Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged Experts

Rss Feed Group items tagged

Paul Merrell

Operation AURORAGOLD: How the NSA Hacks Cellphone Networks Worldwide - 0 views

  • In March 2011, two weeks before the Western intervention in Libya, a secret message was delivered to the National Security Agency. An intelligence unit within the U.S. military’s Africa Command needed help to hack into Libya’s cellphone networks and monitor text messages. For the NSA, the task was easy. The agency had already obtained technical information about the cellphone carriers’ internal systems by spying on documents sent among company employees, and these details would provide the perfect blueprint to help the military break into the networks. The NSA’s assistance in the Libya operation, however, was not an isolated case. It was part of a much larger surveillance program—global in its scope and ramifications—targeted not just at hostile countries.
  • According to documents contained in the archive of material provided to The Intercept by whistleblower Edward Snowden, the NSA has spied on hundreds of companies and organizations internationally, including in countries closely allied to the United States, in an effort to find security weaknesses in cellphone technology that it can exploit for surveillance. The documents also reveal how the NSA plans to secretly introduce new flaws into communication systems so that they can be tapped into—a controversial tactic that security experts say could be exposing the general population to criminal hackers. Codenamed AURORAGOLD, the covert operation has monitored the content of messages sent and received by more than 1,200 email accounts associated with major cellphone network operators, intercepting confidential company planning papers that help the NSA hack into phone networks.
  • Karsten Nohl, a leading cellphone security expert and cryptographer who was consulted by The Intercept about details contained in the AURORAGOLD documents, said that the broad scope of information swept up in the operation appears aimed at ensuring virtually every cellphone network in the world is NSA accessible.
  • ...11 more annotations...
  • “Collecting an inventory [like this] on world networks has big ramifications,” Nohl said, because it allows the NSA to track and circumvent upgrades in encryption technology used by cellphone companies to shield calls and texts from eavesdropping. Evidence that the agency has deliberately plotted to weaken the security of communication infrastructure, he added, was particularly alarming. “Even if you love the NSA and you say you have nothing to hide, you should be against a policy that introduces security vulnerabilities,” Nohl said, “because once NSA introduces a weakness, a vulnerability, it’s not only the NSA that can exploit it.”
  • The AURORAGOLD operation is carried out by specialist NSA surveillance units whose existence has not been publicly disclosed: the Wireless Portfolio Management Office, which defines and carries out the NSA’s strategy for exploiting wireless communications, and the Target Technology Trends Center, which monitors the development of new communication technology to ensure that the NSA isn’t blindsided by innovations that could evade its surveillance reach. The center’s logo is a picture of the Earth overshadowed by a large telescope; its motto is “Predict – Plan – Prevent.”
  • The NSA documents reveal that, as of May 2012, the agency had collected technical information on about 70 percent of cellphone networks worldwide—701 of an estimated 985—and was maintaining a list of 1,201 email “selectors” used to intercept internal company details from employees. (“Selector” is an agency term for a unique identifier like an email address or phone number.) From November 2011 to April 2012, between 363 and 1,354 selectors were “tasked” by the NSA for surveillance each month as part of AURORAGOLD, according to the documents. The secret operation appears to have been active since at least 2010.
  • By covertly monitoring GSMA working groups in a bid to identify and exploit security vulnerabilities, the NSA has placed itself into direct conflict with the mission of the National Institute for Standards and Technology, or NIST, the U.S. government agency responsible for recommending cybersecurity standards in the United States. NIST recently handed out a grant of more than $800,000 to GSMA so that the organization could research ways to address “security and privacy challenges” faced by users of mobile devices. The revelation that the trade group has been targeted for surveillance may reignite deep-seated tensions between NIST and NSA that came to the fore following earlier Snowden disclosures. Last year, NIST was forced to urge people not to use an encryption standard it had previously approved after it emerged NSA had apparently covertly worked to deliberately weaken it.
  • The NSA focuses on intercepting obscure but important technical documents circulated among the GSMA’s members known as “IR.21s.” Most cellphone network operators share IR.21 documents among each other as part of agreements that allow their customers to connect to foreign networks when they are “roaming” overseas on a vacation or a business trip. An IR.21, according to the NSA documents, contains information “necessary for targeting and exploitation.” The details in the IR.21s serve as a “warning mechanism” that flag new technology used by network operators, the NSA’s documents state. This allows the agency to identify security vulnerabilities in the latest communication systems that can be exploited, and helps efforts to introduce new vulnerabilities “where they do not yet exist.” The IR.21s also contain details about the encryption used by cellphone companies to protect the privacy of their customers’ communications as they are transmitted across networks. These details are highly sought after by the NSA, as they can aid its efforts to crack the encryption and eavesdrop on conversations.
  • One of the prime targets monitored under the AURORAGOLD program is the London-headquartered trade group, the GSM Association, or the GSMA, which represents the interests of more than 800 major cellphone, software, and internet companies from 220 countries. The GSMA’s members include U.S.-based companies such as Verizon, AT&T, Sprint, Microsoft, Facebook, Intel, Cisco, and Oracle, as well as large international firms including Sony, Nokia, Samsung, Ericsson, and Vodafone. The trade organization brings together its members for regular meetings at which new technologies and policies are discussed among various “working groups.” The Snowden files reveal that the NSA specifically targeted the GSMA’s working groups for surveillance.
  • Last year, the Washington Post reported that the NSA had already managed to break the most commonly used cellphone encryption algorithm in the world, known as A5/1. But the information collected under AURORAGOLD allows the agency to focus on circumventing newer and stronger versions of A5 cellphone encryption, such as A5/3. The documents note that the agency intercepts information from cellphone operators about “the type of A5 cipher algorithm version” they use, and monitors the development of new algorithms in order to find ways to bypass the encryption. In 2009, the British surveillance agency Government Communications Headquarters conducted a similar effort to subvert phone encryption under a project called OPULENT PUP, using powerful computers to perform a “crypt attack” to penetrate the A5/3 algorithm, secret memos reveal. By 2011, GCHQ was collaborating with the NSA on another operation, called WOLFRAMITE, to attack A5/3 encryption. (GCHQ declined to comment for this story, other than to say that it operates within legal parameters.)
  • The extensive attempts to attack cellphone encryption have been replicated across the Five Eyes surveillance alliance. Australia’s top spy agency, for instance, infiltrated an Indonesian cellphone company and stole nearly 1.8 million encryption keys used to protect communications, the New York Times reported in February.
  • The NSA’s documents show that it focuses on collecting details about virtually all technical standards used by cellphone operators, and the agency’s efforts to stay ahead of the technology curve occasionally yield significant results. In early 2010, for instance, its operatives had already found ways to penetrate a variant of the newest “fourth generation” smartphone-era technology for surveillance, years before it became widely adopted by millions of people in dozens of countries. The NSA says that its efforts are targeted at terrorists, weapons proliferators, and other foreign targets, not “ordinary people.” But the methods used by the agency and its partners to gain access to cellphone communications risk significant blowback. According to Mikko Hypponen, a security expert at Finland-based F-Secure, criminal hackers and foreign government adversaries could be among the inadvertent beneficiaries of any security vulnerabilities or encryption weaknesses inserted by the NSA into communication systems using data collected by the AURORAGOLD project.
  • Vines, the NSA spokeswoman, told The Intercept that the agency was committed to ensuring an “open, interoperable, and secure global internet.” “NSA deeply values these principles and takes great care to honor them in the performance of its lawful foreign-intelligence mission,” Vines said.
  • Documents published with this article: AURORAGOLD – Project Overview AURORAGOLD Working Group IR.21 – A Technology Warning Mechanism AURORAGOLD – Target Technology Trends Center support to WPMO NSA First-Ever Collect of High-Interest 4G Cellular Signal AURORAGOLD Working Aid WOLFRAMITE Encryption Attack OPULENT PUP Encryption Attack NSA/GCHQ/CSEC Network Tradecraft Advancement Team
  •  
    Notice that they've cracked even 4G.
Paul Merrell

Meet Alfreda Bikowsky, the Senior Officer at the Center of the CIA's Torture Scandals -... - 0 views

