Anne Szarewski, 53, pioneered the cervical cancer vaccine.
Mystery: Doctors are still at a loss to explain Dr Anne Szarewski’s death in her Hampstead home in August. Doctors are still at a loss to explain what exactly caused the brilliant researchers death. She was found with high levels of an anti-malarial drug in her bloodstream, but doctors said this was not thought to have caused her death. The scientist who pioneered the cervical cancer vaccine was found dead by her husband at their $2 million home after he warned she was “heading for a crisis” by working too hard. Dr Anne Szarewski, 53, a university lecturer whose discovery has saved thousands of lives, was begged to slow down by her husband, who was becoming increasingly concerned about the pressure she was putting on herself. In August he found her dead in their four-bedroom home in West Hampstead, north London, after he spent two hours drilling through a door she had locked from the inside. Dr. Szarewski is credited with discovering the link between the human papillomavirus and cervical cancer, leading to a vaccine for HPV, the first-ever vaccine against any form of cancer, which is now routinely given to girls across the country.
In 2008, the National Security Agency illicitly—if accidentally—intercepted a “large number” of phone calls from Washington, D.C. because an error confused Egypt’s country code—“20”—with, yes, “202.”
That fact, one of many startling ones from Barton Gellman’s new blockbuster Washington Post story based on documents given to him by Edward Snowden, is so catchy and memorable that I almost worry about it. That is, I worry people will just think of that and fail to grasp that this was actually one of the more anodyne NSA abuses revealed by these newly disclosed top-secret documents, including an internal audit. In fact, in the year preceding the May 2012 audit, there were 2,776 violations (another eye-grabber, suggestively alike the totemic 1,776).
I think more troubling is that the NSA deliberately fed international communications (which it is permitted to monitor in certain ways) through U.S. fiber-optic cables, commingling those kosher foreign emails with domestic ones—which the secret Foreign Intelligence Surveillance Court (or FISC, and it is generally a rubber stamp) ruled unconstitutional.
I also think more troubling is that last year, the NSA retained more than 3,000 files of telephone call records in defiance of an FISC order (!). How many calls involving how many people were on each file is unknown, by the way.
I think it is pretty messed up that all of this information solely concerns violations that occurred at the NSA’s headquarters in Maryland. “Three government officials, speaking on the condition of anonymity to discuss classified matters, said the number [of violations] would be substantially higher if it included other NSA operating units and regional collection centers,” Gellman reports.
Here’s the audit, for those not faint of heart or jargon (an appendix is provided).
There is a valuable, vital debate to be had over how much the federal government, in its intelligence programs, ought to be permitted to violate Americans’ privacy in an effort to protect Americans from a dangerous world that includes people who want to kill Americans. There are many different places where the important red lines can be drawn in this debate. It is a debate strewn with well-intentioned, conscientious people who would draw those lines at very different places. Let’s even be generous and stipulate that the question of whether the statutorily provided oversight of these programs is sufficient belongs, as well, to that debate.
The terrifying thing is that we are not having that debate. As these documents are the latest things to demonstrate, the various overseers as well as the public do not have access to the information that even the current rules assert they should have. That is how I can state with certainty that we are not having that vital debate: We do not have the means to have that debate with any kind of authority; therefore, no matter how much we discuss these issues, we are not having that debate.
The most important thing about the Egypt-D.C. confusion isn’t that U.S. calls were collected in violation of rules, for instance. It is that, after this violation was uncovered, it was not reported to oversight staff.
In a separate, in many ways equally important Post article, Carol D. Leonnig reports that FISC’s chief judge is hopelessly dependent on the NSA in order for it to perform its statutorily mandated oversight. “The FISC does not have the capacity to investigate issues of noncompliance,” the judge, Reggie B. Walton, told her, “and in that respect the FISC is in the same position as any other court.” Obama, Leonnig noted, has explicitly held FISC up as assurance that the programs do have strong oversight. But it should be obvious that outside oversight that depends on the purely internal machinations of the thing that is supposed to be overseen is not accountable oversight.
Lawmakers are not blameless. They may access unredacted documents, albeit in a secure room where they lack the ability to take notes. They might theoretically then, even, pull a Mike Gravel and read the results into the record on the House or Senate floor. Gellman reports that “fewer than 10 percent of lawmakers” presently have the ability actually to do this in practice. Sen. Dianne Feinstein, the Senate Intelligence Committee chairwoman, was unaware of the May 2012 audit until she was contacted for the Post story.
But mainly this is on the NSA, which is to say, on the administration. President Obama pledged last Friday to make these surveillance programs “more transparent.” He argued, “It’s not enough for me as president to have confidence in these programs. The American people need to have confidence in them, as well.”
Yet the administration did not disclose, say, the lapses Gellman reported. In fact, the NSA retroactively placed an on-the-record interview with its director of compliance off the record, according to Gellman. It did this after Obama’s speech extolling the importance of and promising transparency. In a sense, we got his wished-for transparency. We can see right through him now.
Wellcome Trust researchers have discovered how the brain assesses confidence in its decisions. The findings explain why some people have better insight into their choices than others.
Throughout life, we’re constantly evaluating our options and making decisions based on the information we have available. How confident we are in those decisions has clear consequences. For example, investment bankers have to be confident that they’re making the right choice when deciding where to put their clients’ money.
Researchers at the Wellcome Trust Centre for Neuroimaging at UCL led by Professor Ray Dolan have pinpointed the specific areas of the brain that interact to compute both the value of the choices we have in front of us and our confidence in those choices, giving us the ability to know what we want.The team used functional magnetic resonance imaging (fMRI) to measure activity in the brains of twenty hungry volunteers while they made choices between food items that they would later eat. To determine the subjective value of the snack options, the participants were asked to indicate how much they would be willing to pay for each snack. Then after making their choice, they were asked to report how confident they were that they had made the right decision and selected the best snack.It has previously been shown that a region at the front of the brain, the ventromedial prefrontal cortex, is important for working out the value of decision options. The new findings reveal that the level of activity in this area is also linked to the level of confidence participants placed on choosing the best option. The study also shows that the interaction between this area of the brain and an adjacent area reflects participants’ ability to access and report their level of confidence in their choices.
