Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged Court

Rss Feed Group items tagged

2More

Keeping Dark Money in the Shadows - WhoWhatWhy - 0 views

  • With the Supreme Court knocking down regulations with a wrecking ball, the FEC out of commission, and an election heating up that will likely redefine the term “big money,” there are few avenues left for regulation of American elections. And now, Congress is set to close one off.On June 17, the House Appropriations Committee passed 2016 Financial Services and General Government Appropriations bill including a collection of provisions that ensure that the so-called “dark money” of elections—money that passes through supposedly non-political social welfare nonprofits, such as the Koch Brothers’ Crossroads GPS or the League of Conservation Voters, and is therefore free from disclosure—remains very much dark.Section 129 of the bill prevents the IRS from taking any action to investigate whether these social welfare groups are acting exclusively for social welfare; Section 625 prevents the SEC from requiring disclosure of political donations for publicly traded companies; Section 735 prevents a rule requiring that government contractors disclose their contributions to political groups, nonprofits, and trade unions.
  • Rules like these are aimed at preventing what some campaign watchdog groups refer to as the dark money system. Though Federal Election Commission regulations require disclosure of all donations to political candidates, 501(c)(4) groups—groups determined by the IRS to be for social welfare, not political campaigning, and exempt from taxes and donor disclosure—can be used as a workaround. Corporations and individuals do not have to disclose their donations to these groups, meaning that these groups can make donations to political campaigns using money donated by others without those original donors revealing it.An executive order requiring disclosure rules of this sort had been one of the last hopes for election watchdogs looking for a way to keep campaign finance under control in the coming election. This action by the House Appropriations—part of a large government funding bill for which passage will likely not hinge on such small sections—has left them even more enraged at the state of current campaign finance regulations.
4More

France Targeted by NSA Spies and Parliament Passes Surveillance Law - 0 views

  • On Wednesday, France woke up to find that the National Security Agency had been snooping on the phones of its last three presidents. Top-secret documents provided by WikiLeaks to two media outlets, Mediapart and Libération, showed that the NSA had access to confidential conversations of France’s highest ranking officials, including the country’s current president, François Hollande; the prime minister in 2012, Jean-Marc Ayrault; and former presidents Nicolas Sarkozy and Jacques Chirac. Yet also today, the lower house of France’s legislature, the National Assembly, passed a sweeping surveillance law. The law provides a new framework for the country’s intelligence agencies to expand their surveillance activities. Opponents of the law were quick to mock the government for vigorously protesting being surveilled by one of the country’s closest allies while passing a law that gives its own intelligence services vast powers with what its opponents regard as little oversight. But for those who support the new law, the new revelations of NSA spying showed the urgent need to update the tools available to France’s spies.
  • The response from the French government today was firm but predictable. Senior intelligence officials will travel to the U.S. to meet their counterparts in Washington, while the U.S. ambassador in Paris was summoned to the Elysee Palace. A similar scenario played out in 2013, when Le Monde published Snowden documents that revealed some of the extent of American surveillance in France. Prime Minister Manuel Valls said today that he wants a “code of conduct” to guide the relationship between France and the U.S. on intelligence activities — but the government demanded the exact same thing almost two years ago. When The Intercept published NSA documents in March indicating the Five Eyes — the NSA’s core allies — were intercepting large swaths of internet traffic in France’s Pacific islands, an official protest from France was nowhere to be heard. Even when it appeared that France’s closest ally, Germany, was using its surveillance capabilities to spy, on behalf of the NSA, on France’s foreign affairs ministry and some of the country’s most strategic companies, French authorities remained silent.
  • Until the law was passed, France’s intelligence services operated almost without any laws to regulate them. Although the new law delivers a much-needed framework, its safeguards are regarded by many critics as insufficient. The powers of the oversight body in charge of the intelligence agencies have been slightly strengthened and it will be possible, if a citizen suspects she is being surveilled, to take her case before the Conseil d’Etat, France’s highest court. But other parts of the law have drawn controversy, including the way it defines the purposes the government can invoke to surveil French residents. The categories extend well beyond terrorism. Many opponents of the law think these guidelines are so broad that they could enable political surveillance. But the key point of disagreement is what the government calls “black boxes.” The law allows the use of government equipment inside Internet Service Providers and large web companies to analyze streams of metadata and find “terrorist” patterns and behaviors.
  • ...1 more annotation...
  • The country’s intelligence community got everything it wanted — almost. An amendment that would remove any oversight of surveillance of foreigners, targeting chief executives and foreign spies, had been demanded by France’s top spy, Bernard Bajolet, the director general of external security, during a hearing at the National Assembly a few weeks ago, but the government opposed it and managed to get rid of it before the final vote. Yet, the government added a last minute amendment that tears to pieces the meager whistleblower protection the bill was supposed to set up. The end result is that most of what France’s intelligence services have been doing in the dark is now authorized by law.
8More

CIA photos of 'black sites' could complicate Guantanamo trials - The Washington Post - 0 views

  • Military prosecutors this year learned about a massive cache of CIA photographs of its former overseas “black sites” while reviewing material collected for the Senate investigation of the agency’s interrogation program, U.S. officials said. The existence of the approximately 14,000 photographs will probably cause yet another delay in the military commissions at Guantanamo Bay, Cuba, as attorneys for the defendants demand that all the images be turned over and the government wades through the material to decide what it thinks is relevant to the proceedings.
  • The death penalty cases against the five men first began in 2008 under the Bush administration and was abandoned by the Obama administration for a planned trial in federal court in New York. That effort collapsed, and the prosecution was returned to the military in 2011.
  • The electronic images depict external and internal shots of facilities where the CIA held ­al-Qaeda suspects after 9/11, but they do not show detainee interrogations, including the torture of some suspects who were subjected to waterboarding and other brutal techniques. They do include images of naked detainees during transport, according to the officials, who spoke on the condition of anonymity because the material remains classified. The pictures also show CIA personnel and members of foreign intelligence services, as well as psychologists Bruce Jessen and James Mitchell, among the architects of the interrogation program.
  • ...4 more annotations...
  • It’s unclear whether the military prosecutors have been able to review all the photographs and why they hadn’t unearthed them years earlier. Former U.S. officials said Martins’s team was supposed to have the same access as Senate investigators and federal prosecutors to shared electronic drives containing agency documents at a secret location in Virginia. “It raises the question whether the agency is being cooperative with the prosecutors,” said James Harrington, the civilian attorney for 9/11 defendant Ramzi Binalshibh. “It’s beyond preposterous.”
  • mong the images are those of cells and bathrooms at the detention sites, including a facility in Afghanistan known as “Salt Pit,” where the waterboard was photographed.
  • The bulk of the photographs depict black sites in Thailand, Afghanistan and Poland. There are fewer shots of prisons in Romania and Lithuania, which were among the last to be used before they were closed in 2006. A former intelligence official who reviewed some of the photographs of the prison in Thailand described them as nondescript.
  • “Why is it we are still learning about this stuff?” said Joe Margulies, Zubaydah’s attorney. “Who knows what is still out there? What else is there? That’s what is appalling.” James Connell, defense attorney for Ammar al-Baluchi, one of the 9/11 defendants, filed a motion in January 2013 to compel production of “documents and information” relating to where the “accused or a potential witness have been confined.” Connell said the military judge overseeing the case hasn’t ruled on that motion. “If pictures from black sites exist, they are crime scene photographs,” Connell said. “The military commission rules require the prosecution to turn them over to the defense, but federal and international prosecutors should also get a copy — not to mention the public.”
  •  
    So finally the locations of at least some of the CIA "black sites" are out in the open. 
4More

Data Shows Little Evidence for FBI's Concerns About Criminals 'Going Dark' | Motherboard - 0 views

