is Freedom Partners, a tax-exempt “business league” that claims more than 200 members, each of whom pays at least $100,000 in dues. The group’s board is headed by a longtime executive of Koch Industries, the conglomerate run by the Koch brothers, who were among the original financiers of the Tea Party movement. The Kochs declined to comment.
&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
While Freedom Partners has financed organizations that are pushing to defund the law, like Heritage Action and Tea Party Patriots, Freedom Partners has not advocated that. A spokesman for the group, James Davis, said it was more focused on “educating Americans around the country on the negative impacts of Obamacare.”
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;The largest recipient of Freedom Partners cash — about $115 million — was the Center to Protect Patient Rights, according to the groups’ latest tax filings. Run by a political consultant with ties to the Kochs and listing an Arizona post office box for its address, the center appears to be little more than a clearinghouse for donations to still more groups, including American Commitment and the 60 Plus Association, both ardent foes of the health care law.
&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
American Commitment and 60 Plus were among a handful of groups calling themselves the “Repeal Coalition” that sent a letter in August urging Republican leaders in the House and the Senate to insist “at a minimum” in a one-year delay of carrying out the health care law as part of any budget deal. Another group, the Conservative 50 Plus Alliance, delivered a defunding petition with 68,700 signatures to the Senate.
&lt;br /&gt;
&lt;br /&gt;
In the fight to shape public opinion, conservatives face well-organized liberal foes. Enroll America, a nonprofit group allied with the Obama White House, is waging a campaign to persuade millions of the uninsured to buy coverage. The law’s supporters are also getting huge assistance from the insurance industry, which is expected to spend $1 billion on advertising to help sell its plans on the exchanges.
&lt;br /&gt;
&lt;br /&gt;
“It is David versus Goliath,” said Mr. Phillips of Americans for Prosperity.
&lt;br /&gt;
&lt;br /&gt;
But conservatives are finding that with relatively small advertising buys, they can make a splash. Generation Opportunity, the youth-oriented outfit behind the “Creepy Uncle Sam” ads, is spending $750,000 on that effort, aimed at dissuading young people — a cohort critical to the success of the health care overhaul — from signing up for insurance under the new law.
&lt;br /&gt;
&lt;br /&gt;
The group receives substantial backing from Freedom Partners and appears ready to expand. Recently, Generation Opportunity moved into spacious new offices in Arlington, Va., where exposed ductwork, Ikea chairs and a Ping-Pong table give off the feel of a Silicon Valley start-up.
&lt;br /&gt;
&lt;br /&gt;
Its executive director, Evan Feinberg, a 29-year-old former Capitol Hill aide and onetime instructor for a leadership institute founded by Charles Koch, said there would be more Uncle Sam ads, coupled with college campus visits, this fall. Two other groups, FreedomWorks, with its “Burn Your Obamacare Card” protests, and Young Americans for Liberty, are also running campus events.
&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;“A lot of folks have asked us, ‘Are we trying to sabotage the law?&lt;/i&gt;’ ” Mr. Feinberg said in an interview last week. His answer echoes the Freedom Partners philosophy: “&lt;i&gt;Our goal is to educate and empower young people.”
&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Critical Timing
&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
But many on the Republican right wanted to do more.
&lt;br /&gt;
&lt;br /&gt;
Mr. Meese’s low-profile coalition, the Conservative Action Project, which seeks to find common ground among leaders of an array of fiscally and socially conservative groups, was looking ahead to last Tuesday, when the new online health insurance marketplaces, called exchanges, were set to open. If the law took full effect as planned, many conservatives feared, it would be nearly impossible to repeal — even if a Republican president were elected in 2016.
&lt;br /&gt;
&lt;br /&gt;
“&lt;i&gt;I think people realized that with the imminent beginning of Obamacare, that this was a critical time to make every effort to stop something,&lt;/i&gt;” Mr. Meese said in an interview. (&lt;i&gt;He has since stepped down as the coalition’s chairman and has been succeeded by David McIntosh, a former congressman from Indiana&lt;/i&gt;.)
&lt;br /&gt;
&lt;br /&gt;
The defunding idea, Mr. Meese said, was “&lt;i&gt;a logical strategy.&lt;/i&gt;” The idea drew broad support. Fiscal conservatives like Chris Chocola, the president of the Club for Growth, signed on to the blueprint. So did social and religious conservatives, like the Rev. Lou Sheldon of the Traditional Values Coalition.
&lt;br /&gt;
&lt;br /&gt;
The document set a target date: March 27, when a continuing resolution allowing the government to function was to expire. Its message was direct: “&lt;i&gt;Conservatives should not approve a C.R. unless it defunds Obamacare.&lt;/i&gt;”
&lt;br /&gt;
&lt;br /&gt;
But the March date came and went without a defunding struggle. In the Senate, Mr. Cruz and Senator Mike Lee, a Utah Republican, talked up the defunding idea, but it went nowhere in the Democratic-controlled chamber. In the House, Mr. Boehner wanted to concentrate instead on locking in the across-the-board budget cuts known as sequestration, and Tea Party lawmakers followed his lead. Outside advocates were unhappy but held their fire.
&lt;br /&gt;
&lt;br /&gt;
“&lt;i&gt;We didn’t cause any trouble&lt;/i&gt;,” Mr. Chocola said.
&lt;br /&gt;
&lt;br /&gt;
Yet by summer, with an August recess looming and another temporary spending bill expiring at the end of September, the groups were done waiting.
&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;“I remember talking to reporters at the end of July, and they said, ‘This didn’t go anywhere,’ &lt;/i&gt;” Mr. Needham recalled. “&lt;i&gt;What all of us felt at the time was, this was never going to be a strategy that was going to win inside the Beltway. It was going to be a strategy where, during August, people would go home and hear from their constituents, saying&lt;/i&gt;: ‘&lt;i&gt;You pledged to do everything you could to stop Obamacare. Will you defund it?’ ”
&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Heritage Action, which has trained 6,000 people it calls sentinels around the country, sent them to open meetings and other events to confront their elected representatives&lt;/b&gt;. Its “Defund Obamacare Town Hall Tour,” which began in Fayetteville, Ark., on Aug. 19 and ended 10 days later in Wilmington, Del., drew hundreds at every stop.
&lt;br /&gt;
&lt;br /&gt;
The Senate Conservatives Fund, led by Mr. DeMint when he was in the Senate, put up a Web site in July called dontfundobamacare.com and ran television ads featuring Mr. Cruz and Mr. Lee urging people to tell their representatives not to fund the law.
&lt;br /&gt;
&lt;br /&gt;
When Senator Richard M. Burr, a North Carolina Republican, told a reporter that defunding the law was “&lt;i&gt;the dumbest idea I’ve ever heard,&lt;/i&gt;” the fund bought a radio ad to attack him. Two other Republican senators up for re-election in 2014, Lamar Alexander of Tennessee and Lindsey Graham of South Carolina, were also targeted. Both face Tea Party challengers.
&lt;br /&gt;
&lt;br /&gt;
In Washington, Tea Party Patriots, which created the defunding tool kit, set up a Web site, &lt;a href=&quot;http://exemptamerica.com/&quot;&gt;exemptamerica.com&lt;/a&gt;, to promote a rally last month showcasing many of the Republicans in Congress whom Democrats — and a number of fellow Republicans — say are most responsible for the shutdown.
&lt;br /&gt;
&lt;br /&gt;
While conservatives believe that the public will back them on defunding, a recent poll by the Kaiser Family Foundation found that a majority — 57 percent — disapproves of cutting off funding as a way to stop the law.
&lt;br /&gt;
&lt;br /&gt;
Last week, with the health care exchanges open for business and a number of prominent Republicans complaining that the “Defund Obamacare” strategy was politically damaging and pointless, Mr. Needham of Heritage Action said he felt good about what the groups had accomplished.
&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;“It really was a groundswell,” he said, “that changed Washington from the outside in.”
&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
Source:&lt;br /&gt;
&lt;a href=&quot;http://www.nytimes.com/2013/10/06/us/a-federal-budget-crisis-months-in-the-planning.html?partner=rss&amp;amp;emc=rss&amp;amp;_r=0&quot;&gt;http://www.nytimes.com/2013/10/06/us/a-federal-budget-crisis-months-in-the-planning.html?partner=rss&amp;amp;emc=rss&amp;amp;_r=0&lt;/a&gt;&lt;br /&gt;
_______________________
 &lt;/div&gt;
</description><link>http://news2u.blogspot.com/2013_10_01_archive.html#4928951997785841164</link><author>noreply@blogger.com (Unknown)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5604605.post-3459525701026793570</guid><pubDate>Wed, 25 Sep 2013 00:59:00 +0000</pubDate><atom:updated>2013-09-24T20:18:02.276-05:00</atom:updated><title></title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: x-large;&quot;&gt;Spilling the NSA’s Secrets: &lt;/span&gt;&lt;i&gt;&lt;span style=&quot;font-size: x-large;&quot;&gt;Guardian Editor Alan Rusbridger on the Inside Story of Snowden Leaks&lt;/span&gt;&amp;nbsp;&lt;/i&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;i&gt;Democracy Now&lt;/i&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;i&gt;Sept 23, 2013&lt;/i&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;i&gt;&lt;/i&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;i&gt;&lt;/i&gt;&lt;/span&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;iframe frameborder=&quot;0&quot; height=&quot;225&quot; src=&quot;http://www.democracynow.org/embed/story/2013/9/23/spilling_the_nsas_secrets_guardian_editor&quot; width=&quot;400&quot;&gt;&lt;/iframe&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;i&gt;&lt;/i&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
Three-and-a-half months after National Security Agency leaker Edward Snowden came public on the the U.S. government’s massive spying operations at home and abroad, we spend the hour with Alan Rusbridger, editor-in-chief of The Guardian, the British newspaper that first reported on Snowden’s leaked documents. The Guardian has continued releasing a series of exposés based on Snowden’s leaks coloring in the details on how the NSA has managed to collect telephone records in bulk and information on nearly everything a user does on the Internet.&lt;br /&gt;
&lt;br /&gt;
The articles have ignited widespread debate about security agencies’ covert activities, digital data protection and the nature of investigative journalism. The newspaper has been directly targeted as a result — over the summer the British government forced the paper to destroy computer hard drives containing copies of Snowden’s secret files, and later detained David Miranda, the partner of Guardian journalist Glenn Greenwald. Rusbridger, editor of The Guardian for nearly two decades, joins us to tell the inside story of The Guardian’s publication of the NSA leaks and the crackdown it has faced from its own government as a result.&lt;br /&gt;
&lt;br /&gt;
TRANSCRIPT
&lt;br /&gt;
&lt;br /&gt;
This is a rush transcript. Copy may not be in its final form.
&lt;br /&gt;
&lt;br /&gt;
JUAN GONZÁLEZ: Today, in a Democracy Now! special, we spend the hour with Alan Rusbridger, Editor in Chief with the Guardian Newspaper. Three and a half months ago, on June 5th, The Guardian revealed the National Security Agency is collecting collecting the telephone records of millions of customers of Verizon under a secret court order. The following day, the paper revealed the existence of a secret program called PRISM that gave the NSA direct access to the systems of Google, Facebook, Apple and other U.S. internet giants. Four days later, The Guardian revealed the source behind the leaks was a National Security Agency contractor named Edward Snowden.
&lt;br /&gt;
&lt;br /&gt;
EDWARD SNOWDEN: &lt;i&gt;Any analyst at any time can target anyone at any select or anywhere. Where those communications will be picked up depends on the range of the sensor networks and the authorities that that analyst is empowered with. Not all analysts have the power to target everything. But, I sitting behind my desk, certainly had the authorities to wiretap anyone, from you, or your accountant, to a federal judge, to even the president, if I had a personal e-mail.
&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
AMY GOODMAN: Since early June, The Guardian has continued to publish a remarkable series of exposés based on Edward Snowden’s leaks, coloring in the details on how the NSAhas managed to collect nearly everything a user does on the internet. The articles have ignited an international debate about the NSA’s activities, digital data protection and the nature of investigative journalism, and the paper has been directly targeted as a result.
&lt;br /&gt;
&lt;br /&gt;
JUAN GONZÁLEZ: in August, David Miranda, partner of Guardian reporter, Glenn Greenwald, was detained and questioned at Heathrow Airport under Schedule 7 of Britain’s Terrorism Act. Miranda was detained for nine hours and only released after British authorities seized his mobile phone, laptop, cell phone and USB thumb drives. Soon after Miranda’s detention, The Guardian revealed the British Government threatened legal action against the newspaper unless it destroyed computer computer drives containing copies of Edward Snowden’s classified documents or handed them to British authorities.
&lt;br /&gt;
&lt;br /&gt;
AMY GOODMAN: Well, for more we are joined, now, by The Guardian Editor in Chief, Alan Rusbridger. He’s been editor of the newspaper since 1995. Alan Rusbridger, welcome to Democracy Now!.
&lt;br /&gt;
&lt;br /&gt;
ALAN RUSBRIDGER: I’m very happy to be here.
&lt;br /&gt;
&lt;br /&gt;
AMY GOODMAN: Did you have trouble coming into the United States?
&lt;br /&gt;
&lt;br /&gt;
ALAN RUSBRIDGER: No, I sort — came through very easily.
&lt;br /&gt;
&lt;br /&gt;
AMY GOODMAN: How about the rest of your staff?
&lt;br /&gt;
&lt;br /&gt;
ALAN RUSBRIDGER: There have been moments when they have been fairly comprehensively frisked, either leaving or coming in. Glenn Greenwald, who’s been doing most of the reporting, is not risking moving around at the moment, which is probably sensible.
&lt;br /&gt;
&lt;br /&gt;
AMY GOODMAN: Do you think he would be arrested if he came back to the U.S., Glenn, as an American citizen?
&lt;br /&gt;
&lt;br /&gt;
ALAN RUSBRIDGER: I hope he wouldn’t be. One of the things that I’ve tried to make a point of, is that we’ve moved our reporting to America because I think America’s rules around press freedom, First Amendment, and so forth should protect this kind of reporting. So, I very much hope, with the eyes of the world on America, that somebody who has done the reporting that has got this matter into public debate, wouldn’t be punished for it, or criminalized.
&lt;br /&gt;
&lt;br /&gt;
JUAN GONZÁLEZ: Could you take us back to the beginning of this worldwide exposé that you’ve been in the forefront of, your paper has been? How the story first came to you and your decision to begin to print it so soon after you received the initial information?