  • NBC News yesterday called her a “key apologist” for the CIA’s torture program. A follow-up New Yorker article dubbed her “The Unidentified Queen of Torture” and in part “the model for the lead character in ‘Zero Dark Thirty.’” Yet in both articles she was anonymous. The person described by both NBC and The New Yorker is senior CIA officer Alfreda Frances Bikowsky. Multiple news outlets have reported that as the result of a long string of significant errors and malfeasance, her competence and integrity are doubted — even by some within the agency. The Intercept is naming Bikowsky over CIA objections because of her key role in misleading Congress about the agency’s use of torture, and her active participation in the torture program (including playing a direct part in the torture of at least one innocent detainee). Moreover, Bikowsky has already been publicly identified by news organizations as the CIA officer responsible for many of these acts.
  • The executive summary of the torture report released by the Senate last week provides abundant documentation that the CIA repeatedly and deliberately misled Congress about multiple aspects of its interrogation program. Yesterday, NBC News reported that one senior CIA officer in particular was responsible for many of those false claims, describing her as “a top al Qaeda expert who remains in a senior position at the CIA.” NBC, while withholding her identity, noted that the same unnamed officer “also participated in ‘enhanced interrogations’ of self-professed 9/11 mastermind Khalid Sheikh Mohammed, witnessed the waterboarding of terror suspect Abu Zubaydah and ordered the detention of a suspected terrorist who turned out to be unconnected to al Qaeda, according to the report.” The New Yorker‘s Jane Mayer, writing yesterday about the NBC article, added that the officer “is still in a position of high authority over counterterrorism at the C.I.A.” This officer, Mayer noted, is the same one who “dropped the ball when the C.I.A. was given information that might very well have prevented the 9/11 attacks; she gleefully participated in torture sessions afterward; she misinterpreted intelligence in such a way that it sent the C.I.A. on an absurd chase for Al Qaeda sleeper cells in Montana. And then she falsely told congressional overseers that the torture worked.” Mayer also wrote that the officer is “the same woman” identified in the Senate report who oversaw “the months-long rendition and gruesome interrogation of another detainee whose detention was a case of mistaken identity.”
  • Both news outlets withheld the name of this CIA officer even though her identity is widely known among journalists, and her name has been used by various media outlets in connection with her work at the CIA. Both articles cited requests by the CIA not to identify her, even though they provided details making her identity clear. In fact, earlier this year, The Washington Post identified Bikowsky by name, describing her as a CIA analyst “who was tied to a critical intelligence-sharing failure before the Sept. 11, 2001, attacks and the botched 2003 ‘rendition’ of an innocent German citizen thought to be an al-Qaeda operative.” That Post report led to both McClatchy and independent journalist Marcy Wheeler raising questions about the propriety of Bikowsky’s former personal lawyer, Robert Litt, playing a key role in his current capacity as a top government lawyer in deciding which parts of the torture report should be released. The McClatchy article identified Bikowsky by name as the officer who “played a central role in the bungled rendition of Khaled el-Masri. El-Masri, who was revealed to be innocent, claimed to have been tortured by the agency.” El-Masri, a German citizen who was kidnapped from Macedonia and tortured by the CIA in Afghanistan, was released in 2003 after it was revealed he was not involved in al Qaeda.
Paul Merrell

James Foley Beheading Video Has Play-Acting Portions - Video Experts Say - Internationa... - 0 views

  • Video experts observed that the video showing the actual beheading of US journalist James Foley was so professionally produced and well-scripted, to the extent that portions of it appeared to be just being acted out.
  • Two video experts were one in observing that portions of the purported video were give-aways that the beheading video was intended primarily for propaganda purposes.
Paul Merrell

AP Exclusive: Expert calls for Diablo Canyon shutdown | www.ktvu.com - 0 views

  • A senior federal nuclear expert is urging regulators to shut down California's last operating nuclear plant until they can determine whether the facility's twin reactors can withstand powerful shaking from any one of several nearby earthquake faults.Michael Peck, who for five years was Diablo Canyon's lead on-site inspector, says in a 42-page, confidential report that the Nuclear Regulatory Commission is not applying the safety rules it set out for the plant's operation.The document, which was obtained and verified by The Associated Press, does not say the plant itself is unsafe. Instead, according to Peck's analysis, no one knows whether the facility's key equipment can withstand strong shaking from those faults — the potential for which was realized decades after the facility was built.
  • Continuing to run the reactors, Peck writes, "challenges the presumption of nuclear safety."Peck's July 2013 filing is part of an agency review in which employees can appeal a supervisor's or agency ruling — a process that normally takes 60 to 120 days, but can be extended. The NRC, however, has not yet ruled. Spokeswoman Lara Uselding said in emails that the agency would have no comment on the document.The NRC, which oversees the nation's commercial nuclear power industry, and Diablo Canyon owner Pacific Gas and Electric Co., say the nearly three-decade-old reactors, which produce enough electricity for more than 3 million people annually, are safe and that the facility complies with its operating license, including earthquake safety standards.
  • The disaster preparedness of the world's nuclear plants came into sharp focus in 2011, when the coastal Fukushima Dai-ichi plant in Japan suffered multiple meltdowns after an earthquake and tsunami destroyed its power and cooling systems. The magnitude-9 earthquake was far larger than had been believed possible. The NRC has since directed U.S. nuclear plants to reevaluate seismic risks, and those studies are due by March 2015.The important of such an analysis came into sharp focus on Sunday when a magnitude 6.0-earthquake struck in Northern California's wine country, injuring scores of residents, knocking out power to thousands and toppling wine bottles at vineyards.
  • ...2 more annotations...
  • What's striking about Peck's analysis is that it comes from within the NRC itself, and gives a rare look at a dispute within the agency. At issue are whether the plant's mechanical guts could survive a big jolt, and what yardsticks should be used to measure the ability of the equipment to withstand the potentially strong vibrations that could result.The conflict between Peck and his superiors stems from the 2008 discovery of the Shoreline fault, which snakes offshore about 650 yards from the reactors. A larger crack, the Hosgri fault, had been discovered in the 1970s about 3 miles away, after the plant's construction permits had been issued and work was underway. Surveys have mapped a network of other faults north and south of the reactors.According to Peck's filing, PG&E research in 2011 determined that any of three nearby faults — the Shoreline, Los Osos and San Luis Bay — is capable of producing significantly more ground motion during an earthquake than was accounted for in the design of important plant equipment. In the case of San Luis Bay, it is as much as 75 percent more.Those findings involve estimates of what's called peak ground acceleration, a measurement of how hard the earth could shake in a given location. The analysis says PG&E failed to demonstrate that the equipment would remain operable if exposed to the stronger shaking, violating its operating license.
  • The agency should shut the facility down until it is proven that piping, reactor cooling and other systems can meet higher stress levels, or approve exemptions that would allow the plant to continue to operate, according to Peck's analysis.Peck disagreed with his supervisors' decision to let the plant continue to operate without assessing the findings. Unable to resolve his concerns, Peck in 2012 filed a formal objection, calling for PG&E to be cited for violating the safety standards, according to his filing. Within weeks, the NRC said the plant was being operated safely. In 2013 he filed another objection, triggering the current review.
Paul Merrell

The Russian Military Finally Speaks! - 0 views

  • Finally!  The Russian military has decided to speak out about some of what it knows about what happened to MH17.  It was a typical Russian event: the interpreters were nothing short of *terrible* (I speak as a former military interpreter myself), the visual aids were badly designed (the shape of a SU-24 bomber was used to represent a totally different SU-25 close air support aircraft), and there was no Q&A.  See for yourself:
  • Still, a few very interesting things came out of this press conference. First, the Ukies have been caught lying about their military aircraft in the area of the disaster.  They had claimed that no UAF aircraft were in the area.  The Russians have shown the recorded radar tracks which reveal the following: there was what appears to have been a military aircraft (with no transponder) flying below 5000m which suddenly began climbing just before MH17 was hit by some kind of missile.  This unidentified aircraft then stayed and observed as MH17 fell to the ground.  The Russians added that a SU-25 armed with a R-60 air to air missile could have shot down MH17.  Maybe.  But what is certain is that the civilian radars did detected this strange Ukie aircraft. Now, these radar tracks are from *civilian* radars.  The Russians apparently are not willing to share the data from their military radars.  This is why this mysterious Ukie aircraft 'appears' at 5'000m altitude and then 'disappears' again, but you can be certain that their military radars, especially on their A-50 AWACs did track that aircraft before and after its strange maneuver.  Again, I think that the Russians hope that the experts will come to the correct conclusions on the basis of what they have shown today and that they will not have to reveal more.  But we can be certain that they have the full picture and that they know exactly what happened.
  • Second, the Russians are challenging their American colleagues to show the images they claim show the launch of the BukM1 rocket.  They also point out at the interesting coincidence that an US experimental launch detection satellite was exactly over the area at the moment of the tragedy.  Clearly, they are tossing the world experts some kind of lead here, but I am not sure what this is. Third, the Russians have shown their own space-based imagery which shows that one battery of BukM1 had been moved just prior to the incident (See for yourself here).  It will be interesting to see if the Ukies explain what is shown on these picture and, if yes, how?
  • ...1 more annotation...
  • As a public information this conference gets a C+ but as a lead for experts I would give it a much higher A-.  We know have hard proof that the Ukies lied at least twice.  They lied about the footage of the Buk missiles being moved back to Russia (the footage was taken in Ukie-occupied territory) and they most definitely lied when they denied having any military aircraft in the area when in reality they had one in the immediate proximity of MH17.  That is a huge lie which the Ukies will have a very hard time dismissing. As I said in my first post about MH17, I have no hope whatsoever that the western plutocracy will ever admit that the junta did it.  Ditto for the corporate presstitues of the MSM, but I do hope that the world will see this tragedy for what is clearly was: a deliberate false flag on the part of the Nazi junta in Kiev.  As David Chandler correctly points out about 9/11, the proof of a cover up is in itself already a proof of a conspiracy.
Paul Merrell

