Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged 2013

Rss Feed Group items tagged

Paul Merrell

Fisa court oversight: a look inside a secret and empty process | Glenn Greenwald | Comm... - 0 views

  • Since we began began publishing stories about the NSA's massive domestic spying apparatus, various NSA defenders – beginning with President Obama - have sought to assure the public that this is all done under robust judicial oversight. "When it comes to telephone calls, nobody is listening to your telephone calls," he proclaimed on June 7 when responding to our story about the bulk collection of telephone records, adding that the program is "fully overseen" by "the Fisa court, a court specially put together to evaluate classified programs to make sure that the executive branch, or government generally, is not abusing them". Obama told Charlie Rose last night:"What I can say unequivocally is that if you are a US person, the NSA cannot listen to your telephone calls … by law and by rule, and unless they … go to a court, and obtain a warrant, and seek probable cause, the same way it's always been, the same way when we were growing up and we were watching movies, you want to go set up a wiretap, you got to go to a judge, show probable cause."The GOP chairman of the House Intelligence Committee, Mike Rogers, told CNN that the NSA "is not listening to Americans' phone calls. If it did, it is illegal. It is breaking the law." Talking points issued by the House GOP in defense of the NSA claimed that surveillance law only "allows the Government to acquire foreign intelligence information concerning non-U.S.-persons (foreign, non-Americans) located outside the United States."
  • The decisions about who has their emails and telephone calls intercepted by the NSA is made by the NSA itself, not by the Fisa court, except where the NSA itself concludes the person is a US citizen and/or the communication is exclusively domestic. But even in such cases, the NSA often ends up intercepting those communications of Americans without individualized warrants, and all of this is left to the discretion of the NSA analysts with no real judicial oversight.
  • The NSA's media defenders have similarly stressed that the NSA's eavesdropping and internet snooping requires warrants when it involves Americans. The Washington Post's Charles Lane told his readers: "the government needs a court-issued warrant, based on probable cause, to listen in on phone calls." The Post's David Ignatius told Post readers that NSA internet surveillance "is overseen by judges who sit on the Foreign Intelligence Surveillance Court" and is "lawful and controlled". Tom Friedman told New York Times readers that before NSA analysts can invade the content of calls and emails, they "have to go to a judge to get a warrant to actually look at the content under guidelines set by Congress."This has become the most common theme for those defending NSA surveillance. But these claim are highly misleading, and in some cases outright false.
  • ...1 more annotation...
  • What is vital to recognize is that the NSA is collecting and storing staggering sums of communications every day. Back in 2010, the Washington Post reported that "every day, collection systems at the National Security Agency intercept and store 1.7 billion e-mails, phone calls and other types of communications." Documents published by the Guardian last week detail that, in March 2013, the NSA collected three billions of pieces of intelligence just from US communications networks alone.In sum, the NSA is vacuuming up enormous amounts of communications involving ordinary Americans and people around the world who are guilty of nothing. There are some legal constraints governing their power to examine the content of those communications, but there are no technical limits on the ability either of the agency or its analysts to do so. The fact that there is so little external oversight is what makes this sweeping, suspicion-less surveillance system so dangerous. It's also what makes the assurances from government officials and their media allies so dubious.
  •  
    Glenn Greenwald strikes again with hard proof from NSA documents, dissecting procedures used throughout the intelligence establishment from the NSA to the President to Congress, casting severe doubt on what we have been told by those defending the NSA surveillance program. I have highlighted only a few points from this lengthy article. As to Greenwald's discussion of the FISA Court's weaknesses, he omitted one that I believe is incredibly, the lack of an adversarial system with a lawyer opposing what the government asks the Court to authorize. True, search warrants are normally issued in the U.S. with only the government represented in the process. But there is a crucial difference: once someone is charged with a crime, the warrant must be disclosed to the defendant who can ask the court to suppress all evidence unlawfully obtained not only through the warrant but also the fruits of any unlawfully obtained evidence, meaning subsequently discovered evidence that would not have been found absent the unlawfully obtained evidence. The same result can happen if the warrant is found to be invalid for any of a variety of reasons, or the officers exceeded the scope of the search authorized.  So in the normal search warrant process, the participation of an adversary attorney is only delayed; it is not virtually eliminated as it is in the FISA Court. Thus far, only those ordered to disclose records to the NSA have been granted standing to oppose disclosure, not those who have been surveilled. The entire U.S. judicial system is built around the principle of an adversarial process. Judges are expected to be neutral arbiters between two or more sides to a dispute. We do not have an inquisitorial system, as is used for example in some European nations, where the judge is also the investigator. The FISA court is presently composed of 11 federal district court judges who also preside over normal cases in their individual districts. Steeped in the adversarial system and th
Paul Merrell

Why the NSA's Defense of Mass Data Collection Makes No Sense - Bruce Schneier - The Atl... - 0 views

  • The basic government defense of the NSA's bulk-collection programs—whether it be the list of all the telephone calls you made, your email address book and IM buddy list, or the messages you send your friends—is that what the agency is doing is perfectly legal, and doesn’t really count as surveillance, until a human being looks at the data. It's what Director of National Intelligence James R. Clapper meant when he lied to Congress. When asked, "Does the NSA collect any type of data at all on millions or hundreds of millions of Americans?" he replied, "No sir, not wittingly." To him, the definition of "collect" requires that a human look at it. So when the NSA collects—using the dictionary definition of the word—data on hundreds of millions of Americans, it’s not really collecting it, because only computers process it. <div><a href="http://pubads.g.doubleclick.net/gampad/jump?iu=%2F4624%2FTheAtlanticOnline%2Fchannel_politics&t=src%3Dblog%26by%3Dbruce-schneier%26title%3Dwhy-the-nsas-defense-of-mass-data-collection-makes-no-sense%26pos%3Din-article&sz=300x185&c=898722889&tile=3" title=""><img src="http://pubads.g.doubleclick.net/gampad/ad?iu=%2F4624%2FTheAtlanticOnline%2Fchannel_politics&t=src%3Dblog%26by%3Dbruce-schneier%26title%3Dwhy-the-nsas-defense-of-mass-data-collection-makes-no-sense%26pos%3Din-article&sz=300x185&c=898722889&tile=3" alt="" /></a></div> The NSA maintains that we shouldn't worry about human processing, either, because it has rules about accessing all that data. General Keith Alexander, director of the NSA, said that in a recent New York Times interview: "The agency is under rules preventing it from investigating that so-called haystack of data unless it has a 'reasonable, articulable' justification, involving communications with terrorists abroad, he added." There are lots of things wrong with this defense.
  •  
    Bruce Schneier tackles what's wrong with the government defense of NSA bulk surveillance, in The Atlantic, and does a very nice job of it. 
Paul Merrell

