How diplomatic immunity protects accused criminals – by Omar Waraich September 29, 2015 5:00AM ET

In 1967, Burma’s Ambassador in Sri Lanka, Sao Boonwaa, confonted his wife Shirley, who he believed was having an affair. Their neighbors in the Cinnamon Gardens suburb of Colombo heard gunshots early in the morning.

Screen Shot 2015-09-29 at Sep 29, 2015 1.47

Later that day, a potent smell wafted from the Boonwaat home. Neighbors saw three Buddhist monks conducting final rites over a funeral pyre. The envoy was arrested, and at first even denied bail, but he invoked diplomatic immunity, and a senior official was dispatched by the Burmese regime to argue for their ambassador’s release. Sao Boonwaat returned to Burma a couple of months later, never to face trial for the killing of his wife, according to Singapore’s Straits Times.

Since then, few crimes committed have been as egregious, but foreign diplomats still continue to evade arrest and prosecution for alleged crimes as they furtively board flights back to their countries against the backdrop of local outrage and strained diplomatic relations.

Last week Majed Hassan Ashoor, the first secretary at the Saudi Embassy in Delhi, left India hounded by allegations that he held captive, beat, and repeatedly raped two Nepali women he was keeping in his home as domestic workers. Police stormed the residence, which was not located in the embassy, to recover the two women. Doctors treating the victims said they suffered extensive injuries.

The incident sparked outrage on India’s television news channels as crowds gathered on the streets to call for justice. Civil society activists and political parties in Nepal echoed the protestors’ concerns. They urged India to stand by their citizens and act against the Saudi diplomat. But on Sept. 17, the Indian government confirmed that Ashoor was protected by diplomatic immunity. Under the Vienna Convention, there was little that could be done.


Article continues:

Iceland put bankers in jail rather than bailing them out — and it worked – Updated by Matthew Yglesias on June 9, 2015, 11:30 a.m. ET

Yesterday, Iceland’s prime minister, Sigmundur Gunnlaugsson, announced a plan that will essentially close the books on his country’s approach to handling the financial crisis — an approach that deviated greatly from the preferences of global financial elites and succeeded quite well. Instead of embracing the orthodoxy of bank bailouts, austerity, and low inflation, Iceland did just the opposite. And even though its economy was hammered by the banking crisis perhaps harder than any other in the world, its labor didn’t deteriorate all that much, and it had a great recovery.

How great? Well, compare the evolution of Iceland’s unemployment rate with what happened in Ireland, the star pupil of the Very Serious People:

Or compare it with the United States:

How did Iceland pull it off?

Let the banks go bust

For starters, rather than scrambling to mobilize public resources to make sure banks didn’t default on their various obligations, Iceland let the banks go bust. Executives of the country’s most important bank were prosecuted as criminals.

Reject austerity

 Trading Economics

Iceland was nonetheless hit by a very serious recession that caused its debt-to-GDP ratio to soar. But even after several years of steady increases, the government didn’t panic. It prioritized recovery. And when recovery was underway and the ratio began to fall, the government let it fall gently.

Article continues:


Defense Secretary Ash Carter arrives for a news conference at the Pentagon, Thursday, April 16, 2015. ANDREW HARNIK/AP

Nearly two years after former NSA contractor Edward Snowden revealed that the agency had penetrated the internal systems of Facebook, Google and other companies, tech executives still harbor hard feelings. That’s led to a strained relationship with the Pentagon. “The Snowden issue clouds things,” United States Secretary of Defense Ashton Carter acknowledged during a visit to WIRED’s New York offices Monday.

Nevertheless, with cyberterrorism on the rise, the Pentagon has never needed tech’s know-how more.

To be fair, Snowden’s explosive revelations are not the only reason Silicon Valley and the Pentagon don’t always get along. For one thing, the institutions that reside within each world operate very differently. The military moves slowly, while startups move quickly. Military personnel adhere to an immutable job hierarchy, respecting traditional career paths, while techies often skip college, change jobs frequently, and start their own companies.

Carter has made it his mission to build a stronger working relationship between the Defense Department and techies. His visit to Silicon Valley last week, in which he delivered a speech at Stanford and stopped in at Facebook and Andreessen Horowitz, marked the first time in nearly 20 years that a defense secretary has toured Silicon Valley.