Canadian Spies Collect Domestic Emails in Secret Security Sweep - The Intercept - 0 views

  • Canada’s electronic surveillance agency is covertly monitoring vast amounts of Canadians’ emails as part of a sweeping domestic cybersecurity operation, according to top-secret documents. The surveillance initiative, revealed Wednesday by CBC News in collaboration with The Intercept, is sifting through millions of emails sent to Canadian government agencies and departments, archiving details about them on a database for months or even years. The data mining operation is carried out by the Communications Security Establishment, or CSE, Canada’s equivalent of the National Security Agency. Its existence is disclosed in documents obtained by The Intercept from NSA whistleblower Edward Snowden. The emails are vacuumed up by the Canadian agency as part of its mandate to defend against hacking attacks and malware targeting government computers. It relies on a system codenamed PONY EXPRESS to analyze the messages in a bid to detect potential cyber threats.
  • Last year, CSE acknowledged it collected some private communications as part of cybersecurity efforts. But it refused to divulge the number of communications being stored or to explain for how long any intercepted messages would be retained. Now, the Snowden documents shine a light for the first time on the huge scope of the operation — exposing the controversial details the government withheld from the public. Under Canada’s criminal code, CSE is not allowed to eavesdrop on Canadians’ communications. But the agency can be granted special ministerial exemptions if its efforts are linked to protecting government infrastructure — a loophole that the Snowden documents show is being used to monitor the emails. The latest revelations will trigger concerns about how Canadians’ private correspondence with government employees are being archived by the spy agency and potentially shared with police or allied surveillance agencies overseas, such as the NSA. Members of the public routinely communicate with government employees when, for instance, filing tax returns, writing a letter to a member of parliament, applying for employment insurance benefits or submitting a passport application.
  • Chris Parsons, an internet security expert with the Toronto-based internet think tank Citizen Lab, told CBC News that “you should be able to communicate with your government without the fear that what you say … could come back to haunt you in unexpected ways.” Parsons said that there are legitimate cybersecurity purposes for the agency to keep tabs on communications with the government, but he added: “When we collect huge volumes, it’s not just used to track bad guys. It goes into data stores for years or months at a time and then it can be used at any point in the future.” In a top-secret CSE document on the security operation, dated from 2010, the agency says it “processes 400,000 emails per day” and admits that it is suffering from “information overload” because it is scooping up “too much data.” The document outlines how CSE built a system to handle a massive 400 terabytes of data from Internet networks each month — including Canadians’ emails — as part of the cyber operation. (A single terabyte of data can hold about a billion pages of text, or about 250,000 average-sized mp3 files.)
  • ...1 more annotation...
  • The agency notes in the document that it is storing large amounts of “passively tapped network traffic” for “days to months,” encompassing the contents of emails, attachments and other online activity. It adds that it stores some kinds of metadata — data showing who has contacted whom and when, but not the content of the message — for “months to years.” The document says that CSE has “excellent access to full take data” as part of its cyber operations and is receiving policy support on “use of intercepted private communications.” The term “full take” is surveillance-agency jargon that refers to the bulk collection of both content and metadata from Internet traffic. Another top-secret document on the surveillance dated from 2010 suggests the agency may be obtaining at least some of the data by covertly mining it directly from Canadian Internet cables. CSE notes in the document that it is “processing emails off the wire.”
  •  
    " CANADIAN SPIES COLLECT DOMESTIC EMAILS IN SECRET SECURITY SWEEP BY RYAN GALLAGHER AND GLENN GREENWALD @rj_gallagher@ggreenwald YESTERDAY AT 2:02 AM SHARE TWITTER FACEBOOK GOOGLE EMAIL PRINT POPULAR EXCLUSIVE: TSA ISSUES SECRET WARNING ON 'CATASTROPHIC' THREAT TO AVIATION CHICAGO'S "BLACK SITE" DETAINEES SPEAK OUT WHY DOES THE FBI HAVE TO MANUFACTURE ITS OWN PLOTS IF TERRORISM AND ISIS ARE SUCH GRAVE THREATS? NET NEUTRALITY IS HERE - THANKS TO AN UNPRECEDENTED GUERRILLA ACTIVISM CAMPAIGN HOW SPIES STOLE THE KEYS TO THE ENCRYPTION CASTLE Canada's electronic surveillance agency is covertly monitoring vast amounts of Canadians' emails as part of a sweeping domestic cybersecurity operation, according to top-secret documents. The surveillance initiative, revealed Wednesday by CBC News in collaboration with The Intercept, is sifting through millions of emails sent to Canadian government agencies and departments, archiving details about them on a database for months or even years. The data mining operation is carried out by the Communications Security Establishment, or CSE, Canada's equivalent of the National Security Agency. Its existence is disclosed in documents obtained by The Intercept from NSA whistleblower Edward Snowden. The emails are vacuumed up by the Canadian agency as part of its mandate to defend against hacking attacks and malware targeting government computers. It relies on a system codenamed PONY EXPRESS to analyze the messages in a bid to detect potential cyber threats. Last year, CSE acknowledged it collected some private communications as part of cybersecurity efforts. But it refused to divulge the number of communications being stored or to explain for how long any intercepted messages would be retained. Now, the Snowden documents shine a light for the first time on the huge scope of the operation - exposing the controversial details the government withheld from the public. Under Canada's criminal code, CSE is no
Paul Merrell

Is there a second NSA leaker after Snowden? | TheHill - 0 views

  • Top experts say there could be a new person leaking details about the National Security Agency, in addition to former contractor Edward Snowden.Glenn Greenwald, the journalist most closely associated to Snowden, said he suspects someone else has been involved in leaking out new documents, and other experts have backed up the claim.ADVERTISEMENTThe existence of a second leaker “seems clear at this point,” Greenwald wrote on Twitter over the weekend. “The lack of sourcing to Snowden on this & that last [Der Spiegel] article seems petty telling,” he added, after German broadcasters reported that the NSA was tracking people searching for details about privacy software. 
  • Neither the Der Spiegel article from December nor last week’s story, both of which were partly written by privacy advocate and security researcher Jacob Appelbaum, specifically mentioned that the information emanated from leaks by Snowden.“That's particularly notable given that virtually every other article using Snowden documents - including der Spiegel - specifically identified him as the source,” Greenwald said in an email to The Hill on Monday.Other people who have seen Snowden’s trove of documents have agreed that the documents revealed by German outlets seem to indicate a second source.
  • Bruce Schneier, a cryptologist and cybersecurity expert who has helped the Guardian review Snowden’s disclosures, said he did “not believe that this came from the Snowden documents.”“I think there’s a second leaker out there,” he wrote in a blog post last week. If true, it could add another headache for the NSA, which has struggled for more than a year to contain the fallout from Snowden’s revelations. Defenders of the NSA say that the disclosures have hurt U.S. security and empowered terrorists and other enemies abroad.Among other internal reforms, the spy agency has beefed up its clearance procedures to prevent another employee from passing along secret documents to journalists or governments in Beijing and Moscow.
  • ...1 more annotation...
  • “If in fact this is a post-Snowden NSA leak, then it’s probably just proof that you can always build a bigger mousetrap; that doesn’t mean you’re going to catch the mice,” said Stephen Vladeck, a law professor at American University who specializes in national security issues.Vladeck added that leaks about controversial national security programs are in many ways inevitable, and may not be tied to Snowden’s leaks in any way.For Greenwald, however, a second leaker would be affirmation of Snowden’s actions.“I've long thought one of the most significant and enduring consequences of Snowden's successful whistleblowing will be that he will inspire other leakers to come forward,” he told The Hill. 
Paul Merrell

