More than Half of Immigrants on Welfare

Contrary to declaration from the White House:

How do immigrants strengthen the U.S. economy? Below is our top 10 list for ways immigrants help to grow the American economy.

  1. Immigrants start businesses. According to the Small Business Administration, immigrants are 30 percent more likely to start a business in the United States than non-immigrants, and 18 percent of all small business owners in the United States are immigrants.
  2. Immigrant-owned businesses create jobs for American workers. According to the Fiscal Policy Institute, small businesses owned by immigrants employed an estimated 4.7 million people in 2007, and according to the latest estimates, these small businesses generated more than $776 billion annually.
  3. Immigrants are also more likely to create their own jobs. According the U.S. Department of Labor, 7.5 percent of the foreign born are self-employed compared to 6.6 percent among the native-born.
  4. Immigrants develop cutting-edge technologies and companies.  According to the National Venture Capital Association, immigrants have started 25 percent of public U.S. companies that were backed by venture capital investors. This list includes Google, eBay, Yahoo!, Sun Microsystems, and Intel.
  5. Immigrants are our engineers, scientists, and innovators. According to the Census Bureau, despite making up only 16 percent of the resident population holding a bachelor’s degree or higher, immigrants represent 33 percent of engineers, 27 percent of mathematicians, statisticians, and computer scientist, and 24 percent of physical scientists. Additionally, according to the Partnership for a New American Economy, in 2011, foreign-born inventors were credited with contributing to more than 75 percent of patents issued to the top 10 patent-producing universities.
  6. Immigration boosts earnings for American workers. Increased immigration to the United States has increased the earnings of Americans with more than a high school degree. Between 1990 and 2004, increased immigration was correlated with increasing earnings of Americans by 0.7 percent and is expected to contribute to an increase of 1.8 percent over the long-term, according to a study by the University of California at Davis.
  7. Immigrants boost demand for local consumer goods. The Immigration Policy Center estimates that the purchasing power of Latinos and Asians, many of whom are immigrants, alone will reach $1.5 trillion and $775 billion, respectively, by 2015.
  8. Immigration reform legislation like the DREAM Act reduces the deficit.  According to the nonpartisan Congressional Budget Office, under the 2010 House-passed version of the DREAM Act, the federal deficit would be reduced by $2.2 billion over ten years because of increased tax revenues.
  9. Comprehensive immigration reform would create jobs. Comprehensive immigration reform could support and create up to 900,000 new jobs within three years of reform from the increase in consumer spending, according to the Center for American Progress.
  10. Comprehensive immigration reform would increase America’s GDP.The nonpartisan Congressional Budget Office found that even under low investment assumptions, comprehensive immigration reform would increase GDP by between 0.8 percent and 1.3 percent from 2012 to 2016.

Report: More than half of immigrants on welfare

USA Today: More than half of the nation’s immigrants receive some kind of government welfare, a figure that’s far higher than the native-born population’s, according to a report to be released Wednesday.

About 51% of immigrant-led households receive at least one kind of welfare benefit, including Medicaid, food stamps, school lunches and housing assistance, compared to 30% for native-led households, according to the report from the Center for Immigration Studies, a group that advocates for lower levels of immigration.

Those numbers increase for households with children, with 76% of immigrant-led households receiving welfare, compared to 52% for the native-born.

The findings are sure to fuel debate on the presidential campaign trail as Republican candidates focus on changing the nation’s immigration laws, from calls for mass deportations to ending birthright citizenship.

Steven Camarota, director of research at the center and author of the report, said that’s a much-needed conversation to make the country’s immigration system more “selective.”

“This should not be understood as some kind of defect or moral failing on the part of immigrants,” Camarota said about the findings. “Rather, what it represents is a system that allows a lot of less-educated immigrants to settle in the country, who then earn modest wages and are eligible for a very generous welfare system.”

Linda Chavez agrees with Camarota that the country’s welfare system is too large and too costly. But Chavez, a self-professed conservative who worked in President Reagan’s administration, said it’s irresponsible to say immigrants are taking advantage of the country’s welfare system any more than native-born Americans.

Chavez said today’s immigrants, like all other immigrant waves in the country’s history, start off poorer and have lower levels of education, making it unfair to compare their welfare use to the long-established native-born population. She said immigrants have larger households, making it more likely that one person in that household will receive some kind of welfare benefit. And she said many benefits counted in the study are going to U.S.-born children of immigrants, skewing the findings even more.

