Peter Myers 120430

Apple avoids tax; Google wiretaps; Internet Spy Bill Exposed

 

(1) Spy Bills cf unofficial spying

(2) Insanity! CISPA Has Passed! [In the House of Reps]

(3) CISPA: Internet Spy Bill Exposed – Brother Nathanael

(4) Apple avoids billions in tax

(5) Letterbox in Luxembourg one way Apple avoids paying billions in worldwide tax

(6) Apple responds to tax criticism

(7) Google was scooping up personal information from wi-fi users as its cars drove by

(8) US Government wants to convict defendants on the basis of secret evidence – Paul Craig Roberts

(9) The homeland security state has come to campus

(10) Counterattack against the democratic “excesses” of the 1960s movement

 

(1) Spy Bills cf unofficial spying – Peter Myers, April 30, 2012

 

Government agencies ALREADY spy on the people. But because they are operating illegally, their information cannot be used in court, and thus we are safe – mostly.

 

Laws that make such surveillance LEGAL would pave the way to Thought Control.

 

Brother Nathanael portrays the surveillance state as Jewish-directed and aimed at anti-Zionists (item 3).

 

Items 9 & 10, on the other hand, depict the surveillance state as incipient fascism.

 

(2) Insanity! CISPA Has Passed! [In the House of Reps]

 

Steve Campbell <callstevec2@gmail.com>     30 April 2012 03:55

 

Note: Defeating this tyranny is of prime importance; I need not elaborate. Not only would the final passage of this “bill allow the government to monitor your online activity,” but change, edit or delete your emails and online activity as well. – sc

 

http://newsworldwide.wordpress.com/2012/04/27/cispa-has-passed-pressfortruth-tv/

 

CISPA Has Passed! (pressfortruth.tv)

 

Posted on April 27, 2012 by zandocomm

 

Yesterday the House of Representatives passed the CISPA bill which will now go to the senate for a final vote. The bill would allow the government to monitor your online activity if it constitutes a “security threat”. This has nothing to do with protecting copy righted material and everything to do with blocking the free flow of information online. …

 

(3) CISPA: Internet Spy Bill Exposed – Brother Nathanael

 

Brother Nathanael <bronathanael@yahoo.com>       30 April 2012 14:51

 

CISPA – Internet Spy Bill Exposed

 

By Brother Nathanael Kapner

 

http://www.realzionistnews.com/?p=716

 

{http://www.realjewnews.com/

My Name Is Brother Nathanael Kapner

I’m A “Street Evangelist”

I Grew Up As A Jew

I’m Now An Orthodox Christian

I Wish To Warn How Zionist Jews

Are Destroying Christianity Throughout The World}

 

Big Brother is at it again my friends.

 

We fought Big Brother on SOPA and we won.

 

But now an even scarier Bill has just been passed by the House, the Cyber Intelligence Sharing Protection Act, known as CISPA, which will override every single privacy law ever enacted.

 

Now, this Bill allows for Internet providers such as Comcast, owned by Zionist-Jew, Brian Roberts; Verizon, whose Chairman is Ivan Seidenberg; and countless public entities to “share” with Federal Agencies our emails, personal information, and private communications.

 

And not only this under CISPA, but any email or social-network postings that pose “the threat of harm” to any “individual or group” will also be shared with Federal Agencies. And that’s scary.

 

For powerful watchdog lobbies such as the Jewish Anti-Defamation League, known as the ADL, led by Abraham Foxman, will be further empowered to demand information on anyone that THEY deem a “threat.”

 

In other words, you can criticize a ‘Goy’ or any country that you want…but you better not criticize a ‘Jew’ or the anti-Christ state of Israel.

 

The sham about it all is that our Congressmen claim that CISPA will “protect” us from “cyber threats.”

 

But cyber attacks, the experts tell us, are rare. And quite frankly this BILL will do absolutely nothing to stop professional hackers who know how to take down a Website.

 

And while those sites are going down, Internet providers will be too busy filling orders for the ADL to spy on us little guys all in the name of “preventing” a cyber attack.

 

Now, a big reason why SOPA did NOT pass a few months ago was because it would have destroyed mega businesses like Google, Amazon, and Facebook, who would have been liable for all user-interaction content on their Websites.

 

CISPA on the other hand won’t harm the mega businesses because they don’t require their customers to be anonymous. In fact, they prefer their users not to be anonymous so as to learn more about their buying and spending habits.