  • In the last few months, several government officials, led by the FBI’s Director James Comey, have been complaining that the rise of encryption technologies would lead to a “very dark place” where cops and feds can’t fight and stop criminals. But new numbers released by the US government seem to contradict this doomsday scenario. In 2014, encryption thwarted four wiretaps out of 3,554, according to an annual report published on Wednesday by the US agency that oversees federal courts. The report reveals that state law enforcement agencies encountered encryption in 22 wiretaps last year. Out of those, cops were foiled on only two occasions. As for the feds, they encountered encryption in just three wiretaps, and could not decipher the intercepted communications in two of them.
  • In fact, cops found less encryption last year than in the year prior. In 2013, state authorities encountered encryption in 41 cases, versus 22 in 2014. At the federal level, there were three cases of encryption in 2014, against none in 2013. (The report also refers to five federal wiretaps conducted in “previous years” but only reported in 2014. Of those, the feds were able to crack the communications in four of the five.)
  • So far, the FBI has yet to put forth a valid example where encryption really thwarted an investigation. In fact, some of the examples cited by Comey have been debunked in media reports.
  • ...1 more annotation...
  • he Wiretap Report contains other interesting information that shed a light on government surveillance practices. Out of the more than 3,554 wiretaps authorized by judges, the vast majority of them (3,409 or 89 percent) were for drug related offenses. Homicide, in turn, was the reason behind only 4 percent of the the wiretaps. And virtually all of them (96%) were for “portable devices,” such as cellphones.Even if the Wiretap Report is just small a peek behind the scenes of government surveillance, it shows that for now, at least when it comes to wiretapping, the FBI’s isn’t really going dark.
3More

Whistleblowers File $100 Million Suit against NSA, FBI - WhoWhatWhy - 0 views

  • In a $100 million lawsuit that has garnered virtually no public attention, five National Security Agency (NSA) whistleblowers are accusing the federal government of illegally retaliating against them for alerting the NSA and Congress to a waste of taxpayer funds that benefitted a well-connected contractor.The lawsuit tells the story of the infancy of the NSA’s efforts to surveil the Internet. Back then, there were two programs for the spying agency to choose from — and the first was called ThinThread. It had been developed internally, was comparatively inexpensive, had been tested and proven to be effective, and included safeguards preventing the spying on Americans without a court warrant. The other was called Trailblazer. It did not include such safeguards, had not yet been shown to be effective, and cost 1,000 times more than ThinThread. Instead of being developed internally, it was to be outsourced to Science Applications International Corporation (SAIC), a politically connected contractor.The NSA chose Trailblazer.
  • In response, four NSA employees who had worked on ThinThread, as well as a congressional staffer, alerted Congress and the Office of the Inspector General of the NSA that the agency was wasting taxpayer funds. That is when their troubles began, according to the lawsuit.It alleges that the defendants, which include the NSA, FBI, and the Department of Justice, as well as individuals associated with them, “knowingly and intentionally fabricated” a claim that the plaintiffs leaked classified information to New York Times reporters Eric Lichtblau and James Risen.“[The defendants] used this fabricated claim for retaliation, illegal searches and seizures, physical invasion of their residences and places of business, temporary false imprisonment, the confiscation of their property, cancellation of security clearances leading to the loss of their jobs and employment, intentional infliction of emotional distress, harassment and intimidation,” the lawsuit alleges.It also states that the defendants should have known that the plaintiffs were not the leaks because the NSA “was tracking all domestic telephone calls for the supposed purpose of protecting national security.”
  • The plaintiffs are former NSA employees Thomas Drake, Ed Loomis, J. Kirk Wiebe, William Binney, and former congressional staffer Diane Roark. They seek “punitive damages in excess of $100 million because of Defendants [sic] callous and reckless indifference and malicious acts …” as well as well as an additional $15 million for lost wages and to cover costs.Larry Klayman, the prominent conservative public interest attorney and founder of Judicial Watch, filed the suit on August 20th. However, it is expected to be amended this week, and it is possible that additional publicity for the case will be sought then.
2More

The Un-Territoriality of Data by Jennifer C. Daskal :: SSRN - 0 views

  • Abstract:      Territoriality looms large in our jurisprudence, particularly as it relates to the government’s authority to search and seize. Fourth Amendment rights turn on whether the search or seizure takes place territorially or extraterritorially; the government’s surveillance authorities depend on whether the target is located within the United States or without; and courts’ warrant jurisdiction extends, with limited exceptions, only to the border’s edge. Yet the rise of electronic data challenges territoriality at its core. Territoriality, after all, depends on the ability to define the relevant “here” and “there,” and it presumes that the “here” and “there” have normative significance. The ease and speed with which data travels across borders, the seemingly arbitrary paths it takes, and the physical disconnect between where data is stored and where it is accessed, critically test these foundational premises. Why should either privacy rights or government access to sought-after evidence depend on where a document is stored at any given moment? Conversely, why should State A be permitted to unilaterally access data located in State B, simply because technology allows it to do so, without regard to State B’s rules governing law enforcement access to data held within its borders?This article tackles these challenges. It explores the unique features of data, and highlights the ways in which data undermines long-standing assumptions about the link between data location and the rights and obligations that ought to apply. Specifically, it argues that a territorial-based Fourth Amendment fails to adequately protect “the people” it is intended to cover. On the flip side, the article warns against the kind of unilateral, extraterritorial law enforcement that electronic data encourages — in which nations compel the production of data located anywhere around the globe, without regard to the sovereign interests of other nation-states.
  • Number of Pages in PDF File: 59 Keywords: data, Fourth Amendment, territoriality, sovereignty, surveillance
2More

Wiretap Numbers Don't Add Up | Just Security - 0 views

  • Last week, the Administrative Office (AO) of the US Courts published the 2014 Wiretap Report, an annual report to Congress concerning intercepted wire, oral, or electronic communications as required by Title III of the Omnibus Crime Control and Safe Streets Act of 1968. News headlines touted that the number of federal and state wiretaps for 2014 was down 1% for a total of 3,554. Of these, there were few involving encrypted communications; and for those, law enforcement agencies were in most cases able to overcome the encryption. But there is a bigger story that calls into question the accuracy of the all of the prior reports submitted to the AO and the overall data provided to Congress and the public in the Wiretap Reports. Since the Snowden revelations, more and more companies have started publishing “transparency reports” about the number and nature of government demands to access their users’ data. AT&T, Verizon, and Sprint published data for 2014 earlier this year and T-Mobile published its first transparency report on the same day the AO released the Wiretap Report. In aggregate, the four companies state that they implemented 10,712 wiretaps, a threefold difference over the total number reported by the AO. Note that the 10,712 number is only for the four companies listed above and does not reflect wiretap orders received by other telephone carriers or online providers, so the discrepancy actually is larger.
  • So what accounts for the huge gap in reporting? That is a question Congress and the AO should be asking prosecutors and judges who are required by law to make complete and accurate reports of the number of wiretaps conducted each year. Are wiretaps being consistently under­reported to Congress and the public? Based on the data reported by the four major carriers for 2013 and 2014, it certainly would appear to be the case.
3More

PayPal to Pay $25 Million to Settle CFPB Case - 0 views

  • By Editor Filed in News May 19th, 2015 @ 11:50 am The Consumer Financial Protection Bureau (CFPB) filed a complaint and proposed consent order in federal court against PayPal, Inc. for illegally signing up consumers for its online credit product, PayPal Credit, formerly known as Bill Me Later. The CFPB alleges that PayPal deceptively advertised promotional benefits that it failed to honor, signed consumers up for credit without their permission, made them use PayPal Credit instead of their preferred payment method, and then mishandled billing disputes.
  • Under the proposed order, PayPal would pay $15 million in consumer redress and a $10 million penalty, and it would be required to improve its disclosures and procedures. “PayPal illegally signed up consumers for its online credit product without their permission and failed to address disputes when they complained,” said CFPB Director Richard Cordray. “Online shopping has become a way of life for many Americans and it’s important that they are treated fairly. The CFPB’s action should send a signal that consumers are protected whether they are opening their wallets or clicking online to make a purchase.”
  • As with credit cards and other forms of credit, consumers using PayPal Credit may incur interest, late fees, and other charges. Consumers often enroll in PayPal Credit while purchasing a good or service online or while creating a PayPal account. Since 2008, PayPal has offered PayPal Credit to consumers across the country making purchases from thousands of online merchants, including eBay. The CFPB alleges that many consumers who were attempting to enroll in a regular PayPal account, or make an online purchase, were signed up for the credit product without realizing it. The company also failed to post payments properly, lost payment checks, and mishandled billing disputes that consumers had with merchants or the company. Tens of thousands of consumers experienced these issues.
3More