Carter has suggested reforming the military’s personnel system so he can take better advantage of private sector talent. And he wants to make it easier for the Pentagon to approve outside contractors, a process that currently takes up to two years. “For many companies, that’s an eternity when you are living on a shoestring budget,” he told WIRED. As a result, the defense department too often works with legacy vendors skilled in winning its contracts. “If what we reward in terms of federal moneys are people who have the knack for working with us rather than people who do the best job, that’s a disaster.”

A New Strategy

Carter’s tech forward perspective comes from personal experience. The physicist-turned-Pentagon chief had just moved to the West Coast, where he was a distinguished visiting fellow at Stanford’s Hoover Institution and a lecturer at the university, when President Obama called him back to Washington DC in February to serve as defense secretary. Before that, he spent part of 2014 advising large investment firms on technology and defense investments as a senior partner with the consulting firm Global Technology Partners.

While Carter was speaking at Stanford, the DOD revealed details of a new cyber strategy—the first update since 2011—that calls for 133 teams of military, civilian, and defense contractors to be in place by 2018. To help its recruiting efforts, Carter is creating a Silicon Valley office, the Defense Innovation Unit X, not far from Google’s headquarters. The outpost will scout for new and emerging technologies, help startups find new ways of working with the military, and serve as a West Coast base for recruits.

If what we reward in terms of federal moneys are people who have the knack for working with us rather than people who do the best job, that’s a disaster. Ashton Carter, Secretary of Defense

The Pentagon also has established a branch of the U.S. Digital Service, which puts techies to work on tough government problems for short periods. Already, 16 people are helping out in three teams. One, for example, is focused on making the health-record systems of the DOD and the Department of Veteran Affairs interoperable. “The technical community likes the problems we work on,” Carter said. “I’ve been taking them in on a temporary basis, saying, ‘Come do this for a year. You don’t have to be with us forever.’”

Carter also is helping the Pentagon invest in new technologies. He pointed out that the government can’t keep up with VC firms, but nonetheless, “I want to get more in that business.” Right now, the Pentagon makes small investments through In-Q-Tel, a nonprofit that has worked with the intelligence community to fund start-up companies working on security-related emerging technologies. “If that’s successful we’ll scale that up,” he said.

Meanwhile, Carter is addressing the legacy of Snowden’s actions by engaging tech’s leaders in conversation. The two communities need each other, he said, and his initiatives are, in part, a way he hopes to improve the relationship.

(Windows users, you’re OK!) What Is the Shellshock Vulnerability? – Lily Hay Newman SEPT. 26 2014 6:04 PM

Here’s what you need to know.

I know that my computer still has the Shellshock bug because it returns “this is a test” when I enter this system check. Also note that OS X Terminal is labeled “bash” at the top of the window.

This week you may have heard about something called Shellshock. It’s a vulnerability in something else called Bash. Oh, and Bash is a Unix shell. And the Shellshock vulnerability may be larger than Heartbleed—the bug in a widely used open-source encryption library that was revealed earlier this year. What the heck is going on? Let’s talk it out.

First of all, Unix is an operating system that appears in a lot of different forms. Apple’s OS X operating systems, for example, are Unix-based, but Unix is also widely used in servers and other networked devices like modems or security cameras. You run into it much more often than you think.

A Unix shell is your window into how the operating system is actually running. Instead of the graphical user interface (the thing we are usually interacting with on our personal computers), you type text directions into what’s called a command line, and instruct the computer to execute tasks. And you’re usually using a Unix shell like Bash through what’s called a terminal emulator. That’s why the command line program in Apple’s OS X operating systems is called Terminal.

OK, now let’s get to the vulnerability. Bash is great for accessing computers remotely because it’s text-only. If you have a keyboard, you’re good to go. But that also potentially makes it easy for a malicious hacker to remotely access computers that she shouldn’t. If there’s a vulnerability in Bash, she can exploit it. And there is.

Essentially, the bug comes from how Bash handles what are called “environmental variables.” If you know about the vulnerability, you can trick Bash into executing commands that it shouldn’t even be registering as commands. The malicious command can be sort of tucked into text that Bash should ignore. And it can direct a computer to download malware or wreak all kinds of havoc.

