Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged Christopher-Black

Rss Feed Group items tagged

Gary Edwards

Terrorism: A Matrix of Lies and Deceit - Christopher Black - 0 views

  • Christopher Black is an international criminal lawyer based in Toronto, he is a member of the Law Society of Upper Canada and he is known for a number of high-profile cases involving human rights and war crimes, especially for the online magazine “New Eastern Outlook”.
  •  
    "Terrorism: A Matrix of Lies and Deceit - Good catch of a very interesting article from Marbux! Christopher Black (NEO) : So how is your war on "terrorism" going? I'm not doing too well at it since I have no idea who the enemy is. Like the American black comedian, Dick Gregory, who, on hearing that President Johnson had declared a war on poverty, ran out onto the street with a hand grenade to throw it at some poor people, I have no idea who the real enemy is, who to throw a grenade at. That makes me think. We are told, the world over, by every government, that we are in a "war against terrorism." But terrorism is an action, a tactic, a strategy. It's a method not person, a group, a country. How can there be a war against a method of war. But they want us to fight a method and never ask the why or the who. That doesn't seem to matter anymore. They tell us not to be concerned with why something happens, only how it happens. Let's face it, the Americans, with all the creative skills of Madison Avenue, have got us all to use a phrase that George Bush first used in 2001after the strange event in New York that has all the indicia of a state attack on its own people to justify the invasions of Afghanistan and then Iraq. It has become a euphemism and a justification for all the wars they have waged since. The people don't need to know why "terrorists" exist, or who they are and what motivates them, or even whether they really exist, for they are just "terrorists." Sometimes the war is against a "regime" that is "terrorising" its own people according to the "responsibility to protect" mafia that act as the chorus to the principal players in this theatre, as was done to Yugoslavia and Libya; or a regime that "terrorises the world", as we saw with Iraq. Sometimes the war is a phony war against 'terrorists" who are really mercenary forces fighting for the USA and its allies. We see this in Syria. We have seen it used agai
Gary Edwards

Articles of Impeachment Against Obama - 0 views

  •  
    Sarasota, FL ( August 12, 2013) - The National Black Republican Association (NBRA) based in Sarasota, FL, headed by Chairman Frances Rice, filed Articles of Impeachment against President Barack Obama with the following language.   We, black American citizens, in order to free ourselves and our fellow citizens from governmental tyranny, do herewith submit these Articles of Impeachment to Congress for the removal of President Barack H. Obama, aka, Barry Soetoro, from office for his attack on liberty and commission of egregious acts of despotism that constitute high crimes and misdemeanors.   On July 4, 1776, the founders of our nation declared their independence from governmental tyranny and reaffirmed their faith in independence with the ratification of the Bill of Rights in 1791.   Asserting their right to break free from the tyranny of a nation that denied them the civil liberties that are our birthright, the founders declared:   "When a long train of abuses and usurpations, pursuing invariably the same Object evinces a design to reduce them under absolute Despotism, it is their right, it is their duty, to throw off such Government, and to provide new Guards for their future security."  -  Declaration of Independence, July 4, 1776.   THE IMPEACHMENT POWER   Article II, Section IV of the United States Constitution provides: "The President, Vice President and all civil Officers of the United States, shall be removed from Office on Impeachment for, and Conviction of, Treason, Bribery, or other high Crimes and Misdemeanors."   THE ARTICLES OF IMPEACHMENT   In his conduct of the office of President of the United States, Barack H. Obama, aka Barry Soetoro, personally and through his subordinates and agents, in violation or disregard of the constitutional rights of citizens and in violation of his constitutional duty to take care that the laws be faithfully executed, has prevented, obstructed, and impeded the administration of justice, in that:   ARTICL
Paul Merrell

