Showing posts with label West. Show all posts
Showing posts with label West. Show all posts

Saturday, April 5, 2014

Fukushima: Radioactive Cancer Causing “Hot Particles” Spread all Over Japan and North America’s West Coast

At The Daily News Source, the privacy of our visitors is of extreme importance to us (See this article to learn more about Privacy Policies.). This privacy policy document outlines the types of personal information is received and collected by The Daily News Source and how it is used.


Log Files


Like many other Web sites, The Daily News Source makes use of log files. The information inside the log files includes internet protocol (IP) addresses, type of browser, Internet Service Provider (ISP), date/time stamp, referring/exit pages, and number of clicks to analyze trends, administer the site, track user"s movement around the site, and gather demographic information. IP addresses, and other such information are not linked to any information that is personally identifiable.


Cookies and Web Beacons


The Daily News Source does use cookies to store information about visitors preferences, record user-specific information on which pages the user access or visit, customize Web page content based on visitors browser type or other information that the visitor sends via their browser.


DoubleClick DART Cookie


  • Google, as a third party vendor, uses cookies to serve ads on The Daily News Source.

  • Google"s use of the DART cookie enables it to serve ads to users based on their visit to The Daily News Source and other sites on the Internet.

  • Users may opt out of the use of the DART cookie by visiting the Google ad and content network privacy policy at the following URL - http://www.google.com/privacy_ads.html.

These third-party ad servers or ad networks use technology to the advertisements and links that appear on The Daily News Source send directly to your browsers. They automatically receive your IP address when this occurs. Other technologies ( such as cookies, JavaScript, or Web Beacons ) may also be used by the third-party ad networks to measure the effectiveness of their advertisements and / or to personalize the advertising content that you see.


The Daily News Source has no access to or control over these cookies that are used by third-party advertisers.


You should consult the respective privacy policies of these third-party ad servers for more detailed information on their practices as well as for instructions about how to opt-out of certain practices. The Daily News Source"s privacy policy does not apply to, and we cannot control the activities of, such other advertisers or web sites.


If you wish to disable cookies, you may do so through your individual browser options. More detailed information about cookie management with specific web browsers can be found at the browser"s respective websites.



Fukushima: Radioactive Cancer Causing “Hot Particles” Spread all Over Japan and North America’s West Coast

Saturday, March 29, 2014

"Pro-Life" West Virginia Gov. Tomblin Vetoes 20-Week Abortion Restriction

At The Daily News Source, the privacy of our visitors is of extreme importance to us (See this article to learn more about Privacy Policies.). This privacy policy document outlines the types of personal information is received and collected by The Daily News Source and how it is used.


Log Files


Like many other Web sites, The Daily News Source makes use of log files. The information inside the log files includes internet protocol (IP) addresses, type of browser, Internet Service Provider (ISP), date/time stamp, referring/exit pages, and number of clicks to analyze trends, administer the site, track user"s movement around the site, and gather demographic information. IP addresses, and other such information are not linked to any information that is personally identifiable.


Cookies and Web Beacons


The Daily News Source does use cookies to store information about visitors preferences, record user-specific information on which pages the user access or visit, customize Web page content based on visitors browser type or other information that the visitor sends via their browser.


DoubleClick DART Cookie


  • Google, as a third party vendor, uses cookies to serve ads on The Daily News Source.

  • Google"s use of the DART cookie enables it to serve ads to users based on their visit to The Daily News Source and other sites on the Internet.

  • Users may opt out of the use of the DART cookie by visiting the Google ad and content network privacy policy at the following URL - http://www.google.com/privacy_ads.html.

These third-party ad servers or ad networks use technology to the advertisements and links that appear on The Daily News Source send directly to your browsers. They automatically receive your IP address when this occurs. Other technologies ( such as cookies, JavaScript, or Web Beacons ) may also be used by the third-party ad networks to measure the effectiveness of their advertisements and / or to personalize the advertising content that you see.


The Daily News Source has no access to or control over these cookies that are used by third-party advertisers.


You should consult the respective privacy policies of these third-party ad servers for more detailed information on their practices as well as for instructions about how to opt-out of certain practices. The Daily News Source"s privacy policy does not apply to, and we cannot control the activities of, such other advertisers or web sites.


If you wish to disable cookies, you may do so through your individual browser options. More detailed information about cookie management with specific web browsers can be found at the browser"s respective websites.



"Pro-Life" West Virginia Gov. Tomblin Vetoes 20-Week Abortion Restriction

Monday, March 24, 2014

Russia not clinging to G8 if West does not want it – Russian FM

At Alternate Viewpoint, the privacy of our visitors is of extreme importance to us (See this article to learn more about Privacy Policies.). This privacy policy document outlines the types of personal information is received and collected by Alternate Viewpoint and how it is used.


Log Files


Like many other Web sites, Alternate Viewpoint makes use of log files. The information inside the log files includes internet protocol (IP) addresses, type of browser, Internet Service Provider (ISP), date/time stamp, referring/exit pages, and number of clicks to analyze trends, administer the site, track user"s movement around the site, and gather demographic information. IP addresses, and other such information are not linked to any information that is personally identifiable.


Cookies and Web Beacons


Alternate Viewpoint does use cookies to store information about visitors preferences, record user-specific information on which pages the user access or visit, customize Web page content based on visitors browser type or other information that the visitor sends via their browser.


DoubleClick DART Cookie


  • Google, as a third party vendor, uses cookies to serve ads on Alternate Viewpoint.

  • Google"s use of the DART cookie enables it to serve ads to users based on their visit to Alternate Viewpoint and other sites on the Internet.

  • Users may opt out of the use of the DART cookie by visiting the Google ad and content network privacy policy at the following URL - http://www.google.com/privacy_ads.html.

These third-party ad servers or ad networks use technology to the advertisements and links that appear on Alternate Viewpoint send directly to your browsers. They automatically receive your IP address when this occurs. Other technologies ( such as cookies, JavaScript, or Web Beacons ) may also be used by the third-party ad networks to measure the effectiveness of their advertisements and / or to personalize the advertising content that you see.


Alternate Viewpoint has no access to or control over these cookies that are used by third-party advertisers.


You should consult the respective privacy policies of these third-party ad servers for more detailed information on their practices as well as for instructions about how to opt-out of certain practices. Alternate Viewpoint"s privacy policy does not apply to, and we cannot control the activities of, such other advertisers or web sites.


If you wish to disable cookies, you may do so through your individual browser options. More detailed information about cookie management with specific web browsers can be found at the browser"s respective websites.



Russia not clinging to G8 if West does not want it – Russian FM

Tuesday, March 18, 2014

West furious as Crimea accepted into Russia

At Not Just The News, the privacy of our visitors is of extreme importance to us (See this article to learn more about Privacy Policies.). This privacy policy document outlines the types of personal information is received and collected by Not Just The News and how it is used.


Log Files


Like many other Web sites, Not Just The News makes use of log files. The information inside the log files includes internet protocol (IP) addresses, type of browser, Internet Service Provider (ISP), date/time stamp, referring/exit pages, and number of clicks to analyze trends, administer the site, track user"s movement around the site, and gather demographic information. IP addresses, and other such information are not linked to any information that is personally identifiable.