&lt;br /&gt;
&lt;br /&gt;
ALAN RUSBRIDGER: Well, I think it’s quite an interesting story about the old world and the new world, so there’s the fourth estate newspapers, there’s the fifth estate bloggers, and this is a union of the two. We hired Glenn Greenwald, who is a blogger, and who has written knowledgeably, and, some people might, say obsessively about the subject over the last few years. In Hawaii, a 29-year-old NSA analyst was clearly reading Greenwald and was so troubled by what he was doing in his work that he wanted to find somebody knowledgeable to give this material to. So, he came to Glenn, Glenn, by now, was working for The Guardian, and that is how it all kicked off.
&lt;br /&gt;
&lt;br /&gt;
AMY GOODMAN: Talk about how exactly that happened. You have Edward Snowden who flies to Hong Kong, and then take it from there, with your columnist Glenn Greenwald, Laura Poitras, the filmmaker, also another of your reporters who went to Hong Kong to meet Edward Snowden.
&lt;br /&gt;
&lt;br /&gt;
ALAN RUSBRIDGER: Yeah, there was about two weeks when they were all essentially closeted in the same hotel room. It was a rather unreal period for anyone who has watched a Hollywood movie about these kinds of things; agents on the run, stashes of secrets. But, they worked together and it was important for me that there was a Guardian reporter, a conventional reporter, in the room along with Glenn and Laura.
&lt;br /&gt;
&lt;br /&gt;
AMY GOODMAN: That was Ewen MacAskill?
&lt;br /&gt;
&lt;br /&gt;
ALAN RUSBRIDGER: That was Ewen MacAskill, who is a Scottish reporter who’s been on the The Guardian for years and years and years. Very experienced, not easily impressed reporter. Between them, they started to go through this stash of material that Greenwald had — that, that Snowden had with him. And we obviously had to establish Snowden was who he said he was and that the material was what he said it was. At the end of about two weeks, we started to publish material based on it.
&lt;br /&gt;
&lt;br /&gt;
JUAN GONZÁLEZ: And did the decision about what to publish first, and given the fact that it has been string of continuing revelations that have come out and — how, how was that decided on?
&lt;br /&gt;
&lt;br /&gt;
ALAN RUSBRIDGER: Well, to begin with, we needed some help from Snowden to point us to what he thought was important. This is not a world that is easily — these are not documents in which the stories sit up and show themselves. This is a complex world. A lot is written in acronyms, if not in actually code, and so we had to be guided to, initially, to some of the stories that Snowden felt were most newsworthy. And it was important for him, I think, that the world had some sense of what he was trying to say before he outed himself, and so, we started doing stories about this intersection between Silicon Valley, telecom companies, and the intelligence agencies. What is, I think, something new, is putting entire populations under a form of surveillance. So, that is what we did in that first week before Snowden came out and revealed himself to be the whistleblower.
&lt;br /&gt;
&lt;br /&gt;
AMY GOODMAN: Edward Snowden, himself, had signed up for Special Forces in the United States., broke both of his legs in a training accident and then left. How did you confirm his credibility on all of this, who he was?
&lt;br /&gt;
&lt;br /&gt;
ALAN RUSBRIDGER: Well, they all spoke to him for a long time, and that is where having my Scottish Presbyterian reporter in the room was important for me. I wanted him to make — to form a judgment about character. I mean, we obviously did all the tests of who he was, and that all stacked up. He obviously was who he said he was.
&lt;br /&gt;
&lt;br /&gt;
AMY GOODMAN: Worked for Booz Allen, was a subcontractor for the NSA.
&lt;br /&gt;
&lt;br /&gt;
ALAN RUSBRIDGER: All that, yeah, and had worked for the CIA. And Ewin, just talking to him for hours, I mean, he rang me up and said I think he is exactly who he says he is. He is not somebody who is in this for the personal publicity. He is rather shy. He’s not going to develop a big media profile. He has got these documents and he is giving them to a news organization hoping that after this first week we will use our judgment about what we consider significant.
&lt;br /&gt;
&lt;br /&gt;
JUAN GONZÁLEZ: And I know that you had numerous conversations with, certainly with British intelligence, subsequently, but before the first articles came out, was there any contact with American intelligence or British intelligence on your parts warned them of what was coming?
&lt;br /&gt;
&lt;br /&gt;
ALAN RUSBRIDGER: Well, the first four stories were all NSA rather than GCHQ and they were edited out of New York, and we were in touch with the agencies via the White House, and we warned them of what we were going to publish, and we had sometimes helpful dialogue, sometimes robust dialogue about what we were going to do, but it was important for me that we gave them the chance to respond and to make plain any concerns that they had about any particular thing.
&lt;br /&gt;
&lt;br /&gt;
JUAN GONZÁLEZ: And was there any particular effort on their part to dissuade you from publication?
&lt;br /&gt;
&lt;br /&gt;
ALAN RUSBRIDGER: Yeah, they were, they were, they told us why they though we shouldn’t publish some things. There were one or two things that were helpful, because we didn’t want to go into this behaving irresponsibly or to puts agent at danger or operations. So, I think it was important to have those conversations.
&lt;br /&gt;
&lt;br /&gt;
AMY GOODMAN: Edward Snowden also made that a requirement, isn’t that true? That people not be exposed.
&lt;br /&gt;
&lt;br /&gt;
ALAN RUSBRIDGER: Yes, yes, no, he said, look, you will have to form your own judgment, but I would like you to behave responsibly, and as you say not expose agents or ongoing sensitive operations, for instance, in Afghanistan or Iraq.
&lt;br /&gt;
&lt;br /&gt;
AMY GOODMAN: We’re talking with Alan Rusbridger, go to break and we’ll be back with him for the hour. He is the Editor in Chief of The Guardian for almost two decades, also author of a new book on playing the piano and his work at The Guardian, it’s called, &quot;Play it Again: An Amateur Against the Impossible.&quot;
&lt;br /&gt;
&lt;br /&gt;
AMY GOODMAN: Our guest is Alan Rusbridger of The Guardian newspaper, for almost two decades. Can you talk about when the British Government called you and said they wanted your hard drives, they wanted this information.
&lt;br /&gt;
&lt;br /&gt;
ALAN RUSBRIDGER: We had two big conversations with the government, one at the end of June, and one about halfway through July. And it became obvious to me that their tone was heartening. I think they felt this story was out of their control. There came a point where they directly threatened legal action. Now, in the U.K., the government can move and stop publication. I don’t think that is possible since the Pentagon Papers in the U.S. And there came a point where it was obvious we only had two options. One was to return the material and the other was to destroy it. It didn’t actually matter much to me because the material was already in America, and I have already shared some of it with The New York Times so it was going to make no difference to the reporting, but I what I did not want to do was to get into a big legal action which cold potentially have frozen it all.
&lt;br /&gt;
&lt;br /&gt;
AMY GOODMAN: And so, what did you allow to happen?
&lt;br /&gt;
&lt;br /&gt;
ALAN RUSBRIDGER: So, this bizarre thing happened, the most bizarre thing that I think has happened in my journalistic career, which was that two technical people from the GCHQ, which is the Government Communications Headquarters, it’s the equivalent of the NSA, came into The Guardian, and supervised our destruction of the lap-books on which — the laptops on which we’d been working.
&lt;br /&gt;
&lt;br /&gt;
ALAN RUSBRIDGER: So, you said you wouldn’t give it to them but you would destroy your own hard drive?
&lt;br /&gt;
&lt;br /&gt;
ALAN RUSBRIDGER: I wouldn’t give it to them because, I mean, I think journalists generally don’t hand material back to governments. But, also there was always the threat hanging in the background of criminal action against The Guardian and I don’t know what these — or against Snowden — and I don’t know what these discs would have told them about who had been looking at this material, and I did not want to give them evidence that could be used against The Guardian. It is difficult in which you have this potential of criminalizing reporters who are informing the debate that everyone says they want to happen. So, I wouldn’t give it back to them, and so the compromise we agreed on was that we would smash it up. And it turns out to be harder to smash up a computer in ways that would satisfy the spooks than perhaps you would imagine.
&lt;br /&gt;
&lt;br /&gt;
AMY GOODMAN: How did you do it?
&lt;br /&gt;
&lt;br /&gt;
ALAN RUSBRIDGER: Well, first of all, you take it apart, you revealed all its guts.
&lt;br /&gt;
&lt;br /&gt;
AMY GOODMAN: This is what you’re doing with the GCHQ guys there.
&lt;br /&gt;
&lt;br /&gt;
ALAN RUSBRIDGER: With the [Unintelligible] saying, Ok, now you take this circuit board there —- I have got a bit of circuit board here. That’s what a MacBook hard drive looks like after the GCHQ have insisted that the holes go there, there and there and there. But, um -—
&lt;br /&gt;
&lt;br /&gt;
AMY GOODMAN: You carry this with you?
&lt;br /&gt;
&lt;br /&gt;
ALAN RUSBRIDGER: I carry it with me as, sort of, a little memento. I think it’s a rather sinister reminder of the intersection of states and journalism. But, it is not just the hard drive. You have to destroy the logic board, there are specific chips on the trackpad, the keyboard. And so, it was very long, dusty, rather noisy work to smash up all these computers.
&lt;br /&gt;
&lt;br /&gt;
JUAN GONZÁLEZ: But, obviously, there were other copies of the same information in other countries. I wonder if you would comment on this world now where governments have trouble being able to snuff out information in one country because of our international information system now that makes it possible for it to crop up in another country?
&lt;br /&gt;
&lt;br /&gt;
ALAN RUSBRIDGER: Well, it goes back to a little of what we were saying about earlier, that here was this intersection between the fourth and the fifth estate. So, one of the copies was in Rio, where Glenn Greenwald lives and I would guess that the intelligence agencies find Glenn Greenwald a difficult customer to deal with because he’s not like a big press organization that you can march in and threaten. And as we say, there were companies in New York. But, I think this is, really, two sides of the same coin. What we are talking about is the collaboration of intelligence agencies around the world to snoop on a global intelligence network. So, that is what they are doing. But, that same global network, the internet, is used by all of us to spread information. So, the thing that makes the snooping possible is the thing, also, that makes it so hard for them to get a piece of information and snuff it out.
&lt;br /&gt;
&lt;br /&gt;
JUAN GONZÁLEZ: And I’m wondering also, the — in your own country, what has been the press coverage of the other competing media in your country like, and the reaction among the British population to the revelations of The Guardian about all of this international eavesdropping of the NSA and its allied intelligence agencies?
&lt;br /&gt;
&lt;br /&gt;
ALAN RUSBRIDGER: Well, it’s a story that, as you know, has sparked an incredible debate in the U.S., it has in throughout Europe, and many other parts of the world. It’s been quite quiet in the U.K., and I am not entirely sure why that is, it may be for unworthy competitive reasons, I hope not. It may just be that in America, you have , in living memory, had McCarthy, you’ve had Nixon, you’ve had Hoover, in Germany they’ve had the Stasi. Maybe in Britain we are a little bit complacent about this kind of stuff. I think actually, people who read these stories and who understand what they are saying are worried, but it has not engendered quite the debate that is has elsewhere.
&lt;br /&gt;
&lt;br /&gt;
AMY GOODMAN: Has The Guardian made any deal with the British Government not to publish certain information?
&lt;br /&gt;
&lt;br /&gt;
ALAN RUSBRIDGER: We’ve made no deals with anybody. I mean, occasionally, we have had conversations where the British Government has said, we would rather you didn’t publish anything, but if you are going to publish, there is this little bit that we would regard as endangering x, y or z. And sometimes we have agreed with that, more often we haven’t.
&lt;br /&gt;
&lt;br /&gt;
AMY GOODMAN: I wanted to go to David Miranda for a minute. David Miranda, Glenn Greenwald’s partner, who was detained last month by the British Government last month as he was traveling through London’s Heathrow Airport. He was held for nine hours under a British antiterrorism law. He faced repeated interrogation, had his belongings seized, including thumb drives carrying information Glenn used in his reporting on NSAsurveillance. After his release, he appeared on Anderson Cooper’s show on CNN.
&lt;br /&gt;
&lt;br /&gt;
ANDERSON COOPER: Did they actually ask you anything about terrorism?
&lt;br /&gt;
&lt;br /&gt;
DAVID MIRANDA: No, they didn’t ask me anything about terrorism, not one question about it. And I think it is really weird because I was in there for like eight hours without talking to anybody outside. And like, they were just, like, keeping me. I have to ask them, do I have to answer this? And they just telling me, like, if you don’t answer this you’re going to go to jail. And you know, that’s a big thing, because, like, when they say, like, that I was under this law, this is terrorism law, you know what U.K. and United States do. They have all the powers in the world to do anything they want over this because, I’ve been following Glenn and his career for the past eight years and I haven’t seen many stories that many pick up in different countries, getting to this [Guantanamo] and just, like, staying in prison, and they vanish, nobody seen them. And in that moment, I was like, really afraid of what would happen to me. And I was, you understand, that I was for eight hours without talking to anybody on outside of the world. I didn’t know what’s happening, and they keep threatening me about me going to the jail without law.
&lt;br /&gt;
&lt;br /&gt;
AMY GOODMAN: That was Glenn Greenwald’s partner, David Miranda. Speaking to theBBC, British Home Secretary Theresa May defended the government’s actions saying Miranda may have been carrying information useful to terrorists.
&lt;br /&gt;
&lt;br /&gt;
THERESA MAY: I think it’s right, given that is the first duty of the government to protect the public, that if the police believe somebody has in their possession highly sensitive, stolen information which could help terrorists, which could lead to a loss of lives, then it is right that the police act and that’s what the law enables to do.
&lt;br /&gt;
&lt;br /&gt;
AMY GOODMAN: And the White House acknowledged the British Government had given U.S. a heads up about it’s plan to detain David Miranda, but refused to criticize Britain’s actions. White House Deputy Press Secretary Josh Earnest took questions on the issue in August.
&lt;br /&gt;
&lt;br /&gt;
REPORTER: You talked about the Mubarak detention as being an Egyptian legal matter, you talked about Morsi politically motivated detention, and then with regard to Mr. Greenwald’s partner, you called it a mere law enforcement action. Given that the White House has never been shy about criticizing detention policies over seas, do you have any concerns at all about the UK’s law enforcement action in this case?
&lt;br /&gt;
&lt;br /&gt;
JOSH EARNEST: Well, what I can say is, I don’t have a specific reaction other than to observe to you that this is a decision that was made by the British Government, and not one that was made at the request or with the involvement of the U.S. Government.
&lt;br /&gt;
&lt;br /&gt;
REPORTER: But, you’re not going to go as far as to say it’s wrong or with a cause for concern you’re just separating yourself entirely from it.