Covington & Burling Gets Eric Holder Back After 6-Year Stopover - 0 views

  • After failing to criminally prosecute any of the financial firms responsible for the market collapse in 2008, former Attorney General Eric Holder is returning to Covington & Burling, a corporate law firm known for serving Wall Street clients. The move completes one of the more troubling trips through the revolving door for a cabinet secretary. Holder worked at Covington from 2001 right up to being sworn in as attorney general in Feburary 2009. And Covington literally kept an office empty for him, awaiting his return. The Covington & Burling client list has included four of the largest banks, including Bank of America, Citigroup, JPMorgan Chase and Wells Fargo. Lobbying records show that Wells Fargo is still a client of Covington. Covington recently represented Citigroup over a civil lawsuit relating to the bank’s role in Libor manipulation.
  • Covington was also deeply involved with a company known as MERS, which was later responsible for falsifying mortgage documents on an industrial scale. “Court records show that Covington, in the late 1990s, provided legal opinion letters needed to create MERS on behalf of Fannie Mae, Freddie Mac, Bank of America, JPMorgan Chase and several other large banks,” according to an investigation by Reuters. The Department of Justice under Holder not only failed to pursue criminal prosecutions of the banks responsible for the mortage meltdown, but in fact de-prioritized investigations of mortgage fraud, making it the “lowest-ranked criminal threat,” according to an inspector general report. For insiders, the Holder decision to return to Covington was never a mystery. Timothy Hester, the chairman of Covington, told the National Law Journal that Holder’s return to the firm had been “a project” of his ever since Holder left to the join the administration in 2009. When the firm moved to a new building last year, it kept an 11th-story corner office reserved for Holder.
  • Holder’s critics charge that he made a career out of institutionalizing “Too Big to Prosecute” rules within the department. In 1999, as a deputy attorney general, Holder authored a memo arguing that officials should consider the “collateral consequences” when prosecuting corporate crimes. In 2012, Holder’s enforcement chief, Lanny Breuer, admitted during a speech to the New York City Bar Association that the department may go easy on certain corporate criminals if they believe prosecutions may disrupt financial markets or cause layoffs. “In some cases, the health of an industry or the markets are a real factor,” Breuer said. Rather than face accountability for their failures, the incentive structure of modern Washington is designed to reward both men. Breuer left the department in 2013 to rejoin Covington. Holder is set to become among the highest-earning partners at the firm, with compensation in the seven or eight figures.
2More

Israel to engage with ICC over 'war crimes' probe | The Times of Israel - 0 views

  • he Israeli government has reversed its position and will respond to the International Criminal Court’s investigation of Palestinian allegations of Israeli war crimes, the daily Haaretz newspaper reported Thursday
  • The decision marks an about-face for Prime Minister Benjamin Netanyahu, who has previously refused to engage with the investigators. Israeli officials maintained, however, that their communications with the ICC probe will only be to reaffirm the government’s stance that the Palestinian Authority, as a non-state actor, does not have the right to open a case against Israel, the report said. “The Israeli position, like the position of other countries around the world, is that the International Criminal Court in The Hague has no authority to hear the Palestinian request since Palestine is not a country and because the Israeli judicial system is independent and can handle complaints on the matter of alleged war crimes,” an unnamed Israeli official told the newspaper. The decision to work with the ICC was apparently made by Netanyahu over the past few months, in collaboration with representatives of the justice and foreign ministries, the Israel Defense Forces and the National Security Council. Representatives from those same groups will reportedly travel to The Hague to meet with its chief prosecutor, Fatou Bensouda of The Gambia.
3More

Veterans Used In Secret Experiments Sue Military For Answers : NPR - 0 views

  • American service members used in chemical and biological testing have some questions: What exactly were they exposed to? And how is it affecting their health? Tens of thousands of troops were used in testing conducted by the U.S. military between 1922 and 1975. As one Army scientist explained, the military wanted to learn how to induce symptoms such as "fear, panic, hysteria, and hallucinations" in enemy soldiers. Recruitment was done on a volunteer basis, but the details of the testing and associated risks were often withheld from those who signed up. Many of the veterans who served as test subjects have since died. But today, those who are still alive are part of a class action lawsuit against the Army. If they're successful, the Army will have to explain to anyone who was used in testing exactly what substances they were given and any known risks. The Army would also have to provide those veterans with health care for any illnesses that result, in whole or in part, from the testing.
  • The law firm representing the veterans estimates at least 70,000 troops were used in the testing, including World War II veterans exposed to mustard gas, whom NPR reported on earlier this summer.
  • The Department of Justice is representing the Army in the case and declined to comment for this story. In June, an appeals court ruled in favor of the veterans. On Friday, the Army filed for a rehearing.
4More

Judge scolds feds for slow-walking Clinton aide's emails | TheHill - 0 views

  • A federal judge on Tuesday scolded Obama administration lawyers for dragging their feet in handing over documents from top aides to Hillary Clinton.Judge Emmet Sullivan of the U.S. District Court for The District of Columbia suggested that the State Department needs to divert resources to deal with the onslaught of lawsuits seeking to get a hold of emails from Clinton, Huma Abedin and Cheryl Mills.“There has to be some reallocation of resources. There has to be,” he told a pair of government lawyers. “Because these are atypical cases.”ADVERTISEMENTThe State Department, he added, is treating the demands as if “it’s business as usual.”“This case is important to the public,” Sullivan added. “The public is clamoring for the information. Everybody is clamoring for the information.“You have to find the resources.”
  • The case is one of dozens of lawsuits against the department that seek information that involves Clinton’s emails.In the case, launched by conservative advocacy group Citizens United, government lawyers had attempted to delay the deadline for them to hand over documents until at least December.Though even that was merely a “hope date,” Department of Justice Lawyer Caroline Anderson said.The government wouldn’t be able to send out the documents until it had a chance to fully upload them into its digital system, search for the requested terms and then do a line-by-line search to see whether the emails were relevant or needed to be classified for one reason or the other.But the case has lingered for months, and lawyers representing Citizens United accused the government of doing little to speed up the process.“The government knew in the summer of this year that they had a problem, but they waited,” Matthew McGill told the judge.
  • Citizens United's case asked for correspondence between Clinton's former chief of staff Mills, longtime aide Abedin and officials from the Clinton Foundation as well as correspondence about Abedin's part-time work for a consulting firm while also working in the State Department.There are more than 30 lawsuits pending against the State Department seeking to enforce Freedom of Information Act (FOIA) requests for some combination of the tens of thousands of emails from Clinton and other top aides during their time at the State Department.The email requests have been complicated by the revelation earlier this year that Clinton relied exclusively on a personal email address housed on a private server during her tenure as secretary of State. Abedin, Mills and other top aides also used personal email accounts during their time assisting Clinton.In response, the emails have grown to consume a larger and larger portion of work for the 63 full-time employees and one part-timer that the State Department employs to respond to FOIA requests. The department has also brought on the part-time help of 40 Foreign Service officers to assist in the search.
  • ...1 more annotation...
  • Sullivan ordered the department to finish uploading Abedin's and Mills’s emails and conduct an initial search on them by next Friday. 
20More