NSA contracted French cyber-firm for hacking help - RT USA - 0 views

  • The latest revelation regarding the National Security Agency doesn't come courtesy of Edward Snowden. A Freedom of Information Act request has confirmed the NSA contracted a French company that makes its money by hacking into computers. It's no secret that the United States government relies on an arsenal of tactics to gather intelligence and wage operations against its adversaries, but a FOIA request filed by Muckrock's Heather Akers-Healy has confirmed that the list of Uncle Sam's business partners include Vupen, a French-based security company that specializes in selling secret codes used to crack into computers. Documents responsive to my request to #NSA for contracts with VUPEN, include 12/month exploit subscription https://t.co/x3qJbqSUpa — Heather Akers-Healy (@abbynormative) September 16, 2013 Muckrock published on Monday a copy of a contract between the NSA and Vupen in which the US government is shown to have ordered a one-year subscription to the firm's “binary analysis and exploits service” last September.
  • That service, according to the Vupen website, is sold only to government entities, law enforcement agencies and computer response teams in select countries, and provides clients with access to so-called zero-day exploits: newly-discovered security vulnerabilities that the products' manufacturers have yet to discover and, therefore, have had zero days to patch-up. “Major software vendors such as Microsoft and Adobe usually take 6 to 9 months to release a security patch for a critical vulnerability affecting their products, and this long delay between the discovery of a vulnerability and the release of a patch creates a window of exposure during which criminals can rediscover a previously reported but unpatched vulnerability, and target any organization running the vulnerable software,” Vupen says elsewhere on their website. Last year, Vupen researchers successfully cracked Google's Chrome browser, but declined to show developers how they did so — even for an impressive cash bounty. “We wouldn’t share this with Google for even $1 million,” Vupen CEO Chaouki Bekrar told Forbes' Andy Greenberg of the Chrome hack in 2012. “We don’t want to give them any knowledge that can help them in fixing this exploit or other similar exploits. We want to keep this for our customers.”
  • And why the NSA and other clients may benefit from being privy to these vulnerabilities, knowing how to exploit security holes in adversarial systems is a crucial component to any government's offensive cyber-operations. Last month, the Washington Post published excerpts from the previously secretive “black budget,” a closely guarded ledger listing the funding requests made by America's intelligence community provided by NSA leaker Edward Snowden. According to that document, a substantial goal of the US in fiscal year 2013 was to use a portion of $52.6 billion in secretive funding towards improving offensive cyber-operations.
  • ...1 more annotation...
  • The portion of the contract obtained by Muckrock where the cost of the subscription is listed has been redacted, but a Vupen hacker who spoke to Greenberg last year said deals in the five-figures wasn't uncommon. "People seem surprised to discover that major government agencies are acquiring Vupen's vulnerability intelligence," Bekrar wrote in an email to Information Week's Matthew Schwartz after the NSA contract with his signature was published. "There is no news here, governments need to leverage the most detailed and advanced vulnerability research to protect their infrastructures and citizens against adversaries." Critics of Vupen and its competitors see government-waged cyber-operations in a different light, however. Christopher Soghoian of the American Civil Liberties Union's Speech, Privacy and Technology Project has spoken outright against companies that sell exploits and have equated the computer codes being sold for big money as a new sort of underground arms trade fueling an international, online battle. To Greenberg last year, Soghoian described Vupen as  a “modern-day merchant of death” selling “the bullets for cyberwar," and upon publishing of the NSA contract called the company a “cyber weapon merchant.” The NSA is a customer of French 0-day cyber weapon merchant VUPEN, FOIA docs reveal: (via @ramdac & @MuckRockNews) https://t.co/OPJ82miK3c — Christopher Soghoian (@csoghoian) September 16, 2013
Gary Edwards

Generals conclude Obama backed al-Qaida - 0 views

  •  
    Petrodollars. Obama has lost Iraq, Afghanistan, Libya and Yemen to Al-Queda / Muslim Brotherhood extremists. He has nearly lost Egypt and Syria. They hang by a thread. We could see this as an Islamic revolution trying to overtake the despots that have ruled the middle East since the WWI break up of the Ottoman Empire, and shamelessly enriched themselves in petrodollars in the process. Or, we could look at this as religious war between Sunni and Shiite Islamic factions, with Iran leading the Shiites, and the Saudis leading the Sunnis. Except, that divide doesn't seem to gel with the idea of a Shiite Muslim Brotherhood alliance with a Sunni Al-Queda. For sure though, Iran has taken over the formerly Sunni led Iraq and is now executing any and all Sunni rebels. Including all of Saddam Hussein's Revolutionary Guard members now fighting in northern Irag and Syria as ISIL. With the help, air cover and weapons provided by Obama, the Muslim Brotherhood has taken over Libya, and nearly took Egypt. The only way of looking at this mess and making sense of it is through the lens of petrodollars and pipelines. Gadafi, Saddam Husein, the Shah of Iran, and Bashir in Syria all have one thing in common: they were selling oil and accepting payment in something other than petrodollars. They were building pipelines for the shipment of non petrodollar oil. I don't expect Iraq or Lybian oil to ever return to market. Civil war will keep that oil in the ground; making the petrodollar bankers and oligarchs very very wealthy, and the USA-NATO military industrial complex very busy profiting from the sale of war making machinery. ..................................... "The Obama White House and the State Department under the management of Secretary of State Hillary Clinton "changed sides in the war on terror" in 2011 by implementing a policy of facilitating the delivery of weapons to the al-Qaida-dominated rebel militias in Libya attempting to oust Moammar Gadhafi from powe
Paul Merrell

