New Haven Register, Kreig's 'Presidential Puppetry' gives road map to master manipulators, Andy Thibault, Dec. 31, 2013. Andrew Kreig covered federal courts in the 1970s for The Hartford Courant. Kreig went on to earn law degrees from Yale and the University of Chicago and now runs an investigative reporting non-profit in Washington, D.C., the Justice Integrity Project. The organization reports on political prosecutions and official misconduct. Kreig broke the story of how President-elect Obama’s transition team feared a revolt if the new commander in chief pushed prosecution of CIA officials for torture and other crimes. “Presidential Puppetry” documents how Obama is among all recent U.S. presidents who have fostered confidential relationships with the CIA or FBI before they entered politics. For example, Obama’s first job out of college was for Business International Corporation, revealed by The New York Times as a CIA front.
Torrington Register-Citizen, Kreig's 'Presidential Puppetry' gives road map to master manipulators, Andy Thibault, Dec. 31, 2013. http://www.registercitizen.com/opinion/20131231/cool-justice-kreigs-presidential-puppetry-gives-road-map-to-master-manipulators
Middletown Press, Kreig's 'Presidential Puppetry' gives road map to master manipulators, Andy Thibault, Dec. 31, 2013,
Huffington Post, Glenn Greenwald: Ruth Marcus Exemplifies 'Horrible' D.C. Media, Jan 2, 2014. Glenn Greenwald went head-to-head with The Washington Post's Ruth Marcus on Thursday during a debate about whether Edward Snowden should be granted clemency. The New York Times and the Guardian recently made headlines after arguing that Snowden — who leaked revelations about the NSA's secret domestic security programs to former Guardian columnist Greenwald, as well as The Washington Post — should be granted some form of clemency. On Thursday, Marcus told CNN's Jake Tapper that she disagreed. "If he really believes in the Constitution, as I wrote, he should have stuck around, tested the constitutional system, taken his punishment, argued that he was justified in the leaks that he did," she said. Greenwald pushed back strongly. "I think Ruth Marcus' argument exemplifies everything that's horrible about the D.C. media," he said, speaking via satellite from Brazil. He said that her statement was "completely factually false" and that Snowden "would have been barred" from making his case to the public had he stayed in the U.S. Greenwald continued: "The really important point is that people in Washington continuously make excuses for those in power when they break the law. They only pick on people who embarrass the government and the administration to which they are loyal, like Edward Snowden. It's not about the rule of law."
New Haven Register, Kreig’s ‘Presidential Puppetry’ gives road map to master manipulators, Andy Thibault, Dec. 31, 2013. Andrew Kreig covered federal courts in the 1970s for The Hartford Courant. Kreig seemed like he knew what he was doing, so I followed him around for a bit. The guy wore a nice suit, white shirt and a skinny tie. He was well over six-feet tall and trim. He moved swiftly and deliberately. I learned some time later he had been a boxer at Cornell, reaching the heavyweight finals of the Niagara Region AAU Golden Gloves. In federal court, the clerks and even the judges were friendly to him. I didn’t know what I was doing, but that didn’t really matter. I was a cub reporter for the Norwich paper, and most days started that way. By the end of the day, I was sort of supposed to know what I was doing. His reporting on the 2008 and 2012 elections inspired him to probe who really pulls the strings in Washington. The result is a most provocative book, “Presidential Puppetry: Obama, Romney and Their Masters.” Kreig broke the story of how President-elect Obama’s transition team feared a revolt if the new commander in chief pushed prosecution of CIA officials for torture and other crimes. “Presidential Puppetry” documents how Obama is among all recent U.S. presidents who have fostered confidential relationships with the CIA or FBI before they entered politics. For example, Obama’s first job out of college was for Business International Corporation, revealed by The New York Times as a CIA front.
FireDogLake, The Partisan Fact Divide, Jon Walker, Dec. 30, 2013. I think this statistic is both fascinating and very informative about the current state of politics. Significantly fewer Republicans now believe in evolution than did in 2009. On the other hand more Democrats now believe in evolution. From Pew Research: "There is not just growing ideological disagreement between the parties about how to solve problems, there is a growing divide about what are the basic facts are. Finding compromise when you don’t even share the same concept of reality becomes very difficult." I suspect a big driver of this change is that the parties are continuing to sort themselves. We are not just seeing few moderate Republicans in Congress, we are also seeing fewer regular people who see themselves as both moderate and Republican. This is important as partisan primaries are becoming the big election in more districts.