From Radio to Porn, British Spies Track Web Users' Online Identities - 0 views

  • HERE WAS A SIMPLE AIM at the heart of the top-secret program: Record the website browsing habits of “every visible user on the Internet.” Before long, billions of digital records about ordinary people’s online activities were being stored every day. Among them were details cataloging visits to porn, social media and news websites, search engines, chat forums, and blogs. The mass surveillance operation — code-named KARMA POLICE — was launched by British spies about seven years ago without any public debate or scrutiny. It was just one part of a giant global Internet spying apparatus built by the United Kingdom’s electronic eavesdropping agency, Government Communications Headquarters, or GCHQ. The revelations about the scope of the British agency’s surveillance are contained in documents obtained by The Intercept from National Security Agency whistleblower Edward Snowden. Previous reports based on the leaked files have exposed how GCHQ taps into Internet cables to monitor communications on a vast scale, but many details about what happens to the data after it has been vacuumed up have remained unclear.
  • Amid a renewed push from the U.K. government for more surveillance powers, more than two dozen documents being disclosed today by The Intercept reveal for the first time several major strands of GCHQ’s existing electronic eavesdropping capabilities.
  • The surveillance is underpinned by an opaque legal regime that has authorized GCHQ to sift through huge archives of metadata about the private phone calls, emails and Internet browsing logs of Brits, Americans, and any other citizens — all without a court order or judicial warrant
  • ...17 more annotations...
  • A huge volume of the Internet data GCHQ collects flows directly into a massive repository named Black Hole, which is at the core of the agency’s online spying operations, storing raw logs of intercepted material before it has been subject to analysis. Black Hole contains data collected by GCHQ as part of bulk “unselected” surveillance, meaning it is not focused on particular “selected” targets and instead includes troves of data indiscriminately swept up about ordinary people’s online activities. Between August 2007 and March 2009, GCHQ documents say that Black Hole was used to store more than 1.1 trillion “events” — a term the agency uses to refer to metadata records — with about 10 billion new entries added every day. As of March 2009, the largest slice of data Black Hole held — 41 percent — was about people’s Internet browsing histories. The rest included a combination of email and instant messenger records, details about search engine queries, information about social media activity, logs related to hacking operations, and data on people’s use of tools to browse the Internet anonymously.
  • Throughout this period, as smartphone sales started to boom, the frequency of people’s Internet use was steadily increasing. In tandem, British spies were working frantically to bolster their spying capabilities, with plans afoot to expand the size of Black Hole and other repositories to handle an avalanche of new data. By 2010, according to the documents, GCHQ was logging 30 billion metadata records per day. By 2012, collection had increased to 50 billion per day, and work was underway to double capacity to 100 billion. The agency was developing “unprecedented” techniques to perform what it called “population-scale” data mining, monitoring all communications across entire countries in an effort to detect patterns or behaviors deemed suspicious. It was creating what it said would be, by 2013, “the world’s biggest” surveillance engine “to run cyber operations and to access better, more valued data for customers to make a real world difference.”
  • A document from the GCHQ target analysis center (GTAC) shows the Black Hole repository’s structure.
  • The data is searched by GCHQ analysts in a hunt for behavior online that could be connected to terrorism or other criminal activity. But it has also served a broader and more controversial purpose — helping the agency hack into European companies’ computer networks. In the lead up to its secret mission targeting Netherlands-based Gemalto, the largest SIM card manufacturer in the world, GCHQ used MUTANT BROTH in an effort to identify the company’s employees so it could hack into their computers. The system helped the agency analyze intercepted Facebook cookies it believed were associated with Gemalto staff located at offices in France and Poland. GCHQ later successfully infiltrated Gemalto’s internal networks, stealing encryption keys produced by the company that protect the privacy of cell phone communications.
  • Similarly, MUTANT BROTH proved integral to GCHQ’s hack of Belgian telecommunications provider Belgacom. The agency entered IP addresses associated with Belgacom into MUTANT BROTH to uncover information about the company’s employees. Cookies associated with the IPs revealed the Google, Yahoo, and LinkedIn accounts of three Belgacom engineers, whose computers were then targeted by the agency and infected with malware. The hacking operation resulted in GCHQ gaining deep access into the most sensitive parts of Belgacom’s internal systems, granting British spies the ability to intercept communications passing through the company’s networks.
  • In March, a U.K. parliamentary committee published the findings of an 18-month review of GCHQ’s operations and called for an overhaul of the laws that regulate the spying. The committee raised concerns about the agency gathering what it described as “bulk personal datasets” being held about “a wide range of people.” However, it censored the section of the report describing what these “datasets” contained, despite acknowledging that they “may be highly intrusive.” The Snowden documents shine light on some of the core GCHQ bulk data-gathering programs that the committee was likely referring to — pulling back the veil of secrecy that has shielded some of the agency’s most controversial surveillance operations from public scrutiny. KARMA POLICE and MUTANT BROTH are among the key bulk collection systems. But they do not operate in isolation — and the scope of GCHQ’s spying extends far beyond them.
  • The agency operates a bewildering array of other eavesdropping systems, each serving its own specific purpose and designated a unique code name, such as: SOCIAL ANTHROPOID, which is used to analyze metadata on emails, instant messenger chats, social media connections and conversations, plus “telephony” metadata about phone calls, cell phone locations, text and multimedia messages; MEMORY HOLE, which logs queries entered into search engines and associates each search with an IP address; MARBLED GECKO, which sifts through details about searches people have entered into Google Maps and Google Earth; and INFINITE MONKEYS, which analyzes data about the usage of online bulletin boards and forums. GCHQ has other programs that it uses to analyze the content of intercepted communications, such as the full written body of emails and the audio of phone calls. One of the most important content collection capabilities is TEMPORA, which mines vast amounts of emails, instant messages, voice calls and other communications and makes them accessible through a Google-style search tool named XKEYSCORE.
  • As of September 2012, TEMPORA was collecting “more than 40 billion pieces of content a day” and it was being used to spy on people across Europe, the Middle East, and North Africa, according to a top-secret memo outlining the scope of the program. The existence of TEMPORA was first revealed by The Guardian in June 2013. To analyze all of the communications it intercepts and to build a profile of the individuals it is monitoring, GCHQ uses a variety of different tools that can pull together all of the relevant information and make it accessible through a single interface. SAMUEL PEPYS is one such tool, built by the British spies to analyze both the content and metadata of emails, browsing sessions, and instant messages as they are being intercepted in real time. One screenshot of SAMUEL PEPYS in action shows the agency using it to monitor an individual in Sweden who visited a page about GCHQ on the U.S.-based anti-secrecy website Cryptome.
  • Partly due to the U.K.’s geographic location — situated between the United States and the western edge of continental Europe — a large amount of the world’s Internet traffic passes through its territory across international data cables. In 2010, GCHQ noted that what amounted to “25 percent of all Internet traffic” was transiting the U.K. through some 1,600 different cables. The agency said that it could “survey the majority of the 1,600” and “select the most valuable to switch into our processing systems.”
  • According to Joss Wright, a research fellow at the University of Oxford’s Internet Institute, tapping into the cables allows GCHQ to monitor a large portion of foreign communications. But the cables also transport masses of wholly domestic British emails and online chats, because when anyone in the U.K. sends an email or visits a website, their computer will routinely send and receive data from servers that are located overseas. “I could send a message from my computer here [in England] to my wife’s computer in the next room and on its way it could go through the U.S., France, and other countries,” Wright says. “That’s just the way the Internet is designed.” In other words, Wright adds, that means “a lot” of British data and communications transit across international cables daily, and are liable to be swept into GCHQ’s databases.
  • A map from a classified GCHQ presentation about intercepting communications from undersea cables. GCHQ is authorized to conduct dragnet surveillance of the international data cables through so-called external warrants that are signed off by a government minister. The external warrants permit the agency to monitor communications in foreign countries as well as British citizens’ international calls and emails — for example, a call from Islamabad to London. They prohibit GCHQ from reading or listening to the content of “internal” U.K. to U.K. emails and phone calls, which are supposed to be filtered out from GCHQ’s systems if they are inadvertently intercepted unless additional authorization is granted to scrutinize them. However, the same rules do not apply to metadata. A little-known loophole in the law allows GCHQ to use external warrants to collect and analyze bulk metadata about the emails, phone calls, and Internet browsing activities of British people, citizens of closely allied countries, and others, regardless of whether the data is derived from domestic U.K. to U.K. communications and browsing sessions or otherwise. In March, the existence of this loophole was quietly acknowledged by the U.K. parliamentary committee’s surveillance review, which stated in a section of its report that “special protection and additional safeguards” did not apply to metadata swept up using external warrants and that domestic British metadata could therefore be lawfully “returned as a result of searches” conducted by GCHQ.
  • Perhaps unsurprisingly, GCHQ appears to have readily exploited this obscure legal technicality. Secret policy guidance papers issued to the agency’s analysts instruct them that they can sift through huge troves of indiscriminately collected metadata records to spy on anyone regardless of their nationality. The guidance makes clear that there is no exemption or extra privacy protection for British people or citizens from countries that are members of the Five Eyes, a surveillance alliance that the U.K. is part of alongside the U.S., Canada, Australia, and New Zealand. “If you are searching a purely Events only database such as MUTANT BROTH, the issue of location does not occur,” states one internal GCHQ policy document, which is marked with a “last modified” date of July 2012. The document adds that analysts are free to search the databases for British metadata “without further authorization” by inputing a U.K. “selector,” meaning a unique identifier such as a person’s email or IP address, username, or phone number. Authorization is “not needed for individuals in the U.K.,” another GCHQ document explains, because metadata has been judged “less intrusive than communications content.” All the spies are required to do to mine the metadata troves is write a short “justification” or “reason” for each search they conduct and then click a button on their computer screen.
  • Intelligence GCHQ collects on British persons of interest is shared with domestic security agency MI5, which usually takes the lead on spying operations within the U.K. MI5 conducts its own extensive domestic surveillance as part of a program called DIGINT (digital intelligence).
  • GCHQ’s documents suggest that it typically retains metadata for periods of between 30 days to six months. It stores the content of communications for a shorter period of time, varying between three to 30 days. The retention periods can be extended if deemed necessary for “cyber defense.” One secret policy paper dated from January 2010 lists the wide range of information the agency classes as metadata — including location data that could be used to track your movements, your email, instant messenger, and social networking “buddy lists,” logs showing who you have communicated with by phone or email, the passwords you use to access “communications services” (such as an email account), and information about websites you have viewed.
  • Records showing the full website addresses you have visited — for instance, www.gchq.gov.uk/what_we_do — are treated as content. But the first part of an address you have visited — for instance, www.gchq.gov.uk — is treated as metadata. In isolation, a single metadata record of a phone call, email, or website visit may not reveal much about a person’s private life, according to Ethan Zuckerman, director of Massachusetts Institute of Technology’s Center for Civic Media. But if accumulated and analyzed over a period of weeks or months, these details would be “extremely personal,” he told The Intercept, because they could reveal a person’s movements, habits, religious beliefs, political views, relationships, and even sexual preferences. For Zuckerman, who has studied the social and political ramifications of surveillance, the most concerning aspect of large-scale government data collection is that it can be “corrosive towards democracy” — leading to a chilling effect on freedom of expression and communication. “Once we know there’s a reasonable chance that we are being watched in one fashion or another it’s hard for that not to have a ‘panopticon effect,’” he said, “where we think and behave differently based on the assumption that people may be watching and paying attention to what we are doing.”
  • When compared to surveillance rules in place in the U.S., GCHQ notes in one document that the U.K. has “a light oversight regime.” The more lax British spying regulations are reflected in secret internal rules that highlight greater restrictions on how NSA databases can be accessed. The NSA’s troves can be searched for data on British citizens, one document states, but they cannot be mined for information about Americans or other citizens from countries in the Five Eyes alliance. No such constraints are placed on GCHQ’s own databases, which can be sifted for records on the phone calls, emails, and Internet usage of Brits, Americans, and citizens from any other country. The scope of GCHQ’s surveillance powers explain in part why Snowden told The Guardian in June 2013 that U.K. surveillance is “worse than the U.S.” In an interview with Der Spiegel in July 2013, Snowden added that British Internet cables were “radioactive” and joked: “Even the Queen’s selfies to the pool boy get logged.”
  • In recent years, the biggest barrier to GCHQ’s mass collection of data does not appear to have come in the form of legal or policy restrictions. Rather, it is the increased use of encryption technology that protects the privacy of communications that has posed the biggest potential hindrance to the agency’s activities. “The spread of encryption … threatens our ability to do effective target discovery/development,” says a top-secret report co-authored by an official from the British agency and an NSA employee in 2011. “Pertinent metadata events will be locked within the encrypted channels and difficult, if not impossible, to prise out,” the report says, adding that the agencies were working on a plan that would “(hopefully) allow our Internet Exploitation strategy to prevail.”
6More