Cookies and Web Beacons


Not Just The News does use cookies to store information about visitors preferences, record user-specific information on which pages the user access or visit, customize Web page content based on visitors browser type or other information that the visitor sends via their browser.


DoubleClick DART Cookie


  • Google, as a third party vendor, uses cookies to serve ads on Not Just The News.

  • Google"s use of the DART cookie enables it to serve ads to users based on their visit to Not Just The News and other sites on the Internet.

  • Users may opt out of the use of the DART cookie by visiting the Google ad and content network privacy policy at the following URL - http://www.google.com/privacy_ads.html.

These third-party ad servers or ad networks use technology to the advertisements and links that appear on Not Just The News send directly to your browsers. They automatically receive your IP address when this occurs. Other technologies ( such as cookies, JavaScript, or Web Beacons ) may also be used by the third-party ad networks to measure the effectiveness of their advertisements and / or to personalize the advertising content that you see.


Not Just The News has no access to or control over these cookies that are used by third-party advertisers.


You should consult the respective privacy policies of these third-party ad servers for more detailed information on their practices as well as for instructions about how to opt-out of certain practices. Not Just The News"s privacy policy does not apply to, and we cannot control the activities of, such other advertisers or web sites.


If you wish to disable cookies, you may do so through your individual browser options. More detailed information about cookie management with specific web browsers can be found at the browser"s respective websites.



West furious as Crimea accepted into Russia

Monday, March 10, 2014

What Would the West Fight For?



In 1983, an idealistic student of political science at Columbia University in New York penned an article for the university magazine railing against the “war mentality” of America and “the relentless, often silent spread of militarism in the country”.


President Ronald Reagan was a hostage to the “twisted logic of the Cold War”, the student wrote, and was “playing into the Russians’ hands” rather than “shifting America off the dead-end track” and pursuing the proper goal of a “nuclear free world”.


A quarter of a century later, the author — Barack Obama — was elected to the White House. While due allowance should be made for the callow scribblings of any student, there have been striking echoes of Obama’s youthful suspicion of American power during his five years as president.


Last December, after Obama declared that the use of chemical weapons by Syria would be a “red line” for the United States, President Bashar al-Assad’s regime killed an estimated 1,400 people, many of them children, in a chemical weapons strike on Damascus.


Obama ruminated for weeks about how to respond. With aides briefing that any action had to be “just muscular enough not to get mocked” and both parties on Capitol Hill reluctant to authorise any action, Obama opted to do nothing.


He was outmanoeuvred by President Vladimir Putin of Russia, who had conjured up a peace plan in which Assad’s stockpile of chemical weapons would be traded for a US undertaking not to use force. Obama had shown that his own words about a “red line” meant nothing.


“America is not the world’s policeman,” he declared. “Terrible things happen across the globe and it is beyond our means to right every wrong.”


Obama’s “cool war” approach to the battle with al-Qaeda meant that he had already stepped up politically risk-free drone strikes, killing some terrorist suspects and driving others from the tribal areas of Pakistan. He directed US Navy Seals to dispatch Osama bin Laden.


In dealing with other powers, however, he has been hesitant. The Syria deal made him look passive. Privately, White House aides now admit that Assad may never hand over his entire chemical arsenal.


“Obama’s basically someone who doesn’t want to get dragged into foreign policy, wants to focus on domestic issues, doesn’t believe that force or pressure is an answer and wants to have others lead and then the US can slot in behind,” said Kurt Volker, a former American ambassador to Nato under President George W Bush.


Vali Nasr, a former senior State Department official under Obama, said: “Once you have multiple crises in which a particular perception of the US and its credibility and policy gains ground, it becomes established and those who want to challenge the US and international norms will become much more brazen and confident.”


Putin realised that he could act with relative impunity. Keen to prevent Ukraine signing a trade deal with the European Union late last year, he offered enough money to Viktor Yanukovych, the president of Ukraine, to persuade him to cast the agreement aside.


When Yanukovych responded with brutal repression to popular anger on the streets over the retreat from the EU — and then fled the country — Putin had his own plan ready. Russians flooded out of their bases in Crimea and occupied the pro-Russian region in southeast Ukraine.


The Russian leader moved quickly to take control of CrimeaThe Russian leader moved quickly to take control of Crimea The Obama administration was reluctant to characterise the Russian military push — a flagrant breach of Ukraine’s sovereignty and international law — as a hostile action.


Instead it chose to term it an “uncontested arrival”, the most startling US foreign policy euphemism since the “war on terror” was renamed an “overseas contingency operation”.


Although Obama has belatedly ratcheted up the US reaction, imposing sanctions and visa restrictions and promising Ukraine $ 1bn (£600m) in aid, Putin has shown no sign of changing course. By Friday, despite a 90-minute telephone call with Obama, he was making clear his determination to hold a referendum in Russian-majority Crimea and then to annex it.


In a telephone call on Saturday afternoon, David Cameron spoke to Obama about the crisis. A No 10 spokesman said: “Both the prime minister and the president firmly believe that the proposed referendum in Crimea would be illegal and that any attempt to legitimise it would result in further consequences for Russia.”


THE Obama administration’s calculation appears to have been that Ukraine would be best left to the EU. Some officials felt US involvement might provoke a return to Cold War tensions over a strategically important country.


The EU failed to deliver. Both Washington and Brussels were blindsided by Yanukovych’s renewed embrace of Russia and subsequent inability to keep control, just as they had been when Russians moved into Georgia in 2008 while Bush was still president.


David Cameron, in Libya, and President François Hollande, in Somalia and Mali, have shown they are prepared to commit forces even after the costly wars in Iraq and Afghanistan.


However, a YouGov poll for The Sunday Times today finds only minority support for any form of British response to events in Ukraine, from 11% for military action to 42% for economic sanctions.


Britain and the Europeans are constrained by financial ties to Russia, just as the United States fears that alienating Moscow could undermine talks over Syria and Iran.


A document inadvertently displayed in Downing Street last week by Hugh Powell, the deputy national security adviser, revealed the government’s belief that the “UK should not support for now, trade sanctions … or close London’s financial centre to Russians”.


Hollande has opted not to cancel France’s £1.1bn deal to supply Russia with two Mistral-class warships. Angela Merkel, the German chancellor who speaks Russian and telephoned Putin at least three times last week, knows that 35% of German oil and gas imports come from Russia and 6,000 German companies do business there.


No one — apart from the Ukrainians — feels the effects of Obama’s disengagement more acutely than Latvia, where almost a third of the population is ethnic Russian, Estonia, where Russians make up about 25%, Lithuania with about 6%, or Poland, with its memories of the 1939 Nazi and Soviet invasions.


Britain and the Europeans are constrained by financial ties to Russia, just as the United States fears that alienating Moscow could undermine talks over Syria and Iran.


A document inadvertently displayed in Downing Street last week by Hugh Powell, the deputy national security adviser, revealed the government’s belief that the “UK should not support for now, trade sanctions … or close London’s financial centre to Russians”.


Hollande has opted not to cancel France’s £1.1bn deal to supply Russia with two Mistral-class warships. Angela Merkel, the German chancellor who speaks Russian and telephoned Putin at least three times last week, knows that 35% of German oil and gas imports come from Russia and 6,000 German companies do business there.