Dr Steve Fleming, a Sir Henry Wellcome Postdoctoral Fellow now based at New York University, explains: “We found that people’s confidence varied from decision to decision. While we knew where to look for signals of value computation, it was very interesting to also observe neural signals of confidence in the same brain region.”
Dr Benedetto De Martino, a Sir Henry Wellcome Postdoctoral Fellow at UCL, added: “Overall, we think our results provide an initial account both of how people make choices, and also their insight into the decision process.”
The findings are published online today in the journal Nature Neuroscience.
Reference: B. De Martino et al. Confidence in value-based choice. Nature Neuroscience, 2012. [Epub ahead of print]
The US Patriot Act has suddenly scared an entire nation, and it’s not the US itself this time. The Netherlands is currently going nuts about the US government being able to request medical details of all its citizens when the Dutch Electronic Patient Database (EPD) is implemented next month. This will not be the only country that freaks out because of the Patriot Act, as this sort of thing is likely to happen a lot more often. A recent study explained that US government agencies can secretly request anyone’s data if they are using a cloud-computing service which ‘conducts systematic business in the US’. It is already sufficient when the service provider is somehow a subsidiary of a US company.
That turns out to be a problem in the Netherlands, because the company that has developed the EPD and will be hosting the patients’ data on its cloud computing systems is the US-based CSC. The Dutch government and the organization responsible for implementing the EPD are convinced there is no problem, because there are clear contracts which have assigned Dutch jurisdiction, and fortunately the Dutch have stringent data protection laws that will protect patients’ sensitive data. Because that’s what data protection laws do, right?
False! At least with regard to information law, researchers from Amsterdam University warn that this analysis is way too simplistic. According to the scholars, it is quite possible the US government agencies can circumvent data protection laws and could easily request access to medical information of every single person in the Netherlands. The study doesn’t just cover the Netherlands (though it is especially timely for that), but rather looks at how these risks may apply more globally. Here are just a few of the findings that should raise eyebrows across the globe:
“When using a cloud service provider that is subject to U.S. jurisdiction, data may be requested directly from the company in question in the United States. […] From a legal point of view, access to such information cannot be denied and cloud service providers can give no guarantees in this respect. […] The possibility that foreign governments request information is a risk that cannot be eliminated by contractual guarantees. Nor do Dutch privacy laws offer any safeguards in this respect. […] It is a persistent misconception that U.S. jurisdiction does not apply if the data government requests for information do not apply to Dutch users of the cloud. […] legal protection under specific U.S. laws applies primarily to U.S. citizens and residents. […] Given the nature of intelligence work, it is not possible to gain insight into actual requests for information by the U.S. authorities […] Cloud providers will typically not be able to disclose whether such requests are made”
If the above doesn’t yet lead to a new international outrage against the US Patriot Act, then the following sentence on the extra-territorial effects of the Patriot Act should at least send shivers down the spines of sovereignty-loving non-US government officials:
“The transition to cloud computing will, in principle, result in a lower degree of autonomy […]”
Guilty as charged. It is easy to amass a sizable supply of food in a short period of time. This is especially true if you tend to purchase a little bit extra each time you shop. Before you know it, you have a closet or pantry full of stuff but no clue as to what is inside. In my case, I have some well marked buckets of food but no master list. I know I have 30 pounds of coffee beans – or is it 40? And #10 tins of freeze-dried meats, fruits and veggies? They are packed away in carton boxes and I know I have lots of cartons but just exactly what and how much?
I have been storing food for so long that I can not rely on memory alone to know what I already have and what is still needed. This is my number one mistake and one that I plan to remedy in two ways. First of all, everything new that I purchase will be inventoried right away. This is what I call my going forward plan. Then, as time allows, I will methodically inventory everything else.
The key, of course, is not to co-mingle the old with the new. Sure, I may end up with some duplicates but that is better than being so overwhelmed than to do nothing at all. Your plan may be different given the dynamics of your space and your time. All I can say is that if you are fairly new to prepping, don’t let this one slip by. Keep track of what you have from the get go and save yourself a lot of grief down the road.
2. Identifying the most likely risks and prepping for those first.
When I first started, I went off willy-nilly preparing for all sorts of calamities. Earthquakes, terrorist attacks, pandemics, nuclear melt-downs, civil disobedience – you name it, I tried to prepare for it all. These days, I recommend that one of the very first steps that you take when prepping is to evaluate the most likely risks in your area and within your personal domestic situation.
Most if not all city, county and state governments will have emergency management websites that will help you sort through the most likely disasters to occur in your area. Add to this an assessment of your location. Are you in a city where gangs, mobs or terrorist attacks are likely? Do you live in a remote area where the failure of transportations systems or the lack of fuel will cut off you off from supplies from the rest of the world? Is your employment situation tenuous requiring that you build up some cash reserves to get you by just in case the job goes away?
Clearly, at the beginning, some choices will need to be made regarding the best use of your prepping budget. Just remember that food, water and first aid supplies should be at the top of everyone’s list. After that, assess the most likely risks and plan accordingly. A good place to start is 12 Months of Prepping – The First Year which is a recap of monthly supplies, skills and tasks to get you starting on the road to preparedness.
3. Preparing mostly to bug out rather than bugging in.
We all talk about having a bug-out-bag and without question, having your most basic survival items in a pack that you can grab and go if you need to get out of dodge in a hurry is important. But beyond that, over and over I see people acquire all sorts of gear for surviving on the run – perhaps in the woods or bush in a remote location.
I know that in own case and also with the majority of the readers on Backdoor Survival, hunkering down and bugging in will always be preferred to taking off into the unknown with our stuff. For many, the choice to bug in has to do with family, health concerns or financial considerations. That, plus the availability of stored supplies makes bugging in – or staying at home – the choice when a disaster strikes.
