Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged Personal-Information

Rss Feed Group items tagged

Paul Merrell

Canadians have united to reject fear and stop Bill C-51. Will the government listen? | ... - 0 views

  • It's rare in Canadian politics to see intense public interest in government legislative proposals -- let alone to see Canadians take to the streets in the tens of thousands to protest a piece of legislation by name. Yet that's exactly what has happened in the case of Bill C-51, which critics, including The Globe and Mail's editorial team, say will undermine basic democratic values and lead to the creation of a "secret police force" in Canada. In the space of a few short months since Bill C-51 was announced, hundreds of thousands of people have taken action to stop it: signing petitions, writing letters to local newspapers, phoning and writing to their member of Parliament, and hitting the streets in nationwide demonstrations in over 70 communities across Canada. It's not hard to see why so many people are concerned. Canada's top privacy and security experts warn that this legislation will undermine democratic rights Canadians have enjoyed for generations. For example, according to professors Craig Forcese and Kent Roach, who have conducted a detailed legal analysis of the legislation, Bill C-51 will:
  • Undermine Canadians' privacy by allowing widespread information disclosures among government agencies, and by giving the Canadian Security and Intelligence Service (CSIS) access to personal information held by up to 17 government departments. Even Stephen Harper has admitted that these kinds of dragnet surveillance measures are ineffective. Chill free speech online by criminalizing what is loosely defined as the promotion of "terrorism offences in general" and even showing "reckless disregard" for whether a particular post may encourage a violent act. As Forcese and Roach point out in their testimony to the Senate Standing Committee on National Security and Defence, "The new speech crime in our view violates freedom of expression because it reaches well beyond the sort of speech that threatens actual violence." Dramatically expand the powers of CSIS, without any commensurate increase in oversight or review measures. The legislation even allows CSIS to obtain a warrant permitting them to break the law and contravene the Charter rights of Canadians. Under C-51, such warrants would be granted in a secret hearing, with no representation from the target of such measures, and with no right of appeal.
  • So it's no surprise that Canadians are worried. What is unprecedented however, is the sheer number of Canadians taking part in the campaign to stop the bill. My organization, OpenMedia, has been campaigning on privacy issues for years -- but in all our time, we've never seen a public outpouring quite like this. Our joint efforts are clearly having an impact: public opinion has swung dramatically against Bill C-51 since it was announced. Support has plummeted, with a recent Forum Research poll finding that 56 per cent of Canadians now oppose Bill C-51, with just 33 per cent in favour. The business community, civic society groups, and principled conservatives have all spoken out. Sadly, there's no sign that the government is listening. At the time of writing, the government seems determined to use its majority to ram the legislation through the Commons in the coming weeks. What's even more worrying is that this reckless, dangerous, and ineffective legislation will further undermine Canadians' privacy rights -- rights that have already been seriously damaged by the government's Bill C-13, passed late last year, and by the government's failure to address the mass surveillance activities of its Canadian Security Establishment (CSE) intelligence agency.
Paul Merrell