 

Facebook, Amazon, and Google, would then benefit from CISPA…and that’s probably why they’re not opposing the Bill.

 

While SOPA harmed both the people AND corporations, CISPA only harms the people.

 

And while it’s important to get rid of CISPA we must realize that if CISPA goes, another will pop up.

 

Jewish Senators Joseph Lieberman and Dianne Feinstein both have Cyber Security Acts waiting in the wings. And they’re just itching to take away our last bastion of free speech, the Internet.

 

What we need is something to guarantee and protect our fundamental rights on the Internet. We need a Bill of Internet Rights. Let’s all think about what that Bill would be.

 

We’re not powerless. We’ve got the numbers. We can make a difference.

 

(4) Apple avoids billions in tax

 

http://www.theaustralian.com.au/australian-it/apple-avoids-billions-in-tax/story-e6frgakx-1226342306332

 

From: AP April 30, 2012 7:44AM

 

APPLE has been using subsidiaries in Ireland, the Netherlands and other low-tax nations as part of a strategy to cut its global tax bill by billions of dollars every year.

 

A published report outlined legal methods used by Cupertino, California-based Apple to avoid paying billions of dollars in US federal and state taxes.

 

A report in The New York Times said even though the company is based in California, Apple has set up a small office in Reno, Nevada to collect and invest its profits. The corporate tax rate in Nevada is zero. In California, it’s 8.84 per cent.

 

While many major corporations try to reduce their tax bills, technology companies like Apple, Google, Microsoft, and others have more options to do so.

 

That’s because some of their revenue comes from digital products or royalties on patents, which makes it easier for them to move profits to tax-friendly states or countries, the Times said.

 

In contrast, it’s tougher to shift the collection of profits from the sale of a physical product – like groceries or a car – to a tax-friendly haven.

 

The 71 technology companies in the S&P 500, including Apple, Google, Yahoo and Dell, reported paying global cash taxes over the past two years at a rate that’s, on average, one-third less than other S&P 500 companies, the Times said.

 

Apple has legally allocated about 70 per cent of its profits overseas, where tax rates are often much lower than in the US, according to company filings.

 

The Times cites a study by former Treasury Department economist Martin A. Sullivan that estimates Apple’s federal tax bill would have been

$US2.4 billion higher last year without such tactics.

 

The newspaper says Apple paid $US3.3 billion in cash taxes globally on

$US34.2 billion in profits last year.

 

That’s a tax rate of 9.8 per cent.

 

In a statement, Apple told the Times that it has complied with all laws and accounting rules, and says that its US operations generated nearly

$US5 billion in federal and state income taxes in the first half of fiscal 2012.

 

Wall Street analysts predict Apple could earn up to $US46.9 billion in its current fiscal year, according to FactSet.

 

(5) Letterbox in Luxembourg one way Apple avoids paying billions in worldwide tax

 

http://www.smh.com.au/technology/technology-news/letterbox-in-luxembourg-one-way-apple-avoids-paying-billions-in-worldwide-tax-20120429-1xswe.html

 

Charles Duhigg, David Kocieniewski

 

April 30, 2012

 

RENO, Nevada: Apple, the world’s most profitable technology company, doesn’t design iPhones in Nevada. It doesn’t run AppleCare customer service from Reno. And it doesn’t manufacture MacBooks or iPads anywhere nearby.

 

Yet, with a handful of employees in a small Reno office in a company subsidiary named Braeburn Capital, Apple has done something central to its corporate strategy: it has avoided millions of dollars in taxes in California and 20 other US states.

 

Apple’s headquarters are in Cupertino, California. By putting an office to collect and invest the company’s profits in Reno, just 350 kilometres away, Apple sidesteps state income taxes on some of those gains.

 

Advertisement: Story continues below California’s corporate tax rate is

8.84 per cent. Nevada’s, zero.

 

Setting up an office in Reno is one of many legal methods Apple uses to reduce its worldwide tax bill by billions of dollars a year.

 

As it has in Nevada, Apple has created subsidiaries in low-tax countries such as Ireland, the Netherlands, Luxembourg and the British Virgin Islands – some little more than a letterbox in Luxembourg or an anonymous office in Nevada – that help cut the taxes it pays.

 

Almost every large corporation tries to minimise taxes. For Apple, the savings are especially alluring because the company’s profits are so high. Wall Street analysts predict Apple could earn up to $US45.6 billion ($43.5 billion) this fiscal year – a record for a United States business.

 

Braeburn is a variety of apple that is simultaneously sweet and tart.