At the end of the day, take care of your bugging in needs first and foremost. Plan for outdoor cooking facilities (perhaps an existing charcoal grill?), supplemental lighting (like this $21 Dorcy Wireless Motion LED Flood Lite), stored water, and a portable generator now. Later, down the road, you can expand your supplies to include the essentials for truly bugging out.
That said, pay attention to mistake number 4.
4. Failure to evacuate at just the right time.
When the storm of the century is heading your way, know that it is time to evacuate. Load up your vehicle and go. As much as you feel that your are better off in your own home, if the authorities tell you to leave – and even if they do not – get out of harms way as a precautionary measure. Do so while you still have the ability to load up your vehicle with supplies and fill the tank with gas.
Sticking around when there is at least a 50% chance of a disaster occurring (hurricane, flood, landslides, tsunami,wildfire) is just plain silly. Remember mistake number 2 – failure to evaluate the risks? Part of your planning should be to determine the trigger point for evacuation as well as identification of an evacuation site and a route to get there. Better yet, plan an alternate route as well.
5. Having the gear but not knowing how to use it.
I am guilty of this one as well. I have a Kaito emergency radio as well as some Midland FRS radios. Sure, I know how basically to use them but what if I needed to use some of the more esoteric features? My bad. I also have a hand held compass – a nice one at that – and yet in these days of GPS navigation, would I know how to use it?
Get out the gear two or three times a year and put it through its paces. Not only do you need to know how to use it, but you need to make sure your gear is in good working order. Blades need to be sharpened, batteries need to be charged and skills need to be refreshed.
6. Underestimating other humans as a threat.
In a perfect world, we would all get along and go about our business in a mild-mannered way, not bothering anyone or causing others harm. Alas, as humans this has never been the case. From biblical times forward, man has opposed man. There have been and still are warriors, and armies, soldiers and dictators, enemies and foes.
As recent mass shootings have revealed, mental illness or drugs can make good people go bad. Add the uncertainly and chaos created by an unstable society and the potential for human threat because a major cause for concern.
Whether you embrace firearms or shun them, you still need a way to defend yourself, your family and your property. Consider pepper sprays, martial arts, and other defensive mechanisms in addition to traditional firearms. It is foolhardy to believe that having some means of defense is not needed because “there is no one out to get you”. Desperate people are dangerous people. And the lack of food, water and supplies will turn ordinary people into desperate people in a heartbeat.
7. Buying stuff while ignoring the need to develop skills.
Buying stuff is easy. Save up your money, select your merchandise and go to your local outdoor emporium or Amazon and make a purchase. On the other hand, learning new skills (or practicing old ones) takes time, patience and bit of study. Do you know how to start a fire without matches or a butane lighter? Do you know how to take advantage of natures bounty by knowing how to fish or hunt? And what about growing your own food? Could you do it?
Developing skills to become self-sufficient are every bit as important as having a closet full of the best gear money can by.
8. Lacking the knowledge to properly store your food supplies.
Okay, some might say there is a sixth enemy: namely the two legged type that gets into the tastier items (such a cans of brownie mix) and eats them without telling anyone.
Seriously though, storing food for the long term – meaning five years or longer – does take some care. Brush up on the basics of food storage and set up an active rotation program. You don’t necessarily have to store food for 10 years or longer but what you do store – even for a year or two – should be protected to the best of your ability.
One thing to keep in mind that except for the problem with pests, most food will still be edible even if it is not stored at optimal temperatures in a moisture and oxygen-free environment. But why not learn proper storage methods to insure maximum taste and nutrition. Here on Backdoor Survival, the following articles will help educate and there are plenty of others elsewhere on the internet including YouTube. A few hours of your time is all that it will take to make you a food storage expert.
9. Relying only on yourself and ignoring like-minded members of your community.
When I first started prepping, I did not mention my new little “hobby” to anyone. You know, OPSEC and all that. But about a year into it, I realized that I could not do it all on my own. There were things I was having trouble grasping on my own and I needed help. As I tip toed around the edges of my community, I found some like minded people and much to my surprise, I found that I had skills and knowledge that they lacked.
The mutual exchange of skills and knowledge ensued along with some informal agreements to team up if circumstances required us to be on our own for any period of time. This included teaming up for shelter and food as well as defense.
The importance of having a peer group of like minded comrades in my own community was strengthened as I read R. P. Ruggiero’s Brushfire Plague and continues as I explore other truer than life survival stories,. How you decide to expand your community contacts is up to you but be advised that when it comes to survival 1 plus 1 will definitely add up to more than 2.
The Final Word
These days I feel fortunate that I have come so far with my prepping activities. Moving beyond obsession, the prepping way of life is now a part of my core. It is “what I do” as well as being a hobby and a passion.
Indeed, I have made some mistakes along the way and many of them are listed above. There will surely be others down the road but I know that will be okay since they will afford me an opportunity to learn and grow. At the end of the day, life is all about growth, opportunity and the ability to take care of oneself physically, mentally and spiritually. To me, that is what prepping is all about – mistakes and all.
Today EFF posted several thousand pages of new drone license records and a new map that tracks the location of drone flights across the United States.
These records, received as a result of EFF’s Freedom of Information Act (FOIA) lawsuit against the Federal Aviation Administration (FAA), come from state and local law enforcement agencies, universities and—for the first time—three branches of the U.S. military: the Air Force, Marine Corps, and DARPA (Defense Advanced Research Projects Agency).
While the U.S. military doesn’t need an FAA license to fly drones over its own military bases (these are considered “restricted airspace”), it does need a license to fly in the national airspace (which is almost everywhere else in the US). And, as we’ve learned from these records, the Air Force and Marine Corps regularly fly both large and small drones in the national airspace all around the country. This is problematic, given a recent New York Times report that the Air Force’s drone operators sometimes practice surveillance missions by tracking civilian cars along the highway adjacent to the base.
The records show that the Air Force has been testing out a bunch of different drone types, from the smaller, hand-launched Raven, Puma and Wasp drones designed by Aerovironment in Southern California, to the much larger Predator and Reaper drones responsible for civilian and foreign military deaths abroad. The Marine Corps is also testing drones, though it chose to redact so much of the text from its records that we still don’t know much about its programs.