Is someone pinching pennies at Guantánamo prison? | Miami Herald - 0 views

  • Could the people at the Most Expensive Prison on Earth be pinching pennies?
  • Attorneys for the last 114 captives at the U.S. Navy base at Guantánamo Bay, Cuba, say they have been increasingly providing their clients with everything from T-shirts and socks and shoes to shampoo and vitamins to fill a long-term, unexplained need at the war on terror prison.Lawyers who have visited the prison as recently as this month say the captives’ U.S. military issue uniforms are faded, torn or tattered and their shoes have holes. In other instances, detainees tell their lawyers, personal hygiene supplies are cheap and simply don’t do the job. A case-in-point: When attorney Ramzi Kassem met detainee Shaker Aamer to share the news that the long-held Saudi prisoner was approved for transfer to Britain after Oct. 24, the captive was brought to their meeting in prison-issue canvas shoes held together by duct tape.
  • “Stuff’s just not getting replaced,” said attorney George Clarke who in late September spent about $300 on slip-on canvas shoes, plastic sandals, T-shirts and towels for his two detainee clients — both approved for repatriation, if the political situation improves in Yemen. “They say the stuff they get is crap. Or they’re not getting it.”Recently, he said, the detention center staff has been more accepting of contributions from the attorneys, suggesting prison commanders are confronted with a cash crunch or have realized they can pass along costs of basics to the private sector.
  • ...7 more annotations...
  • At the prison, a spokesman declined to say whether the raggedy clothing reflected a new policy or budget cutbacks but dismissed a question on whether there was a supply issue. Detainee provisions “have not changed,” Navy Capt. Christopher Scholl said tersely by email. The prison would not provide a list of what constitutes basic issue prisoner provisions these days. Nor would Scholl address a question about whether the quality of prison-issue items had degraded.
  • The International Committee of the Red Cross would not say whether delegates have raised the issue in confidential talks with the prison commander. The Miami Herald spoke, separately, with 12 attorneys who have met captives in recent months and describe detainees showing up at legal meetings looking disheveled and needing replacement footwear or clothes. The attorneys say the appearance is noteworthy because through the years all but mentally ill captives have tried to tidy up for their legal meetings.“They’re looking pretty threadbare,” attorney Cori Crider of the nonprofit Reprieve legal defense group said from the U.S. Navy base Tuesday after she bought shampoo and socks for one prisoner. “It’s an escalating complaint that people are being left in rags.”The lawyers quote their clients as saying some supplies have disappeared entirely at the prison, which boasts Muslim sensitivity and humane treatment. Some just aren’t replaced frequently enough, they claim.
  • Into this vacuum attorneys who represent the detainees at no charge have for about nine months routinely spent hundreds of dollars on each trip to buy their clients basic provisions at the base commissary, the Navy Exchange, or NEX.In March, Chicago attorney Patricia Bronte, a solo practitioner, spent $136.25 on shoes and Gold Toe socks for her two Yemeni clients. She left them with a prison lawyer, who got them to the clients after she left the base — something she knows because she got thank-you notes via the prison’s legal mail system.
  • “I have noticed that sometimes the client appears at the meetings with shoes that look pretty beaten up. So I went to the NEX and I bought shoes and socks.” Also $6.12 in toothbrushes and toothpaste, according to her commissary receipt.“Understand, I’m not complaining. I don’t mind buying my clients shoes to improve their conditions,” she said. “It’s the gall of this country. To detain these guys for little or no reason for 14 years and not provide them with shoes is offensive.”
  • Prison officials had already stopped spending taxpayers’ money on books, videos and electronic games for the detainee diversion program, according to media visits in the past year, leaving it to the Red Cross and lawyers to donate to the Detainee Library. Kassem, the attorney, said his clients quoted guards and other prison staff as blaming budget cuts at the prison where the Pentagon maintains a 2,000-plus staff for 114 captives and has spent more than $5 billion. “Sometimes it’s a problem of poor toiletries — soap that doesn’t lather, toothpaste that doesn’t froth, deodorant that doesn’t prevent body odor,” said Kassem, a professor at the City University of New York School of Law whose legal clinic represents five Guantánamo detainees. Captives he sees in the prison’s iconic orange prison uniform are wearing old, torn and much less orange jumpsuits, he said.The prisoners are perplexed, Kassem said. “They’ve heard how much it costs per prisoner. They wonder, where’s all the money?”“Somebody’s pinching pennies, it seems,” he said, describing the prison-issue footwear on Aamer, the next detainee to be released, as “Oliver Twist tattered” despite repeated pleas for a replacement pair.
  • Over at the secret prison for former long-held CIA captives, Camp 7, the detainees are taking vitamin D furnished by defense attorneys Cheryl Bormann and Air Force Capt. Michael Schwartz.Walid bin Attash spent years without exposure to sunlight in a so-called CIA black site before he got to Camp 7 in 2006. Now, he’s told his lawyers, his medical record shows a severe vitamin D deficiency. He asked his defense team for a halal version of the supplement, which the prison doesn’t provide. One attorney, who asked not to be identified, quoted a prison medical officer as telling detainees “there’s no money for that.”So bin Attash’s lawyers ordered kosher vitamin D — no forbidden products in those gel caps — and gave it to the military staff attorney assigned to Camp 7. The prison’s medical officer has apparently doled them out to other former CIA black site captives because bin Attash needs a resupply sooner than a one-a-day distribution would require, Bormann said.“We’ve been having to purchase vitamin D for our client,” said Bormann, a criminal defense attorney with death-penalty experience. “It’s crazy.” At a civilian prison, she said, the lawyers wouldn’t have to buy and furnish it. They’d go to a federal or state judge, who would order the prison to provide it.
  • Lists of purchases provided by more than a dozen attorneys include toothbrushes, toothpaste, bar soap, shampoo, deodorant, slip-on sandals that double as slippers, white socks, white T-shirts, towels, no-lace sneakers, canvas slip-on shoes, pillows, books, individual DVD players, video games and audio tapes. Those reached the clients after a guard inspection — as did tahini, ginger, allspice, mint oil, mint tea, ginger tea, Nesquik, olive oil, ground cloves, henna and almonds, around Ramadan. Lawyers also said they have submitted other items that were rejected — notably black socks, hairbrushes, combs and aftershave (probably for its taboo alcohol content).
Paul Merrell