Putin signs "undesirable NGOs" Bill into Law | nsnbc international - 0 views

  • Russian President Vladimir Putin has signed a bill, enabling the designation of foreign and foreign-funded NGOs as undesirables after the bill passed both the Lower and Upper House of Parliament.
  • The bill authorizes the designation of foreign and foreign funded non-profit as well as for profit NGOs as “undesirables” on grounds of “national security. The bill passed the second reading in Russia’s Lower House of Parliament (State Duma), last week and was approved by the Upper House of Parliament, the Federation Council. The bill had been proposed by legislators of the governing United Russia party of President Vladimir Putin, The passing of the bill in both houses of parliament and the signing of the bill by Putin was no surprise since United Russia has a majority in both chambers. The bill has been heavily criticized by foreign, particularly western media, western politicians and primarily western-based or funded NGOs, including Human Rights Watch, Amnesty International, among many others. One of the NGOs that is certain to fall under the provisions of the bill is USAID.
  • he new law follows up on a law that was adopted in 2012 that obliged foreign-funded non-governmental organizations to register as “foreign agents”. The law provides for declaring foreigners and foreign-funded NGOs as“undesirable”. Persons who are violating the newly adopted law could face a fine up to 10,000 dollar to be paid in local currency and up to six years imprisonment. Supporters of the bill are referring to the risk that foreign-funded NGOs could pose to the Russian Federation’s national security while critics maintain that the wording of the legislation and especially the term “undesirable” is ambiguous and opens the floodgates for the abuse of the law to crack down on legal and legitimate dissent.
  • ...5 more annotations...
  • While the wording and the use of “undesirable” is ambiguous and does pose legal problems as much as it opens the floodgates for the abuse of the legislation, there may be a good reason for keeping the wording ambiguous. Internationally acting NGOs have increasingly become “weaponized”; That is, that they have increasingly been utilized as tool for everything from supporting legitimate dissent to the organization of political violence and coup d’état. Another disturbing fact is that this pattern includes UN organizations such as the UN Interagency Framework Team for Preventive Action (Framework Team). Examples? Doctors Without Borders (MSF) played a key role in accusing the Syrian government for the use of chemical weapons, stating MSF sources. Later on the NGO had to admit that it had no staff in Damascus and exclusively relied on statements by “partners” in “rebel-held territories”.
  • Amnesty International for its part issued a report about alleged war crimes committed during NATO’s bombing of Libya in 2011. A 2012 report by Amnesty International claimed that Operation Unified Protector, authorized by UNSC Resolution 1973 has resulted in 55 documented cases of named civilian casualties, including 16 children and 14 women that were killed in air strikes in the capital Tripoli and the towns of Zliten, Majer, Sirte, and Brega. The low figure is utterly inconsistent with casualty figures provided by local NGOs as well as documented eyewitness reports. Two things are worth considering with regard to the Amnesty report. During the first night of the operation NATO forces launched over 100 cruise missiles into Tripoli alone.
  • The Director of Amnesty International at that time was Suzanne Nozzel, who also worked as adviser on U.S. government – NGO relations for the then U.S. Secretary of State Hillary Clinton.
  • While Human Right Watch does, indeed, engage in justified human rights advocacy, it has also been engaged in issuing strongly biased reports, in politicizing that “representatives are denied entry to e.g. Egypt”, while failing to mention that proper visa procedures had not been followed, and so forth. The most disturbing NGO may, however, be the UN Interagency Framework Team for Preventive Action. The Framework Team is largely privately funded with George Soros as one of the primary sponsors. The NGO under UN cover is “coordinating UN, governmental and non-governmental initiatives”.
  • The UN organization could undoubtedly be useful but it has also been sharply criticized for “fanning the flames” of the inter-communal violence in Myanmar’s Rakhine State, and for its active role in creating rather than preventing ethnic and sectarian disputes and violence in Nepal. In both the case of Myanmar and in the case of Nepal it is easy to establish ties between the Framework Team and Western or Western allied intelligence services. Criticism of the ambiguous wording of the new Russian legislation is, in other words, as justified as criticism of NGOs who prostitute themselves and the best intentions of the members at their base as pawns in geopolitical chess-games.
  •  
    More than understandable given the long history of the U.S. weaponizing NGOs in aid of its "color revolutions" strategy to overthrow governments in secular states and left-leaning democracies. The most recent examples are the successful U.S. coup in Ukraine and the thrice-failed coup attempts in Venezuela.  U.S. NGOs have been attempting to provoke such a coup in Russia for some time but have failed thus far because of Putin's immense popularity and a perhaps better-informed Russian public. The Russian people know they are under attack and have wisely closed ranks rather than falling for a divide-and-conquer strategy. Venezuela recently enacted similar legislation.  
Paul Merrell

Security Experts Oppose Government Access to Encrypted Communication - The New York Times - 0 views