Why Obama is bombing the Caliph - RT Op-Edge - 0 views

  • This is the way the multi-trillion dollar Global War on Terror (GWOT) ends: not with a bang, but with a bigger bang. The GWOT, since its conceptualization 13 years ago, in the aftermath of 9/11, is the gift that keeps on giving. And no gift is bigger than a Transformer Al-Qaeda on steroids – bigger, brasher, and wealthier than anything Osama Bin Laden and Ayman al-Zawahiri had ever dreamt of; the IS (Islamic State, formerly known as ISIS) of Caliph Ibrahim, former Abu Bakr al-Baghdadi. US President Barack Obama, before deploying his golf holidays in Martha’s Vineyard, casually dropped that bombing the Caliph’s goons in Iraq will take months. One may interpret it as another layer of the Obama administration’s self-avowed “Don't Do Stupid Stuff” foreign policy doctrine, not so subtly mocked by prospective presidential candidate Hillary Clinton. Shock and Awe in 2003 destroyed the whole of Baghdad’s infrastructure in only a few hours. Obama also confirmed the US was showering Iraq again with humanitarian bombing “to protect American interests” (first and foremost) and, as an afterthought, “human rights in Iraq.” One could not possibly expect Obama to declare the US would now bomb “our” allies the House of Saud, who have supported/financed/weaponized IS, in Syria and Iraq. The same erstwhile ISIS that thoroughly enjoyed the marvels of US military training in a secret base in Jordan.
  • Obama also could not possibly explain why the US always supported ISIS in Syria and now decides to bomb them in Iraq. Oh, the perils of ‘Don’t Do Stupid Stuff’. So a quick translation applies.
  • Obama’s bombing of the Caliph’s goons has absolutely nothing to do with US ambassador to the UN Samantha Power’s much beloved R2P (‘responsibility to protect’) doctrine – as in the responsibility to protect up to 150,000 Yazidis, not to mention Kurds and remaining Christians, from a ‘potential’ genocide carried out by the Caliph’s goons. The whole fighter jets + drones bombing exercise, lasting ‘months’, has to do with the Benghazi syndrome. The Caliph’s goons were dead set on conquering Irbil - the capital of Iraqi Kurdistan. The Kurdistan Regional Government (KRG) is led by the wily Massoud Barzani – a long-time US client/vassal. The US maintains a consulate in Irbil. Crammed with CIA types. Or, as the New York Times so lovingly puts it, “thousands of Americans.” Enter Benghazi. This is an electoral year. Obama is absolutely terrified of another Benghazi – which Republicans have been trying non-stop to blame on his administration’s incompetence. The last thing Obama needs is the Caliph’s goons killing ‘diplomats’ in Erbil. That would certainly raise a tsunami of questions all over again about the shady CIA weapon-smuggling racket – as in arming Syrian ‘rebels’ with weapons from Libya - at the time Benghazi took place. As secretary of state, Hillary Clinton, of course, also knew about it all. But then, and especially now, no one should know that the CIA was weaponizing the bulk of the future Caliph’s forces.
  • ...4 more annotations...
  • Obama said this humanitarian bombing adventure could last “months,” but in fact it could last only days. The price is cheap: regime change. As in former Iraqi Prime Minister Nouri al-Maliki blocked from having a third term. That explains why all hell broke loose in Baghdad, as Iraqi parliamentarians clearly saw which way the wind is blowing. Haider al-Abadi was chosen by new President Fuad Masoum, a Kurd, as the new prime minister – hours after Maliki positioned Special Forces in strategic sites in and around the Green Zone and may (or may not) have tried to stage a coup. Maliki maintains that Masoum violated the Iraqi constitution by not selecting him to form a new cabinet; after all, his State of Law bloc got the most votes in last April’s parliamentary elections.
  • Obama, predictably, was delighted. But whatever happens next, Maliki won’t go down quietly – to say the least. Even as the predominant narrative among Sunnis, a substantial number of Kurds and even some Shiite political blocs is that Maliki antagonized Sunnis all-out; and that’s what drove them to support the Caliph en masse (although now many are having second thoughts.) As for the KRG and Barzani, in the Obama administration scheme of things, what matters is that they should not declare independence. As long as Barzani promises to Obama that Kurdistan stays inside Iraq, the KRG will get more bombs and drones and the ‘humanitarian’ operation will speed up. US Special Forces are already deployed all over the huge area where the Caliphate borders the KRG, in so-called desert forward operating positions. And the US for all practical purposes is now the Iraqi Air Force against the Caliph. Watch ‘the Hillarator’ This Obama administration warped R2P – protection for Americans first, refugees second – will accomplish nothing for a key reason; no bombing – ‘humanitarian’ or otherwise - exterminates a political/religious movement, even one as demented as IS. The Caliphate prospers, somewhat, and expands, because unlike that pathetic Free Syrian Army (FSA) it’s winning territory, desert and urban, in both Syria and Iraq; an area bigger than Great Britain already, holding at least 6 million people.
  • As for the much-peddled Washington myth of ‘good’ and ‘bad’ jihadists, the Caliphate also exploded it. Virtually every jihadi Washington - and Riyadh – weaponized and trained in Jordan and in the Turkey-Syria border is now among the Caliph’s goons, wallowing in cash raised from oil smuggling, hardcore blackmail and ‘donations’, and weaponized to their teeth after looting four Iraqi divisions and a Syrian brigade. As for the GWOT gift, it will keep on giving in a bigger and bigger bang because of the dream narrative now displayed for every aspiring multinational jihadi; we are now defending our Caliphate from the mighty Crusader Air Force, no less. The US lost the war in Iraq, miserably, only nine days after the fall of Baghdad, in April 2003. No ‘humanitarian’ bombing will turn it into a victory. And no ‘humanitarian’ bombing will finish the Caliphate off. As for prospective presidential candidate Hillary Clinton, she’s taking no prisoners. She insists the US should have bombed Syria in the first place; then there would be no Caliphate. But now she worries the Caliph will attack Europe and even the US (“I’m thinking a lot about containment, deterrence and defeat”). Predictably positioning herself, Clinton could not but totally dismiss Obama’s foreign policy doctrine, a.k.a. ‘Don’t do stupid stuff’: “‘Don’t do stupid stuff’ is not an organizing principle.” So the world will have to wait until 2017, when she’s finally able to implement her own doctrine/organizing principle: “We came, we saw, he died.”
  • This is the way the multi-trillion dollar Global War on Terror (GWOT) ends: not with a bang, but with a bigger bang. The GWOT, since its conceptualization 13 years ago, in the aftermath of 9/11, is the gift that keeps on giving. And no gift is bigger than a Transformer Al-Qaeda on steroids – bigger, brasher, and wealthier than anything Osama Bin Laden and Ayman al-Zawahiri had ever dreamt of; the IS (Islamic State, formerly known as ISIS) of Caliph Ibrahim, former Abu Bakr al-Baghdadi. US President Barack Obama, before deploying his golf holidays in Martha’s Vineyard, casually dropped that bombing the Caliph’s goons in Iraq will take months. One may interpret it as another layer of the Obama administration’s self-avowed “Don't Do Stupid Stuff” foreign policy doctrine, not so subtly mocked by prospective presidential candidate Hillary Clinton. Shock and Awe in 2003 destroyed the whole of Baghdad’s infrastructure in only a few hours. Obama also confirmed the US was showering Iraq again with humanitarian bombing “to protect American interests” (first and foremost) and, as an afterthought, “human rights in Iraq.”
  •  
    "Enter Benghazi. This is an electoral year. Obama is absolutely terrified of another Benghazi - which Republicans have been trying non-stop to blame on his administration's incompetence. The last thing Obama needs is the Caliph's goons killing 'diplomats' in Erbil. "That would certainly raise a tsunami of questions all over again about the shady CIA weapon-smuggling racket - as in arming Syrian 'rebels' with weapons from Libya - at the time Benghazi took place. As secretary of state, Hillary Clinton, of course, also knew about it all. But then, and especially now, no one should know that the CIA was weaponizing the bulk of the future Caliph's forces." Yup. It's the same reason that the House investigation of the Benghazi incident will never punch through to the truth. The War Party doesn't want its Benghazi CIA ratline for Libyan weapons to Turkey being exposed because that leads directly to the fact that ISIS is a U.S.-Saudi creation. Remember Wayne Madsen's article on why Obama backed down from his planned missile and bombing attack on Syria after the Ghouta false flag Sarin attack in August 2013: ""Some within the Pentagon ranks are so displeased with Obama's policies on Syria, they have let certain members of Congress of both parties know that «smoking gun» proof exists that Obama and CIA director John O. Brennan personally authorized the transfer of arms and personnel from Al-Qaeda-linked Ansar al Sharia Islamist rebels in Libya to Syria's Jabhat al Nusra rebels, who are also linked to Al Qaeda, in what amounts to an illegal «Iran-contra»-like scandal." http://www.strategic-culture.org/news/2013/09/04/american-generals-stand-between-war-and-peace.html And the detailed confirmation that events had actually transpired in accordance with that plan by Yossef Bodansky - Director of the Congressional Task Force on Terrorism and Unconventional Warfare of the US House of Representatives from 1988 to 2004 and the center of an enormous global
Paul Merrell

The Latest Rules on How Long NSA Can Keep Americans' Encrypted Data Look Too Familiar |... - 0 views