Data Pirates of the Caribbean: The NSA Is Recording Every Cell Phone Call in the Bahama... - 0 views

  • The National Security Agency is secretly intercepting, recording, and archiving the audio of virtually every cell phone conversation on the island nation of the Bahamas. According to documents provided by NSA whistleblower Edward Snowden, the surveillance is part of a top-secret system – code-named SOMALGET – that was implemented without the knowledge or consent of the Bahamian government. Instead, the agency appears to have used access legally obtained in cooperation with the U.S. Drug Enforcement Administration to open a backdoor to the country’s cellular telephone network, enabling it to covertly record and store the “full-take audio” of every mobile call made to, from and within the Bahamas – and to replay those calls for up to a month. SOMALGET is part of a broader NSA program called MYSTIC, which The Intercept has learned is being used to secretly monitor the telecommunications systems of the Bahamas and several other countries, including Mexico, the Philippines, and Kenya. But while MYSTIC scrapes mobile networks for so-called “metadata” – information that reveals the time, source, and destination of calls – SOMALGET is a cutting-edge tool that enables the NSA to vacuum up and store the actual content of every conversation in an entire country.
  • All told, the NSA is using MYSTIC to gather personal data on mobile calls placed in countries with a combined population of more than 250 million people. And according to classified documents, the agency is seeking funding to export the sweeping surveillance capability elsewhere. The program raises profound questions about the nature and extent of American surveillance abroad. The U.S. intelligence community routinely justifies its massive spying efforts by citing the threats to national security posed by global terrorism and unpredictable rival nations like Russia and Iran. But the NSA documents indicate that SOMALGET has been deployed in the Bahamas to locate “international narcotics traffickers and special-interest alien smugglers” – traditional law-enforcement concerns, but a far cry from derailing terror plots or intercepting weapons of mass destruction.
  • By targeting the Bahamas’ entire mobile network, the NSA is intentionally collecting and retaining intelligence on millions of people who have not been accused of any crime or terrorist activity. Nearly five million Americans visit the country each year, and many prominent U.S. citizens keep homes there, including Sen. Tom Harkin (D-Iowa), Bill Gates, and Oprah Winfrey.
  • ...12 more annotations...
  • The Intercept has confirmed that as of 2013, the NSA was actively using MYSTIC to gather cell-phone metadata in five countries, and was intercepting voice data in two of them. Documents show that the NSA has been generating intelligence reports from MYSTIC surveillance in the Bahamas, Mexico, Kenya, the Philippines, and one other country, which The Intercept is not naming in response to specific, credible concerns that doing so could lead to increased violence. The more expansive full-take recording capability has been deployed in both the Bahamas and the unnamed country. MYSTIC was established in 2009 by the NSA’s Special Source Operations division, which works with corporate partners to conduct surveillance. Documents in the Snowden archive describe it as a “program for embedded collection systems overtly installed on target networks, predominantly for the collection and processing of wireless/mobile communications networks.”
  • If an entire nation’s cell-phone calls were a menu of TV shows, MYSTIC would be a cable programming guide showing which channels offer which shows, and when. SOMALGET would be the DVR that automatically records every show on every channel and stores them for a month. MYSTIC provides the access; SOMALGET provides the massive amounts of storage needed to archive all those calls so that analysts can listen to them at will after the fact. According to one NSA document, SOMALGET is “deployed against entire networks” in the Bahamas and the second country, and processes “over 100 million call events per day.”
  • When U.S. drug agents need to tap a phone of a suspected drug kingpin in another country, they call up their counterparts and ask them set up an intercept. To facilitate those taps, many nations – including the Bahamas – have hired contractors who install and maintain so-called lawful intercept equipment on their telecommunications. With SOMALGET, it appears that the NSA has used the access those contractors developed to secretly mine the country’s entire phone system for “signals intelligence” –recording every mobile call in the country. “Host countries,” the document notes, “are not aware of NSA’s SIGINT collection.” “Lawful intercept systems engineer communications vulnerabilities into networks, forcing the carriers to weaken,” says Christopher Soghoian, the principal technologist for the American Civil Liberties Union. “Host governments really should be thinking twice before they accept one of these Trojan horses.”