  • An elite group of security technologists has concluded that the American and British governments cannot demand special access to encrypted communications without putting the world’s most confidential data and critical infrastructure in danger.A new paper from the group, made up of 14 of the world’s pre-eminent cryptographers and computer scientists, is a formidable salvo in a skirmish between intelligence and law enforcement leaders, and technologists and privacy advocates. After Edward J. Snowden’s revelations — with security breaches and awareness of nation-state surveillance at a record high and data moving online at breakneck speeds — encryption has emerged as a major issue in the debate over privacy rights.
  • That has put Silicon Valley at the center of a tug of war. Technology companies including Apple, Microsoft and Google have been moving to encrypt more of their corporate and customer data after learning that the National Security Agency and its counterparts were siphoning off digital communications and hacking into corporate data centers.
  • Yet law enforcement and intelligence agency leaders argue that such efforts thwart their ability to monitor kidnappers, terrorists and other adversaries. In Britain, Prime Minister David Cameron threatened to ban encrypted messages altogether. In the United States, Michael S. Rogers, the director of the N.S.A., proposed that technology companies be required to create a digital key to unlock encrypted data, but to divide the key into pieces and secure it so that no one person or government agency could use it alone.The encryption debate has left both sides bitterly divided and in fighting mode. The group of cryptographers deliberately issued its report a day before James B. Comey Jr., the director of the Federal Bureau of Investigation, and Sally Quillian Yates, the deputy attorney general at the Justice Department, are scheduled to testify before the Senate Judiciary Committee on the concerns that they and other government agencies have that encryption technologies will prevent them from effectively doing their jobs.
  • ...2 more annotations...
  • The new paper is the first in-depth technical analysis of government proposals by leading cryptographers and security thinkers, including Whitfield Diffie, a pioneer of public key cryptography, and Ronald L. Rivest, the “R” in the widely used RSA public cryptography algorithm. In the report, the group said any effort to give the government “exceptional access” to encrypted communications was technically unfeasible and would leave confidential data and critical infrastructure like banks and the power grid at risk. Handing governments a key to encrypted communications would also require an extraordinary degree of trust. With government agency breaches now the norm — most recently at the United States Office of Personnel Management, the State Department and the White House — the security specialists said authorities could not be trusted to keep such keys safe from hackers and criminals. They added that if the United States and Britain mandated backdoor keys to communications, China and other governments in foreign markets would be spurred to do the same.
  • “Such access will open doors through which criminals and malicious nation-states can attack the very individuals law enforcement seeks to defend,” the report said. “The costs would be substantial, the damage to innovation severe and the consequences to economic growth hard to predict. The costs to the developed countries’ soft power and to our moral authority would also be considerable.”
  •  
    Our system of government does not expect that every criminal will be apprehended and convicted. There are numerous values our society believes are more important. Some examples: [i] a presumption of innocence unless guilt is established beyond any reasonable doubt; [ii] the requirement that government officials convince a neutral magistrate that they have probable cause to believe that a search or seizure will produce evidence of a crime; [iii] many communications cannot be compelled to be disclosed and used in evidence, such as attorney-client communications, spousal communications, and priest-penitent communications; and [iv] etc. Moral of my story: the government needs a much stronger reason to justify interception of communications than saying, "some crooks will escape prosecution if we can't do that." We have a right to whisper to each other, concealing our communicatons from all others. Why does the right to whisper privately disappear if our whisperings are done electronically? The Supreme Court took its first step on a very slippery slope when it permitted wiretapping in Olmstead v. United States, 277 U.S. 438, 48 S. Ct. 564, 72 L. Ed. 944 (1928). https://goo.gl/LaZGHt It's been a long slide ever since. It's past time to revisit Olmstead and recognize that American citizens have the absolute right to communicate privately. "The President … recognizes that U.S. citizens and institutions should have a reasonable expectation of privacy from foreign or domestic intercept when using the public telephone system." - Brent Scowcroft, U.S. National Security Advisor, National Security Decision Memorandum 338 (1 September 1976) (Nixon administration), http://www.fas.org/irp/offdocs/nsdm-ford/nsdm-338.pdf   
Paul Merrell

Belgium sues Facebook over illegal Privacy Violations of Users and Non-Users | nsnbc in... - 0 views

