Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged Obama-Surveillance

Rss Feed Group items tagged

Paul Merrell

NSA Veterans: The White House Is Hanging Us Out to Dry - By Shane Harris | Foreign Policy - 0 views

  • Gen. Keith Alexander and his senior leadership team at the National Security Agency are angry and dispirited by what they see as the White House's failure to defend the spy agency against criticism of its surveillance programs, according to four people familiar with the NSA chiefs' thinking. The top brass of the country's biggest spy agency feels they've been left twisting in the wind, abandoned by the White House and left largely to defend themselves in public and in Congress against allegations of unconstitutional spying on Americans.
Paul Merrell

F.B.I. Informant Is Tied to Cyberattacks Abroad - NYTimes.com - 0 views

  • An informant working for the F.B.I. coordinated a 2012 campaign of hundreds of cyberattacks on foreign websites, including some operated by the governments of Iran, Syria, Brazil and Pakistan, according to documents and interviews with people involved in the attacks.Exploiting a vulnerability in a popular web hosting software, the informant directed at least one hacker to extract vast amounts of data — from bank records to login information — from the government servers of a number of countries and upload it to a server monitored by the F.B.I., according to court statements.
  • The attacks were coordinated by Hector Xavier Monsegur, who used the Internet alias Sabu and became a prominent hacker within Anonymous for a string of attacks on high-profile targets, including PayPal and MasterCard. By early 2012, Mr. Monsegur of New York had been arrested by the F.B.I. and had already spent months working to help the bureau identify other members of Anonymous, according to previously disclosed court papers.One of them was Jeremy Hammond, then 27, who, like Mr. Monsegur, had joined a splinter hacking group from Anonymous called Antisec. The two men had worked together in December 2011 to sabotage the computer servers of Stratfor Global Intelligence, a private intelligence firm based in Austin, Tex.
  • Shortly after the Stratfor incident, Mr. Monsegur, 30, began supplying Mr. Hammond with lists of foreign websites that might be vulnerable to sabotage, according to Mr. Hammond, in an interview, and chat logs between the two men. The New York Times petitioned the court last year to have those documents unredacted, and they were submitted to the court last week with some of the redactions removed.Continue reading the main story “After Stratfor, it was pretty much out of control in terms of targets we had access to,” Mr. Hammond said during an interview this month at a federal prison in Kentucky, where he is serving a 10-year sentence after pleading guilty to the Stratfor operation and other computer attacks inside the United States. He has not been charged with any crimes in connection with the hacks against foreign countries.
  • ...2 more annotations...
  • according to an uncensored version of a court statement by Mr. Hammond, leaked online the day of his sentencing in November, the target list was extensive and included more than 2,000 Internet domains. The document said Mr. Monsegur had directed Mr. Hammond to hack government websites in Iran, Nigeria, Pakistan, Turkey and Brazil and other government sites, like those of the Polish Embassy in Britain and the Ministry of Electricity in Iraq.
  • The hacking campaign appears to offer further evidence that the American government has exploited major flaws in Internet security — so-called zero-day vulnerabilities like the recent Heartbleed bug — for intelligence purposes. Recently, the Obama administration decided it would be more forthcoming in revealing the flaws to industry, rather than stockpiling them until the day they are useful for surveillance or cyberattacks. But it carved a broad exception for national security and law enforcement operations.
  •  
    Has no one in government ever heard of the concept of leadership by example? Or the Golden Rule?
Paul Merrell

NSA Surveillance: Snowden Docs Raise Questions About U.S. Phone Calls - 0 views

  • Third in a series. Part 1 here; Part 2 here. When it comes to the National Security Agency’s recently disclosed use of automated speech recognition technology to search, index and transcribe voice communications, people in the United States may well be asking: But are they transcribing my phone calls? The answer is maybe. A clear-cut answer is elusive because documents in the Snowden archive describe the capability to turn speech into text, but not the extent of its use — and the U.S. intelligence community refuses to answer even the most basic questions on the topic.
  • thanks to previous explorations of the Snowden archive and some documents released by the Obama administration, we know there are four major methods the NSA uses to get access to phone calls involving Americans — and only one of them technically precludes the use of speech recognition.
Paul Merrell

Hackers Stole Secrets of U.S. Government Workers' Sex Lives - The Daily Beast - 0 views