Greenwald - The Intercept - 0 views

  • Sunday morning news television is where Washington sets its media agenda for the week and, more importantly, defines its narrow range of conventional, acceptable viewpoints. It’s where the Serious People go to spout their orthodoxies and, through the illusion of “tough questioning,” disseminate DC-approved bipartisan narratives. Other than the New York Times front page, Sunday morning TV was the favorite tool of choice for Bush officials and neocon media stars to propagandize the public about Iraq; Dick Cheney’s media aide, Catherine Martin, noted in a memo that the Tim Russert-hosted Meet the Press lets Cheney “control message,” and she testified at the Lewis Libby trial that, as a result, “I suggested we put the vice president on Meet the Press, which was a tactic we often used. It’s our best format.” Over the last couple months, the Sunday morning TV shows — NBC’s Meet the Press, CBS’s Face The Nation, ABC’s This Week, Fox’s News Sunday, and CNN’s State of the Union — have focused on a deal with Iran as one of their principal topics. In doing so, they have repeatedly given a platform to fanatical anti-Iran voices, including Israeli officials such as Prime Minister Benjamin Netanyahu. They have sycophantically interviewed officials from the U.S.-supported, anti-Iranian Gulf tyrannies such as Saudi Arabia and Jordan; two weeks ago, Chuck Todd interviewed Saudi Ambassador to the U.S. Adel Al-Jubeir and didn’t utter a word about extreme Saudi repression,
  • In the last three weeks alone, Meet the Press has interviewed the Israeli prime minister, the Saudi ambassador, and the Israeli ambassador to the U.S.
  • Meanwhile, their “expert media panels” almost always feature the most extremist “pro-Israel,” anti-Iran American pundits such as Jeffrey Goldberg, who played a leading role in spreading false claims about Iraq under the guise of “reporting” (and only became more beloved and credible in DC for it), was dubbed Netanyahu’s “faithful stenographer” by New York Times columnist Roger Cohen, and even joined the Israeli military in his young adulthood. In 2014, Face the Nation interviewed Netanyahu five times and featured his “faithful stenographer,” Goldberg, three times; in 2015, the CBS show just last week interviewed Netanyahu and has already hosted Goldberg four times. ABC’s This Week with George Stephanopoulos actually features supreme neocon propagandist Bill Kristol as a regular “ABC News Contributor” and has also interviewed Netanyahu. And that’s to say nothing of the “hawkish,” AIPAC-loyal and/or evangelical members of the U.S. Congress who are fanatically devoted to Israel and appear literally almost every week on these programs. But as these shows “cover” the Iran deal, one thing is glaringly missing: Iranian voices. There has not been a single Iranian official recently interviewed by any of these Sunday morning shows. When I raised this issue on Twitter a couple of weeks ago, a Meet the Press senior editor, Shawna Thomas, said the show had “put in a request” with Iran for an interview, while MSNBC’s Chris Hayes also suggested that it can be difficult to secure interviews with Iranian government officials.
  • ...4 more annotations...
  • That may be, but even if it is difficult to obtain interviews with Iranian government officials, it is extremely easy to interview Iranian experts, scholars, journalists and other authoritative voices from Tehran. Last week, Democracy Now’s Amy Goodman and Juan Gonzalez hosted a fascinating hour-long discussion about Iran with Seyed Hossein Mousavian, a former nuclear negotiator for Iran who was Iran’s ambassador to Germany from 1990 to 1997, and now teaches at Princeton. Just this week, CNN International’s Christiane Amanpour interviewed Tehran University Professor Sadegh Zibakalam about Tehran’s views and actions in the Iran deal. Beyond those in Iran, there are Iranian-American groups and Iranian-American experts who actually speak Farsi who don’t see the world the way Jeffrey Goldberg and Lindsey Graham do. Outside the Sunday shows, Iranian officials have been interviewed occasionally by U.S. media figures. In sum, the only way to exclude Iranian voices is if you choose to exclude them. That’s exactly what Sunday morning television programs have done, and continue to do. And it matters a great deal for several reasons.
  • For one, excluding the Iranian viewpoint ensures that these shows spew propaganda to the American public. Iran is talked about, almost always in demonic terms, but is almost never heard from. That means that these shows, which endlessly boast of their own “objectivity,” are in fact far more akin to state media. My Intercept colleague Jon Schwarz this week wrote an article detailing seven historically indisputable facts about what the U.S. has done to Iran — which cause some in that country to chant “Death to America” — and it went viral. Why? Because those facts, though quite well-established, are virtually never mentioned in U.S. media accounts that depict Iran as filled with irrational, primitive, inexplicable hatred for the U.S., designed to show how unstable and blindly hateful they are. That is propaganda by definition: amplifying one side’s views (the U.S. and Israeli governments’) while suppressing others’. Then there’s the ease with which those who are rendered invisible are easily demonized. For decades, the key to depicting gay people as mentally ill predators was ensuring they were never heard from, forced to be mute in the closet; once they were out in the open and understood, that demonization became impossible.
  • This has also been the favored foreign policy dynamic in the U.S. for decades. When Americans are killed by a foreign Muslim, we are deluged with information about the American victims and their grieving families, while we hear almost nothing about the innocent victims killed by the U.S. or its allies — not even their names. This gross imbalance in coverage creates the illusion that Americans are innocent victims of terrorism but never its perpetrators. Identically, when American journalists are imprisoned by an adversary of the U.S. government, American journalists trumpet it endlessly, while foreign journalists imprisoned for years with no trial by the U.S. government are all but disappeared. Silencing The Other Side is a key U.S. media propaganda tactic. There are all sorts of dubious claims presented about Iran, the U.S. and Israel that are treated as unchallenged truth in U.S. media discourse. The range of “debate” allowed by the U.S. media — is Obama’s deal with Iran a good idea or not? — all assumes those dubious claims about Iran to be true. But those claims are vehemently disputed in large parts of the world, certainly in Tehran. But Americans, especially the millions who get their news from Sunday morning television or from outlets whose agenda is shaped by those programs, literally have no idea about any of that, because the people who can best advocate those views — i.e. Iranians — are simply never heard from.
  • It’s remarkably telling that the only voices heard on Sunday morning TV shows are those who spout the U.S. government line about Iran, including officials from the repressive regimes most closely allied with the U.S. Obviously, one can find the arguments of Iranians unpersuasive or even harbor hostility to that nation’s government, but what possible justification is there for the leading Sunday morning news shows in the U.S. to simply suppress those views altogether?
Paul Merrell

Neocon savages Christie for failing 'months and months of careful coaching' by foreign ... - 0 views

  • This is delicious. Donald Trump’s anti-interventionist foreign policy ideas are causing panic among the neoconservatives. Clearly this branch of the Republican establishment will leave the party over Trump. Neoconservative Washington Post writer Jennifer Rubin is outraged that Chris Christie would endorse Donald Trump despite “months and months of careful coaching” in foreign policy by “outside… experts.” That’s how the Israel lobby works, by coaching politicians. This is what the neocons have successfully done with Marco Rubio: gotten him to be a robot on the Israel issue.
  • And then this. Neoconservative Robert Kagan, also in the Washington Post, is endorsing Hillary Clinton because of Trump’s xenophobia and demagoguery and racism, but also the foreign policy
  • Kagan is the man who brought us the Project for New American Century letters that helped get the country into the Iraq War.
  • ...1 more annotation...
  • So Hillary Clinton is the shop for muscular internationalists. Bernie Sanders keeps beating up on her friendship with Henry Kissinger, and that’s a good thing. But why doesn’t he talk about her affection for Benjamin Netanyahu and Dennis Ross? Netanyahu has terrible favorability ratings, especially among black Democrats, many of whom boycotted his speech to Congress a year ago. But Hillary Clinton wants to have him into the White House in her first month in office. Remember that some neocons also left the Reagan Bush team when Bush got tough on Israel, and crossed the aisle to Bill Clinton. The Israel lobby transcends party.
Paul Merrell

Farsnews - 0 views

  • US experts are reconstructing and equipping a desolate airport special to carrying agricultural products in the region controlled by the Kurdish forces in Hasaka region, Northeastern Syria, to turn it into a military base.The Lebanese al-Akhbar newspaper reported on Saturday that a number of US experts have entered the region since 50 days ago to develop and prepare the runways with 2,500m length and 250m width to be used by fighter jets. Abu Hajar airport which has not been used since 2010 is located in Tal al-Hajar region in the Eastern countryside of Hasaka which is controlled by the Kurdish People's Defense Units (YPG).
  • The airbase is located Southeast of the town of Rimelan, which is one of the YPG’s main strongholds and “largest arms and ammunition depots”. The US has not received or even asked for a permission from Damascus for reconstructing the airbase. The United States does not have a UN mandate for interventing in the Syria war. The airport will help enable Washington to add an additional safe place to land its forces, commando units for instance, and bring in military support to its allies who are working to finalize control over Southern Hasaka countryside, al-Akhbar said. The report came over a week after the Kurdish region said that the US and Kurdish forces were working together to construct a 10 hectare military airbase South of the town of Rimelan in the village of Rimelan al-Basha. “American experts are directly supervising the airbase with a Kurdish workforce,” the reports claimed, saying that US unmanned aerial vehicles (UAVs) had been flown from the facility to test it.
Paul Merrell

Cy Vance's Proposal to Backdoor Encrypted Devices Is Riddled With Vulnerabilities | Jus... - 0 views