Judicial Watch: Benghazi Documents Point to White House on Misleading Talking Points - ... - 0 views

  • Judicial Watch announced today that on April 18, 2014, it obtained 41 new Benghazi-related State Department documents. They include a newly declassified email showing then-White House Deputy Strategic Communications Adviser Ben Rhodes and other Obama administration public relations officials attempting to orchestrate a campaign to “reinforce” President Obama and to portray the Benghazi consulate terrorist attack as being “rooted in an Internet video, and not a failure of policy.”  Other documents show that State Department officials initially described the incident as an “attack” and a possible kidnap attempt. The documents were released Friday as result of a June 21, 2013, Freedom of Information Act (FOIA) lawsuit filed against the Department of State (Judicial Watch v. U.S. Department of State (No. 1:13-cv-00951)) to gain access to documents about the controversial talking points used by then-UN Ambassador Susan Rice for a series of appearances on television Sunday news programs on September 16, 2012.  Judicial Watch had been seeking these documents since October 18, 2012. The Rhodes email was sent on sent on Friday, September 14, 2012, at 8:09 p.m. with the subject line:  “RE: PREP CALL with Susan, Saturday at 4:00 pm ET.”  The documents show that the “prep” was for Amb. Rice’s Sunday news show appearances to discuss the Benghazi attack.
  • The document lists as a “Goal”: “To underscore that these protests are rooted in and Internet video, and not a broader failure or policy.” Rhodes returns to the “Internet video” scenario later in the email, the first point in a section labeled “Top-lines”: [W]e’ve made our views on this video crystal clear. The United States government had nothing to do with it. We reject its message and its contents. We find it disgusting and reprehensible. But there is absolutely no justification at all for responding to this movie with violence. And we are working to make sure that people around the globe hear that message. Among the top administration PR personnel who received the Rhodes memo were White House Press Secretary Jay Carney, Deputy Press Secretary Joshua Earnest, then-White House Communications Director Dan Pfeiffer, then-White House Deputy Communications Director Jennifer Palmieri, then-National Security Council Director of Communications Erin Pelton, Special Assistant to the Press Secretary Howli Ledbetter, and then-White House Senior Advisor and political strategist David Plouffe. The Rhodes communications strategy email also instructs recipients to portray Obama as “steady and statesmanlike” throughout the crisis. Another of the “Goals” of the PR offensive, Rhodes says, is “[T]o reinforce the President and Administration’s strength and steadiness in dealing with difficult challenges.” He later includes as a PR “Top-line” talking point: I think that people have come to trust that President Obama provides leadership that is steady and statesmanlike. There are always going to be challenges that emerge around the world, and time and again, he has shown that we can meet them.
  • The documents Judicial Watch obtained also include a September 12, 2012, email from former Deputy Spokesman at U.S. Mission to the United Nations Payton Knopf to Susan Rice, noting that at a press briefing earlier that day, State Department spokesperson Victoria Nuland explicitly stated that the attack on the consulate had been well planned.  The email sent by Knopf to Rice at 5:42 pm said: Responding to a question about whether it was an organized terror attack, Toria said that she couldn’t speak to the identity of the perpetrators but that it was clearly a complex attack. In the days following the Knopf email, Rice appeared on ABC, CBS, NBC, Fox News and CNN still claiming the assaults occurred “spontaneously” in response to the “hateful video.” On Sunday, September 16 Rice told CBS’s “Face the Nation:” But based on the best information we have to date, what our assessment is as of the present is in fact what began spontaneously in Benghazi as a reaction to what had transpired some hours earlier in Cairo where, of course, as you know, there was a violent protest outside of our embassy–sparked by this hateful video. The Judicial Watch documents confirm that CIA talking points, that were prepared for Congress and may have been used by Rice on “Face the Nation” and four additional Sunday talk shows on September 16, had been heavily edited by then-CIA deputy director Mike Morell. According to one email: The first draft apparently seemed unsuitable….because they seemed to encourage the reader to infer incorrectly that the CIA had warned about a specific attack on our embassy.  On the SVTS, Morell noted that these points were not good and he had taken a heavy hand to editing them. He noted that he would be happy to work with [then deputy chief of staff to Hillary Clinton]] Jake Sullivan and Rhodes to develop appropriate talking points.
  • ...2 more annotations...
  • The documents obtained by Judicial Watch also contain numerous emails sent during the assault on the Benghazi diplomatic facility.  The contemporaneous and dramatic emails describe the assault as an “attack”:
  • “Now we know the Obama White House’s chief concern about the Benghazi attack was making sure that President Obama looked good,” said Judicial Watch President Tom Fitton. “And these documents undermine the Obama administration’s narrative that it thought the Benghazi attack had something to do with protests or an Internet video.  Given the explosive material in these documents, it is no surprise that we had to go to federal court to pry them loose from the Obama State Department.”
  •  
    Has there ever been a White House caught in so many lies as the Obama Administration? Maybe, in Nixon's Watergate years. But IMHO it would take a detailed study to determine the winner. It's close. 
9More