No one — apart from the Ukrainians — feels the effects of Obama’s disengagement more acutely than Latvia, where almost a third of the population is ethnic Russian, Estonia, where Russians make up about 25%, Lithuania with about 6%, or Poland, with its memories of the 1939 Nazi invasion.


However, a Nato official said it was “important to note that a demand to invoke article 5 [the Nato treaty’s mutual defence clause] could be approved only by a consensus of all 28 member states”.


“The Kremlin respects strength and despises indecisiveness — they see compromise as weakness,” said a diplomat from another Baltic state concerned that the EU “needs a very long time to come up with a common position”.


Nasr said the EU’s hesitancy reflected that of the United States. “Strong American leadership is more compelling to allies, just as it is to adversaries,” he said. “So if the assessment is that the US is wavering it doesn’t really encourage others to rally.”


Obama has declared that “the tide of war is receding”and said his administration would “pivot” away from Europe and the Middle East towards Asia.


At a conference last year General John Kelly, head of US Southern Command, said: “Pivoting to the Pacific — there’s probably a threat out there but I’ll be damned if I can find it right now.” He also expressed concern about plans to reduce troops to levels not seen since 1940, despite continuing conflicts with al-Qaeda militants. He said: “We have never disarmed during a war.”


Nasr, now dean of the school of advanced international studies at Johns Hopkins University in Washington, said Putin had learnt from Syria that America was “not eager for a showdown or willing to take up the gauntlet”. He added: “Ultimately it’s a broad question of what kind of an aura of power, credibility and leadership does the US convey.”


After the Russians invaded Afghanistan at the end of 1979, President Jimmy Carter’s national security adviser Zbigniew Brzezinski wrote in a memo: “Since we have not always followed … verbal protests up with tangible responses, the Soviets may be getting into the habit of disregarding our concern.” Last week the New York Post branded Obama as “Jimmy Obama”, shorthand for a weak, feckless commander-in-chief.


David Rothkopf, a former official in the Clinton administration, wrote: “We have gone from Pax Americana to Lox Americana. Our policy time and time again has effectively been to lie there like a fish.”


WHAT would the West fight for now that Putin believes he has restored some of the prestige that Russia lost when the Soviet Union collapsed, an event he has described as the greatest catastrophe of the 20th century?


Volker, who now runs the McCain Institute for International Leadership, fears Obama’s reaction to a Russian invasion of a Baltic state might not be much more than an effort to “de- escalate” — a favourite word in the White House these days — to avoid further conflict.


As for western military action when there is no direct threat to a big EU or Nato power, Putin has concluded it is a remote prospect.


Jane Harman, who sat for eight years on the House intelligence committee, said she gave “high marks” to Obama and John Kerry, the secretary of state, for their cool deliberation in handling the Russian leader.


But travelling around the world as head of the Woodrow Wilson Centre think tank, she often encountered the view that Obama was not “tough”. She said: “There is a perception, especially in the Middle East, that he blinks.”


The notion of the “pivot” towards Asia was a mistake, Harman added: “I can’t think of any postage stamp on the globe where a US leadership role is not required.”


Henry Kissinger, at 90 the venerable sage of realist foreign policy, wrote last week that Russia had historic interests in Crimea and compromise was possible.


Kissinger’s argument included the contention that Ukraine should not be allowed to join Nato but should be a bridge between the EU and Russia rather than the venue for a showdown.


Volker believes Obama will not change. “You have seen a lot of this and you’re going to see more. Russia, Syria, the Egyptian generals, Karzai in Afghanistan, Iran within Iraq, the Shi’ite government of Iraq, Hezbollah — you can keep rattling them off. Everyone is reacting to this weakness.”


China might seize the Senkaku, also known as the Diayou, islands from Japan; Iran might judge that the cost of acquiring a nuclear weapon would be bearable; North Korea might flex its muscles; Assad’s Syria has no obvious need to come to the table.


“We create a vacuum by not engaging, not being involved, a vacuum where we’re not willing to apply force,” said Volker. “Whoever is willing steps in and takes what they want.” 




RealClearPolitics – Articles



What Would the West Fight For?

Friday, February 28, 2014

#EatCelebrityMeat (Made from Jennifer Lawrence, Kanye West, James Franco and Ellen DeGeneres)

At Those Damn Liars, the privacy of our visitors is of extreme importance to us (See this article to learn more about Privacy Policies.). This privacy policy document outlines the types of personal information is received and collected by Those Damn Liars and how it is used.

Log Files

Like many other Web sites, Those Damn Liars makes use of log files. The information inside the log files includes internet protocol (IP) addresses, type of browser, Internet Service Provider (ISP), date/time stamp, referring/exit pages, and number of clicks to analyze trends, administer the site, track user"s movement around the site, and gather demographic information. IP addresses, and other such information are not linked to any information that is personally identifiable.

Cookies and Web Beacons

Those Damn Liars does use cookies to store information about visitors preferences, record user-specific information on which pages the user access or visit, customize Web page content based on visitors browser type or other information that the visitor sends via their browser.

DoubleClick DART Cookie

  • Google, as a third party vendor, uses cookies to serve ads on Those Damn Liars.
  • Google"s use of the DART cookie enables it to serve ads to users based on their visit to Those Damn Liars and other sites on the Internet.
  • Users may opt out of the use of the DART cookie by visiting the Google ad and content network privacy policy at the following URL - http://www.google.com/privacy_ads.html.

These third-party ad servers or ad networks use technology to the advertisements and links that appear on Those Damn Liars send directly to your browsers. They automatically receive your IP address when this occurs. Other technologies ( such as cookies, JavaScript, or Web Beacons ) may also be used by the third-party ad networks to measure the effectiveness of their advertisements and / or to personalize the advertising content that you see.

Those Damn Liars has no access to or control over these cookies that are used by third-party advertisers.

You should consult the respective privacy policies of these third-party ad servers for more detailed information on their practices as well as for instructions about how to opt-out of certain practices. Those Damn Liars"s privacy policy does not apply to, and we cannot control the activities of, such other advertisers or web sites.

If you wish to disable cookies, you may do so through your individual browser options. More detailed information about cookie management with specific web browsers can be found at the browser"s respective websites.


#EatCelebrityMeat (Made from Jennifer Lawrence, Kanye West, James Franco and Ellen DeGeneres)

Friday, February 21, 2014

North and South Dakota Top List Of Happiest U.S. States, West Virginia At The Bottom




North and South Dakota Top List Of Happiest U.S. States, West Virginia At The Bottom





Nation




North Dakota was able to push out reigning “happiest state” Hawaii in an annual survey that measures Americans’ sense of well-being. West Virginia was revealed as the unhappiest state for the fifth year in a row.


North Dakota made the huge leap to first after coming in at number19 in the previous poll conducted by the Gallup-Healthways Well-Being Index. South Dakota came in a close second, moving up from 12th place, while Hawaii came in eighth after coming in first the previous five years.


West Virginia and Kentucky came in last and second to last, respectively.


The poll is based on more than 178,000 interviews of American adults in all 50 states between January and December 2013. The poll is an average score from six sub-indexes, which examine a person’s life evaluation, emotional health, work environment, physical health, healthy behaviors and basic access to necessities such as healthcare.