  • Less than a week after the attacks in Paris — while the public and policymakers were still reeling, and the investigation had barely gotten off the ground — Cy Vance, Manhattan’s District Attorney, released a policy paper calling for legislation requiring companies to provide the government with backdoor access to their smartphones and other mobile devices. This is the first concrete proposal of this type since September 2014, when FBI Director James Comey reignited the “Crypto Wars” in response to Apple’s and Google’s decisions to use default encryption on their smartphones. Though Comey seized on Apple’s and Google’s decisions to encrypt their devices by default, his concerns are primarily related to end-to-end encryption, which protects communications that are in transit. Vance’s proposal, on the other hand, is only concerned with device encryption, which protects data stored on phones. It is still unclear whether encryption played any role in the Paris attacks, though we do know that the attackers were using unencrypted SMS text messages on the night of the attack, and that some of them were even known to intelligence agencies and had previously been under surveillance. But regardless of whether encryption was used at some point during the planning of the attacks, as I lay out below, prohibiting companies from selling encrypted devices would not prevent criminals or terrorists from being able to access unbreakable encryption. Vance’s primary complaint is that Apple’s and Google’s decisions to provide their customers with more secure devices through encryption interferes with criminal investigations. He claims encryption prevents law enforcement from accessing stored data like iMessages, photos and videos, Internet search histories, and third party app data. He makes several arguments to justify his proposal to build backdoors into encrypted smartphones, but none of them hold water.
  • Before addressing the major privacy, security, and implementation concerns that his proposal raises, it is worth noting that while an increase in use of fully encrypted devices could interfere with some law enforcement investigations, it will help prevent far more crimes — especially smartphone theft, and the consequent potential for identity theft. According to Consumer Reports, in 2014 there were more than two million victims of smartphone theft, and nearly two-thirds of all smartphone users either took no steps to secure their phones or their data or failed to implement passcode access for their phones. Default encryption could reduce instances of theft because perpetrators would no longer be able to break into the phone to steal the data.
  • Vance argues that creating a weakness in encryption to allow law enforcement to access data stored on devices does not raise serious concerns for security and privacy, since in order to exploit the vulnerability one would need access to the actual device. He considers this an acceptable risk, claiming it would not be the same as creating a widespread vulnerability in encryption protecting communications in transit (like emails), and that it would be cheap and easy for companies to implement. But Vance seems to be underestimating the risks involved with his plan. It is increasingly important that smartphones and other devices are protected by the strongest encryption possible. Our devices and the apps on them contain astonishing amounts of personal information, so much that an unprecedented level of harm could be caused if a smartphone or device with an exploitable vulnerability is stolen, not least in the forms of identity fraud and credit card theft. We bank on our phones, and have access to credit card payments with services like Apple Pay. Our contact lists are stored on our phones, including phone numbers, emails, social media accounts, and addresses. Passwords are often stored on people’s phones. And phones and apps are often full of personal details about their lives, from food diaries to logs of favorite places to personal photographs. Symantec conducted a study, where the company spread 50 “lost” phones in public to see what people who picked up the phones would do with them. The company found that 95 percent of those people tried to access the phone, and while nearly 90 percent tried to access private information stored on the phone or in other private accounts such as banking services and email, only 50 percent attempted contacting the owner.
  • ...8 more annotations...
  • In addition to his weak reasoning for why it would be feasible to create backdoors to encrypted devices without creating undue security risks or harming privacy, Vance makes several flawed policy-based arguments in favor of his proposal. He argues that criminals benefit from devices that are protected by strong encryption. That may be true, but strong encryption is also a critical tool used by billions of average people around the world every day to protect their transactions, communications, and private information. Lawyers, doctors, and journalists rely on encryption to protect their clients, patients, and sources. Government officials, from the President to the directors of the NSA and FBI, and members of Congress, depend on strong encryption for cybersecurity and data security. There are far more innocent Americans who benefit from strong encryption than there are criminals who exploit it. Encryption is also essential to our economy. Device manufacturers could suffer major economic losses if they are prohibited from competing with foreign manufacturers who offer more secure devices. Encryption also protects major companies from corporate and nation-state espionage. As more daily business activities are done on smartphones and other devices, they may now hold highly proprietary or sensitive information. Those devices could be targeted even more than they are now if all that has to be done to access that information is to steal an employee’s smartphone and exploit a vulnerability the manufacturer was required to create.
  • Privacy is another concern that Vance dismisses too easily. Despite Vance’s arguments otherwise, building backdoors into device encryption undermines privacy. Our government does not impose a similar requirement in any other context. Police can enter homes with warrants, but there is no requirement that people record their conversations and interactions just in case they someday become useful in an investigation. The conversations that we once had through disposable letters and in-person conversations now happen over the Internet and on phones. Just because the medium has changed does not mean our right to privacy has.
  • Vance attempts to downplay this serious risk by asserting that anyone can use the “Find My Phone” or Android Device Manager services that allow owners to delete the data on their phones if stolen. However, this does not stand up to scrutiny. These services are effective only when an owner realizes their phone is missing and can take swift action on another computer or device. This delay ensures some period of vulnerability. Encryption, on the other hand, protects everyone immediately and always. Additionally, Vance argues that it is safer to build backdoors into encrypted devices than it is to do so for encrypted communications in transit. It is true that there is a difference in the threats posed by the two types of encryption backdoors that are being debated. However, some manner of widespread vulnerability will inevitably result from a backdoor to encrypted devices. Indeed, the NSA and GCHQ reportedly hacked into a database to obtain cell phone SIM card encryption keys in order defeat the security protecting users’ communications and activities and to conduct surveillance. Clearly, the reality is that the threat of such a breach, whether from a hacker or a nation state actor, is very real. Even if companies go the extra mile and create a different means of access for every phone, such as a separate access key for each phone, significant vulnerabilities will be created. It would still be possible for a malicious actor to gain access to the database containing those keys, which would enable them to defeat the encryption on any smartphone they took possession of. Additionally, the cost of implementation and maintenance of such a complex system could be high.
  • Vance also suggests that the US would be justified in creating such a requirement since other Western nations are contemplating requiring encryption backdoors as well. Regardless of whether other countries are debating similar proposals, we cannot afford a race to the bottom on cybersecurity. Heads of the intelligence community regularly warn that cybersecurity is the top threat to our national security. Strong encryption is our best defense against cyber threats, and following in the footsteps of other countries by weakening that critical tool would do incalculable harm. Furthermore, even if the US or other countries did implement such a proposal, criminals could gain access to devices with strong encryption through the black market. Thus, only innocent people would be negatively affected, and some of those innocent people might even become criminals simply by trying to protect their privacy by securing their data and devices. Finally, Vance argues that David Kaye, UN Special Rapporteur for Freedom of Expression and Opinion, supported the idea that court-ordered decryption doesn’t violate human rights, provided certain criteria are met, in his report on the topic. However, in the context of Vance’s proposal, this seems to conflate the concepts of court-ordered decryption and of government-mandated encryption backdoors. The Kaye report was unequivocal about the importance of encryption for free speech and human rights. The report concluded that:
  • States should promote strong encryption and anonymity. National laws should recognize that individuals are free to protect the privacy of their digital communications by using encryption technology and tools that allow anonymity online. … States should not restrict encryption and anonymity, which facilitate and often enable the rights to freedom of opinion and expression. Blanket prohibitions fail to be necessary and proportionate. States should avoid all measures that weaken the security that individuals may enjoy online, such as backdoors, weak encryption standards and key escrows. Additionally, the group of intelligence experts that was hand-picked by the President to issue a report and recommendations on surveillance and technology, concluded that: [R]egarding encryption, the U.S. Government should: (1) fully support and not undermine efforts to create encryption standards; (2) not in any way subvert, undermine, weaken, or make vulnerable generally available commercial software; and (3) increase the use of encryption and urge US companies to do so, in order to better protect data in transit, at rest, in the cloud, and in other storage.
  • The clear consensus among human rights experts and several high-ranking intelligence experts, including the former directors of the NSA, Office of the Director of National Intelligence, and DHS, is that mandating encryption backdoors is dangerous. Unaddressed Concerns: Preventing Encrypted Devices from Entering the US and the Slippery Slope In addition to the significant faults in Vance’s arguments in favor of his proposal, he fails to address the question of how such a restriction would be effectively implemented. There is no effective mechanism for preventing code from becoming available for download online, even if it is illegal. One critical issue the Vance proposal fails to address is how the government would prevent, or even identify, encrypted smartphones when individuals bring them into the United States. DHS would have to train customs agents to search the contents of every person’s phone in order to identify whether it is encrypted, and then confiscate the phones that are. Legal and policy considerations aside, this kind of policy is, at the very least, impractical. Preventing strong encryption from entering the US is not like preventing guns or drugs from entering the country — encrypted phones aren’t immediately obvious as is contraband. Millions of people use encrypted devices, and tens of millions more devices are shipped to and sold in the US each year.
  • Finally, there is a real concern that if Vance’s proposal were accepted, it would be the first step down a slippery slope. Right now, his proposal only calls for access to smartphones and devices running mobile operating systems. While this policy in and of itself would cover a number of commonplace devices, it may eventually be expanded to cover laptop and desktop computers, as well as communications in transit. The expansion of this kind of policy is even more worrisome when taking into account the speed at which technology evolves and becomes widely adopted. Ten years ago, the iPhone did not even exist. Who is to say what technology will be commonplace in 10 or 20 years that is not even around today. There is a very real question about how far law enforcement will go to gain access to information. Things that once seemed like merely science fiction, such as wearable technology and artificial intelligence that could be implanted in and work with the human nervous system, are now available. If and when there comes a time when our “smart phone” is not really a device at all, but is rather an implant, surely we would not grant law enforcement access to our minds.
  • Policymakers should dismiss Vance’s proposal to prohibit the use of strong encryption to protect our smartphones and devices in order to ensure law enforcement access. Undermining encryption, regardless of whether it is protecting data in transit or at rest, would take us down a dangerous and harmful path. Instead, law enforcement and the intelligence community should be working to alter their skills and tactics in a fast-evolving technological world so that they are not so dependent on information that will increasingly be protected by encryption.
Paul Merrell