No one said it better than Michael Crichton – who, in addition to being a best selling author, was also a physician.
During a lecture at Cal Tech, he said, “Let’s be clear: The work of science has nothing whatever to do with consensus. Consensus is the business of politics. Science, on the contrary, requires only one investigator who happens to be right. … The greatest scientists in history are great precisely because they broke with the consensus.”
The medical community has always been subject to “group-think,” but in recent decades we have become the leaders. Numerous physician-scientists have been ostracized, defrocked, de-licensed and in some cases driven to self-destruction by a medical community that has embraced consensus in science.
In essence, “We don’t care about your data; we all agree you are wrong.”
I once had a paper rejected from a major spine journal with a one line denouement: “Everyone knows you can’t do that.”
With time, ultimately, truth prevails, and renegade but correct physicians are vindicated – but not in time to save those patients who die from the mistaken consensus. Today, this “group-think” is depriving people from some of the best and cheapest medical treatment available – supplementation with adequate Vitamin D3.
Vitamin D deficiency has been associated with childhood rickets – a bone disorder – for over a hundred years. And it has been known since the 1970s that those living on the equator, regardless of particular locale, have lower rates of multiple sclerosis, colon cancer and depression. But more recently, many astute observers have discovered that low Vitamin D leads to many other disorders, including cardiac arrhythmia, breast cancer, adult fractures, dementia, heart attack risk and even diabetes.
Most recently, studies have demonstrated that higher levels of Vitamin D improve longevity and are beneficial at preventing influenza – even better than vaccination. Studies showing beneficial effects of high vitamin D levels are quite convincing. They not only show a correlation between low Vitamin D blood levels and the problem, but show improvement in the disease or prevention of the condition when levels are raised up through supplementation.
As an example, it has been shown in the laboratory that heart muscle does not contract well unless adequate Vitamin D is present. An Italian population study showed that low Vitamin D was proportional to atherosclerotic plaques (clogging of the arteries). Furthermore, a Japanese study of dialysis patients demonstrated that correcting Vitamin D deficiency significantly lowered death from heart attacks and heart disease in general.
These are only a few of the rapidly expanding body of literature supporting the role of Vitamin D in multiple disease prevention. But to achieve the positive effects seen in many diseases, blood levels need to be in the range of 50 to 100 ng/dl, not the 20 ng/dl that laboratories report as the lowest range of “normal” (how labs determine “normal” is the subject of another column). Specifically in the case of breast cancer, if one achieves blood levels above 55 ng/dl, the risk of breast cancer is diminished 85 percent.
It is the observation of many, many practicing clinicians that 1) most patients test in the low 20s, and 2) 400 iu of Vitamin D a day – the government recommended daily allowance doesn’t raise the levels at all. Studies of equatorial inhabitants demonstrate that some of the longest-lived people on the planet obtain 30,000-40,000 iu of Vitamin D (specifically D3) a day from the sunlight – nature’s source of the vitamin. Given that, it is not suprising that supplementing 10,000 iu a day of Vitamin D3 has been shown to have no adverse effects.
As an Orthopaedic Surgeon, I deal with bone disorders daily, and have long been interested in this topic. I quit testing for Vitamin D levels in untreated people after every one of my patients tested in the low 20s. I only tested my husband because he was convinced that golfing in Arizona 18 holes, six days a week would raise his level. It did not – his level was 22 ng/dl.
As a final fact, D3 supplementation is cheap. For less than $12 a month you can easily take 10,000 iu of Vitamin D3 a day.
Now, given all this, what would you do?
I, for one take 10,000 units of Vitamin D3 a day. I have done so for over 7 years, and my levels of 55 ng/dl are barely in the optimal range of 50-100ng/dl. I recommend the same to all my patients. But I must warn them that the government, via the Institute of Medicine and the FDA, disagree and believe people should take only 600-800 iu a day.
Now it doesn’t take a medical degree to figure out that a cheap treatment that has such potential upside with so little (if any) downside is worth doing as real preventive medicine. But the government consensus – developed by intellectuals who feel they are infinitely smarter than we are, and should be able to make our choices for us – is that there is no evidence for the beneficial claims.
Really? If they emerge from their collective basement, they will find pages and pages of references. Don’t believe it? Do a simple Google search. Or just read the newspaper. Besides frequent articles in medical and general science journals supporting Vitamin D3 supplementation, there are monthly news stories about this rapidly advancing science.
Sadly, the government doesn’t just want to discourage you from taking extra Vitamin D, they want to prohibit it. Senator Dick Durban, D-Ill., in 2011 introduced a bill (innocuously labeled the “Supplement Labeling Act”) which would so over-regulate the supplement industry that they could no longer supply products such as Vitamin D3 at a cost affordable to the average consumer.
And state medical boards, which are now populated by many non-physicians, sanction physicians who step out of this approved “consensus” – what they call “standard of care.” According to them, if you are not doing what 90 percent of your colleagues are doing, you are by definition wrong. And they can punish you, even to the extent of taking away your license. So, regardless of progress in science, if 90 percent of doctors are recommending an inadequate dose of Vitamin D, your doctor must give you this wrong advice.
To be a scientific leader in this new world order is to be wrong. If the phone company had this philosophy, we would still be tied to land line rotary dials.
Science and medicine are not a vote. As Dr. Crichton pointed out, voting is for politicians. Science requires freedom to consider the alternatives, and in medicine, the freedom to make our own choices – not have government bureaucrats or the Institute of Medicine make them for us
Do you know what FOIA is? No? Don’t be alarmed, most Americans don’t. It is better known as the Freedom of Information Act (introduced by Sen. Edward V. Long in 1965 and signed into law by President Lyndon B. Johnson in 1966), and is most often used by Americans looking for answers into the deep mysteries of government activity. There is something else you should know, however: Freedom of Information Act requests aren’t just for those who are seeking information on black ops activities.