According to the poll, North Dakota ranked top in two sub-indexes: work environment and physical health.


A reason for this may because the state has experienced a job boom, according to Gallup.


Midwestern and Western states took up nine of the top ten highest well-being scores. Other states that join the Dakotas in the top ten happiest states are Nebraska, Minnesota, Montana, Vermont, Colorado, Hawaii, Washington and Iowa.


The South is highly represented in the bottom ten, which is made up of Louisiana, Oklahoma, Missouri, Tennessee, Arkansas, Ohio, Alabama, Mississippi, Kentucky and finally, West Virginia.


These regional patterns of well-being are aligned with previous years.


Residents in Kentucky and West Virginia reported poor physical health and low incomes.


The poll shows well-being has steadily increased in 11 states since 2010.



Sources: Healthways, Gallup




1





0






North and South Dakota Top List Of Happiest U.S. States, West Virginia At The Bottom

Wednesday, February 12, 2014

The Wicked Bitch of the West: The Hillary Papers


Hillary Clinton - Witch (resized)


by, Alana Goodman | The Washington Free Beacon | h/t Blazing CatFur


On May 12, 1992, Stan Greenberg and Celinda Lake, top pollsters for Bill Clinton’s presidential campaign, issued a confidential memo. The memo’s subject was “Research on Hillary Clinton.”


Voters admired the strength of the Arkansas first couple, the pollsters wrote. However, “they also fear that only someone too politically ambitious, too strong, and too ruthless could survive such controversy so well.”


Their conclusion: “What voters find slick in Bill Clinton, they find ruthless in Hillary.”


The full memo is one of many previously unpublished documents contained in the archive of one of Hillary Clinton’s best friends and advisers, documents that portray the former first lady, secretary of State, and potential 2016 presidential candidate as a strong, ambitious, and ruthless Democratic operative.


The papers of Diane Blair, a political science professor Hillary Clinton described as her “closest friend” before Blair’s death in 2000, record years of candid conversations with the Clintons on issues ranging from single-payer health care to Monica Lewinsky.


The archive includes correspondence, diaries, interviews, strategy memos, and contemporaneous accounts of conversations with the Clintons ranging from the mid-1970s to the turn of the millennium.


Diane Blair’s husband, Jim Blair, a former chief counsel at Tyson Foods Inc. who was at the center of “Cattlegate,” a 1994 controversy involving the unusually large returns Hillary Clinton made while trading cattle futures contracts in the 1970s, donated his wife’s papers to the University of Arkansas Special Collections library in Fayetteville after her death.


The full contents of the archive, which before 2010 was closed to the public, have not previously been reported on and shed new light on Clinton’s three decades in public life. The records paint a complex portrait of Hillary Clinton, revealing her to be a loyal friend, devoted mother, and a cutthroat strategist who relished revenge against her adversaries and complained in private that nobody in the White House was “tough and mean enough.”


THE SEX FILES


On July 28, 1997, President Clinton was facing yet another wave of allegations from yet another woman. Kathleen Willey had accused Clinton of sexually assaulting her, and Blair faxed a Drudge Report item about her claims to one of the president’s aides.


Blair’s handwritten note attached to the story: “Do we take Matt Drudge seriously?”


Six months later, Drudge would break the story of an affair between Clinton and 22-year-old White House intern Monica Lewinsky, setting in motion the events that would lead to the president’s impeachment.


When Clinton finally admitted to the relationship after repeated denials, Hillary  Clinton defended her husband in a phone call with Blair. She said her husband had made a mistake by fooling around with the “narcissistic loony toon” Lewinsky, but was driven to it in part by his political adversaries, the loneliness of the presidency, and her own failures as a wife.


She told Blair that the affair did not include sex “within any real meaning” of the term and noted President Clinton “tried to manage” Monica after they broke up but things spiraled “beyond control.”


Blair described the contents of the Sept. 9, 1998, phone call in a journal entry.


“[Hillary] is not trying to excuse [Bill Clinton]; it was a huge personal lapse. And she is not taking responsibility for it,” Blair wrote.


“But, she does say this to put his actions in context. Ever since he took office they’ve been going thru personal tragedy ([the death of] Vince [Foster], her dad, his mom) and immediately all the ugly forces started making up hateful things about them, pounding on them.”


“They adopted strategy, public strategy, of acting as tho it didn’t bother them; had to. [Hillary] didn’t realize toll it was taking on him,” Blair continued. “She thinks she was not smart enough, not sensitive enough, not free enough of her own concerns and struggles to realize the price he was paying.”


Hillary Clinton told Blair she had received “a letter from a psychologist who does family therapy and sexual infidelity problems,” who told the Yale Law School graduate, “most men with fidelity problems [were] raised by two women and felt conflicted between them.”


The psychologist suggested that Bill’s infidelity had its roots in his childhood.


“He’d read about Bill’s bio; grandmother despised [Bill’s mother] Virginia, tried to get custody of Bill; Bill adored by his mother, but she left him, etc. etc.”


In her conversations with Blair, the first lady gave her husband credit for trying to end the affair with Lewinsky, and said he did not take advantage of his White House intern.


“It was a lapse, but she says to his credit he tried to break it off, tried to pull away, tried to manage someone who was clearly a ‘narcissistic loony toon’; but it was beyond control,” wrote Blair.


“HRC insists, no matter what people say, it was gross inappropriate behavior but it was consensual (was not a power relationship) and was not sex within any real meaning (standup, liedown, oral, etc.) of the term.”


ALL THOSE WHINEY WOMEN


Hillary Clinton’s blunt assessments were not confined to Monica Lewinsky. In a Dec. 3, 1993, diary entry, Blair recounted a conversation with the first lady about “Packwood”—a reference to then-Sen. Bob Packwood, an influential Republican on health care embroiled in a sexual harassment scandal.


“HC tired of all those whiney women, and she needs him on health care,” wrote Blair. “I told her I’d been bonding w. creeps; she said that was the story of her whole past year. Fabio incident—sweeping her up, sending her roses.”


Privately, the Clinton White House was acutely sensitive to public perceptions of President Clinton’s treatment of women.


Supreme Court nominations were not immune from such considerations. In a three-page May 11, 1994, memo, Blair recounted her phone conversation with President Clinton about reservations he had about his preferred nominee to the high Court, the late Arkansas Judge Richard Arnold.


Noting Clinton allies had “really been trying to keep the women’s groups in line since Paula Jones filing,” Bill Clinton, according to Blair’s account, was concerned feminist groups “might blow sky high” if he appointed Arnold to the Supreme Court. Arnold had ruled that the Jaycees club could bar women from full membership—a decision later overturned by the highest court in the land.


The president was also concerned about accusations of infidelity in Arnold’s divorce records—allegations the president believed had the potential to reignite scrutiny of his own background.


“Stuff is in the [divorce] record—apparently includes other people—and no matter what Hatch says, this will come out, and will make it sound like the only friends [Bill] has in Arkansas are adulterers,” wrote Blair.


“This thing is so sick, according to [Bill], in a way he wants to stand up to it, but will come out and will be part of the pattern of sleaze.”


The president asked Blair to discuss the Arnold nomination with Hillary Clinton, who was dismissive of “grassroots” women’s groups.