&lt;br /&gt;
&lt;br /&gt;
JOSH EARNEST: Well, I’m separating — what I’m suggesting is that this was a decision that was made by the British Government without the involvement and not at the request of the United States Government.
&lt;br /&gt;
&lt;br /&gt;
AMY GOODMAN: Alan Rusbridger, can you respond to what the U.S. and British Governments said? Also, it was the day after Miranda was taken that you revealed what happened to The Guardian, which was a few weeks after you actually destroyed the hard drives. Why did you choose that — why was that the key moment for you, that you decided you’d reveal what happened to The Guardian’s hard drives?
&lt;br /&gt;
&lt;br /&gt;
ALAN RUSBRIDGER: Well, I think it’s quite significant in that clip that — we’re talking there about British Government taking the decision, which is not actually what is suppose to happen with that law. This law is an obscure bit of The Terror Act, Section 7, which is supposed to be police acting randomly in ports and airports. And why this was wrong to use this law, is because it accords none of the rights to journalistic material that would have happened if they had picked up David Miranda and arrested him as they could have under other acts, or if they’d taken him into Heathrow car park as oppose to the transit lounge.
&lt;br /&gt;
&lt;br /&gt;
So, it was just a misuse of terror legislation against journalism. And that, to me, is wrong. If people are saying that it was the government took that decision, then that was even more wrong. And you are right to say that I’ve been revealed about the smashed up discs. There were logistical reasons at the time why I could not write about that. I waited to see how the British Government was going to play this, but it seemed to me at the point that they were going to misuse those kind of laws against reporting. That was the moment to share what else the government had been doing. I thought it was right that the reader should know.
&lt;br /&gt;
&lt;br /&gt;
JUAN GONZÁLEZ: Alan Rusbridger, I would like to ask you about the Edward Snowden odyssey since the initial revelations in this traveling from Hong Kong and then to Russia, and becoming an international standoff between the United States and Russia over whether he’d be handed back, whether that’s complicated your ability to continue reporting on this at all? Because obviously, the source of your information is now, not as readily — as easily available as he was, as he was in June or July.
&lt;br /&gt;
&lt;br /&gt;
ALAN RUSBRIDGER: Well, I think he knew, and think he told us that, in leaking this material, he knew that this going to be immensely complicating for his life, to put it mildly. Either he was going to be on the run or was going to end up like Chelsea Manning. Either way, it was going to be difficult to communicate with him. We didn’t know that he was going to end up in Russia. I don’t know if even he knew at that point if he was going to end up in Russia. Glenn is still in contact with him via encrypted e-mails. So, we still have some contact with him. But, it is a complicated story to report. We assume, this may be wrong, but we assume that our communications will be intercepted, because that is part of the story that we are writing about, which is why people have to be on planes occasionally carrying material which then get intercepted by the police. So, it is not an easy story to report.
&lt;br /&gt;
&lt;br /&gt;
JUAN GONZÁLEZ: And the impact that this has had, much like the original WikiLeaks revelations in various countries around the world, in Brazil, obviously, in Europe. Did you expect at the beginning that this would have the ramifications and the explosiveness that it has had in various countries, not just the United States and the U.K.?
&lt;br /&gt;
&lt;br /&gt;
ALAN RUSBRIDGER: Well, I think, the bit that is sometimes missing from the American debate, the President places great emphasis on the fact that America doesn’t spy on Americans in American territory, as if that was the only thing that mattered. And I thought it was very interesting that Mark Zuckerberg of Facebook said, the other day, well that is no use to us if we are trying to build an international business. So, I think Americans haven’t quite understood the anger of other states, of people living in Germany, you say, that Americans feel free to spy on anybody else in the world, and you just have to, sort of, reverse that and think how would Americans feel if Germans were spying on them, or the Chinese. Well, we know how people feel about the Chinese. And then you get to this further dimension that it appears that what the NSA had done is to weaken the systems under which everything is kept secret; banking transactions, medical transactions of ordinary Americans, but also the rest of the world, by building these so-called trapdoors. Now, if the cryptologists seem to say if you build a trap door that the NSA can get through, then probably the Chinese can too, and criminals. So, that, I think this last story about the weakening of the security of the Internet has international implications which are beginning to be felt.
&lt;br /&gt;
&lt;br /&gt;
AMY GOODMAN: Why did you choose to collaborate with The New York Times andProPublica in revealing the National Security Agency as successfully foiling much of the encryption used by people used to protect their privacy?
&lt;br /&gt;
&lt;br /&gt;
ALAN RUSBRIDGER: Well, we had to find American partners because it was clear that our reporting was going to be made very difficult in the U.K. And actually, if you look around America, you slightly — I mean there are not limitless options of people who could handle a very big story. I mean, it takes up a lot of resources, a lot of technical knowledge, legal backup, and The New York Times is a great paper with that kind of backup, and ProPublica is a really interesting example of a much smaller operation but has got a lot of expertise around these kind of subjects.
&lt;br /&gt;
&lt;br /&gt;
AMY GOODMAN: Did you also want to spread the information around in case, somehow, your access to it is jeopardized?
&lt;br /&gt;
&lt;br /&gt;
ALAN RUSBRIDGER: I think that is prudent and that was one of the reasons we went to both ProPublica and The New York Times. I think the more people that are involved — you don’t want a limitless number of people, have a number of people involved, it makes it much harder just to lean on one.
&lt;br /&gt;
&lt;br /&gt;
AMY GOODMAN: I’m just looking at the New York Times Public Editor rebuking her own paper, this is Margaret Sullivan saying many times &quot;readers have been writing to me about a story The Guardian broke last week describing how the U.S. routinely shares with Israel intelligence information that the National Security Agency gathers on American citizens.&quot; Can you talk about what you broke and what The New York Times, well dragged its feet on?
&lt;br /&gt;
&lt;br /&gt;
ALAN RUSBRIDGER: Well, this is another one of those stories that describes the intersections between the American intelligence agencies and what they are paired to share with other governments. So, we obviously thought it was significant to write about what was being shared with Israel, and under what terms, and whether the terms that covered Israel’s use of that was the same as what would be covered in America. That felt a significant story to ask. But, one of the advantages of going into these kind of collaborations is that The New York Times is free to form its own opinion of the material. And so, we’re all coming to these stories from a slightly different angle, which I think is healthy. But, obviously, their own ombudsman felt that was a story they should have covered.
&lt;br /&gt;
&lt;br /&gt;
AMY GOODMAN: I mean, raw intelligence is what the U.S. was sharing that The Guardianexposed with Israel right, actual phone calls, not only metadata, but — and then saying to Israeli intelligence, you decide what to do with it?
&lt;br /&gt;
&lt;br /&gt;
ALAN RUSBRIDGER: That feels to me like a significant story, but I don’t want to criticize the judgements of others.
&lt;br /&gt;
&lt;br /&gt;
AMY GOODMAN: Let’s break and then we’ll come back to this discussion. Alan Rusbridger is Editor in Chief of The Guardian for almost two decades. The Guardian has been exposing the NSA story since they broke it in June. We’ll be back with Alan Rusbridger in a moment.
&lt;br /&gt;
&lt;br /&gt;
AMY GOODMAN: Chopin Ballade No. 1 in G minor, which plays prominently in our guest’s book and his life, Alan Rusbridger, Editor in Chief of The Guardian has written a book, &quot;Play it Again: An Amateur Against the Impossible.&quot; We’re going back to talk about what you’ve exposed, but, you have just come out with this book. Talk about how your piano playing, how your interest in music, and mastering this piece, relates to what you’re doing with The Guardian.
&lt;br /&gt;
&lt;br /&gt;
ALAN RUSBRIDGER: This is a kind of diary we were working on, WikiLeaks phone hacking, so, it’s a diary of that period, but, but it’s also a book about creativity in midlife. I think that the choices we make about what to do with our time when we are not working, and whether the value of painting, or reading, or writing poetry, or the sources of creativity that lie within us, and I spent 18 months — I went back to playing the piano later in life. I tried playing this extraordinary difficult piece of music, this Chopin ballade. And so, it was an interweaving of this thing I was doing almost to take the stress and pressure of my life out of it, and at the same time, hold down an editing job on a big newspaper. So, I hope it is a book that will encourage those that gave up the piano or always wished they had played the piano, and to pursued them that is time — you can make time in your life to do these things if you think they’re important.
&lt;br /&gt;
&lt;br /&gt;
JUAN GONZÁLEZ: Well, to get back to some of that pressure that you are talking about, the stories that — I guess no country, other than the United States, has been more — felt the impact of your continuing revelations in The Guardian that has Brazil. Amazing revelations about the NSA spying on an [Unintelligible] of the President Dilma Rousseff, of the Brazilian people extensively. Your sense of how these kinds of revelations are not only affecting world perceptions of the United States, but as you alluded to earlier, the ability of American companies, internet giants and computer giants, to do business overseas. as more and more people say, why should I deal with Yahoo or why should I deal with Google, if the American Government is going to be able to spy on me?
&lt;br /&gt;
&lt;br /&gt;
ALAN RUSBRIDGER: Well, I mean, I know some people have a weary shrug and they say, well spies spy and, you know, what is new about that, but, I think it is surprising the degree to which apparently friendly nations are eavesdropping each other, at heads of state level, or cabinet level. We did the story about the G20 meeting in London in which the British government set up a kind of phony tent, an internet cafe, in which delegates could go in and do their emails, not knowing that the British Government or the British intelligence service was logging all their email passwords in order to carry on spying on them when they went home. Most of these were friendly allies, and there was no justification for that except the economic well-being of the U.K. So, I think these are troubling revelations; Brazil is another country. I think it gets to be a big, big story for American innovation and business, if the rest of the world comes to associate these companies with forms of surveillance. That is going to damage American companies. And I think the Silicon Valley companies know this and they are worried. And it also applies to the standards — the international standards by which the internet as a whole operates, and this sense that the Internet is, in some sense, American, or that the American should have an overall role in deciding these standards. There is going be a lot of pushback on that in future and all these things. This is a short-term gain in this kind of behavior and a long term loss.
&lt;br /&gt;
&lt;br /&gt;
JUAN GONZÁLEZ: Well, there has already been some pushback in terms of President Dilma Rousseff threatening to — trying to find a way to get — extricate Brazil from the U.S. — .
&lt;br /&gt;
&lt;br /&gt;
ALAN RUSBRIDGER: Well, you can understand it, can’t you. I mean, again, put it the other way around, if we discovered that Brazil was trying to listen to President Obama’s phone calls emails, there would be outrage. So, you can understand why other states just are offended by this kind of behavior.
&lt;br /&gt;
&lt;br /&gt;
AMY GOODMAN: Earlier this month, while in Sweden, when President Obama was on his way to the G20, in St. Petersburg, where he faced, you could say, a wall of bricks as in Brazil and India, China, South Africa. Obama said he’s working to reassure foreign allies following the wave of revelations surrounding U.S. spying on other governments.
&lt;br /&gt;
&lt;br /&gt;
PRESIDENT OBAMA: The publics in Europe and around the world, that we are not going around snooping at peoples’ emails or listening to their phone calls. What we are try to do is target very specifically areas of concern. We are consulting with the EU in this process, consulting with other countries in this process, and finding out from them what are their areas of specific concern, and trying to align what we do in a way that I think alleviates some of the public concerns that people may have.
&lt;br /&gt;
&lt;br /&gt;
AMY GOODMAN: That was President Obama in Sweden. I want to get your response to that, Alan. Also, Glenn Greenwald, your columnist, has a news story out in The Hindu as we’re broadcasting &quot;Among the BRICS group of emerging nations,&quot; he writes &quot;India is the number one target of snooping by the [NSA]. In the overall list of countries spied on by NSAprograms, India stands at fifth place, with billions of pieces of information plucked from its telephone and internet networks just in 30 days.&quot;
&lt;br /&gt;
&lt;br /&gt;
ALAN RUSBRIDGER: I had not read that story yet. On the president’s reaction, I love this reaction of, look, just trust us. We can’t tell you about this, it’s too secret, but you’re going to have to trust us. And by the way, we’ve got the oversight mechanisms.
&lt;br /&gt;
&lt;br /&gt;
AMY GOODMAN: And he says the debate would have happened anyway, without Edward Snowden.
&lt;br /&gt;
&lt;br /&gt;
ALAN RUSBRIDGER: Yes, well, the debate never did happen, did it? Because the instinct of these agencies is always going to be to it as secret as possible and to criminalize people who talk about it. So, that debate didn’t happen until Snowden came along. And who is overseeing this and do you trust them? Dianne Feinstein, a great public servant, but does she really understand the finer details of cryptology, and encryption, the capabilities which are expanding exponentially, and can they really match up what the law were intended to do and what engineers are now capable of doing? These are the questions. I think it is not enough just to say, take us on trust we are not doing that, because these secret courts, the FISAcourts, we’re now learning some of the things that were troubling them that they never made public. And so, it is a lot to take on trust.
&lt;br /&gt;
&lt;br /&gt;
AMY GOODMAN: You know, Alan Rusbridger, The Guardian has exploded onto the global scene with an exposé of News of the World and their phone hacking that forced Murdoch to close News of the World. Interestingly, it was a story about phone hacking. Can you talk about that progression of The Guardian to exposing the WikiLeaks documents, to what you’re seeing today? The Guardian has just done a remarkable series of exposés.
&lt;br /&gt;
&lt;br /&gt;
ALAN RUSBRIDGER: Well, The Guardian has always been something of outsider. It started in Manchester in 1820, has been owned by a family trust since 1936, so it has no owner. We make our own editorial decisions. So, we have a high degree of independence. And it seemed that after 2000, a third of our audience was in America, which is why we’ve moved to America. We now have an operation of 55 people in America, and an audience of many millions. About a third of our audience of 42 million is now in America. And I think there is just an appetite for this kind of reporting. it’s quite rare now. We don’t have shareholders saying we want our returns, and cutting budgets. It is a bit like when you’re doing, it’s keeping very much an international focus because, I think, most American citizens realize their lives cannot be understood in a purely national context. There are things to do with security, economics, technology, the environment are stories that can only be told internationally.
&lt;br /&gt;
&lt;br /&gt;
JUAN GONZÁLEZ: Well, I wanted to read an excerpt from a recent letter sent by the NSAto family members of its employees. The letter, dated September 13the, is signed by NSADirector Keith Alexander and Deputy Director John Inglis. It says, &quot;some media outlets have sensationalized the leaks to the press in a way that has called into question our motives and wrongly cast doubt on the integrity and commitment of the extraordinary people that work here at the NSA/CSS — your loved ones. It has been discouraging to see how our agency frequently has been portrayed in the news as more of a rogue element than a national treasure.&quot; I’m wondering, your response to the — I mean, obviously, the allegations of sensationalized reporting allude to The Guardian as well as other press outlets.