“When you take all of those issues into account, (the report) is less worrisome,” she said.

Chavez, president of the Becoming American Institute, a conservative group that advocates for higher levels of legal immigration to reduce illegal immigration, said politicians should be careful about using the data. Rather than focus on the fact that immigrants are initially more dependent on welfare than the U.S.-born, she said they should focus on studies that show what happens to the children of those immigrants.

“These kids who get subsidized school lunches today will go on to graduate high school … will go on to college and move up to the middle class of America,” Chavez said. “Every time we have a nativist backlash in our history, we forget that we see immigrants change very rapidly in the second generation.”

The center’s report is based on 2012 data from the Census Bureau’s Survey of Income and Program Participation. It includes immigrants who have become naturalized citizens, legal permanent residents, those on short-term visas and undocumented immigrants.

Camarota said one of the most shocking findings from the report was the high number of native-born Americans also on welfare. About 76% of immigrant households with children are on welfare, but so are 52% of native-born households with children.

“Most people have a sense that if you were to work for $10 an hour, 40 hours a week, you couldn’t be receiving welfare, could you? You couldn’t be living in public housing, could you?” he said. “The answer is yes, you can. That’s one of the most surprising things about this study.”

Other findings in the report:

  • Immigrants are more likely to be working than their native-born neighbors. The report found that 87% of immigrant households had at least one worker, compared to 76% for native households.
  • The majority of immigrants using welfare come from Central America, Mexico and the Caribbean. The use of welfare is lower for immigrants from East Asia (32%), Europe (26%) and South Asia (17%).
  • Immigrants who have been in the U.S. more than 20 years use welfare less often, but their rates remain higher than native-born households.
  • If you need some immigration advice, contact a team of immigration lawyers who will help you out.

 

Hillary Server-Gate Operative Pleas 5th?

From this blog in an earlier post, I mentioned Brain Pagliano and he is in the news again today. Wait for it…..he is fending off a subpoena and will likely plea the Constitutional protection of the 5th Amendment. Will Hillary take down the White House?

Staffer who worked on Clinton’s private e-mail server faces subpoena

Washington Post: A former State Department staffer who worked on Hillary Rodham Clinton’s private e-mail server this week tried to fend off a subpoena to testify before Congress, saying he would assert his constitutional right not to answer questions to avoid incriminating himself.

The move by Bryan Pagliano, who had worked on Clinton’s 2008 presidential campaign before setting up the server in her New York home in 2009, came in a Monday letter from his lawyer to the House panel investigating the 2012 attack on the U.S. consulate in Benghazi, Libya.

The letter cited the ongoing FBI inquiry into the security of Clinton’s e-mail system, and it quoted a Supreme Court ruling in which justices described the Fifth Amendment as protecting “innocent men . . . who otherwise might be ensnared by ambiguous circumstances.’ ”

The FBI is investigating whether Clinton’s system — in which she exclusively used private e-mail for her work as secretary of state — may have jeopardized sensitive national security information.

Thousands of e-mails that have been released by the State Department as part of a public records lawsuit show Clinton herself writing at least six e-mails containing information that has since been deemed classified. Large portions of those e-mails were redacted before their release, on the argument that their publication could harm national security.

“While we understand that Mr. Pagliano’s response to this subpoena may be controversial in the current political environment, we hope that the members of the Select Committee will respect our client’s right to invoke the protections of the Constitution,” his attorney, Mark MacDougall, wrote.

Two other Senate committees also have contacted Pagliano in the past week, according to a copy of the letter, which was obtained by The Washington Post. The requests came from the Senate Judiciary Committee and the Homeland Security Committee, according to people familiar with the requests.

The Senate Judiciary Committee confirmed Wednesday that it sought to ask Pagliano about his work for Clinton.

“In response to questions . . . Mr. Pagliano’s legal counsel told the committee yesterday that he would plead the Fifth to any and all questions if he were compelled to testify,” a spokesperson for committee Chairman Charles E. Grassley (R-Iowa) said in a statement.

Rep. Trey Gowdy (R-S.C.), the chairman of the House Benghazi committee, had subpoenaed the computer staffer Aug. 11 and ordered that he appear for questioning before the committee Sept. 10. Gowdy also demanded that Pagliano provide documents related to the servers or systems controlled or owned by Clinton from 2009 to 2013.