“[Bill] wanted me to talk to [Hillary], so we got plugged in (at one point had 2 White House operators trying to get me),” wrote Blair.


“[Hillary] listened to what I had to say re women; thought those grassroots groups didn’t count for much; it was the DC groups who would be doing damage, and obviously [Hillary] concerned about [the] ‘climate’ because of the sexual harassment charge.”


The Clinton camp found itself dealing with Bill Clinton’s infidelity early on. In a confidential Feb. 16, 1992, memo entitled “Possible Investigation Needs,” Clinton campaign staff proposed ways to suppress and discredit stories about the then-Arkansas governor’s affairs.


Campaign operatives Loretta Lynch and Nancy McFadden wrote the memo, addressed to campaign manager David Wilhelm.


The first item on the itinerary discussed “GF,” a reference to Gennifer Flowers, the actress and adult model who had recently disclosed her 12-year affair with Bill Clinton.


“Exposing GF: completely as a fraud, liar and possible criminal to stop this story and related stories, prevent future non-related stories and expose press inaction and manipulation,” said the memo.


In 1998 Bill Clinton admitted he had had a sexual relationship with Flowers.


Another item, headlined “Women,” referred to Elizabeth Ward and Lencola Sullivan, also rumored to have had relationships with Bill.


“Elizabeth Ward … determine attitude & check out background; Any Reep connections? When does Playboy come out?”


One of the documents in the Blair archive is an unsigned note from Bill Clinton, handwritten on the personal letterhead he used in the mid-1970s. The addressee is unknown. A cover page reads: “Tomorrow is Thursday.”


The undated letter is written on the same personal letterhead that Clinton was using in 1976, prior to becoming attorney general of Arkansas. Hillary Rodham and Bill Clinton began dating in 1971 and were married on Oct. 11, 1975.


“Yesterday the recurring shakes came over me again and to rid myself of them I decided to go and buy something for you as much to be doing it as to actually wind up with things,” Clinton wrote.


He said he recently had bought books, including One Hundred Years of Solitude by Gabriel Garcia Marquez and Bread and Wine by Italian anti-Communist Ignazio Silone.


“By the time I could call last night it was too late and I was too spent,” the future founding chairman of the Clinton Global Initiative went on.


“Today is Thursday. I will be at the little place downstairs in the union at 11:30. If you aren’t there, I’ll understand. And if you are, I will.”


The fast-food lover and amateur sax player closed by confessing that he had fallen asleep the night before while reading an erotic love poem from the seventeenth century.


“At 3:30 this morning I fell asleep over Andrew Marvell’s To His Coy Mistress,” wrote Clinton. “It has been a while since I could feel something so sharply across three hundred years.”


Attached to the letter is a photo of a young Bill Clinton holding a saxophone, with the note, “I thought you might get a kick out of this—I was once even younger.”


Hillary Clinton - Nazi Bitch (resized)


YOU ARE ENTERING A WORLD OF PAIN


Days after President Clinton’s impeachment in 1998, the first lady called Blair in good spirits, telling her friend that, “Most people in this town have no pain threshold.”


“[Hillary] sounded very up, almost jolly,” wrote Blair. “Told me how she and Bill and Chelsea had been to church, to a Chinese restaurant, to a Shakespeare play, greeted everywhere with wild applause and cheers—this, she said is what drives their adversaries totally nuts, that they don’t bend, do not appear to be suffering.”


Hillary Clinton’s “adversaries” included the media, Republicans, and top members of President Clinton’s staff, according to a Washington Free Beacon analysis of the contents of the Blair archive.


“HC says press has big egos and no brains,” wrote Blair on May 19, 1993, during the White House travel office controversy. “That [the White House is] just going to have to work them better; that her staff has figured it out and would be glad to teach [Bill’s] staff.”


The First Lady often confided in Blair about her “hellacious” first year in the White House, and her many clashes with staffers, administration figures, and her husband. By the spring of 1994, Hillary was “furious” at Bill for “ruining himself and the Presidency.”


“She keeps trying to shape things up, knows what’s wrong, but [Bill] can’t fire people, exert discipline, punish leakers,” Blair wrote on May 17, 1994. “Never had strategy for Whitewater, troopers, Paula [Jones]. … Inability to organize, make tough choices, drives her nuts.”


Blair, a frequent guest at the White House, recounted two nights in mid-March 1993 when President Clinton spoke on the “theme of being spied on, taped, watched, imprisoned.”


“[Bill] told me last 2, 3 months hideously stressful, and has really never had a break since campaign,” Blair wrote. “Said when he named [Warren] Christopher to [State Department], screwed up the transition.”


The insularity of the Clinton White House was not lost on administration officials.


“Chat w. [Attorney General] Janet Reno,” Blair wrote on April 24, 1993. “She concerned that [Hillary Clinton is] resenting her ‘celebrity’ status.”


“Janet wants to connect w. HC; not communicate thru Carol Rasco,” Blair added. “Finds HC a ‘mask.’”


SINGLE-PAYER NECESSARY


On Feb. 23, 1993, Blair joined the Clintons for a family dinner at the White House. The subject of health care reform came up.


“At dinner, [Hillary] to [Bill] at length on the complexities of health care—thinks managed competition a crock; single-payer necessary; maybe add to Medicare,” Blair wrote.


The account is at odds with public statements by the former First Lady that she never supported the single-payer option.


In an interview with the New York Times as she ran for president in 2008, Hillary Clinton said she had never seriously considered adopting a single-payer system, in which the government, using funds appropriated from taxpayers, pays for all health care expenses.


“You know, I have thought about this, as you might guess, for 15 years and I never seriously considered a single payer system,” said Clinton in the interview.


At the time of Blair’s account, the First Lady recently had been appointed to the president’s health care task force and had started her push for an insurance reform that hinged on the “managed competition” model.


However, at the February 1993 dinner, the First Lady already seemed to regret her decision to take on health care reform.


“[Bill’s] tenderly hugging and thanking [Hillary] for sucking up to all thos ego’s nd taking all this shit [sic],” wrote Blair. “She’s signaling him what a mess health care is, bu also, sweetly, ‘Don’t worry’ [sic].”


By the spring, the First Lady seemed deeply anxious about the effort.


“[Hillary] adamant; [Bill] must devise new outside strategy; we’re getting killed. Congress a bunch of whiners; no courage. Her health care plan will save billions in long run but will cost big $ up front. [Members of Congress] don’t work; only 3 days a week; only care for re-election,” wrote Blair. “[Bill] clearly not very happy w. his own crew and advisors. [Hillary] urging hard ball.”


As the First Lady prepared to testify before Congress in September 1993, Blair wrote that “she’s begun to see that they don’t really care about the issues but want to feel they’re part of the process. So she’s slobbering over their ‘craft’ as she testifies.”


Hillary Clinton’s testimony is seen in retrospect as the high point of her failed health care campaign.


“The week may have been the pinnacle of her career as First Lady,” wrote Carl Bernstein in his 2008 book Woman in Charge. “Hillary was making history, and there were comparisons on the floor of Congress to Martha Washington, Eleanor Roosevelt, and in one particularly tortured leap of logic, Abraham Lincoln.”