&lt;br /&gt;
&lt;br /&gt;
ALAN RUSBRIDGER: Well, we obviously reject that. I think we have been very careful in our reporting, and actually, the intelligence chiefs, when they speak in private, have been graceful enough to acknowledge that we have been responsible. I can understand why you would write a letter like that. And we are not saying that the people who work inside the NSAare bad people. I imagine they have very talented engineers who are capable of doing extraordinary things. I think what we are saying that there has to be a wider debate because it’s not just about national security. There are other interests in society; privacy, civil liberties, of reporting which had to be weighed against security. And so, if you are write about this, you are not saying that the NSA is full of bad people. That would be silly. So, I perfectly understand that you write a letter to the families saying that much of what you do is good and important, which it is.
&lt;br /&gt;
&lt;br /&gt;
JUAN GONZÁLEZ: I’m wondering, since we mentioned earlier your involvement with the WikiLeaks scandal as well. Your sense of Julian Assange, he’s still in England, in basically, detention, effectively, and your sense of his role in terms of being able to bring out to the rest of the world these secrets that the U.S. Military and and the U.S. Government was preventing its own citizens from seeing?
&lt;br /&gt;
&lt;br /&gt;
ALAN RUSBRIDGER: Well, I think Assange had a very good and simple idea, which was about liberating material. In a sense, what we tried to do there is what we are doing here, which is to root our reporting on the American First Amendment. So, I mean, even in the U.K., a mature democracy, this reporting was impossible. And I think America should take pride in that, that you have this written constitution that encourages this kind of reporting. And I think if you thought how much we would welcome whistleblowers from Iran or China or Russia, if we could find out the kind of hinge that Assange imagined in which this material could be safely leaked and protected by the highest standards of free speech, that would be a good thing. It went a bit wrong with Assange, and he’s sort of out of action in the Ecuadorian Embassy in London.
&lt;br /&gt;
&lt;br /&gt;
AMY GOODMAN: Although, hardly out of action, because he did helped Edward Snowden ultimately get to Russia.
&lt;br /&gt;
&lt;br /&gt;
ALAN RUSBRIDGER: For better or worse, yes. But, he I think he has not been able to operate as effectively as he could have done. But. that does not mean the idea was wrong. I think the idea was a good one, and that is why I think, for me as an outsider, when I see Chelsea Manning given a 60 year sentence, you think, what kind of signal does that show whistleblowers? Because, whistle-blowing, as I say, if we had a whistle-blower inside the Iranian nuclear project, or inside the corruption in some parts of the Chinese Government, we would welcome that. And so, there are kind of universal standards and that’s what civil liberties is all about, that you have universal standards of human rights, and you have to be careful to observe those, and not to bend them, and start using terror legislation against journalism just when it affects you.
&lt;br /&gt;
&lt;br /&gt;
AMY GOODMAN: Do you think journalism is threatened?
&lt;br /&gt;
&lt;br /&gt;
ALAN RUSBRIDGER: Well, I think journalism is certainly by this kind of massive surveillance, yes, because it is impossible to have confidential sources in a world in which algorithms can immediately work out who you’ve been talking to. That’s a big threat.
&lt;br /&gt;
&lt;br /&gt;
AMY GOODMAN: Alan Rusbridger, I want to thank you very much for being with us; Editor in Chief of The Guardian for almost two decades. He has just published a book, &quot;Play it Again: An Amateur Against the Impossible.&quot; He will be speaking on Wednesday evening at the New York public Library. That does it for our show. Breaking news from Egypt and Egyptian court has banned the Muslim Brotherhood group and ordered its assets confiscated.
&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://creativecommons.org/licenses/by-nc-nd/3.0/us/&quot; rel=&quot;license&quot; style=&quot;-webkit-text-stroke-width: 0px; background-color: white; color: #336699; font-family: Georgia, serif; font-size: 17px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; outline: 0px; text-align: start; text-decoration: underline; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;&lt;img alt=&quot;Creative Commons License&quot; height=&quot;31&quot; src=&quot;http://www.democracynow.org/images/cc-by-nc-nd.png&quot; style=&quot;border: 0px; float: left; margin-right: 1em; text-decoration: none;&quot; width=&quot;88&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;background-color: white; color: black; display: inline ! important; float: none; font-family: Georgia,serif; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;The original content of this program is licensed under a&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://creativecommons.org/licenses/by-nc-nd/3.0/us/&quot; rel=&quot;license&quot; style=&quot;background-color: white; color: #336699; font-family: Georgia,serif; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; outline: 0px none; text-align: start; text-decoration: none; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 United States License&lt;/a&gt;&lt;span style=&quot;background-color: white; color: black; display: inline ! important; float: none; font-family: Georgia,serif; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;. Please attribute legal copies of this work to&lt;/span&gt;&lt;q style=&quot;background-color: white; color: black; font-family: Georgia,serif; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;democracynow.org&lt;/q&gt;&lt;span style=&quot;background-color: white; color: black; display: inline ! important; float: none; font-family: Georgia,serif; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;. Some of the work(s) that this program incorporates, however, may be separately licensed. For further information or additional permissions,&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://www.democracynow.org/contact?to=9#sendmessage&quot; style=&quot;background-color: white; color: #336699; font-family: Georgia,serif; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; outline: 0px none; text-align: start; text-decoration: none; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;contact us&lt;/a&gt;&lt;span style=&quot;background-color: white; color: black; display: inline ! important; float: none; font-family: Georgia,serif; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;.&lt;/span&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;br /&gt;
Source:&lt;br /&gt;
&lt;a href=&quot;http://www.democracynow.org/2013/9/23/spilling_the_nsas_secrets_guardian_editor&quot;&gt;http://www.democracynow.org/2013/9/23/spilling_the_nsas_secrets_guardian_editor&lt;/a&gt;&lt;br /&gt;
&amp;nbsp;______________________
&lt;/div&gt;
</description><link>http://news2u.blogspot.com/2013_09_01_archive.html#3459525701026793570</link><author>noreply@blogger.com (Unknown)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5604605.post-6924428440325564476</guid><pubDate>Fri, 13 Sep 2013 00:27:00 +0000</pubDate><atom:updated>2013-09-12T19:27:30.913-05:00</atom:updated><title></title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;span style=&quot;font-size: x-large;&quot;&gt;&lt;b&gt;A Plea for Caution From Russia&amp;nbsp;
&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
By VLADIMIR V. PUTIN&lt;br /&gt;
President of Russia&lt;br /&gt;
September 11, 2013&lt;br /&gt;
&lt;br /&gt;
Recent events surrounding Syria have prompted me to speak directly to the American people and their political leaders. It is important to do so at a time of insufficient communication between our societies.
&lt;br /&gt;
&lt;br /&gt;
Relations between us have passed through different stages. We stood against each other during the cold war. But we were also allies once, and defeated the Nazis together. The universal international organization — the United Nations — was then established to prevent such devastation from ever happening again.
&lt;br /&gt;
&lt;br /&gt;
The United Nations’ founders understood that decisions affecting war and peace should happen only by consensus, and with America’s consent the veto by Security Council permanent members was enshrined in the United Nations Charter. The profound wisdom of this has underpinned the stability of international relations for decades.
&lt;br /&gt;
&lt;br /&gt;
No one wants the United Nations to suffer the fate of the League of Nations, which collapsed because it lacked real leverage. This is possible if influential countries bypass the United Nations and take military action without Security Council authorization.
&lt;br /&gt;
&lt;br /&gt;
The potential strike by the United States against Syria, despite strong opposition from many countries and major political and religious leaders, including the pope, will result in more innocent victims and escalation, potentially spreading the conflict far beyond Syria’s borders. A strike would increase violence and unleash a new wave of terrorism. It could undermine multilateral efforts to resolve the Iranian nuclear problem and the Israeli-Palestinian conflict and further destabilize the Middle East and North Africa. It could throw the entire system of international law and order out of balance.
&lt;br /&gt;
&lt;br /&gt;
Syria is not witnessing a battle for democracy, but an armed conflict between government and opposition in a multireligious country. There are few champions of democracy in Syria. But there are more than enough al Qaeda fighters and extremists of all stripes battling the government. The United States State Department has designated Al Nusra Front and the Islamic State of Iraq and the Levant, fighting with the opposition, as terrorist organizations. This internal conflict, fueled by foreign weapons supplied to the opposition, is one of the bloodiest in the world.
&lt;br /&gt;
&lt;br /&gt;
Mercenaries from Arab countries fighting there, and hundreds of militants from Western countries and even Russia, are an issue of our deep concern. Might they not return to our countries with experience acquired in Syria? After all, after fighting in Libya, extremists moved on to Mali. This threatens us all.
&lt;br /&gt;
&lt;br /&gt;
From the outset, Russia has advocated peaceful dialogue enabling Syrians to develop a compromise plan for their own future. We are not protecting the Syrian government, but international law. We need to use the United Nations Security Council and believe that preserving law and order in today’s complex and turbulent world is one of the few ways to keep international relations from sliding into chaos. The law is still the law, and we must follow it whether we like it or not. Under current international law, force is permitted only in self-defense or by the decision of the Security Council. Anything else is unacceptable under the United Nations Charter and would constitute an act of aggression.
&lt;br /&gt;
&lt;br /&gt;
No one doubts that poison gas was used in Syria. But there is every reason to believe it was used not by the Syrian Army, but by opposition forces, to provoke intervention by their powerful foreign patrons, who would be siding with the fundamentalists. Reports that militants are preparing another attack — this time against Israel — cannot be ignored.
&lt;br /&gt;
&lt;br /&gt;
It is alarming that military intervention in internal conflicts in foreign countries has become commonplace for the United States. Is it in America’s long-term interest? I doubt it. Millions around the world increasingly see America not as a model of democracy but as relying solely on brute force, cobbling coalitions together under the slogan “&lt;i&gt;you’re either with us or against us&lt;/i&gt;.”
&lt;br /&gt;
&lt;br /&gt;
But force has proved ineffective and pointless. Afghanistan is reeling, and no one can say what will happen after international forces withdraw. Libya is divided into tribes and clans. In Iraq the civil war continues, with dozens killed each day. In the United States, many draw an analogy between Iraq and Syria, and ask why their government would want to repeat recent mistakes.
&lt;br /&gt;
&lt;br /&gt;
No matter how targeted the strikes or how sophisticated the weapons, civilian casualties are inevitable, including the elderly and children, whom the strikes are meant to protect.
&lt;br /&gt;
&lt;br /&gt;
The world reacts by asking: if you cannot count on international law, then you must find other ways to ensure your security. Thus a growing number of countries seek to acquire weapons of mass destruction. This is logical: if you have the bomb, no one will touch you. We are left with talk of the need to strengthen nonproliferation, when in reality this is being eroded.
&lt;br /&gt;
&lt;br /&gt;
We must stop using the language of force and return to the path of civilized diplomatic and political settlement.
&lt;br /&gt;
&lt;br /&gt;
A new opportunity to avoid military action has emerged in the past few days. The United States, Russia and all members of the international community must take advantage of the Syrian government’s willingness to place its chemical arsenal under international control for subsequent destruction. Judging by the statements of President Obama, the United States sees this as an alternative to military action.
&lt;br /&gt;
&lt;br /&gt;
I welcome the president’s interest in continuing the dialogue with Russia on Syria. We must work together to keep this hope alive, as we agreed to at the Group of 8 meeting in Lough Erne in Northern Ireland in June, and steer the discussion back toward negotiations.
&lt;br /&gt;
&lt;br /&gt;
If we can avoid force against Syria, this will improve the atmosphere in international affairs and strengthen mutual trust. It will be our shared success and open the door to cooperation on other critical issues.
&lt;br /&gt;
&lt;br /&gt;
My working and personal relationship with President Obama is marked by growing trust. I appreciate this. I carefully studied his address to the nation on Tuesday. And I would rather disagree with a case he made on American exceptionalism, stating that the United States’ policy is “&lt;i&gt;what makes America different. It’s what makes us exceptional.&lt;/i&gt;”&lt;br /&gt;
&lt;br /&gt;
It is extremely dangerous to encourage people to see themselves as exceptional, whatever the motivation.&lt;br /&gt;
&lt;br /&gt;
There are big countries and small countries, rich and poor, those with long democratic traditions and those still finding their way to democracy. Their policies differ, too. We are all different, but when we ask for the Lord’s blessings, we must not forget that God created us equal.