  • Does the National Security Agency (NSA) have the authority to collect and keep all encrypted Internet traffic for as long as is necessary to decrypt that traffic? That was a question first raised in June 2013, after the minimization procedures governing telephone and Internet records collected under Section 702 of the Foreign Intelligence Surveillance Act were disclosed by Edward Snowden. The issue quickly receded into the background, however, as the world struggled to keep up with the deluge of surveillance disclosures. The Intelligence Authorization Act of 2015, which passed Congress this last December, should bring the question back to the fore. It established retention guidelines for communications collected under Executive Order 12333 and included an exception that allows NSA to keep ‘incidentally’ collected encrypted communications for an indefinite period of time. This creates a massive loophole in the guidelines. NSA’s retention of encrypted communications deserves further consideration today, now that these retention guidelines have been written into law. It has become increasingly clear over the last year that surveillance reform will be driven by technological change—specifically by the growing use of encryption technologies. Therefore, any legislation touching on encryption should receive close scrutiny.
  • Section 309 of the intel authorization bill describes “procedures for the retention of incidentally acquired communications.” It establishes retention guidelines for surveillance programs that are “reasonably anticipated to result in the acquisition of [telephone or electronic communications] to or from a United States person.” Communications to or from a United States person are ‘incidentally’ collected because the U.S. person is not the actual target of the collection. Section 309 states that these incidentally collected communications must be deleted after five years unless they meet a number of exceptions. One of these exceptions is that “the communication is enciphered or reasonably believed to have a secret meaning.” This exception appears to be directly lifted from NSA’s minimization procedures for data collected under Section 702 of FISA, which were declassified in 2013. 
  • While Section 309 specifically applies to collection taking place under E.O. 12333, not FISA, several of the exceptions described in Section 309 closely match exceptions in the FISA minimization procedures. That includes the exception for “enciphered” communications. Those minimization procedures almost certainly served as a model for these retention guidelines and will likely shape how this new language is interpreted by the Executive Branch. Section 309 also asks the heads of each relevant member of the intelligence community to develop procedures to ensure compliance with new retention requirements. I expect those procedures to look a lot like the FISA minimization guidelines.
  • ...6 more annotations...
  • This language is broad, circular, and technically incoherent, so it takes some effort to parse appropriately. When the minimization procedures were disclosed in 2013, this language was interpreted by outside commentators to mean that NSA may keep all encrypted data that has been incidentally collected under Section 702 for at least as long as is necessary to decrypt that data. Is this the correct interpretation? I think so. It is important to realize that the language above isn’t just broad. It seems purposefully broad. The part regarding relevance seems to mirror the rationale NSA has used to justify its bulk phone records collection program. Under that program, all phone records were relevant because some of those records could be valuable to terrorism investigations and (allegedly) it isn’t possible to collect only those valuable records. This is the “to find a needle a haystack, you first have to have the haystack” argument. The same argument could be applied to encrypted data and might be at play here.
  • This exception doesn’t just apply to encrypted data that might be relevant to a current foreign intelligence investigation. It also applies to cases in which the encrypted data is likely to become relevant to a future intelligence requirement. This is some remarkably generous language. It seems one could justify keeping any type of encrypted data under this exception. Upon close reading, it is difficult to avoid the conclusion that these procedures were written carefully to allow NSA to collect and keep a broad category of encrypted data under the rationale that this data might contain the communications of NSA targets and that it might be decrypted in the future. If NSA isn’t doing this today, then whoever wrote these minimization procedures wanted to at least ensure that NSA has the authority to do this tomorrow.
  • There are a few additional observations that are worth making regarding these nominally new retention guidelines and Section 702 collection. First, the concept of incidental collection as it has typically been used makes very little sense when applied to encrypted data. The way that NSA’s Section 702 upstream “about” collection is understood to work is that technology installed on the network does some sort of pattern match on Internet traffic; say that an NSA target uses example@gmail.com to communicate. NSA would then search content of emails for references to example@gmail.com. This could notionally result in a lot of incidental collection of U.S. persons’ communications whenever the email that references example@gmail.com is somehow mixed together with emails that have nothing to do with the target. This type of incidental collection isn’t possible when the data is encrypted because it won’t be possible to search and find example@gmail.com in the body of an email. Instead, example@gmail.com will have been turned into some alternative, indecipherable string of bits on the network. Incidental collection shouldn’t occur because the pattern match can’t occur in the first place. This demonstrates that, when communications are encrypted, it will be much harder for NSA to search Internet traffic for a unique ID associated with a specific target.
  • This lends further credence to the conclusion above: rather than doing targeted collection against specific individuals, NSA is collecting, or plans to collect, a broad class of data that is encrypted. For example, NSA might collect all PGP encrypted emails or all Tor traffic. In those cases, NSA could search Internet traffic for patterns associated with specific types of communications, rather than specific individuals’ communications. This would technically meet the definition of incidental collection because such activity would result in the collection of communications of U.S. persons who aren’t the actual targets of surveillance. Collection of all Tor traffic would entail a lot of this “incidental” collection because the communications of NSA targets would be mixed with the communications of a large number of non-target U.S. persons. However, this “incidental” collection is inconsistent with how the term is typically used, which is to refer to over-collection resulting from targeted surveillance programs. If NSA were collecting all Tor traffic, that activity wouldn’t actually be targeted, and so any resulting over-collection wouldn’t actually be incidental. Moreover, greater use of encryption by the general public would result in an ever-growing amount of this type of incidental collection.
  • This type of collection would also be inconsistent with representations of Section 702 upstream collection that have been made to the public and to Congress. Intelligence officials have repeatedly suggested that search terms used as part of this program have a high degree of specificity. They have also argued that the program is an example of targeted rather than bulk collection. ODNI General Counsel Robert Litt, in a March 2014 meeting before the Privacy and Civil Liberties Oversight Board, stated that “there is either a misconception or a mischaracterization commonly repeated that Section 702 is a form of bulk collection. It is not bulk collection. It is targeted collection based on selectors such as telephone numbers or email addresses where there’s reason to believe that the selector is relevant to a foreign intelligence purpose.” The collection of Internet traffic based on patterns associated with types of communications would be bulk collection; more akin to NSA’s collection of phone records en mass than it is to targeted collection focused on specific individuals. Moreover, this type of collection would certainly fall within the definition of bulk collection provided just last week by the National Academy of Sciences: “collection in which a significant portion of the retained data pertains to identifiers that are not targets at the time of collection.”
  • The Section 702 minimization procedures, which will serve as a template for any new retention guidelines established for E.O. 12333 collection, create a large loophole for encrypted communications. With everything from email to Internet browsing to real-time communications moving to encrypted formats, an ever-growing amount of Internet traffic will fall within this loophole.
  •  
    Tucked into a budget authorization act in December without press notice. Section 309 (the Act is linked from the article) appears to be very broad authority for the NSA to intercept any form of telephone or other electronic information in bulk. There are far more exceptions from the five-year retention limitation than the encrypted information exception. When reading this, keep in mind that the U.S. intelligence community plays semantic games to obfuscate what it does. One of its word plays is that communications are not "collected" until an analyst looks at or listens to partiuclar data, even though the data will be searched to find information countless times before it becomes "collected." That searching was the major basis for a decision by the U.S. District Court in Washington, D.C. that bulk collection of telephone communications was unconstitutional: Under the Fourth Amendment, a "search" or "seizure" requiring a judicial warrant occurs no later than when the information is intercepted. That case is on appeal, has been briefed and argued, and a decision could come any time now. Similar cases are pending in two other courts of appeals. Also, an important definition from the new Intelligence Authorization Act: "(a) DEFINITIONS.-In this section: (1) COVERED COMMUNICATION.-The term ''covered communication'' means any nonpublic telephone or electronic communication acquired without the consent of a person who is a party to the communication, including communications in electronic storage."       
Paul Merrell

Feds operated yet another secret metadata database until 2013 | Ars Technica - 0 views