REALIST HILLARY: THEY’VE BEEN KILLING EACH OTHER FOR 900 YEARS


On April 21, 1993, during a speech at the opening reception for the United States Holocaust Memorial Museum in Washington, D.C., President Clinton drew parallels between the genocide in Bosnia and the Holocaust.


That same month, he met with top U.S. military officials, diplomats, and aid workers advocating for military action against the Serbian forces of Slobodan Milosevic.


At the time, however, Hillary Clinton was not on board with the use of deadly force. According to Blair’s April 29, 1993 account, the First Lady said she “was very much against any intervention—had been killing each other for 900 yrs.”


Blair later spoke with President Clinton in mid-May and gave him “messages a la [Hillary’s] instructions: stop ruminating aloud re Bosnia.”


The White House was under increasing pressure to address the atrocities in the Balkans. Yet the United States waited more than two years before taking military action.


Blair’s papers are not the first indication that Hillary privately opposed U.S. intervention in Bosnia prior to 1995.


An unnamed friend of the Clintons told Newsweek in 1993 that the First Lady “regards [Bosnia] as a Vietnam that would compromise health-care reform.”


The author and controversialist Christopher Hitchens later reported a similar account from then-Secretary of Defense Les Aspin.


Since leaving the White House, however, Hillary Clinton has said that she favored earlier intervention in the Balkans, decrying “the tragic failures in Rwanda, early Bosnia, and up to now, the inadequate response in Darfur” in a 2005 speech to the United Nations.


SUPREME THWART


Hillary Clinton’s influence on White House decisions went beyond policy, according to the Blair papers.


A three-page memo written by Blair on May 11, 1994, shows the First Lady privately urging President Clinton to reject his preferred 1994 candidate for the U.S. Supreme Court because of political considerations.


While Bill Clinton favored the late Arkansas Judge Richard Arnold, he and his wife had concerns about the judge’s health.


Hillary Clinton also argued that rejecting Arnold would send a “message” to the judge’s ally, Arkansas Democrat-Gazette publisher Walter Hussman, Jr., whose paper often printed unflattering stories about the Clintons.


“Goddamn Hussman needs to know that it’s his own goddamn fault; that he can’t destroy everybody from Ark. and everything about the state and not pay the price for his precious Richard [Arnold],” Hillary said, according to Blair’s account.


“He needs to get the message big-time, that Richard might have a chance [to be appointed to the Supreme Court] next round if Hussman and his minions will lay off all this outrageous lies and innuendo.”


The details in Blair’s memo challenge the contemporary understanding of Hillary Clinton’s role in the debate over the 1994 appointment. The First Lady has been credited as one of the few members of the president’s inner circle who lobbied in favor of Arnold’s nomination.


However, that seems not to be the case.


President Clinton has said he did not appoint Arnold for health reasons. The judge had been diagnosed with advanced lymphoma, and according to the Blair memo his doctors could not guarantee he would live more than five years.


He died in 2004.


The health concerns were related to President Clinton’s fear that Arnold could be his last Supreme Court appointment.


“At this point BC not sure he can get re-elected; they’re killing him in the South, rise of fundamentalism, the Nazi’s. Some of that he did to himself—gay rights in the military. Others just hate the one who’s in,” Blair wrote in an account of one of her conversations with the president.


According to the memo, Bill Clinton dispatched Blair to discuss the issue with Hillary, but the First Lady stood her ground.


“If HRC carried the day, and it sounds as if she is, [the nominee] will be [Bruce] Babbitt,” wrote Blair. “She’s not wild about him. Wishes there were a 3rd choice.”


President Clinton ended up appointing Stephen Breyer, who became an associate justice of the Supreme Court in August 1994.


Hillary Clinton - Bitch (revised)


THE FUTURE IS NOW


As Hillary Clinton prepares for a possible 2016 presidential run, the Clinton team has a great incentive to focus on the future.


However, recent weeks have made it clear this will not be easy.


Sen. Rand Paul’s remark about Bill Clinton’s “predatory behavior” on a recent Sunday talk show generated a days-long media firestorm and reignited the decades-old Lewinsky controversy.


While Hillary Clinton has gone from the White House to the Senate to the State Department, experts say she will likely be forced to readdress some of the controversies that defined her husband’s presidency if she decides on a 2016 bid.


Neither a Clinton spokesman nor a spokesman for the Clinton Foundation returned a request for comment from the Free Beacon on the materials contained in the Blair archive.


As the 2016 contest draws near, however, the contents of this little-known archive of one of the closest friends of the most famous woman in the world are sure to receive fresh scrutiny.


While thousands of Diane Blair’s papers are available to the public at the University of Arkansas Library, an undisclosed number of documents remain kept in a restricted section of the archive. The Free Beacon was unable to gain access to those documents.


“With this collection, [Diane Blair’s] contributions will grow and live on, enlarging our understanding of history, politics and culture,” Hillary Clinton said in a video address at the opening of Blair’s archive in 2010.


“I hope also that some young scholar will come along and write the story of Diane,” she added. “We miss her still but this, along with so many of her contributions to us, lives on.”


Editorial Footnote:


You may want to keep this post nearby thru 2016.  Please share.  Thank you.



source: http://freebeacon.com/the-hillary-papers/





sharia unveiled



The Wicked Bitch of the West: The Hillary Papers

Thursday, February 6, 2014

The Wild West of Surveillance


Originally posted at TomDispatch.


The question Senator Ron Wyden asked on March 12th of last year was straightforward enough and no surprise for Director of National Intelligence James Clapper. He had been given it a day in advance of his testimony before the Senate Intelligence Committee and after he was done, Senator Wyden and his staff offered him a chance to “amend” his answer if he wished. Did the National Security Agency, Wyden wanted to know, gather “any type of data at all on millions or hundreds of millions of Americans”? Being on that committee and privy to a certain amount of secret intelligence information, Wyden already knew the correct answer to the question. Clapper, with a day to prepare, nonetheless answered, “No, sir. Not wittingly. There are cases where they could inadvertently perhaps collect, but not wittingly.”


That was a bald-faced lie, though Clapper would later term it the “least untruthful” thing he felt he could say. As we now know, the NSA was, among many other things, gathering the phone “data” of every American and storing it for future use. In other words, after some forethought, the director perjured himself.


Mind you, Clapper isn’t exactly shy about charging other people with implicit crimes. In recent testimony before Congress, he demanded that whistleblower and former NSA contractor Edward Snowden “and his accomplices” return all agency documents. It was a stunning use of a term whose only meaning is criminal and clearly referred to the journalists – Glenn Greenwald, filmmaker Laura Poitras, and reporters from the Guardian, the New York Times, and the Washington Post, among other papers – who have been examining and writing about the Snowden documents.


It caught something of the chutzpah of the top officials who run Washington’s national security state – and little wonder that they feel emboldened and demanding. After all, not only is Clapper not going to be charged with perjury, but he has retained his post without a blink. He has kept the “support” of President Obama, who recently told CNN’s Jake Tapper (in what passes these days for a rebuke of our surveiller-in-chief), “Jim Clapper himself would acknowledge, and has acknowledged, that he should have been more careful about how he responded.” More careful indeed!