  • The Belgian government will be suing Facebook. The Commission for the Protection of Privacy states that Facebook violates Belgian and EU law by tracking systems that target both Facebook users as well as non-Facebook users. Facebook is known for cooperating with the U.S.’ National Security Agency. 
  • The Belgian privacy watchdog’s case against the internet giant Facebook will be heard at a court in Brussels on Thursday. The Commission has repeatedly requested that Facebook should comply with Belgian and EU law. Facebook failed to comply, and the Commission has no power to enforce the law; hence the decision to sue Facebook to attain a a court ruling. The President of the Commission for the Protection of Privacy, Willem Debeuckelaere, told the press that: “Facebook treats its users’ private lives without respect and that needs tackling. It’s not because we want to start a lawsuit over this, but we cannot continue to negotiate through other means. .. We want a judge to impose our recommendations. These recommendations are chiefly aimed at protecting internet users who are not Facebook members.”
  • The Belgian privacy watchdog alleges that Facebook tracks the web browsing of all visitors, including those who have specifically turned the tracking function off; This gathering of private information allegedly also includes those who do not have a Facebook account. Moreover, the Commission claims that Facebook has the capability to surveil computers without consent, even when users are logged out; and Facebook can monitor every PC of users that use websites with Facebook plugins. The capability to monitor both Facebook users and non-Facebook users allegedly functions via Cookies that store information about user’s internet activities, including preferential settings of websites and which websites internet users have visited. The Commission claims that Facebook installs these Cookies on all computers that visit websites that for example have a Facebook plugin to share internet content. That includes the computers of persons who do not make use of Facebook’s “share” or “like” button.
  • ...1 more annotation...
  • In other words, Facebook has the capacity to monitor your browser settings as well as which websites you have visited if you have read this article or any other article on any website that contains a Facebook “share” button, whether you “like” it or not. The Commissions lawsuit against Facebook is or particular importance due to the fact that the corporation is known for its cooperation with the United States’ National Security Agency (NSA). While the lawsuit is of particular interest for Belgian and EU citizens, it also sheds light on Facebook’s monitoring of U.S. citizens.
Paul Merrell

US Senate wants to know more about the intrusive "dirtboxes" that spy on Americans from... - 0 views

  • Sen. Jon Tester (D-MT) has sent a letter to the Department of Homeland Security and outgoing Attorney General Eric Holder to learn more about the use of “dirtboxes,” which collect phone data by masquerading as a nearby cell tower. The letter, which was co-signed by Democratic and Independent senators from Alaska, Vermont, and other states, argues that dirtboxes “potentially violate the Fourth Amendment and represent a significant intrusion into the private lives of thousands of Americans.” . The senators wrote the letter, which was sent on Wednesday, in response to a Wall Street Journal report about a US Marshals program that attaches these dirtboxes to planes flying across the United States. This reportedly allows law enforcement to collect information about “tens of thousands” of citizens under the planes’ flight path. It’s not clear how often these planes are flown. But it is clear that the devices  can determine someone’s location within a few meters, which could allow law enforcement to tell if that person is in a specific room inside a building, instead of merely knowing their general location. The devices are also thought to be able to snoop on phone calls, text messages, and other information transferred to affected cellphones.
  • Uber dra
Paul Merrell

Florida Event Spotlights Signs of Foreign Support of 9/11 Plot | 28Pages.org - 0 views