Pagliano, who worked in the State Department’s information-technology department from May 2009 until February 2013, left the agency when Clinton departed as secretary. He now works for a technology contractor that provides some services to the State Department.

The committee’s ranking Democrat, Rep. Elijah Cummings (D-Md.), complained yesterday that Gowdy unilaterally issued the subpoena. He said the subpoena of a low-level aide is one of several signs that Gowdy is using the committee for the political purpose of trying to smear a Democratic presidential candidate.

“Although multiple legal experts agree there is no evidence of criminal activity, it is certainly understandable that this witness’s attorneys advised him to assert his Fifth Amendment rights, especially given the onslaught of wild and unsubstantiated accusations by Republican presidential candidates, members of Congress and others based on false leaks about the investigation,” Cummings said. “Their insatiable desire to derail Secretary Clinton’s presidential campaign at all costs has real consequences for any serious congressional effort.”

MacDougall declined to comment late Wednesday evening.

Will Hillary Clinton’s Emails Burn the White House?

DailyBeast: Counterintelligence specialists suspect that the former Secretary of State wasn’t the only member of the Obama administration emailing secrets around.
Hillary Clinton’s email problems are already causing headaches for her presidential campaign. But within American counterintelligence circles, there’s a mounting sense that the former Secretary of State may not be the only Obama administration official in trouble. This is a scandal that has the potential to spread to the White House, as well.

The Federal Bureau of Investigation can be expected to be tight-lipped, especially because this highly sensitive case is being handled by counterintelligence experts from Bureau headquarters a few blocks down Pennsylvania Avenue from the White House, not by the FBI’s Washington Field Office. That will ensure this investigation gets the needed “big picture” view, since even senior FBI agents at any given field office may only have a partial look at complex counterintelligence cases.

And this most certainly is a counterintelligence matter. There’s a widely held belief among American counterspies that foreign intelligence agencies had to be reading the emails on Hillary’s private server, particularly since it was wholly unencrypted for months. “I’d fire my staff if they weren’t getting all this,” explained one veteran Department of Defense counterintelligence official, adding: “I’d hate to be the guy in Moscow or Beijing right now who had to explain why they didn’t have all of Hillary’s email.” Given the widespread hacking that has plagued the State Department, the Pentagon, and even the White House during Obama’s presidency, senior counterintelligence officials are assuming the worst about what the Russians and Chinese know.

EmailGate has barely touched the White House directly, although it’s clear that some senior administration officials beyond the State Department were aware of Hillary’s unorthodox email and server habits, given how widely some of the emails from Clinton and her staff were forwarded around the Beltway. Obama’s inner circle may not be off-limits to the FBI for long, however, particularly since the slipshod security practices of certain senior White House officials have been a topic of discussions in the Intelligence Community for years.

Hillary Clinton was far from the only senior Obama appointee to play fast and loose with classified materials, according to Intelligence Community insiders. While most counterspies agree that Hillary’s practices—especially using her own server and having her staffers place classified information into unclassified emails, in violation of Federal law—were especially egregious, any broad-brush investigation into security matters are likely to turn up other suspects, they maintain.

“The whole administration is filled with people who can’t shoot straight when it comes to classified,” an Intelligence Community official explained to me this week. Three U.S. officials suggested that Susan Rice, the National Security Adviser, might be at particular risk if a classified information probe goes wide. But it should be noted that Rice has made all sorts of enemies on the security establishment for her prickly demeanor, use of coarse language, and  strategic missteps.

However, Clinton should take no comfort from the fact that others may be in trouble with the FBI too. Just how many of her “unclassified” emails were actually classified is a matter of dispute that will take months for the FBI to resolve with assistance from the State Department and Intelligence Community. The current figure bandied about, that something like 300 of the emails scanned to date by investigators contained information that should have been marked as classified, is somewhat notional at this point, not least because the Intelligence Community has yet to weigh in on most of them.

Spy agencies typically take a harder line on classification than the State Department does, including a tendency to retroactively mark as classified mundane things—for instance press reports that comment on security matters can be deemed secret—that other, less secrecy-prone agencies might not. That said, there’s little doubt that our intelligence agencies fear that the compromise engendered by Hillary’s email slipshod practices was significant.

Although it will be months before intelligence agencies have reviewed all Clinton emails, counterintelligence officials expect that the true number of classified emails on Hillary’s servers is at least many hundreds and perhaps thousands, based on the samplings seen to date.