You can use it yourself to discover what organizations like the National Security Agency or the Federal Bureau of Investigation have on your file. Amazingly, FIOA can be used by you to get whatever files that the NSA or FBI or any other three letter agency has on you. And with the latest round of leaks covered by Anthony Gucciardi detailing how the NSA is tracking your activity through just about all of the major social websites, this is big news.
Perhaps you are politically active and have gone to a few protests and were arrested, or maybe you post a lot of political articles on your favorite social networking site.
Grabbing Your File
There are two ways you can get your file. Your first option is to get it straight from the source. For the NSA file, you can go to the FOIA request form. Or for the FBI, you can go to their official request form as well. Or perhaps you don’t feel comfortable going through that process and would rather use another party, in which case you can utilize the website Get My FBI File. This website provides the forms for most agencies, CIA, DIA, FBI, NSA, etc.
Since the conception of FOIA in 1966, it has been amended eleven times. Most notably by President Gerald Ford in 1974. At first, President Ford was for bolstering various privacy-related amendments, however he then performed a complete 180 on the issue (after being persuaded by his Chief of Staff Donald Rumsfield, and Deputy Richard Cheney), signing a Presidential veto that was eventually overturned by Congress. This was only one of twelve vetoes that were overturned by congress in regards to President Ford.
The short but profitable tale of how 483,000 private individual have “top secret” access to the nation’s most non-public information begins in 2001. “After 9/11, intelligence budgets were increased, new people needed to be hired, it was a lot easier to go to the private sector and get people off the shelf,” and sure enough firms like Booz Allen Hamilton – still two-thirds owned by the deeply-tied-to-international-governments investment firm The Carlyle Group – took full advantage of Congress’ desire to shrink federal agencies and their budgets by enabling outside consultants(already primed with their $4,000 cost ‘security clearances’) to fulfill the needs of an ever-more-encroaching-on-privacy administration.
Booz Allen (and other security consultant providing firms) trade publicly with a cloak of admitted opacity due to the secrecy of their government contracts (“you may not have important information concerning our business, which will limit your insight into a substantial portion of our business”) but the actions of Diane Feinstein who promptly denounced “treasonous” Edward Snowden, “have muddied the waters,” for the stunning 1.1 million (or 21% of the total) private consultants with access to “confidential and secret” government information.
Perhaps the situation of gross government over-spend and under-oversight is summed up best, “it’s very difficult to know what contractors are doing and what they are billing for the work — or even whether they should be performing the work at all.”
First, Diane Feinstein’s take on it all…
“I don’t look at this as being a whistleblower. I think it’s an act of treason,” the chairwoman of the Senate Intelligence Committee told reporters. The California lawmaker went on to say that Snowden had violated his oath to defend the Constitution. “He violated the oath, he violated the law. It’s treason.”
The reliance on contractors for intelligence work ballooned after the 9/11 attacks. The government scrambled to improve and expand its ability to monitor the communication and movement of people who might threaten another attack.
“After 9/11, intelligence budgets were increased, new people needed to be hired,” Augustyn said. “It was a lot easier to go to the private sector and get people off the shelf.”
The reliance on the private sector has grown since then, in part because of Congress’ efforts to limit the size of federal agencies and shrink the budget.
Which has led to what appears to be major problems.
But critics say reliance on contractors hasn’t reduced the amount the government spends on defense, intelligence or other programs.
Rather, they say it’s just shifted work to private employers and reduced transparency. It becomes harder to track the work of those employees and determine whether they should all have access to government secrets.
“It’s very difficult to know what contractors are doing and what they are billing for the work — or even whether they should be performing the work at all,”
… And to the current PRISMgate whistleblowing situation:
Of the 4.9 million people with clearance to access “confidential and secret” government information, 1.1 million, or 21 percent, work for outside contractors, according to a report from Clapper’s office.
Of the 1.4 million who have the higher “top secret” access, 483,000, or 34 percent, work for contractors.
…
Because clearances can take months or even years to acquire, government contractors often recruit workers who already have them.
Why not – it’s lucrative!!
Snowden says he accessed and downloaded the last of the documents that detailed the NSA surveillance program while working in an NSA office in Hawaii for Booz Allen, where he says he was earning $200,000 a year.
Analysts caution that any of the 1.4 million people with access to the nation’s top secrets could have leaked information about the program – whether they worked for a contractor or the government.
For individuals and firms alike.
Booz Allen has long navigated those waters well.
The firm was founded in 1914 and began serving the U.S. government in 1940, helping the Navy prepare for World War II. In 2008, it spun off the part of the firm that worked with private companies and abroad. That firm, called Booz & Co., is held privately.
Booz Allen was then acquired by the Carlyle Group, an investment firm with its own deep ties to the government. In November 2010, Booz Allen went public. The Carlyle Group still owns two-thirds of the company’s shares.
Or, a full-majority stake.
Curiously once public, The Booz Allens of the world still operate like a psuedo-private company, with extensive confidential cloaks preventing the full disclosure of financial data. But don’t worry – we should just trust them. Via Bloomberg’s Jonathan Weil.
Psst, here’s a stock tip for you. There’s a company near Washington with strong ties to the U.S. intelligence community that has been around for almost a century and has secret ways of making money — so secret that the company can’t tell you what they are. Investors who buy just need to have faith.
To skeptics, this might seem like a pitch for an investment scam. But as anyone who has been paying attention to the news might have guessed, the company is Booz Allen Hamilton Holding Corp.
…
“Because we are limited in our ability to provide information about these contracts and services,” the company said in its latest annual report, “you may not have important information concerning our business, which will limit your insight into a substantial portion of our business, and therefore may be less able to fully evaluate the risks related to that portion of our business.”
This seems like it would be a dream arrangement for some corporations: Not only is Booz Allen allowed to keep investors uninformed, it’s required to. I suppose we should give the company credit for being transparent about how opaque it is.
And while the media and popular attention is currently focused on who, if anyone else, may be the next Snowden struck by a sudden pang of conscience, perhaps a better question is what PE behemoth Carlyle, with a gargantuan $170 billion in AUM, knows, and why it rushed to purchase Booz Allen in the months after the Bear Stearns collapse, just when everyone else was batting down the hatches ahead of the biggest financial crash in modern history.
Carlyle Group, the private-equity firm run by David Rubenstein, agreed to acquire Booz Allen Hamilton Inc.’s U.S. government-consulting business for $2.54 billion, its biggest buyout since the credit markets collapsed in July.
The purchase would be Carlyle’s biggest since it agreed to buy nursing-home operator Manor Care Inc. last July for $6.3 billion. Deal-making may be rebounding from a 68 percent decline in the first quarter as investment banks begin writing new commitments for private-equity transactions. Buyouts ground to a halt last year because of a global credit freeze triggered by record U.S. subprime-mortgage defaults.
The Booz Allen government-consulting unit has more than 18,000 employees and annual sales of more than $2.7 billion. Its clients include branches of the U.S. military, the Department of Homeland Security and the World Bank.
Carlyle, based in Washington, manages $81.1 billion in assets [ZH: that was 5 years ago – the firm now boasts $170 billion in AUM]. Rubenstein founded the firm in 1987 with William Conway and Daniel D’Aniello. The trio initially focused on deals tied to government and defense.
Carlyle and closely held Booz Allen have attracted high-level officials from the government. Carlyle’s senior advisers have included former President George H.W. Bush, former British Prime Minister John Major, and Arthur Levitt, the ex-chairman of the U.S. Securities and Exchange Commission.
R. James Woolsey, who led the U.S. Central Intelligence Agency from 1993 to 1995, is a Booz Allen executive. Mike McConnell, the U.S. director of national intelligence, is a former senior vice president with the company.
…
Carlyle last year sold a minority interest in itself to Mubadala Development Co., an investment fund affiliated with the government of Abu Dhabi, capital of the United Arab Emirates.
And in addition to the UAE, who can possibly forget Carlyle’s Saudi connection. From the WSJ circa 2001:
If the U.S. boosts defense spending in its quest to stop Osama bin Laden’s alleged terrorist activities, there may be one unexpected beneficiary: Mr. bin Laden’s family.
Among its far-flung business interests, the well-heeled Saudi Arabian clan — which says it is estranged from Osama — is an investor in a fund established by Carlyle Group, a well-connected Washington merchant bank specializing in buyouts of defense and aerospace companies.
Through this investment and its ties to Saudi royalty, the bin Laden family has become acquainted with some of the biggest names in the Republican Party. In recent years, former President Bush, ex-Secretary of State James Baker and ex-Secretary of Defense Frank Carlucci have made the pilgrimage to the bin Laden family’s headquarters in Jeddah, Saudi Arabia. Mr. Bush makes speeches on behalf of Carlyle Group and is senior adviser to its Asian Partners fund, while Mr. Baker is its senior counselor. Mr. Carlucci is the group’s chairman.
Osama is one of more than 50 children of Mohammed bin Laden, who built the family’s $5 billion business, Saudi Binladin Group, largely with construction contracts from the Saudi government. Osama worked briefly in the business and is believed to have inherited as much as $50 million from his father in cash and stock, although he doesn’t have access to the shares, a family spokesman says. Because his Saudi citizenship was revoked in 1994, Mr. bin Laden is ineligible to own assets in the kingdom, the spokesman added.
…
People familiar with the family’s finances say the bin Ladens do much of their banking with National Commercial Bank in Saudi Arabia and with the London branch of Deutsche Bank AG. They also use Citigroup Inc. and ABN Amro, the people said.
“If there were ever any company closely connected to the U.S. and its presence in Saudi Arabia, it’s the Saudi Binladin Group,” says Charles Freeman, president of the Middle East Policy Council, a Washington nonprofit concern that receives tens of thousands of dollars a year from the bin Laden family. “They’re the establishment that Osama’s trying to overthrow.”
…
A Carlyle executive said the bin Laden family committed $2 million through a London investment arm in 1995 in Carlyle Partners II Fund, which raised $1.3 billion overall. The fund has purchased several aerospace companies among 29 deals. So far, the family has received $1.3 million back in completed investments and should ultimately realize a 40% annualized rate of return, the Carlyle executive said. But a foreign financier with ties to the bin Laden family says the family’s overall investment with Carlyle is considerably larger. He called the $2 million merely an initial contribution. “It’s like plowing a field,” this person said. “You seed it once. You plow it, and then you reseed it again.”
The Carlyle executive added that he would think twice before accepting any future investments by the bin Ladens. “The situation’s changed now,” he said. “I don’t want to spend my life talking to reporters.”
We can clearly see why. We can also clearly see why nobody has mentioned Carlyle so far into the Booz Allen fiasco.
A U.S. inquiry into bin Laden family business dealings could brush against some big names associated with the U.S. government. Former President Bush said through his chief of staff, Jean Becker, that he recalled only one meeting with the bin Laden family, which took place in November1998. Ms. Becker confirmed that there was a second meeting in January 2000, after being read the ex-president’s subsequent thank-you note. “President Bush does not have a relationship with the bin Laden family,” says Ms. Becker. “He’s met them twice.”
Mr. Baker visited the bin Laden family in both 1998 and 1999, according to people close to the family. In the second trip, he traveled on a family plane. Mr. Baker declined comment, as did Mr. Carlucci, a past chairman of Nortel Networks Corp., which has partnered with Saudi Binladin Group on telecommunications ventures.
As one can imagine the rabbit hole just gets deeper and deeper the more one digs. For now, we will let readers do their own diligence. We promise the results are fascinating.
Going back to the topic at hand, we will however ask just how much and what kind of confidential, classified, and or Top Secret information is shared “behind Chinese walls” between a Carlyle still majority-owned company and the private equity behemoth’s employees and advisors, among which are some of the most prominent political and business luminaries currently alive. The following is a list of both current and former employees and advisors. We have used Wiki but anyone wishing to comb through the firm’s full blown roster of over 1,000 employees and advisors, is welcome to do so at the firm’s website.
Olivier Sarkozy (half-brother of Nicolas Sarkozy, former President of France) – co-head and managing director of its recently launched global financial services division, since March 2008.
Luis Téllez Kuenzler, Mexican economist, former Secretary of Communications and Transportation under the Felipe Calderón administration and former Secretary of Energy under the Zedillo administration.
Anand Panyarachun, former Prime Minister of Thailand (twice), former member of the Carlyle Asia Advisory Board until the board was disbanded in 2004
Fidel V. Ramos, former president of the Philippines, Carlyle Asia Advisor Board Member until the board was disbanded in 2004
Peter Chung, former associate at Carlyle Group Korea, who resigned in 2001 after 2 weeks on the job after an inappropriate e-mail to friends was circulated around the world
Thaksin Shinawatra, former Prime Minister of Thailand (twice), former member of the Carlyle Asia Advisory Board until 2001 when he resigned upon being elected Prime Minister.
Media
Norman Pearlstine – editor-in-chief of Time magazine from (1995–2005), senior advisor telecommunications and media group 2006-
Perhaps Bloomberg’s Jonathan Weil sums it up best:
There’s no easy solution here, aside from the obvious point that the government keeps way too many secrets.
So what happens when one corporation, owned and controlled by the same government’s former (and in some cases current) top power brokers, potentially has access to all of the same government’s secrets?
The IRS, currently in the midst of scandals involving the targeting of conservative groups and lavish taxpayer-funded conferences, is ordering surveillance equipment that includes hidden cameras in coffee trays, plants and clock radios.
The IRS wants to secure the surveillance equipment quickly – it posted a solicitation on June 6 and is looking to close the deal by Monday, June 10. The agency already has a company lined up for the order but is not commenting on the details.
“The Internal Revenue Service intends to award a Purchase Order to an undisclosed Corporation,” reads the solicitation.
“If you feel that you can provide the following equipment, please respond to this email no later than 4 days after the solicitation date,” the IRS said.
Among the items the agency will purchase are four “Covert Coffee tray(s) with Camera concealment,” and four “Remote surveillance system(s)” with “Built-in DVD Burner and 2 Internal HDDs, cameras.”
The IRS also is buying four cameras to hide in plants: “(QTY 4) Plant Concealment Color 700 Lines Color IP Camera Concealment with Single Channel Network Server, supports dual video stream, Poe [Power over Ethernet], software included, case included, router included.”
Finishing out the order are four “Color IP Camera Concealment with single channel network server, supports dual video stream, poe, webviewer and cms software included, audio,” and two “Concealed clock radio.”
“Responses to this notice must be received by this office within 3 business days of the date of this synopsis by 2:00 P.M. EST, June 10, 2013,” the IRS said. Interested vendors are to contact Ricardo Carter, a Contract Specialist at the IRS.
“If no compelling responses are received, award will be made to the original solicited corporation,” the IRS said.
The original solicitation was only available to private companies for bids for 19 business hours.
The notice was posted at 11:07 a.m. on June 6 and had a deadline of 2:00 p.m. on Monday. Taking a normal 9-to-5 work week, the solicitation was open for bids for six hours on Thursday, eight hours on Friday, and five hours on Monday, for a total of 19 hours.
The response date was changed on Monday, pushed back to 2:00 p.m. on Tuesday, June 11.
The location listed for the solicitation is the IRS’s National Office of Procurement, in Oxon Hill, Md.
“The Procurement Office acquires the products and services required to support the IRS mission,” according to its website.
In recent weeks the IRS has been at the center of multiple scandals, admitting to targeting Tea Party groups and subjecting them to greater scrutiny when applying for non-profit status during the 2010 and 2012 elections.
A report by the Treasury Inspector General for Tax Administration revealed that groups with names like “patriot” in their titles were singled out, required to complete lengthy personal questionnaires (often multiple times) and having their nonprofit status delayed, sometimes for more than three years.
Last week a second Inspector General report detailed nearly $50 million in wasteful spending by the agency on conferences, in which employees stayed at luxurious Las Vegas hotels, paid a keynote speaker $17,000 to paint a picture of U2 singer Bono, and spent $50,000 on parody videos of “Star Trek.”
Requests for comment from the IRS and Mr. Carter were not returned before this story was posted.
CNSNews.com asked IRS spokesmen Dean Patterson and Anthony Burke to explain the reasoning behind the solicitation, where the surveillance equipment will be used, why the request was so urgent, and whether the request has anything to do with the recent scandals at the IRS.
If twitter is any gauge, a lot of people think this article in Wired about General Keith Alexander is just all kinds of kewl:
General Keith Alexander, a man few even in Washington would likely recognize. Never before has anyone in America’s intelligence sphere come close to his degree of power, the number of people under his command, the expanse of his rule, the length of his reign, or the depth of his secrecy. A four-star Army general, his authority extends across three domains: He is director of the world’s largest intelligence service, the National Security Agency; chief of the Central Security Service; and commander of the US Cyber Command. As such, he has his own secret military, presiding over the Navy’s 10th Fleet, the 24th Air Force, and the Second Army.
Alexander runs the nation’s cyberwar efforts, an empire he has built over the past eight years by insisting that the US’s inherent vulnerability to digital attacks requires him to amass more and more authority over the data zipping around the globe. In his telling, the threat is so mind-bogglingly huge that the nation has little option but to eventually put the entire civilian Internet under his protection, requiring tweets and emails to pass through his filters, and putting the kill switch under the government’s forefinger. “What we see is an increasing level of activity on the networks,” he said at a recent security conference in Canada. “I am concerned that this is going to break a threshold where the private sector can no longer handle it and the government is going to have to step in.”
In its tightly controlled public relations, the NSA has focused attention on the threat of cyberattack against the US—the vulnerability of critical infrastructure like power plants and water systems, the susceptibility of the military’s command and control structure, the dependence of the economy on the Internet’s smooth functioning. Defense against these threats was the paramount mission trumpeted by NSA brass at congressional hearings and hashed over at security conferences.
But there is a flip side to this equation that is rarely mentioned: The military has for years been developing offensive capabilities, giving it the power not just to defend the US but to assail its foes. Using so-called cyber-kinetic attacks, Alexander and his forces now have the capability to physically destroy an adversary’s equipment and infrastructure, and potentially even to kill. Alexander—who declined to be interviewed for this article—has concluded that such cyberweapons are as crucial to 21st-century warfare as nuclear arms were in the 20th.
And he and his cyberwarriors have already launched their first attack. The cyberweapon that came to be known as Stuxnet was created and built by the NSA in partnership with the CIA and Israeli intelligence in the mid-2000s. The first known piece of malware designed to destroy physical equipment, Stuxnet was aimed at Iran’s nuclear facility in Natanz. By surreptitiously taking control of an industrial control link known as a Scada (Supervisory Control and Data Acquisition) system, the sophisticated worm was able to damage about a thousand centrifuges used to enrich nuclear material.
The success of this sabotage came to light only in June 2010, when the malware spread to outside computers. It was spotted by independent security researchers, who identified telltale signs that the worm was the work of thousands of hours of professional development. Despite headlines around the globe, officials in Washington have never openly acknowledged that the US was behind the attack. It wasn’t until 2012 that anonymous sources within the Obama administration took credit for it in interviews with The New York Times.
But Stuxnet is only the beginning. Alexander’s agency has recruited thousands of computer experts, hackers, and engineering PhDs to expand US offensive capabilities in the digital realm. The Pentagon has requested $4.7 billion for “cyberspace operations,” even as the budget of the CIA and other intelligence agencies could fall by $4.4 billion. It is pouring millions into cyberdefense contractors. And more attacks may be planned.
I don’t suppose the American public have any business knowing if their government is launching such attacks. Why would we? What could possibly go wrong?
Inside the government, the general is regarded with a mixture of respect and fear, not unlike J. Edgar Hoover, another security figure whose tenure spanned multiple presidencies. “We jokingly referred to him as Emperor Alexander—with good cause, because whatever Keith wants, Keith gets,” says one former senior CIA official who agreed to speak on condition of anonymity. “We would sit back literally in awe of what he was able to get from Congress, from the White House, and at the expense of everybody else.”
Now 61, Alexander has said he plans to retire in 2014; when he does step down he will leave behind an enduring legacy—a position of far-reaching authority and potentially Strangelovian powers at a time when the distinction between cyberwarfare and conventional warfare is beginning to blur. A recent Pentagon report made that point in dramatic terms. It recommended possible deterrents to a cyberattack on the US. Among the options: launching nuclear weapons.
Like I said, what could possibly go wrong?
When the Guardian revealed this program the other day there was a spirited debate about whether this, unlike the other programs, was something we should welcome and expect. My problem with it wasn’t that the government was creating plans to defend against attacks on US cyber-infrastructure or even war plans in case such a thing happened. What I found questionable was the idea that this was conceived as 21st Century offensive war planning, and and in ways that do not necessarily fall within the traditional “national security” boundaries.
When it comes to cyber issues, I’m afraid we are seeing a confluence of commerce and security that everyone should stop and think about for a minute. How are these people defining the “national interest” and on whose behalf are they planning to launch cyberwar? What are the consequences of doing such a thing and who decides that it must be done?
And what do we think about paying huge amounts of taxpayer dollars to contractors like this?
Defense contractors have been eager to prove that they understand Alexander’s worldview. “Our Raytheon cyberwarriors play offense and defense,” says one help-wanted site. Consulting and engineering firms such as Invertix and Parsons are among dozens posting online want ads for “computer network exploitation specialists.” And many other companies, some unidentified, are seeking computer and network attackers. “Firm is seeking computer network attack specialists for long-term government contract in King George County, VA,” one recent ad read. Another, from Sunera, a Tampa, Florida, company, said it was hunting for “attack and penetration consultants.”
One of the most secretive of these contractors is Endgame Systems, a startup backed by VCs including Kleiner Perkins Caufield & Byers, Bessemer Venture Partners, and Paladin Capital Group. Established in Atlanta in 2008, Endgame is transparently antitransparent. “We’ve been very careful not to have a public face on our company,” former vice president John M. Farrell wrote to a business associate in an email that appeared in a WikiLeaks dump. “We don’t ever want to see our name in a press release,” added founder Christopher Rouland. True to form, the company declined Wired’s interview requests.
[…]
Bonesaw also contains targeting data on US allies, and it is soon to be upgraded with a new version codenamed Velocity, according to C4ISR Journal. It will allow Endgame’s clients to observe in real time as hardware and software connected to the Internet around the world is added, removed, or changed. But such access doesn’t come cheap. One leaked report indicated that annual subscriptions could run as high as $2.5 million for 25 zero-day exploits.
The buying and using of such a subscription by nation-states could be seen as an act of war. “If you are engaged in reconnaissance on an adversary’s systems, you are laying the electronic battlefield and preparing to use it,” wrote Mike Jacobs, a former NSA director for information assurance, in a McAfee report on cyberwarfare. “In my opinion, these activities constitute acts of war, or at least a prelude to future acts of war.” The question is, who else is on the secretive company’s client list? Because there is as of yet no oversight or regulation of the cyberweapons trade, companies in the cyber-industrial complex are free to sell to whomever they wish. “It should be illegal,” says the former senior intelligence official involved in cyberwarfare. “I knew about Endgame when I was in intelligence. The intelligence community didn’t like it, but they’re the largest consumer of that business.”
There are some serious implications to all of this that need to be hashed out by the American people. Of course we need to have defenses against cyber attacks. I don’t think anyone in the country thinks otherwise. But this looks like it could be a monumental financial boondoggle that is in great danger of running amok and causing some very serious problems. Frankly, this scares me much more than the threat that some would-be is going to get a hold of some beauty supplies and blow himself up.
Islamic terrorism is not and never has been an existential threat. This, I’m not so sure about. We should at least have a little chat about it before we let Cyber Buck Turgidson and his friends run wild.