  • The DEA has long been in a unique position to help the NSA gain backdoor access to foreign phone networks. “DEA has close relationships with foreign government counterparts and vetted foreign partners,” the manager of the NSA’s drug-war efforts reported in a 2004 memo. Indeed, with more than 80 international offices, the DEA is one of the most widely deployed U.S. agencies around the globe. But what many foreign governments fail to realize is that U.S. drug agents don’t confine themselves to simply fighting narcotics traffickers. “DEA is actually one of the biggest spy operations there is,” says Finn Selander, a former DEA special agent who works with the drug-reform advocacy group Law Enforcement Against Prohibition. “Our mandate is not just drugs. We collect intelligence.” What’s more, Selander adds, the NSA has aided the DEA for years on surveillance operations. “On our reports, there’s drug information and then there’s non-drug information,” he says. “So countries let us in because they don’t view us, really, as a spy organization.”
  • “I seriously don’t think that would be your run-of-the-mill legal interception equipment,” says the former engineer, who worked with hardware and software that typically maxed out at 1,000 intercepts. The NSA, by contrast, is recording and storing tens of millions of calls – “mass surveillance,” he observes, that goes far beyond the standard practices for lawful interception recognized around the world. The Bahamas Telecommunications Company did not respond to repeated phone calls and emails.
  • The proliferation of private contractors has apparently provided the NSA with direct access to foreign phone networks. According to the documents, MYSTIC draws its data from “collection systems” that were overtly installed on the telecommunications systems of targeted countries, apparently by corporate “partners” cooperating with the NSA. One NSA document spells out that “the overt purpose” given for accessing foreign telecommunications systems is “for legitimate commercial service for the Telco’s themselves.” But the same document adds: “Our covert mission is the provision of SIGINT,” or signals intelligence.
  • According to the NSA documents, MYSTIC targets calls and other data transmitted on  Global System for Mobile Communications networks – the primary framework used for cell phone calls worldwide. In the Philippines, MYSTIC collects “GSM, Short Message Service (SMS) and Call Detail Records” via access provided by a “DSD asset in a Philippine provider site.” (The DSD refers to the Defence Signals Directorate, an arm of Australian intelligence. The Australian consulate in New York declined to comment.) The operation in Kenya is “sponsored” by the CIA, according to the documents, and collects “GSM metadata with the potential for content at a later date.” The Mexican operation is likewise sponsored by the CIA. The documents don’t say how or under what pretenses the agency is gathering call data in those countries. In the Bahamas, the documents say, the NSA intercepts GSM data that is transmitted over what is known as the “A link”–or “A interface”–a core component of many mobile networks. The A link transfers data between two crucial parts of GSM networks – the base station subsystem, where phones in the field communicate with cell towers, and the network subsystem, which routes calls and text messages to the appropriate destination. “It’s where all of the telephone traffic goes,” says the former engineer.
  • When U.S. drug agents wiretap a country’s phone networks, they must comply with the host country’s laws and work alongside their law enforcement counterparts. “The way DEA works with our allies – it could be Bahamas or Jamaica or anywhere – the host country has to invite us,” says Margolis. “We come in and provide the support, but they do the intercept themselves.” The Bahamas’ Listening Devices Act requires all wiretaps to be authorized in writing either by the minister of national security or the police commissioner in consultation with the attorney general. The individuals to be targeted must be named. Under the nation’s Data Protection Act, personal data may only be “collected by means which are both lawful and fair in the circumstances of the case.” The office of the Bahamian data protection commissioner, which administers the act, said in a statement that it “was not aware of the matter you raise.” Countries like the Bahamas don’t install lawful intercepts on their own. With the adoption of international standards, a thriving market has emerged for private firms that are contracted by foreign governments to install and maintain lawful intercept equipment. Currently valued at more than $128 million, the global market for private interception services is expected to skyrocket to more than $970 million within the next four years, according to a 2013 report from the research firm Markets and Markets.