Excuses that most of the classified emails examined to date are considered Confidential, which is the lowest level, cut no ice with many insiders. Although the compromise of information at that level is less damaging than the loss of Secret—or worse Top Secret—information, it is still a crime that’s taken seriously by counterintelligence professionals. Most of the classified that Hillary and her staff seem to have compromised dealt with diplomatic discussions, which is a grave indiscretion as far as diplomats worldwide are concerned.

“Of course they knew what they were doing, it’s a clear as day from the emails,” opined one senior official who is close to the investigation. “I’m a Democrat and this makes me sick. They were fully aware of what they were up to, and the Bureau knows it.” That Hillary and her staff at Foggy Bottom were wittingly involved in a scheme to place classified information into ostensibly unclassified emails to reside on Clinton’s personal, private server is the belief of every investigator and counterintelligence official I’ve spoken with recently, and all were at pains to maintain that this misconduct was felonious.

It’s clear that many people inside the State Department had to be aware, at least to some degree, of what Clinton and her inner staff were engaged in. How far that knowledge went is a key question that the FBI is examining. The name Patrick Kennedy pops up frequently. A controversial character, Kennedy is the State Department’s undersecretary for management (hence his Foggy Bottom nickname “M”). A longtime Clinton protégé, Kennedy is believed by many to be the key to this case, since his sign-off likely would have been needed for some of Clinton’s unorthodox arrangements.

 

Russian Connection with Julian Assange, WikiLeaks and OPM?

Pvt. Bradley Manning describes as noted by Gawker in part:

The story begins with Manning’s own disillusionment with U.S. foreign policy and its wars, sparked by his wide-ranging research as an analyst. “I began to become depressed with the situation that we found ourselves increasingly mired in year after year,” he said. He wanted to give the public access to some of the same information he had seen, so they might come to a similar conclusion. Manning said he leaked a massive database of incident reports from Iraq and Afghanistan because he believed they might “spark a domestic debate on the role of the military and our foreign policy in general as it relates to Iraq and Afghanistan.” He hoped people who saw the dramatic video of a 2007 Apache helicopter strike in Iraq he leaked would be outraged by the “delightful bloodlust” of the pilots. The U.S. State Department cables he gave to Wikileaks detailed shady deals and backroom intimidation and were “a prime example of a need for a more open diplomacy.” 

But Manning’s ideas and actions did not develop in a vacuum. In walking us through the genesis of and rationale behind each leak, Manning’s statement emphasizes they were not hit-and-run jobs. Wikileaks plays a pivotal role in this story, and not just as a passive leaking “platform.” As Manning tells it, his relationship with Wikileaks was not unlike the relationship between a traditional journalist and their source. Manning said he was originally drawn to Wikileaks after their release in 2009 of half a million pager messages from 9/11. In January, 2010, Manning joined a chatroom linked on Wikileaks’ official site out of curiosity. He wanted to know how Wikileaks got the pager messages. “I am the type of person who likes to know how things work,” he said in his statement. “And, as an analyst, this means I always want to figure out the truth.”

Over the years I’ve periodically visited that same, now-defunct chatroom to try to figure out how Wikileaks works. Whenever I dropped by it seemed pretty dead, a few Wikileaks fanboys idling during the work day. But in early 2010 Manning found a lively collection of geeks discussing stimulating topics.

Later the official investigation and charges were brought against Bradley Manning. The charge sheet is here describing his full actions.

As noted in this blog yesterday, the Chinese and the Russians are in fact cultivating and applying the stolen data (hacked) and are working against the West.

Enter Julian Assange and the Russians.

Hat tip to John:

Wikileaks is a Front for Russian Intelligence

The part played by Wikileaks in the Edward Snowden saga is an important one. The pivotal role of Julian Assange and other leading members of Wikileaks in getting Snowden from Hawaii to Moscow, from NSA employment to FSB protection, in the late spring of 2013 is a matter of record.

For years there have been questions about just what Wikileaks actually is. I know because I’ve been among those asking. Over two years ago, little more than two weeks after Snowden landed in Moscow, I explained my concerns about Wikileaks based on my background in counterintelligence. Specifically, the role of the Russian anti-Semite weirdo Israel Shamir, a close friend of Assange, in the Wikileaks circle merited attention, and to anyone trained in the right clues, the Assange group gave the impression of having a relationship with Russian intelligence. As I summed up my position in July 2013, based on what we knew so far:

It’s especially important given the fact that Wikileaks is playing a leading role in the Snowden case, to the dismay of some of Ed’s admirers and even members of his family. Not to mention that Snowden, as of this writing, is still in Moscow. One need not be a counterintelligence guru to have serious questions about Shamir and Wikileaks here. It may be a much bigger part of the story than it appears to the naked eye.