The 6 Grand Illusions That Keep Us Enslaved to the Matrix - 0 views

  • Bansky, the revered and elusive revolutionary street artist, once commented: “People are taking the piss out of you everyday. They butt into your life, take a cheap shot at you and then disappear. They leer at you from tall buildings and make you feel small. They make flippant comments from buses that imply you’re not sexy enough and that all the fun is happening somewhere else. They are on TV making your girlfriend feel inadequate. They have access to the most sophisticated technology the world has ever seen and they bully you with it. They are The Advertisers and they are laughing at you.” – Banksy  Advertising is just the tip of the iceberg. When we look further we see that the overall organization of life is centered around the pursuit of illusions and automatic obedience to institutions and ideas which are not at all what they seem. We are in a very real sense enslaved. Many call this somewhat intangible feeling of oppression ‘the matrix,’ a system of total control that invades the mind, programming individuals to pattern themselves in accordance with a mainstream conformist version of reality, no matter how wicked it gets. The grandest of the illusions which keep us enslaved to the matrix, the ones that have so many of us still entranced, are outlined below for your consideration.
  • 1. The Illusion of Law, Order and Authority For so many of us, following the law is considered a moral obligation, and many of us gladly do so even though corruption, scandal, and wickedness repeatedly demonstrate that the law is plenty flexible for those who have the muscle to bend it. Police brutality and police criminality is rampant in the US, the courts favor the wealthy, and we can longer even lead our lives privately thanks to the intrusion of state surveillance. And all the while the illegal and immoral Orwellian permanent war rages on in the background of life, murdering and destroying whole nations and cultures. The social order is not what it seems, for it is entirely predicated on conformity, obedience and acquiescence which are enforced by fear of violence. History teaches us again and again that the law is just as often as not used as an instrument of oppression, social control and plunder, and any so-called authority in this regard is false, hypocritical, and unjust. When the law itself does not follow the law, there is no law, there is no order, and there is no justice. The pomp and trappings of authority are merely a concealment of the truth that the current world order is predicated on control, not consent.
  • 2. The Illusion of Prosperity and Happiness Adorning oneself in expensive clothes and trinkets, and amassing collections of material possessions that would be the envy of any 19th century monarch has become a substitute for genuine prosperity. Maintaining the illusion of prosperity, though, is critical to our economy as it is, because its foundation is built on consumption, fraud, credit and debt. The banking system itself has been engineered from the top down to create unlimited wealth for some while taxing the eternity out of the rest of us. True prosperity is a vibrant environment and an abundance of health, happiness, love, and relationships. As more people come to perceive material goods as the form of self-identification in this culture, we slip farther and farther away from the experience of true prosperity.
  • ...5 more annotations...
  • 3. The Illusion of Choice and Freedom Read between the lines and look at the fine print, we are not free, not by any intelligent standard. Freedom is about having choice, yet in today’s world, choice has come to mean a selection between available options, always from within the confines of a corrupt legal and taxation system and within the boundaries of culturally accepted and enforced norms. Just look no further than the phony institution of modern democracy to find a shining example of false choices appearing real. Two entrenched, corrupt, archaic political parties are paraded as the pride and hope of the nation, yet third party and independent voices are intentionally blocked, ridiculed and plowed under. The illusion of choice and freedom is a powerful oppressor because it fools us into accepting chains and short leashes as though they were the hallmarks of liberty. Multiple choice is different than freedom, it is easy servitude.
  • 4. The Illusion of Truth Truth has become a touchy subject in our culture, and we’ve been programmed to believe that ‘the‘ truth comes from the demigods of media, celebrity, and government. If the TV declares something to be true, then we are heretics to believe otherwise. In order to maintain order, the powers that be depend our acquiescence to their version of the truth. While independent thinkers and journalists continually blow holes in the official versions of reality, the illusion of truth is so very powerful that it takes a serious personal upheaval to shun the cognitive dissonance needed to function in a society that openly chases false realities.
  • 5. The Illusion of Time They say that time is money, but this is a lie. Time is your life. Your life is an ever-evolving manifestation of the now. Looking beyond the five sense world, where we have been trained to move in accordance with the clock and the calendar, we find that the spirit is eternal, and that the each individual soul is part of this eternity. The big deception here is the reinforcement of the idea that the present moment is of little to no value, that the past is something we cannot undo or ever forget, and that the future is intrinsically more important than both the past and the present. This carries our attention away from what is actually happening right now and directs it toward the future. Once completely focused on what is to come rather than what is, we are easy prey to advertisers and fear-pimps who muddy our vision of the future with every possible worry and concern imaginable. We are happiest when life doesn’t box us in, when spontaneity and randomness gives us the chance to find out more about ourselves. Forfeiting the present moment in order to fantasize about the future is a trap. The immense, timeless moments of spiritual joy that are found in quiet meditation are proof that time is a construct of the mind of humankind, and not necessarily mandatory for the human experience. If time is money, then life can be measured in dollars. When dollars are worth less, so is life. This is total deception, because life is, in truth, absolutely priceless.
  • 6. The Illusion of Separateness On a strategic level, the tactic of divide and conquer is standard operating procedure for authoritarians and invading armies, but the illusion of separateness runs even deeper than this. We are programmed to believe that as individuals we are in competition with everyone and everything around us, including our neighbors and even mother nature. Us vs. them to the extreme. This flatly denies the truth that life on this planet is infinitely inter-connected. Without clean air, clean water, healthy soil, and a vibrant global sense of community we cannot survive here. While the illusion of separateness comforts us by gratifying the ego and and offering a sense of control, in reality it only serves to enslave and isolate us.
  • Conclusion The grand illusions mentioned here have been staged before us as a campaign to encourage blind acquiescence to the machinations of the matrix. In an attempt to dis-empower us, they demand our conformity and obedience, but we must not forget that all of this is merely an elaborate sales pitch. They can’t sell what we don’t care to buy.
  •  
    "SOURCE: SIGMUND FRAUD, WAKING TIMES "In prison, illusions can offer comfort." - Nelson Mandela For a magician to fool his audience his deceit must go unseen, and to this end he crafts an illusion to avert attention from reality. While the audience is entranced, the deceptive act is committed, and for the fool, reality then becomes inexplicably built upon on a lie. That is, until the fool wakes up and recognizes the truth in the fact that he has been duped. Maintaining the suspension of disbelief in the illusion, however, is often more comforting than acknowledging the magician's secrets. We live in a world of illusion. So many of the concerns that occupy the mind and the tasks that fill the calendar arise from planted impulses to become someone or something that we are not. This is no accident. As we are indoctrinated into this authoritarian-corporate-consumer culture that now dominates the human race, we are trained that certain aspects of our society are untouchable truths, and that particular ways of being and behaving are preferred.  Psychopaths disempower people in this way. They blind us with never ceasing barrages of suggestions and absolutes that are aimed at shattering self-confidence and confidence in the future.  "
2More