I’ve long argued that while we, the citizens of the U.S., remain in legal America, the U.S. national security state exists in “post-legal America” because no illegal act from warrantless surveillance to torture committed in its service will ever be prosecuted. So it’s no surprise that Clapper won’t even be forced to resign for lying to Congress. He’s free as a bird and remains powerful indeed. Tell that to some of our whistleblowers.


In his latest post, TomDispatch regular Pratap Chatterjee offers an anatomy of a surveillance world that grows more, not less, powerful and full of itself with every passing moment and technological advance, a national security world whose global ambitions know no bounds. ~ Tom


Selling Your Secrets: The Invisible World of Software Backdoors and Bounty Hunters
By Pratap Chatterjee


Imagine that you could wander unseen through a city, sneaking into houses and offices of your choosing at any time, day or night. Imagine that, once inside, you could observe everything happening, unnoticed by others – from the combinations used to secure bank safes to the clandestine rendezvous of lovers. Imagine also that you have the ability to silently record everybody’s actions, whether they are at work or play without leaving a trace. Such omniscience could, of course, make you rich, but perhaps more important, it could make you very powerful.


That scenario out of some futuristic sci-fi novel is, in fact, almost reality right now. After all, globalization and the Internet have connected all our lives in a single, seamless virtual city where everything is accessible at the tap of a finger. We store our money in online vaults; we conduct most of our conversations and often get from place to place with the help of our mobile devices. Almost everything that we do in the digital realm is recorded and lives on forever in a computer memory that, with the right software and the correct passwords, can be accessed by others, whether you want them to or not.


Now – one more moment of imagining – what if every one of your transactions in that world was infiltrated? What if the government had paid developers to put trapdoors and secret passages into the structures that are being built in this new digital world to connect all of us all the time? What if they had locksmiths on call to help create master keys for all the rooms? And what if they could pay bounty hunters to stalk us and build profiles of our lives and secrets to use against us?


Well, check your imagination at the door, because this is indeed the brave new dystopian world that the U.S. government is building, according to the latest revelations from the treasure trove of documents released by National Security Agency whistleblower Edward Snowden.


Over the last eight months, journalists have dug deep into these documents to reveal that the world of NSA mass surveillance involves close partnerships with a series of companies most of us have never heard of that design or probe the software we all take for granted to help keep our digital lives humming along.


There are three broad ways that these software companies collaborate with the state: a National Security Agency program called “Bullrun” through which that agency is alleged to pay off developers like RSA, a software security firm, to build “backdoors” into our computers; the use of “bounty hunters” like Endgame and Vupen that find exploitable flaws in existing software like Microsoft Office and our smartphones; and finally the use of data brokers like Millennial Media to harvest personal data on everybody on the Internet, especially when they go shopping or play games like Angry Birds, Farmville, or Call of Duty.


Of course, that’s just a start when it comes to enumerating the ways the government is trying to watch us all, as I explained in a previous TomDispatch piece, “Big Bro is Watching You.” For example, the FBI uses hackers to break into individual computers and turn on computer cameras and microphones, while the NSA collects bulk cell phone records and tries to harvest all the data traveling over fiber-optic cables. In December 2013, computer researcher and hacker Jacob Appelbaum revealed that the NSA has also built hardware with names like Bulldozer, Cottonmouth, Firewalk, Howlermonkey, and Godsurge that can be inserted into computers to transmit data to U.S. spooks even when they are not connected to the Internet.


“Today, [the NSA is] conducting instant, total invasion of privacy with limited effort,” Paul Kocher, the chief scientist of Cryptography Research, Inc. which designs security systems, told the New York Times. “This is the golden age of spying.”


Building Backdoors


Back in the 1990s, the Clinton administration promoted a special piece of NSA-designed hardware that it wanted installed in computers and telecommunication devices. Called the Clipper Chip, it was intended to help scramble data to protect it from unauthorized access – but with a twist. It also transmitted a “Law Enforcement Access Field” signal with a key that the government could use if it wanted to access the same data.


Activists and even software companies fought against the Clipper Chip in a series of political skirmishes that are often referred to as the Crypto Wars. One of the most active companies was RSA from California. It even printed posters with a call to “Sink Clipper.” By 1995, the proposal was dead in the water, defeated with the help of such unlikely allies as broadcaster Rush Limbaugh and Senators John Ashcroft and John Kerry.


But the NSA proved more tenacious than its opponents imagined. It never gave up on the idea of embedding secret decryption keys inside computer hardware – a point Snowden has emphasized (with the documents to prove it).


A decade after the Crypto Wars, RSA, now a subsidiary of EMC, a Massachusetts company, had changed sides. According to an investigative report by Joseph Menn of Reuters, it allegedly took $ 10 million from the National Security Agency in exchange for embedding an NSA-designed mathematical formula called the Dual Elliptic Curve Deterministic Random Bit Generator inside its Bsafe software products as the default encryption method.


The Dual Elliptic Curve has a “flaw” that allows it to be hacked, as even RSA now admits. Unfortunately for the rest of us, Bsafe is built into a number of popular personal computer products and most people would have no way of figuring out how to turn it off.


According to the Snowden documents, the RSA deal was just one of several struck under the NSA’s Bullrun program that has cost taxpayers over $ 800 million to date and opened every computer and mobile user around the world to the prying eyes of the surveillance state.


“The deeply pernicious nature of this campaign – undermining national standards and sabotaging hardware and software – as well as the amount of overt private sector cooperation are both shocking,” wrote Dan Auerbach and Kurt Opsahl of the Electronic Frontier Foundation, a San Francisco-based activist group that has led the fight against government surveillance. “Back doors fundamentally undermine everybody’s security, not just that of bad guys.”


Bounty Hunters


For the bargain basement price of $ 5,000, hackers offered for sale a software flaw in Adobe Acrobat that allows you to take over the computer of any unsuspecting victim who downloads a document from you. At the opposite end of the price range, Endgame Systems of Atlanta, Georgia, offered for sale a package named Maui for $ 2.5 million that can attack targets all over the world based on flaws discovered in the computer software that they use. For example, some years ago, Endgame offered for sale targets in Russia including an oil refinery in Achinsk, the National Reserve Bank, and the Novovoronezh nuclear power plant. (The list was revealed by Anonymous, the online network of activist hackers.)


While such “products,” known in hacker circles as “zero day exploits,” may sound like sales pitches from the sorts of crooks any government would want to put behind bars, the hackers and companies who make it their job to discover flaws in popular software are, in fact, courted assiduously by spy agencies like the NSA who want to use them in cyberwarfare against potential enemies.


Take Vupen, a French company that offers a regularly updated catalogue of global computer vulnerabilities for an annual subscription of $ 100,000. If you see something that you like, you pay extra to get the details that would allow you to hack into it. A Vupen brochure released by Wikileaks in 2011 assured potential clients that the company aims “to deliver exclusive exploit codes for undisclosed vulnerabilities” for “covertly attacking and gaining access to remote computer systems.”


At a Google sponsored event in Vancouver in 2012, Vupen hackers demonstrated that they could hijack a computer via Google’s Chrome web browser. But they refused to hand over details to the company, mocking Google publicly. “We wouldn’t share this with Google for even $ 1 million,” Chaouki Bekrar of Vupen boasted to Forbes magazine. “We don’t want to give them any knowledge that can help them in fixing this exploit or other similar exploits. We want to keep this for our customers.”


