Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged Microsoft

Rss Feed Group items tagged

Paul Merrell

Britain has passed the 'most extreme surveillance law ever passed in a democracy' | ZDNet - 0 views

  • It's 2016 going on 1984. The UK has just passed a massive expansion in surveillance powers, which critics have called "terrifying" and "dangerous".
  • The new law, dubbed the "snoopers' charter", was introduced by then-home secretary Theresa May in 2012, and took two attempts to get passed into law following breakdowns in the previous coalition government. Four years and a general election later -- May is now prime minister -- the bill was finalized and passed on Wednesday by both parliamentary houses. But civil liberties groups have long criticized the bill, with some arguing that the law will let the UK government "document everything we do online". It's no wonder, because it basically does. The law will force internet providers to record every internet customer's top-level web history in real-time for up to a year, which can be accessed by numerous government departments; force companies to decrypt data on demand -- though the government has never been that clear on exactly how it forces foreign firms to do that that; and even disclose any new security features in products before they launch.
  • Not only that, the law also gives the intelligence agencies the power to hack into computers and devices of citizens (known as equipment interference), although some protected professions -- such as journalists and medical staff -- are layered with marginally better protections. In other words, it's the "most extreme surveillance law ever passed in a democracy," according to Jim Killock, director of the Open Rights Group. The bill was opposed by representatives of the United Nations, all major UK and many leading global privacy and rights groups, and a host of Silicon Valley tech companies alike. Even the parliamentary committee tasked with scrutinizing the bill called some of its provisions "vague".
  • ...1 more annotation...
  • And that doesn't even account for the three-quarters of people who think privacy, which this law almost entirely erodes, is a human right. There are some safeguards, however, such as a "double lock" system so that the secretary of state and an independent judicial commissioner must agree on a decision to carry out search warrants (though one member of the House of Lords disputed that claim). A new investigatory powers commissioner will also oversee the use of the powers. Despite the uproar, the government's opposition failed to scrutinize any significant amendments and abstained from the final vote. Killock said recently that the opposition Labour party spent its time "simply failing to hold the government to account". But the government has downplayed much of the controversy surrounding the bill. The government has consistently argued that the bill isn't drastically new, but instead reworks the old and outdated Regulation of Investigatory Powers Act (RIPA). This was brought into law in 2000, to "legitimize" new powers that were conducted or ruled on in secret, like collecting data in bulk and hacking into networks, which was revealed during the Edward Snowden affair. Much of those activities were only possible thanks to litigation by one advocacy group, Privacy International, which helped push these secret practices into the public domain while forcing the government to scramble to explain why these practices were legal. The law will be ratified by royal assent in the coming weeks.
Paul Merrell

Will Trump hop on an American Silk Road? | Asia Times - 0 views

  • ysteria reigns supreme at the dawn of the Trump era, with the President rebranded across the whole ideological spectrum as an American Mao or even an American Hitler. Let’s step away from this “American [media] carnage” to examine a few facts concerning the unofficial G2: US-China relations. A case can be made that Beijing has already landed a 1-2-3 punch, pre-empting the possibility of a US-initiated trade war.
  • It started with Jack Ma’s by now notorious visit to Trump Tower, when he developed his idea of helping small American businesses sell their products in China and across Asia through Alibaba’s network, thus creating at least “1 million jobs” (Ma’s number) in the US. Then came President Xi Jinping’s masterclass at Davos, where he positioned himself as Ronald Xi Reagan selling “inclusive” globalization to the stalwarts of international turbo-capitalism. Finally Ma again, also at Davos, came up with a crystal clear, cause-and-effect formulation on globalization and US economic distress.
  • Ma said, “In the past 30 years, companies like IBM, Cisco and Microsoft made tons of money.” The problem was how the US spent the wealth: “In the past 30 years, America has had 13 wars at a cost of US$14.2 trillion.” So what if the US “had spent part of that money on building up their infrastructure, helping white-collar and blue-collar workers? You’re supposed to spend money on your own people. It’s not that other countries steal American jobs. It is your strategy – that you did not distribute the money in a proper way.” In the meantime, something quite extraordinary happened at the Asian Financial Forum in Hong Kong, one day before Xi’s Davos speech. China Investment Corporation (CIC) chairman Ding Xuedong, referring to Trump’s much-vaunted US$1 trillion infrastructure building plan, said that created fabulous investment opportunities for China and his US$800 billion sovereign fund. According to Ding, Washington will need at least an astonishing US$8 trillion to fund the infrastructure spectacular. Federal government and US private investors are not enough: “They have to rely on foreign investors.” And CIC is ready for it – focusing already on “alternative investments in the US”.
  •  
    Pepe Escobar
Gary Edwards

Character Matters and Mitt Romney has it - 1 views

The following eMail message is being forwarded around the Web and it does confirm my own personal experiences with then Governor Romney in 2005-2006. The issue then was the Massachusetts Open Gove...

Romney ODF Massachusetts-Lesson Massachusetts-RFi Microsoft OOXML

started by Gary Edwards on 17 Apr 12 no follow-up yet
Paul Merrell

In Keeping Grip on Data Pipeline, Obama Does Little to Reassure Industry - NYTimes.com - 0 views

  • Google, which briefly considered moving all of its computer servers out of the United States last year after learning how they had been penetrated by the National Security Agency, was looking for a public assurance from President Obama that the government would no longer secretly suck data from the company’s corner of the Internet cloud.Microsoft was listening to see if Mr. Obama would adopt a recommendation from his advisers that the government stop routinely stockpiling flaws in its Windows operating system, then using them to penetrate some foreign computer systems and, in rare cases, launch cyberattacks.
  • Intel and computer security companies were eager to hear Mr. Obama embrace a commitment that the United States would never knowingly move to weaken encryption systems. They got none of that.
  • Perhaps the most striking element of Mr. Obama’s speech on Friday was what it omitted: While he bolstered some protections for citizens who fear the N.S.A. is downloading their every dial, tweet and text message, he did nothing, at least yet, to loosen the agency’s grip on the world’s digital pipelines. White House officials said that Mr. Obama was committed to studying the complaints by American industry that the revelations were costing them billions of dollars in business overseas, by giving everyone from the Germans to the Brazilians to the Chinese an excuse to avoid American hardware and cloud services. “The most interesting part of this speech was not how the president weighed individual privacy against the N.S.A.,” said Fred H. Cate, the director of the Center of Applied Cybersecurity Research at Indiana University, “but that he said little about what to do about the agency’s practice of vacuuming up everything it can get its hands on.”
  • ...4 more annotations...
  • In fact, behind the speech lies a struggle Mr. Obama nodded at but never addressed head on. It pits corporations that view themselves as the core of America’s soft power around the world — the country’s economic driver and the guardians of its innovative edge — against an intelligence community 100,000 strong that regards its ability to peer into any corner of the digital world, and manipulate it if necessary, as crucial to the country’s security.In public, the coalition was polite if unenthusiastic about the president’s speech. His proposals, the companies said in a statement, “represent positive progress on key issues,” even while “crucial details remain to be addressed on these issues, and additional steps are needed on other important issues.” But in the online chat rooms that users and employees of those services inhabit each day, the president’s words were mocked. “If they really cared about the security of US infrastructure, they’d divulge the vulnerabilities they found or bought from the black market that exploit the security of these systems, so those systems can be fixed, and no one else can exploit them with these exploits,” wrote a user called “higherpurpose” on Hacker News.
  • In an interview, a senior administration official acknowledged that the administration had weighed what the president could say in public about the delicate problems of encryption, or the N.S.A.’s use of “zero day” flaws in software, the name for security holes that have never been seen before. It is a subject the intelligence agencies have refused to discuss in public, and Mr. Obama determined that it was both too secret, and too fluid, to discuss in the speech, officials said.In response to questions, the White House said the president had asked his special assistant for cybersecurity, Michael Daniel, and the president’s office of science and technology policy to study a recent advisory panel’s recommendation that the government get out of the business of corrupting the encryption systems created by American companies.
  • It will not be an easy task. One of the recent disclosures, first reported by Reuters, indicated that the N.S.A. paid millions of dollars to RSA, a major encryption firm, to incorporate a deliberately weakened algorithm into some of its products, giving the government a “back door” to read whatever it wanted. But when the advisory panel concluded that the United States should not “in any way subvert, weaken or make vulnerable generally available commercial software,” the intelligence agencies protested.“Some in the intelligence community saw that as a call for the N.S.A. to get out of cryptography, which is the reason they were created,” the senior official said. He added: “We’ve said that we are very much supportive of U.S. industry and making sure that U.S. industry remains competitive, and able to produce really good products. And N.S.A. has been out there saying they have no interest in breaking encryption that guards global commerce.”
  • But as Mr. Obama himself acknowledged, the United States has a credibility problem that will take years to address. The discovery that it had monitored the cellphone of Chancellor Angela Merkel of Germany, or that it has now found a way to tap into computers around the world that are completely disconnected from the Internet — using covert radio waves — only fuels the argument that American products cannot be trusted.That argument, heard these days from Berlin to Mexico City, may only be an excuse for protectionism. But it is an excuse that often works.
Paul Merrell