  • It was already being described as the worst hack of the U.S. government in history. And it just got much worse.A senior U.S. official has confirmed that foreign hackers compromised the intimate personal details of an untold number of government workers. Likely included in the hackers’ haul: information about workers’ sexual partners, drug and alcohol abuse, debts, gambling compulsions, marital troubles, and any criminal activity.Those details, which are now presumed to be in the hands of Chinese spies, are found in the so-called “adjudication information” that U.S. investigators compile on government employees and contractors who are applying for security clearances. The exposure suggests that the massive computer breach at the Office of Personnel Management is more significant and potentially damaging to national security than officials have previously said.
  • Three former U.S. intelligence officials told The Daily Beast that the adjudication information would effectively provide dossiers on current and former government employees, as well as contractors. It gives foreign intelligence agencies a roadmap for finding people with access to the government’s most highly classified secrets.Obama administration officials had previously acknowledged the breach of information that applicants voluntarily disclose on a routine questionnaire, called Standard Form 86, but the theft of the more detailed and wide-ranging adjudication information appears to have gone overlooked.
  • “Whoever compromised the adjudication information is going to have clear knowledge, beyond what’s in the SF86, about who the best targets for espionage are in the United States,” Michael Adams, a computer security expert who served more than two decades in the U.S. Special Operations Command, told The Daily Beast. “This is the most successful cyber attack in the history of the United States,” owing to the amount and quality of the information that was stolen, Adams said. U.S. intelligence officers spend years trying to recruit foreign spies to gather the kinds of details and insights that are contained in adjudication information, one former senior U.S. official said. This official, who requested anonymity, added that adjudication information would give foreign intelligence services “enormous leverage” over U.S. personnel whom they might forcibly interrogate for information or try to recruit.
  • ...4 more annotations...
  • The adjudication process had a broad scope, taking into account the SF86 questionnaire, reports from background investigations, interviews with the applicant's family members and associates, his or her employment history, and for people seeking high-level clearances, the results of polygraph investigations.Seymour said such records “span an employee’s career” and could stretch back as far as 30 years. Officials have said that as many as 18 million people may have been affected by the breach. Asked specifically what information the hackers had obtained, Seymour told lawmakers that she preferred to answer later in a “classified session.” Seymour didn’t specify how many people’s information was stolen. But the OPM oversees background investigations, which comprise a key part of the adjudication process, for more than 90 percent of security clearance applicants, according to the Congressional Research Service. An OPM spokesman didn’t respond to a request for comment in time for publication.
  • A former senior U.S. intelligence official, who asked to remain anonymous, said the OPM breach would cause more damage to national security operations and personnel than the leaks by Edward Snowden about classified surveillance by the National Security Agency.“This is worse than Snowden, because at least programs that were running before the leaks could be replaced or rebuilt,” the former official said. “But OPM, that’s the gift that keeps on giving. You can’t rebuild people.”Adjudicators are in a powerful position because in deciding whether to recommend granting a security clearance, they have access to the entire scope of an applicant’s file and are told to make a subjective analysis.“The adjudication process is the careful weighing of a number of variables known as the whole-person concept,” according to official guidelines. “Available, reliable information about the person, past and present, favorable and unfavorable, should be considered in reaching a determination.”
  • By design, adjudication is an invasive process, meant to unearth risk factors including drug and alcohol abuse, extramarital affairs, a history of violence, and other events that speak to a person’s “trustworthiness” and their susceptibility to blackmail or being recruited to spy for a foreign government.For instance, “compulsive gambling is a concern, as it may lead to financial crimes including espionage,” the guidelines say. Adjudicators are told to note “a pattern of compulsive, self-destructive, or high risk sexual behavior,” “relapse after diagnosis of alcohol abuse,” and “emotionally unstable, irresponsible, dysfunctional, violent, paranoid, or bizarre behavior,” among other warning signs in 13 categories. Some of the embarrassing personal details found in some adjudications have been made public. That’s what happens after an applicant who was denied a security clearance launched an appeal.
  • Armed with such intimate details of a person’s worst moments, foreign spies would have unprecedented advantage against their U.S. adversaries. And the news is especially bad for people who hold the highest levels of clearance, which require more rigorous background checks, noted Adams, the computer security expert. “The higher up you go in your sensitivity levels, the more data that’s in your adjudication file,” he said.
Paul Merrell

NSA tapped German Chancellery for decades, WikiLeaks claims | US news | The Guardian - 0 views

  • The US National Security Agency tapped phone calls involving German chancellor Angela Merkel and her closest advisers for years and spied on the staff of her predecessors, according to WikiLeaks. A report released by the group on Wednesday suggested NSA spying on Merkel and her staff had gone on far longer and more widely than previously realised. WikiLeaks said the NSA targeted 125 phone numbers of top German officials for long-term surveillance . The release risks renewing tensions between Germany and the US a month after they sought to put a row over spying behind them, with Barack Obama declaring in Bavaria that the two nations were “inseparable allies”. WikiLeaks published what it said were three NSA intercepts of Merkel’s conversations, and data it said listed telephone numbers for the chancellor, her aides, her office and even her fax machine. “The names associated with some of the targets indicate that spying on the Chancellery predates Angela Merkel as it includes staff of former Chancellor Gerhard Schroeder (in office 1998-2002), and his predecessor Helmut Kohl,” WikiLeaks added in a statement.
Paul Merrell

NSA data-gathering may run into California roadblock | Reuters - 0 views

  • (Reuters) - The federal government would need a warrant from a judge if it wants the cooperation of California officials in searching residents' cellphone and computer records, under a bill making its way through the state legislature. The bill, which passed the state Senate with just one opposing vote on Monday, was introduced in the wake of information leaked by former National Security Agency contractor Edward Snowden showing massive internal surveillance of U.S. citizens by the NSA.
  • The California bill is the farthest along of several such measures that have been introduced in eight states, according to Lieu's spokesman Jeff Gozzo, including Alaska, Arizona and Oklahoma.It comes as Congress wrestles with a similar bill at the national level.A federal judge ruled last year that the National Security Agency's practice of gathering so-called meta-data on U.S. residents was likely unconstitutional, but the ruling is being appealed by the Obama administration.The California bill would not allow law enforcement and other officials in the most populous U.S. state to assist federal agencies looking for records of phone calls, Internet use or other electronic activity by residents unless a warrant has been issued by a judge.It was opposed by the California District Attorneys Association, which said the bill was too vague.
Paul Merrell