&lt;br /&gt;
&lt;br /&gt;
Vladimir V. Putin is the president of Russia.&lt;br /&gt;
&lt;br /&gt;
Source:
&lt;br /&gt;
&lt;a href=&quot;http://www.nytimes.com/2013/09/12/opinion/putin-plea-for-caution-from-russia-on-syria.htm&quot;&gt;http://www.nytimes.com/2013/09/12/opinion/putin-plea-for-caution-from-russia-on-syria.htm&lt;/a&gt;l&lt;br /&gt;
_________________&lt;/div&gt;
</description><link>http://news2u.blogspot.com/2013_09_01_archive.html#6924428440325564476</link><author>noreply@blogger.com (Unknown)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5604605.post-1783817786821847154</guid><pubDate>Tue, 03 Sep 2013 01:58:00 +0000</pubDate><atom:updated>2013-09-02T20:58:35.544-05:00</atom:updated><title>President Obama has not spelled out the possible consequences of a military attack on Syria, but U.S. military leaders are warning about the risks.</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-size: x-large;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;The Disastrous Consequences of a U.S. Military Attack on Syria&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;By Ann Wright&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;AlterNet&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Sept. 2, 2013&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;[emphasis added] &lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;story-date&quot; style=&quot;background-color: white; color: black; float: left; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 25px; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;article_insert_separator&quot; style=&quot;background-color: white; clear: left; color: black; float: left; font-style: normal; font-variant: normal; font-weight: normal; height: 70px; letter-spacing: normal; line-height: 25px; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; width: 1px; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;article_insert_separator&quot; style=&quot;background-color: white; clear: left; color: black; float: left; font-style: normal; font-variant: normal; font-weight: normal; height: 70px; letter-spacing: normal; line-height: 25px; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; width: 1px; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 25px; margin: 0px 0px 22px; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Its 4am and I can’t sleep, just like 10 years ago when President Bush was telling the world that Saddam Hussein had weapons of mass destruction in Iraq and the United States must invade and occupy Iraq to rid humanity of these weapons. I didn’t believe President Bush ten years ago and I resigned as a U.S. diplomat.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 25px; margin: 0px 0px 22px; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Now a decade later, President Obama is telling the world that the use of chemical weapons in Syria by the Assad government must be answered by other weapons, even though the results of the UN inspection team have not been compiled—just as the Bush administration refused to wait for the UN report by the inspectors who had been looking for WMD in Iraq.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 25px; margin: 0px 0px 22px; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Secretary of State John Kerry pronounced that the UN inspectors “&lt;i&gt;can’t tell us anything that we don’t already know&lt;/i&gt;.” President Obama says that any U.S. attack on the Assad government will be as punishment, not regime change. The strike will be “limited”—but tell that to the civilians who inevitably die when military attacks take place.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 25px; margin: 0px 0px 22px; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;President Bush and his advisors either didn’t know or didn’t care about the probable consequences of their decision to invade and occupy Iraq:&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;ul style=&quot;background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 25px; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;li&gt;&lt;i&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Hundreds of thousands of Iraqis and over 4,000 Americans dead;&lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;/li&gt;
&lt;li&gt;&lt;i&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Millions of Iraqis and Americans wounded physically and psychologically;&lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;/li&gt;
&lt;li&gt;&lt;i&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Legions of young men of the region now experienced in warfare and for hire moving from Iraq to Libya to Syria;&lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;/li&gt;
&lt;li&gt;&lt;i&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;And the Iraqi “democratic” government unable to control the whirlwind of sectarian violence that now is killing hundreds each week.&lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 25px; margin: 0px 0px 22px; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&amp;nbsp;(&lt;i&gt;Although the U.S. invaded and occupied Afghanistan under a different rationale, I also want to acknowledge the Afghan citizens who have been killed or wounded in the U.S. war in Afghanistan&lt;/i&gt;.)&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 25px; margin: 0px 0px 22px; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;President Obama has not spelled out the possible consequences of a military attack on Syria, but &lt;b&gt;U.S. military leaders are warning about the risks&lt;/b&gt;. In a letter to the Senate Armed Services committee, the chairman of the Joint Chiefs of Staff General Martin&amp;nbsp;&lt;b&gt;&lt;a href=&quot;http://www.levin.senate.gov/newsroom/press/release/gen-dempsey-responds-to-levins-request-for-assessment-of-options-for-use-of-us-military-force-in-syria&quot; style=&quot;color: #ad993e; text-decoration: none;&quot; target=&quot;_blank&quot;&gt;Dempsey wrote last month&lt;/a&gt;&amp;nbsp;&lt;/b&gt;said, “&lt;i&gt;As we weigh our options, we should be able to conclude with some confidence that use of force will move us toward the intended outcome.&lt;/i&gt;”&lt;b&gt; “&lt;i&gt;Once we take action, we should be prepared for what comes next. Deeper involvement is hard to avoid&lt;/i&gt;.”&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 25px; margin: 0px 0px 22px; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;General James Mattis, who retired recently as head of the U.S. Central Command,&amp;nbsp;&lt;a href=&quot;http://www.washingtonpost.com/world/national-security/us-military-officers-have-deep-doubts-about-impact-wisdom-of-a-us-strike-on-syria/2013/08/29/825dd5d4-10ee-11e3-b4cb-fd7ce041d814_story_1.html&quot; style=&quot;color: #ad993e; text-decoration: none;&quot;&gt;said&lt;/a&gt;&amp;nbsp;last month at a security conference that the United States has &lt;b&gt;“&lt;i&gt;no moral obligation to do the impossible&lt;/i&gt;” in Syria. “&lt;i&gt;If Americans take ownership of this, this is going to be a full-throated, very, very serious war.&lt;/i&gt;”&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 25px; margin: 0px 0px 22px; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Possible Consequences of A U.S. Military Attack on Syria&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 25px; margin: 0px 0px 22px; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;As U.S. warships gather off the shores of Lebanon to launch Tomahawk Cruise missiles at targets in Syria, we can make some educated guesses of what the “unintended consequences” could be:&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;ul style=&quot;background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 25px; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;li&gt;&lt;i&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Syrian anti-aircraft batteries will fire their rockets at incoming U.S. missiles.&lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;/li&gt;
&lt;li&gt;&lt;i&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Many Syrians on the ground will die and both the U.S. and Syrian governments will say the deaths are the fault of the other.&lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;/li&gt;
&lt;li&gt;&lt;i&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;The U.S. Embassy in Damascus will be attacked and burned, as may other U.S. Embassies and businesses in the Middle East.&lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;/li&gt;
&lt;li&gt;&lt;i&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Syria might also launch rockets toward the U.S. ally in the region—Israel.&lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;/li&gt;
&lt;li&gt;&lt;i&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Israel would launch bombing missions on Syria as it has three times in the past two years and perhaps take the opportunity to launch an attack on Syria’s strongest ally in the region Iran.&lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;/li&gt;
&lt;li&gt;&lt;i&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Iran, a country with a population of 80 million and has the largest military in the region untouched by war in the past 25 years, might retaliate with missiles aimed toward Israel and toward nearby U.S. military bases in Afghanistan, Turkey, Bahrain and Qatar.&lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;/li&gt;
&lt;li&gt;&lt;i&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Iran could block the Straits of Hormuz and impede the transport of oil out of the Persian Gulf.&lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 25px; margin: 0px 0px 22px; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;30 Years Ago, U.S. Warships Bombed Lebanon and the U.S. Marine Barracks in Beirut Was Blown Up in Retaliation&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 25px; margin: 0px 0px 22px; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;At this time of crisis, it is worth remembering another time, 30 years ago in October, 1983 when U.S. warships bombarded Lebanon, the country located next to Syria. Within weeks, the U.S. Marine barracks in Beirut was blown up by a massive truck bomb that killed 241 American servicemen: 220 Marines, 18 sailors and three soldiers.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 25px; margin: 0px 0px 22px; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;The truck driver- suicide bomber was an Iranian national named Ismail Ascari whose truck contained explosives that were the equivalent of 21,000 pounds of TNT. Two minutes later a second suicide bomber drove a truck filled with explosives into the French military compound in Beirut killing 58 French paratroopers.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 25px; margin: 0px 0px 22px; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;France is the only country standing with the Obama administration on a military strike on Syria.&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 25px; margin: 0px 0px 22px; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Earlier in the year, on April 18, 1983, the U.S. Embassy in Beirut had been blown up by another suicide driver with 900 pounds of explosives that killed 63 people, 17 Americans, mostly embassy and CIA staff members, several soldiers and one Marine, 34 Lebanese employees of the US Embassy and 12 Embassy visitors. It was the deadliest attack on a U.S. diplomatic mission up to that time, and marked the beginning of anti-U.S. attacks by Islamist groups.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 25px; margin: 0px 0px 22px; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;The U.S. and French military were in Lebanon as a part of a Multi-National force after the PLO left Lebanon following the 1982 Israeli invasion of Lebanon ostensibly to create a 40 km buffer zone between the PLO and Syrian forces in Lebanon and Israel. The Israeli invasion was tacitly approved by the U.S., and the U.S. provided overt military support to Israel in the form of arms and material.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 25px; margin: 0px 0px 22px; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Colonel Timothy J. Geraghty, the commander of the U.S. 24th Marine Amphibious Unit (MAU) deployed as peacekeepers in Beirut,&amp;nbsp;&lt;b&gt;&lt;a href=&quot;http://www.usni.org/magazines/proceedings/2008-10/25-years-later-we-came-peace&quot; style=&quot;color: #ad993e; text-decoration: none;&quot;&gt;said&lt;/a&gt;&amp;nbsp;&lt;/b&gt;that the American and the French headquarters were targeted primarily because of &quot;&lt;i&gt;who we were and what we represented…It is noteworthy that the United States provided direct naval gunfire support [which fired a total of 360 5-inch rounds between 10:04 A.M. and 3:00 PM.] -- which I strongly opposed for a week -- to the Lebanese Army at a mountain village called Suq-al-Garb on September 19 and that the French conducted an air strike on September 23 in the Bekaa Valley. American support removed any lingering doubts of our neutrality, and I stated to my staff at the time that we were going to pay in blood for this decision&lt;/i&gt;.”&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 25px; margin: 0px 0px 22px; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Some of the circumstances around the incidents in Lebanon in 1983 and now thirty years later in Syria are familiar.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 25px; margin: 0px 0px 22px; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;U.S. intelligence agencies were aware of potential trouble but did not report the problems in sufficient time for actions to be taken. President Obama said that the U.S. had intercepted signals indicating the Syrian government was moving equipment into place for an attack, &lt;b&gt;but the U.S. did not warn the Syrian government that the U.S. knew what was happening and did not warn civilians that a chemical attack was imminent.&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 25px; margin: 0px 0px 22px; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Thirty years before, on September 26, 1983, &quot;&lt;i&gt;the National Security Agency (NSA) intercepted an Iranian diplomatic communications message from the Iranian intelligence agency, the Ministry of Information and Security (MOIS),&lt;/i&gt;&quot; to its ambassador, Ali Akbar Mohtashemi, in Damascus.&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 25px; margin: 0px 0px 22px; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;b&gt;&lt;a href=&quot;http://www.usni.org/magazines/proceedings/2008-10/25-years-later-we-came-peace&quot; style=&quot;color: #ad993e; text-decoration: none;&quot;&gt;The message&lt;/a&gt;&lt;/b&gt;&amp;nbsp;directed the ambassador to &lt;i&gt;&quot;take spectacular action against the American Marines.”&lt;/i&gt; The intercepted message, dated September 26, &lt;b&gt;was not passed to the Marines until a month later&lt;/b&gt; on October 26: three days after the bombing.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 25px; margin: 0px 0px 22px; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Geraghty wrote 20 years later, “ &lt;i&gt;The coordinated dual suicide attacks, supported, planned, organized, and financed by Iran and Syria using Shiite proxies, achieved their strategic goal: the withdrawal of the multinational force from Lebanon and a dramatic change in U.S. national policy. The synchronized attacks that morning killed 299 U.S. and French peace keepers and wounded scores more. The cost to the Iranian/Syrian-supported operation was two suicide bombers dead.&lt;/i&gt;”&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 25px; margin: 0px 0px 22px; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;b&gt;“&lt;i&gt;What is the political end state we’re trying to achieve&lt;/i&gt;?”&lt;/b&gt; said a retired senior officer involved in Middle East operational planning who said his concerns are widely shared by active-duty military leaders.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 25px; margin: 0px 0px 22px; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;b&gt;&lt;i&gt;“I don’t know what it is. We say it’s not regime change. If it’s punishment, there are other ways to punish.” &lt;/i&gt;&lt;/b&gt;The former senior officer said that those who are expressing alarm at the risks inherent in the plan &lt;i&gt;&lt;b&gt;“are not being heard other than in a pro-forma manner.”&lt;/b&gt;&lt;/i&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 25px; margin: 0px 0px 22px; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Letter from former U.S. government officials appealing to Chairman of the Joint Chiefs General Dempsey&lt;u&gt;&lt;b&gt; not to obey an illegal order to attack Syria&lt;/b&gt;&lt;/u&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 25px; margin: 0px 0px 22px; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;As Obama administration lawyers in the Justice and State Departments frantically write classified legal opinions to provide legal protection for whatever action the President decides on, &lt;u&gt;others are calling for military officers to look to their constitutional responsibilities.&lt;/u&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 25px; margin: 0px 0px 22px; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;On August 31, 2013, 13 former officials of the U.S. government, including Pentagon Papers whistleblower Dan Ellsberg, retired CIA analyst Ray McGovern and retired US Army Colonel Larry Wilkerson, former Chief of Staff for Secretary of State Colin Powell,&amp;nbsp;&lt;b&gt;&lt;a href=&quot;http://www.commondreams.org/view/2013/08/31-2&quot; style=&quot;color: #ad993e; text-decoration: none;&quot;&gt;wrote an open letter&lt;/a&gt;&lt;/b&gt;&amp;nbsp;to General Martin Dempsey, Chairman of the Joint Chiefs, &lt;u&gt;asking him to resign rather than follow an illegal order to attack Syria.&lt;/u&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 25px; margin: 0px 0px 22px; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;“We refer to your acknowledgment, in your letter of July 19 to Sen. Carl Levin on Syria, that a &lt;b&gt;&lt;i&gt;“decision to use force is not one that any of us takes lightly. It is no less than an act of war.”&lt;/i&gt;&lt;/b&gt;&amp;nbsp; &lt;u&gt;It appears that the President may order such an act of war without proper Congressional authorization&lt;/u&gt;. As seasoned intelligence and military professionals solemnly sworn to support and defend the Constitution of the United States, we have long been aware that – from private to general – &lt;b&gt;it is one’s duty not to obey an illegal order&lt;/b&gt;. &lt;u&gt;If such were given, the honorable thing would be to resign, rather than be complicit&lt;/u&gt;.”&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;background-color: white; color: black; display: inline ! important; float: none; font-family: Georgia,Arial,sans-serif; font-style: italic; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 25px; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;Ann Wright served in the US Army/Army Reserves for 29 years and retired as a Colonel.&amp;nbsp;&amp;nbsp;She also was a US diplomat for 16 years and resigned in March, 2003 in opposition to the war on Iraq.&amp;nbsp;&amp;nbsp;She has been arrested for challenging Bush and Obama administrations’ policies of illegal wars, torture, assassin drones and curtailment of civil liberties. She was a witness for the defendants in the Oak Ridge Transform Now Plowshares trial. She is the co-author of&amp;nbsp;&amp;nbsp;the book “Dissent: Voices of Conscience.”&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br class=&quot;Apple-interchange-newline&quot; /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Source:&lt;/span&gt;&lt;/span&gt;&lt;br class=&quot;Apple-interchange-newline&quot; /&gt;&lt;a href=&quot;http://www.alternet.org/world/exploring-disastrous-consequences-us-military-attack-syria&quot;&gt;http://www.alternet.org/world/exploring-disastrous-consequences-us-military-attack-syria&lt;/a&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;_________________&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
</description><link>http://news2u.blogspot.com/2013_09_01_archive.html#1783817786821847154</link><author>noreply@blogger.com (Unknown)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5604605.post-2828886887941159425</guid><pubDate>Sun, 01 Sep 2013 16:15:00 +0000</pubDate><atom:updated>2013-09-01T11:15:09.228-05:00</atom:updated><title>British bases in Cyprus being used for military action against Syria </title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;span style=&quot;font-size: x-large;&quot;&gt;&lt;b&gt;Cyprus Buildup May Point To Attack On Syria&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
By Eric Linton&lt;br /&gt;
International Business Times&lt;br /&gt;
August 26, 2013&lt;br /&gt;
&lt;br /&gt;
Warplanes and military transports have begun arriving at Britain&#39;s Akrotiri airbase on Cyprus, less than 100 miles from the Syrian coast, in a sign of hastening preparations for a possible military strike against Syria, &lt;a href=&quot;http://www.theguardian.com/world/2013/aug/26/syria-warplanes-cyprus-tensions-damascus&quot;&gt;The Guardian reported Monday&lt;/a&gt;.