When someone in the US buys an iPhone, iPad or other Apple product, a portion of the profits from that sale is often deposited into accounts controlled by Braeburn, and then invested in stocks, bonds or other financial instruments, company executives say. Some profits from those investments are shielded from California tax authorities by virtue of Braeburn’s Nevada address.

 

Since founding Braeburn in 2006, Apple has earned more than $US2.5 billion in interest and dividend income on its cash reserves and investments around the globe. What’s more, Braeburn allows Apple to lower its taxes in other states because many of those jurisdictions use formulas that reduce what is owed when a company’s financial management occurs elsewhere.

 

While Apple’s Reno office helps the company avoid state taxes, its international subsidiaries – particularly the company’s assignment of sales and patent royalties to other nations – help reduce taxes owed to the US and other governments.

 

The Luxembourg subsidiary, named iTunes S.ar.l., has just a few dozen employees, according to corporate documents filed in that nation and an executive. But when customers across Europe, Africa or the Middle East – and potentially elsewhere – download a song, television show or app, the sale is recorded in this small country, present and former executives say.

 

In 2011, iTunes S.ar.l.’s revenue exceeded $US1 billion, an Apple executive said, representing about 20 per cent of iTunes’ worldwide sales.

 

Apple, say former executives, has been particularly talented at identifying legal tax loopholes.

 

Apple was a pioneer of an accounting technique known as the ”Double Irish with a Dutch Sandwich”, which reduced taxes by routing profits through two Irish subsidiaries – Apple Operations International and Apple Sales International – and the Netherlands and the Caribbean.

 

Without such tactics, Apple’s federal tax bill in the US would have been

$US2.4 billion higher last year, a recent study by a former Treasury Department economist, Martin Sullivan, said. As it stands, the company paid cash taxes of $US3.3 billion around the world on its reported profits of $US34.2 billion last year, a tax rate of 9.8 per cent.

 

Apple, in a statement, said it ”pays an enormous amount of taxes which help our local, state and federal governments. In the first half of fiscal year 2012, our US operations have generated almost $US5 billion in federal and state income taxes, including income taxes withheld on employee stock gains, making us among the top payers of US income tax”.

 

The New York Times

 

(6) Apple responds to tax criticism

 

http://news.cnet.com/8301-13579_3-57423874-37/apple-responds-to-tax-criticism-by-highlighting-job-creation/

 

Apple responds to tax criticism by highlighting job creation

 

Rebuttal comes in the wake of a report claiming the tech giant goes to great lengths to avoid paying billions of dollars in taxes.

 

by Steven Musil  April 29, 2012 12:25 PM PDT

 

Apple responded today to criticism the company goes to great lengths to cut its global tax bill by billions of dollars every year, trumpeting the “incredible number of jobs” it has created. The statement was in response to an in-depth report published yesterday by The New York Times that depicted Apple as a pioneer in developing ways to sidestep taxes and that companies seeking to do the same have used its methods as templates. “Apple serves as a window on how technology giants have taken advantage of tax codes written for an industrial age and ill-suited to today’s digital economy,” the Times reported.

 

In response, Apple said it was one of the biggest taxpayers in the U.S.

 

“Apple also pays an enormous amount of taxes which help our local, state and federal governments,” the company said in a statement printed by The New York Times. “In the first half of fiscal year 2012 our U.S.

operations have generated almost $5 billion in federal and state income taxes, including income taxes withheld on employee stock gains, making us among the top payers of U.S. income tax.” Apple also said its focus on innovation has created more than 500,000 jobs in the U.S. — “from the people who create components for our products to the people who deliver them to our customers.” Apple’s full statement:

 

Over the past several years, we have created an incredible number of jobs in the United States. The vast majority of our global work force remains in the U.S., with more than 47,000 full-time employees in all 50 states. By focusing on innovation, we’ve created entirely new products and industries, and more than 500,000 jobs for U.S. workers — from the people who create components for our products to the people who deliver them to our customers. Apple’s international growth is creating jobs domestically since we oversee most of our operations from California. We manufacture parts in the U.S. and export them around the world, and U.S.

developers create apps that we sell in over 100 countries. As a result, Apple has been among the top creators of American jobs in the past few years.

 

{Comment (Peter M.): Apple products are mainly made in China}

 

Apple also pays an enormous amount of taxes which help our local, state and federal governments. In the first half of fiscal year 2012 our U.S.

operations have generated almost $5 billion in federal and state income taxes, including income taxes withheld on employee stock gains, making us among the top payers of U.S. income tax.