Evidence that Wikileaks is not what it seems to be has mounted over the years. Assange’s RT show didn’t help matters, neither did the fact that, despite having claimed to possess secret Russian intelligence files, Wikileaks has never exposed anything sensitive, as they have done with the purloined files of many other countries. To say nothing of Assange & Co. taking unmistakably pro-Russian positions on a host of controversial issues. Questions logically followed.

Now answers are appearing. It’s long been known that Wikileaks, by their own admission, counseled Ed Snowden in June 2013 to leave Hong Kong and head to Moscow. Contrary to the countless lies propagated by Snowden Operation activists, Snowden’s arrival in Russia was his choice; it had nothing to do with  canceled passports in Washington, DC.

An important gap has been filled this week by Julian Assange, who admitted that Snowden going to Moscow was his idea. Ed wanted to head to Latin America, Julian asserted, especially Ecuador, whose London embassy Assange has been hiding out in for years on the lam from rape changes in Sweden. As Assange explained, “He preferred Latin America, but my advice was that he should take asylum in Russia despite the negative PR consequences, because my assessment is that he had a significant risk he could be kidnapped from Latin America on CIA orders. Kidnapped or possibly killed.”

Only in Russia would Ed be safe, Julian counseled, because there he would be protected by Vladimir Putin and his secret services, notably the FSB. One might think that seeking the shelter of the FSB — one of the world’s nastiest secret police forces that spies on millions without warrant and murders opponents freely — might be an odd choice for a “privacy organization.” But Wikileaks is no ordinary NGO.

Why Assange knew Russia would take in Snowden — it could be a big political hassle for Moscow — is a key question that any counterintelligence officer would want answered. Was Julian speaking on behalf of the FSB or did he just “know” Ed could obtain the sanctuary plus protection he sought?

Just as telling is the recent report on Assange’s activities in Ecuador’s London embassy, where it turns out Ecuadorian intelligence has been keeping tabs on him. Which is no surprise given the PR mess Assange has created for Ecuador with his on-going antics.

Especially interesting is the revelation that, while holed up in London, Assange “requested that he be able to chose his own Security Service inside the embassy, suggesting the use of Russian operatives.” It is, to say the least, surpassingly strange that a Western “privacy advocate” wants Russian secret police protection while hiding out in a Western country. The original Spanish is clear: Assange “habría sido la elección de su propio Servicio de Seguridad en el interior de la embajada, llegando a proponer la participación de operadores de nacionalidad rusa.”

Why Assange wants FSB bodyguards is a question every journalist who encounters Julian henceforth should ask. Until he explains that, Wikileaks should be treated as the front and cut-out for Russian intelligence that it has become, while those who get in bed with Wikileaks — many Western “privacy advocates” are in that group — should be asked their feelings about their own at least indirect ties with Putin’s spy services.

P.S. For those familiar with espionage history, there is a clear precedent for such an arrangement. In 1978 the magazine Covert Action Information Bulletin appeared to expose the secrets of US and Western intelligence. Its editor was Phil Agee, a former CIA officer who had gotten into bed with Cuban and Soviet intelligence; think of Agee as the Snowden of the pre-Internet era. CAIB was in fact founded on the direction of the KGB and for years served as a conduit for Kremlin lies and disinformation that seriously harmed Western intelligence. While CAIB presented itself as a radical truth-telling group, in actuality it was a KGB front, though few CAIB staffers beyond Agee knew who was really calling the shots. One suspects much the same is happening with WikiLeaks.

Per Hillary’s Emails, She Needs Visiting Angels

Late Monday evening, the State Department released a large volume of Hillary emails and it will take a long time to review all of them.

In case you need a sampling of her communications with various people, I am pleased to share a handful. If Hillary is this needy and inept, how can she be president?

Hillary has a cook, needs skim milk and cant figure out the TV guide, she needs Visiting Angels:

Embedded image permalink

 

Evergreen, Secret Service codename:

Embedded image permalink

Worried about server security:

Embedded image permalink

Benghazi, note the date, so no video to blame:

Embedded image permalink

Then, just how anti-Semitic is Hillary and her inner circle:

Hilary and her team are fans of Max Blumenthal, Peter Beinart, J-Street

The Hilary Clinton emails that were just released show that she and her team are far more to the left, and far more interested in promoting the leftist J-Street view of Israel, than she lets on publicly.