Courthouse News Service - 0 views

  • During secret proceedings in Washington, a key witness in undermining the $9.5 billion judgment Chevron faces in Ecuador repudiated much of his explosive testimony, transcripts made public today show.     Since agreeing to testify for the oil giant, Judge Alberto Guerra's fortunes have changed, and so have Chevron's.     Roughly two years ago, Guerra took to the witness stand in a New York federal courtroom and swore that lawyers for rainforest villagers bribed him to ghostwrite a multibillion-dollar Ecuadorean court judgment against Chevron for oil contamination to the Amazon jungle.     About a year before he made a deal with Chevron, Guerra had little more than $100 to his name. He also owed tens of thousands of dollars in debt and could not afford to visit his children living in the United States.     U.S. District Judge Lewis Kaplan had warned early on in proceedings that he did not "assume that anyone's hands in this are clean," yet he credited Guerra's testimony last year in ruling that the Ecuadoreans obtained their award "by corrupt means."     The Ecuadoreans have long attacked Guerra, who has a contract with Chevron for various perks, including at least $326,000, an immigration attorney and a car, as a "paid-for" participant in the oil giant's self-styled witness-protection program.     Kaplan's decision conceded that "Guerra's credibility is not impeccable," but found that his account was "corroborated extensively by independent evidence."
  • Both that credibility and the corroborating evidence came under withering attack this year during closed-door proceedings before an international arbitration tribunal.     Though the hearings took place without press or public access at the World Bank in Washington on April 23 and 24, the tribunal agreed to release transcripts of the proceedings in response to a Courthouse News request that the Reporters Committee for Freedom of the Press supported.     Courthouse News obtained advanced copies of more than 3,000 pages of transcripts, which were formally released on Monday.     They show Guerra putting a new twist on an old saying. "Money talks, gold screams," Guerra said in a June 25, 2012, meeting with Chevron representatives - a meeting Chevron recorded.     Testifying about this comment at the arbitration hearing, Guerra said Chevron showed him a safe filled with money. He recounted Chevron's representatives telling him: "Look, look, look what's down there. We have $20,000 there."     He remembered replying: "Oh, OK, very well, very well."     Guerra said he had only $146 in his bank account a year earlier, and owed tens of thousands more to finish the construction of his house. He said he could not scrape money for airfare to visit his children in the United States.
  •  Minutes from Guerra's meeting with Chevron that came to light during the tribunal proceedings showed that Chevron's lawyers hoped to find evidence that the Ecuadorean government had pressured the Guerra to rule against the company.     Guerra disappointed by saying that Ecuadorean President Rafael Correa's administration "never butted in" to the process, the transcript shows.     "These guys are idiots, but the truth, the truth, I attest, damn, they never got involved," Guerra added, referring to Correa's government.     The remark appears to undercut the foundation of Chevron's arbitration case, which asks the tribunal to blame the Ecuadorean government for a miscarriage of justice.     Guerra stood by those comments on the arbitration panel's witness stand.      "My position is that the government did not intervene," Guerra said.     The only time an Ecuadorean government official tried to elbow into the case, Guerra testified, was under a prior administration. Correa's predecessors pushed to dismiss the case in Chevron's favor in 2003, he said.
  • ...4 more annotations...
  •  Guerra also acknowledged bluntly on the witness stand that he had lied in telling Chevron's team that attorneys for the Ecuadoreans offered him $300,000.     "Yes, sir, I lied there," Guerra told Eric Bloom, who represents Ecuador for the firm Winston & Strawn. "I wasn't truthful."     Guerra maintains that other attorneys for the Ecuadoreans, specifically Steven Donziger and Pablo Fajardo, offered money in return for ghostwriting the judgment on behalf of Judge Nicolas Zambrano, the final jurist to preside over the case.     Shifting the details of this supposed arrangement, though, Guerra walked back his allegation that Zambrano offered him 20 percent.     "That was my sworn statement in New York, but what I said is that, because of a circumstance, because of a situation, I mentioned 20 percent when it wasn't true, and I think that, as a gentleman, I should say the truth, and we did not discuss - I did not discuss 20 percent with Mr. Zambrano - but we did discuss that he would share with me from what he received," he said.     In his nearly 500-page ruling, Judge Kaplan pointed to bank records, daily planners, shipping records and airplane tickets as corroborating evidence that outweighed Guerra's credibility problems.
  • Particularly persuasive for Kaplan was evidence that Ecuador's national airline, Tame, certified delivery of packages between Guerra and Zambrano.     Guerra told the arbitrators this spring, however, that all 11 of these packages "had nothing to do with the [Chevron] case."     As for his plane tickets to the rainforest from Aug. 11 and 12, 2010, Guerra said they occurred during an irrelevant time period.     "If I traveled during those dates, it wasn't for me to provide assistance to the Chevron case," he said.     Guerra testified that Chevron representatives told him that they would have raised his pay if he could provide them with the key physical evidence they were looking for: a draft of the judgment.     "We were unable to find the main document," Guerra recalled them saying. "Had we been able to find it, we would have been able to offer you a larger amount, something like that, we have $18,000 for you, and we're going to take the computer with us."     Though Guerra did not have a copy of the judgment, Ecuador's forensic expert Christopher Racich testified that he found a running draft of the judgment against Chevron on Zambrano's hard drives.
  • Ecuador now argues that this forensic evidence - which Courthouse News reported exclusively early this year - proves Zambrano painstakingly wrote the ruling and saved it hundreds of times throughout the case.     Chevron has not been able to produce emails between Guerra, Zambrano and the purported ghostwriters, Donziger and Fajardo, Ecuador's forensic expert says.     Guerra acknowledged to the arbitrators that that the bounty of physical evidence he promised Chevron fell short.     There are no calendars and day planners marked with meetings scheduled between Fajardo, Donziger or Guerra, he acknowledged.     While Guerra said he had payments from Zambrano from April 2011 and February 2012, he testified that these "had no connection to the Chevron case."     For Chevron, the thousands of pages of transcripts show that the company "proved its case before the International Arbitration Tribunal."     "Witness and expert testimony confirmed that the Ecuadorean judgment against Chevron was ghostwritten by Steven Donziger and his team and that the Ecuadorian government is responsible for any further remediation," Chevron spokesman Morgan Crinklaw said in a statement. "Chevron also proved that Ecuador breached the U.S.-Ecuador Bilateral Investment Treaty and international law."     Donziger, who still works for the Ecuadorean villagers seeking to collect from Chevron, said in a statement that Guerra's latest testimony "demonstrates once and for all that Chevron's so-called racketeering case has completely fallen apart."
  •   "Guerra has been the linchpin of Chevron's entire body of trumped up evidence and he now stands not only as an admitted liar, but also as a shocking symbol of how Chevron's management has become so obsessed with evading its legal obligations in Ecuador that it is willing to risk presenting false evidence in court to try to frame adversary counsel and undermine the rule of law," Donziger added.
  •  
    Chevron has a "witness-protection program" as an excuse for paying off witnesses? And for paying them to lie under oath, it appears. Never in my legal career did I ever here of a non-governmental entity with a witness protection program. This reeks to high heavens.  Hats off to Courthouse News for digging deep on this one.   
Paul Merrell