Huffington Post, NSA Uses Windows Error Messages To Spy On People, Staff via wire reports, Dec. 30, 2013. Error messages on Microsoft's Windows operating system may also serve as a way for the National Security Agency to spy on you. When a Windows program seizes up, someone using a PC can choose to send an error report to Microsoft for review. But Windows owners may inadvertently be sending those error reports to the NSA too, according to a report on Sunday by German magazine Der Spiegel detailing the work of the Tailored Access Operations division of the NSA, which is considered the agency's top hacking unit. The revelations come from the latest document leaks of former NSA contractor Edward Snowden. An NSA presentation obtained by Der Spiegel noted that the crash reports are a "neat way" to gain "passive access" to a machine. The team can use the NSA's massively powerful sleuthing software to cherry-pick error reports from the global stream of Internet traffic. Only data sent from a computer can be collected this way, but it can give the NSA something crucial for further hacking: the vulnerabilities of a target's computer. Like other tech companies, Microsoft has been in a tough position since Snowden's leaks began. A report from The Guardian in July found that the company may have handed the NSA access to the customers' encrypted messages and data. In recent months, Microsoft has attempted to assuage fears of government surveillance by fighting against any attempt by U.S. intelligence agencies to seize its foreign customers' data under American surveillance laws. "Microsoft does not provide any government with direct or unfettered access to our customer's data," a Microsoft representative said in response to the latest allegations. "We would have significant concerns if the allegations about government actions are true."
FireDogLake, NSA and Corporate Cooperation Revealed, Peter Van Buren, left, Dec. 30, 2013. The NSA is able to divert computer equipment being delivered to you via major carriers in order to install malware spying software first The latest NSA revelations reveal deeper and more insidious intrusions into our lives, and show deeper collusion between the government and private enterprise. If you really, really think this is OK because you have “nothing to hide,” you better be damn sure that’s the case. It is now apparent that the NSA co-opted nearly every piece of electronics present in our lives. Der Spiegel reports that the NSA has found ways to slither through most firewalls and work around most security systems. This dirty work is done primarily via malware, computer code created by the NSA that is implanted in the targeted device to do the NSA’s bidding. This malware most commonly creates a “back door,” a new, hidden pathway into some computer system. We also learn that the NSA, which only recently used the American TV news magazine “60 Minutes” to warn about a new form of Chinese cyberattack, actually employs the very same technique.
OpEdNews, The Rob Kall Bottom Up Radio Show, Interview of Andrew Kreig, Presidential Puppetry author, broadcast Nov. 20, 2013.
Washington Post, Snowden says spying worse than Orwellian, Griff Witte, Dec. 25, 2013. In Christmas video, the NSA whistleblower says government surveillance has destroyed privacy.
New York Times, TV Message by Snowden Says Privacy Still Matters, Channel 4, Stephen Castle, Dec. 25, 2013. In a message broadcast Wednesday on British television, Edward J. Snowden, the former American security contractor, urged an end to mass surveillance, arguing that the electronic monitoring he has exposed surpasses anything imagined by George Orwell in “1984,” a dystopian vision of an all-knowing state. “A child born today will grow up with no conception of privacy at all,” Mr. Snowden said in a Christmas Day message shown by Channel 4. “They’ll never know what it means to have a private moment to themselves — an unrecorded, unanalyzed thought.”
Washington Post, Sledgehammer justice Sledgehammer justice, George F. Will, Dec. 25, 2013. How the goverment uses mandatory minimum sentences to gut constitutional rights.
Washington Post, If not the NSA, who should store the phone data? Ellen Nakashima, Dec. 25, 2013. A measure that President Obama is considering as a way to curb the National Security Agency’s mass storage of phone data is already facing resistance — not only from the intelligence community but also from privacy advocates, the phone industry and some lawmakers. Obama last week suggested that he was open to the idea of requiring phone companies to store the records and allowing the government to search them under strict guidelines. Currently, the agency stores those records itself, part of a sprawling collection program that came to light through documents shared by former NSA contractor Edward Snowden.
Washington Post, A ‘Front-Page Rule’ is unprecedented in U.S. intelligence, Walter Pincus, Dec. 25, 2013. Presidential panel suggests covert activity shouldn’t be undertaken if the public couldn’t support it if exposed.