The reason it’s important to understand what Unix and Bash are is so you can begin to grasp how widely Bash is distributed. It’s the default Unix shell command line processor in OS X, Linux, and other operating systems. It’s not used in most Microsoft software—so the Windows operating systems and websites built with Microsoft tools should be safe from this vulnerability. But Bash has been around since 1989, so it’s in a lot of devices.

Even worse in terms of controlling this bug, Bash is used on the Internet by software that automatically interacts with other programs in certain prescribed situations. For example, there’s no human involved when a website queries a server for updated content.

At this point, patches are available for Unix and Linux. Apple is presumably scrambling to deliver one as well. In a statement to iMore, an Apple representative said, “The vast majority of OS X users are not at risk to recently reported bash vulnerabilities. … With OS X, systems are safe by default and not exposed to remote exploits of bash unless users configure advanced Unix services.”

Jim Traficant Was Our Kind of Crook A Youngstown tribute. – By VINCE GUERRIERI September 27, 2014

Nobody believed the stories I told about Youngstown until Jim Traficant was indicted – for the second time.

Screen Shot 2014-09-28 at Sep 28, 2014 1.42

My tales – about a judge who got disbarred, ran for mayor and won; a prosecutor who was the subject of an attempted assassination and his predecessor, who did time for corruption; a group of gangsters who incorporated their own municipality for the express purposes of hiding a brazenly-operated illegal gambling casino from local law enforcement – were too far-fetched to anyone who’d never lived in the steel town on the Ohio/Pennsylvania border.

But James A. Traficant Jr., a man who once had his salary garnished by the Internal Revenue Service for failing to report a bribe by organized crime figures on his income tax – was the living embodiment of every yarn spun about the region and its residents. He was the Congressman you’d call from central casting – if Quentin Tarantino was directing the movie.

Traficant died Saturday at the age of 73 following a tractor accident at a family farm in the hinterlands of Mahoning County. Shy of him actually being “beamed up” after a Congressional speech – a phrase he was fond of using when the world had become too strange even for him – this is how it had to end. The farm had proven his undoing once already.

When Traficant was indicted for a second time in 2002 by a federal grand jury, the allegations included getting local contractors and staff members to do work for him on the farm. Traficant pleaded not guilty “by reason of sanity” – a local political enemy tried to have him declared legally insane in the 1980s, and it didn’t take, leading him to declare himself sane ever since – and once again swore to defend himself in court.
Read more:

Former Managers Allege Pervasive Inventory Fraud at Walmart. How Deep Does the Rot Go? – Spencer Woodman  June 11, 2014  

The retail giant acknowledges that a “thorough review” is under way and vows “appropriate action” if violations are discovered.

(AP Photo/Damian Dovarganes)

In 2012, Erica Davidson, a Walmart veteran and store manager, took on the daunting task of turning around a struggling store on the outskirts of Greensboro, North Carolina. The store had run through its share of managers, Davidson said, and she viewed it as the sort of challenge that could make or break a person’s career.

Davidson said that one of her primary tasks was to reduce the troubled store’s high rate of “shrinkage”—defined as the value of goods that are stolen or otherwise lost—to levels deemed acceptable by the company’s senior managers for the region. As a result of fierce competition, profit margins in retail can be razor thin, making shrinkage a potent—sometimes critical—factor in profitability.

Prior to her arrival, Davidson said, the Greensboro store could see annual shrinkage losses as high as $2 million or more—a sizable hit to its bottom line. There had even been talk of closing the store altogether, she recalled.

For years, Walmart’s senior management in North Carolina had been waging a war on shrinkage, Davidson said; it had become a central priority of the company’s local leadership and a source of constant strain for store managers. Though the unrelenting pressure weighed on her, Davidson said she became an asset in Walmart’s battle against shrinkage—so much so that, in 2011, the North Carolina regional team named her a “subject matter expert” on reducing shrinkage and would send her to meetings in the Walmart regional office in Charlotte. There, she recalled, she would train district managers on her practices in the presence of the company’s most senior officers for the state.

The only problem, Davidson said, was that her superiors’ preferred methods for improving this vital metric were not always aboveboard; they included an array of improper techniques to conceal shrinkage losses and make the inventory numbers—and profit margins—look better on paper than they were in reality.