US Drones To Fly Over ISIS Areas In Syria - Without Assad's Approval - Business Insider - 0 views

  • U.S. President Barack Obama authorized sending surveillance aircraft, including drones, into Syrian airspace to gather intelligence on extremists ISIS militants, senior U.S. officials told The Wall Street Journal. The Associated Press subsequently reported that the flights had already begun. The flights are a further acknowledgment that the group also known as Islamic State (IS) is a threat beyond Iraq, and the operations would inform any decision to conduct airstrikes near the ISIS haven of Raqqa in eastern Syria. Significantly, the missions will be carried out without coordination with or approval from the regime of Syrian President Bashar al-Assad. Officials noted that regime "air-defense systems in eastern Syria won't pose a threat because sensors are either sparsely located or inoperable," WSJ reports.
  •  
    We have now officially violated the sovereignty of Syria by sending in drones without Syrian government permission, in violation of the U.N. Charter, which via the Constitution's treaty clause is the law of this land. 
Paul Merrell

New Cyber-Spying Discovery Points to NSA and the "Five Eyes" - WhoWhatWhy - 0 views

  • here’s yet another tantalizing clue that the National Security Agency and its “Five Eyes” allies are behind a poweful cyber-espionage tool called Regin, used to spy on friend and enemy alike. That’s the conclusion Russian cybersecurity firm Kaspersky drew after examining the source code of Regin and an innocuously-named spying tool called QWERTY. It’s an appropriate monicker. The malware, known as a keylogger,  vacuums up anything typed on a computer keyboard and sends it back to the programmer controlling it. The crucial clue Kaspersky found is that QWERTY “can only operate as part of the Regin platform.” After tracking Regin across 14 countries for years, Kaspersky and technology firm Symantec identified it in November 2014.  At the time, Symantec said Regin’s “capabilities and the level of resources behind [it] indicate that it is one of the main cyberespionage tools used by a nation state.” 
  • Though neither company said it, suspicion immediately arose that the NSA and its allies had created Regin. It immediately drew comparisons with Stuxnet, the joint U.S.-Israeli computer worm used to damage Iranian nuclear centrifuges in Natanz in 2009. Unlike Stuxnet’s narrow mission of sabotage, Regin is designed for spying in a wide set of environments. It hides in plain sight, disguised as ordinary Microsoft software.
  • The new evidence further points to the Five Eyes. The German news magazine Der Spiegel has a trove of documents from NSA whistleblower Edward Snowden, which included the source code. Der Spiegel gave Kaspersky the code to examine: The new analysis provides clear proof that Regin is in fact the cyber-attack platform belonging to the Five Eyes alliance, which includes the U.S., Britain, Canada, Australia and New Zealand. Neither Kaspersky nor Symantec commented directly on the likely creator of Regin. But there can be little room left for doubt regarding the malware’s origin. Der Spiegel pointed to five elements they believe suggest Five Eyes authorship: the presence of QWERTY in Snowden’s files, its use in the Belgacom hack by Britain’s GCHQ, references to the sport of cricket in the code, structural similarities to tools outlined in other Snowden documents, and targets consistent with other Five Eyes tools and campaigns.
  • ...1 more annotation...
  • Regin has been used to spy on telecom providers, financial institutions, energy companies, airlines, research institutes and the hospitality industry, and on European Union officials. The 14 countries found to have been penetrated include Russia, Malaysia, Afghanistan, and Fiji. Even though the trail is hot now, security experts say that Regin is still out there committing wholesale espionage. That’s because parts of it like QWERTY help mask other components. Like any good spy, it’s constantly changing disguises.
Paul Merrell

Sen. Leahy's Latest NSA bill: The Good, The Bad, and The Ugly | Just Security - 0 views

  • This morning, Senator Patrick Leahy released a new version of the USA Freedom Act, a bill intended to reform NSA surveillance following Edward Snowden’s revelations that the intelligence agency collects Americans’ calling records in bulk. USA Freedom Act has a disappointing history. While initially proposing much for Americans, if not our friends overseas, to like, the version that eventually passed the House in May was, at best, utterly neutered.  Today’s version, hashed out between Sen. Leahy, Obama Administration officials, and civil liberties proponents, moves the needle much closer to the original version. Of course, as this USA Freedom Act moves through the Senate, the bill could change. And if it passes the Senate, the House will have to reconcile this version with its own gelded one. But for now, there are things to like, things to hate, and things remaining to fear in USA Freedom.
  •  
    U.S. Constitution Amendment 4, as the enemies of civil liberties would like it to read: "The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, *unless a government official wants to violate that right,* and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized, *unless a government official should decide that he or she would be inconvenienced by such procedure."*
Paul Merrell