&lt;br /&gt;
&lt;br /&gt;
Two commercial pilots who regularly fly from Larnaca, Cyprus, told the Guardian that they had seen C-130 transport planes from their cockpit windows as well as small formations of fighter jets on their radar screens, which they believe had flown from Europe.
&lt;br /&gt;
&lt;br /&gt;
The Greek Cypriot government in Nicosia said Monday it had no official information about the possibility of British bases in Cyprus being used for military action against Syria in response to alleged poison gas attacks by President Bashar al-Assad’s regime, China’s official Xinhua agency reported.
&lt;br /&gt;
&lt;br /&gt;
&quot;&lt;i&gt;The government has neither been officially advised nor has any other information about the prospect of the British bases on Cyprus being used by Britain and the United State&lt;/i&gt;s,&quot; Defense Minister Fotis Fotiou said.
&lt;br /&gt;
&lt;br /&gt;
The London Sunday Times and the Daily Telegraph have reported that British and American military officials were working on plans to use the British Royal Air Force base at Akrotiri, near Limassol on the south shores of Cyprus, for attacks on selected Syrian government targets.
&lt;br /&gt;
&lt;br /&gt;
Britain retained two sites in Cyprus totaling 156 square kilometers when it granted the island independence in 1960 following a colonial war. Britain claims sovereign rights over the bases.&lt;br /&gt;
&lt;br /&gt;
The Cypriot government objects, as a matter of general policy, to the British bases being used against neighboring countries, but Britain claims that such use complies with international treaties that allow military action which serves its defense interests.
&lt;br /&gt;
&lt;br /&gt;
The most important of these bases is the RAF base at Akrotiri, which is currently used to provide logistic support for NATO forces in Afghanistan and also hosts extensive eavesdropping electronic installations. It was most recently used by British Tornados taking off for action against Moammar Gadhafi&#39;s forces in Libya in 2011.
&lt;br /&gt;
&lt;br /&gt;
Meanwhile, Russia said Monday it hoped a &quot;war of civilizations&quot; in Syria could be avoided, although Western powers had been moving along that path.
&lt;br /&gt;
&lt;br /&gt;
&quot;&lt;i&gt;I was greatly alarmed by the statements made from Paris and London that NATO may intervene to destroy chemical weapons in Syria without the consent of the U.N. Security Council. It&#39;s a very dangerous and slippery path&lt;/i&gt;,&quot; Foreign Minister Sergei Lavrov told reporters in Moscow.
&lt;br /&gt;
&lt;br /&gt;
He said the use of force without the Security Council&#39;s sanction would be a major violation of international law.
&lt;br /&gt;
&lt;br /&gt;
&quot;&lt;i&gt;Even if we leave the legal, moral and ethical aspects aside, specific consequences of external interference not authorized by the international community would only sharply exacerbate the situation in the country,&lt;/i&gt;&quot; Lavrov said.
&lt;br /&gt;
&lt;br /&gt;
Meanwhile, Russia would not start military confrontation with anyone over Syria, he added.
&lt;br /&gt;
&lt;br /&gt;
&quot;&lt;i&gt;We expect our Western partners to draft their policy not reactively but strategically&lt;/i&gt;,&quot; he said.
&lt;br /&gt;
&lt;br /&gt;
Lavrov described the deployment of Western naval vessels off Syrian shores as &quot;a grave blunder&quot; and compared the Western intimidation of Syria with the way the West started its intervention in Iraq 10 years ago.
&lt;br /&gt;
&lt;br /&gt;
Lavrov said foreign intervention would not lead to peace but to a new round of the civil war in Syria and he accused &quot;certain forces&quot; of deliberately undermining peaceful efforts.
&lt;br /&gt;
&lt;br /&gt;
&quot;&lt;i&gt;The moment we see a glimmer of hope appear, someone who wishes to prevent the situation from returning to the right track pops up&lt;/i&gt;,&quot; he said.
&lt;br /&gt;
&lt;br /&gt;
Source:&lt;br /&gt;
&lt;a href=&quot;http://www.ibtimes.com/cyprus-buildup-may-point-attack-syria-1400013&quot;&gt;http://www.ibtimes.com/cyprus-buildup-may-point-attack-syria-1400013&lt;/a&gt;
_________________________

&lt;/div&gt;
</description><link>http://news2u.blogspot.com/2013_09_01_archive.html#2828886887941159425</link><author>noreply@blogger.com (Unknown)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5604605.post-2622666158980465612</guid><pubDate>Sun, 01 Sep 2013 14:31:00 +0000</pubDate><atom:updated>2013-09-01T09:31:36.008-05:00</atom:updated><title>The top 5 reasons why we keep getting into foolish fights.</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;span style=&quot;font-size: x-large;&quot;&gt;&lt;b&gt;Is America Addicted to War?&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;By Stephen M Walt&lt;br /&gt;Foreign Policy&lt;br /&gt;&lt;span style=&quot;color: red;&quot;&gt;April 4, 2011&lt;/span&gt;&lt;br /&gt;
[emphasis added]&lt;br /&gt;&lt;br /&gt;The United States started out as 13 small and vulnerable colonies clinging to the east coast of North America. Over the next century, those original 13 states expanded all the way across the continent, subjugating or exterminating the native population and wresting Texas, New Mexico, Arizona and California from Mexico. It fought a bitter civil war, acquired a modest set of overseas colonies, and came late to both world wars.&lt;b&gt;&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;But since becoming a great power around 1900, it has fought nearly a dozen genuine wars and engaged in countless military interventions.&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Yet Americans think of themselves as a peace-loving people, and we certainly don&#39;t regard our country as a &quot;warrior nation&quot; or &quot;garrison state.&quot; &lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Teddy Roosevelt was probably the last U.S. president who seemed to view war as an activity to be welcomed (he once remarked that&lt;i&gt; &quot;A just war is in the long run far better for a man&#39;s soul than the most prosperous peace&quot;&lt;/i&gt;), and subsequent presidents always portray themselves as going to war with great reluctance, and only as a last resort.&lt;br /&gt;&lt;br /&gt;In 2008, Americans elected Barack Obama in part because they thought he would be different from his predecessor on a host of issues, but especially in his approach to the use of armed force. It was clear to nearly everyone that George W. Bush had launched a foolish and unnecessary war in Iraq, and then compounded the error by mismanaging it (and the war in Afghanistan too).&lt;br /&gt;
&lt;br /&gt;
So Americans chose a candidate who had opposed Bush&#39;s war in Iraq and could bring U.S. commitments back in line with our resources.&lt;br /&gt;
&lt;br /&gt;
Above all, Americans thought Obama would be a lot more thoughtful about where and how to use force, and that he understood the limits of this crudest of policy tools. The Norwegian Nobel Committee seems to have thought so too, when they awarded him the Nobel Peace Prize not for anything he had done, but for what it hoped he might do henceforth.&lt;br /&gt;&lt;br /&gt;Yet a mere two years later, we find ourselves back in the fray once again. &lt;b&gt;(In 2013 now Syria) &lt;/b&gt;Since taking office, Obama has escalated U.S. involvement in Afghanistan and launched a new war against Libya. As in Iraq, &lt;b&gt;the real purpose of our intervention is regime change at the point of a gun&lt;/b&gt;.&lt;br /&gt;
&lt;br /&gt;
At first we hoped that most of the guns would be in the hands of the Europeans, or the hands of the rebel forces arrayed against Muammar al-Qaddafi, but it&#39;s increasingly clear that U.S. military forces, CIA operatives and foreign weapons supplies are going to be necessary to finish the job.&lt;br /&gt;&lt;br /&gt;Moreover, as &lt;a href=&quot;http://www.usatoday.com/news/opinion/forum/2011-03-22-column22_ST_N.htm&quot;&gt;Alan Kuperman&lt;/a&gt; of the University of Texas and &lt;a href=&quot;http://www.chicagotribune.com/news/columnists/ct-oped-0403-chapman-20110403,0,4286197.column&quot;&gt;Steve Chapman&lt;/a&gt; of the Chicago Tribune have now shown, the claim that the United States had to act to prevent Libyan tyrant Muammar al-Qaddafi from slaughtering tens of thousands of innocent civilians in Benghazi does not stand up to even casual scrutiny.&lt;br /&gt;
&lt;br /&gt;
Although everyone recognizes that Qaddafi is a brutal ruler, his forces did not conduct deliberate, large-scale massacres in any of the cities he has recaptured, and his violent threats to wreak vengeance on Benghazi were directed at those who continued to resist his rule, not at innocent bystanders. There is no question that Qaddafi is a tyrant with few (if any) redemptive qualities, but the threat of a bloodbath that would &quot;[stain] the conscience of the world&quot; (as &lt;a href=&quot;http://www.huffingtonpost.com/2011/03/28/obama-libya-speech-_n_841311.html&quot;&gt;Obama put it&lt;/a&gt;) was slight.&lt;br /&gt;&lt;br /&gt;It remains to be seen whether this latest lurch into war will pay off or not, and whether the United States and its allies will have saved lives or squandered them. But the real question we should be asking is: &lt;b&gt;Why does this keep happening? Why do such different presidents keep doing such similar things? &lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
How can an electorate that seemed sick of war in 2008 watch passively while one war escalates in 2009 and another one gets launched in 2011? How can two political parties that are locked in a nasty partisan fight over every nickel in the government budget sit blithely by and watch a president start running up a &lt;b&gt;$100 million per day tab in this latest adventure? What is going on here?&lt;/b&gt;&lt;br /&gt;&lt;b&gt;Here are my Top 5 Reasons Why America Keeps Fighting Foolish Wars:&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;1. Because We Can&lt;/span&gt; &lt;/span&gt;&lt;/b&gt;&lt;br /&gt;The most obvious reason that the United States keeps doing these things is the fact that it has a remarkably powerful military, especially when facing a minor power like Libya. As I &lt;a href=&quot;http://www.foreignpolicy.com/posts/2011/03/21/what_intervention_in_libya_tells_us_about_the_neocon_liberal_alliance&quot;&gt;wrote a couple of weeks ago&lt;/a&gt;, when you&#39;ve got hundreds of planes, smart bombs, and cruise missiles, the whole world looks like a target set. So when some thorny problem arises somewhere in the world, it&#39;s hard to resist the temptation to &quot;do something!&quot;&lt;br /&gt;&lt;br /&gt;It is as if the president has big red button on his desk, and then his aides come in and say, &quot;&lt;i&gt;There&#39;s something really nasty happening to some unfortunate people, Mr. President, but if you push that button, you can stop it. It might cost a few hundred million dollars, maybe even a few billion by the time we are done, but we can always float a bit more debt. As long as you don&#39;t send in ground troops, the public will probably go along, at least for awhile and there&#39;s no danger that anybody will retaliate against us -- at least not anytime soon -- because the bad guys (who are really nasty, by the way) are also very weak. Our vital interests aren&#39;t at stake, sir, so you don&#39;t have to do anything. But if you don&#39;t push the button lots of innocent people will die. The choice is yours, Mr. President&lt;/i&gt;.&quot;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;It would take a very tough and resolute president -- or one with a clear set of national priorities and a deep understanding of the uncertainties of warfare -- to resist that siren song.&lt;/b&gt; (we don&#39;t have one)&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Of course, like his predecessors, Obama justifies his resort to force by invoking America&#39;s special place in the world. In the usual rhetoric of &quot;American exceptionalism,&quot; he couched it in terms of U.S. values, its commitment to freedom, etc.&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
But the truly exceptional thing about America today is not our values (a&lt;i&gt;nd certainly not our dazzling infrastructure, high educational standards, rising middle-class prosperity, et&lt;/i&gt;c.); it is the concentration of military power in the hands of the president and the eroding political constraints on its employment. (For an elegant skewering of the &quot;American exceptionalism&quot; argument, see Andrew Sullivan &lt;a href=&quot;http://andrewsullivan.theatlantic.com/the_daily_dish/2011/03/but-is-it-true.html&quot;&gt;here&lt;/a&gt;).&lt;br /&gt;&lt;br /&gt;&lt;b&gt;2. The U.S. Has No Serious Enemies&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;A second factor that permits the United States to keep waging these optional wars is the fact that the end of the Cold War left the United States in a remarkably safe position. There are no great powers in the Western hemisphere; we have no &quot;peer competitors&quot; anywhere (though China may become one sooner if we keep squandering our power foolishly); and there is no country anywhere that could entertain the idea of attacking America without inviting its own destruction.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;We do face a vexing terrorism problem, but that danger is probably exaggerated, is partly a reaction to our tendency to meddle in other countries, and is best managed in other ways&lt;/b&gt;.&lt;br /&gt;
&lt;br /&gt;
It&#39;s really quite ironic: Because the American homeland is safe from serious external dangers (which is a good thing), Americans have the luxury of going abroad &quot;&lt;i&gt;in search of monsters to destroy&lt;/i&gt;&quot; (which is not). If Americans were really worried about having to defend our own soil against a powerful adversary, we wouldn&#39;t be wasting time and money on feel-good projects like the Libyan crusade. But our exceptionally favorable geopolitical position allows us to do these things, even when they don&#39;t make a lot of strategic sense.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;3. The All-Volunteer Force&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;A third enabling factor behind our addiction to adventurism is the all-volunteer force. &lt;b&gt;By limiting military service only to those individuals who volunteer to do it, public opposition to wars of choice is more easily contained. &lt;/b&gt;Could Bush or Obama have kept the Iraq and Afghanistan wars going if most young Americans had to register for a draft, and if the sons and daughters of Wall Street bankers were being sent in harm&#39;s way because they got an unlucky number in the draft? I very much doubt it.&lt;br /&gt;&lt;br /&gt;By the way, I am not saying that the AVF is a bad idea that should be chucked, as there are a number of good arguments in its favor. Nonetheless, the AVF is one of those features of the contemporary U.S. national security order that makes the frequent resort to force politically feasible.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;4. It&#39;s the Establishment, Stupid&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;A fourth reason we keep meddling all over the world is the fact that the foreign-policy establishment is hard-wired in favor of &quot;&lt;i&gt;doing something&lt;/i&gt;.&quot; &lt;b&gt;Foreign-policy thinking in Washington is dominated either by neoconservatives (who openly proclaim the need to export &quot;liberty&quot; and never met a war they didn&#39;t like) or by &quot;liberal interventionists&quot; who are just as enthusiastic about using military power to solve problems, provided they can engineer some sort of multilateral cover for it.&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Liberal interventionists sometimes concede that the United States can&#39;t solve every problem (at least not at the same time), but they still think that the United States is the &quot;&lt;i&gt;indispensable&lt;/i&gt;&quot; nation and they want us to solve as many of the world&#39;s problems as we possibly can.&lt;br /&gt;&lt;br /&gt;These worldviews are developed, promulgated, and defended by a network of think tanks, committees, public policy schools, and government agencies that don&#39;t always agree on what should be done (or which problems deserve most priority) but that are all committed to using U.S. power a lot.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;In short, our foreign policy is shaped by a bipartisan class of foreign policy do-gooders who spend years out of power maneuvering to get in, and spend their time in office trying to advance whatever their own pet project(s) might be. Having scratched and clawed to get themselves on the inside, the people who run our foreign policy are not likely to counsel restraint, or to suggest that the United States and the rest of the world might be better off if Washington did a bit less. After all, what&#39;s the point of being a big shot in Washington if you can&#39;t use all that power to try to mold the world to your liking?&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;Compared with most Americans, &lt;b&gt;this is a wealthy, privileged, highly educated group of people and most of them are personally insulated from the consequences of the policies they advocate&lt;/b&gt; (i.e., with a few exceptions, their kids don&#39;t serve in the military -- see No. 3). Advocates of intervention are unlikely to suffer severe financial reverses or face long-term career penalties if some foreign war goes badly; they&#39;ll just go back to the same think-tank sinecures when their term of service is over.&lt;br /&gt;&lt;br /&gt;By the way, lurking underneath the Establishment consensus on foreign-policy activism is the most successful Jedi mind trick that the American right ever pulled. &lt;b&gt;Since the mid-1960s, American conservatism has waged a relentless and successful campaign to convince U.S. voters that it is wasteful, foolish, and stupid to pay taxes to support domestic programs here at home, but it is our patriotic duty to pay taxes to support a military establishment that costs more than all other militaries put together and that is used not to defend American soil but to fight wars mostly on behalf of other people.&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
In other words, &lt;b&gt;Americans became convinced that it was wrong to spend tax revenues on things that would help their fellow citizens (like good schools, health care, roads, and bridges, high-speed rail, etc.), but it was perfectly OK to tax Americans (though of course not the richest Americans) and spend the money on foreign wars&lt;/b&gt;.&lt;br /&gt;
&lt;br /&gt;