 

We have contributed to many charitable causes but have never sought publicity for doing so. Our focus has been on doing the right thing, not getting credit for it. In 2011, we dramatically expanded the number of deserving organizations we support by initiating a matching gift program for our employees.

 

Apple has conducted all of its business with the highest of ethical standards, complying with applicable laws and accounting rules. We are incredibly proud of all of Apple’s contributions.

 

(7) Google was scooping up personal information from wi-fi users as its cars drove by

 

http://online.wsj.com/article/SB10001424052702304868004577374272894249402.html

 

Updated April 29, 2012, 8:03 p.m. ET

 

Google Engineer Told Others of Data Scoop

 

By AMIR EFRATI and DON CLARK

 

A Google Inc. GOOG -0.08% engineer told others at the company about his plan to scoop up personal information from wireless-network users as specially equipped cars drove by their homes, but the practice continued for two years after the internal disclosures, a Federal Communications Commission investigation found.

 

The engineer, whose name hasn’t been disclosed, explained his plans to other engineers and at least one senior manager involved with the project, known as Street View, in 2008, the FCC report states.

Nevertheless, it says, Street View managers told the agency they didn’t learn the Google cars were collecting the personal information until 2010.

 

Findings in the report bolster Google’s contention that the plan to gather the personal data—which included the contents of some emails and the Web addresses of sites users visited—was conceived by a single engineer. But it also suggests that Google might have been able to move faster to put a stop to the activity, which prompted apologies by the company and has helped fuel government scrutiny of its privacy safeguards.

 

A heavily redacted version of the report was released earlier this month. Google decided to release a nearly complete version of the report after the FCC concluded Google didn’t violate a U.S. law against wiretapping but said it obstructed the probe and must pay $25,000. The Los Angeles Times reported the findings in the document Saturday.

 

Google strongly denies impeding the probe.

 

“We decided to voluntarily make the entire document available except for the names of individuals,” a Google spokeswoman said. “While we disagree with some of the statements made in the document, we agree with the FCC’s conclusion that we did not break the law. We hope that we can now put this matter behind us.”

 

Google’s Street View project sent hundreds of vehicles to photograph city streets around the world so that people using Google Maps could see 360-degree images of the locations. An aspect of the project that wasn’t generally known at the time was Google’s collection of data about individual wireless networks, including those in people’s homes.

 

The data, among other things, has been used to help Google figure out the precise location of someone using a smartphone powered by the company’s Android software.

 

In April 2010, Google denied that it was collecting private data from Wi-Fi users, but it reversed itself the following month. It said it had learned that data had been collected from unprotected Wi-Fi networks and attributed the activity to a single Google engineer. “Quite simply, it was a mistake,” the company said in a blog post.

 

The FCC’s 25-page report, dated April 13, provides additional evidence that the plan to gather the data was intentional. It says the unnamed engineer wrote computer code to collect “payload data”—including personal email, text messages, passwords, Internet-usage history and other personal information that was moving through unencrypted Wi-Fi networks within range of the Street View vehicles between 2008 and 2010.

 

The engineer, the report said, believed such data could be useful to the company. The FCC report said the engineer wrote a “design document” for his work that listed as a “to do” item the need to discuss “privacy considerations” with a company lawyer, something the agency said never occurred. Google also said the information was never used.

 

Colleagues of the engineer claimed during the probe that they didn’t know about the practice despite the engineer’s disclosures, the report stated, but the agency provides evidence that at least one senior manager did talk with the engineer about it. An internal email recounted a conversation in which the engineer “openly discussed his review of payload data with a senior manager of the Street View project,” the report stated.

 

In an excerpt from an email, the manager asked the engineer: “Are you saying that these are URLs [Web addresses] that you sniffed out of Wifi packets that we recorded while driving?” The engineer confirmed the practice in a subsequent email.

 

The manager wasn’t named. The engineer has refused to testify in the probe, invoking the Fifth Amendment right against self-incrimination.

 

Since Google disclosed the controversial practice in 2010, it has faced scrutiny from foreign governments as well as U.S. state attorneys general, though so far it hasn’t faced major penalties. The company has been fined for allegedly violating privacy laws and has agreed to audits of its privacy practices.

 

U.S. and European regulators are now investigating how Google bypassed the privacy settings of millions of users of Apple Inc.’s AAPL -0.77% Safari Web browser, a practice that was discovered earlier this year. In that instance, Google used special computer code to install tracking files known as cookies on some people’s computers even if the device was set to block such tracking. Google says it has removed such “cookies”

and never collected personal data.