Hilary was thrilled with Max Blumenthal’s book “Republican Gomorrah,” writing on September 11, 2009, “I just finished the book and it is great!.”

Blumenthal’s father, Sidney, often shared Max’s articles with Hilary, including “The Great Islamophobic Crusade” where Blumenthal began his career of conflating all evils of the world to Jews and Zionists, blaming them for anti-Islamic initiatives and then moving on to pretend that all Jews in Israel support murdering Arabs for no reason. Hilary asked her staff to “Pls print for me.”

Sid also recommended to her Peter Beinart’s article, “The Failure of the American Jewish Establishment,” saying

H: I’m sure you are preoccupied with the adventures of Lula, et al. Nonetheless, the article below, just posted by the NY
Review, soon to be published, is a breakthrough piece that will have a large impact. It’s worth reading, not least for Frank
Luntz’s poll numbers. The hysterical tone of much of the Israeli leadership and US Jewish community is partly rooted in
this long-term and profound development. Sid

Sid also pushed hard the idea that American Jews are against the Israeli government, as another Sid Blumenthal memo says:

March 23, 2010
For: Hillary
From: Sid
Re: US Jewish and Israeli public opinion
Three new polls released: from AVO07 (all US), J Street (US Jews), and Ha’aretz (Israelis). I’ve
sent Lauren the whole J Street poll to print out for you; its internals are the most detailed,
relevant and suggestive. My reading of that poll is that the administration is in a pretty good spot
with US Jewish opinion and that the drag (about 10 points, I think) has less to do with the Middle
East and Israel than with the economy. Jewish opinion is far more solidly supportive of the
administration generally than the general population (except minorities). Those adamantly
opposed to the administration stance on Israel are preconceived to be against; they are
predictable, a minority of the US Jewish community and have reached their natural limits. The
institutional US Jewish position backing Bibi and against the administration does not have
majority support among Jews.

Sid also recommended that Hilary tell AIPAC that they are too right wing:

For: Hillary
From: Sid
Re: AIPAC speech
This memo does not address specific policy initiatives.
What I’ve written are options. Use what you like, or none at all. Here are some ideas:

1. Hold Bibi’s feet to the fire, remind everyone he was at Wye, his key participant event in
the peace process, and that it was successful.

2. Reassure all players of our commitment to the process and the solution (whatever the
language is).

3. Perhaps most controversial, I would argue something you should do is that, while
praising AIPAC, remind it in as subtle but also direct a way as you can that it does not
have a monopoly over American Jewish opinion.
Bibi is stage managing US Jewish
organizations (and neocons, and the religious right, and whomever else he can muster)
against the administration. AIPAC itself has become an organ of the Israeli right,
specifically Likud. By acknowledging J Street you give them legitimacy, credibility and
create room within the American Jewish community for debate supportive of the
administration’s pursuit of the peace process. Just by mentioning J Street in passing,
AIPAC becomes a point on the spectrum, not the controller of the spectrum. I suggest a
way how to do this below.

1. On US national security interest, Israel’s security and the peace process:
The reason the US has always supported Israel since the moment President Harry S. Truman
decided to recognize the State of Israel is that it is in the US national security interest and
consistent with our values. It is in our interest to support a thriving democracy in the Middle East
Only through the marketplace of ideas will sound policies to help resolve complicated and
seemingly intransigent problems be developed. This administration values everybody’s views.
They are important. You are important. We welcome views across the spectrum, from AIPAC to
J Street. All these views are legitimate and must be heard and considered.

There’s also a Martin Indyk email forwarded to Hilary that blames Bibi for not extending his 2010 settlement freeze, without a negative word about Mahmoud Abbas for refusing to negotiate:

From: Martin Indyk [mailto
Sent: Thursday, September 30, 2010 8:59 AM
To: George Mitchell; Feltman, Jeffrey D
Subject: Dealing with Netanyahu
The principle conclusion from a quick visit to Israel and Ramallah over the weekend is that Netanyahu is in a strong
position politically, with an unusually stable ruling coalition. Nobody I spoke with believed that the government would
have fallen if he had decided to extend the settlement freeze before its expiry, as a gesture to U.S. peacemaking efforts.
In their view, he could have easily garnered the support of a large majority of the people, for whom the settlers are a
marginal concern. And this would have given him leverage over his ministers to ensure their support or abstention in
the cabinet. ..