Article continues:

That’s where the money is – May 31st 2014

How to hand over $272 billion a year to criminals

MEDICAL science is hazy about many things, but doctors agree that if a patient is losing pints of blood all over the carpet, it is a good idea to stanch his wounds. The same is true of a health-care system. If crooks are bleeding it of vast quantities of cash, it is time to tighten the safeguards.

In America the scale of medical embezzlement is extraordinary. According to Donald Berwick, the ex-boss of Medicare and Medicaid (the public health schemes for the old and poor), America lost between $82 billion and $272 billion in 2011 to medical fraud and abuse (see article). The higher figure is 10% of medical spending and a whopping 1.7% of GDP—as if robbers had made off with the entire output of Tennessee or nearly twice the budget of Britain’s National Health Service (NHS).

Crooks love American health care for two reasons. First, as Willie Sutton said of banks, it’s where the money is—no other country spends nearly as much on pills and procedures. Second, unlike a bank, it is barely guarded.

Some scams are simple. Patients claim benefits to which they are not entitled; suppliers charge Medicaid for non-existent services. One doctor was recently accused of fraudulently billing for 1,000 powered wheelchairs, for example. Fancier schemes involve syndicates of health workers and patients. Scammers scour nursing homes for old people willing, for a few hundred dollars, to let pharmacists supply their pills but bill Medicare for much costlier ones. Criminal gangs are switching from cocaine to prescription drugs—the rewards are as juicy, but with less risk of being shot or arrested. One clinic in New York allegedly wrote bogus prescriptions for more than 5m painkillers, which were then sold on the street for $30-90 each. Identity thieves have realised that medical records are more valuable than credit-card numbers. Steal a credit card and the victim quickly notices; photocopy a Medicare card and you can bill Uncle Sam for ages, undetected.

It is hard to make such a vast system secure: Medicare’s contractors process 4.5m claims a day. But pointless complexity makes it even harder. Does Medicare really need 140,000 billing codes, as it will have next year, including ten for injuries that take place in mobile homes and nine for attacks by turtles? A toxic mix of incompetence and political gridlock has made matters worse. Medicare does not check new suppliers for links to firms that have previously been caught embezzling (though a new bill aims to fix this). Fraud experts have long begged the government to remove Social Security numbers from Medicare cards to deter identity thieves—to no avail.

Start by closing the safe door

One piece of the solution is obvious: crack down on the criminals. Obamacare, for all its flaws, includes some useful measures. Suppliers are better screened. And when Medicaid blackballs a dodgy provider, it now shares that information with Medicare—which previously it did not. For every dollar spent on probing health-care fraud, taxpayers recover eight. So the sleuths’ budgets should be boosted, not squeezed, as now.

But the broader point is that American health care needs to be simplified. Whatever its defects, Britain’s single-payer National Health Service is much simpler, much cheaper and relatively difficult to defraud. Doctors are paid to keep people well, not for every extra thing they do, so they don’t make more money by recommending unnecessary tests and operations—let alone billing for non-existent ones.

Too socialist for America? Then simplify what is left, scale back the health tax-perks for the rich and give people health accounts so they watch the dollars that are spent on their treatment. After all, Dr Berwick’s study found that administrative complexity and unnecessary treatment waste even more health dollars than fraud does. Perhaps that is the real crime.

China denounces US cyber-theft charges – 19 May 2014 Last updated at 23:36 ET

FBI wanted poster. 19 May 2014

The FBI issued a “Wanted” poster for the five army officers

China has denounced charges brought by the US against five army officers accused of economic cyber-espionage.

Beijing said it had “never engaged or participated” in cyber theft and that the charges would damage co-operation between the two countries.

China summoned the US ambassador to Beijing over the incident, the state news agency Xinhua reports.

US prosecutors say the officers stole trade secrets and internal documents from five companies and a labour union.

But the Chinese foreign ministry urged Washington to “immediately correct its mistakes” and withdraw the charges.

Spokesman Qin Gang, quoted by Xinhua news agency, said the charges were “purely ungrounded and with ulterior purpose”.

He said China had decided to suspend activities of the China-US Cyber Working Group. The group was set up in April.

“Given the lack of sincerity on the part of the US to solve issues related to cyber security through dialogue and co-operation, China has decided to suspend activities of the China-US Cyber Working Group,” Mr Qin said.