  • In a new court filing, the Department of Justice revealed that it kept a secret database of telephone metadata—with one party in the United States and another abroad—that ended in 2013. The three-page partially-redacted affidavit from a top Drug Enforcement Agency (DEA) official, which was filed Thursday, explained that the database was authorized under a particular federal drug trafficking statute. The law allows the government to use "administrative subpoenas" to obtain business records and other "tangible things." The affidavit does not specify which countries records were included, but specifically does mention Iran. This database program appears to be wholly separate from the National Security Agency’s metadata program revealed by Edward Snowden, but it targets similar materials and is collected by a different agency. The Wall Street Journal, citing anonymous sources, reported Friday that this newly-revealed program began in the 1990s and was shut down in August 2013.
  • The criminal case involves an Iranian-American man named Shantia Hassanshahi, who is accused of violating the American trade embargo against Iran. His lawyer, Mir Saied Kashani, told Ars that the government has clearly abused its authority. "They’ve converted this from a war on drugs to a war on privacy," he said. "[Hassanshahi] is not accused of any drug crime but they used this drug enforcement information to gather information against him, that's contrary to the law, and we will revisit that. We will bring motions in the court and we will appeal if necessary." Neither the DEA nor the Department of Justice immediately responded to Ars' query as to whether this program is continuing under a different authority.
  • The story begins in 2011, when a Department of Homeland Security (DHS) agent received a tip about someone who might be in violation of American sanctions against Iran. The source provided an e-mail from an Iranian businessman, Manoucher Sheiki, who was involved in acquiring power grid equipment. A second Homeland Security agent, Joshua Akronowitz, wrote in a 2013 affidavit that he searched Sheiki’s Iranian phone number in this database, but declined to explain exactly what kind of database it was. Akronowitz found that the Iranian number came up exactly one time in the database, and was linked to an 818 number, based in Los Angeles County. That number turned out to be the Google Voice number of Hassanshahi. DHS then subpoenaed Google, and got Hassanshahi’s call log and later, metadata on his Gmail account. By early 2012, the agency found out that he was set to return to Los Angeles from Iran. At LAX Airport, customs agents seized his phone, laptop, thumb drives, camcorder, and SIM cards and sent them to Homeland Security. Last year, Kashani, Hassanshahi’s lawyer, argued that this evidence should be suppressed on account that it was the "fruit of the poisonous tree"—obtained via illicit means. In support of his arguments, Kashani cited an important ongoing NSA-related lawsuit, Klayman v. Obama, which remains the only instance where a judge has order the NSA metadata program to be shut down—that order was stayed pending an appeal. (Earlier this month, Ars explored Klayman and other pending notable surveillance cases.)
  • ...3 more annotations...
  • In a December 2014 opinion in the Hassanshahi case, US District Judge Rudolph Contreras allowed the evidence, but also required that the government provide a "declaration summarizing the contours of the law enforcement database used by Homeland Security Investigations to discover Hassanshahi’s phone number, including any limitations on how and when the database may be used." To comply with the judge’s order, Robert Patterson, the assistant special agent in charge of the DEA, wrote in the Thursday filing: As noted, this database was a federal law enforcement database. It could be used to query a telephone number where federal law enforcement officials had a reasonable articulable suspicion that the telephone number at issue was related to an ongoing federal criminal investigation. The Iranian number was determined to meet this standard based on specific information indicating that the Iranian number was being used for the purpose of importing technological goods to Iran in violation of United States law. Previously, the government had not revealed exactly how it began its investigation of Hassanshahi, and only referred cryptically to "[DHS]-accessible law enforcement databases," in Akronowitz’ 2013 and  2014 affidavits.
  • Similarly, other privacy-minded legal experts questioned the government’s tactics in this new revelation. "We just don’t know about the scope of these things, and that’s what’s disturbing," Andrew Crocker, a legal fellow at the Electronic Frontier Foundation, told Ars. His colleague, Hanni Fakhoury, an EFF attorney who used to be a federal public defender, added that he was "not surprised." "Bulk surveillance technologies and the dangerous legal theories that are used to support them trickle down, and here's a prime example of that," he wrote by e-mail. "The DEA's mandate is of course important but not at the level of national security where as you know there are serious legal questions about the propriety of this collection of phone metadata. And if the DEA has a program like this, it wouldn't surprise me if other agencies do too for other sorts of records the government has claimed it can collect with a subpoena (like bank records)."
  • Patrick Toomey, an attorney with the American Civil Liberties Union, chimed in to say that this indeed was a clear example of government overreach. "This disclosure underscores how the government has expanded its use of bulk collection far beyond the NSA and the national-security context, to rely on mass surveillance in ordinary criminal investigations," he said by e-mail. "It’s now clear that multiple government agencies have tracked the calls that Americans make to their parents and relatives, friends, and business associates overseas, all without any suspicion of wrongdoing," Toomey continued. "The DEA program shows yet again how strained and untenable legal theories have been used to secretly justify the surveillance of millions of innocent Americans using laws that were never written for that purpose."
  •  
    The authorizing statute clearly limits the scope of the administrative subpoena authority to drug related criminal investigations. "In any investigation relating to his functions under this subchapter with respect to controlled substances, listed chemicals, tableting machines, or encapsulating machines, the Attorney General may subpena witnesses, compel the attendance and testimony of witnesses, and require the production of any records (including books, papers, documents, and other tangible things which constitute or contain evidence) which the Attorney General finds relevant or material to the investigation."
Paul Merrell

Washington Post Defends Not Running Article On Iraq Media Failure - 0 views

  • Greg Mitchell, author of a recently updated book on media mistakes during the run-up to the Iraq War, So Wrong For So Long, revealed Saturday night on his blog that the Washington Post's Outlook section had killed an assigned piece related to the press debacle that was slated for publication this weekend. Mitchell noted that the Outlook section did run what he called a “misleading, cherry-picking” piece by Post media writer Paul Farhi, in which Farhi claims the media didn’t fail during the 2002-2003 rush to war.
  • The Post’s decision to run Farhi’s piece defending the press, and not Mitchell’s, got a lot of attention Sunday morning on Twitter. It was especially noteworthy given that the paper’s editorial board –- which helped promote the Bush administration’s bogus rationale for invading Iraq -– was silent on last Tuesday’s 10th anniversary of the start of the conflict. Outlook editor Carlos Lozada told The Huffington Post that the Post didn't run Mitchell's piece because it didn't draw the "broader analytical points or insights" the paper was looking for on the topic of Iraq War mea culpas. (Mitchell has posted his article here.)
Gary Edwards

THE TRUTH ABOUT SPYING: The Feds Are Intercepting Your Internet Data And Tech Giants Kn... - 0 views

  • Last year James Bamford of Wired — who wrote the book "The Shadow Factory: The NSA from 9/11 to the Eavesdropping on America" — reported that the NSA hired secretive companies linked to Israeli intelligence to establish 10 to 20 wiretapping rooms at key Internet Service Provider (ISP) telecommunication points throughout the country.
  • In 2004 AT&T engineer Mark Klein discovered that a special NSA network actively "vacuumed up Internet and phone-call data from ordinary Americans with the cooperation of AT&T," emphasizing that "much of the data sent through AT&T to the NSA was purely domestic."
  • Glenn Greenwald revealed that the National Security Agency (NSA) is secretly using the so-called "business records" provision of the Patriot Act to collect telephone records of millions of Americans from Verizon. Greenwald noted that "previous reporting has suggested the NSA has collected cell records from all major mobile networks," which was best illustrated by this ACLU infographic graphic illustrating how the NSA intercepts more than a billion electronic records and communications every day.
  • ...4 more annotations...
  • NSA whistleblowers William Binney and Thomas Drake corroborated Klein's assertions: Binney contends that the NSA analyzes the information "to be able to monitor what people are doing" and who they are doing it with while Drake maintains that the NSA is using Israeli-made NARUS hardware to "seize and save all personal electronic communications."
  • Eric Lichtblau and James Risen of the New York Times won a Pulitzer-Prize for this 2005 story: As part of the program approved by President Bush for domestic surveillance without warrants, the N.S.A. has gained the cooperation of American telecommunications companies to obtain backdoor access to streams of domestic and international communications, the officials said.
  • in January Google released a transparency report detailing the government's use of controversial legislation that bypasses judicial approval to access the online information of private citizens.
  • Given the fact that the CIA's recently visited tech conference to detail the Agency's vision for collecting and analyzing all of the information people put on the Internet, it would be naïve to think that American tech giants hasn't know that all their data belongs to NSA.
  •  
    Timeline for reports and whistleblower information going public about NSA world wide dragnet of information and communications.  Note that the official timeline the NSA slides depict the start of the Internet dragnet as late 2007, when the Bush Administration wrangled Microsoft as a source.  The whistleblower timeline starts in 2001 and is rolling worldwide by 2004.
Gary Edwards

The Empire Takes a Hit: NSA Update - 2 views

........................................................................................ NSA Conversation with retired lawyer and Open Source legal expert, "Marbux". ...........................