In addition to Endgame and Vupen, other players in this field include Exodus Intelligence in Texas, Netragard in Massachussetts, and ReVuln in Malta.


Their best customer? The NSA, which spent at least $ 25 million in 2013 buying up dozens of such “exploits.” In December, Appelbaum and his colleagues reported in Der Spiegel that agency staff crowed about their ability to penetrate any computer running Windows at the moment that machine sends messages to Microsoft. So, for example, when your computer crashes and helpfully offers to report the problem to the company, clicking yes could open you up for attack.


The federal government is already alleged to have used such exploits (including one in Microsoft Windows) – most famously when the Stuxnet virus was deployed to destroy Iran’s nuclear centrifuges.


“This is the militarization of the Internet,” Appelbaum told the Chaos Computer Congress in Hamburg. “This strategy is undermining the Internet in a direct attempt to keep it insecure. We are under a kind of martial law.”


Harvesting your Data


Among the Snowden documents was a 20-page 2012 report from the Government Communications Headquarters – the British equivalent of the NSA – that listed a Baltimore-based ad company, Millennial Media. According to the spy agency, it can provide “intrusive” profiles of users of smartphone applications and games. The New York Times has noted that the company offers data like whether individuals are single, married, divorced, engaged, or “swinger,” as well as their sexual orientation (“straight, gay, bisexuall, and ‘not sure’”).


How does Millennial Media get this data? Simple. It happens to gather data from some of the most popular video game manufacturers in the world. That includes Activision in California which makes Call of Duty, a military war game that has sold over 100 million copies; Rovio of Finland, which has given away 1.7 billion copies of a game called Angry Birds that allows users to fire birds from a catapult at laughing pigs; and Zynga – also from California – which makes Farmville, a farming game with 240 million active monthly users.


In other words, we’re talking about what is undoubtedly a significant percentage of the connected world unknowingly handing over personal data, including their location and search interests, when they download “free” apps after clicking on a licensing agreement that legally allows the manufacturer to capture and resell their personal information. Few bother to read the fine print or think twice about the actual purpose of the agreement.


The apps pay for themselves via a new business model called “real-time bidding” in which advertisers like Target and Walmart send you coupons and special offers for whatever branch of their store is closest to you. They do this by analyzing the personal data sent to them by the “free” apps to discover both where you are and what you might be in the market for.


When, for instance, you walk into a mall, your phone broadcasts your location and within a millisecond a data broker sets up a virtual auction to sell your data to the highest bidder. This rich and detailed data stream allows advertisers to tailor their ads to each individual customer. As a result, based on their personal histories, two people walking hand in hand down a street might get very different advertisements, even if they live in the same house.


This also has immense value to any organization that can match up the data from a device with an actual name and identity – such as the federal government. Indeed, the Guardian has highlighted an NSA document from 2010 in which the agency boasts that it can “collect almost every key detail of a user’s life: including home country, current location (through geolocation), age, gender, zip code, marital status… income, ethnicity, sexual orientation, education level, and number of children.”


In Denial


It’s increasingly clear that the online world is, for both government surveillance types and corporate sellers, a new Wild West where anything goes. This is especially true when it comes to spying on you and gathering every imaginable version of your “data.”


Software companies, for their part, have denied helping the NSA and reacted with anger to the Snowden disclosures. “Our fans’ trust is the most important thing for us and we take privacy extremely seriously,” commented Mikael Hed, CEO of Rovio Entertainment, in a public statement. “We do not collaborate, collude, or share data with spy agencies anywhere in the world.”


RSA has tried to deny that there are any flaws in its products. “We have never entered into any contract or engaged in any project with the intention of weakening RSA’s products, or introducing potential ‘backdoors’ into our products for anyone’s use,” the company said in a statement on its website. “We categorically deny this allegation.” (Nonetheless RSA has recently started advising clients to stop using the Dual Elliptical Curve.)


Other vendors like Endgame and Millennial Media have maintained a stoic silence. Vupen is one of the few that boasts about its ability to uncover software vulnerabilities.


And the NSA has issued a Pravda-like statement that neither confirms nor denies the revelations. “The communications of people who are not valid foreign intelligence targets are not of interest to the National Security Agency,” an NSA spokeswoman told the Guardian. “Any implication that NSA’s foreign intelligence collection is focused on the smartphone or social media communications of everyday Americans is not true.”


The NSA has not, however, denied the existence of its Office of Tailored Access Operations (TAO), which Der Spiegel describes as “a squad of [high-tech] plumbers that can be called in when normal access to a target is blocked.”


The Snowden documents indicate that TAO has a sophisticated set of tools at its disposal – that the NSA calls “Quantum Theory” – made up of backdoors and bugs that allow its software engineers to plant spy software on a target computer. One powerful and hard to detect example of this is TAO’s ability to be notified when a target’s computer visits certain websites like LinkedIn and to redirect it to an NSA server named “Foxacid” where the agency can upload spy software in a fraction of a second.


Which Way Out of the Walled Garden?


The simple truth of the matter is that most individuals are easy targets for both the government and corporations. They either pay for software products like Pages and Office from well known manufacturers like Apple and Microsoft or download them for free from game companies like Activision, Rovio, and Zynga for use inside “reputable” mobile devices like Blackberries and iPhones.


These manufacturers jealously guard access to the software that they make available, saying that they need to have quality control. Some go even further with what is known as the “walled garden” approach, only allowing pre-approved programs on their devices. Apple’s iTunes, Amazon’s Kindle, and Nintendo’s Wii are examples of this.


But as the Snowden revelations have helped make clear, such devices and software are vulnerable both to manufacturer’s mistakes, which open exploitable backdoors into their products, and to secret deals with the NSA.


So in a world where, increasingly, nothing is private, nothing is simply yours, what is an Internet user to do? As a start, there is an alternative to most major software programs for word processing, spreadsheets, and layout and design – the use of free and open source software like Linux and Open Office, where the underlying code is freely available to be examined for hacks and flaws. (Think of it this way: if the NSA cut a deal with Apple to copy everything on your iPhone, you would never know. If you bought an open-source phone – not an easy thing to do – that sort of thing would be quickly spotted.) You can also use encrypted browsers like Tor and search engines like Duck Duck Go that don’t store your data.


Next, if you own and use a mobile device on a regular basis, you owe it to yourself to turn off as many of the location settings and data-sharing options as you can. And last but hardly least, don’t play Farmville, go out and do the real thing. As for Angry Birds and Call of Duty, honestly, instead of shooting pigs and people, it might be time to think about finding better ways to entertain yourself. Pick up a paintbrush, perhaps? Or join an activist group like the Electronic Frontier Foundation and fight back against Big Brother.


Pratap Chatterjee, a TomDispatch regular, is executive director of CorpWatch and a board member of Amnesty International USA. He is the author of Halliburton’s Army and Iraq, Inc.


Copyright 2014 Pratap Chatterjee


Follow TomDispatch on Twitter and join us on Facebook or Tumblr. Check out the newest Dispatch Book, Ann Jones’s They Were Soldiers: How the Wounded Return From America’s Wars – The Untold Story.


Read more by Tom Engelhardt





Antiwar.com Original



The Wild West of Surveillance