Months After Appeals Argued, NSA Cases Twist in the Wind - US News - 0 views

  • Three cases that likely lay the groundwork for a major privacy battle at the U.S. Supreme Court are pending before federal appeals courts, whose judges are taking their time announcing whether they believe the dragnet collection of Americans' phone records is legal. It’s been more than five months since the American Civil Liberties Union argued against the National Security Agency program in New York, three months since legal activist Larry Klayman defended his thus far unprecedented preliminary injunction win in Washington, D.C., and two months since Idaho nurse Anna Smith’s case was heard by appeals judges in Seattle. At the district court level, judges handed down decisions about a month after oral arguments in the cases. It’s unclear what accounts for the delay. It’s possible judges are meticulously crafting opinions that are likely to receive wide coverage, or that members of the three-judge panels are clashing on the appropriate decision.
  • Attorneys involved in the cases understandably are reluctant to criticize the courts, but all express hope for speedy resolution of their fights against alleged violations of Americans’ Fourth Amendment rights.
  • Though it’s difficult to accurately predict court decisions based on oral arguments, opponents of the mass surveillance program may have reason for optimism.
  • ...1 more annotation...
  • Two executive branch review panels have found the dragnet phone program has had minimal value for catching terrorists, its stated purpose. After years of presiding over the collection and months of publicly defending it, President Barack Obama pivoted last year and asked Congress to pass legislation ending the program. A measure to do so failed last year.
Paul Merrell

Appeals court clears hurdle for NSA | TheHill - 0 views

  • A federal appeals court Tuesday eliminated a possible roadblock for the National Security Agency (NSA), delaying a judge’s order to halt the agency's controversial data collection.The order from the U.S. Court of Appeals for the D.C. Circuit sets the NSA on a path to wind down its bulk gathering of Americans’ phone records later this month.ADVERTISEMENTOn Monday, Judge Richard Leon of the U.S. District Court for D.C. had sought to end the program immediately, before a Nov. 29 deadline. Leon’s order would have ended the NSA’s collection of records about one California lawyer, though doing that might have required taking the entire system offline, he acknowledged.Late Tuesday afternoon, however, the appeals court stepped in and issued a stay on that order, preventing it from taking effect. The move from the appeals court was widely expected, given that Leon's order would merely kill the program three weeks early.“The purpose of this administrative stay is to give the court sufficient opportunity to consider the merits of the motion for a stay,” it said in a brief order, “and should not be construed in any way as a ruling on the merits of that motion.”
  • Plaintiffs suing the Obama administration, led by conservative legal activist Larry Klayman, will have until noon Friday to submit arguments on whether the program should be shut down immediately. The government has until the following Monday. Few watchers expect the court to interfere with the NSA’s own schedule, which will take the phone records program offline Nov. 29.Under the current program, the spy agency collects metadata records about millions of Americans’ phone calls, which include the numbers involved in a call, when the call occurred and how long it lasted. The records do not include content about people’s conversations.This summer, Congress passed legislation ending the current system and forcing the NSA to move to a new process in which it requests a narrow set of records from individual phone companies.
  • On Monday, the agency told lawmakers on Capitol Hill that it has “successfully developed a technical architecture to support the new program” and that testing is “underway.”In his Monday order, Leon said that the NSA should not wait until the new system was up and running, since “even one day” of the current program poses a threat to the Constitution. 
  •  
    So the Court of Appeals will sit on it until the end of the month and then rule that the case is moot. 
Paul Merrell

U.S. government reveals breadth of requests for Internet records | Reuters - 0 views

  • The Federal Bureau of Investigation has used a secretive authority to compel Internet and telecommunications firms to hand over customer data including an individual’s complete web browsing history and records of all online purchases, a court filing released Monday shows.The documents are believed to be the first time the government has provided details of its so-called national security letters, which are used by the FBI to conduct electronic surveillance without the need for court approval.The filing made public Monday was the result of an 11-year-old legal battle waged by Nicholas Merrill, founder of Calyx Internet Access, a hosted service provider, who refused to comply with a national security letter (NSL) he received in 2004. Merrill told Reuters the release was significant “because the public deserves to know how the government is gathering information without warrants on Americans who are not even suspected of a crime.”
  • National security letters have been available as a law enforcement tool since the 1970s, but their frequency and breadth expanded dramatically under the USA Patriot Act, which was passed shortly after the Sept. 11, 2001 attacks. They are almost always accompanied by an open-ended gag order barring companies from disclosing the contents of the demand for customer data.A federal court ruled earlier this year that the gag on Merrill’s NSL should be lifted. Merrill's challenge also disclosed that the FBI may use NSLs to gain IP addresses on everyone a suspect has corresponded with and cell-site location information. The FBI said in the court filings it no longer used NSLs for location information. The secretive orders have long drawn the ire of tech companies and privacy advocates, who argue NSLs allow the government to snoop on user content without appropriate judicial oversight or transparency.
  • Last year, the Obama administration announced it would permit Internet companies to disclose more about the number of NSLs they receive. But they can still only provide a range such as between 0 and 999 requests, or between 1,000 and 1,999. Twitter (TWTR.N) has sued in federal court seeking the ability to publish more details in its semi-annual transparency reports. Several thousand NSLs are now issued by the FBI every year, though the agency says it is unaware of the precise number. At one point that number eclipsed 50,000 letters annually. The FBI did not respond to a request for comment Monday.
Paul Merrell