  • If the U.S. government wanted to make a case for surveillance in the Bahamas, it could point to the country’s status as a leading haven for tax cheats, corporate shell games, and a wide array of black-market traffickers. The State Department considers the Bahamas both a “major drug-transit country” and a “major money laundering country” (a designation it shares with more than 60 other nations, including the U.S.). According to the International Monetary Fund, as of 2011 the Bahamas was home to 271 banks and trust companies with active licenses. At the time, the Bahamian banks held $595 billion in U.S. assets. But the NSA documents don’t reflect a concerted focus on the money launderers and powerful financial institutions – including numerous Western banks – that underpin the black market for narcotics in the Bahamas. Instead, an internal NSA presentation from 2013 recounts with pride how analysts used SOMALGET to locate an individual who “arranged Mexico-to-United States marijuana shipments” through the U.S. Postal Service.
  • The presentation doesn’t say whether the NSA shared the information with the DEA. But the drug agency’s Special Operations Divison has come under fire for improperly using classified information obtained by the NSA to launch criminal investigations – and then creating false narratives to mislead courts about how the investigations began. The tactic – known as parallel construction – was first reported by Reuters last year, and is now under investigation by the Justice Department’s inspector general. So: Beyond a desire to bust island pot dealers, why would the NSA choose to apply a powerful collection tool such as SOMALGET against the Bahamas, which poses virtually no threat to the United States? The answer may lie in a document that characterizes the Bahamas operation as a “test bed for system deployments, capabilities, and improvements” to SOMALGET. The country’s small population – fewer than 400,000 residents – provides a manageable sample to try out the surveillance system’s features. Since SOMALGET is also operational in one other country, the Bahamas may be used as a sort of guinea pig to beta-test improvements and alterations without impacting the system’s operations elsewhere. “From an engineering point of view it makes perfect sense,” says the former engineer. “Absolutely.”
  • SOMALGET operates under Executive Order 12333, a Reagan-era rule establishing wide latitude for the NSA and other intelligence agencies to spy on other countries, as long as the attorney general is convinced the efforts are aimed at gathering foreign intelligence. In 2000, the NSA assured Congress that all electronic surveillance performed under 12333 “must be conducted in a manner that minimizes the acquisition, retention, and dissemination of information about unconsenting U.S. persons.” In reality, many legal experts point out, the lack of judicial oversight or criminal penalties for violating the order render the guidelines meaningless. “I think it would be open, whether it was legal or not,” says German, the former FBI agent. “Because we don’t have all the facts about how they’re doing it. For a long time, the NSA has been interpreting their authority in the broadest possible way, even beyond what an objective observer would say was reasonable.” “An American citizen has Fourth Amendment rights wherever they are,” adds Kurt Opsahl, an attorney with the Electronic Frontier Foundation. “Nevertheless, there have certainly been a number of things published over the last year which suggest that there are broad, sweeping programs that the NSA and other government agencies are doing abroad that sweep up the communications of Americans.”
  • Legal or not, the NSA’s covert surveillance of an entire nation suggests that it will take more than the president’s tepid “limits” to rein in the ambitions of the intelligence community. “It’s almost like they have this mentality – if we can, we will,” says German. “There’s no analysis of the long-term risks of doing it, no analysis of whether it’s actually worth the effort, no analysis of whether we couldn’t take those resources and actually put them on real threats and do more good.” It’s not surprising, German adds, that the government’s covert program in the Bahamas didn’t remain covert. “The undermining of international law and international cooperation is such a long-term negative result of these programs that they had to know would eventually be exposed, whether through a leak, whether through a spy, whether through an accident,” he says. “Nothing stays secret forever. It really shows the arrogance of these agencies – they were just going to do what they were going to do, and they weren’t really going to consider any other important aspects of how our long-term security needs to be addressed.”
  •  
    Words fail me.
Paul Merrell