M of A - Syria - The U.S. Propaganda Shams Now Openly Fail - 0 views

  • The Obama administration, and especially the CIA and the State Department, seem to be in trouble. They shout everything they can against Russia and allege that the cleansing of east-Aleppo of al-Qaeda terrorist is genocidal. Meanwhile no mention is ever made of the famine of the Houthis in Yemen which the U.S. and Saudi bombing and their blockade directly causes.
  • But more and more major news accounts support the Russian allegation that the "moderate rebels" the U.S. is coddling in Syria are actually in cahoots with al-Qaeda if not al-Qaeda itself.
  • The new news reports follow after an interview by the German former politician and journalist Jürgen Todenhöfer with an al-Qaeda commander published in English on this site. The commander said that Nusra (aka al-Qaeda) were directly supplied, via a subgroup, with U.S. TOW missiles. He added about such groups: They are all with us. We are all the al-Nusra Front. A groups is created and calls itself "Islamic Army", or "Fateh al-Sham". Each group has its own name but their believe is homogeneous. The general name is al-Nusra Front. One person has, for example, 2,000 fighters. Then he creates from these a new group and calls it "Ahrar al-Sham". Brothers, who's believe, thoughts and aims are identical to those of al-Nusra Front. Another interview recently published by the former military Jack Murphy was with a Green Beret soldier who served in Turkey and Syria. The Green Berets are special forces of the U.S. army. They are specialists in training and  fighting with indigenous guerrilla groups against governments the U.S. dislikes. The soldier interviewed was ordered to train "moderate Syrian rebels" in Turkey. Parts of the interview (paywalled) are quoted here:
  • ...4 more annotations...
  • "No one on the ground believes in this mission or this effort”, a former Green Beret writes of America’s covert and clandestine programs to train and arm Syrian insurgents, “they know we are just training the next generation of jihadis, so they are sabotaging it by saying, ‘Fuck it, who cares?’”. “I don’t want to be responsible for Nusra guys saying they were trained by Americans,” the Green Beret added. ... Murphy states bluntly: “distinguishing between the FSA and al-Nusra is impossible, because they are virtually the same organization. As early as 2013, FSA commanders were defecting with their entire units to join al-Nusra. There, they still retain the FSA monicker, but it is merely for show, to give the appearance of secularism so they can maintain access to weaponry provided by the CIA and Saudi intelligence services. The reality is that the FSA is little more than a cover for the al-Qaeda-affiliated al-Nusra. ... It is one thing when Russia says somesthing, but another when Reuters, WSJ, and independent German and U.S. subject experts report this as facts. The first can be shunned as "Putin lies" but the others are extremely hard to refute. The Russians are right. The U.S. did not separate the "moderate rebels" from al Qaeda, as it had agreed to in the ceasefire agreement, because the "moderates" and al-Qaeda are the same. The "moderates" are al-Qaeda. This was not unknown. The 2012 Defense Intelligence Analysis said as much. The CIA of course knew this all along. But the Saudi tool heading the CIA, John Brennan, can not admit such as his masters in the Gulf are also the ones who finance al-Qaeda. They buy the weapons Brennan's people hadn over to al-Qaeda. The "end-user" according to this certificate for a weapon buy in Ukraine is Saudi Arabia. But who will believe that the Saudi dictators need for example 100 obsolete T-55 tanks? The weapons on the certificate, for an estimated $300-$500 million, are obviously for al-Qaeda in Yemen and in Syria. (Did Joe Biden or his son, both heavily engaged in Ukraine, get a provision from the deal?)
  • As the facts accumulate how long can the New York Times and Washington Post keep up with their propaganda claims. One has to admit, they really try their best. Unfortunately for them, their best is only mediocre. The NYT today found out that Vladimir Putin Relishes His Role as Disrupter. How does the NYT know what Putin "relishes"? The reporter did not ask Putin himself. But he did ask some knowledgeable experts with insight into Putin's inner mind and those assured the author that this is indeed the case. They know exactly how Putin feels. They are Richard Haass, the president of the Council on Foreign Relations, James R. Clapper Jr., the director of national intelligence, James B. Comey, the F.B.I. director and Robert Kagan, leading voice of of the neocons and Clinton promoter. Some "experts". Add that to dozens of stories on how "Russia indiscriminately bombs civilians/hospitals/bakeries in east-Aleppo" but never hits any "rebels" because none occur in these stories at all. A recent NYT piece of that kind had 14 "voices" in it. Eight belonged to various propagandists associated with the "White Helmets", four were "western" diplomats, one Syrian government official and a Russian spokesperson were quoted at the end. No Russian military and no one from west-Aleppo, where by far most people in the city live under government protection and daily rocket hail by the "rebels", were even asked. But all those tales we hear about the devilish Russians MUST be true! Even the 7 years old Bana Alabeb now tweets from east-Aleppo about her tragic fate under indiscriminate Russian assaults. This in perfect English and with an excellent WiFi and Internet connection as her many "White Helmets" photo attachments and her videos attest. But the whole city is devastated and in ruins she says, with phosphor bombs going off right in front of her house.
  • But Bana is a very responsible little lady: Bana Alabed @AlabedBana Dear world, it's better to start 3rd world war instead of letting Russia & assad commit #HolocaustAleppo 1:53 PM - 29 Sep 2016 Here "mother" phoned up the Daily Mail for an "exclusive" and assures us that this is all true. The Telegraph has her in a slideshow with sad music and the Guardian promotes her too. Another Gay Girl in Damascus media fail. In 2011 the Guardian also was part of that scam. If that 7-year old girl is in east-Aleppo and not in Denmark or the UK, I must be on Mars. No sane reader will take such a stunt serious. What Public Relation company came up with this sorry flimflam? Like the "moderate rebels" fantasy, such tales and the nonsense the "White Helmet" propaganda outlet distributes, are starting to fail. The UAE's National, a well established international newspaper, recently dug a bit around the White Helmet's creator, a "former" British military agent working for Gulf defense interests. That does not sound charitable. This is noticeable report, even as it still lacks any details, as it is the first in a major paper that shows some auspiciousness against that outlet. The Obama administration's lies about the "moderate rebels" are now openly discussed in major media. The propaganda of #HolocaustAleppo (isn't abusing the holocaust meme anti-semitic?) is turning into a laughing stock.
  • Russia is upping its stake in Syria. Additional Russian SU-24, SU-25 and SU-34 jets are arriving. Nearly 6,000 Russian soldiers are on the ground. The CIA's  al-Qaeda "rebels" are losing in east-Aleppo and are in stalemate and under pressure elsewhere. They will be bombed to smithereens. A few new BM-21 multiple missile launchers and heavier anti-air artillery was delivered to them. But those are just band-aids on lethally bleeding wounds. Even MANPADs will not change the situation one bit. The U.S., the Saudis and especially Brennan's CIA have lost that fight. Will Obama and Kerry admit it? Or will they throw another Hail Mary and do something crazy?
  •  
    I omitted a nice set of set of links in this article to MSM reports of Syiran "moderates" being one and the same with the jihadis.
Paul Merrell

Weapons Went From The CIA To ISIS In Less Than Two Months | Zero Hedge - 0 views

  • Years late to the party, mainstream media outlets like USA Today, Reuters, and Buzzfeed are just out with "breaking" and "exclusive" stories detailing how a vast arsenal of weapons sent to Syria by the CIA in cooperation with US allies fuelled the rapid growth of ISIS. Buzzfeed's story entitled, Blowback: ISIS Got A Powerful Missile The CIA Secretly Bought In Bulgaria, begins by referencing "a new report on how ISIS built its arsenal highlights how the US purchased munitions, intended for Syrian rebels, that ended up in the hands of the terrorist group." The original study that Buzzfeed and other media are referencing comes from a UK-based independent weapons research organization called Conflict Armament Research (CAR) which has had a team of weapons and munitions experts on the ground in the Middle East for years examining arms and equipment recovered from ISIS and other terrorist groups in Iraq and Syria. Using serial numbers, crate shipping markings, and all available forensics data, the CAR experts began finding that as early as 2013 to 2014 much of the Islamic State's advanced weapons systems as well as small arms were clearly sourced to the United States and the West. “Supplies of materiel into the Syrian conflict from foreign parties - notably the United States and Saudi Arabia - have indirectly allowed IS to obtain substantial quantities of anti-armor ammunition,” states the CAR report. “These weapons include anti-tank guided weapons and several varieties of rocket with tandem warheads, which are designed to defeat modern reactive armor.”
  • The study further reveals that in one notable instance, a weapons shipment of advanced missile systems switched hands from US intelligence to "moderate" Syrian groups to ISIS in only a two month time period. Though the report is now evoking shock and confusion among pundits, the same weapons research group has actually published similar findings and conclusions going years back into the Syrian conflict.  For example, a previous 2014 Conflict Armament Research report found that Balkan origin anti-tank rockets recovered from ISIS fighters appeared identical to those shipped in 2013 to Syrian rebel forces as part of a CIA program. And CAR's damning publications presenting such inconvenient empirical data have been consistent for years, yet were largely ignored and suppressed by analysts and mainstream media who were too busy cheerleading US support for Syrian "rebels" cast as romantic revolutionaries in their struggle to topple Assad and his secular nationalist government. Of course, it's an old story if you've been reading Zero Hedge or the profusion of independent outlets that have long reported the truth about the covert "dirty war" in Syria since nearly the beginning. 
  • Even though it's now suddenly acceptable and fashionable to admit - as does one recent BBC headline ("The Jihadis You Pay For") - that the US and Saudi covert program in Syria fuelled the rise of ISIS and various other al-Qaeda linked terror groups, it must be remembered that only a short time ago the mainstream media openly mocked analysts and writers who dared make the connection between the West's massive covert Syrian rebel aid programs and the al-Qaeda insurgents who so clearly benefited. When news of the 2012 Defense Intelligence Agency report  broke, which described what it called a "Salafist principality" or "an Islamic State" as a strategic asset or buffer in Syria that could be used by the Western coalition "in order to isolate the Syrian regime", American media outlets dismissed what was labelled a "conspiracy theory" at the time in spite of the hard evidence of a US military intelligence report being made available. The Daily Beast for example mocked what it called "The ISIS Conspiracy Theory that Ate the Web" - describing those analyzing the Pentagon intelligence document as far-right and far-left loons. This occurred even as the document was taken very seriously and analyzed in-depth by some of the world's foremost Middle East experts and investigative journalists in foreign outlets like the London Review of Books, The Guardian, Der Spiegal , as well as RT and Al Jazeera.
Paul Merrell

