The Ron Paul Institute for Peace and Prosperity
Subscribe to the Institute View Us on YouTube Follow Us On Twitter Join Us on Facebook Join Us at Google Plus

Search Results

for:

Peter van Buren

Back to the Future: The Unanswered Questions from the Debates

undefined

The nuances of foreign policy do not feature heavily in the ongoing presidential campaign. Every candidate intends to “destroy” the Islamic State; each has concerns about Russian President Vladimir Putin, North Korea, and China; every one of them will defend Israel; and no one wants to talk much about anything else — except, in the case of the Republicans, who rattle their sabers against Iran.

In that light, here’s a little trip down memory lane: in October 2012, I considered five critical foreign policy questions — they form the section headings below — that were not being discussed by then-candidates Mitt Romney and Barack Obama. Romney today is a sideshow actfor the current Republican circus, and Obama has started packing up his tent at the White House and producing his own foreign policy obituary.

And sadly, those five questions of 2012 remain as pertinent and unraised today as they were four years ago. Unlike then, however, answers may be at hand, and believe me, that’s not good news.  Now, let’s consider them four years later, one by one.
read on...

You Should Care About Apple, Your iPhone, and the FBI

undefined

Yep, you should care. Very much. Hang up the phone and listen.

What This is All About

The FBI wants Apple to help unlock an iPhone used by one of the attackers who killed 14 people in the December San Bernardino shooting. Specifically, the Bureau wants Apple to create new software that would override a security system on the phone designed to erase its contents after ten unsuccessful password tries. The new software would also eliminate the built-in pause required between tries.

The software on the San Bernardino shooter’s phone, after ten tries, will automatically destroy any data on it as a security measure. The FBI needs that ten try limit, plus the required pauses between tries, taken away so that they can run a “brute force” attack against the password. A brute force attack runs an unlimited number of passwords (a1, a2, a3… aa1, aa2, aa3…) at high speed against the system until one works.


read on...

US Military Contractors Return In Droves to Iraq

undefined

America’s mercenaries smell the blood (and the money) and are returning to Iraq.

Mercs are a great thing for the US government, in that they aren’t counted as “troops,” or as “boots on the ground,” even while they are both. The Defense Department can disavow any mischief the contractors get up like, such as murdering civilians, and keep the headcount low and the body count low when things are going well, or bad. It only costs money, and that America has a bottomless pool of, as long as it being spent on something violent abroad instead of helping Americans at home (which is socialism, sonny.)

So let’s look at some numbers.

The number of private contractors working for the US Defense Department in Iraq grew eight-fold over the past year, a rate that far outpaces the growing number of American troops training and advising Iraqi soldiers battling Islamic State militants.
read on...

Intel Agencies: Clinton Emails Match Top Secret Documents

undefined

Clinton supporters, erroneously, make much out of the idea that of the many, many emails that passed through her private server, none were “marked” classified. They claim that, when in fact thousands of those same emails are indeed now marked classified, that is just after-the-fact Washington squabbling.

So this new information — that America’s intelligence agencies now say the contents of some of those unmarked emails match the contents of their own classified documents — is a big deal. It also suggests just how Clinton’s unclassified server came to be loaded up with classified material.

Several agencies have told Congress that Hillary Clinton’s home server contained some emails that should have been treated as TOP SECRET because their wording matched sections of some of the government’s most highly classified documents. These reports are the first formal declarations by intel agencies detailing how they believe Clinton violated government rules when highly classified information in at least 22 email messages passed through her unsecured home server.
read on...

Six Years and $17 Billion Wasted in Afghanistan

undefined

What did you get for Christmas these last six years?

The U.S. government was nice enough to gift our loyal friends the Afghans $17 billion of your tax money, and, in the true spirit of giving, asked nothing in return for itself.

What that means in actual dollars and nonsense is that the U.S. government wasted $17 billion in taxpayer money in Afghanistan on various projects that never made it off the ground or were doomed to fail because of incompetence or lack of maintenance, according to a new report.

ProPublica looked at over 200 audits conducted by the Special Inspector General for Afghanistan Reconstruction (SIGAR) over the last six years and tallied up the costs for the wide range of failed efforts to reach the $17 billion price tag. This greatest hits study only scratched the surface of the estimated $110 billion spent to rebuild the country (the U.S. spent some $47 billion in rebuilding Iraq, and how’d that work out?)
read on...

You Won’t Like It, But Here’s the Answer to ISIS

undefined

How can we stop the Islamic State?

Imagine yourself shaken awake, rushed off to a strategy meeting with your presidential candidate of choice, and told: “Come up with a plan for me to do something about ISIS!” What would you say?