Major Second Circuit Ruling Sides With Immigrants Subjected to Post-9/11 Roundup | Just... - 0 views

  • I’ve written at some length in the past about judicial hostility to damages suits brought by victims of allegedly unlawful post-9/11 counterterrorism policies. I may have to rethink some of that analysis in light of this morning’s landmark ruling by the Second Circuit in Turkmen v. Hasty, the class action arising out of the post-September 11 roundup and detention of certain groups of immigrants in and around New York. In a nutshell (given that the majority opinion runs to 109 pages), Judges Rosemary Pooler and Ronald Wesley (Clinton and George W. Bush appointees, respectively) hold that (1) Bivens provides a cause of action for damages for the plaintiffs’ Fourth Amendment strip-search, Fifth Amendment substantive due process, and Fifth Amendment equal protection claims (albeit not their free exercise claim); (2) the facts alleged in the complaint are sufficient to overcome Iqbal; and (3) five former federal officials, including Attorney General John Ashcroft, FBI Director Robert Mueller, INS Commissioner James Ziglar, MDC Warden Dennis Hasty, and Associate Warden James Sherman, are not entitled to qualified immunity on the plaintiffs’ policy-challenging allegations of punitive and discriminatory confinement and unreasonable strip searches.
  • As Judge Raggi describes in her 91-page dissent, the majority nevertheless narrows the class of plaintiffs to only (1) those non-citizens confined in the MDC’s most restrictive housing unit; and (2) for restrictive confinement after the defendants allegedly learned that the plaintiffs were being detained without individualized suspicion of their connection to terrorism. But it’s still by far the most plaintiff-friendly circuit ruling in a post-9/11 damages suit. In her words, “Today, our court becomes the first to hold that a Bivens action can be maintained against the nation’s two highest ranking law enforcement officials . . . for policies propounded to safeguard the nation in the immediate aftermath of the infamous al Qaeda terrorist attacks of September 11, 2001.” There’s surely a lot more to say about the 200 pages of opinions in this case–and the analyses of Bivens and qualified immunity, in particular. For that reason, among others, I suspect this is not the last we’ll hear of it…
9More

The Latest US and World News - USATODAY.com - 0 views

  • The U.S. government started keeping secret records of Americans' international telephone calls nearly a decade before the Sept. 11 terrorist attacks, harvesting billions of calls in a program that provided a blueprint for the far broader National Security Agency surveillance that followed.For more than two decades, the Justice Department and the Drug Enforcement Administration amassed logs of virtually all telephone calls from the USA to as many as 116 countries linked to drug trafficking, current and former officials involved with the operation said. The targeted countries changed over time but included Canada, Mexico and most of Central and South America.Federal investigators used the call records to track drug cartels' distribution networks in the USA, allowing agents to detect previously unknown trafficking rings and money handlers. They also used the records to help rule out foreign ties to the bombing in 1995 of a federal building in Oklahoma City and to identify U.S. suspects in a wide range of other investigations.The Justice Department revealed in January that the DEA had collected data about calls to "designated foreign countries." But the history and vast scale of that operation have not been disclosed until now.
  • The now-discontinued operation, carried out by the DEA's intelligence arm, was the government's first known effort to gather data on Americans in bulk, sweeping up records of telephone calls made by millions of U.S. citizens regardless of whether they were suspected of a crime. It was a model for the massive phone surveillance system the NSA launched to identify terrorists after the Sept. 11 attacks. That dragnet drew sharp criticism that the government had intruded too deeply into Americans' privacy after former NSA contractor Edward Snowden leaked it to the news media two years ago.More than a dozen current and former law enforcement and intelligence officials described the details of the Justice Department operation to USA TODAY. Most did so on the condition of anonymity because they were not authorized to publicly discuss the intelligence program, part of which remains classified.The DEA program did not intercept the content of Americans' calls, but the records — which numbers were dialed and when — allowed agents to map suspects' communications and link them to troves of other police and intelligence data. At first, the drug agency did so with help from military computers and intelligence analysts
  • The extent of that surveillance alarmed privacy advocates, who questioned its legality. "This was aimed squarely at Americans," said Mark Rumold, an attorney with the Electronic Frontier Foundation. "That's very significant from a constitutional perspective."Holder halted the data collection in September 2013 amid the fallout from Snowden's revelations about other surveillance programs. In its place, current and former officials said the drug agency sends telecom companies daily subpoenas for international calling records involving only phone numbers that agents suspect are linked to the drug trade or other crimes — sometimes a thousand or more numbers a day.Tuesday, Justice Department spokesman Patrick Rodenbush said the DEA "is no longer collecting bulk telephony metadata from U.S. service providers." A DEA spokesman declined to comment.
  • ...6 more annotations...
  • The system they built ultimately allowed the drug agency to stitch together huge collections of data to map trafficking and money laundering networks both overseas and within the USA. It allowed agents to link the call records its agents gathered domestically with calling data the DEA and intelligence agencies had acquired outside the USA. (In some cases, officials said the DEA paid employees of foreign telecom firms for copies of call logs and subscriber lists.) And it eventually allowed agents to cross-reference all of that against investigative reports from the DEA, FBI and Customs Service.
  • The result "produced major international investigations that allowed us to take some big people," Constantine said, though he said he could not identify particular cases.
  • In 1992, in the last months of Bush's administration, Attorney General William Barr and his chief criminal prosecutor, Robert Mueller, gave the DEA permission to collect a much larger set of phone data to feed into that intelligence operation.Instead of simply asking phone companies for records about calls made by people suspected of drug crimes, the Justice Department began ordering telephone companies to turn over lists of all phone calls from the USA to countries where the government determined drug traffickers operated, current and former officials said
  • The DEA obtained those records using administrative subpoenas that allow the agency to collect records "relevant or material to" federal drug investigations. Officials acknowledged it was an expansive interpretation of that authority but one that was not likely to be challenged because unlike search warrants, DEA subpoenas do not require a judge's approval. "We knew we were stretching the definition," a former official involved in the process said.Officials said a few telephone companies were reluctant to provide so much information, but none challenged the subpoenas in court. Those that hesitated received letters from the Justice Department urging them to comply.
  • A spokesman for AT&T declined to comment. Sprint spokeswoman Stephanie Vinge Walsh said only that "we do comply with all state and federal laws regarding law enforcement subpoenas."Agents said that when the data collection began, they sought to limit its use mainly to drug investigations and turned away requests for access from the FBI and the NSA. They allowed searches of the data in terrorism cases, including the bombing of a federal building in Oklahoma City that killed 168 people in 1995, helping to rule out theories linking the attack to foreign terrorists. They allowed even broader use after Sept. 11, 2001. The DEA's public disclosure of its program in January came in the case of a man charged with violating U.S. export restrictions by trying to send electrical equipment to Iran.At first, officials said the DEA gathered records only of calls to a handful of countries, focusing on Colombian drug cartels and their supply lines. Its reach grew quickly, and by the late 1990s, the DEA was logging "a massive number of calls," said a former intelligence official who supervised the program.
  • At its peak, the operation gathered data on calls to 116 countries, an official involved in reviewing the list said. Two other officials said they did not recall the precise number of countries, but it was more than 100. That gave the collection a considerable sweep; the U.S. government recognizes a total of 195 countries.
3More