Syria ready to unleash missiles on Israel | The Sunday Times - 0 views

  • SYRIA has put its most advanced missiles on standby with orders to hit Tel Aviv if Israel launches another raid on its territory. Reconnaissance satellites have been monitoring preparations by the Syrian army to deploy surface-to-surface Tishreen missiles. An Israeli official told The New York Times that Israel, which has launched three recent attacks on Syria, was considering further strikes and warned President Bashar al-Assad that his government would face “crippling consequences” if he hit back at Israel.
  • All parties fear hostilities spreading beyond Syria’s borders. Faisal al-Miqdad, Syria’s deputy foreign minister, said last week that the Israeli airstrikes represented “a declaration of war”.
  • Some Israeli defence experts believe that if Israel strikes again, Assad will have little choice but to retaliate. “The Tishreen missiles are extremely accurate and can cause serious harm,” said Uzi Rubin, Israel’s leading missile expert. He said Syria had large stocks of Tishreens. Referring to Israel’s main international airport, he said: “Even if they don’t hit Ben-Gurion directly, they would halt all commercial flights out of the country.”
Paul Merrell

Sarin gas use doubted - MontereyHerald.com : - 0 views

  • Chemical weapons experts voiced skepticism Friday about U.S. claims that the government of Syrian President Bashar Assad had used the nerve agent sarin against rebels on at least four occasions this spring, saying that while the use of such a weapons is always possible, they've yet to see the telltale signs of a sarin gas attack, despite months of scrutiny. "It's not unlike Sherlock Holmes and the dog that didn't bark," said Jean Pascal Zanders, a leading expert on chemical weapons who until recently was a senior research fellow at the European Union's Institute for Security Studies. "It's not just that we can't prove a sarin attack; it's that we're not seeing what we would expect to see from a sarin attack."
Gary Edwards

HBL - The Harry Binswanger List - 0 views

  •  
    WOW!  Renown Ayn Rand expert, Harry Binswanger, discusses the 2012 election big media accusation that Romney is "short on specifics".  (Not that Obama ever provided anything close to a specific explanation, but there it is.)  In his discussion, Harry describes exactly how to present "principles" that then can be easily connected to "specifics".   Incredible read. excerpt: "Here's a sample of what an ideal candidate would say, first in terms of principles: "The only proper function of government is to protect individual rights, and the only way rights can be violated is by the initiation of physical force. Under my administration, we will return to the original American system in which the government uses its physical force only in retaliation against those who initiate its use in violation of individual rights. The fundamental right is the right to life, and its corollaries include the right to private property, without which no other rights are possible." He could then go on to name policy goals that represent mid-level abstractions: "Entitlement programs are the initiation of force; they seize the property of some to provide unearned benefits to others. This is immoral; it is a legalized equivalent of theft. Thus, I will drastically cut entitlement spending-whether "discretionary" or not. Another area of initiated government force is regulation. Regulation by its nature is preventive law, interfering with the lives of the innocent in order to (supposedly) prevent the guilty from acting. This is force initiated against the innocent, so I will drastically cut the number and scope of regulations over the same 4 years." Now the real fun comes when, having established this context, he gets to specifics: "My first budget will cut funds for all departments, except Defense, to 15% below what they received the previous year. This is an across-the-board cut, not something to become the subject of infighting among departments. Then in my next budget I will cut 15%
Gary Edwards

75 Economic Numbers From 2012 That Are Almost Too Crazy To Believe - 0 views

  •  
    Thanks to Marbux we have this extraordinary collection of facts and figures describing the economic catastrophe that has hit the USA.  excerpt: "What a year 2012 has been!  The mainstream media continues to tell us what a "great job" the Obama administration and the Federal Reserve are doing of managing the economy, but meanwhile things just continue to get even worse for the poor and the middle class.  It is imperative that we educate the American people about the true condition of our economy and about why all of this is happening.  If nothing is done, our debt problems will continue to get worse, millions of jobs will continue to leave the country, small businesses will continue to be suffocated, the middle class will continue to collapse, and poverty in the United States will continue to explode.  Just "tweaking" things slightly is not going to fix our economy.  We need a fundamental change in direction.  Right now we are living in a bubble of debt-fueled false prosperity that allows us to continue to consume far more wealth than we produce, but when that bubble bursts we are going to experience the most painful economic "adjustment" that America has ever gone through.  We need to be able to explain to our fellow Americans what is coming, why it is coming and what needs to be done.  Hopefully the crazy economic numbers that I have included in this article will be shocking enough to wake some people up. The end of the year is a time when people tend to gather with family and friends more than they do during the rest of the year.  Hopefully many of you will use the list below as a tool to help start some conversations about the coming economic collapse with your loved ones.  Sadly, most Americans still tend to doubt that we are heading into economic oblivion.  So if you have someone among your family and friends that believes that everything is going to be "just fine", just show them these numbers.  They are a good summary of the problems that the U
Gary Edwards

I Am a Peaceful AR-15 Assault Rifle Owner | Casey Research - 0 views

  •  
    ""Firearms stand next in importance to the constitution itself. They are the American people's liberty teeth and keystone under independence … from the hour the Pilgrims landed to the present day, events, occurances and tendencies prove that to ensure peace security and happiness, the rifle and pistol are equally indispensable … the very atmosphere of firearms anywhere restrains evil interference - they deserve a place of honor with all that's good." George Washington I can't think of any reason I need to own my AR-15 assault[1] rifle. I don't pretend to need it for self defense. I also own several handguns. Any one of my handguns would be adequate to allow me an opportunity to defend myself, or another person, from virtually any act of aggression by another individual. Indeed, I could have easily halted any of the recent gun based rampages, by any of those deranged lunatics, with just one of my handguns. I wish I had been there. I have needlessly and peacefully owned my AR-15 for many years. I keep my AR-15 securely locked in a gun safe in the very same home where my young children live. My children are aware of my AR-15. Like many other things in life, I have taught my children about guns. Recently, some of my kids attended a private gun safety class given by a highly experienced gun expert. I enjoyed watching my kids learn about my AR-15. I admit being a bit nostalgic about my AR-15. I spent lots of time learning about every aspect of the AR-15 when I was in Marine Corps boot camp at Parris Island, South Carolina. I also carried an AR-15 when I served my country in Operation Desert Storm in Saudi Arabia. I had it with me when I lived in a dirt hole on the border of Kuwait. It is the weapon I know better than any other. I own lots of dangerous things I don't need. I don't need my highly modified 600+ hp Z06 Corvette, or my Harley Davidson motorcycle, or that crazy looking knife I sometimes jokingly say was imported directly from the Klingon Empire.[2] Al
Gary Edwards

Obama's Taqqiya Unravels - Nonie Darwish - 0 views

  •  
    Perhaps the clearest and most direct explanation yet concerning the Benghazi Massacre and the once strapping young Muslim-Socialist in the White House.   excerpt: "I have never entertained the idea that Obama was a Muslim and always believed he was a socialist. But Obama's behavior over the last four years regarding Islam has convinced me that Obama has a Socialist/Islamic centered worldview -- a combination that is not uncommon in many parts of the Muslim world. Having been a journalist in Egypt for six years in the seventies, I have witnessed socialism with an Islamic twist to be a popular political ideology, especially amongst Arab journalists and intellectuals. Socialism, and even communism, have managed to survive in the ruthless Islamic political system as an alternative to full-fledged Sharia. The two ideologies have blended together in cases including the Baath Party in Syria and Iraq and socialist regimes in Egypt and Yemen. One major difference between the two ideologies is that Islam uses Allah, while socialism uses atheism, to fight the God of Christianity. Free democracies, such as the United States, are alien to Islam and socialism both because they regard government as a servant of the people and hold that human rights are granted by God and not by government or the code of Sharia. Both Sharia and socialism are united in their envy of Western society and need to change it. That is why Obama has become the savior of both Islam and socialism. He embodies both ideologies. The claim that Obama is a Christian was a silly joke, but a necessary lie for the greater cause of changing America to fit the goals of both creeds. Obama became the One, the savior of both Islam and socialists. To do that, Obama had to deny who he really was, which explains why his actions and words have never added up. At the recent Alfred E. Smith Catholic Charity dinner speech, Obama did not seem to be just kidding when he said that Romney uses his middle name Mitt and "I wish I c
  •  
    I can't see Obama as a Muslim, a Christian, or a Socialist. He is simply too corrupt to honestly subscribe to any ideology other than Corruption.
« First ‹ Previous 41 - 60 of 403 Next › Last »
Showing 20 items per page