Tech giants reach White House deal on NSA surveillance of customer data | World news | ... - 0 views

  • The Obama administration has reached a deal with a number of technology giants, allowing the companies to disclose more information on customer data they are compelled to share with the government.Announced on Monday, the transparency arrangement ends months of legal wrangling between the companies and US intelligence agencies before a secret surveillance court, to compel the disclosures.The disclosures are to be nonspecific, listed by the thousand and subject in some cases to a six-month delay – speaking to the large quantities of data that the government still plans on collecting from its technology partners. In order to be more specific about the amount of data turned over, the companies must be less specific about the type of data it is.The deal also explicitly points to a delay of up to two years on revealing information on data collected under surveillance programs the National Security Agency may yet develop.
  • But the deal also purports to shed far more light than ever on a question the intelligence agencies have been extremely reluctant to address – the number of people affected by NSA surveillance.The Justice Department said the transparency deal also applies to phone companies that turn over, on a daily basis, the records of every phone call made in the US. The phone companies have not exhibited the same agitation for transparency in the wake of the Edward Snowden revelations as have tech firms.
  • The new arrangement addresses a major grievance held by Google, Yahoo, Microsoft, Facebook and LinkedIn, which all joined a coalition called Reform Government Surveillance in order to pressure the administration into reassuring their customers about the propriety and legality of giving vast amounts of data to the NSA, FBI and other government agencies. It does not curtail the amount of data demanded, which is another demand of the coalition. 
  • ...2 more annotations...
  • Additionally, once the NSA or other government agency develops a surveillance effort on “a platform, product or service (whether developed or acquired) for which the company has not previously received such an order”, the firms must wait two years before disclosure of its existence. Such “new capability orders” would subsequently be subject to the same biannual reporting requirements after the two-year period expires.
  • The five firms that were party to the Fisa court transparency suit agreed to drop their case, according to a document released by the court on Monday. Civil libertarians were optimistic about the deal. 
Paul Merrell

NSA spied on Indian embassy and UN mission, Edward Snowden files reveal | World news | ... - 0 views

  • The US National Security Agency may have accessed computers within the Indian embassy in Washington and mission at the United Nations in New York as part of a huge clandestine effort to mine electronic data held by its south Asian ally.Documents released by the US whistleblower Edward Snowden also reveal the extent and aggressive nature of other NSA datamining exercises targeting India as recently as March of this year.The latest revelations – published in the Hindu newspaper – came as Manmohan Singh, the Indian prime minister, flew to Europe on his way to the US, where he will meet President Barack Obama.The NSA operation targeting India used two datamining tools, Boundless Informant and Prism, a system allowing the agency easy access to the personal information of non-US nationals from the databases of some of the world's biggest tech companies, including Apple, Google, Microsoft and Yahoo.
  • The largest amount of intelligence was gathered from Iran, with more than 14bn reports in that period, followed by 13.5bn from Pakistan. Jordan, one of America's closest Arab allies, came third with 12.7bn, Egypt fourth with 7.6bn and India fifth with 6.3bn.
  • According to one document obtained by the Hindu, the US agency used the Prism programme to gather information on India's domestic politics and the country's strategic and commercial interests, specifically categories designated as nuclear, space and politics.
  • ...3 more annotations...
  • A further NSA document obtained by the Hindu suggests the agency selected the office of India's mission at the UN in New York and the country's Washington embassy as "location targets" where records of Internet traffic, emails, telephone and office conversations – and even official documents stored digitally – could potentially be accessed after programs had been clandestinely inserted into computers.In March 2013, the NSA collected 6.3bn pieces of information from internet networks in India and 6.2bn pieces of information from the country's telephone networks during the same period, the Hindu said.After the Guardian reported in June that Pm program allowed the NSA "to obtain targeted communications without having to request them from the service providers and without having to obtain individual court orders", both US and Indian officials claimed no content was being taken from the country's networks and that the programs were intended to aid "counter-terrorism".
  • A home ministry official told the newspaper the government had been "rattled" to discover the extent of the the programme's interest in India. "It's not just violation of our sovereignty, it's a complete intrusion into our decision-making process," the official said.
  • The Hindu argued that "the targeting of India's politics and space programme by the NSA busts the myth of close strategic partnership between India and US", pointing out that the other countries targeted in the same way as India "are generally seen as adversarial" by Washington.
  •  
    An important bit of proof that NSA digital surveillance involves far more than counter-terrorism. 
Paul Merrell

Germany to send intelligence chiefs to U.S. over Merkel allegations - chicagotribune.com - 0 views

  • Germany will send its top intelligence chiefs to Washington next week to seek answers from the White House on allegations that U.S. security officials tapped the mobile phone of Chancellor Angela Merkel.
  • Berlin will dispatch the heads of its foreign intelligence agency BND and of its domestic counterpart, the BfV. Merkel's chief of staff Ronald Pofalla, who is responsible for the intelligence services, may also join them.
  • German Chancellor Angela Merkel demanded on Thursday that the United States strike a "no-spying" agreement with Berlin and Paris by the end of the year, saying alleged espionage against two of Washington's closest EU allies had to be stopped. Speaking after talks with EU leaders that were dominated by allegations that the U.S. National Security Agency had accessed tens of thousands of French phone records and monitored Merkel's private mobile phone, the chancellor said she wanted action from President Barack Obama, not just apologetic words. Germany and France would seek a "mutual understanding" with the United States on cooperation between their intelligence agencies, and other EU member states could eventually take part. "That means a framework for cooperation between the relevant (intelligence) services. Germany and France have taken the initiative and other member states will join," she said.
  • ...4 more annotations...
  • As EU leaders arrived for the two-day summit there was near-universal condemnation of the alleged activities by the NSA, particularly the monitoring of Merkel's mobile phone, a sensitive issue for a woman who grew up in East Germany, living under the Stasi police force and its feared eavesdropping.
  • Some senior German officials, and the German president of the European Parliament, have called for talks between the EU and United States on a free-trade agreement, which began in July, to be suspended because of the spying allegations. Merkel, whose country is one of the world's leading exporters and stands to gain from any trade deal with Washington, said that was not the right path to take, saying the best way forward was to rebuild trust. The series of Snowden-based leaks over the past three months have left Washington at odds with a host of important allies, from Brazil to Saudi Arabia, and there are few signs that the revelations are going to dry up anytime soon.
  • As well as raising questions about the EU-US trade negotiations, the spying furor could also have an impact on data-privacy legislation working its way through the EU. The European Parliament has already opened an inquiry into the effect on Europe of U.S. intelligence activities revealed by former NSA contractor Edward Snowden. It has also led a push for tougher data protection rules and the suspension of a transatlantic data-sharing deal. The Parliament, with 766 members directly elected from the EU's 28 member states, voted this week in favor of an amended package of laws that would greatly strengthen EU data protection rules that date from 1995. The new rules would restrict how data collected in Europe by firms such as Google and Facebook is shared with non-EU countries, introduce the right of EU citizens to request that their digital traces be erased, and impose fines of 100 million euros ($138 million) or more on rule breakers.
  • The United States is concerned the regulations, if they enter into law, will raise the cost of handling data in Europe. Google, Yahoo!, Microsoft and others have lobbied hard against the proposals. Given the spying accusations, France and Germany - the two most influential countries in EU policy - may succeed in getting member states to push ahead on negotiations with the parliament to complete the new data regulations by 2015. For the United States, it could substantially change how data privacy rules are implemented globally.
  •  
    I'd like to have a "no spying" agreement with the Feds too.  
Paul Merrell

N.S.A. Spied on Allies, Aid Groups and Businesses - NYTimes.com - 0 views

  • Secret documents reveal more than 1,000 targets of American and British surveillance in recent years, including the office of an Israeli prime minister, heads of international aid organizations, foreign energy companies and a European Union official involved in antitrust battles with American technology businesses.
  • While the names of some political and diplomatic leaders have previously emerged as targets, the newly disclosed intelligence documents provide a much fuller portrait of the spies’ sweeping interests in more than 60 countries. Britain’s Government Communications Headquarters, working closely with the National Security Agency, monitored the communications of senior European Union officials, foreign leaders including African heads of state and sometimes their family members, directors of United Nations and other relief programs, and officials overseeing oil and finance ministries, according to the documents. In addition to Israel, some targets involved close allies like France and Germany, where tensions have already erupted over recent revelations about spying by the N.S.A.
  • Details of the surveillance are described in documents from the N.S.A. and Britain’s eavesdropping agency, known as GCHQ, dating from 2008 to 2011. The target lists appear in a set of GCHQ reports that sometimes identify which agency requested the surveillance, but more often do not. The documents were leaked by the former N.S.A. contractor Edward J. Snowden and shared by The New York Times, The Guardian and Der Spiegel. The reports are spare, technical bulletins produced as the spies, typically working out of British intelligence sites, systematically tapped one international communications link after another, focusing especially on satellite transmissions. The value of each link is gauged, in part, by the number of surveillance targets found to be using it for emails, text messages or phone calls. More than 1,000 targets, which also include people suspected of being terrorists or militants, are in the reports. It is unclear what the eavesdroppers gleaned. The documents include a few fragmentary transcripts of conversations and messages, but otherwise contain only hints that further information was available elsewhere, possibly in a larger database.
  • ...8 more annotations...
  • Ms. Hansen, the spokeswoman for the European Commission, said that it was already engaged in talks with the United States that were “needed to restore trust and confidence in the trans-Atlantic relationship.” She added that “the commission will raise these new allegations with U.S. and U.K. authorities.”
  • Also appearing on the surveillance lists is Joaquín Almunia, vice president of the European Commission, which, among other powers, has oversight of antitrust issues in Europe. The commission has broad authority over local and foreign companies, and it has punished a number of American companies, including Microsoft and Intel, with heavy fines for hampering fair competition. The reports say that spies intercepted Mr. Almunia’s communications in 2008 and 2009. Mr. Almunia, a Spaniard, assumed direct authority over the commission’s antitrust office in 2010. He has been involved in a three-year standoff with Google over how the company runs its search engine. Competitors of the online giant had complained that it was prioritizing its own search results and using content like travel reviews and ratings from other websites without permission. While pushing for a settlement with Google, Mr. Almunia has warned that the company could face large fines if it does not cooperate.
  • Some condemned the surveillance on Friday as unjustified and improper. “This is not the type of behavior that we expect from strategic partners,” Pia Ahrenkilde Hansen, a spokeswoman for the European Commission, said on the latest revelations of American and British spying in Europe. Some of the surveillance relates to issues that are being scrutinized by President Obama and a panel he appointed in Washington that on Wednesday recommended tighter limits on the N.S.A., particularly on spying of foreign leaders, especially allies.
  • “We do not use our foreign intelligence capabilities to steal the trade secrets of foreign companies on behalf of — or give intelligence we collect to — U.S. companies to enhance their international competitiveness or increase their bottom line,” said Vanee Vines, an N.S.A. spokeswoman. But she added that some economic spying was justified by national security needs. “The intelligence community’s efforts to understand economic systems and policies, and monitor anomalous economic activities, are critical to providing policy makers with the information they need to make informed decisions that are in the best interest of our national security,” Ms. Vines said.
  • The surveillance reports show American and British spies’ deep appetite for information. The French companies Total, the oil and gas giant, and Thales, an electronics, logistics and transportation outfit, appear as targets, as do a French ambassador, an “Estonian Skype security team” and the German Embassy in Rwanda.
  • Multiple United Nations Missions in Geneva are listed as targets, including Unicef and the United Nations Institute for Disarmament Research. So is Médecins du Monde, a medical relief organization that goes into war-ravaged areas. Leigh Daynes, an executive director of the organization in Britain, responded to news about the surveillance by saying: “There is absolutely no reason for our operations to be secretly monitored.” More obvious intelligence targets are also listed, though in smaller numbers, including people identified as “Israeli grey arms dealer,” “Taleban ministry of refugee affairs” and “various entities in Beijing.” Some of those included are described as possible members of Al Qaeda, and as suspected extremists or jihadists.
  • While few if any American citizens appear to be named in the documents, they make clear that some of the intercepted communications either began or ended in the United States and that N.S.A. facilities carried out interceptions around the world in collaboration with their British partners. Some of the interceptions appear to have been made at the Sugar Grove, W.Va., listening post run by the N.S.A. and code-named Timberline, and some are explicitly tied to N.S.A. target lists in the reports.
  • Strengthening the likelihood that full transcripts were taken during the intercepts is the case of Mohamed Ibn Chambas, an official of the Economic Community of West African States, known as Ecowas, a regional initiative of 15 countries that promotes economic and industrial activity. Whether intentionally or through some oversight, when Mr. Chambas’s communications were intercepted in August 2009, dozens of his complete text messages were copied into one of the reports.
  •  
    No mention of any "terrorist" targets. Could it be that Snowden and Greenwald are right, that the surveillance is not about terrorism at all? Surely our nation's leaders would not lie to us about that. Right. The Politics of Fear.
Gary Edwards

Seymour M. Hersh · The Red Line and the Rat Line · LRB 6 April 2014 - 0 views

  • In 2011 Barack Obama led an allied military intervention in Libya without consulting the US Congress. Last August, after the sarin attack on the Damascus suburb of Ghouta, he was ready to launch an allied air strike, this time to punish the Syrian government for allegedly crossing the ‘red line’ he had set in 2012 on the use of chemical weapons.[*]​* Then with less than two days to go before the planned strike, he announced that he would seek congressional approval for the intervention. The strike was postponed as Congress prepared for hearings, and subsequently cancelled when Obama accepted Assad’s offer to relinquish his chemical arsenal in a deal brokered by Russia. Why did Obama delay and then relent on Syria when he was not shy about rushing into Libya? The answer lies in a clash between those in the administration who were committed to enforcing the red line, and military leaders who thought that going to war was both unjustified and potentially disastrous.
  •  
    Sy Hersh walks us through his investigation into the reasons behind Obama's last-minute decision to postpone missile (and as it turns out, B52) strikes on Syria. His trail leads through the Benghazi incident and the CIA's running of weapons from Libya to jihadists in Syria (the "rat line") through Turkey engineering a false flag gas attack in Syria to draw Obama into attacking Syria for crossing his "red line" against Syrian use of chemical weapons. Note that Hersh's account of the "red line" events largely fits with the earlier accounts by Yossef Bodansky.  http://oilprice.com/Geopolitics/Middle-East/Syrian-Chemical-Attack-More-Evidence-Only-Leads-to-More-Questions.html http://www.worldtribune.com/2013/09/09/new-granular-evidence-points-to-saudi-involvement-in-syrias-chemical-weapons-terror-attack/ http://www.globalresearch.ca/did-the-white-house-help-plan-the-syrian-chemical-attack Note however that Hersh's account omits Bodansky's evidence that the U.S. State Department and CIA were part of the planning for the false flag attack.
  • ...1 more comment...
  •  
    Note also the previous account by Wayne Madsen of events leading Obama to postpone his atack on Syria. http://www.strategic-culture.org/news/2013/09/04/american-generals-stand-between-war-and-peace.html "Obama is faced with another grim reality. Some within the Pentagon ranks are so displeased with Obama's policies on Syria, they have let certain members of Congress of both parties know that «smoking gun» proof exists that Obama and CIA director John O. Brennan personally authorized the transfer of arms and personnel from Al-Qaeda-linked Ansar al Sharia Islamist rebels in Libya to Syria's Jabhat al Nusra rebels, who are also linked to Al Qaeda, in what amounts to an illegal «Iran-contra»-like scandal. The proof is said to be highly «[un]impeachable»." This is another "red line" / "rat line" tie, suggesting that the reason the Benghazi investigation has not produced an even larger scandal is that it would expose the War Party's efforts to supply captured Libyan arms to jihadists in Syria.  On the Iran/Contra parallel, note that bills to approve supply of weapons to Syrian "rebels" were then stalled in Congress, evidencing Congressional intent that it rather than the President would authorize arming the "rebel" forces. The fact that CIA and the State Dept. were already covertly doing so completes the Iran/Contra scandal analogy.
  •  
    See also Hersh's article in December 2013, establishing that the White House had "cooked" the alleged evidence offered in support of Obama's claim that Syria had been responsible for the attack. It also establishes Obama's prior knowledge that the "rebel" forces had sarin weapons. http://www.lrb.co.uk/v35/n24/seymour-m-hersh/whose-sarin
  •  
    "The Red Line and the Rat Line: Seymour M. Hersh on Obama, Erdoğan and the Syrian rebels excerpt/intro: In 2011 Barack Obama led an allied military intervention in Libya without consulting the US Congress. Last August, after the sarin attack on the Damascus suburb of Ghouta, he was ready to launch an allied air strike, this time to punish the Syrian government for allegedly crossing the 'red line' he had set in 2012 on the use of chemical weapons.​* Then with less than two days to go before the planned strike, he announced that he would seek congressional approval for the intervention. The strike was postponed as Congress prepared for hearings, and subsequently cancelled when Obama accepted Assad's offer to relinquish his chemical arsenal in a deal brokered by Russia. Why did Obama delay and then relent on Syria when he was not shy about rushing into Libya? The answer lies in a clash between those in the administration who were committed to enforcing the red line, and military leaders who thought that going to war was both unjustified and potentially disastrous. Obama's change of mind had its origins at Porton Down, the defence laboratory in Wiltshire. British intelligence had obtained a sample of the sarin used in the 21 August attack and analysis demonstrated that the gas used didn't match the batches known to exist in the Syrian army's chemical weapons arsenal. The message that the case against Syria wouldn't hold up was quickly relayed to the US joint chiefs of staff. The British report heightened doubts inside the Pentagon; the joint chiefs were already preparing to warn Obama that his plans for a far-reaching bomb and missile attack on Syria's infrastructure could lead to a wider war in the Middle East. As a consequence the American officers delivered a last-minute caution to the president, which, in their view, eventually led to his cancelling the attack."
Paul Merrell

Son of US Vice President joins Board of Directors of Burisma Holdings Ukraine - 0 views

  • Hunter Biden will head  legal unit and will provide support for the Company among international organizations.
  • Russian media is fanning this story and calling it a deal between Kiev leadership to US to please people in power in Congress. It may be mentioned that US Vice President visited Kiev on April 21-22 and commented that new leadership of Ukraine should look grave affairs and stressed the need for the new authorities to tackle corruption, adding: “The opportunity to generate a united Ukraine, getting it right is within your grasp.”
  • R. Hunter Biden is a counsel to Boies, Schiller & Flexner LLP, a national law firm based in New York, USA, which served in cases including “Bush vs. Gore”, and “U.S. vs. Microsoft”. Biden has experience in public service and foreign policy. He is a director for the U.S. Global Leadership Coalition, The Center for National Policy, and the Chairman’s Advisory Board for the National Democratic Institute. Having served as a Senior Vice President at MBNA bank, former U.S. President Bill Clinton appointed him an Executive Director of E-Commerce Policy Coordination under Secretary of Commerce William Daley. Mr. Biden served as Honorary Co-Chair of the 2008 Obama-Biden Inaugural Committee
Paul Merrell

Hacking Online Polls and Other Ways British Spies Seek to Control the Internet - The In... - 0 views

  • The secretive British spy agency GCHQ has developed covert tools to seed the internet with false information, including the ability to manipulate the results of online polls, artificially inflate pageview counts on web sites, “amplif[y]” sanctioned messages on YouTube, and censor video content judged to be “extremist.” The capabilities, detailed in documents provided by NSA whistleblower Edward Snowden, even include an old standby for pre-adolescent prank callers everywhere: A way to connect two unsuspecting phone users together in a call.
  • he “tools” have been assigned boastful code names. They include invasive methods for online surveillance, as well as some of the very techniques that the U.S. and U.K. have harshly prosecuted young online activists for employing, including “distributed denial of service” attacks and “call bombing.” But they also describe previously unknown tactics for manipulating and distorting online political discourse and disseminating state propaganda, as well as the apparent ability to actively monitor Skype users in real-time—raising further questions about the extent of Microsoft’s cooperation with spy agencies or potential vulnerabilities in its Skype’s encryption. Here’s a list of how JTRIG describes its capabilities: • “Change outcome of online polls” (UNDERPASS) • “Mass delivery of email messaging to support an Information Operations campaign” (BADGER) and “mass delivery of SMS messages to support an Information Operations campaign” (WARPARTH) • “Disruption of video-based websites hosting extremist content through concerted target discovery and content removal.” (SILVERLORD)
  • • “Active skype capability. Provision of real time call records (SkypeOut and SkypetoSkype) and bidirectional instant messaging. Also contact lists.” (MINIATURE HERO) • “Find private photographs of targets on Facebook” (SPRING BISHOP) • “A tool that will permanently disable a target’s account on their computer” (ANGRY PIRATE) • “Ability to artificially increase traffic to a website” (GATEWAY) and “ability to inflate page views on websites” (SLIPSTREAM) • “Amplification of a given message, normally video, on popular multimedia websites (Youtube)” (GESTATOR) • “Targeted Denial Of Service against Web Servers” (PREDATORS FACE) and “Distributed denial of service using P2P. Built by ICTR, deployed by JTRIG” (ROLLING THUNDER)
  • ...1 more annotation...
  • • “A suite of tools for monitoring target use of the UK auction site eBay (www.ebay.co.uk)” (ELATE) • “Ability to spoof any email address and send email under that identity” (CHANGELING) • “For connecting two target phone together in a call” (IMPERIAL BARGE) While some of the tactics are described as “in development,” JTRIG touts “most” of them as “fully operational, tested and reliable.” It adds: “We only advertise tools here that are either ready to fire or very close to being ready.”
Paul Merrell

Censorship Alert: the Alternative Media Harassed by the NSA | Global Research - 0 views

  • A concerted U.S.’ effort to censor, target independent media economically, withdraw their reader base, and falsify history. Let us sum up some of the main issues. The incestuous relationship between the NSA and major corporations like Google, Apple, Facebook and Microsoft is a well-documented fact. Many of the smaller companies, including web-hosting companies, Internet security providers, and advertising companies are either in part owned by one of these major corporations ore they are heavily dependent on cooperation and partnerships with them for their economic survival. nsnbc has already experienced being closed down and have its only source of income withdrawn from one day to the other. Others, including Voltairenet have regularly been flagged as containing malware. Media like New Eastern Outlook, IMEMC, and others risk being targeted in similar manner. Others whom Google and a U.S. Senate Hearing falsely accused of containing malware are The Drudge Report and Infowars. One can only guess how many of the smaller blogs, who are too small to raise alarm bells have been targeted. The conclusion is that the United States is engaged in an aggressive campaign that targets independent media and falsifies history. The question is, whether independent media have the political will to stand united in addressing the problem and in using the fact that they serve a growing part of , for example, the advertising market as leverage.
Paul Merrell

Exclusive: U.S. tech industry appeals to Obama to keep hands off encryption | Reuters - 0 views

  • As Washington weighs new cybersecurity steps amid a public backlash over mass surveillance, U.S. tech companies warned President Barack Obama not to weaken increasingly sophisticated encryption systems designed to protect consumers' privacy.In a strongly worded letter to Obama on Monday, two industry associations for major software and hardware companies said, "We are opposed to any policy actions or measures that would undermine encryption as an available and effective tool."The Information Technology Industry Council and the Software and Information Industry Association, representing tech giants, including Apple Inc, Google Inc, Facebook Inc, IBM and Microsoft Corp, fired the latest salvo in what is shaping up to be a long fight over government access into smart phones and other digital devices.
Paul Merrell

U.S. surveillance architecture includes collection of revealing Internet, phone metadat... - 0 views

  • On March 12, 2004, acting attorney general James B. Comey and the Justice Department’s top leadership reached the brink of resignation over electronic surveillance orders that they believed to be illegal. President George W. Bush backed down, halting secret foreign-intelligence-gathering operations that had crossed into domestic terrain. That morning marked the beginning of the end of STELLARWIND, the cover name for a set of four surveillance programs that brought Americans and American territory within the domain of the National Security Agency for the first time in decades. It was also a prelude to new legal structures that allowed Bush and then President Obama to reproduce each of those programs and expand their reach.What exactly STELLARWIND did has never been disclosed in an unclassified form. Which parts of it did Comey approve? Which did he shut down? What became of the programs when the crisis passed and Comey, now Obama’s expected nominee for FBI director, returned to private life?Authoritative new answers to those questions, drawing upon a classified NSA history of STELLARWIND and interviews with high-ranking intelligence officials, offer the clearest map yet of the Bush-era programs and the NSA’s contemporary U.S. operations.STELLARWIND was succeeded by four major lines of intelligence collection in the territorial United States, together capable of spanning the full range of modern telecommunications, according to the interviews and documents.
  • Two of the four collection programs, one each for telephony and the Internet, process trillions of “metadata” records for storage and analysis in systems called MAINWAY and MARINA, respectively. Metadata includes highly revealing information about the times, places, devices and participants in electronic communication, but not its contents. The bulk collection of telephone call records from Verizon Business Services, disclosed this month by the British newspaper the Guardian, is one source of raw intelligence for MAINWAY.The other two types of collection, which operate on a much smaller scale, are aimed at content. One of them intercepts telephone calls and routes the spoken words to a system called ­NUCLEON.For Internet content, the most important source collection is the PRISM project reported on June 6 by The Washington Post and the Guardian. It draws from data held by Google, Yahoo, Microsoft and other Silicon Valley giants, collectively the richest depositories of personal information in history.
  • The debate has focused on two of the four U.S.-based collection programs: PRISM, for Internet content, and the comprehensive collection of telephone call records, foreign and domestic, that the Guardian revealed by posting a classified order from the Foreign Intelligence Surveillance Court to Verizon Business Services.The Post has learned that similar orders have been renewed every three months for other large U.S. phone companies, including Bell South and AT&T, since May 24, 2006. On that day, the surveillance court made a fundamental shift in its approach to Section 215 of the Patriot Act, which permits the FBI to compel production of “business records” that are relevant to a particular terrorism investigation and to share those in some circumstances with the NSA. Henceforth, the court ruled, it would define the relevant business records as the entirety of a telephone company’s call database.The Bush administration, by then, had been taking “bulk metadata” from the phone companies under voluntary agreements for more than four years. The volume of information overwhelmed the MAINWAY database, according to a classified report from the NSA inspector general in 2009. The agency spent $146 million in supplemental counterterrorism funds to buy new hardware and contract support — and to make unspecified payments to the phone companies for “collaborative partnerships.”When the New York Times revealed the warrantless surveillance of voice calls, in December 2005, the telephone companies got nervous. One of them, unnamed in the report, approached the NSA with a request. Rather than volunteer the data, at a price, the “provider preferred to be compelled to do so by a court order,” the report said. Other companies followed suit. The surveillance court order that recast the meaning of business records “essentially gave NSA the same authority to collect bulk telephony metadata from business records that it had” under Bush’s asserted authority alone.
  • ...3 more annotations...
  • Telephone metadata was not the issue that sparked a rebellion at the Justice Department, first by Jack Goldsmith of the Office of Legal Counsel and then by Comey, who was acting attorney general because John D. Ashcroft was in intensive care with acute gallstone pancreatitis. It was Internet metadata.At Bush’s direction, in orders prepared by David Addington, the counsel to Vice President Richard B. Cheney, the NSA had been siphoning e-mail metadata and technical records of Skype calls from data links owned by AT&T, Sprint and MCI, which later merged with Verizon.For reasons unspecified in the report, Goldsmith and Comey became convinced that Bush had no lawful authority to do that.MARINA and the collection tools that feed it are probably the least known of the NSA’s domestic operations, even among experts who follow the subject closely. Yet they probably capture information about more American citizens than any other, because the volume of e-mail, chats and other Internet communications far exceeds the volume of standard telephone calls.The NSA calls Internet metadata “digital network information.” Sophisticated analysis of those records can reveal unknown associates of known terrorism suspects. Depending on the methods applied, it can also expose medical conditions, political or religious affiliations, confidential business negotiations and extramarital affairs.What permits the former and prevents the latter is a complex set of policies that the public is not permitted to see.
  • In the urgent aftermath of Sept. 11, 2001, with more attacks thought to be imminent, analysts wanted to use “contact chaining” techniques to build what the NSA describes as network graphs of people who represented potential threats.The legal challenge for the NSA was that its practice of collecting high volumes of data from digital links did not seem to meet even the relatively low requirements of Bush’s authorization, which allowed collection of Internet metadata “for communications with at least one communicant outside the United States or for which no communicant was known to be a citizen of the United States,” the NSA inspector general’s report said.Lawyers for the agency came up with an interpretation that said the NSA did not “acquire” the communications, a term with formal meaning in surveillance law, until analysts ran searches against it. The NSA could “obtain” metadata in bulk, they argued, without meeting the required standards for acquisition.Goldsmith and Comey did not buy that argument, and a high-ranking U.S. intelligence official said the NSA does not rely on it today.As soon as surveillance data “touches us, we’ve got it, whatever verbs you choose to use,” the official said in an interview. “We’re not saying there’s a magic formula that lets us have it without having it.”
  • When Comey finally ordered a stop to the program, Bush signed an order renewing it anyway. Comey, Goldsmith, FBI Director Robert S. Mueller III and most of the senior Bush appointees in the Justice Department began drafting letters of resignation.Then-NSA Director Michael V. Hayden was not among them. According to the inspector general’s classified report, Cheney’s lawyer, Addington, placed a phone call and “General Hayden had to decide whether NSA would execute the Authorization without the Attorney General’s signature.” He decided to go along.The following morning, when Mueller told Bush that he and Comey intended to resign, the president reversed himself.Three months later, on July 15, the secret surveillance court allowed the NSA to resume bulk collection under the court’s own authority. The opinion, which remains highly classified, was based on a provision of electronic surveillance law, known as “pen register, trap and trace,” that was written to allow law enforcement officers to obtain the phone numbers of incoming and outgoing calls from a single telephone line.
  •  
    Note particularly the mention that the FISA Court decision to throw the doors open for government snooping was based on "pen register, trap and trace" law. As suspected, now we are into territory dealt with by the Supreme Court in the pre-internet days of 1979 In Smith v. Maryland, 442 U.S. 735 (1979), More about that next, in a bookmark also tagged with "pen-register".
Paul Merrell

Facebook Could Face Investigation In Ireland Over PRISM Data - 0 views

  • The Irish High Court has ordered a review of the decision by the Office of the Data Protection Commissioner (ODPC) not to investigate Facebook’s links To PRISM and the US National Security Agency (NSA), after it was contested by a group of law students from Austria. The group calling itself ‘Europe-v-Facebook’ had previously demanded a full investigation into the relationship between Internet companies and the US intelligence agency as it accuses Facebook of breaking the law in supplying NSA with personal information about its European users.
  • The Irish High Court has ordered a review of the decision by the Office of the Data Protection Commissioner (ODPC) not to investigate Facebook’s links To PRISM and the US National Security Agency (NSA), after it was contested by a group of law students from Austria. The group calling itself ‘Europe-v-Facebook’ had previously demanded a full investigation into the relationship between Internet companies and the US intelligence agency as it accuses Facebook of breaking the law in supplying NSA with personal information about its European users.
  • The Irish High Court has ordered a review of the decision by the Office of the Data Protection Commissioner (ODPC) not to investigate Facebook’s links To PRISM and the US National Security Agency (NSA), after it was contested by a group of law students from Austria. The group calling itself ‘Europe-v-Facebook’ had previously demanded a full investigation into the relationship between Internet companies and the US intelligence agency as it accuses Facebook of breaking the law in supplying NSA with personal information about its European users.
  • ...1 more annotation...
  • According to the classified documents published by Snowden in June, the NSA collected data from services run by Apple, Google, Facebook and Microsoft. Facebook’s European headquarters are located in Ireland, where the corporate tax is among the lowest in the EU. However, the local privacy watchdog had refused to investigate the company’s links to PRISM, classifying the student complaint as “frivolous or vexatious”. This week, after a long campaign by Europe-v-Facebook funded by donations, the High Court has granted an application for judicial review of this decision. In other words, if ODPC still thinks it has no grounds for an investigation, it will have to defend this position in court. “The DPC simply wanted to get this hot potato off his table instead of doing his job. But when it comes to the fundamental rights of millions of users and the biggest surveillance scandal in years, he will have to take responsibility and do something about it,” said the leader of the student group Max Schrems. Schrems also said that in the event the case does go to court, he hopes for a ruling in the next six months.
  •  
    Perhaps moving corporate HQ to a tax haven in the E.U. wasn't Mark Zuckerberg's brightest move. Digital privacy rights are much stronger there.
Paul Merrell

New Report Shows Germany Was In Bed With NSA | ThinkProgress - 0 views

  • Behind the public admonishment of the National Security Agency’s spying techniques, Germany has been secretly in cahoots with the intelligence agency. The country’s national intelligence agency, Office for the Protection of the Constitution, arranged to share surveillance data with the NSA in exchange for high-powered spyware that excavated citizens’ chat and browser histories, and webcam photos, according to a German media report. Some German officials have claimed ignorance of the arrangement. Former data protection commissioner Peter Schaar told Die Zeit, the German newspaper that broke the story, he “knew nothing about such an exchange deal” during his 10-year tenure heading the agency — a deal that gave the spy agencies the ability to siphon data on every move a user makes online.
  • The Court of Justice of the European Union heard arguments in March for a case against Apple, Facebook, Microsoft, and Yahoo, which accused the companies of violating Europeans privacy by sending private data to the NSA. The case could determine whether and under what conditions American tech companies can operate overseas — by adhering to strict privacy laws, which companies such as Facebook previously indicated as an untenable option. The court admitted in opening arguments that current law regarding transatlantic data transfers didn’t protect citizens from foreign spying. In response, the European Commission’s lead attorney Bernhard Schima said, “You might consider closing your Facebook account if you have one.”
Paul Merrell

Security Experts Oppose Government Access to Encrypted Communication - The New York Times - 0 views

  • An elite group of security technologists has concluded that the American and British governments cannot demand special access to encrypted communications without putting the world’s most confidential data and critical infrastructure in danger.A new paper from the group, made up of 14 of the world’s pre-eminent cryptographers and computer scientists, is a formidable salvo in a skirmish between intelligence and law enforcement leaders, and technologists and privacy advocates. After Edward J. Snowden’s revelations — with security breaches and awareness of nation-state surveillance at a record high and data moving online at breakneck speeds — encryption has emerged as a major issue in the debate over privacy rights.
  • That has put Silicon Valley at the center of a tug of war. Technology companies including Apple, Microsoft and Google have been moving to encrypt more of their corporate and customer data after learning that the National Security Agency and its counterparts were siphoning off digital communications and hacking into corporate data centers.
  • Yet law enforcement and intelligence agency leaders argue that such efforts thwart their ability to monitor kidnappers, terrorists and other adversaries. In Britain, Prime Minister David Cameron threatened to ban encrypted messages altogether. In the United States, Michael S. Rogers, the director of the N.S.A., proposed that technology companies be required to create a digital key to unlock encrypted data, but to divide the key into pieces and secure it so that no one person or government agency could use it alone.The encryption debate has left both sides bitterly divided and in fighting mode. The group of cryptographers deliberately issued its report a day before James B. Comey Jr., the director of the Federal Bureau of Investigation, and Sally Quillian Yates, the deputy attorney general at the Justice Department, are scheduled to testify before the Senate Judiciary Committee on the concerns that they and other government agencies have that encryption technologies will prevent them from effectively doing their jobs.
  • ...2 more annotations...
  • The new paper is the first in-depth technical analysis of government proposals by leading cryptographers and security thinkers, including Whitfield Diffie, a pioneer of public key cryptography, and Ronald L. Rivest, the “R” in the widely used RSA public cryptography algorithm. In the report, the group said any effort to give the government “exceptional access” to encrypted communications was technically unfeasible and would leave confidential data and critical infrastructure like banks and the power grid at risk. Handing governments a key to encrypted communications would also require an extraordinary degree of trust. With government agency breaches now the norm — most recently at the United States Office of Personnel Management, the State Department and the White House — the security specialists said authorities could not be trusted to keep such keys safe from hackers and criminals. They added that if the United States and Britain mandated backdoor keys to communications, China and other governments in foreign markets would be spurred to do the same.
  • “Such access will open doors through which criminals and malicious nation-states can attack the very individuals law enforcement seeks to defend,” the report said. “The costs would be substantial, the damage to innovation severe and the consequences to economic growth hard to predict. The costs to the developed countries’ soft power and to our moral authority would also be considerable.”
  •  
    Our system of government does not expect that every criminal will be apprehended and convicted. There are numerous values our society believes are more important. Some examples: [i] a presumption of innocence unless guilt is established beyond any reasonable doubt; [ii] the requirement that government officials convince a neutral magistrate that they have probable cause to believe that a search or seizure will produce evidence of a crime; [iii] many communications cannot be compelled to be disclosed and used in evidence, such as attorney-client communications, spousal communications, and priest-penitent communications; and [iv] etc. Moral of my story: the government needs a much stronger reason to justify interception of communications than saying, "some crooks will escape prosecution if we can't do that." We have a right to whisper to each other, concealing our communicatons from all others. Why does the right to whisper privately disappear if our whisperings are done electronically? The Supreme Court took its first step on a very slippery slope when it permitted wiretapping in Olmstead v. United States, 277 U.S. 438, 48 S. Ct. 564, 72 L. Ed. 944 (1928). https://goo.gl/LaZGHt It's been a long slide ever since. It's past time to revisit Olmstead and recognize that American citizens have the absolute right to communicate privately. "The President … recognizes that U.S. citizens and institutions should have a reasonable expectation of privacy from foreign or domestic intercept when using the public telephone system." - Brent Scowcroft, U.S. National Security Advisor, National Security Decision Memorandum 338 (1 September 1976) (Nixon administration), http://www.fas.org/irp/offdocs/nsdm-ford/nsdm-338.pdf   
Paul Merrell

Boycott, Divest and Sanction Corporations That Feed on Prisons  :    Informat... - 0 views

  • All attempts to reform mass incarceration through the traditional mechanisms of electoral politics, the courts and state and federal legislatures are useless. Corporations, which have turned mass incarceration into a huge revenue stream and which have unchecked political and economic power, have no intention of diminishing their profits. And in a system where money has replaced the vote, where corporate lobbyists write legislation and the laws, where chronic unemployment and underemployment, along with inadequate public transportation, sever people in marginal communities from jobs, and where the courts are a wholly owned subsidiary of the corporate state, this demands a sustained, nationwide revolt. “Organizing boycotts, work stoppages inside prisons and the refusal by prisoners and their families to pay into the accounts of phone companies and commissary companies is the only weapon we have left,” said Amos Caley, who runs the Interfaith Prison Coalition, a group formed by prisoners, the formerly incarcerated, their families and religious leaders.
  • These boycotts, they said, will be directed against the private phone, money transfer and commissary companies, and against the dozens of corporations that exploit prison labor. The boycotts will target food and merchandise vendors, construction companies, laundry services, uniforms companies, prison equipment vendors, cafeteria services, manufacturers of pepper spray, body armor and the array of medieval instruments used for the physical control of prisoners, and a host of other contractors that profit from mass incarceration. The movement will also call on institutions, especially churches and universities, to divest from corporations that use prison labor. The campaign, led by the Interfaith Prison Coalition, will include a call to pay all prisoners at least the prevailing minimum wage of the state in which they are held. (New Jersey’s minimum wage is $8.38 an hour.) Wages inside prisons have remained stagnant and in real terms have declined over the past three decades. A prisoner in New Jersey makes, on average, $1.20 for eight hours of work, or about $28 a month. Those incarcerated in for-profit prisons earn as little as 17 cents an hour. Over a similar period, phone and commissary corporations have increased fees and charges often by more than 100 percent. There are nearly 40 states that allow private corporations to exploit prison labor. And prison administrators throughout the country are lobbying corporations that have sweatshops overseas, trying to lure them into the prisons with guarantees of even cheaper labor and a total absence of organizing or coordinated protest.
  • Corporations currently exploiting prison labor include Abbott Laboratories, AT&T, AutoZone, Bank of America, Bayer, Berkshire Hathaway, Cargill, Caterpillar, Chevron, the former Chrysler Group, Costco Wholesale, John Deere, Eddie Bauer, Eli Lilly, ExxonMobil, Fruit of the Loom, GEICO, GlaxoSmithKline, Glaxo Wellcome, Hoffmann-La Roche, International Paper, JanSport, Johnson & Johnson, Kmart, Koch Industries, Mary Kay, McDonald’s, Merck, Microsoft, Motorola, Nintendo, Pfizer, Procter & Gamble, Quaker Oats, Sarah Lee, Sears, Shell, Sprint, Starbucks, State Farm Insurance, United Airlines, UPS, Verizon, Victoria’s Secret, Wal-Mart and Wendy’s.
  • ...4 more annotations...
  • “Prisoner telephone rates in New Jersey are some of the highest in the country,” Caley said. “Global Tel Link charges prisoners and their families $4.95 for a 15-minute phone call, which is about two and a half times the national average for local inmate calling services.”
  • Prison phone services are a $1.2-billion-a-year industry. Prisoners outside New Jersey are charged by Global Tel Link, which makes about $500 million a year, as much as $17 for a 15-minute phone call. A call of that duration outside a prison would cost about $2. If a customer deposits $25 into a Global Tel Link phone account, he or she must pay an additional service charge of $6.95. And Global Tel Link is only one of several large corporations that exploit prisoners and their families. JPay is a corporation that deals in privatized money transfers to prisoners. It controls money transfers for about 70 percent of the prison population. The company charges families that put money into prisoners’ accounts additional service fees of as much as 45 percent. JPay generates more than $50 million a year in revenue. The Keefer Group, which controls prison commissaries in more than 800 public and private prisons, and which often charges prisoners double what items cost outside prison walls, makes $41 million a year in profit.
  • Prisons, to swell corporate profits, force prisoners to pay for basic items including shoes. Prisoners in New Jersey pay $45 for a pair of basic Reebok shoes—almost twice the average monthly wage. If a prisoner needs an insulated undergarment or an extra blanket to ward off the cold at night he must buy it. Packages from home, once permitted, have been banned to force prisoners to buy grossly overpriced items at the commissary or company-run store. Some states have begun to charge prisoners rent. This gouging is burying many prisoners and their families in crippling debt, debt that prisoners carry when they are released from prison. The United States has 2.3 million people in prison, 25 percent of the world’s prison population, although we are only 5 percent of the world’s population. We have increased our prison population by about 700 percent since 1970. Corporations control about 18 percent of federal prisoners and 6.7 percent of all state prisoners. And corporate prisons account for nearly all newly built prisons. Nearly half of all immigrants detained by the federal government are shipped to corporate-run prisons. And slavery is legal in prisons under the 13th Amendment of the U.S. Constitution. It reads: “Neither slavery nor involuntary servitude, except as punishment for crime whereof the party shall have been duly convicted, shall exist within the United States.”
  • Vast sums are at stake. The for-profit prison industry is worth $70 billion. Corrections Corporation of America (CCA), the largest owner of for-profit prisons and immigration detention facilities in the country, had revenues of $1.7 billion in 2013 and profits of $300 million. CCA holds an average of 81,384 inmates in its facilities on any one day. Aramark Holdings Corp., a Philadelphia-based company that contracts through Aramark Correctional Services to provide food to 600 correctional institutions across the United States, was acquired in 2007 for $8.3 billion by investors that included Goldman Sachs. And, as in the wider society, while members of a tiny, oligarchic corporate elite each are paid tens or even hundreds of millions of dollars annually, the workers who generate these profits live in misery.  “It is an abomination that prisoners are paid 22 cents an hour, $1.20 cents a day,” Larry Hamm told the Newark meeting. “Every prisoner should get the minimum wage of New Jersey, $8.38 per hour.”
  •  
    Why pay a liveable wage to American workers if you can get prison labor for less than market prices in Bangla Desh? The prison telephone racket has bothered me for many years. The FCC authorized no-limit telephone charges for prisoners and their families on the simplistic grounds of, "well, they prisoners who have reduced civil rights anyway. But it ignored that most prison phone calls are collect calls to families on the outside, who are not prisoners and still have their full civil rights. The for-profit prison industry is a prime example of not thinking things through before privatizing a formerly government function. Privatization creates a lobby for the industry, as Americans have learned all to well with the privatization of most Dept. of Defense work other than actual combat.   Already, for profit prison industries are showing up in state legislatures to demand longer prison sentences. They were the prime movers behind the "mandatory minimum sentence" movement, which has stuffed prisons to overflowing. 
Paul Merrell

NSA contracted French cyber-firm for hacking help - RT USA - 0 views

  • The latest revelation regarding the National Security Agency doesn't come courtesy of Edward Snowden. A Freedom of Information Act request has confirmed the NSA contracted a French company that makes its money by hacking into computers. It's no secret that the United States government relies on an arsenal of tactics to gather intelligence and wage operations against its adversaries, but a FOIA request filed by Muckrock's Heather Akers-Healy has confirmed that the list of Uncle Sam's business partners include Vupen, a French-based security company that specializes in selling secret codes used to crack into computers. Documents responsive to my request to #NSA for contracts with VUPEN, include 12/month exploit subscription https://t.co/x3qJbqSUpa — Heather Akers-Healy (@abbynormative) September 16, 2013 Muckrock published on Monday a copy of a contract between the NSA and Vupen in which the US government is shown to have ordered a one-year subscription to the firm's “binary analysis and exploits service” last September.
  • That service, according to the Vupen website, is sold only to government entities, law enforcement agencies and computer response teams in select countries, and provides clients with access to so-called zero-day exploits: newly-discovered security vulnerabilities that the products' manufacturers have yet to discover and, therefore, have had zero days to patch-up. “Major software vendors such as Microsoft and Adobe usually take 6 to 9 months to release a security patch for a critical vulnerability affecting their products, and this long delay between the discovery of a vulnerability and the release of a patch creates a window of exposure during which criminals can rediscover a previously reported but unpatched vulnerability, and target any organization running the vulnerable software,” Vupen says elsewhere on their website. Last year, Vupen researchers successfully cracked Google's Chrome browser, but declined to show developers how they did so — even for an impressive cash bounty. “We wouldn’t share this with Google for even $1 million,” Vupen CEO Chaouki Bekrar told Forbes' Andy Greenberg of the Chrome hack in 2012. “We don’t want to give them any knowledge that can help them in fixing this exploit or other similar exploits. We want to keep this for our customers.”
  • And why the NSA and other clients may benefit from being privy to these vulnerabilities, knowing how to exploit security holes in adversarial systems is a crucial component to any government's offensive cyber-operations. Last month, the Washington Post published excerpts from the previously secretive “black budget,” a closely guarded ledger listing the funding requests made by America's intelligence community provided by NSA leaker Edward Snowden. According to that document, a substantial goal of the US in fiscal year 2013 was to use a portion of $52.6 billion in secretive funding towards improving offensive cyber-operations.
  • ...1 more annotation...
  • The portion of the contract obtained by Muckrock where the cost of the subscription is listed has been redacted, but a Vupen hacker who spoke to Greenberg last year said deals in the five-figures wasn't uncommon. "People seem surprised to discover that major government agencies are acquiring Vupen's vulnerability intelligence," Bekrar wrote in an email to Information Week's Matthew Schwartz after the NSA contract with his signature was published. "There is no news here, governments need to leverage the most detailed and advanced vulnerability research to protect their infrastructures and citizens against adversaries." Critics of Vupen and its competitors see government-waged cyber-operations in a different light, however. Christopher Soghoian of the American Civil Liberties Union's Speech, Privacy and Technology Project has spoken outright against companies that sell exploits and have equated the computer codes being sold for big money as a new sort of underground arms trade fueling an international, online battle. To Greenberg last year, Soghoian described Vupen as  a “modern-day merchant of death” selling “the bullets for cyberwar," and upon publishing of the NSA contract called the company a “cyber weapon merchant.” The NSA is a customer of French 0-day cyber weapon merchant VUPEN, FOIA docs reveal: (via @ramdac & @MuckRockNews) https://t.co/OPJ82miK3c — Christopher Soghoian (@csoghoian) September 16, 2013
Paul Merrell

Tech giants oppose NSA reform bill for timid safeguards against spying - RT USA - 0 views

  • Ahead of Thursday’s US House vote on a bill sold as reform of a major US government spying program, top technology firms like Google have joined civil liberties and privacy groups in calling the legislation inadequate in fighting mass surveillance. The Reform Government Surveillance coalition – AOL, Apple, Dropbox, Facebook, Google, LinkedIn, Microsoft, Twitter, and Yahoo – offered a statement on Wednesday denouncing the USA Freedom Act as a weak attempt at ending the government’s bulk storage of domestic phone metadata.
  • The USA Freedom Act would take the mass storage of phone records away from the government. Instead, telecommunications companies would be required to store the data. The bill would require the National Security Agency to get approval to search the telecoms’ cache of records from the often-compliant Foreign Intelligence Surveillance Court. Last-minute changes to the bill rankled privacy groups on Tuesday, leading many of them to decry the backdoor dealings as responsible for a “weakened,” “watered down” bill compared to what had previously passed the House Judiciary and Intelligence Committees earlier this month. On Wednesday, the tech coalition echoed these concerns, calling the amended legislation a move “in the wrong direction” of needed reform regarding mass surveillance. "The latest draft opens up an unacceptable loophole that could enable the bulk collection of Internet users' data," the coalition said. "While it makes important progress, we cannot support this bill as currently drafted and urge Congress to close this loophole to ensure meaningful reform." The loophole referred to by the coalition pertains to the USA Freedom Act’s definition for how and when government officials can search collected phone metadata records.
  • The new language – approved by House leaders and the Obama administration in recent days – modifies the prohibitions on bulk collection of domestic data to allow government officials to search for Americans’ phone records using a “a discrete term, such as a term specifically identifying a person, entity, account, address, or device, used by the Government to limit the scope of the information or tangible things sought.” This revised standard for the USA Freedom Act’s reform of surveillance is too broad and leaves privacy protections at risk, civil liberties groups said on Tuesday. In addition, the legislation’s new language also weakens the bill’s transparency provisions which outlined how much technology companies can disclose to customers about the extent of government requests of user data.
  • ...2 more annotations...
  • In addition to the tech coalition’s protest, the Computer & Communications Industry Association – whose members include Pandora, Samsung, Sprint, and others – said Wednesday it would “not support consideration or passage of the USA Freedom Act in its current form." The Obama administration publicly threw its support behind the amended USA Freedom Act, saying the bill would “provide the public greater confidence in our programs and the checks and balances in the system.” “The bill ensures our intelligence and law enforcement professionals have the authorities they need to protect the nation, while further ensuring that individuals’ privacy is appropriately protected when these authorities are employed,” the White House included.
  • Lawmakers opposed to the secretive negotiations attempted on Tuesday to counter the weakened surveillance reform bill by offering an amendment to the National Defense Authorization Act (NDAA) that is “materially identical” to the version of the USA Freedom Act that was advanced by the House Judiciary and Intelligence Committees earlier this month. Yet the amendment was denied by the House Rules Committee late Tuesday. The House is now scheduled to vote on the USA Freedom Act on Thursday under closed rules, which forbids adding amendments before the final vote.
  •  
    The Obama Administration and NSA supporters in the House of Representatives resort to a successful last-minute ambush attack to eviscerate the modest reforms proposed in the USA Freedom Act. 
« First ‹ Previous 41 - 60 of 71 Next ›
Showing 20 items per page