Paul vows to end NSA program if elected | TheHill - 0 views

  • Sen. Rand Paul (R-Ky.) said he would end the National Security Agency's bulk collection of Americans' phone records on his first day in the White House if he is elected. "The president created this vast dragnet by executive order. And as president on day one, I would immediately end this unconstitutional surveillance," he said in a Kentucky speech Tuesday announcing his presidential bid. 
  • Paul has split with most of his party over the issue, even Cruz who has also pushed for reform. Paul has rankled some NSA reform advocates by opposing a bill to end the program because he does not believe it goes far enough to dismantle the authorizing authority.   <A HREF="http://ws-na.amazon-adsystem.com/widgets/q?rt=tf_mfw&ServiceVersion=20070822&MarketPlace=US&ID=V20070822%2FUS%2Fthehill07-20%2F8001%2Fdffbe72d-f425-4b83-b07e-357ae9d405f6&Operation=NoScript">Amazon.com Widgets</A> He has filed a lawsuit against the government over the program and has promised not to vote to renew sections of the Patriot Act that authorize the program and are up for renewal in June. The Kentucky senator dusted off an old line in the speech Tuesday, saying the phone records of law-abiding Americans should stay private. "Warrantless searches of Americans phone and computer records are un-American and a threat to our civil liberties. I say that your phone records are yours. I say that phone records of law abiding citizens are none of their damn business," he said, later joking "is this where we light up the phones?""I believe we can have liberty and security, and I will not compromise your liberty for a false sense of security," he added later.  
  • President Obama has advocated for ending the government's bulk collection of Americans' phone records as well, but he has resisted ending it unilaterally.  The courts renew the current program every 90 days. Advocates have called on the administration to end it by simply declining to have it renewed.But Obama has resisted taking this route, calling on Congress to act.
7More

A young prince may cost Syria and Yemen dear - Voices - The Independent - 0 views

  • A succession of crucially important military and diplomatic events are convulsing the political landscape of the Middle East. The most significant development is the understanding between the US and five other world powers with Iran on limiting Iran’s nuclear programme in return for an easing of sanctions. But the muting of hostility between the US and Iran, a destabilising feature of Middle East politics since the overthrow of the Shah in 1979, may not do much to stem the momentum towards ever greater violence in Syria, Yemen and Iraq.
  • What is striking about developments in the past few weeks is that it is Saudi Arabia that is seeking radical change in the region and is prepared to use military force to secure it. In Yemen, it has launched a devastating air war and, in Syria, it is collaborating with Turkey to support extreme jihadi movements led by Jabhat al-Nusra, the al-Qaeda affiliate that last week captured its first provincial capital.The Saudis are abandoning their tradition of pursuing extremely cautious policies, using their vast wealth to buy influence, working through proxies and keeping close to the US. In Yemen, it is the Saudi air force that is bombarding the Houthis, along with Yemeni army units still loyal to former president Ali Abdullah Saleh who was once seen as the Saudis’ and Americans’ man in Sanaa, the Yemeni capital. As with many other air campaigns, the Saudis and their Gulf Co-operation Council allies are finding that air strikes without a reliable military partner on the ground do not get you very far. But if Saudi ground forces are deployed in Yemen they will be entering a country that has been just as much of a quagmire as Afghanistan and Iraq.
  • The Saudis are portraying their intervention as provoked by Iranian-backed Shia Zaidis trying to take over the country. Much of this is propaganda. The Houthis, who come from the Zaidi tribes in Yemen’s northern mountains, have an effective military and political movement called Ansar Allah, modelled on Hezbollah in Lebanon. They have fought off six government offensives against them since 2004, all launched by former President Saleh, then allied to the Saudis. Saleh, himself a Zaidi but drawing his support from the Zaidi tribes around the capital, Sanaa, was a casualty of the Arab Spring in Yemen but still has the support of many army units.
  • ...4 more annotations...
  • Why has Saudi Arabia plunged into this morass, pretending that Iran is pulling the strings of the Shia minority though its role is marginal? The Zaidis, estimated to be a third of the 25 million Yemeni population, are very different Shia from those in Iran and Iraq. In the past, there has been little Sunni-Shia sectarianism in Yemen, but the Saudi determination to frame the conflict in sectarian terms may be self-fulfilling.Part of the explanation may lie with the domestic politics of Saudi Arabia. Madawi al-Rasheed, a Saudi visiting professor at LSE’s Middle East Centre, says in the online magazine al-Monitor that Saudi King Salman’s defence minister and head of the royal court, his son Mohammed bin Salman, aged about 30, wants to establish Saudi Arabia as absolutely dominant in the Arabian Peninsula. She adds caustically that he needs to earn a military title, “perhaps ‘Destroyer of Shiite Rejectionists and their Persian Backers in Yemen’, to remain relevant among more experienced and aspiring siblings and disgruntled royal cousins”. A successful military operation in Yemen would give him the credentials he needs.
  • A popular war would help unite Saudi liberals and Islamists behind a national banner while dissidents could be pilloried as traitors. Victory in Yemen would compensate for the frustration of Saudi policy in Iraq and Syria where the Saudis have been outmanoeuvred by Iran. In addition, it would be a defiant gesture towards a US administration that they see as too accommodating towards Iran.
  • Yemen is not the only country in which Saudi Arabia is taking a more vigorous role. Last week, President Bashar al-Assad of Syria suffered several defeats, the most important being the fall of the provincial capital Idlib, in northern Syria, to Jabhat al-Nusra which fought alongside two other hardline al-Qaeda-type movements, Ahrar al-Sham and Jund al-Aqsa. Al-Nusra’s leader, Abu Mohammed al-Golani, immediately announced the instruction of Sharia law in the city. Sent to Syria in 2011 by Isis leader Abu Bakr al-Baghdadi to create al-Nusra, he split from Baghdadi when he tried to reabsorb al-Nusra in 2013. Ideologically, the two groups differ little and the US has launched air strikes against  al-Nusra, though Turkey still treats it as if it represented moderates.The Syrian government last week accused Turkey of helping thousands of jihadi fighters to reach Idlib and of jamming Syrian army telecommunications, which helped to undermine the defences of the city. The prominent Saudi role in the fall of Idlib was publicised by Jamal Khashoggi, a Saudi journalist and adviser to the government, in an interview in The New York Times. He said that Saudi Arabia and Turkey had backed Jabhat al-Nusra and the other jihadis in capturing Idlib, adding that “co-ordination between Turkish and Saudi intelligence has never been as good as now”. Surprisingly, this open admission that Saudi Arabia is backing jihadi groups condemned as terrorists by the US attracted little attention. Meanwhile, Isis fighters have for the first time entered Damascus in strength, taking over part the Yarmouk Palestinian camp, only ten miles from the heart of the Syrian capital.
  • Saudi Arabia is not the first monarchy to imagine that it can earn patriotic credentials and stabilise its rule by waging a short and victorious foreign war. In 1914, the monarchs of Germany, Russia and Austro-Hungary had much the same idea and found out too late that they had sawed through the branch on which they were all sitting. Likewise, Saudi rulers may find to their cost that they have been far more successful than Iran ever was in destroying the political status quo in the Middle East.
1More

First Israeli jailed without trial in sweep over West Bank arson | Reuters - 0 views

  • Israel jailed a suspected Jewish militant without trial on Tuesday, the first application of the controversial measure against a citizen in a government-ordered crackdown following the lethal torching of a Palestinian home. The suspect, Mordechai Meyer, a resident of a Jewish settlement in the occupied West Bank, was arrested and placed under so-called "administrative detention" for six months, Israel's Defense Ministry said in a statement. It accused him of "involvement in violent activity and recent terrorist attacks as part of a Jewish terror group".Administrative detention, under which Israel holds hundreds of Palestinians and which civil liberties groups deplore as a blow to due process of the law, was among new measures Prime Minister Benjamin Netanyahu's security cabinet approved for Jews suspected in Friday's arson in the West Bank. The attack killed a Palestinian toddler and severely injured three relatives. Detention without trial is required, Israel says, to prevent further violence in cases where there is insufficient evidence to prosecute, or where going to court would risk exposing the identity of secret informants. Two other Israelis with ties to far-right Jewish groups, Meir Ettinger and Eviatar Salonim, were arrested this week. Police said the former was remanded in custody pending further investigation but was not placed under administrative detention. They did immediately detail Salonim's terms.
« First ‹ Previous 861 - 880 of 997 Next › Last »
Showing 20 items per page