And we bought it. Moreover, there doesn&#39;t seem to be an effective mechanism to force the president to actually face and confront the trade-offs between the money he spends on optional wars and the domestic programs that eventually have to be cut back home. Which brings me to No. 5.&lt;br /&gt;&lt;b&gt;&lt;br /&gt;5. Congress Has Checked Out&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;&lt;b&gt;The authority to declare war is given to Congress, not the president, but that authority has been steadily usurped ever since World War II.&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Although the Constitution could not be clearer on this point, modern presidents clearly feel no constraints about ordering U.S. forces to attack other countries, or even to fully inform Congress as to what we might be doing in secret.&lt;br /&gt;
&lt;br /&gt;
In practice, therefore, the vaunted system of &quot;checks and balances&quot; supposedly enshrined in our Constitution simply doesn&#39;t operate anymore, which means that the use of America&#39;s military power has been left solely to the presidents and a handful of ambitious advisors (see No. 4 above). This is not to say that public opinion doesn&#39;t figure into their calculations (i.e., they&#39;ve got pollsters and political advisors too), but it is hardly a binding constraint.&lt;br /&gt;&lt;br /&gt;I&#39;ve no doubt that one could add more items to this list (e.g., the passive press, the military-industrial complex, etc.), but the items already noted go a long way to explaining why the supposedly peace-loving United States keeps finding itself in all these small but draining wars.&lt;br /&gt;&lt;br /&gt;Back in the 2008 campaign, Barack Obama said that his favorite movie was The Godfather. And if I recall correctly, he said his second favorite movie was The Godfather, Part II. But his presidency is starting to play out like Part III of that famed trilogy, where Michael Corleone rails against the fates that have foiled his attempt to make the Corleone family legit.&lt;br /&gt;&lt;br /&gt;I can just hear Obama saying it: &quot;&lt;i&gt;Just when I thought I was out … they pull me back in&lt;/i&gt;.&quot; Precisely.&lt;br /&gt;&lt;br /&gt;Registration may be required to access.&lt;br /&gt;Source:&lt;br /&gt;&lt;a href=&quot;http://www.foreignpolicy.com/articles/2011/04/04/is_america_addicted_to_war?page=full&quot;&gt;http://www.foreignpolicy.com/articles/2011/04/04/is_america_addicted_to_war?page=full&lt;/a&gt;&lt;br /&gt;________________________&lt;/div&gt;
</description><link>http://news2u.blogspot.com/2013_09_01_archive.html#2622666158980465612</link><author>noreply@blogger.com (Unknown)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5604605.post-5529999138877577399</guid><pubDate>Wed, 28 Aug 2013 02:03:00 +0000</pubDate><atom:updated>2013-08-27T21:04:31.407-05:00</atom:updated><title>Internet giants Google, Yahoo!, Microsoft and Facebook, among others, were paid millions of dollars by NSA to cover compliance costs associated with implementing the agency&#39;s vaunted &quot;Prism&quot; spy program - even after a federal court ruled the spying unconstitutional.</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;span style=&quot;font-size: x-large;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Google, Facebook, others accepted millions from NSA to turn over spy data on its users&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;by J.D. Heyes&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Natural News&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;August 27, 2013&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;[emphasis added] &lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;background-color: white; color: black; display: inline ! important; float: none; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;As bad as it is that the National Security Agency has been caught red-handed spying wholesale on American citizens&#39; private electronic communications, it is even worse knowing that American taxpayers paid for the &quot;privilege&quot; of having their Fourth Amendment rights shredded.&lt;/span&gt;&lt;br style=&quot;background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;br style=&quot;background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;span style=&quot;background-color: white; color: black; display: inline ! important; float: none; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;According to Britain&#39;s&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;i style=&quot;background-color: white; color: black; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;Guardian&lt;/i&gt;&lt;span style=&quot;background-color: white; color: black; display: inline ! important; float: none; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;, the very newspaper that broke the NSA spy scandal and whose reporter, Glenn Greenwald, should be awarded multiple Pulitzers, Internet giants&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;i style=&quot;background-color: white; color: black; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;Google&lt;/i&gt;&lt;span style=&quot;background-color: white; color: black; display: inline ! important; float: none; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;,&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;i style=&quot;background-color: white; color: black; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;Yahoo!&lt;/i&gt;&lt;span style=&quot;background-color: white; color: black; display: inline ! important; float: none; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;,&lt;/span&gt;&lt;i style=&quot;background-color: white; color: black; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;Microsoft&lt;/i&gt;&lt;span style=&quot;background-color: white; color: black; display: inline ! important; float: none; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;and&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;i style=&quot;background-color: white; color: black; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;Facebook&lt;/i&gt;&lt;/b&gt;&lt;span style=&quot;background-color: white; color: black; display: inline ! important; float: none; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;&lt;b&gt;, among others, were paid millions of dollars by NSA&lt;/b&gt; to cover compliance costs associated with implementing the agency&#39;s vaunted &quot;Prism&quot; spy program - even&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;i style=&quot;background-color: white; color: black; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;after&lt;/i&gt;&lt;span style=&quot;background-color: white; color: black; display: inline ! important; float: none; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;a federal court ruled the spying&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;i style=&quot;background-color: white; color: black; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;unconstitutional&lt;/i&gt;&lt;span style=&quot;background-color: white; color: black; display: inline ! important; float: none; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;.&lt;/span&gt;&lt;br style=&quot;background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;br style=&quot;background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;b style=&quot;background-color: white; color: black; font-style: normal; font-variant: normal; letter-spacing: normal; line-height: 20px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;From taxpayers, to the NSA, to the tech companies...&lt;/b&gt;&lt;br style=&quot;background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;br style=&quot;background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;span style=&quot;background-color: white; color: black; display: inline ! important; float: none; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;From the&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;i style=&quot;background-color: white; color: black; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;Guardian&lt;/i&gt;&lt;span style=&quot;background-color: white; color: black; display: inline ! important; float: none; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;i style=&quot;background-color: white; color: black; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;The technology companies...incurred the costs to meet new certification demands in the wake of the ruling from the Foreign Intelligence Surveillance (FISA) court. The October 2011 judgment, which was declassified [August 21] by the Obama administration, found that the NSA&#39;s inability to separate purely domestic communications from foreign traffic violated the Fourth Amendment.&lt;/i&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/blockquote&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br style=&quot;background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;span style=&quot;background-color: white; color: black; display: inline ! important; float: none; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;The court&#39;s ruling did not directly take aim at the Prism program, the paper said. But documents provided to&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;i style=&quot;background-color: white; color: black; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;The Guardian&lt;/i&gt;&lt;span style=&quot;background-color: white; color: black; display: inline ! important; float: none; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;by former NSA contractor-turned-whistleblower Edward Snowden, now in Russia after being granted temporary political asylum, detail problems created for the agency, as well as efforts aimed at making operations compliant with the law and the Constitution.&lt;/span&gt;&lt;br style=&quot;background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;br style=&quot;background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;span style=&quot;background-color: white; color: black; display: inline ! important; float: none; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;&quot;&lt;i&gt;The material provides the first evidence of a financial relationship between the tech companies and the&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/i&gt;&lt;/span&gt;&lt;i&gt;&lt;a href=&quot;http://www.naturalnews.com/NSA.html&quot; style=&quot;background-color: white; color: #3366cc; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; text-align: start; text-decoration: none; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;NSA&lt;/a&gt;&lt;/i&gt;&lt;span style=&quot;background-color: white; color: black; display: inline ! important; float: none; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;,&quot; the paper reported.&lt;/span&gt;&lt;br style=&quot;background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;br style=&quot;background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;span style=&quot;background-color: white; color: black; display: inline ! important; float: none; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;The role of the FISA court is to sign off on annual &quot;&lt;i&gt;certifications&lt;/i&gt;&quot; that provide the framework with which the NSA conducts its surveillance operations. The court doesn&#39;t actually oversee the agency as it conducts those operations, however.&lt;/span&gt;&lt;br style=&quot;background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;br style=&quot;background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;span style=&quot;background-color: white; color: black; display: inline ! important; float: none; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;In the aftermath of the court&#39;s finding that NSA operations had been illegally targeting Americans, the certifications were only signed on a temporary basis while the agency supposedly worked on ways to solve processes that were deemed unconstitutional.&lt;/span&gt;&lt;br style=&quot;background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;br style=&quot;background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;span style=&quot;background-color: white; color: black; display: inline ! important; float: none; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;Per the&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;i style=&quot;background-color: white; color: black; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;Guardian&lt;/i&gt;&lt;span style=&quot;background-color: white; color: black; display: inline ! important; float: none; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;i style=&quot;background-color: white; color: black; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;An NSA newsletter entry, marked top secret and dated December 2012, discloses the huge costs this entailed. &quot;Last year&#39;s problems resulted in multiple extensions to the certifications&#39; expiration dates which&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.naturalnews.com/cost.html&quot; style=&quot;color: #3366cc; text-decoration: none;&quot;&gt;cost&lt;/a&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;millions of dollars for Prism providers to implement each successive extension - costs covered by Special Source Operations,&quot; it says.&lt;/i&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/blockquote&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br style=&quot;background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;span style=&quot;background-color: white; color: black; display: inline ! important; float: none; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;During his interview with Guardian reporter Greenwald, Snowden described the &lt;b&gt;NSA&#39;s&lt;span class=&quot;Apple-converted-space&quot;&gt;&lt;i&gt; Special Source Operations &lt;/i&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;b&gt;&lt;span style=&quot;background-color: white; color: black; display: inline ! important; float: none; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&lt;/span&gt;as the agency&#39;s &quot;crown jewel,&quot; which handles all surveillance programs like Prism which must rely on &quot;corporate partnerships&quot; with telecoms and Internet companies in order to data mine users&#39; communic&lt;/b&gt;&lt;/span&gt;&lt;b&gt;&lt;span style=&quot;background-color: white; color: black; display: inline ! important; float: none; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;&lt;b&gt;ations.&lt;/b&gt;&lt;/span&gt;&lt;span style=&quot;background-color: white; color: black; display: inline ! important; float: none; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;&lt;/span&gt;&lt;/b&gt;&lt;/b&gt;&lt;br style=&quot;background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;br style=&quot;background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;b&gt;&lt;span style=&quot;background-color: white; color: black; display: inline ! important; float: none; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;Discovering that taxpayers&#39; money was used to cover compliance costs for telecoms raises new questions about the relationship between such firms and the NSA, as well as the veracity of claims by the telecoms that user privacy is paramount and well-protected.&lt;/span&gt;&lt;/b&gt;&lt;br style=&quot;background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;br style=&quot;background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;span style=&quot;background-color: white; color: black; display: inline ! important; float: none; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;An earlier, undated newsletter said all Prism providers were given new certifications within days of the FISA court&#39;s ruling. &quot;&lt;i&gt;All Prism providers, except Yahoo and Google, were successfully transitioned to the new certifications. We expect Yahoo and Google to complete transitioning by Friday 6 October,&lt;/i&gt;&quot; it said.&lt;/span&gt;&lt;br style=&quot;background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;br style=&quot;background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;b style=&quot;background-color: white; color: black; font-style: normal; font-variant: normal; letter-spacing: normal; line-height: 20px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;Thousands of times per year&lt;/b&gt;&lt;br style=&quot;background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;br style=&quot;background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;b&gt;&lt;span style=&quot;background-color: white; color: black; display: inline ! important; float: none; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;&lt;b&gt;Most of the companies involved did not even have the courage to respond to&lt;/b&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&lt;b&gt; The Guardian&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span style=&quot;background-color: white; color: black; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;&lt;/span&gt;&lt;/b&gt;&lt;/b&gt;&lt;span style=&quot;background-color: white; color: black; display: inline ! important; float: none; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;&lt;b&gt;&#39;s questions about taking taxpayer funding to allow them, in turn, to be spied upon. &lt;/b&gt;However, one of them, a spokesperson from&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;i style=&quot;background-color: white; color: black; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;Yahoo!&lt;/i&gt;&lt;span style=&quot;background-color: white; color: black; display: inline ! important; float: none; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;, actually tried to justify its illegal and unconstitutional actions by&lt;/span&gt;&lt;i style=&quot;background-color: white; color: black; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;citing federal law&lt;/i&gt;&lt;span style=&quot;background-color: white; color: black; display: inline ! important; float: none; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;.&lt;/span&gt;&lt;br style=&quot;background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;i&gt;&lt;br style=&quot;background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;/i&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;background-color: white; color: black; display: inline ! important; float: none; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;&lt;i&gt;&quot;Federal law requires the U.S. government to reimburse providers for costs incurred to respond to compulsory legal process imposed by the government. We have requested reimbursement consistent with this law,&quot; &lt;/i&gt;said the Yahoo spokesperson, who was not named.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/blockquote&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br style=&quot;background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;span style=&quot;background-color: white; color: black; display: inline ! important; float: none; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;Of course.