Federal-Reserve-Bankster-Cartel NSA

started by Gary Edwards on 15 Jun 13 no follow-up yet
Gary Edwards

As Country Club Republicans Link Up With The Democratic Ruling Class, Millions Of Voter... - 0 views

  •  
    "By Angelo Codevilla  (In August/July of 2012, Mr. Codevilla published another earth shaking analysis where he used the terms "ruling class" and "ruling elites".  This time he shakes it up exposing the Republican Party elites as part of the ruling class, consistently working against the interests of the millions of Americans who voted for them). On January 1, 2013 one third of Republican congressmen, following their leaders, joined with nearly all Democrats to legislate higher taxes and more subsidies for Democratic constituencies. Two thirds voted no, following the people who had elected them. For generations, the Republican Party had presented itself as the political vehicle for Americans whose opposition to ever-bigger government financed by ever-higher taxes makes them a "country class."  Yet modern Republican leaders, with the exception of the Reagan Administration, have been partners in the expansion of government, indeed in the growth of a government-based "ruling class." They have relished that role despite their voters. Thus these leaders gradually solidified their choice to no longer represent what had been their constituency, but to openly adopt the identity of junior partners in that ruling class. By repeatedly passing bills that contradict the identity of Republican voters and of the majority of Republican elected representatives, the Republican leadership has made political orphans of millions of Americans. In short, at the outset of 2013 a substantial portion of America finds itself un-represented, while Republican leaders increasingly represent only themselves."
Gary Edwards

Roger L. Simon » Is America in a Pre-Revolutionary State this July 4th? - 0 views

  •  
    As we approach July 4, 2013, is America in a pre-revolutionary state? Are we headed for a Tahrir Square of our own with the attendant mammoth social turmoil, possibly even violence. Could it happen here? We are two-thirds of the way into the most incompetent presidency in our history. People everywhere are fed up. Even many of the so-called liberals who propelled Barack Obama into office have stopped defending him in the face of an unprecedented number of scandals coming at us one after the other like hideous monsters in some non-stop computer game. And now looming is the monster of monsters, ObamaCare, the healthcare reform almost no one wanted and fewer understood. It will be administered by the Internal Revenue Service, an organization that has been revealed to be a kind of post-modern American Gestapo, asking not just to examine our accounting books but the books we read . What could be more totalitarian than that? Meanwhile, the Wall Street Journal warns the costs of ObamaCare are close to tripling what were promised , and the number of doctors in our country is rapidly diminishing. No more "My son, the doctor!" It doesn't pay. And young people most of all will not be able to afford escalating health insurance costs and will end up paying the fine to the IRS, simultaneously bankrupting the health system and enhancing the brutal power of the IRS - all this while unemployment numbers remain near historical highs. No one knows how many have given up looking for work while crony capitalist friends of the administration enrich themselves on mythological clean-energy projects. In fact, everywhere we look on this July Fourth sees a great civilization in decline. And much of that decline can be laid at the foot of the incumbent. Especially his own people, African Americans, have suffered.  Their unemployment numbers are catastrophic, their real needs ignored while hustlers like Sharpton, Jackson, and, sadly, even the president fan the flames of non-exi
Paul Merrell

Senators accuse government of using 'secret law' to collect Americans' data | World new... - 0 views

  • A bipartisan group of 26 US senators has written to intelligence chiefs to complain that the administration is relying on a "secret body of law" to collect massive amounts of data on US citizens.The senators accuse officials of making misleading statements and demand that the director of national intelligence James Clapper answer a series of specific questions on the scale of domestic surveillance as well as the legal justification for it.In their strongly-worded letter to Clapper, the senators said they believed the government may be misinterpreting existing legislation to justify the sweeping collection of telephone and internet data revealed by the Guardian."We are concerned that by depending on secret interpretations of the Patriot Act that differed from an intuitive reading of the statute, this program essentially relied for years on a secret body of law," they say.
  • "This and misleading statements by intelligence officials have prevented our constituents from evaluating the decisions that their government was making, and will unfortunately undermine trust in government more broadly."This is the strongest attack yet from Congress since the disclosures began, and comes after Clapper admitted he had given "the least untruthful answer possible" when pushed on these issues by Senators at a hearing before the latest revelations by the Guardian and the Washington Post.In a press statement, the group of senators added: "The recent public disclosures of secret government surveillance programs have exposed how secret interpretations of the USA Patriot Act have allowed for the bulk collection of massive amounts of data on the communications of ordinary Americans with no connection to wrongdoing."
  • They said: "Reliance on secret law to conduct domestic surveillance activities raises serious civil liberty concerns and all but removes the public from an informed national security and civil liberty debate." A spokesman for the office of the director of national intelligence (ODNI) acknowledged the letter. "The ODNI received a letter from 26 senators this morning requesting further engagement on vital intelligence programs recently disclosed in the media, which we are still evaluating. The intelligence and law enforcement communities will continue to work with all members of Congress to ensure the proper balance of privacy and protection for American citizens."The letter was organised by Oregan Democrat Ron Wyden, a member of the intelligence committee, but includes four Republican senators: Mark Kirk, Mike Lee, Lisa Murkowski and Dean Heller.
  • ...3 more annotations...
  • The senators said they were seeking public answers to the following questions in order to give the American people the information they need to conduct an informed public debate. The specific questions include:• How long has the NSA used Patriot Act authorities to engage in bulk collection of Americans' records? Was this collection underway when the law was reauthorized in 2006?• Has the NSA used USA Patriot Act authorities to conduct bulk collection of any other types of records pertaining to Americans, beyond phone records?• Has the NSA collected or made any plans to collect Americans' cell-site location data in bulk?• Have there been any violations of the court orders permitting this bulk collection, or of the rules governing access to these records? If so, please describe these violations.
  • They ask Clapper to publicly provide information about the duration and scope of the program and provide examples of its effectiveness in providing unique intelligence, if such examples exist.The senators also expressed their concern that the program itself has a significant impact on the privacy of law-abiding Americans and that the Patriot Act could be used for the bulk collection of records beyond phone metadata."The Patriot Act's 'business records' authority can be used to give the government access to private financial, medical, consumer and firearm sales records, among others," said a press statement.In addition to raising concerns about the law's scope, the senators noted that keeping the official interpretation of the law secret and the instances of misleading public statements from executive branch officials prevented the American people from having an informed public debate about national security and domestic surveillance.
  • A bipartisan group of 26 US senators has written to intelligence chiefs to complain that the administration is relying on a "secret body of law" to collect massive amounts of data on US citizens.The senators accuse officials of making misleading statements and demand that the director of national intelligence James Clapper answer a series of specific questions on the scale of domestic surveillance as well as the legal justification for it.In their strongly-worded letter to Clapper, the senators said they believed the government may be misinterpreting existing legislation to justify the sweeping collection of telephone and internet data revealed by the Guardian."We are concerned that by depending on secret interpretations of the Patriot Act that differed from an intuitive reading of the statute, this program essentially relied for years on a secret body of law," they say."This and misleading statements by intelligence officials have prevented our constituents from evaluating the decisions that their government was making, and will unfortunately undermine trust in government more broadly."
Paul Merrell

Yair Lapid - Wikipedia - 0 views

  • Yair Lapid (Hebrew: יאיר לפיד‎‎, born 5 November 1963) is an Israeli politician, former Finance Minister and former journalist who is the Chairman of the Yesh Atid Party. He served as the Israeli Minister of Finance between 2013 and 2014. Prior to his entry into politics in 2012, he was a journalist, author, TV presenter and news anchor. The centrist Yesh Atid Party, which he founded, became the second largest party in the Knesset by winning 19 seats in its first election in 2013. The greater than anticipated results contributed to Lapid's reputation as a leading moderate. In March 2013, following his coalition agreement with Likud, Lapid was appointed as the Israeli Minister of Finance. In May 2013, Lapid ranked first on the list of the "Most Influential Jews in the World" by The Jerusalem Post
  •  
    Mentioned as possible successor to Netanyahu if the latter is removed from office because of corruption charges.
Paul Merrell

Trump's 'Wag the Dog' Moment - Consortiumnews - 0 views

  • Just two days after news broke of an alleged poison-gas attack in northern Syria, President Trump brushed aside advice from some U.S. intelligence analysts doubting the Syrian regime’s guilt and launched a lethal retaliatory missile strike against a Syrian airfield.
  • Trump immediately won plaudits from Official Washington, especially from neoconservatives who have been trying to wrestle control of his foreign policy away from his nationalist and personal advisers since the days after his surprise victory on Nov. 8. There is also an internal dispute over the intelligence. On Thursday night, Secretary of State Rex Tillerson said the U.S. intelligence community assessed with a “high degree of confidence” that the Syrian government had dropped a poison gas bomb on civilians in Idlib province. But a number of intelligence sources have made contradictory assessments, saying the preponderance of evidence suggests that Al Qaeda-affiliated rebels were at fault, either by orchestrating an intentional release of a chemical agent as a provocation or by possessing containers of poison gas that ruptured during a conventional bombing raid. One intelligence source told me that the most likely scenario was a staged event by the rebels intended to force Trump to reverse a policy, announced only days earlier, that the U.S. government would no longer seek “regime change” in Syria and would focus on attacking the common enemy, Islamic terror groups that represent the core of the rebel forces.
  • The source said the Trump national security team split between the President’s close personal advisers, such as nationalist firebrand Steve Bannon and son-in-law Jared Kushner, on one side and old-line neocons who have regrouped under National Security Adviser H.R. McMaster, an Army general who was a protégé of neocon favorite Gen. David Petraeus. White House Infighting In this telling, the earlier ouster of retired Gen. Michael Flynn as national security adviser and this week’s removal of Bannon from the National Security Council were key steps in the reassertion of neocon influence inside the Trump presidency. The strange personalities and ideological extremism of Flynn and Bannon made their ousters easier, but they were obstacles that the neocons wanted removed. Though Bannon and Kushner are often presented as rivals, the source said, they shared the belief that Trump should tell the truth about Syria, revealing the Obama administration’s CIA analysis that a fatal sarin gas attack in 2013 was a “false-flag” operation intended to sucker President Obama into fully joining the Syrian war on the side of the rebels — and the intelligence analysts’ similar beliefs about Tuesday’s incident. Instead, Trump went along with the idea of embracing the initial rush to judgment blaming Assad for the Idlib poison-gas event. The source added that Trump saw Thursday night’s missile assault as a way to change the conversation in Washington, where his administration has been under fierce attack from Democrats claiming that his election resulted from a Russian covert operation. If changing the narrative was Trump’s goal, it achieved some initial success with several of Trump’s fiercest neocon critics, such as neocon Senators John McCain and Lindsey Graham, praising the missile strike, as did Israeli Prime Minister Benjamin Netanyahu. The neocons and Israel have long sought “regime change” in Damascus even if the ouster of Assad might lead to a victory by Islamic extremists associated with Al Qaeda and/or the Islamic State.
  • ...6 more annotations...
  • Trump employing a “wag the dog” strategy, in which he highlights his leadership on an international crisis to divert attention from domestic political problems, is reminiscent of President Bill Clinton’s threats to attack Serbia in early 1999 as his impeachment trial was underway over his sexual relationship with intern Monica Lewinsky. (Clinton also was accused of a “wag-the-dog” strategy when he fired missiles at supposed Al Qaeda bases in Afghanistan and Sudan in 1998 in retaliation for the bombing of U.S. embassies in Kenya and Tanzania.)
  • Trump’s advisers, in briefing the press on Thursday night, went to great lengths to highlight Trump’s compassion toward the victims of the poison gas and his decisiveness in bombing Assad’s military in contrast to Obama’s willingness to allow the intelligence community to conduct a serious review of the evidence surrounding the 2013 sarin-gas case. Ultimately, Obama listened to his intelligence advisers who told him there was no “slam-dunk” evidence implicating Assad’s regime and he pulled back from a military strike at the last minute – while publicly maintaining the fiction that the U.S. government was certain of Assad’s guilt. In both cases – 2013 and 2017 – there were strong reasons to doubt Assad’s responsibility. In 2013, he had just invited United Nations inspectors into Syria to investigate cases of alleged rebel use of chemical weapons and thus it made no sense that he would launch a sarin attack in the Damascus suburbs, guaranteeing that the U.N. inspectors would be diverted to that case. Similarly, now, Assad’s military has gained a decisive advantage over the rebels and he had just scored a major diplomatic victory with the Trump administration’s announcement that the U.S. was no longer seeking “regime change” in Syria. The savvy Assad would know that a chemical weapon attack now would likely result in U.S. retaliation and jeopardize the gains that his military has achieved with Russian and Iranian help. The counter-argument to this logic – made by The New York Times and other neocon-oriented news outlets – essentially maintains that Assad is a crazed barbarian who was testing out his newfound position of strength by baiting President Trump. Of course, if that were the case, it would have made sense that Assad would have boasted of his act, rather than deny it.
  • Alarm within the U.S. intelligence community about Trump’s hasty decision to attack Syria reverberated from the Middle East back to Washington, where former CIA officer Philip Giraldi reported hearing from his intelligence contacts in the field that they were shocked at how the new poison-gas story was being distorted by Trump and the mainstream U.S. news media.
  • Giraldi told Scott Horton’s Webcast: “I’m hearing from sources on the ground in the Middle East, people who are intimately familiar with the intelligence that is available who are saying that the essential narrative that we’re all hearing about the Syrian government or the Russians using chemical weapons on innocent civilians is a sham.” Giraldi said his sources were more in line with an analysis postulating an accidental release of the poison gas after an Al Qaeda arms depot was hit by a Russian airstrike. “The intelligence confirms pretty much the account that the Russians have been giving … which is that they hit a warehouse where the rebels – now these are rebels that are, of course, connected with Al Qaeda – where the rebels were storing chemicals of their own and it basically caused an explosion that resulted in the casualties. Apparently the intelligence on this is very clear.” Giraldi said the anger within the intelligence community over the distortion of intelligence to justify Trump’s military retaliation was so great that some covert officers were considering going public. “People in both the agency [the CIA] and in the military who are aware of the intelligence are freaking out about this because essentially Trump completely misrepresented what he already should have known – but maybe he didn’t – and they’re afraid that this is moving toward a situation that could easily turn into an armed conflict,” Giraldi said before Thursday night’s missile strike. “They are astonished by how this is being played by the administration and by the U.S. media.”
  • Regarding this week’s events, Trump’s desperation to reverse his negative media coverage and the dubious evidence blaming Assad for the Idlib incident could fit with the “Wag the Dog” movie from 1997 in which an embattled president creates a phony foreign crisis in Albania.
  • In the movie, the White House operation is a cynical psychological operation to convince the American people that innocent Albanian children, including an attractive girl carrying a cat, are in danger when, In reality, the girl was an actor posing before a green screen that allowed scenes of fiery ruins to be inserted as background. Today, because Trump and his administration are now committed to convincing Americans that Assad really was responsible for Tuesday’s poison-gas tragedy, the prospects for a full and open investigation are effectively ended. We may never know if there is truth to those allegations or whether we are being manipulated by another “wag the dog” psyop.
Paul Merrell

Stanford Researchers: It Is Trivially Easy to Match Metadata to Real People - Rebecca J... - 0 views

  • In defending the NSA's telephony metadata collection efforts, government officials have repeatedly resorted to one seemingly significant detail: This is just metadata—numbers dialed, lengths of calls. "There are no names, there’s no content in that database," President Barack Obama told Charlie Rose in June. No names; just metadata. New research from Stanford demonstrates the silliness of that distinction. Armed with very sparse metadata, Jonathan Mayer and Patrick Mutchler found it easy—trivially so—to figure out the identity of a caller. <div><a href="http://pubads.g.doubleclick.net/gampad/jump?iu=%2F4624%2FTheAtlanticOnline%2Fchannel_technology&t=src%3Dblog%26by%3Drebecca-j-rosen%26title%3Dstanford-researchers-it-is-trivially-easy-to-match-metadata-to-real-people%26pos%3Din-article&sz=300x185&c=387748957&tile=3" title=""><img src="http://pubads.g.doubleclick.net/gampad/ad?iu=%2F4624%2FTheAtlanticOnline%2Fchannel_technology&t=src%3Dblog%26by%3Drebecca-j-rosen%26title%3Dstanford-researchers-it-is-trivially-easy-to-match-metadata-to-real-people%26pos%3Din-article&sz=300x185&c=387748957&tile=3" alt="" /></a></div> Mayer and Mutchler are running an experiment which works with volunteers who agree to use an Android app, MetaPhone, that allows the researchers access to their metadata. Now, using that data, Mayer and Mutchler say that it was hardly any trouble at all to figure out who the phone numbers belonged to, and they did it in just a few hours.
  • They write: We randomly sampled 5,000 numbers from our crowdsourced MetaPhone dataset and queried the Yelp, Google Places, and Facebook directories. With little marginal effort and just those three sources—all free and public—we matched 1,356 (27.1%) of the numbers. Specifically, there were 378 hits (7.6%) on Yelp, 684 (13.7%) on Google Places, and 618 (12.3%) on Facebook. What about if an organization were willing to put in some manpower? To conservatively approximate human analysis, we randomly sampled 100 numbers from our dataset, then ran Google searches on each. In under an hour, we were able to associate an individual or a business with 60 of the 100 numbers. When we added in our three initial sources, we were up to 73. How about if money were no object? We don’t have the budget or credentials to access a premium data aggregator, so we ran our 100 numbers with Intelius, a cheap consumer-oriented service. 74 matched.1 Between Intelius, Google search, and our three initial sources, we associated a name with 91 of the 100 numbers.
  • Their results weren't perfect (and they note that the Intelius data was particularly spotty), but they didn't even try all that hard. "If a few academic researchers can get this far this quickly, it’s difficult to believe the NSA would have any trouble identifying the overwhelming majority of American phone numbers," they conclude. It's also difficult to believe they wouldn't try. As federal district judge Richard Leon wrote in his decision last week, "There is also nothing stopping the Government from skipping the [National Security Letter] step altogether and using public databases or any of its other vast resources to match phone numbers with subscribers."
  •  
    Another Obama/NSA lie exposed. 
Paul Merrell

Remember when Obama said the NSA wasn't "actually abusing" its powers? He was wrong. - 1 views

  • At a news conference Friday, President Obama insisted that the threat of NSA abuses was mostly theoretical: If you look at the reports, even the disclosures that Mr. Snowden’s put forward, all the stories that have been written, what you’re not reading about is the government actually abusing these programs and, you know, listening in on people’s phone calls or inappropriately reading people’s e-mails. What you’re hearing about is the prospect that these could be abused. Now part of the reason they’re not abused is because they’re — these checks are in place, and those abuses would be against the law and would be against the orders of the FISC [Foreign Intelligence Surveillance Court]. Today our colleague Barton Gellman released new documents that contradicted Obama’s claims. Gellman obtained an audit of the NSA’s compliance record from NSA leaker Snowden earlier this summer. The audit, dated May 2012, counted 2,776 incidents in the preceding 12 months where the agency engaged in “unauthorized collection, storage, access to or distribution of legally protected communications.” The audit only covered issues at NSA facilities in the D.C. and Fort Meade areas.
  • Obama said that wasn’t supposed to happen because it would be “against the orders of the FISC.” So why didn’t the judges on the court catch these abuses? In another story broken by The Post today, the chief of the Foreign Intelligence Surveillance Act (FISA) Court admits he doesn’t actually have the capability to investigate the compliance record of NSA surveillance programs:
  • Under the FISA regime, the government doesn’t have to seek permission for individual surveillance targets. Instead, it seeks FISC approval for broad schemes of surveillance like PRISM and the phone records program. But that makes it extremely difficult for the FISC to check the court’s work, since the NSA can — and, apparently, did — hide misconduct from the court that’s supposedly supervising its activities.
Paul Merrell

Activist Post: 5 Reasons The Latest Report On Syria War Crimes Might Not Be True - 0 views

  • In a recently released and conveniently timed report, complete with references to Nazi Germany and concentration camps, efforts to ramp up support for a “tough line” against Syria at the upcoming Geneva II conference and even possible military intervention, are once again moving into high gear. The report, compiled by three British war crime prosecutors and three “forensic experts” claims that it has demonstrable proof that the Assad government is guilty of torturing and killing over ten thousand people. The report (accessed here) claims to show evidence of physical torture, murder, and starvation. Of course, the Syrian government denies the veracity of the claims of the report and Western media outlets repeat the claims as incontrovertible proof.
  • However, while the final determination of whether or not these claims are accurate is yet to be made, there exist ample reasons to question the assertions made in the report. 1. The Gulf State Feudal Monarchy Qatar is the sponsor of the report. Qatar is, of course, one of the major sponsors of the Syrian invasion (aka the Syrian “rebels”) and has played a massively important role in financing, training, arming, and directing the death squads currently being mopped up by the Assad government. 2. The source of the report. One would be justified in questioning the nature of the report since the sole source of the material comes by virtue of an allegedly “defected Syrian military police officer” who was apparently fine with photographing thousands of dead victims for over a year until now. Regardless of the possibility for such a “moral” conversion, taking information from a “defected” member of government forces once again returns us to the realm of the “activists say” school of journalism – a notorious method used by Western media outlets to promote the side of the death squads and only the side of the death squads as fact in popular reports.
  • 3. Past claims of Assad’s “Crimes Against Humanity.” It is important to remember past experiences with Western claims against Assad for alleged “crimes against humanity,” all of which turned out to have been committed by the death squads, not the Syrian government. From the Houla massacre to the Ghouta chemical weapons attacks, the Syrian government has been exonerated by all credible evidence. The death squads, however, have been proven guilty by virtue of their own video tapes and Youtube accounts, guilty of some of the most horrific acts imaginable. While many innocent people have no doubt been killed in the crossfire between the military and the death squads, the Western media has done everything in its power to place the blood of each and every death inside Syria in the hands of the government. Let us also not forget the other famous Codename, “Curveball,” that played a major role in the initiation of a previous and still ongoing conflict that was later admitted to be a fabrication. Being fooled by the same type of propaganda twice in ten years is indeed a humiliation too great for a country to bear.
  • ...2 more annotations...
  • 4.) Possibility that the death squads could have killed the victims shown in the report. The victims shown in the report have clearly been abused and starved. However, before jumping to conclusions about just how these unfortunate individuals met their fate, perhaps it would be a good idea to look back at the context of the victims. As mentioned earlier, the death squads operating in Syria are no strangers to crimes against humanity, murder, and torture. In fact, they have been both the initiators of such depravity and overwhelmingly the largest proprietors of it. Furthermore, the fact that the victims were starved does not necessarily mean that they were starved by the government. Indeed, it is important to remember that, due to the siege of a number of cities by both the military and the death squads as well as due to death squad cruelty and attempted cordoning off of specific areas, food shortage has been a serious concern in some areas for some time. There is also plentiful evidence of death squad groups killing innocent people and shipping their bodies to the places where cameras are set up, waiting for the recording of the propaganda piece. The Ghouta chemical attack is just one instance in which innocent civilians were captured and killed by the death squads and used as stage props for propaganda purposes.
  • Indeed, it is also important to remember that the death squads themselves are quite adept at keeping prisoners in atrocious conditions. Only a few months back, it was reported that the Syrian military was able to free a number of captive Syrian women from the hands of the death squads who had kept them in captivity in underground tunnels for months on end for the purposes of using them as sex slaves. 5.) The report was conveniently released just two days before the Geneva II Peace Conference meeting on Syria. After the retraction of an invitation to Iran to attend the peace conference, the Qatari-funded report was released just two days before the peace conference was scheduled to take place. With such evidence being studied and analyzed and a report being compiled, to believe that it was only a coincidence that the information was released two days before the conference is absurd. If this evidence was real and of such grave importance why are world leaders only learning of it now? If world leaders knew, why are we only learning of it now? Considering all of the information provided in this article, taken in conjunction with the “convenient” timing of the release of the reports (convenient, at least, for the enemies of Syria), such reports should be taken with a large grain of salt. The Western media has not only been wrong, but has lied on so many occasions in the past, that it cannot be expected to tell the truth now.
Paul Merrell