Kremlin 'covered up the murder of a former KGB chief' | Daily Mail Online - 0 views

  • The Kremlin may have covered up the murder of a former KGB chief accused of helping ex-MI6 spy Christopher Steele to pull together the notorious dossier on Donald Trump.Oleg Erovinkin served as a general in the KGB and was found dead on Boxing Day in the back of his car in Moscow.It has been claimed he died of a heart attack, but an expert on Russian security threats believes he was murdered for his role in the explosive dossier.  The suspected murder victim was close to former deputy prime minister Igor Sechin, who is named throughout the leaked memo, according to the Telegraph.Erovinkin is understood to have been an important link between Sechin and leader of the Kremlin Vladimir Putin.Agent Steele's dossier, which was made public earlier this month, noted how he had a source close to Sechin.
  • He said the source had revealed alleged links between the US President's supporters and Moscow. At the time of Erovinkin's death, Russian state-run RIA Novosti news agency said his body was found in a black Lexus and that a major investigation was underway in the area. His body was sent to the morgue, which returned no cause of death, and the investigation continues. Local media reports suggested he was killed as a result of foul play, but it was later claimed he died of a heart attack. Christo Grozev, an expert on Russia-related security threats, wrote in a blog post, that he believes Erovinkin was Mr Steele's dossier source. He wrote that he has no doubt the dossier was on Putin's desk at the time the suspected victim died. 'Whichever is true,' he wrote, 'He would have had a motive to seek – and find the mole.
  • 'He would have had to conclude that Erovinkin was at least a person of interest.' The so-called dirty dossier states that in 2013 Trump hired prostitutes to urinate on the bed of the Presidential Suite at the Moscow Ritz Carlton, where he knew Barack and Michelle Obama had previously stayed.It says: 'Trump's unorthodox behavior in Russia over the years had provided the authorities there with enough embarrassing material on the now Republican presidential candidate to be able to blackmail him if they so wished.'The document states that Trump had declined 'sweetener' real estate deals in Russia that the Kremlin lined up in order to cultivate him.The business proposals were said to be 'in relation to the ongoing 2018 World Cup soccer tournament'The dossier claimed that the Russian regime had been 'cultivating, supporting and assisting Trump for at least five years'.According to the document, one source even claimed that 'the Trump operation was both supported and directed by Russian President Vladimir Putin' with the aim being to 'sow discord'.The report claims that Russian President Vladimir Putin himself had endorsed moves to encourage 'splits and divisions in the West.The dossier was handed over to the FBI in August although the information was also passed from the former MI6 agent to John McCain through an intermediary.McCain then handed the document over to FBI Director James Comey.
Paul Merrell