&lt;/span&gt;&lt;br style=&quot;background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;br style=&quot;background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;span style=&quot;background-color: white; color: black; display: inline ! important; float: none; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;As to the NSA&#39;s actions, a recent&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://articles.washingtonpost.com/2013-08-15/world/41431831_1_washington-post-national-security-agency-documents&quot; style=&quot;background-color: white; color: #3366cc; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; text-align: start; text-decoration: none; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; target=&quot;_blank&quot;&gt;Washington Post story&lt;/a&gt;&lt;span style=&quot;background-color: white; color: black; display: inline ! important; float: none; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;revealed that the agency violated your rights &lt;i&gt;&quot;thousands of times each year since Congress granted the agency broad new powers in 2008.&quot;&lt;/i&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;b&gt;Feel Violated?&amp;nbsp; You Should!&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br style=&quot;background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;span style=&quot;background-color: white; color: black; font-style: normal; font-variant: normal; letter-spacing: normal; line-height: 20px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;Article Sources:&lt;/span&gt;&lt;br style=&quot;background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;a href=&quot;http://www.theguardian.com/world/2013/aug/23/nsa-prism-costs-tech-companies-paid&quot; style=&quot;background-color: white; color: #3366cc; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; text-align: start; text-decoration: none; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; target=&quot;_blank&quot;&gt;http://www.theguardian.co&lt;/a&gt;&lt;br style=&quot;background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;a href=&quot;http://articles.washingtonpost.com/2013-08-15/world/41431831_1_washington-post-national-security-agency-documents&quot; style=&quot;background-color: white; color: #3366cc; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; text-align: start; text-decoration: none; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; target=&quot;_blank&quot;&gt;http://articles.washingtonpost.com&lt;/a&gt;&lt;br style=&quot;background-color: white; color: black; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;a href=&quot;http://www.naturalnews.com/040906_nsa_spying_blackmail_supreme_court.html&quot; style=&quot;background-color: white; color: #3366cc; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; text-align: start; text-decoration: none; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; target=&quot;_blank&quot;&gt;http://www.naturalnews.com&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Source:&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;a href=&quot;http://www.naturalnews.com/041795_technology_companies_NSA_spy_data.html&quot;&gt;http://www.naturalnews.com/041795_technology_companies_NSA_spy_data.html&lt;/a&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;____________ &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
</description><link>http://news2u.blogspot.com/2013_08_01_archive.html#5529999138877577399</link><author>noreply@blogger.com (Unknown)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5604605.post-6590295395990881249</guid><pubDate>Fri, 23 Aug 2013 14:44:00 +0000</pubDate><atom:updated>2013-08-27T21:18:59.688-05:00</atom:updated><title>NSA leaker Edward Snowden accused the British government on Friday of leaking sensitive material to a newspaper he&#39;d never worked with, the Independent, and attributing the material to him.</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;span style=&quot;font-size: x-large;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;UK government now leaking documents about itself&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;The NSA whistleblower says:&lt;i&gt; &#39;I have never spoken with, worked with, or provided any journalistic materials to the Independent&#39;&lt;/i&gt;&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;By Glenn Greenwald&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;The Guardian&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;August 23, 2013&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;background-color: white; background-repeat: no-repeat no-repeat; border-collapse: collapse; color: #333333; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 18px; margin: 0px 0px 13px; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;The Independent this morning&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.independent.co.uk/news/uk/politics/exclusive-uks-secret-mideast-internet-surveillance-base-is-revealed-in-edward-snowden-leaks-8781082.html&quot; style=&quot;background-repeat: no-repeat no-repeat; border-collapse: collapse; color: #005689; margin: 0px; padding: 0px; text-decoration: none;&quot;&gt;published an article&lt;/a&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;- which it repeatedly claims comes from &quot;documents obtained from the&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.theguardian.com/world/nsa&quot; style=&quot;background-repeat: no-repeat no-repeat; border-collapse: collapse; color: #005689; margin: 0px; padding: 0px; text-decoration: none;&quot; title=&quot;More from guardian.co.uk on NSA&quot;&gt;NSA&lt;/a&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;by Edward Snowden&quot; - disclosing that &quot;Britain runs a secret internet-monitoring station in the Middle East to intercept and process vast quantities of emails, telephone calls and web traffic on behalf of Western intelligence agencies.&quot; This is the first time the Independent has published any revelations purportedly from the NSA documents, and it&#39;s the type of disclosure which journalists working directly with NSA whistleblower Edward Snowden have thus far avoided.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; background-repeat: no-repeat no-repeat; border-collapse: collapse; color: #333333; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 18px; margin: 0px 0px 13px; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;That leads to the obvious question: who is the source for this disclosure? Snowden this morning said he wants it to be clear that he was not the source for the Independent, stating:&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;blockquote class=&quot;quoted&quot; style=&quot;background-color: white; background-image: url(&amp;quot;http://static.guim.co.uk/static/f0e699ab266c47c544b8716a8f4032bda9f58fa9/common/styles/images/quote_red.gif&amp;quot;); background-position: 0% 0%; background-repeat: no-repeat no-repeat; border-collapse: collapse; color: #666666; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 18px; margin: 0px 40px 10px 0px; padding: 0px 0px 0px 45px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;div style=&quot;background-repeat: no-repeat no-repeat; border-collapse: collapse; margin: 0px 0px 13px; padding: 0px;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;I have never spoken with, worked with, or provided any journalistic materials to the Independent. The journalists I have worked with have, at my request, been judicious and careful in ensuring that the only things disclosed are what the public should know but that does not place any person in danger. People at all levels of society up to and including the President of the United States have recognized the contribution of these careful disclosures to a necessary public debate, and we are proud of this record.&lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;background-repeat: no-repeat no-repeat; border-collapse: collapse; margin: 0px 0px 13px; padding: 0px;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&quot;It appears that the UK government is now seeking to create an appearance that the Guardian and Washington Post&#39;s disclosures are harmful, and they are doing so by intentionally leaking harmful information to The Independent and attributing it to others. The UK government should explain the reasoning behind this decision to disclose information that, were it released by a private citizen, they would argue is a criminal act.&quot;&lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;/blockquote&gt;
&lt;div style=&quot;background-color: white; background-repeat: no-repeat no-repeat; border-collapse: collapse; color: #333333; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 18px; margin: 0px 0px 13px; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;In other words: right as there is a&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.theguardian.com/world/2013/aug/21/david-miranda-law-detention-heathrow&quot; style=&quot;background-repeat: no-repeat no-repeat; border-collapse: collapse; color: #005689; margin: 0px; padding: 0px; text-decoration: none;&quot;&gt;major scandal over the UK&#39;s abusive and lawless exploitation of its Terrorism Act&lt;/a&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;- with&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.ibtimes.co.uk/articles/500591/20130821/miranda-glen-greenwald-britons-nsa-snowden.htm&quot; style=&quot;background-repeat: no-repeat no-repeat; border-collapse: collapse; color: #005689; margin: 0px; padding: 0px; text-decoration: none;&quot;&gt;public opinion against the use of the Terrorism law to detain David Miranda&lt;/a&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;- and right as the UK government is trying to tell a court that there are serious dangers to the public safety from these documents, there suddenly appears exactly the type of disclosure the UK government wants but that has never happened before. That is why Snowden is making clear: despite the Independent&#39;s attempt to make it appears that it is so, he is not their source for that disclosure. Who, then, is?&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; background-repeat: no-repeat no-repeat; border-collapse: collapse; color: #333333; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 18px; margin: 0px 0px 13px; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;The US government itself has&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.salon.com/2012/06/07/probing_obamas_secrecy_games/&quot; style=&quot;background-repeat: no-repeat no-repeat; border-collapse: collapse; color: #005689; margin: 0px; padding: 0px; text-decoration: none;&quot;&gt;constantly used this tactic&lt;/a&gt;: aggressively targeting those who disclose embarrassing or incriminating information about the government in the name of protecting the sanctity of classified information, while simultaneously leaking classified information prolifically when doing so advances their political interests.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; background-repeat: no-repeat no-repeat; border-collapse: collapse; color: #333333; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 18px; margin: 0px 0px 13px; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;One other matter about the Independent article: it strongly suggests that there is some agreement in place to restrict the Guardian&#39;s ongoing reporting about the NSA documents. Speaking for myself, let me make one thing clear: I&#39;m not aware of, nor subject to, any agreement that imposes any limitations of any kind on the reporting that I am doing on these documents. I would never agree to any such limitations. As I&#39;ve made repeatedly clear, bullying tactics of the kind we saw this week will not deter my reporting or the reporting of those I&#39;m working with in any way. I&#39;m working hard on numerous new and significant NSA stories and intend to publish them the moment they are ready.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;h2 style=&quot;background-color: white; background-position: 0% 100%; background-repeat: no-repeat no-repeat; border-bottom: 1px dotted rgb(153, 153, 153); border-collapse: collapse; border-color: rgb(153, 153, 153); border-top: 1px dotted rgb(153, 153, 153); clear: left; color: #333333; font-style: normal; font-variant: normal; font-weight: bold; letter-spacing: normal; line-height: 17px; margin: 20px 0px 10px; padding: 2px 0px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Related question&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;background-color: white; background-repeat: no-repeat no-repeat; border-collapse: collapse; color: #333333; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 18px; margin: 0px 0px 13px; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;For those in the media and elsewhere arguing that the possession and transport of classified information is a crime: does that mean you believe that not only Daniel Ellsberg committed a felony, but also the New York Times reporters and editors did when they received, possessed, copied, transported and published the thousands of pages of top-secret documents known as the Pentagon Papers?&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; background-repeat: no-repeat no-repeat; border-collapse: collapse; color: #333333; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 18px; margin: 0px 0px 13px; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Do you also believe the Washington Post committed felonies when receiving and then publishing top secret information that the Bush administration was maintaining a network for CIA black sites around the world, or when the New York Times revealed in 2005 the top secret program whereby the NSA had created a warrantlesss eavesdropping program aimed at US citizens?&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; background-repeat: no-repeat no-repeat; border-collapse: collapse; color: #333333; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 18px; margin: 0px 0px 13px; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Or is this some newly created standard of criminality that applies only to our NSA reporting? Do media figures who are advocating that possessing or transmitting classified information is a crime really not comprehend the precedent they are setting for investigative journalism?&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;h2 style=&quot;background-color: white; background-position: 0% 100%; background-repeat: no-repeat no-repeat; border-bottom: 1px dotted rgb(153, 153, 153); border-collapse: collapse; border-color: rgb(153, 153, 153); border-top: 1px dotted rgb(153, 153, 153); clear: left; color: #333333; font-style: normal; font-variant: normal; font-weight: bold; letter-spacing: normal; line-height: 17px; margin: 20px 0px 10px; padding: 2px 0px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;UPDATE&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;background-color: white; background-repeat: no-repeat no-repeat; border-collapse: collapse; color: #333333; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 18px; margin: 0px 0px 13px; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;The Independent&#39;s Oliver Wright just&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;https://twitter.com/oliver_wright/status/370883254989365248&quot; style=&quot;background-repeat: no-repeat no-repeat; border-collapse: collapse; color: #005689; margin: 0px; padding: 0px; text-decoration: none;&quot;&gt;tweeted the following&lt;/a&gt;:&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;blockquote style=&quot;background-color: white; background-repeat: no-repeat no-repeat; border-collapse: collapse; color: #666666; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 18px; margin: 0px 40px 10px; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;div style=&quot;background-repeat: no-repeat no-repeat; border-collapse: collapse; margin: 0px 0px 13px; padding: 0px;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&quot;For the record: The Independent was not leaked or &#39;duped&#39; into publishing today&#39;s front page story by the Government.&quot;&lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;/blockquote&gt;
&lt;div style=&quot;background-color: white; background-repeat: no-repeat no-repeat; border-collapse: collapse; color: #333333; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 18px; margin: 0px 0px 13px; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Leaving aside the fact that the Independent article quotes an anonymous &quot;senior Whitehall source&quot;, nobody said they were &quot;duped&quot; into publishing anything. The question is: who provided them this document or the information in it? It clearly did not come from Snowden or any of the journalists with whom he has directly worked. The Independent provided no source information whatsoever for their rather significant disclosure of top secret information. Did they see any such documents, and if so, who, generally, provided it to them? I don&#39;t mean, obviously, that they should identify their specific source, but at least some information about their basis for these claims, given how significant they are, would be warranted. One would think that they would not have published something like this without either seeing the documents or getting confirmation from someone who has: the class of people who qualify is very small, and includes, most prominently and obviously, the UK government itself.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; background-repeat: no-repeat no-repeat; border-collapse: collapse; color: #333333; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 18px; margin: 0px 0px 13px; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: black;&quot;&gt;Source:&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; background-repeat: no-repeat no-repeat; border-collapse: collapse; color: #333333; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 18px; margin: 0px 0px 13px; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;a href=&quot;http://www.theguardian.com/commentisfree/2013/aug/23/uk-government-independent-military-base&quot;&gt;http://www.theguardian.com/commentisfree/2013/aug/23/uk-government-independent-military-base&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; background-repeat: no-repeat no-repeat; border-collapse: collapse; color: #333333; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 18px; margin: 0px 0px 13px; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: black;&quot;&gt;_________________________&amp;nbsp;&lt;/span&gt;&lt;/b&gt; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</description><link>http://news2u.blogspot.com/2013_08_01_archive.html#6590295395990881249</link><author>noreply@blogger.com (Unknown)</author></item></channel></rss>