China has always insisted that it is itself a victim of cyber theft, wiretapping and surveillance activities by the US.

Mr Qin added: “We once again strongly urge the US side to make a clear explanation of what it has done and immediately stop such kind of activities.”

Article continues:

Credit Suisse escapes worst as it pleads guilty to U.S. charges – BY ARUNA VISWANATHA, DOUWE MIEDEMA AND KAREN FREIFELD WASHINGTON/NEW YORK Tue May 20, 2014 12:01am EDT

The logo of Swiss bank Credit Suisse is seen below the Swiss national flag at a building in the Federal Square in Bern May 15, 2014. REUTERS/Ruben Sprich

Credit: Reuters/Ruben Sprich

The logo of Swiss bank Credit Suisse is seen below the Swiss national flag at a building in the Federal Square in Bern May 15, 2014.

Credit: Reuters/Ruben Sprich

(Reuters) – Credit Suisse on Monday became the largest bank in 20 years to plead guilty to a U.S. criminal charge, and will pay a $2.5 billion fine to authorities for helping Americans evade taxes, Attorney General Eric Holder said.

But the Swiss bank escaped the worst for its business – its top management stayed in place, and the New York state bank regulator said it had decided not to revoke the bank’s license in the state.

U.S. prosecutors said the bank helped clients deceive U.S. tax authorities by concealing assets in illegal, undeclared bank accounts, in a conspiracy that spanned decades, and in one case began more than a century ago.

“This case shows that no financial institution, no matter its size or global reach, is above the law,” Holder said at a news conference in Washington.

The Justice Department has not frequently pursued such convictions of financial companies, especially large ones that could become destabilized following an indictment, but U.S. politicians have pushed for tougher punishment for big banks in response to the 2007-2009 financial crisis.

Credit Suisse will pay financial penalties to the U.S. Department of Justice, the Internal Revenue Service, the Federal Reserve and New York’s banking regulator, the New York State Department of Financial Services, to settle the matter. It had already paid just under $200 million to the Securities and Exchange Commission.

“We deeply regret the past misconduct that led to this settlement,” Credit Suisse Chief Executive Brady Dougan said in a statement. “We have seen no material impact on our business resulting from the heightened public attention on this issue in the past several weeks,” he said.

The bank will take an after-tax charge of 1.6 billion Swiss francs ($1.79 billion) in the second quarter, it said, adding it will reduce assets, sell real estate and take other actions to keep its capital at strong levels.

Credit Suisse is the largest bank to plead guilty to a criminal charge in 20 years, Holder said.

Dougan, who has come under pressure from Swiss politicians to resign, and Chairman Urs Rohner would both stay in their jobs after the settlement, a person close to Credit Suisse said on Monday. Credit Suisse declined to comment.

Article continues:

Banks Could Face Criminal Cases Soon, Attorney General Says – By Reuters Filed: 5/5/14 at 2:14 PM

Eric Holder

(Reuters) – The U.S. Justice Department is pursuing criminal investigations of financial institutions that could result in action in the coming weeks and months, U.S. Attorney General Eric Holder said in a video, adding that no company was “too big to jail.”

The comments, made in a video posted on the Justice Department’s website on Monday, came as federal prosecutors push two banks, BNP Paribas SA and Credit Suisse AG, to plead guilty to criminal charges to resolve investigations into sanctions and tax violations, respectively, according to people familiar with the probes.

While Holder did not name any banks, he said he is personally monitoring the ongoing investigations into financial institutions and is “resolved to seeing them through.”

“I intend to reaffirm the principle that no individual or entity that does harm to our economy is ever above the law,” Holder said in the video. “There is no such thing as ‘too big to jail.'”

French bank BNP Paribas warned last week it faces fines from U.S. authorities in excess of $1.1 billion over allegations that it violated U.S. sanctions against Iran and other countries.

The Swiss finance minister met Holder on Friday to discuss a U.S. probe into Swiss banks that allegedly helped Americans evade U.S. taxes, which includes Credit Suisse.

While units of financial institutions have agreed to plead guilty to breaking U.S. criminal laws, such agreements have usually involved foreign subsidiaries who have little contact with U.S. regulators.

Article continues: