Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged Black-Hole

Rss Feed Group items tagged

Paul Merrell

From Radio to Porn, British Spies Track Web Users' Online Identities - 0 views

  • HERE WAS A SIMPLE AIM at the heart of the top-secret program: Record the website browsing habits of “every visible user on the Internet.” Before long, billions of digital records about ordinary people’s online activities were being stored every day. Among them were details cataloging visits to porn, social media and news websites, search engines, chat forums, and blogs. The mass surveillance operation — code-named KARMA POLICE — was launched by British spies about seven years ago without any public debate or scrutiny. It was just one part of a giant global Internet spying apparatus built by the United Kingdom’s electronic eavesdropping agency, Government Communications Headquarters, or GCHQ. The revelations about the scope of the British agency’s surveillance are contained in documents obtained by The Intercept from National Security Agency whistleblower Edward Snowden. Previous reports based on the leaked files have exposed how GCHQ taps into Internet cables to monitor communications on a vast scale, but many details about what happens to the data after it has been vacuumed up have remained unclear.
  • Amid a renewed push from the U.K. government for more surveillance powers, more than two dozen documents being disclosed today by The Intercept reveal for the first time several major strands of GCHQ’s existing electronic eavesdropping capabilities.
  • The surveillance is underpinned by an opaque legal regime that has authorized GCHQ to sift through huge archives of metadata about the private phone calls, emails and Internet browsing logs of Brits, Americans, and any other citizens — all without a court order or judicial warrant
  • ...17 more annotations...
  • A huge volume of the Internet data GCHQ collects flows directly into a massive repository named Black Hole, which is at the core of the agency’s online spying operations, storing raw logs of intercepted material before it has been subject to analysis. Black Hole contains data collected by GCHQ as part of bulk “unselected” surveillance, meaning it is not focused on particular “selected” targets and instead includes troves of data indiscriminately swept up about ordinary people’s online activities. Between August 2007 and March 2009, GCHQ documents say that Black Hole was used to store more than 1.1 trillion “events” — a term the agency uses to refer to metadata records — with about 10 billion new entries added every day. As of March 2009, the largest slice of data Black Hole held — 41 percent — was about people’s Internet browsing histories. The rest included a combination of email and instant messenger records, details about search engine queries, information about social media activity, logs related to hacking operations, and data on people’s use of tools to browse the Internet anonymously.
  • Throughout this period, as smartphone sales started to boom, the frequency of people’s Internet use was steadily increasing. In tandem, British spies were working frantically to bolster their spying capabilities, with plans afoot to expand the size of Black Hole and other repositories to handle an avalanche of new data. By 2010, according to the documents, GCHQ was logging 30 billion metadata records per day. By 2012, collection had increased to 50 billion per day, and work was underway to double capacity to 100 billion. The agency was developing “unprecedented” techniques to perform what it called “population-scale” data mining, monitoring all communications across entire countries in an effort to detect patterns or behaviors deemed suspicious. It was creating what it said would be, by 2013, “the world’s biggest” surveillance engine “to run cyber operations and to access better, more valued data for customers to make a real world difference.”
  • A document from the GCHQ target analysis center (GTAC) shows the Black Hole repository’s structure.
  • The data is searched by GCHQ analysts in a hunt for behavior online that could be connected to terrorism or other criminal activity. But it has also served a broader and more controversial purpose — helping the agency hack into European companies’ computer networks. In the lead up to its secret mission targeting Netherlands-based Gemalto, the largest SIM card manufacturer in the world, GCHQ used MUTANT BROTH in an effort to identify the company’s employees so it could hack into their computers. The system helped the agency analyze intercepted Facebook cookies it believed were associated with Gemalto staff located at offices in France and Poland. GCHQ later successfully infiltrated Gemalto’s internal networks, stealing encryption keys produced by the company that protect the privacy of cell phone communications.
  • Similarly, MUTANT BROTH proved integral to GCHQ’s hack of Belgian telecommunications provider Belgacom. The agency entered IP addresses associated with Belgacom into MUTANT BROTH to uncover information about the company’s employees. Cookies associated with the IPs revealed the Google, Yahoo, and LinkedIn accounts of three Belgacom engineers, whose computers were then targeted by the agency and infected with malware. The hacking operation resulted in GCHQ gaining deep access into the most sensitive parts of Belgacom’s internal systems, granting British spies the ability to intercept communications passing through the company’s networks.
  • In March, a U.K. parliamentary committee published the findings of an 18-month review of GCHQ’s operations and called for an overhaul of the laws that regulate the spying. The committee raised concerns about the agency gathering what it described as “bulk personal datasets” being held about “a wide range of people.” However, it censored the section of the report describing what these “datasets” contained, despite acknowledging that they “may be highly intrusive.” The Snowden documents shine light on some of the core GCHQ bulk data-gathering programs that the committee was likely referring to — pulling back the veil of secrecy that has shielded some of the agency’s most controversial surveillance operations from public scrutiny. KARMA POLICE and MUTANT BROTH are among the key bulk collection systems. But they do not operate in isolation — and the scope of GCHQ’s spying extends far beyond them.
  • The agency operates a bewildering array of other eavesdropping systems, each serving its own specific purpose and designated a unique code name, such as: SOCIAL ANTHROPOID, which is used to analyze metadata on emails, instant messenger chats, social media connections and conversations, plus “telephony” metadata about phone calls, cell phone locations, text and multimedia messages; MEMORY HOLE, which logs queries entered into search engines and associates each search with an IP address; MARBLED GECKO, which sifts through details about searches people have entered into Google Maps and Google Earth; and INFINITE MONKEYS, which analyzes data about the usage of online bulletin boards and forums. GCHQ has other programs that it uses to analyze the content of intercepted communications, such as the full written body of emails and the audio of phone calls. One of the most important content collection capabilities is TEMPORA, which mines vast amounts of emails, instant messages, voice calls and other communications and makes them accessible through a Google-style search tool named XKEYSCORE.
  • As of September 2012, TEMPORA was collecting “more than 40 billion pieces of content a day” and it was being used to spy on people across Europe, the Middle East, and North Africa, according to a top-secret memo outlining the scope of the program. The existence of TEMPORA was first revealed by The Guardian in June 2013. To analyze all of the communications it intercepts and to build a profile of the individuals it is monitoring, GCHQ uses a variety of different tools that can pull together all of the relevant information and make it accessible through a single interface. SAMUEL PEPYS is one such tool, built by the British spies to analyze both the content and metadata of emails, browsing sessions, and instant messages as they are being intercepted in real time. One screenshot of SAMUEL PEPYS in action shows the agency using it to monitor an individual in Sweden who visited a page about GCHQ on the U.S.-based anti-secrecy website Cryptome.
  • Partly due to the U.K.’s geographic location — situated between the United States and the western edge of continental Europe — a large amount of the world’s Internet traffic passes through its territory across international data cables. In 2010, GCHQ noted that what amounted to “25 percent of all Internet traffic” was transiting the U.K. through some 1,600 different cables. The agency said that it could “survey the majority of the 1,600” and “select the most valuable to switch into our processing systems.”
  • According to Joss Wright, a research fellow at the University of Oxford’s Internet Institute, tapping into the cables allows GCHQ to monitor a large portion of foreign communications. But the cables also transport masses of wholly domestic British emails and online chats, because when anyone in the U.K. sends an email or visits a website, their computer will routinely send and receive data from servers that are located overseas. “I could send a message from my computer here [in England] to my wife’s computer in the next room and on its way it could go through the U.S., France, and other countries,” Wright says. “That’s just the way the Internet is designed.” In other words, Wright adds, that means “a lot” of British data and communications transit across international cables daily, and are liable to be swept into GCHQ’s databases.
  • A map from a classified GCHQ presentation about intercepting communications from undersea cables. GCHQ is authorized to conduct dragnet surveillance of the international data cables through so-called external warrants that are signed off by a government minister. The external warrants permit the agency to monitor communications in foreign countries as well as British citizens’ international calls and emails — for example, a call from Islamabad to London. They prohibit GCHQ from reading or listening to the content of “internal” U.K. to U.K. emails and phone calls, which are supposed to be filtered out from GCHQ’s systems if they are inadvertently intercepted unless additional authorization is granted to scrutinize them. However, the same rules do not apply to metadata. A little-known loophole in the law allows GCHQ to use external warrants to collect and analyze bulk metadata about the emails, phone calls, and Internet browsing activities of British people, citizens of closely allied countries, and others, regardless of whether the data is derived from domestic U.K. to U.K. communications and browsing sessions or otherwise. In March, the existence of this loophole was quietly acknowledged by the U.K. parliamentary committee’s surveillance review, which stated in a section of its report that “special protection and additional safeguards” did not apply to metadata swept up using external warrants and that domestic British metadata could therefore be lawfully “returned as a result of searches” conducted by GCHQ.
  • Perhaps unsurprisingly, GCHQ appears to have readily exploited this obscure legal technicality. Secret policy guidance papers issued to the agency’s analysts instruct them that they can sift through huge troves of indiscriminately collected metadata records to spy on anyone regardless of their nationality. The guidance makes clear that there is no exemption or extra privacy protection for British people or citizens from countries that are members of the Five Eyes, a surveillance alliance that the U.K. is part of alongside the U.S., Canada, Australia, and New Zealand. “If you are searching a purely Events only database such as MUTANT BROTH, the issue of location does not occur,” states one internal GCHQ policy document, which is marked with a “last modified” date of July 2012. The document adds that analysts are free to search the databases for British metadata “without further authorization” by inputing a U.K. “selector,” meaning a unique identifier such as a person’s email or IP address, username, or phone number. Authorization is “not needed for individuals in the U.K.,” another GCHQ document explains, because metadata has been judged “less intrusive than communications content.” All the spies are required to do to mine the metadata troves is write a short “justification” or “reason” for each search they conduct and then click a button on their computer screen.
  • Intelligence GCHQ collects on British persons of interest is shared with domestic security agency MI5, which usually takes the lead on spying operations within the U.K. MI5 conducts its own extensive domestic surveillance as part of a program called DIGINT (digital intelligence).
  • GCHQ’s documents suggest that it typically retains metadata for periods of between 30 days to six months. It stores the content of communications for a shorter period of time, varying between three to 30 days. The retention periods can be extended if deemed necessary for “cyber defense.” One secret policy paper dated from January 2010 lists the wide range of information the agency classes as metadata — including location data that could be used to track your movements, your email, instant messenger, and social networking “buddy lists,” logs showing who you have communicated with by phone or email, the passwords you use to access “communications services” (such as an email account), and information about websites you have viewed.
  • Records showing the full website addresses you have visited — for instance, www.gchq.gov.uk/what_we_do — are treated as content. But the first part of an address you have visited — for instance, www.gchq.gov.uk — is treated as metadata. In isolation, a single metadata record of a phone call, email, or website visit may not reveal much about a person’s private life, according to Ethan Zuckerman, director of Massachusetts Institute of Technology’s Center for Civic Media. But if accumulated and analyzed over a period of weeks or months, these details would be “extremely personal,” he told The Intercept, because they could reveal a person’s movements, habits, religious beliefs, political views, relationships, and even sexual preferences. For Zuckerman, who has studied the social and political ramifications of surveillance, the most concerning aspect of large-scale government data collection is that it can be “corrosive towards democracy” — leading to a chilling effect on freedom of expression and communication. “Once we know there’s a reasonable chance that we are being watched in one fashion or another it’s hard for that not to have a ‘panopticon effect,’” he said, “where we think and behave differently based on the assumption that people may be watching and paying attention to what we are doing.”
  • When compared to surveillance rules in place in the U.S., GCHQ notes in one document that the U.K. has “a light oversight regime.” The more lax British spying regulations are reflected in secret internal rules that highlight greater restrictions on how NSA databases can be accessed. The NSA’s troves can be searched for data on British citizens, one document states, but they cannot be mined for information about Americans or other citizens from countries in the Five Eyes alliance. No such constraints are placed on GCHQ’s own databases, which can be sifted for records on the phone calls, emails, and Internet usage of Brits, Americans, and citizens from any other country. The scope of GCHQ’s surveillance powers explain in part why Snowden told The Guardian in June 2013 that U.K. surveillance is “worse than the U.S.” In an interview with Der Spiegel in July 2013, Snowden added that British Internet cables were “radioactive” and joked: “Even the Queen’s selfies to the pool boy get logged.”
  • In recent years, the biggest barrier to GCHQ’s mass collection of data does not appear to have come in the form of legal or policy restrictions. Rather, it is the increased use of encryption technology that protects the privacy of communications that has posed the biggest potential hindrance to the agency’s activities. “The spread of encryption … threatens our ability to do effective target discovery/development,” says a top-secret report co-authored by an official from the British agency and an NSA employee in 2011. “Pertinent metadata events will be locked within the encrypted channels and difficult, if not impossible, to prise out,” the report says, adding that the agencies were working on a plan that would “(hopefully) allow our Internet Exploitation strategy to prevail.”
Paul Merrell

Profiled From Radio to Porn, British Spies Track Web Users' Online Identities | Global ... - 0 views

  • One system builds profiles showing people’s web browsing histories. Another analyzes instant messenger communications, emails, Skype calls, text messages, cell phone locations, and social media interactions. Separate programs were built to keep tabs on “suspicious” Google searches and usage of Google Maps. The surveillance is underpinned by an opaque legal regime that has authorized GCHQ to sift through huge archives of metadata about the private phone calls, emails and Internet browsing logs of Brits, Americans, and any other citizens  all without a court order or judicial warrant.
  • The power of KARMA POLICE was illustrated in 2009, when GCHQ launched a top-secret operation to collect intelligence about people using the Internet to listen to radio shows. The agency used a sample of nearly 7 million metadata records, gathered over a period of three months, to observe the listening habits of more than 200,000 people across 185 countries, including the U.S., the U.K., Ireland, Canada, Mexico, Spain, the Netherlands, France, and Germany.
  • GCHQ’s documents indicate that the plans for KARMA POLICE were drawn up between 2007 and 2008. The system was designed to provide the agency with “either (a) a web browsing profile for every visible user on the Internet, or (b) a user profile for every visible website on the Internet.” The origin of the surveillance system’s name is not discussed in the documents. But KARMA POLICE is also the name of a popular song released in 1997 by the Grammy Award-winning British band Radiohead, suggesting the spies may have been fans. A verse repeated throughout the hit song includes the lyric, “This is what you’ll get, when you mess with us.”
  • ...3 more annotations...
  • GCHQ vacuums up the website browsing histories using “probes” that tap into the international fiber-optic cables that transport Internet traffic across the world. A huge volume of the Internet data GCHQ collects flows directly into a massive repository named Black Hole, which is at the core of the agency’s online spying operations, storing raw logs of intercepted material before it has been subject to analysis. Black Hole contains data collected by GCHQ as part of bulk “unselected” surveillance, meaning it is not focused on particular “selected” targets and instead includes troves of data indiscriminately swept up about ordinary people’s online activities. Between August 2007 and March 2009, GCHQ documents say that Black Hole was used to store more than 1.1 trillion “events”  a term the agency uses to refer to metadata records  with about 10 billion new entries added every day. As of March 2009, the largest slice of data Black Hole held  41 percent  was about people’s Internet browsing histories. The rest included a combination of email and instant messenger records, details about search engine queries, information about social media activity, logs related to hacking operations, and data on people’s use of tools to browse the Internet anonymously.
  • Throughout this period, as smartphone sales started to boom, the frequency of people’s Internet use was steadily increasing. In tandem, British spies were working frantically to bolster their spying capabilities, with plans afoot to expand the size of Black Hole and other repositories to handle an avalanche of new data. By 2010, according to the documents, GCHQ was logging 30 billion metadata records per day. By 2012, collection had increased to 50 billion per day, and work was underway to double capacity to 100 billion. The agency was developing “unprecedented” techniques to perform what it called “population-scale” data mining, monitoring all communications across entire countries in an effort to detect patterns or behaviors deemed suspicious. It was creating what it saidwould be, by 2013, “the world’s biggest” surveillance engine “to run cyber operations and to access better, more valued data for customers to make a real world difference.” HERE WAS A SIMPLE AIM at the heart of the top-secret program: Record the website browsing habits of “every visible user on the Internet.” Before long, billions of digital records about ordinary people’s online activities were being stored every day. Among them were details cataloging visits to porn, social media and news websites, search engines, chat forums, and blogs.
  • The mass surveillance operation — code-named KARMA POLICE — was launched by British spies about seven years ago without any public debate or scrutiny. It was just one part of a giant global Internet spying apparatus built by the United Kingdom’s electronic eavesdropping agency, Government Communications Headquarters, or GCHQ. The revelations about the scope of the British agency’s surveillance are contained in documents obtained by The Intercept from National Security Agency whistleblower Edward Snowden. Previous reports based on the leaked files have exposed how GCHQ taps into Internet cables to monitor communications on a vast scale, but many details about what happens to the data after it has been vacuumed up have remained unclear.
Paul Merrell

Speech Recognition is NSA's Best-Kept Open Secret - The Intercept - 0 views

  • Siri can understand what you say. Google can take dictation. Even your new smart TV is taking verbal orders. So is there any doubt the National Security Agency has the ability to translate spoken words into text? But precisely when the NSA does it, with which calls, and how often, is a well-guarded secret. It’s not surprising that the NSA isn’t talking about it. But oddly enough, neither is anyone else: Over the years, there’s been almost no public discussion of the NSA’s use of automated speech recognition.
  • Siri can understand what you say. Google can take dictation. Even your new smart TV is taking verbal orders. So is there any doubt the National Security Agency has the ability to translate spoken words into text? But precisely when the NSA does it, with which calls, and how often, is a well-guarded secret. It’s not surprising that the NSA isn’t talking about it. But oddly enough, neither is anyone else: Over the years, there’s been almost no public discussion of the NSA’s use of automated speech recognition. One minor exception was in 1999, when a young Australian cryptographer named Julian Assange stumbled across an NSA patent that mentioned “machine transcribed speech.”
  • One minor exception was in 1999, when a young Australian cryptographer named Julian Assange stumbled across an NSA patent that mentioned “machine transcribed speech.” Assange, who went on to found WikiLeaks, said at the time: “This patent should worry people. Everyone’s overseas phone calls are or may soon be tapped, transcribed and archived in the bowels of an unaccountable foreign spy agency.” The most comprehensive post-Snowden descriptions of NSA’s surveillance programs are strangely silent when it comes to speech recognition. The report from the President’s Review Group on Intelligence and Communications Technologies doesn’t mention it, and neither does the October 2011 FISA Court ruling, or the detailed reports from the Privacy and Civil Liberties Oversight Board.
  • ...3 more annotations...
  • There is some mention of speech recognition in the “Black Budget” submitted to Congress each year. But there’s no clear sign that anybody on the Hill has ever really noticed. As The Intercept reported on Tuesday, items from the Snowden archive document the widespread use of automated speech recognition by the NSA. The strategic advantage, invasive potential and policy implications of being able to turn spoken words into text are not trivial: Suddenly, voice conversations, historically considered ephemeral and unsearchable, can be scanned, catalogued and archived — not perfectly, but well enough to dramatically increase the effective scope of eavesdropping. Former senior NSA executive turned whistleblower Thomas Drake, who’s seen NSA’s automated speech recognition at work, says the silence is telling.
  • “You’re seeing a black hole,” Drake told The Intercept. “That means there’s something there that’s really significant. You’re seeing some of the fuzzy contours of this whole other program.”
  • Senator Ron Wyden, D-Ore., arguably the foremost congressional critic of NSA overreach, wouldn’t comment directly on the question of speech recognition. But, he said through a spokesperson: “After 14 years on the Intelligence Committee, I’ve learned that senators must be constantly on the lookout for secret interpretations of the law and advances in surveillance that Congress isn’t aware of.” He added: “For centuries, individual privacy was protected in part by the limited resources of governments. It simply wasn’t possible for governments to secretly collect information on every single citizen without investing in massive networks of spies and informants. But in the 21st century mass surveillance is no longer difficult and expensive — it’s increasingly cheap and easy. The only privacy protections that will matter in the future are the ones that are written into law and defended by public demand for freedom and openness.”
  •  
    A "black hole" at the NSA? Voice-to-text is indeed an ultra-powerful intelligence tool, but only if you are gathering verbal conversations. As content, verbal conversations should be off-limits without a court order. But is NSA honoring that limitation? And is the FISA Court enforcing it?
Joseph Skues

Prisoner Advocate Elaine Brown on Georgia Prison Strike: "Repression Breeds Resistance" - 0 views

  • four prisons in Georgia remain in lockdown five days after prisoners went on strike
  • Using cell phones purchased from guards, the prisoners coordinated the nonviolent protests to stage the largest prison strike in U.S. history.
  • reports of widespread violence and brutality by the guards against the prisoners on strike
  • ...23 more annotations...
  • Elaine Brown, Longtime prison activist and former chair of the Black Panther Party. Her books include The Condemnation of Little B: New Age Racism in America and A Taste of Power: A Black Woman’s Story.
  • Black Panthers, Then and Now (5/13/1996)
  • until they receive better medical care and nutrition, more educational opportunities, payment for the work they do in the prisons.
  • they’re demanding just parole decisions, an end to cruel and unusual punishments, and better access to their families.
  • the newly formed group Concerned Coalition to Respect Prisoners’ Rights
  • And t hey made a decision that that would be on December 9th.I have no idea why they picked that date and how they ended up getting perhaps ten prisons involved. But at that point, of course, the guards and the administration became aware of their intention. And so, when they locked down on the night of the 8th, their decision was to not get up.
  • they’re talking about four prisons, and there were probably ten in the initial one-day strike
  • Can you tell us a little bit about your life and how you came to be a prison activist today?
  • have known him for 15 years, and I have been with him for that long, since he was incarcerated and put into an adult facility at 14 years old.
  • there’s no real educational opportunities. There’s no exercise. There’s nothing else.
  • e food is bad. They have poor nutrition.
  • the constant violence being perpetrated against them by guards, who with their own idle time look to try and instigate an incident here or there, so there’s a lot of screaming, hollering, you know, aggressive behaviors that go on. And so, there’s always some incident jumping off,
  • But the prisoners in the state of Georgia are paid nothing at all.Now, that’s not to say that the prisoners in other states are being paid. They’re mostly being paid a dollar a day to 50 cents an hour
  • they are not paid one single dime, and they are required to clean the floors, clean the showers, do the yard work, do the dishes, cook the food—in other words, to maintain the prison itself.
  • I learned the other day that one guy said he paid $800 to a guard for a cell phone that was probably worth about 50 bucks. So, that’s the first point that has to be made, because people imagine that there’s all this smuggling going on—and there is, but it’s on the part of—in the main, on the part of guards that are inside these facilities.
  • all of them, for reasons that I cannot explain how they suddenly understood how to be unified, decided, “Yeah, we’re not working, and we’re down with this, and we’re not going to get up, and we’re going to stay united.” And across the prisons, in the various sets, they called each other, sent text messages
  • Not only is he on lockdown, but he’s in the hole right now, because from almost day one or so, I was informed that he was taken off to the hole, deemed some sort of leader.
  • In the Black Panther Party, there was a 10-point platform and program that articulated some of the manifestations of our general oppression, talking about lack of education, as a matter of fact, not having enough food and housing. In essence, what we called for was freedom and right of self-determination.
  • the Brown Berets, the Red Guard, the Young Lords, the Young Patriots, and so forth
  • So, we became internationalists.
  • when we consider that we black people make up approximately 12 to 13 percent of the overall population and yet almost 50 percent of the prison population, we have to ask the question, is this the result of some genetic flaw in black people? Are we obviously some sort of criminally minded? Or is there something wrong in the scheme of things? Obviously, the latter is what I would say. And so, I’ve committed myself to bringing people out of prison.
  • So I helped to organize the Committee to Free Chip Fitzgerald. These people have been buried in prison for their political beliefs, and they’ve been buried in prison for their poverty. There are no rich people languishing in the prisons of America.
  • which is what they are doing by prodding men with everything, turning off the heat, beating people, forcing them out of their cells, turning off the hot water, destroying and trashing people’s property, not feeding them, and so forth and so on, all kinds of tactics to instigate a violent response.
Paul Merrell

The NSA Black Hole: 5 Basic Things We Still Don't Know About the Agency's Snooping - Pr... - 0 views

  • Last week saw revelations [1] that the FBI and the National Security Agency have been collecting Americans’ phone records en masse and that the agencies have access to data from nine tech companies.  But secrecy around the programs has meant even basic questions are still unanswered. Here’s what we still don’t know:
Gary Edwards

Mortgage Settlement Term Sheet: Bailout as Reward for Institutionalized Fraud... - 0 views

  •  
    Naked Capitalism continues their rant on the fraudulent and inexcusable Obama Foreclosure gift to the Banksters.  This article details the crimes being committed under the provisions of pooling and servicing agreements relating to a single payment default.  Incredible stuff. excerpt: Now do you see why servicers consistently report than when homeowners miss a payment or two, they proceed pretty much in a straight line to default? Once they miss a payment or start racking up extra charges that you are unaware of, borrowers descend into a designed-by-the-servicer escalating fee black hole, never to emerge.
Gary Edwards

The Dark Side of the Socialist Joker: "Don't Just Take Their Wealth, Destroy it!" - 0 views

  •  
    Business Insiders John Carney describes what happened at evil doer, AIG. In describing the black hole that is swallowing up endless volumes of taxpayer wealth, Carney points out that AIG is a channel for redistributing American wealth to International Bankers. ".... In last summer's blockbuster "The Dark Knight," the Joker invites one of the top crime lords of Gotham City to the rundown warehouse where he has stashed his ill-gotten gains. The mobster stares in awe at the huge stack of money the arch-criminal has amassed. But a moment later, his awe turns to horror as the Joker sets the money aflame. "This town deserves a better class of criminal," he explains. The exchange reveals the deep evil of the Joker. Unlike a common criminal, he doesn't just want to steal money from others. He wants to destroy their wealth....... At the heart of AIG's problems is a financial product called a credit default swap, which is really just an insurance contract on debt. If a borrower failed to pay off a loan fully, an investor protected by a credit default swap would be able to collect the outstanding amount from the insurance company. The idea was that credit default swaps would reduce the risk to any investor who bought bonds. In the best of worlds, they would reduce risk throughout the financial system by spreading out the costs of defaults. But that's not how things worked out. Instead, credit default swaps came to be used by banks in a way that no one anticipated-to avoid banking regulations. And AIG decided to get into the business of enabling this scheme...... "
Paul Merrell

Is someone pinching pennies at Guantánamo prison? | Miami Herald - 0 views

  • Could the people at the Most Expensive Prison on Earth be pinching pennies?
  • Attorneys for the last 114 captives at the U.S. Navy base at Guantánamo Bay, Cuba, say they have been increasingly providing their clients with everything from T-shirts and socks and shoes to shampoo and vitamins to fill a long-term, unexplained need at the war on terror prison.Lawyers who have visited the prison as recently as this month say the captives’ U.S. military issue uniforms are faded, torn or tattered and their shoes have holes. In other instances, detainees tell their lawyers, personal hygiene supplies are cheap and simply don’t do the job. A case-in-point: When attorney Ramzi Kassem met detainee Shaker Aamer to share the news that the long-held Saudi prisoner was approved for transfer to Britain after Oct. 24, the captive was brought to their meeting in prison-issue canvas shoes held together by duct tape.
  • “Stuff’s just not getting replaced,” said attorney George Clarke who in late September spent about $300 on slip-on canvas shoes, plastic sandals, T-shirts and towels for his two detainee clients — both approved for repatriation, if the political situation improves in Yemen. “They say the stuff they get is crap. Or they’re not getting it.”Recently, he said, the detention center staff has been more accepting of contributions from the attorneys, suggesting prison commanders are confronted with a cash crunch or have realized they can pass along costs of basics to the private sector.
  • ...7 more annotations...
  • At the prison, a spokesman declined to say whether the raggedy clothing reflected a new policy or budget cutbacks but dismissed a question on whether there was a supply issue. Detainee provisions “have not changed,” Navy Capt. Christopher Scholl said tersely by email. The prison would not provide a list of what constitutes basic issue prisoner provisions these days. Nor would Scholl address a question about whether the quality of prison-issue items had degraded.
  • The International Committee of the Red Cross would not say whether delegates have raised the issue in confidential talks with the prison commander. The Miami Herald spoke, separately, with 12 attorneys who have met captives in recent months and describe detainees showing up at legal meetings looking disheveled and needing replacement footwear or clothes. The attorneys say the appearance is noteworthy because through the years all but mentally ill captives have tried to tidy up for their legal meetings.“They’re looking pretty threadbare,” attorney Cori Crider of the nonprofit Reprieve legal defense group said from the U.S. Navy base Tuesday after she bought shampoo and socks for one prisoner. “It’s an escalating complaint that people are being left in rags.”The lawyers quote their clients as saying some supplies have disappeared entirely at the prison, which boasts Muslim sensitivity and humane treatment. Some just aren’t replaced frequently enough, they claim.
  • Into this vacuum attorneys who represent the detainees at no charge have for about nine months routinely spent hundreds of dollars on each trip to buy their clients basic provisions at the base commissary, the Navy Exchange, or NEX.In March, Chicago attorney Patricia Bronte, a solo practitioner, spent $136.25 on shoes and Gold Toe socks for her two Yemeni clients. She left them with a prison lawyer, who got them to the clients after she left the base — something she knows because she got thank-you notes via the prison’s legal mail system.
  • “I have noticed that sometimes the client appears at the meetings with shoes that look pretty beaten up. So I went to the NEX and I bought shoes and socks.” Also $6.12 in toothbrushes and toothpaste, according to her commissary receipt.“Understand, I’m not complaining. I don’t mind buying my clients shoes to improve their conditions,” she said. “It’s the gall of this country. To detain these guys for little or no reason for 14 years and not provide them with shoes is offensive.”
  • Prison officials had already stopped spending taxpayers’ money on books, videos and electronic games for the detainee diversion program, according to media visits in the past year, leaving it to the Red Cross and lawyers to donate to the Detainee Library. Kassem, the attorney, said his clients quoted guards and other prison staff as blaming budget cuts at the prison where the Pentagon maintains a 2,000-plus staff for 114 captives and has spent more than $5 billion. “Sometimes it’s a problem of poor toiletries — soap that doesn’t lather, toothpaste that doesn’t froth, deodorant that doesn’t prevent body odor,” said Kassem, a professor at the City University of New York School of Law whose legal clinic represents five Guantánamo detainees. Captives he sees in the prison’s iconic orange prison uniform are wearing old, torn and much less orange jumpsuits, he said.The prisoners are perplexed, Kassem said. “They’ve heard how much it costs per prisoner. They wonder, where’s all the money?”“Somebody’s pinching pennies, it seems,” he said, describing the prison-issue footwear on Aamer, the next detainee to be released, as “Oliver Twist tattered” despite repeated pleas for a replacement pair.
  • Over at the secret prison for former long-held CIA captives, Camp 7, the detainees are taking vitamin D furnished by defense attorneys Cheryl Bormann and Air Force Capt. Michael Schwartz.Walid bin Attash spent years without exposure to sunlight in a so-called CIA black site before he got to Camp 7 in 2006. Now, he’s told his lawyers, his medical record shows a severe vitamin D deficiency. He asked his defense team for a halal version of the supplement, which the prison doesn’t provide. One attorney, who asked not to be identified, quoted a prison medical officer as telling detainees “there’s no money for that.”So bin Attash’s lawyers ordered kosher vitamin D — no forbidden products in those gel caps — and gave it to the military staff attorney assigned to Camp 7. The prison’s medical officer has apparently doled them out to other former CIA black site captives because bin Attash needs a resupply sooner than a one-a-day distribution would require, Bormann said.“We’ve been having to purchase vitamin D for our client,” said Bormann, a criminal defense attorney with death-penalty experience. “It’s crazy.” At a civilian prison, she said, the lawyers wouldn’t have to buy and furnish it. They’d go to a federal or state judge, who would order the prison to provide it.
  • Lists of purchases provided by more than a dozen attorneys include toothbrushes, toothpaste, bar soap, shampoo, deodorant, slip-on sandals that double as slippers, white socks, white T-shirts, towels, no-lace sneakers, canvas slip-on shoes, pillows, books, individual DVD players, video games and audio tapes. Those reached the clients after a guard inspection — as did tahini, ginger, allspice, mint oil, mint tea, ginger tea, Nesquik, olive oil, ground cloves, henna and almonds, around Ramadan. Lawyers also said they have submitted other items that were rejected — notably black socks, hairbrushes, combs and aftershave (probably for its taboo alcohol content).
Paul Merrell

NSA contracted French cyber-firm for hacking help - RT USA - 0 views

  • The latest revelation regarding the National Security Agency doesn't come courtesy of Edward Snowden. A Freedom of Information Act request has confirmed the NSA contracted a French company that makes its money by hacking into computers. It's no secret that the United States government relies on an arsenal of tactics to gather intelligence and wage operations against its adversaries, but a FOIA request filed by Muckrock's Heather Akers-Healy has confirmed that the list of Uncle Sam's business partners include Vupen, a French-based security company that specializes in selling secret codes used to crack into computers. Documents responsive to my request to #NSA for contracts with VUPEN, include 12/month exploit subscription https://t.co/x3qJbqSUpa — Heather Akers-Healy (@abbynormative) September 16, 2013 Muckrock published on Monday a copy of a contract between the NSA and Vupen in which the US government is shown to have ordered a one-year subscription to the firm's “binary analysis and exploits service” last September.
  • That service, according to the Vupen website, is sold only to government entities, law enforcement agencies and computer response teams in select countries, and provides clients with access to so-called zero-day exploits: newly-discovered security vulnerabilities that the products' manufacturers have yet to discover and, therefore, have had zero days to patch-up. “Major software vendors such as Microsoft and Adobe usually take 6 to 9 months to release a security patch for a critical vulnerability affecting their products, and this long delay between the discovery of a vulnerability and the release of a patch creates a window of exposure during which criminals can rediscover a previously reported but unpatched vulnerability, and target any organization running the vulnerable software,” Vupen says elsewhere on their website. Last year, Vupen researchers successfully cracked Google's Chrome browser, but declined to show developers how they did so — even for an impressive cash bounty. “We wouldn’t share this with Google for even $1 million,” Vupen CEO Chaouki Bekrar told Forbes' Andy Greenberg of the Chrome hack in 2012. “We don’t want to give them any knowledge that can help them in fixing this exploit or other similar exploits. We want to keep this for our customers.”
  • And why the NSA and other clients may benefit from being privy to these vulnerabilities, knowing how to exploit security holes in adversarial systems is a crucial component to any government's offensive cyber-operations. Last month, the Washington Post published excerpts from the previously secretive “black budget,” a closely guarded ledger listing the funding requests made by America's intelligence community provided by NSA leaker Edward Snowden. According to that document, a substantial goal of the US in fiscal year 2013 was to use a portion of $52.6 billion in secretive funding towards improving offensive cyber-operations.
  • ...1 more annotation...
  • The portion of the contract obtained by Muckrock where the cost of the subscription is listed has been redacted, but a Vupen hacker who spoke to Greenberg last year said deals in the five-figures wasn't uncommon. "People seem surprised to discover that major government agencies are acquiring Vupen's vulnerability intelligence," Bekrar wrote in an email to Information Week's Matthew Schwartz after the NSA contract with his signature was published. "There is no news here, governments need to leverage the most detailed and advanced vulnerability research to protect their infrastructures and citizens against adversaries." Critics of Vupen and its competitors see government-waged cyber-operations in a different light, however. Christopher Soghoian of the American Civil Liberties Union's Speech, Privacy and Technology Project has spoken outright against companies that sell exploits and have equated the computer codes being sold for big money as a new sort of underground arms trade fueling an international, online battle. To Greenberg last year, Soghoian described Vupen as  a “modern-day merchant of death” selling “the bullets for cyberwar," and upon publishing of the NSA contract called the company a “cyber weapon merchant.” The NSA is a customer of French 0-day cyber weapon merchant VUPEN, FOIA docs reveal: (via @ramdac & @MuckRockNews) https://t.co/OPJ82miK3c — Christopher Soghoian (@csoghoian) September 16, 2013
Paul Merrell

Asia Times Online :: Digital Blackwater rules - 0 views

  • But when it comes to how a 29-year old IT wizard with little formal education has been able to access a batch of ultra-sensitive secrets of the US intelligence-national security complex, that's a no-brainer; it's all about the gung-ho privatization of spying - referred to by a mountain of euphemisms of the "contractor reliance" kind. In fact the bulk of the hardware and software used by the dizzying network of 16 US intelligence agencies is privatized. A Washington Post investigation found out that US homeland security, counter-terror and spy agencies do business with over 1,900 companies. [2] An obvious consequence of this contractor tsunami - hordes of "knowledge" high-tech proletarians in taupe cubicles - is their indiscriminate access to ultra-sensitive security. A systems administrator like Snowden can have access to practically everything.
  • So then we may have a case of Hong Kong and Beijing having to reach an agreement. Yet even if they decided to extradite Snowden, he could argue in court this was "an offence of a political character". The bottom line - this could drag on for years. And it's too early to tell how Beijing would play it for maximum leverage. A "win-win" situation from a Chinese point of view would be to balance its commitment to absolute non-interference in foreign domestic affairs, its desire not to rock the fragile bilateral relation boat, but also what non-pivoting move the US government would offer in return.
  • Since 1996, before the British handover to China, an extradition treaty applies between the tiger and the wolf. [4] The US Department of Justice is already surveying its options. It's important to remember that the Hong Kong judicial system is independent from China's - according to the Deng Xiaoping-conceptualized "one country, two systems". As much as Washington may go for extraditing Snowden, he may also apply for political asylum. In both cases he may stay in Hong Kong for months, in fact years. The Hong Kong government cannot extradite anyone claiming he will be persecuted in his country of origin. And crucially, article 6 of the treaty stipulates, "a fugitive offender shall not be surrendered if the offence of which that person is accused or was convicted is an offence of a political character." Another clause stipulates that a fugitive shall not be surrendered if that implicates "the defense, foreign affairs or essential public interest or policy" of - guess who - the People's Republic of China.
  • ...1 more annotation...
  • What he stressed is how they all work under a false premise; "If a surveillance program produces information of value, it legitimizes it ... In one step, we've managed to justify the operation of the Panopticon". Oh yes, make no mistake; Snowden has carefully read his Michel Foucault (he also stressed his revulsion facing "the capabilities of this architecture of oppression"). Foucault's deconstruction of the Panopticon's architecture is now a classic (see it here in an excerpt of his 1975 masterpiece Discipline and Punish). The Panopticon was the ultimate surveillance system, designed by utilitarian philosopher Jeremy Bentham in the 18th century. The Panopticon - a tower surrounded by cells, a pre-Orwellian example of "architecture of oppression" - was not originally conceived for the surveillance of a prison, but of a factory crammed with landless peasants on forced labor. Oh, but those were rudimentary proto-capitalist days. Welcome to the (savagely privatized) future, where the NSA black hole, "Digital Blackwater", lords over all as the ultimate Panopticon.
Paul Merrell

In Keeping Grip on Data Pipeline, Obama Does Little to Reassure Industry - NYTimes.com - 0 views

  • Google, which briefly considered moving all of its computer servers out of the United States last year after learning how they had been penetrated by the National Security Agency, was looking for a public assurance from President Obama that the government would no longer secretly suck data from the company’s corner of the Internet cloud.Microsoft was listening to see if Mr. Obama would adopt a recommendation from his advisers that the government stop routinely stockpiling flaws in its Windows operating system, then using them to penetrate some foreign computer systems and, in rare cases, launch cyberattacks.
  • Intel and computer security companies were eager to hear Mr. Obama embrace a commitment that the United States would never knowingly move to weaken encryption systems. They got none of that.
  • Perhaps the most striking element of Mr. Obama’s speech on Friday was what it omitted: While he bolstered some protections for citizens who fear the N.S.A. is downloading their every dial, tweet and text message, he did nothing, at least yet, to loosen the agency’s grip on the world’s digital pipelines. White House officials said that Mr. Obama was committed to studying the complaints by American industry that the revelations were costing them billions of dollars in business overseas, by giving everyone from the Germans to the Brazilians to the Chinese an excuse to avoid American hardware and cloud services. “The most interesting part of this speech was not how the president weighed individual privacy against the N.S.A.,” said Fred H. Cate, the director of the Center of Applied Cybersecurity Research at Indiana University, “but that he said little about what to do about the agency’s practice of vacuuming up everything it can get its hands on.”
  • ...4 more annotations...
  • In fact, behind the speech lies a struggle Mr. Obama nodded at but never addressed head on. It pits corporations that view themselves as the core of America’s soft power around the world — the country’s economic driver and the guardians of its innovative edge — against an intelligence community 100,000 strong that regards its ability to peer into any corner of the digital world, and manipulate it if necessary, as crucial to the country’s security.In public, the coalition was polite if unenthusiastic about the president’s speech. His proposals, the companies said in a statement, “represent positive progress on key issues,” even while “crucial details remain to be addressed on these issues, and additional steps are needed on other important issues.” But in the online chat rooms that users and employees of those services inhabit each day, the president’s words were mocked. “If they really cared about the security of US infrastructure, they’d divulge the vulnerabilities they found or bought from the black market that exploit the security of these systems, so those systems can be fixed, and no one else can exploit them with these exploits,” wrote a user called “higherpurpose” on Hacker News.
  • In an interview, a senior administration official acknowledged that the administration had weighed what the president could say in public about the delicate problems of encryption, or the N.S.A.’s use of “zero day” flaws in software, the name for security holes that have never been seen before. It is a subject the intelligence agencies have refused to discuss in public, and Mr. Obama determined that it was both too secret, and too fluid, to discuss in the speech, officials said.In response to questions, the White House said the president had asked his special assistant for cybersecurity, Michael Daniel, and the president’s office of science and technology policy to study a recent advisory panel’s recommendation that the government get out of the business of corrupting the encryption systems created by American companies.
  • It will not be an easy task. One of the recent disclosures, first reported by Reuters, indicated that the N.S.A. paid millions of dollars to RSA, a major encryption firm, to incorporate a deliberately weakened algorithm into some of its products, giving the government a “back door” to read whatever it wanted. But when the advisory panel concluded that the United States should not “in any way subvert, weaken or make vulnerable generally available commercial software,” the intelligence agencies protested.“Some in the intelligence community saw that as a call for the N.S.A. to get out of cryptography, which is the reason they were created,” the senior official said. He added: “We’ve said that we are very much supportive of U.S. industry and making sure that U.S. industry remains competitive, and able to produce really good products. And N.S.A. has been out there saying they have no interest in breaking encryption that guards global commerce.”
  • But as Mr. Obama himself acknowledged, the United States has a credibility problem that will take years to address. The discovery that it had monitored the cellphone of Chancellor Angela Merkel of Germany, or that it has now found a way to tap into computers around the world that are completely disconnected from the Internet — using covert radio waves — only fuels the argument that American products cannot be trusted.That argument, heard these days from Berlin to Mexico City, may only be an excuse for protectionism. But it is an excuse that often works.
Paul Merrell

HSBC Bank on Verge of Collapse: Second Major Banking Crash Imminent | I Acknowledge - 0 views

  • Concerns about an imminent bank crash were further fuelled today at news that HSBC are restricting the amount of cash that customers can withdraw from their own bank accounts.  Customers were told that without proof of the intended use of their own money, HSBC would refuse to release it.  This, and other worrying signs point to a possible financial crash in the near future.
  • HSBC is scrambling to manage a seemingly terminal liquidity crisis (a lack of hard cash) that could see the bank become the next Northern Rock – and trigger a bank crash.  The analyst’s advice is for shareholders to sell HSBC investments, and customers to move their accounts elsewhere before the crash.
  • According a report by the BBC’s MoneyBox Programme, HSBC customers have gone to withdraw cash from their accounts, only to find HSBC would not release the funds.  Customers were told to make a bank transfer instead, unless they provided documentation proving the intended use of the money.
  • ...2 more annotations...
  • Mr Cotton is not alone, with other customers seeking to withdraw cash amounts over £3,000 facing the same obstacles.  While HSBC argue there is comes customer security interest here, the story simply doesn’t add up.  Customer identification is required for large withdrawals, not customer intentions – a person’s cash is theirs to withdraw and place wherever they so wish.  Instead, HSBC has been found to have a capitalization black hole (gap between actual cash and obligations) of $80bn.  The message is simple, get your money out now.
  • The major banks and states appear to be preparing for impending crisis, while pretending to the public that the economic situation is improving. There is a gold rush underway, with Banks and States frantically buying up as much gold reserve as they can, stoking fears that confidence in currency is at an all-time low.  In recent months and weeks, banks like HSBC and JP Morgan, and states such as the US, Germany and China have joined the gold rush, making vast purchases of stocks. Investment analysts at Seeking Alpha have been monitoring the strange activity on the COMEX, stating: “keeping track of COMEX inventories is something that is recommended for all serious investors who own physical gold and the gold ETFs (SPDR Gold Shares (GLD), PHYS, and CEF) because any abnormal inventory declines may signify extraordinary events behind the scenes.”
Paul Merrell

Half of Federal Agencies Still Use Outdated Freedom of Information Regulations - 0 views

  • Nearly half (50 out of 101) of all federal agencies have still not updated their Freedom of Information Act regulations to comply with Congress's 2007 FOIA amendments, and even more agencies (55 of 101) have FOIA regulations that predate and ignore President Obama's and Attorney General Holder's 2009 guidance for a "presumption of disclosure," according to the new National Security Archive FOIA Audit released today to mark Sunshine Week. Congress amended the Freedom of Information Act in 2007 to prohibit agencies from charging processing fees if they missed their response deadlines, to include new online journalists in the fee waiver category for the media, to order agencies to cooperate with the new FOIA ombudsman (the Office of Government Information Services, OGIS), and to require reports of specific data on their FOIA output, among other provisions co-authored by Senators Patrick Leahy (D-VT) and John Cornyn (R-TX). But half the government has yet to incorporate these changes in their regulations, according to the latest National Security Archive FOIA Audit. After President Obama's "Day One" commitments to open government, Attorney General Eric Holder issued new FOIA guidance on March 19, 2009, declaring that agencies should adopt a "presumption of disclosure," encourage discretionary releases if there was no foreseeable harm (even if technically covered by an exemption), proactively post the records of greatest public interest online, and remove "unnecessary bureaucratic hurdles" from the FOIA process. But five years later, the Archive found a majority of agencies have old regulations that simply ignore this guidance.
  • The Archive's FOIA Audit also highlights some good news this Sunshine Week: New plans from both the House of Representatives and White House have the potential to compel delinquent agencies to update their regulations. "Both Congress and the White House now recognize the problem of outdated FOIA regulations, and that is something to celebrate," said Archive director Tom Blanton. "But new regs should not follow the Justice Department's terrible lead, they must follow the best practices already identified by the FOIA ombuds office and FOIA experts." "If and when this important FOIA reform occurs, open government watchdogs must be vigilant to ensure that the agencies' updated regulations are progressive, rather than regressive, and embrace best practices to ensure that more documents are released to requesters, more quickly" said Nate Jones, the Archive's FOIA coordinator.
  • In 2011, the back-to-back Rosemary Award-winning Department of Justice proposed FOIA regulations that would have — among many other FOIA setbacks — allowed the Department to lie to FOIA requesters, eliminated online-only publications from receiving media fee status, and made it easier to destroy records. After intense pushback by openness advocates, the DOJ temporarily pulled these regulations, and Pustay claimed, "some people misinterpreted what we were trying to do, misconstrued some of the provisions, and didn't necessarily understand some of the fee guidelines." Pustay also claimed — to an incredulous Senate Judiciary Committee — that updating FOIA regulations to conform with the 2007 OPEN Government Act was merely optional and "not required." National Security Archive director Tom Blanton warned in his own 2013 Senate testimony that these terrible "vampire" regulations were not gone for good. This year, Pustay testified that the Department of Justice has indeed resubmitted its FOIA regulations for OMB approval; their content is unknown to the public.
  • ...4 more annotations...
  • The House of Representatives recently unanimously passed the bipartisan Freedom of Information Act Implementation Act (H.R. 1211), which includes a provision compelling agencies to update their FOIA regulations. The House bill — which now awaits Senate approval — would require each agency to update its FOIA regulations "not later than 180 days after the enactment of this Act." The White House is also addressing the problem of outdated FOIA regulations, albeit in a different manner. In its latest Open Government Partnership National Action Plan, the White House has committed (on paper, at least) to creating one "core FOIA regulation and common set of practices [that] would make it easier for requesters to understand and navigate the FOIA process and easier for the Government to keep regulations up to date." Transparency watchdogs went on alert this week after the Department of Justice's Director of Information Policy Melanie Pustay announced during her Senate testimony on March 11, 2014 that, "My office is leading that project" to create the White House-backed common regulation which, she estimated will be, "a one or two year project." Despite Pustay's pledge that she would accept input from OGIS and the requester community, her Department's history of crafting FOIA regulations has been anything but stellar.
  • As the Department of Justice and other agencies have demonstrated, new regulations do not necessarily make good regulations. As such, the National Security Archive has recommended that any updated FOIA regulations must: mandate that FOIA officers embrace direct communications with requesters; require agencies to receive requests by e-mail and post all responses and documents online; direct agencies to update their FOIA processing software so documents can be posted to any online repository, including the government-sponsored FOIAonline; encourage agencies to join FOIAonline to make their FOIA processing more cost-effective and efficient; stream-line inter and intra-agency "referral" black holes — and keep requesters abreast of where their requests are if the agency does have to refer them; include language encouraging use of the OGIS, which can help requesters and agencies mediate disputes to avoid animosity and costly litigation; end the practice of using fees to discourage FOIA requesters. The Office of Government Information Services — which reviews and comments on agency regulations as they are proposed — has also compiled a list of best practices for agencies to consider while crafting regulations. These include: "let the Freedom of Information Act itself" — and its presumption for disclosure — "be your guide;" bring attorneys, FOIA processors, records managers and IT pros to the table; include your plan for records management and preservation; and alert requesters of their option to contact OGIS for mediation and dispute resolution services.
  • A useful compilation of current agency FOIA regulation language — already on the books — put together by the Center of Effective Government also includes helpful guidelines on preventing the destruction of requested records; narrowly interpreting claims of confidential business information; and clarifying fee waivers and procedures. FOIA experts are currently working to craft model, pro-transparency, CFR-ready language that agencies — or the drafters of government-wide common regulations — can use to bring agencies' Freedom of Information Act regulations up to standard. Watch this space, and then watch the Code of Federal Regulations (CFR). "As the staffer who waded through every single federal agencies' FOIA website and CFR chapter to locate their — sometimes hidden — regulations, I learned FOIA officials often say they view their FOIA requesters as customers," said Archive researcher Lauren Harper, "I think easy to find, updated model FOIA regulations are the best way for agencies to demonstrate they truly value their customer service, and the spirit of the FOIA."
  • The National Security Archive has conducted thirteen FOIA audits since 2002. Modeled after the California Sunshine Survey and subsequent state "FOI Audits," the Archive's FOIA Audits use open-government laws to test whether or not agencies are obeying those same laws. Recommendations from previous Archive FOIA Audits have led directly to laws and executive orders which have: set explicit customer service guidelines, mandated FOIA backlog reduction, assigned individualized FOIA tracking numbers, forced agencies to report the average number of days needed to process requests, and revealed the (often embarrassing) ages of the oldest pending FOIA requests. The surveys include:
  •  
    Article includes tables indicating which agencies are out of compliance with which FOIA directives. 
Paul Merrell

Exclusive: Inside America's Plan to Kill Online Privacy Rights Everywhere | The Cable - 0 views

  • The United States and its key intelligence allies are quietly working behind the scenes to kneecap a mounting movement in the United Nations to promote a universal human right to online privacy, according to diplomatic sources and an internal American government document obtained by The Cable. The diplomatic battle is playing out in an obscure U.N. General Assembly committee that is considering a proposal by Brazil and Germany to place constraints on unchecked internet surveillance by the National Security Agency and other foreign intelligence services. American representatives have made it clear that they won't tolerate such checks on their global surveillance network. The stakes are high, particularly in Washington -- which is seeking to contain an international backlash against NSA spying -- and in Brasilia, where Brazilian President Dilma Roussef is personally involved in monitoring the U.N. negotiations.
  • The Brazilian and German initiative seeks to apply the right to privacy, which is enshrined in the International Covenant on Civil and Political Rights (ICCPR), to online communications. Their proposal, first revealed by The Cable, affirms a "right to privacy that is not to be subjected to arbitrary or unlawful interference with their privacy, family, home, or correspondence." It notes that while public safety may "justify the gathering and protection of certain sensitive information," nations "must ensure full compliance" with international human rights laws. A final version the text is scheduled to be presented to U.N. members on Wednesday evening and the resolution is expected to be adopted next week. A draft of the resolution, which was obtained by The Cable, calls on states to "to respect and protect the right to privacy," asserting that the "same rights that people have offline must also be protected online, including the right to privacy." It also requests the U.N. high commissioner for human rights, Navi Pillay, present the U.N. General Assembly next year with a report on the protection and promotion of the right to privacy, a provision that will ensure the issue remains on the front burner.
  • Publicly, U.S. representatives say they're open to an affirmation of privacy rights. "The United States takes very seriously our international legal obligations, including those under the International Covenant on Civil and Political Rights," Kurtis Cooper, a spokesman for the U.S. mission to the United Nations, said in an email. "We have been actively and constructively negotiating to ensure that the resolution promotes human rights and is consistent with those obligations." But privately, American diplomats are pushing hard to kill a provision of the Brazilian and German draft which states that "extraterritorial surveillance" and mass interception of communications, personal information, and metadata may constitute a violation of human rights. The United States and its allies, according to diplomats, outside observers, and documents, contend that the Covenant on Civil and Political Rights does not apply to foreign espionage.
  • ...6 more annotations...
  • n recent days, the United States circulated to its allies a confidential paper highlighting American objectives in the negotiations, "Right to Privacy in the Digital Age -- U.S. Redlines." It calls for changing the Brazilian and German text so "that references to privacy rights are referring explicitly to States' obligations under ICCPR and remove suggestion that such obligations apply extraterritorially." In other words: America wants to make sure it preserves the right to spy overseas. The U.S. paper also calls on governments to promote amendments that would weaken Brazil's and Germany's contention that some "highly intrusive" acts of online espionage may constitute a violation of freedom of expression. Instead, the United States wants to limit the focus to illegal surveillance -- which the American government claims it never, ever does. Collecting information on tens of millions of people around the world is perfectly acceptable, the Obama administration has repeatedly said. It's authorized by U.S. statute, overseen by Congress, and approved by American courts.
  • "Recall that the USG's [U.S. government's] collection activities that have been disclosed are lawful collections done in a manner protective of privacy rights," the paper states. "So a paragraph expressing concern about illegal surveillance is one with which we would agree." The privacy resolution, like most General Assembly decisions, is neither legally binding nor enforceable by any international court. But international lawyers say it is important because it creates the basis for an international consensus -- referred to as "soft law" -- that over time will make it harder and harder for the United States to argue that its mass collection of foreigners' data is lawful and in conformity with human rights norms. "They want to be able to say ‘we haven't broken the law, we're not breaking the law, and we won't break the law,'" said Dinah PoKempner, the general counsel for Human Rights Watch, who has been tracking the negotiations. The United States, she added, wants to be able to maintain that "we have the freedom to scoop up anything we want through the massive surveillance of foreigners because we have no legal obligations."
  • The United States negotiators have been pressing their case behind the scenes, raising concerns that the assertion of extraterritorial human rights could constrain America's effort to go after international terrorists. But Washington has remained relatively muted about their concerns in the U.N. negotiating sessions. According to one diplomat, "the United States has been very much in the backseat," leaving it to its allies, Australia, Britain, and Canada, to take the lead. There is no extraterritorial obligation on states "to comply with human rights," explained one diplomat who supports the U.S. position. "The obligation is on states to uphold the human rights of citizens within their territory and areas of their jurisdictions."
  • The position, according to Jamil Dakwar, the director of the American Civil Liberties Union's Human Rights Program, has little international backing. The International Court of Justice, the U.N. Human Rights Committee, and the European Court have all asserted that states do have an obligation to comply with human rights laws beyond their own borders, he noted. "Governments do have obligation beyond their territories," said Dakwar, particularly in situations, like the Guantanamo Bay detention center, where the United States exercises "effective control" over the lives of the detainees. Both PoKempner and Dakwar suggested that courts may also judge that the U.S. dominance of the Internet places special legal obligations on it to ensure the protection of users' human rights.
  • "It's clear that when the United States is conducting surveillance, these decisions and operations start in the United States, the servers are at NSA headquarters, and the capabilities are mainly in the United States," he said. "To argue that they have no human rights obligations overseas is dangerous because it sends a message that there is void in terms of human rights protection outside countries territory. It's going back to the idea that you can create a legal black hole where there is no applicable law." There were signs emerging on Wednesday that America may have been making ground in pressing the Brazilians and Germans to back on one of its toughest provisions. In an effort to address the concerns of the U.S. and its allies, Brazil and Germany agreed to soften the language suggesting that mass surveillance may constitute a violation of human rights. Instead, it simply deep "concern at the negative impact" that extraterritorial surveillance "may have on the exercise of and enjoyment of human rights." The U.S., however, has not yet indicated it would support the revised proposal.
  • The concession "is regrettable. But it’s not the end of the battle by any means," said Human Rights Watch’s PoKempner. She added that there will soon be another opportunity to corral America's spies: a U.N. discussion on possible human rights violations as a result of extraterritorial surveillance will soon be taken up by the U.N. High commissioner.
  •  
    Woo-hoo! Go get'em, U.N.
Paul Merrell

False Flag in Odessa » CounterPunch: Tells the Facts, Names the Names - 0 views

  • Photos of the victims of the Odessa fire which have been circulating on the Internet have cast doubt on the official version of events. It’s now clear that many of the anti-junta activists who occupied the Trade Unions House were neither burned to death nor died of smoke inhalation, but were savagely shot at point-blank range by agents and thugs who had infiltrated the building to kill as many of the occupants as possible, burn the corpses, and then slip away without notice. Some of the victims–like a young woman who was eight months pregnant –were strangled with an electrical chord and left slumped backwards over her desk in a room that shows no sign of fire or smoke damage. In another case, a woman was stripped naked from the waste down, raped, killed, and set ablaze. In still other cases, victims with bullet-holes through their skulls, had flammable fluid dumped on their heads and were incinerated, leaving a charred head atop a corpse whose clothes were untouched by fire. The sloppily-executed killing-spree proves that the fire was not the result of a spontaneous clash between pro and anti-Kiev demonstrators, but a carefully planned black-op that likely involved foreign Intel agencies working hand-in-hand with the fascist junta government in Kiev. Did we mention that the CIA has taken up residence in the Ukrainian capital? Here’s the scoop from the AFP:
  • “Dozens of specialists from the US Central Intelligence Agency and Federal Bureau of Investigation are advising the Ukrainian government … helping Kiev end the rebellion in the east of Ukraine and set up a functioning security structure…” (CIA, FBI agents ‘advising Ukraine government: report, AFP) We all know about the CIA’s energetic efforts to create a “functioning security structure” in nations around the world. The CIA’s presence in Ukraine suggests that the US was either actively involved in the Odessa incident or knows who was. Either way, there should be an independent investigation before the case is referred to the ICC for prosecution.
Gary Edwards

A Crisis Worse than ISIS? Bail-Ins Begin - nsnbc international | nsnbc international - 0 views

  • Propping Up the Derivatives Scheme Dodd-Frank states in its preamble that it will “protect the American taxpayer by ending bailouts.” But it does this under Title II by imposing the losses of insolvent financial companies on their common and preferred stockholders, debtholders, and other unsecured creditors. That includes depositors, the largest class of unsecured creditor of any bank.
  • Title II is aimed at “ensuring that payout to claimants is at least as much as the claimants would have received under bankruptcy liquidation.” But here’s the catch: under both the Dodd Frank Act and the 2005 Bankruptcy Act, derivative claims have super-priority over all other claims, secured and unsecured, insured and uninsured.
  • The over-the-counter (OTC) derivative market (the largest market for derivatives) is made up of banks and other highly sophisticated players such as hedge funds. OTC derivatives are the bets of these financial players against each other. Derivative claims are considered “secured” because collateral is posted by the parties. For some inexplicable reason, the hard-earned money you deposit in the bank is not considered “security” or “collateral.” It is just a loan to the bank, and you must stand in line along with the other creditors in hopes of getting it back. State and local governments must also stand in line, although their deposits are considered “secured,” since they remain junior to the derivative claims with “super-priority.”
  • ...12 more annotations...
  • Under the old liquidation rules, an insolvent bank was actually “liquidated” – its assets were sold off to repay depositors and creditors. Under an “orderly resolution,” the accounts of depositors and creditors are emptied to keep the insolvent bank in business.
  • The point of an “orderly resolution” is not to make depositors and creditors whole but to prevent another system-wide “disorderly resolution” of the sort that followed the collapse of Lehman Brothers in 2008.
  • The concern is that pulling a few of the dominoes from the fragile edifice that is our derivatives-laden global banking system will collapse the entire scheme. The sufferings of depositors and investors are just the sacrifices to be borne to maintain this highly lucrative edifice.
  • At first glance, the “bail-in” resembles the normal capitalist process of liabilities restructuring that should occur when a bank becomes insolvent. . . . The difference with the “bail-in” is that the order of creditor seniority is changed. In the end, it amounts to the cronies (other banks and government) and non-cronies. The cronies get 100% or more; the non-cronies, including non-interest-bearing depositors who should be super-senior, get a kick in the guts instead. . . . In principle, depositors are the most senior creditors in a bank. However, that was changed in the 2005 bankruptcy law, which made derivatives liabilities most senior. Considering the extreme levels of derivatives liabilities that many large banks have, and the opportunity to stuff any bank with derivatives liabilities in the last moment, other creditors could easily find there is nothing left for them at all.
  • A study involving the cost to taxpayers of the Dodd-Frank rollback slipped by Citibank into the “cromnibus” spending bill last December found that the rule reversal allowed banks to keep $10 trillion in swaps trades on their books. This is money that taxpayers could be on the hook for in another bailout; and since Dodd-Frank replaces bailouts with bail-ins, it is money that creditors and depositors could now be on the hook for.
  • As of September 2014, US derivatives had a notional value of nearly $280 trillion
  •  Citibank is particularly vulnerable to swaps on the price of oil. Brent crude dropped from a high of $114 per barrel in June 2014 to a low of $36 in December 2015.
  • What about FDIC insurance? It covers deposits up to $250,000, but the FDIC fund had only $67.6 billion in it as of June 30, 2015, insuring about $6.35 trillion in deposits. The FDIC has a credit line with the Treasury, but even that only goes to $500 billion; and who would pay that massive loan back? The FDIC fund, too, must stand in line behind the bottomless black hole of derivatives liabilities
  • You can move your money into one of the credit unions with their own deposit insurance protection; but credit unions and their insurance plans are also under attack.
  • In short, the goal of the bail-in scheme is to place losses on private creditors. Alternatives that allow them to escape could soon be blocked.
  • The Dodd Frank Act and the Bankruptcy Reform Act both need a radical overhaul, and the Glass-Steagall Act (which put a fire wall between risky investments and bank deposits) needs to be reinstated.
  • Meanwhile, local legislators would do well to set up some publicly-owned banks on the model of the state-owned Bank of North Dakota – banks that do not gamble in derivatives and are safe places to store our public and private funds.
  •  
    Excellent analysis of the coming banking crisis anw how our politicians have put the citizens on the hook for risky bank derivative gambling.  Thanks Marbux! Ellen H. Brown (nsnbc) : While the mainstream media focus on ISIS extremists, a threat that has gone virtually unreported is that your life savings could be wiped out in a massive derivatives collapse. Bank bail-ins have begun in Europe, and the infrastructure is in place in the US.  Poverty also kills.
1 - 16 of 16
Showing 20 items per page