 

Write to Amir Efrati at amir.efrati@wsj.com and Don Clark at don.clark@wsj.com

 

(8) US Government wants to convict defendants on the basis of secret evidence – Paul Craig Roberts

 

http://www.globalresearch.ca/index.php?context=va&aid=30525

 

TRIALS WITHOUT CRIMES OR EVIDENCE

 

by Dr. Paul Craig Roberts

 

Global Research, April 25, 2012

 

Andy Worthington is a superb reporter who has specialized in providing the facts of the US government’s illegal abuse of “detainees,” against whom no evidence exists. ( http://www.andyworthington.co.uk/ ) In an effort to create evidence, the US government has illegally resorted to torture. Torture produces false confessions, plea bargains, and false testimony against others in order to escape further torture.

 

For these reasons, in Anglo-American law self-incrimination secured through torture has been impermissible evidence for centuries. So also has been secret evidence withheld from the accused and his attorney.

Secret evidence cannot be confronted. Secret evidence is distrusted as made-up in order to convict the innocent. The evidence is secret because it cannot stand the light of day.

 

The US government relies on secret evidence in its cases against alleged terrorists, claiming that national security would be threatened if the evidence were revealed. This is abject nonsense. It is an absurd claim that presenting evidence against a terrorist jeopardizes the national security of the United States.

 

To the contrary, not presenting evidence jeopardizes the security of each and every one of us. Once the government can convict defendants on the basis of secret evidence, even the concept of a fair trial will disappear. Fair trials are already history, but the concept lingers.

 

Secret evidence murders the concept of a fair trial. It murders justice and the rule of law. Secret evidence means anyone can be convicted of anything. As in Kafka’s The Trial, people will cease to know the crimes for which they are being tried and convicted.

 

This extraordinary development in Anglo-American law, a development demanded by the unaccountable Bush/Obama Regime, has not resulted in impeachment proceedings; nor has it caused an uproar from Congress, the federal courts, the presstitute media, law schools, constitutional scholars, and bar associations.

 

Having bought the government’s 9/11 conspiracy theory, Americans just want someone to pay. They don’t care who as long as someone pays. To accommodate this desire, the government has produced some “high value detainees” with Arab or Muslim names. But instead of bringing these alleged malefactors to trial and presenting evidence against them, the government has kept them in torture dungeons for years trying to create through the application of pain and psychological breakdown guilt by self-incrimination in order to create a case against them.

 

The government has been unsuccessful and has nothing that it can bring to a real court. So the Bush/Obama Regime created and recreated “military tribunals” to lend “national security” credence to the absolute need that non-existent evidence be kept secret.

 

Andy Worthington in his numerous reports does a good job in providing the history of the detainees and their treatment. He deserves our commendation and support. But what I want to do is to ask some questions, not of Worthington, but about the idea that the US is under terrorist threat.

 

By this September, 9/11 will be eleven years ago. Yet despite the War on Terror, the loss of Americans’ privacy and civil liberties, an expenditure of trillions of dollars on numerous wars, violations of US and international laws against torture, and so forth, no one has been held accountable. Neither the perpetrators nor those whom the perpetrators outwitted, assuming that they are different people, have been held accountable. Going on 11 years and no trials of villains or chastisement of negligent public officials. This is remarkable.

 

The government’s account of 9/11 implies massive failure of all US security and intelligence agencies along with those of our NATO puppets and Israel’s Mossad. The government’s official line also implies the failure of the National Security Council, NORAD and the US Air Force, Air Traffic Control, Airport Security four times in one hour on the same morning. It implies the failure of the President, the Vice President, the National Security Adviser, the Secretary of Defense.

 

Many on the left and also libertarians find this apparent failure of the centralized and oppressive government so hopeful that they cling to the official “government failure” explanation of 9/11. However, such massive failure is simply unbelievable. How in the world could the US have survived the cold war with the Soviets if the US government were so totally incompetent?

 

If we attribute superhero powers to the 19 alleged hijackers, powers in excess of V’s in V for Vendetta or James Bond’s or Captain Marvel’s, and assume that these young terrorists, primarily Saudi Arabians, outwitted Dick Cheney, Condi Rice, The Joint Chiefs of Staff, and Tony Blair, along with the CIA, FBI, MI5 and MI6, Mossad, etc., one would have expected for the President, Congress, and the media to call for heads to roll. No more humiliating affront has ever been suffered by a major power than the US suffered on 9/11. Yet, absolutely no one, not even some lowly traffic controller, was scapegoated and held accountable for what is considered to be the most extraordinarily successful terrorist attack in human history, an attack so successful that it implies total negligence across the totality of the US government and that of all its allies.