3. As his friend, paint a realistic picture of the strategic consequences of his negotiating tactics, particularly in terms of
what is likely to happen to the PA leadership if he worries only about his politics and not at all about Abu Mazen’s
politics.
4. If all else fails, avoid recriminations in favor of a “clarifying moment.” The world will of course blame Bibi. But you
should avoid any kind of finger-pointing in favor of a repeated commitment to a negotiated solution and a willingness to
engage with both sides in trying to make that happen, when they’re ready. The Israeli public and the American Jewish
Community should know how far the President was prepared to go and they should be allowed to draw their own
conclusions

Based on the relatively narrow timeframe of last night’s email dump the overall tone is that Israel is obstinate and not interested in peace, the Zionist American Jewish community must be marginalized, the Palestinians are victims and not responsible for any of their actions, and that Hilary must still publicly cultivate the AIPAC crowd while working behind the scenes to undermine it. Haaretz is liberally quoted but no conservative analysis about Israel ever reached Hilary’s eyes through her handpicked, trusted advisers.

(h/t Babylonian Hebrew)

CNN has an early summary with embedded links as well.

 

 

 

 

 

 

 

 

The Words you Use can Be a Cause for Investigation

On the knife’s edge, Americans are threatened by some entity every day. It is the work of government to keep the homeland safe and the methods or tactics used can infringe on our protected rights.

Wonder what words are used in Hillary’s emails….

When it comes to words, the Department of Homeland Security has a list and they have systems to cultivate interactions on the internet where social media platforms such as Facebook and Twitter and YouTube are the top three locations where you are being watched. Have you ever posted something to Facebook and it was removed?

This is not a new circumstance, but often we need to be reminded.

Dept. of Homeland Security Forced to Release List of Keywords Used to Monitor Social Networking Sites

Forbes: If you are thinking about tweeting about clouds, pork, exercise or even Mexico, think again. Doing so may result in a closer look by the U.S. Department of Homeland Security.

In a story appearing earlier today on the U.K’s Daily Mail website, it was reported that the DHS has been forced to release a list of keywords and phrases it uses to monitor various social networking sites. The list provides a glimpse into what DHS describes as “signs of terrorist or other threats against the U.S.”

The list was posted by the Electronic Privacy Information Center who filed a request under the Freedom of Information Act, before suing to obtain the release of the documents. The documents were part of the department’s 2011 ’Analyst’s Desktop Binder‘ used by workers at their National Operations Center which instructs workers to identify ‘media reports that reflect adversely on DHS and response activities’.

The information sheds new light on how government analysts are instructed to patrol the internet searching for domestic and external threats. The Daily Mail’s article noted the Electronic Privacy Information Center wrote a letter to the House Homeland Security Subcommittee on Counter-terrorism and Intelligence, describing it’s choice of words as ‘broad, vague and ambiguous’.

What wasn’t disclosed is how the agency actually gains access to the various search engines and social networks to monitor the specified keywords. My guess is the DHS has a “special arrangement” with companies like Google GOOG -1.94%, Facebook FB -1.12%, Microsoft MSFT +0.00%, Yahoo and Twitter to gain secure direct API access. This type of access would allow it to use distributed cloud technologies to monitor the daily flow of social media and search activity in something close to real time.

I would love to learn more about the technologies used to accomplish this type of social / web monitoring. The applications for monitoring trends and social statics are fascinating when applied to other industry sectors. Given the extent of the monitoring, I’m sure this post itself is now coming up on the DHS radar, so please feel free to leave a comment with any insights.

2014:

(Update 1: Reading through the Desktop Binder, I discovered the DHS Twitter account is @dhsnocmmc1 and DHS appears to be using tweetdeck to monitor the various keywords. See Page 38 – Also interesting to note they seem to be using a Mac Mini as a server, and no password vaults. All Passwords appear to be shared in a plain text word document.)

(Update 2: On page 37, DHS instructs analysts to accept invalid SSL certificates forever without verification. Although invalid SSL warnings often appear in benign situations, they can also signal a man-in-the-middle attack. Not a good practice for the security conscious. Thanks to @obraon twitter for the tip.)

 List1

List

list3

For the full DHS document, click here.