NSA bulk phone snooping program shuts down - POLITICO - 0 views

  • The National Security Agency will no longer be able to collect phone records in bulk starting Nov. 29, the Office of the Director of National Intelligence said in a statement Friday.The program's closure was required by the USA Freedom Act, signed by President Barack Obama in early June. The program was allowed to continue since then as part of a six-month wind-down period, in which intelligence officials could create and test a new phone records program where the government can only obtain records connected to a specific entity like a person or device that is associated with a foreign power or terrorist group.Some Senate Republicans, led by Sen. Tom Cotton of Arkansas and 2016 presidential candidate Sen. Marco Rubio of Florida, tried to delay the program’s official end this month in the wake of the Paris terrorist attacks. But despite support from Senate Majority Leader Mitch McConnell (R-Ky.), the effort got no traction in Congress.
  • The NSA has requested that some officials continue to have access to data already collected by the agency for “technical” purposes — but not intelligence analysis— for another three months, according to ODNI. The Foreign Intelligence Surveillance Court is currently reviewing that request, ODNI said.A federal court issued an order earlier this month holding the program unconstitutional and barring the collection of phone metadata pertaining to one California attorney and his law practice. However, after authorities argued that implementing the order would require the early shutdown of the whole program, a federal appeals court stayed the ruling.
Paul Merrell

U.S. to let spy agencies examine Americans' finances - chicagotribune.com - 0 views

  • The Obama administration is drawing up plans to give all U.S. spy agencies full access to a massive database that contains financial data on American citizens and others who bank in the country, according to a Treasury Department document seen by Reuters.
Paul Merrell

Inside the NSA's Ultra-Secret China Hacking Group - By Matthew M. Aid | Foreign Policy - 0 views

  • This weekend, U.S. President Barack Obama sat down for a series of meetings with China's newly appointed leader, Xi Jinping. We know that the two leaders spoke at length about the topic du jour -- cyber-espionage -- a subject that has long frustrated officials in Washington and is now front and center with the revelations of sweeping U.S. data mining. The media has focused at length on China's aggressive attempts to electronically steal U.S. military and commercial secrets, but Xi pushed back at the "shirt-sleeves" summit, noting that China, too, was the recipient of cyber-espionage. But what Obama probably neglected to mention is that he has his own hacker army, and it has burrowed its way deep, deep into China's networks.
  • It turns out that the Chinese government's allegations are essentially correct. According to a number of confidential sources, a highly secretive unit of the National Security Agency (NSA), the U.S. government's huge electronic eavesdropping organization, called the Office of Tailored Access Operations, or TAO, has successfully penetrated Chinese computer and telecommunications systems for almost 15 years, generating some of the best and most reliable intelligence information about what is going on inside the People's Republic of China.
Paul Merrell

US-Saudi Plan: Let 9,000 ISIS Fighters Walk Free from Mosul - to Fight in Syria - 0 views

  • Judging by both the words, and deeds of the Obama White House and its political ‘diplomatic’ appointees led by perfidious John Kerry and caustic Samantha Power – all evidence to date points to the US wanting to escalate its war on Syria – while happily baiting a military confrontation, and ‘World War‘ scenario with Russia and its allies in the process.  If this latest leak is indeed true – and time will certainly tell whether or not it is, it would constitute one of the most egregious violations of both US and international law – by the United States government and its theocratic dictator partner in Saudi Arabia. Washington’s own anti-terror legislation expressly forbids colluding to provide logistical or material support for terrorist groups, and this US-Saudi venture would be the latest in a long list of violations…
  • Here’s what makes this a potential shocker: the operation allows for safe passage for 9,000 ISIS fighters on the proviso that they are transferred from Iraq to eastern Syria in order to help US plans for “regime change” there.  “At the time of the assault, coalition aircraft would strike only on a pre-agreed detached buildings in the city, which are empty, the source said.” “According to him [the source], the plan of Washington and Riyadh also provides that the rebels move from Mosul to Syria for the attack on the government-controlled town of troops.” Essentially, Washington and Saudi Arabia, will allow 9,000 ISIS (Islamic State) fighter FREE passage into Syria if they agree to join Washington’s “regime change” operations there. This could also include, “… eastern regions of Syria to follow a major offensive operation, which involves the capture of Deir ez-Zor and Palmyra,” the source added. Before you write this story off as some ornate Russian psychological operation, consider the long trend arch. The US along with its generous Gulf sidekicks, have already established a solid track record of aiding and abetting ISIS – not just in Syria, but in Iraq too. The record shows that the US is guilty on a number of counts…
  • If the Mosul leak is true, then it wouldn’t be the first time that the US has provided cover in the military pantomime the world has come to know as “the fight against ISIS.” When large ISIS convoys crossed the Syrian desert to invade and occupy the ancient Syrian city of Palmyra in May 2015, the US ‘Coalition’ airforce did nothing, and allowed ISIS to take and destroy part of the world’s great historic cultural heritage, along with the murder of scores of innocent civilians. Professor Tim Anderson from Sydney University states: “U.S. weapons with Israeli ammunition were used by Islamic State group when taking over Palmyra. The extremists also had U.S. military rations.” “The U.S., which since 2014 claimed to be conducting a war against ISIS in Iraq and Syria, and which had air power and sophisticated surveillance of the region, did nothing to stop the huge ISIS advance on Palmyra.” The US isn’t even shy about its laissez-faire policy with ISIS in the field, with the New York Times openly boasting, “Any airstrikes against Islamic State militants in and around Palmyra would probably benefit the forces of President Bashar al-Assad. So far, United States-led airstrikes in Syria have largely focused on areas far outside government control, to avoid the perception of aiding a leader whose ouster President Obama has called for.”
  • ...4 more annotations...
  • More importantly however, is what kind of message an US statement like that sends to ISIS, as well as Al Nusra and other terrorist brigades inside Syria, which is basically, “we do not need to worry about US air strikes, only Syrian Army and Russian strikes.” This situation really sums up the utter fraud and contempt of the US deception in Syria, and it’s no surprise that the Russian Foreign Ministry are reticent to extend themselves any more where the US is concerned. Then, in March 2016, when ISIS fled Palmyra, back across the desert towards Deir ez-Zor and Raqqa – the great and powerful US ‘Coalition’ airforce actually helped ISIS in a number of ways, including allowing them free passage once more. In late August, we were told that the Turkish Army, alongside “allied Syrian rebels” (terrorist group Faylaq al-Sham) backed by the US air cover, invaded Syria in order to capture the “ISIS-held” town of Jarabulus, Syria, this supposedly to cut off ISIS’s last open route into Turkey. But what happened to ISIS? The NYT even admitted that, “… it appeared that most of the militants had fled without a fight.” Here, ISIS appears to have been given advanced warning – by either US or Turkish intelligence, as they left the contested town of Jarabulus quietly, but in droves. In reality, Turkey twisted this operation in order to attack and degrade Kurdish militias including the US-backed artificial construct called the Syrian Democratic Forces (SDF), and pro-Kurdish People’s Protection Units (YPG) and Kurdish Democratic Union Party (PYD), the Syrian affiliate of the militant Kurdistan Workers’ Party (PKK) in Iraq and Turkey – all of whom are meant to be fighting ISIS. Instead, they are now busy dodging Turkish artillery rounds. Confusing, yes, but true nonetheless.
  • It’s also common knowledge now, that top of the line US weaponry is being used by ISIS, both in Iraq, in Afghanistan and in Syria as well. In fact, if not for US weapons and supplies (along with US air intervention, or noninterventions), ISIS would have struggled to maintain many of the strategic positions it enjoys today. For the last 3 years, US officials have been dodging this issue, and when they do admit this is true, their patronizing party line is that, “this must be a mistake, if they do have US weapons, we didn’t mean it.” As if the world was born yesterday. Perhaps the most flagrant violation by the US-led forces in aiding and abetting ISIS took place on Sept 17, 2016, when the US-led Coalition bombed Syrian Army positions outside of Deir ez-Zor near al-Tharda Mountain, killing some 80 soldiers and injuring 100 more.  As if by design, an ISIS offensive began immediately following the US massacre of Syrian soldiers. Clearly, this bold move by the Pentagon paved the way for a major ISIS advance. To any normal observer, the US attack was a belligerent act of war that effective destroyed an already fragile bilateral ceasefire agreement, and yet the US response was to somehow blame Russia for calling an emergency UNSC meeting to discuss the incident. Judging by this response, it’s pretty clear that US wants to see the Syrian Conflict carry on for a while, and it will need groups like ISIS to make that happen.
  • The other problem with Washington’s hollow righteousness in the Middle East is that there are key members of the US-led “Coalition” who are financing ISIS, Al Nusra Front, Nour al Din Zinki, and Arar al Sham (all ‘moderate’ terrorists we’re told) militants in Syria, Iraq and beyond. This fact was recently admitted by former US Secretary of State and Democratic candidate Hillary Clinton, as revealed in this week’s batch of Wikileaks emails. Clinton writes: “While this military/para-military operation is moving forward, we need to use our diplomatic and more traditional intelligence assets to bring pressure on the governments of Qatar and Saudi Arabia, which are providing clandestine financial and logistic support to ISIL and other radical Sunni groups in the region.”  Add to that the multiple exposures over the last 3 years of the US CIA illegally trafficking lethal arms to Al Nusra and other terrorists through covert operations like Timber Sycamore. Still, US and NATO member state officials and their media gatekeepers continue to deny it and play dumb, rather than come clean that the United States and its ‘partners’ in the region are helping, not hindering ISIS terrorism. Some might ask: why would they do a thing like that? By now, the answer should be simple, but threefold:
  • ISIS is still one of Washington’s best hope for continuing instability, and “regime change” in Syria. The existence of ISIS in Syria and Iraq guarantees that Washington can invite itself to the party.  The ISIS brand has been a boon for the global military industrial complex and all of its bottom-feeder businesses and ‘security’ contract firms. What’s so comical yet even more tragic, is how prominent the topic of “ISIS” factors into all of the vapid ‘national security’ debates and media panels in this year’s US Presidential election, and in the dumbed-down ‘coverage’ of the delusional US mainstream media, led by Pentagon surrogate CNN, and hopeless FOX News. Judging by their prosaic ‘coverage’, neither the networks, nor Hillary Clinton or Donald Trump have the slightest clue of what the reality on the ground is. Instead we here, “My ISIS plan is better than yours!” The US political conversation has gone beyond ridiculousness. The corps of US military and CIA media spokesman aren’t much better. The sad part is some of them do know what is really happening, but would rather lie to the American public. With so much double dealing, who can you trust? Certainly not anyone in Washington. More on the White House’s latest dangerous proposition….
Paul Merrell

Remarks by the President on Review of Signals Intelligence | The White House - 0 views

  •  
    Trivial tweaks, no reform. Whatever meat there is will be found in a new Presidential Directive issued today that hasn't yet seen the light of day and may not because it contains classified information. 
Paul Merrell

The Ron Paul Institute for Peace and Prosperity : Congress Defers to President On NSA R... - 0 views

  • Written by Ron Paul
  • Congress’s decline from the Founders’ vision as “first among equals” in government to an echo chamber of the unitary executive, has been a slow but steady process. In the process we have seen a steady stream of unconstitutional wars and civil liberties abuses at home. Nowhere is this decline more evident than in the stark contrast between the Congressional response to intelligence agencies’ abuses during the post-Watergate era and its response to the far more serious NSA abuses uncovered in recent years.
  • The parallel to the present NSA scandals cannot be ignored. What is completely different, however, is that Congress is today acting as an advocate for the executive branch’s continuing abuses, and as an opponent to the civil liberties of US citizens. Not only has Congress – with a precious few exceptions – accepted the NSA’s mass spying program on American citizens, it has actually been encouraging the president to continue and expand the program!   Where once there was a Congressional committee to challenge and oppose the president’s abuse of power, today the president himself has been even allowed by a complacent Congress to hand pick his own NSA review commission!   Are we really expected to believe that a commission appointed by the president to look into the activities of the president’s intelligence services will come to anything more than a few superficial changes to give the impression of real reform?  
  • ...2 more annotations...
  • One of the president’s commission recommendations is that the NSA cease holding our phone records and demand that the private phone companies retain those records instead – for the NSA to access as it wishes. This is supposed to be reform?   The president will make a speech this Friday to tell the rest of us which of the suggestions made by his own commission he will decide to implement. Congress has no problem with that. Rep. Adam B. Schiff (D-Calif.) admitted last week that Congress has no intention of asserting itself in the process. “It’s my hope that [Obama will] do as much as he can through the executive process because the legislative process will be difficult, perilous and long.”
  • Senator Church famously said back in 1975: In the need to develop a capacity to know what potential enemies are doing, the United States government has perfected a technological capability that enables us to monitor the messages that go through the air… We must know, at the same time, that capability at any time could be turned around on the American people, and no American would have any privacy left... There would be no place to hide…. I know the capacity that is there to make tyranny total in America, and we must see to it that this agency and all agencies that possess this technology operate within the law and under proper supervision so that we never cross over that abyss. That is the abyss from which there is no return.” Have we reached that point? Let us hope not. Real reform begins with the repeal of the PATRIOT Act and of the 2001 Authorization for the use of military force. If we keep our eye on that goal and not allow ourselves to become distracted with the president’s phony commissions we might force Congress to listen.
  •  
    Ron Paul gives us a history lesson on Congressional oversight of NSA abuses and contrasts that with today's Congressional obedience to the unitary Executive's wishes.
Paul Merrell

NSA is after industrial spying - Snowden to German TV - RT News - 0 views

  • The NSA agency is not preoccupied solely with national security, but also spies on foreign industrial entities in US business interests, former American intelligence contractor, Edward Snowden, has revealed in an interview to German TV. Edward Snowden chose the German ARD broadcaster to make his first TV interview ever since he became a whistleblower. The interview was made in strict secrecy in an unspecified location in Russia, where Snowden is currently living under temporary asylum. “There is no question that the US is engaged in economic spying,” said Snowden. If an industrial giant like Siemens has something that the NSA believes “would be beneficial to the national interests, not the national security, of the United States, they will go after that information and they'll take it,” the whistleblower said, giving an example.
  • The Germans - according to polls – have lost confidence in the US as a trustworthy partner, and the majority of them consider NSA whistleblower Edward Snowden a hero.
  • In order to mend fences, US President Barack Obama made a rare appearance on German TV. On January 18 President Obama told the ZDF TV channel that “As long as I'm president of the United States, the chancellor of Germany will not have to worry about this.” Yet Germany remains skeptical about US promises of discontinuing spying on foreign leaders, and is in the vanguard of a number of European countries aiming to change data privacy rules in the EU. Former NSA contractor, Edward Snowden, remains in Russia, where his temporary political asylum status could be extended every year. He has no plans for returning to the US where he would face trial for alleged treason.
Paul Merrell

Half of Federal Agencies Still Use Outdated Freedom of Information Regulations - 0 views

  • Nearly half (50 out of 101) of all federal agencies have still not updated their Freedom of Information Act regulations to comply with Congress's 2007 FOIA amendments, and even more agencies (55 of 101) have FOIA regulations that predate and ignore President Obama's and Attorney General Holder's 2009 guidance for a "presumption of disclosure," according to the new National Security Archive FOIA Audit released today to mark Sunshine Week. Congress amended the Freedom of Information Act in 2007 to prohibit agencies from charging processing fees if they missed their response deadlines, to include new online journalists in the fee waiver category for the media, to order agencies to cooperate with the new FOIA ombudsman (the Office of Government Information Services, OGIS), and to require reports of specific data on their FOIA output, among other provisions co-authored by Senators Patrick Leahy (D-VT) and John Cornyn (R-TX). But half the government has yet to incorporate these changes in their regulations, according to the latest National Security Archive FOIA Audit. After President Obama's "Day One" commitments to open government, Attorney General Eric Holder issued new FOIA guidance on March 19, 2009, declaring that agencies should adopt a "presumption of disclosure," encourage discretionary releases if there was no foreseeable harm (even if technically covered by an exemption), proactively post the records of greatest public interest online, and remove "unnecessary bureaucratic hurdles" from the FOIA process. But five years later, the Archive found a majority of agencies have old regulations that simply ignore this guidance.
  • The Archive's FOIA Audit also highlights some good news this Sunshine Week: New plans from both the House of Representatives and White House have the potential to compel delinquent agencies to update their regulations. "Both Congress and the White House now recognize the problem of outdated FOIA regulations, and that is something to celebrate," said Archive director Tom Blanton. "But new regs should not follow the Justice Department's terrible lead, they must follow the best practices already identified by the FOIA ombuds office and FOIA experts." "If and when this important FOIA reform occurs, open government watchdogs must be vigilant to ensure that the agencies' updated regulations are progressive, rather than regressive, and embrace best practices to ensure that more documents are released to requesters, more quickly" said Nate Jones, the Archive's FOIA coordinator.
  • In 2011, the back-to-back Rosemary Award-winning Department of Justice proposed FOIA regulations that would have — among many other FOIA setbacks — allowed the Department to lie to FOIA requesters, eliminated online-only publications from receiving media fee status, and made it easier to destroy records. After intense pushback by openness advocates, the DOJ temporarily pulled these regulations, and Pustay claimed, "some people misinterpreted what we were trying to do, misconstrued some of the provisions, and didn't necessarily understand some of the fee guidelines." Pustay also claimed — to an incredulous Senate Judiciary Committee — that updating FOIA regulations to conform with the 2007 OPEN Government Act was merely optional and "not required." National Security Archive director Tom Blanton warned in his own 2013 Senate testimony that these terrible "vampire" regulations were not gone for good. This year, Pustay testified that the Department of Justice has indeed resubmitted its FOIA regulations for OMB approval; their content is unknown to the public.
  • ...4 more annotations...
  • The House of Representatives recently unanimously passed the bipartisan Freedom of Information Act Implementation Act (H.R. 1211), which includes a provision compelling agencies to update their FOIA regulations. The House bill — which now awaits Senate approval — would require each agency to update its FOIA regulations "not later than 180 days after the enactment of this Act." The White House is also addressing the problem of outdated FOIA regulations, albeit in a different manner. In its latest Open Government Partnership National Action Plan, the White House has committed (on paper, at least) to creating one "core FOIA regulation and common set of practices [that] would make it easier for requesters to understand and navigate the FOIA process and easier for the Government to keep regulations up to date." Transparency watchdogs went on alert this week after the Department of Justice's Director of Information Policy Melanie Pustay announced during her Senate testimony on March 11, 2014 that, "My office is leading that project" to create the White House-backed common regulation which, she estimated will be, "a one or two year project." Despite Pustay's pledge that she would accept input from OGIS and the requester community, her Department's history of crafting FOIA regulations has been anything but stellar.
  • As the Department of Justice and other agencies have demonstrated, new regulations do not necessarily make good regulations. As such, the National Security Archive has recommended that any updated FOIA regulations must: mandate that FOIA officers embrace direct communications with requesters; require agencies to receive requests by e-mail and post all responses and documents online; direct agencies to update their FOIA processing software so documents can be posted to any online repository, including the government-sponsored FOIAonline; encourage agencies to join FOIAonline to make their FOIA processing more cost-effective and efficient; stream-line inter and intra-agency "referral" black holes — and keep requesters abreast of where their requests are if the agency does have to refer them; include language encouraging use of the OGIS, which can help requesters and agencies mediate disputes to avoid animosity and costly litigation; end the practice of using fees to discourage FOIA requesters. The Office of Government Information Services — which reviews and comments on agency regulations as they are proposed — has also compiled a list of best practices for agencies to consider while crafting regulations. These include: "let the Freedom of Information Act itself" — and its presumption for disclosure — "be your guide;" bring attorneys, FOIA processors, records managers and IT pros to the table; include your plan for records management and preservation; and alert requesters of their option to contact OGIS for mediation and dispute resolution services.
  • A useful compilation of current agency FOIA regulation language — already on the books — put together by the Center of Effective Government also includes helpful guidelines on preventing the destruction of requested records; narrowly interpreting claims of confidential business information; and clarifying fee waivers and procedures. FOIA experts are currently working to craft model, pro-transparency, CFR-ready language that agencies — or the drafters of government-wide common regulations — can use to bring agencies' Freedom of Information Act regulations up to standard. Watch this space, and then watch the Code of Federal Regulations (CFR). "As the staffer who waded through every single federal agencies' FOIA website and CFR chapter to locate their — sometimes hidden — regulations, I learned FOIA officials often say they view their FOIA requesters as customers," said Archive researcher Lauren Harper, "I think easy to find, updated model FOIA regulations are the best way for agencies to demonstrate they truly value their customer service, and the spirit of the FOIA."
  • The National Security Archive has conducted thirteen FOIA audits since 2002. Modeled after the California Sunshine Survey and subsequent state "FOI Audits," the Archive's FOIA Audits use open-government laws to test whether or not agencies are obeying those same laws. Recommendations from previous Archive FOIA Audits have led directly to laws and executive orders which have: set explicit customer service guidelines, mandated FOIA backlog reduction, assigned individualized FOIA tracking numbers, forced agencies to report the average number of days needed to process requests, and revealed the (often embarrassing) ages of the oldest pending FOIA requests. The surveys include:
  •  
    Article includes tables indicating which agencies are out of compliance with which FOIA directives. 
« First ‹ Previous 281 - 300 of 368 Next › Last »
Showing 20 items per page