 

This just doesn’t smell right. Total failure and no accountability. The most expensively funded security apparatus the world has ever known defeated by a handful of Saudi Arabians. How can anyone in the CIA, FBI, NSA, NORAD, and National Security Council hold up their heads? What a disgraced bunch of jerks and incompetents. What do we need them for?

 

Consider the alleged hijackers. Despite allegedly being caught off guard by the 9/11 attacks, the FBI was soon able to identify the 19 hijackers despite the fact that apparently none of the alleged hijackers’ names are on the passenger lists of the airliners that they allegedly hijacked.

 

How did 19 passengers get on airplanes in the US without being on the passenger lists?

 

I do not personally know if the alleged hijackers were on the four airliners. Moreover, defenders of the official 9/11 story claim that the passenger lists released to the public were “victims lists,” not passenger lists, because the names of the hijackers were withheld and only released some four years later after 9/11 researchers had had years in which to confuse victims lists with passenger lists. This seems an odd explanation. Why encourage public misinformation for years by withholding the passenger lists and issuing victims lists in their place? It cannot have been to keep the hijackers’ names a secret as the FBI released a list of the hijackers several days after 9/11. Even more puzzling, if the hijackers’ names were on the airline passenger lists, why did it take the FBI several days to confirm the names and numbers of hijackers?

 

Researchers have found contradictions in the FBI’s accounts of the passenger lists with the FBI adding and subtracting names from its various lists and some names being misspelled, indicating possibly that the FBI doesn’t really know who the person is. The authenticity of the passenger lists that were finally released in 2005 is contested, and the list apparently was not presented as evidence by the FBI in the Moussaoui trial in 2006. David Ray Griffin has extensively researched the 9/11 story. In one of his books, 9/11 Ten Years Later, Griffin

writes: “Although the FBI claimed that it had received flight manifests from the airlines by the morning of 9/11, the ‘manifests’ that appeared in 2005 had names that were not known to the FBI until a day or more after 9/11. These 2005 ‘manifests,’ therefore, could not have been the original manifests for the four 9/11 flights.”

 

The airlines themselves have not been forthcoming. We are left with the mystery of why simple and straightforward evidence, such as a list of passengers, was withheld for years and mired in secrecy and controversy.

 

We have the additional problem that the BBC and subsequently other news organizations established that 6 or 7 of the alleged hijackers on the FBI’s list are alive and well and have never been part of any terrorist plot.

 

These points are not even a beginning of the voluminous reasons that the government’s 9/11 story looks very thin.

 

But the American public, being throughly plugged into the Matrix, are not suspicious of the government’s thin story. Instead, they are suspicious of the facts and of those experts who are suspicious of the government’s story. Architects, engineers, scientists, first responders, pilots, and former public officials who raise objections to the official story are written off as conspiracy theorists. Why does an ignorant American public think it knows more than experts? Why do Americans believe a government that told them the intentional lie that Saddam Hussein had weapons of mass destruction despite the fact that the weapons inspectors reported to President Bush that Hussein had no such weapons? And now we see the same thing all over again with the alleged, but non-existent, Iranian nukes.

 

As Frantz Fanon wrote, the power of cognitive dissonance is extreme. It keeps people comfortable and safe from threatening information. Most Americans find the government’s lies preferable to the truth. They don’t want to be unplugged from the Matrix. The truth is too uncomfortable for emotionally and mentally weak Americans.

 

Worthington focuses on the harm being done to detainees. They have been abused for much of their lives. Their innocence or guilt cannot be established because the evidence is compromised by torture, self-incrimination, and coerced testimony against others. They stand convicted by the government’s accusation alone. These are real wrongs, and Worthington is correct to emphasize them.

 

In contrast, my focus is on the harm to America, on the harm to truth and truth’s power, on the harm to the rule of law and accountability to the people of the government and its agencies, on the harm to the moral fabric of the US government and to liberty in the United States.

 

(9) The homeland security state has come to campus

 

From: “Sadanand, Nanjundiah (Physics Earth Sciences)”

<sadanand@mail.ccsu.edu> Date: Fri, 27 Apr 2012

 

Homeland Security Goes to College

 

How college campuses became a Homeland Security battleground.