Spying by N.S.A. Ally Entangled U.S. Law Firm - NYTimes.com - 0 views

  • The list of those caught up in the global surveillance net cast by the National Security Agency and its overseas partners, from social media users to foreign heads of state, now includes another entry: American lawyers. A top-secret document, obtained by the former N.S.A. contractor Edward J. Snowden, shows that an American law firm was monitored while representing a foreign government in trade disputes with the United States. The disclosure offers a rare glimpse of a specific instance in which Americans were ensnared by the eavesdroppers, and is of particular interest because lawyers in the United States with clients overseas have expressed growing concern that their confidential communications could be compromised by such surveillance. Related Coverage Text: Document Describes Eavesdropping on American Law FirmFEB. 15, 2014 The government of Indonesia had retained the law firm for help in trade talks, according to the February 2013 document. It reports that the N.S.A.’s Australian counterpart, the Australian Signals Directorate, notified the agency that it was conducting surveillance of the talks, including communications between Indonesian officials and the American law firm, and offered to share the information.
  • The Australians told officials at an N.S.A. liaison office in Canberra, Australia, that “information covered by attorney-client privilege may be included” in the intelligence gathering, according to the document, a monthly bulletin from the Canberra office. The law firm was not identified, but Mayer Brown, a Chicago-based firm with a global practice, was then advising the Indonesian government on trade issues. On behalf of the Australians, the liaison officials asked the N.S.A. general counsel’s office for guidance about the spying. The bulletin notes only that the counsel’s office “provided clear guidance” and that the Australian agency “has been able to continue to cover the talks, providing highly useful intelligence for interested US customers.” The N.S.A. declined to answer questions about the reported surveillance, including whether information involving the American law firm was shared with United States trade officials or negotiators.
  • Most attorney-client conversations do not get special protections under American law from N.S.A. eavesdropping. Amid growing concerns about surveillance and hacking, the American Bar Association in 2012 revised its ethics rules to explicitly require lawyers to “make reasonable efforts” to protect confidential information from unauthorized disclosure to outsiders.Last year, the Supreme Court, in a 5-to-4 decision, rebuffed a legal challenge to a 2008 law allowing warrantless wiretapping that was brought in part by lawyers with foreign clients they believed were likely targets of N.S.A. monitoring. The lawyers contended that the law raised risks that required them to take costly measures, like traveling overseas to meet clients, to protect sensitive communications. But the Supreme Court dismissed their fears as “speculative.”The N.S.A. is prohibited from targeting Americans, including businesses, law firms and other organizations based in the United States, for surveillance without warrants, and intelligence officials have repeatedly said the N.S.A. does not use the spy services of its partners in the so-called Five Eyes alliance — Australia, Britain, Canada and New Zealand — to skirt the law.
  • ...4 more annotations...
  • The N.S.A.’s protections for attorney-client conversations are narrowly crafted, said Stephen Gillers, an expert on legal ethics at New York University’s School of Law. The agency is barred from sharing with prosecutors intercepted attorney-client communications involving someone under indictment in the United States, according to previously disclosed N.S.A. rules. But the agency may still use or share the information for intelligence purposes. Andrew M. Perlman, a Suffolk University law professor who specializes in legal ethics and technology issues, said the growth of surveillance was troubling for lawyers. He helped create the bar association’s ethics code revisions that require lawyers to try to avoid being overheard by eavesdroppers. “You run out of options very quickly to communicate with someone overseas,” he said. “Given the difficulty of finding anything that is 100 percent secure, lawyers are in a difficult spot to ensure that all of the information remains in confidence.” 
  • Still, the N.S.A. can intercept the communications of Americans if they are in contact with a foreign intelligence target abroad, such as Indonesian officials. The N.S.A. is then required to follow so-called minimization rules to protect their privacy, such as deleting the identity of Americans or information that is not deemed necessary to understand or assess the foreign intelligence, before sharing it with other agencies. An N.S.A. spokeswoman said the agency’s Office of the General Counsel was consulted when issues of potential attorney-client privilege arose and could recommend steps to protect such information. “Such steps could include requesting that collection or reporting by a foreign partner be limited, that intelligence reports be written so as to limit the inclusion of privileged material and to exclude U.S. identities, and that dissemination of such reports be limited and subject to appropriate warnings or restrictions on their use,” said Vanee M. Vines, the spokeswoman.
  • In justifying the agency’s sweeping powers, the Obama administration often emphasizes the N.S.A.’s role in fighting terrorism and cyberattacks, but disclosures in recent months from the documents leaked by Mr. Snowden show the agency routinely spies on trade negotiations, communications of economic officials in other countries and even foreign corporations.
  • Other documents obtained from Mr. Snowden reveal that the N.S.A. shares reports from its surveillance widely among civilian agencies. A 2004 N.S.A. document, for example, describes how the agency’s intelligence gathering was critical to the Agriculture Department in international trade negotiations. “The U.S.D.A. is involved in trade operations to protect and secure a large segment of the U.S. economy,” that document states. Top agency officials “often rely on SIGINT” — short for the signals intelligence that the N.S.A. eavesdropping collects — “to support their negotiations.”
  •  
    Outrageous.
Paul Merrell

The FBI's Own Hostage Crisis - Newsweek - 0 views

  • By  Jeff Stein 0 Share Last Thursday, an urgent call went out from CIA headquarters to the spy agency's director, John Brennan, who was giving a speech to a graduating class at The Farm, the CIA's training facility near Williamsburg, Va. Brennan was warned that the Associated Press and The Washington Post were about to publish the results of a long investigation revealing that Robert Levinson, a retired FBI agent who had gone missing while "on private business" in Iran six years ago, had actually been working for the CIA. A handful of national security reporters in D.C. had known of Levinson's CIA connection for years but agreed to sit on it, accepting the CIA's rationale that publishing the information could endanger the life of Levinson, who was ostensibly pursuing an investigation of cigarette smuggling for a private client when he went missing on Iran's Kish Island in March 2007. Levinson was thought to be in Iranian hands. On Thursday morning, the entreaties of lower ranking CIA officials to the AP and Washington Post not to publish the story were rebuffed. Other high-ranking Obama administration officials, including White House chief of staff Denis McDonough and deputy national security advisor Ben Rhodes, as well as FBI Deputy Director Mark Giuliano, made the same argument to the reporters and their editors. By the time Brennan got his warning from headquarters, however, it was too late to for him to make an appeal. The story, by the AP's Matt Apuzzo and Adam Goldman, who had recently left AP to join The Washington Post, was online.
Paul Merrell

As Federal Prison Population Spiked 790 Percent, Average Drug Sentences Doubled | Think... - 0 views

  • The federal prison population has ballooned 790 percent since 1980, and almost half of those now imprisoned are there for drugs. In the coming years, the Bureau of Prisons projects that prison overcrowding will get even worse. While federal prisons are now 35 to 40 percent over capacity, they are expected by 2023 to reach 55 percent over capacity without a policy change, according to a new report by the Urban Institute. The prison population explosion was not driven primarily by a spike in crime, but by a change in punishment. Over a 25-year period, average drug sentences doubled from 38.5 months in 1984 to 74 months in 2011. And over a similar period, the percentage of convicted federal offenders sentenced to prison spiked from 50 percent in 1986 to 90 percent in 2011. Before the passage of several draconian laws that impose mandated harsh sentences and remove judicial discretion, many offenders received probation or a fine for the same violations.
  • Now, public officials are among those looking for a solution. And the Urban Institute found that, while no one policy change will be enough to cure the inmate population explosion, the one single thing that could have the greatest impact is reforming mandatory minimum sentences. “Cutting mandatory minimums in half could save almost $2.5 billion in 10 years,” Urban Institute Senior Fellow Julie Samuels writes. “This measure alone would reduce overcrowding to the lowest it has been in decades.” There are now several bipartisan mandatory minimum bills pending in both houses of Congress. And the bipartisan momentum has never been greater, with even the world’s largest association of corrections officials and the conservative American Legislative Exchange Council urging mandatory minimum reform.
  •  
    Life in the "land of the free." Five per cent of the world's population, but  25 per cent of the world's incarcerated prisoners. Drug legalization and release of all prisoners convicted of drug crimes not involving violence would do far more to bring some order to this mess.  But the desire to regulate seems irresistible, particularly when it serves as very thin cover for racial repression. Never mind that legalization would also end the drug war raging in Mexico.  "But we can't legalize immoral behavior." "Would you prefer that people buy their drugs from a government dispensary or from the kid down the block, you know, the one with the AK-47?"  
Gary Edwards

The Lawless President - 0 views

  •  
    Excellent read!  Peter Ferrara walks us through the latest Obama assault on the Constitution, this time his refusal to enforce laws he disagrees with.  Surprisingly, this now includes the employer mandate portion of ObamaCare!!!  Why he has to do this however is a stunning story. Bottom line:  The latest jobs report has the economy producing 195,000 new jobs in the past quarter.  The problem is, 100% of these new jobs are part-time.  Thanks to ObamaCare.   "The duties of the President of the United States are spelled out in Article II, Section 3 of the Constitution, which states, inter alia, that the President "shall take Care that the laws be faithfully executed." As Stanford Law Professor and former federal judge Michael McConnell explained in yesterday's Wall Street Journal, "This is a duty, not a discretionary power. While the president does have substantial discretion about how to enforce a law, he has no discretion about whether to do so." Section 1513(d) of the Unaffordable Care Act (aka "Obamacare") states unequivocally, "The amendments made by this section shall apply to months beginning after December 31, 2013." In other words, the provisions of Obamacare become fully effective in 2014, as a matter of duly enacted federal law. But over the long Fourth of July weekend, in a "Never Mind" moment, the Obama Administration announced, through a Deputy Assistant Secretary of the Treasury, that contrary to federal law, the employer mandate of Obamacare shall not become fully effective in months beginning after December 31, 2013, but only in months beginning after December 31, 2014. Making the announcement through such a low level Administration official to me says that Obama has contempt for the American people, and for the rule of law. Barack Obama: Lawbreaker But it does not matter who announces it. The President is the one responsible. And the announcement constitutes the assumption of authoritarian powers by President Obama. McCo
« First ‹ Previous 61 - 80 of 1378 Next › Last »
Showing 20 items per page