What Hasn’t Worked

You’d need to start with a persuasive review of what hasn’t worked over the past 14-plus years. American actions against terrorism — the Islamic State being just the latest flavor — have flopped on a remarkable scale, yet remain remarkably attractive to our present crew of candidates. (Bernie Sanders might be the only exception, though he supports forming yet another coalition to defeat ISIS.)

Why are the failed options still so attractive? In part, because bombing and drones are believed by the majority of Americans to be surgical procedures that kill lots of bad guys, not too many innocents, and no Americans at all. As Washington regularly imagines it, once air power is in play, someone else’s boots will eventually hit the ground (after the US military provides the necessary training and weapons). A handful of Special Forces troops, boots-sorta-on-the-ground, will also help turn the tide. By carrot or stick, Washington will collect and hold together some now-you-see-it, now-you-don’t “coalition” of “allies” to aid and abet the task at hand. And success will be ours, even though versions of this formula have fallen flat time and again in the Greater Middle East.
read on...

What’s the Real Story Behind Saudi Arabia’s Execution of Shia Cleric al-Nimr?

undefined

The execution of Shi’ite cleric Nimr al-Nimr and 46 convicted al-Qaeda members by the Saudis triggered a still-unfolding crisis between the Kingdom and Iran. Protesters in Tehran set fire to the Saudi embassy, and the Iranian government threatened that the Saudis will face “divine” revenge.

Riyadh responded by severing diplomatic relations and ordering Iran’s ambassador to depart the Kingdom, followed by the cutting off of all commercial ties with Iran. Saudi allies Bahrain, Sudan and the United Arab Emirates made formal diplomatic protests to Iran. Additional acts of retaliation in a region that embraces the concept will no doubt follow, likely inside the Saudi-Iranian proxy war in Yemen or Syria. There will be blood.

But why execute al-Nimr now?

The cleric has been a vocal critic of Saudi Arabia’s ruling royal family for some years. In 2009 he went as far as threatening Shi’ite secession, provoking a government crackdown in the minority’s eastern heartland. The Saudis have had al-Nimr in custody since 2012, and he was sentenced to death in 2014.
read on...

New ‘Jihadi John?’ ISIS Video Features English-Speaker

undefined

For those who still don’t get why the War of Terror continues to fail after 14+ years, here is another lesson.

We all remember “Jihadi John,” who of course was never called that except in the western media. John (real name: Mohammed Emwazi) was a British citizen who became radicalized, joined ISIS and went on to do horrible things, including beheadings. The media, in hand with the White House and Downing Street, fluffed this one loser guy up into an international super villain. 

So, when eventually the world’s most powerful nation finally killed him in November 2015 with million-dollars air sorties and drones, we were all supposed to go full-out-bin-Laden-celebration, on the road to victory over Islamic State, with a little old fashioned Wild West vengeance thrown in for the feel good.

And so now guess what?

There’s a new guy to replace Jihadi John. He doesn’t have a stupid nickname yet, so let’s be the first and call him Haji Hank. He executed five persons claimed to be British spies, creating the video you see above in the process.
read on...

About That ISIS Plan to Attack Munich…

undefined

So while we huddled in drunken fear here in The Homeland, Germans in Das Homeland played out a similar game.

You may have missed it among updates of our impending doom from terror attacks on New Year’s Eve, but in Munich two train stations were evacuated and closed after German officials had received a “very concrete” tip that suicide attacks were planned there. Everything got locked down and even the American Embassy in Germany Tweeted out an urgent bulletin to Americans.

And yeah, I buried the lede: Nothing happened.

Now, in the clearer light of morning, we learn more about that “very concrete” tip that set all this off.

According to Reuters, a German policespokesperson said “We received names. We can’t say if they were in Munich or in fact in Germany. At this point we don’t know if these names are correct, if these people even exist, or where they might be. We have no information that these people are in Munich or in Germany.”
read on...

Your Business Been Hacked? Thanks NSA!

undefined

It appears that the NSA (“or someone”) hacked into the code of a popular firewall and planted a password in there that would allow them access as needed.

That means the NSA (“or someone”) would be able to bypass the security features of a network and do what they wanted inside. This is basically an act of sabotage. Given that American organizations as well as foreign ones use these same firewalls, and that the planted password could be discovered by others outside the NSA, the act made vulnerable a multitude of innocent, untargeted systems.

Juniper Networks makes a popular line of enterprise firewalls whose operating system is called Screen OS. The company raised alarm bells with an advisory announcing that they’d discovered “unauthorized code” in some versions of Screen OS, a strange occurrence that hinted that a security agency had managed to tamper with the product before it shipped. One possible route would be for any such agency to have its own people inside the company, acting under cover.
read on...


Authors

Tags