Ex-Chief of C.I.A. Shapes Response to Detention Report - NYTimes.com - 0 views

  • Just after the Senate Intelligence Committee voted in April to declassify hundreds of pages of a withering report on the Central Intelligence Agency’s detention and interrogation program, C.I.A. Director John O. Brennan convened a meeting of the men who had played a role overseeing the program in its seven-year history.The spies, past and present, faced each other around the long wooden conference table on the seventh floor of the C.I.A.’s headquarters in Northern Virginia: J. Cofer Black, head of the agency’s counterterrorism center at the time of the Sept. 11 attacks; the undercover officer who now holds that job; and a number of other former officials from the C.I.A.’s clandestine service. Over the speakerphone came the distinctive, Queens-accented voice of George J. Tenet.
  • Over the past several months, Mr. Tenet has quietly engineered a counterattack against the Senate committee’s voluminous report, which could become public next month. The effort to discredit the report has set up a three-way showdown among former C.I.A. officials who believe history has been distorted, a White House carefully managing the process and politics of declassifying the document, and Senate Democrats convinced that the Obama administration is trying to protect the C.I.A. at all costs.The report is expected to accuse a number of former C.I.A. officials of misleading Congress and the White House about the program and its effectiveness, but it is Mr. Tenet who might have the most at stake.
  • Mr. Tenet, who declined to be interviewed for this article, has arranged a number of conference calls with former C.I.A. officials to discuss the impending report. After private conversations with Mr. Brennan, he and two other former C.I.A. directors — Porter J. Goss and Michael V. Hayden — drafted a letter to Mr. Brennan asking that, as a matter of fairness, they be allowed to see the report before it was made public. Describing the letter, one former C.I.A. officer who spoke on condition of anonymity said that the former directors “think that those people who were heavily involved in the operations have a right to see what’s being said about them.”Mr. Brennan then passed the letter to Senator Dianne Feinstein, the California Democrat who is chairwoman of the Senate Intelligence Committee.
  • ...4 more annotations...
  • Ms. Feinstein agreed to let a group of former senior C.I.A. officials read a draft of the report, although she initially insisted they be allowed to review it only at the committee’s office. Officials said President Obama’s chief of staff, Denis McDonough, intervened and brokered an arrangement in which the officials could read an unredacted version of the report inside a secure room at the office of the Director of National Intelligence. Ms. Feinstein declined to comment.
  • “While former C.I.A. officials may be working to hide their own past wrongs, there’s no reason Brennan or any other current C.I.A. official should help facilitate the defense of the indefensible,” said Christopher Anders, senior legislative counsel at the American Civil Liberties Union.Spokesmen for the C.I.A. and the White House declined to comment.
  • The April meeting at C.I.A. headquarters highlighted how much of the agency is still seeded with officers who participated in the detention and interrogation program, which Mr. Obama officially ended during his first week in office in 2009.At one point during the meeting, the current head of the counterterrorism center, an officer with the first name Mike, told Mr. Brennan that roughly 200 people under his leadership had at some point participated in the interrogation program. They wanted to know, he said, how Mr. Brennan planned to defend them in public against accusations that the C.I.A. engaged in systematic torture and lied about its efficacy.
  • Mr. Tenet resigned a decade ago amid the wash of recriminations over the C.I.A.’s botched Iraq assessments, and he has given few interviews since his book tour.
  •  
    Major Obama scandal brewing here. The current head of the CIA, John Brennan, has been caught conspiring with former CIA heads and others to counter the Senate Intelligence Committee's pending report on CIA torture and extraordinary rendition, even as Brennan works to delay the report summary's publication by censoring it, resulting in delay while the Committee argues with the CIA over the deletions. All of which sharply contrasts with Obama's publicly expressed desire to have the report published promptly.    The article also makes a very strong case that those CIA officials who participated in the torture and rendition program have been enabled, on Obama's watch, to act as the censors of the Senate Report.  A must-read
1 - 8 of 8
Showing 20 items per page