 

-By Michael Gould-Wartofsky,Thu Mar. 22, 2012 , Mother Jones

 

http://www.motherjones.com/politics/2012/03/homeland-security-college-campus-crackdown-occupy

 

Campus spies. Pepper spray. SWAT teams. Twitter trackers. Biometrics.

Student security consultants. Professors of homeland security studies.

Welcome to Repress U, class of 2012.

 

Since 9/11, the homeland security state has come to campus just as it has come to America’s towns and cities, its places of work and its houses of worship, its public space and its cyberspace. But the age of (in)security had announced its arrival on campus with considerably less fanfare than elsewhere – until, that is, the “less lethal” weapons were unleashed in the fall of 2011.

 

Today, from the City University of New York to the University of California, students increasingly find themselves on the frontlines, not of a war on terror, but of a war on “radicalism” and “extremism.” Just about everyone from college administrators and educators to law enforcement personnel and corporate executives seems to have enlisted in this war effort. Increasingly, American students are in their sights. …

 

(10) Counterattack against the democratic “excesses” of the 1960s movement

 

http://www.globalresearch.ca/index.php?context=va&aid=30466

 

“Global Spying”. Washington’s “Weaponized Data” System

 

by Tom Burghardt

 

Global Research, April 23, 2012

 

From driftnet surveillance to data mining and link analysis, the secret state has weaponized our data, “criminal evidence, ready for use in a trial,” as Cryptohippie famously warned.

 

No longer the exclusive domain of intelligence agencies, a highly-profitable Surveillance-Industrial Complex emerged in the 1980s with the deployment of the NSA-GCHQ ECHELON intercept system. As investigate journalist Nicky Hager revealed in CovertAction Quarterly back in 1996:

 

The ECHELON system is not designed to eavesdrop on a particular individual’s e-mail or fax link. Rather, the system works by indiscriminately intercepting very large quantities of communications and using computers to identify and extract messages of interest from the mass of unwanted ones. A chain of secret interception facilities has been established around the world to tap into all the major components of the international telecommunications networks. Some monitor communications satellites, others land-based communications networks, and others radio communications. ECHELON links together all these facilities, providing the US and its allies with the ability to intercept a large proportion of the communications on the planet.

 

With the exponential growth of fiber optic and wireless networks, the mass of data which can be “mined” for “actionable intelligence,”

covering everything from eavesdropping on official enemies to blanket surveillance of dissidents is now part of the landscape: no more visible to the average citizen than ornamental shrubbery surrounding a strip mall.

 

That process will become even more ubiquitous. As James Bamford pointed out in Wired Magazine, “the Pentagon is attempting to expand its worldwide communications network, known as the Global Information Grid, to handle yottabytes (10 to the 24th bytes) of data. (A yottabyte is a septillion bytes–so large that no one has yet coined a term for the next higher magnitude.)”

 

“It needs that capacity because, according to a recent report by Cisco, global Internet traffic will quadruple from 2010 to 2015,” Bamford reported, “reaching 966 exabytes per year. (A million exabytes equal a

yottabyte.) … Thus, the NSA’s need for a 1-million-square-foot data storehouse. Should the agency ever fill the Utah center with a yottabyte of information, it would be equal to about 500 quintillion

(500,000,000,000,000,000,000) pages of text.”

 

A former top NSA official turned whistleblower, William Binney, who resigned in 2001 shortly after the agency stood-up the Bush regime’s warrantless wiretapping programs (now greatly expanded under Hope and Change™ huckster Barack Obama), “held his thumb and forefinger close together” and told Bamford, “We are that far from a turnkey totalitarian state.”

 

Last week, Binney said on Democracy Now when queried whether there were any differences between the Bush and Obama administrations, “Actually, I think the surveillance has increased. In fact, I would suggest that they’ve assembled on the order of 20 trillion transactions about U.S.

citizens with other U.S. citizens.”

 

Add to that the Transportation Security Administration’s invasion of “travel by other means,” as Jennifer Abel pointed out in The Guardian, through the agency’s usurpation of “jurisdiction over all forms of mass transit,” and it should be clear to Americans (though it isn’t) that there is no way of escaping the secret state’s callous trampling of our rights.

 

Commenting, Salon’s Glenn Greenwald pointed out that the “domestic NSA-led Surveillance State which Frank Church so stridently warned about has obviously come to fruition.”

 

“The way to avoid its grip is simply to acquiesce to the nation’s most powerful factions, to obediently remain within the permitted boundaries of political discourse and activism.”

 

“Accepting that bargain,” Greenwald noted, “enables one to maintain the delusion of freedom–‘he who does not move does not notice his chains,’

observed Rosa Luxemburg–but the true measure of political liberty is whether one is free to make a different choice.”

 

But in a militarized Empire such as ours the only “choice” is to shut up, keep your head down–or else.

 

‘Lower Your Shields and Surrender Your Ships’

 

Militarist solutions to intractable social contradictions, the oft-maligned class struggle, do not appear out of the blue. Indeed, NSA’s ECHELON system, the template for STELLAR WIND and the agency’s associated email and web search database known as PINWALE, were technological responses by Western elites to challenges posed by the “excess of democracy” decried by Samuel Huntington and his cohorts in The Crisis of Democracy, published by the Rockefeller-funded Trilateral Commission..

 

Social critic Andrew Gavin Marshall observed that for Huntington and the right-wing ideologues who mounted an intellectual counterattack against the democratic “excesses” of the 1960s, the “massive wave of resistance, rebellion, protest, activism and direct action by entire sectors of the general population which had for decades, if not centuries, been largely oppressed and ignored by the institutional power structure of society,”

were “terrifying.”

 

Fast forward to today. As the global economic crisis deepens and hundreds of millions of people worldwide reject the “austerity”

boondoggles of the financial sharks who brought on the crisis through massive frauds disguised as “investment opportunities,” our corporatist masters are fighting back and have turned to police state methods to prop-up their illegitimate rule.

 

Nor should it surprise us, as George Ciccariello-Maher pointed out in CounterPunch in the wake of last summer’s London “riots,” a mass response to police murder (coming soon to an “urban exclusion zone” near

you!): “Irrational, uncontrollable, impermeable to logic and unpredictable in its movements, these undesirables have once again ruined the party for everyone, as they have done from Paris 1789 to Caracas 1989. In Fanon’s inimitable words: ‘the masses, without waiting for the chairs to be placed around the negotiating table, take matters into their own hands and start burning…'”

 

Call it the great fear of those lording it over the slaves down on the global plantation!

 

Combining attributes of Jeremy Bentham’s “Panopticon” and George Orwell’s ubiquitous “Big Brother,” the National Security State, as it works to stave-off its own well-deserved collapse, seeks to root out and marginalize “dangerous” individuals and ideologies thereby “inoculating”

the body politic from what were euphemistically called in the halcyon days of J. Edgar’s COINTELPRO operations, “subversive elements.”

 

It matters little whether today’s “usual suspects” are landless peasants, displaced workers, investigative journalists, civil libertarians or innocent citizens mistakenly caught in one dragnet or

another: “threats” will be “neutralized” or more pointedly, in the evocative language employed by spooks: “Terminated with extreme prejudice.”

 

Operating alongside tried and methods–police repression and violence–contemporary crackdowns are guided by “robust situational awareness” gleaned from the wealth of personal data stored on multiple digital devices (the spies in our pockets) and in huge databases. As Cryptohippie averred: “An electronic police state is quiet, even unseen.

All of its legal actions are supported by abundant evidence. It looks pristine.”

 

“When we produced our first Electronic Police State report,” the privacy professionals wrote, “the top ten nations were of two types:

 

1. Those that had the will to spy on every citizen, but lacked ability.

 

2. Those who had the ability, but were restrained in will.

 

But as they revealed in their 2010 National Rankings, “This is changing:

The able have become willing and their traditional restraints have failed.” The key developments driving the global panopticon forward are the following:

 

• The USA has negated their Constitution’s fourth amendment in the name of protection and in the name of “wars” against terror, drugs and cyber attacks.

 

• The UK is aggressively building the world of 1984 in the name of stopping “anti-social” activities. Their populace seems unable or unwilling to restrain the government.

 

• France and the EU have given themselves over to central bureaucratic control. …

 

 

 

Peter Myers

381 Goodwood Rd

Childers Qld 4660

Australia

ph. in Australia: 07 41262296

from overseas: +61 7 41262296

website: http://mailstar.net/index.html

Skype Name: petermyersaus . Or search for Peter Gerard Myers

To unsubscribe, reply with “Unsubscribe” in the Subject line. Allow one day.

, ,

No comments yet.

Leave a Reply

Intronizacja
Optimization WordPress Plugins & Solutions by W3 EDGE