  • Last month, 9/11 parents Loreen and Matt Sellitto hosted an informative event focused on one of the most important yet least-understood aspects of September 11: the extent to which the terrorists received support from foreign governments—and the extent of the government’s knowledge of that support, both before and after the attacks.
  • Held in Naples, Florida, the November 11 event was called “The Untold Story of 9/11: A Conversation with Bob Graham.” Following opening remarks from host Loreen Sellitto and from Terry Strada of 9/11 Families United for Justice Against Terrorism, the event featured three speakers: Former Senator Bob Graham, the most prominent voice outside government fighting for declassification of the 28 pages. Broward Bulldog editor Dan Christensen, who broke the story of the FBI’s discovery of a 9/11 cell in Sarasota, and who continues working to bring FBI investigation documents into the daylight. Attorney Tom Julin, who is helping the Broward Bulldog in its effort to overcome the government’s stonewalling. Here, we cover many of the highlights; a full video of the event can be found at the bottom of the page.
  • Broward Bulldog Battles Feds Over Sarasota Investigation Christensen’s quest for answers about foreign sources of support of the 9/11 hijackers began in 2011 with a tip passed to him by Anthony Summers, who, with his wife Robbyn Swan, had just completed their book, “The Eleventh Day.” Summers and Swan had learned about an FBI investigation of a Saudi family with close ties to the Saudi government that suddenly abandoned its upscale home just outside Sarasota about two weeks before 9/11. Pursuing the lead, Christensen contacted Senator Graham for his insights into the Sarasota cell. Braced for the possibility that Graham would decline comment because of classification restraints, Christensen was stunned to learn that Graham—who had been chairman of the Senate Intelligence Committee and co-chaired the joint Congressional inquiry into 9/11—was unable to comment for an altogether different reason: Graham said the FBI had never told him about its Sarasota investigation.
  • ...4 more annotations...
  • Christensen then inquired with the FBI, which confirmed there had been an investigation, but said it found no connection to 9/11. Next, seeking to learn how they reached that conclusion, he requested the FBI’s investigation documents using the Freedom of Information Act (FOIA), but the FBI said there were no documents matching the request. Finding that completely implausible, in September 2012, Christensen and the Broward Bulldog filed a FOIA lawsuit. About six months later, the FBI sent Christensen 35 partially redacted pages that contained a bombshell conclusion directly contradicting the government’s earlier denials: The investigation had in fact “revealed many connections” between the Saudi family that fled their home and “individuals associated with the terrorist attacks on 9/11/2001.” (Indeed, investigations showed the home had been called and even visited by future 9/11 hijackers.)
  • In April 2014, as the Bulldog’s lawsuit progressed, Fort Lauderdale U.S. District Judge William Zloch ordered the FBI to conduct a more thorough search of its files, chiding the government for advancing “nonsensical” legal arguments in its effort to maintain secrecy. Later, he ordered the FBI to turn over more than 80,000 pages from its Tampa office so he could personally review them and reach his own conclusions about the need for secrecy. The judge’s review of that enormous cache is still underway.
  • Julin, in addition to providing an interesting elaboration on the legal battle to liberate the FBI’s Sarasota files, explained the Broward Bulldog’s attempts to secure the release of the 28-page finding on foreign government support of the 9/11 hijackers found in the 2002 report of the joint Congressional inquiry. Julin is helping Christensen, Summers and Swan push for the declassification of the 28 pages through a little-known process called Mandatory Declassification Review. Under that process, an agency’s refusal to declassify material can ultimately be appealed to a multi-agency panel that reviews the material and presents a recommendation to the president. The panel is now reviewing the 28 pages. While there’s no deadline, Julin has been told to expect the panel’s recommendation to President Obama sometime this winter.
  • Graham also explored the questions of: Why would the Saudis support Islamic terrorists operating in the United States? Why did the Bush administration shield Saudi Arabia by preventing the release of damning material? Why would the Obama administration continue the Bush administration’s “soft treatment” of Saudi Arabia? In the course of his remarks, Graham briefly discussed two of his books. The first, “Intelligence Matters: The CIA, the FBI, Saudi Arabia and the Failure of America’s War on Terror,” is a non-fiction work, which required advance clearance from the federal government that resulted in many passages being censored. That disappointing experience prompted Graham to do an end-run around government censors by publishing “Keys to the Kingdom,” a work labelled as fiction but which Graham used to write on the topic with greater freedom.
Paul Merrell

John McCain, Conductor of the "Arab Spring" and the Caliph , by Thierry Meyssan - 0 views

  • Everyone has noticed the contradiction of those who recently characterized the Islamic Emirate as "freedom fighters" in Syria and who are indignant today faced with its abuses in Iraq. But if that speech is incoherent in itself, it makes perfect sense in the strategic plan: the same individuals were to be presented as allies yesterday and must be as enemies today, even if they are still on orders from Washington. Thierry Meyssan reveals below US policy through the particular case of Senator John McCain, conductor of the "Arab Spring" and longtime partner of Caliph Ibrahim.
  • ohn McCain is known as the leader of the Republicans and unhappy 2008 US presidential candidate. This is, we will see, only the real part of his biography, which serves as a cover to conduct covert actions on behalf of his government. When I was in Libya during the "Western"attack, I was able to view a report of the foreign intelligence services. It stated that, on February 4, 2011 in Cairo, NATO organized a meeting to launch the "Arab Spring" in Libya and Syria. According to this document, the meeting was chaired by John McCain. The report detailed the list of Libyan participants, whose delegation was led by the No. 2 man of the government of the day, Mahmoud Jibril, who abruptly switched sides at the entrance of the meeting to become the opposition leader in exile. I remember that, among the French delegates present, the report quoted Bernard-Henry Lévy, although officially he had never exercised functions within the French government. Many other personalities attended the symposium, including a large delegation of Syrians living abroad.
  • Emerging from the meeting, the mysterious Syrian Revolution 2011 Facebook account called for demonstrations outside the People’s Council (National Assembly) in Damascus on February 11. Although this Facebook account at the time claimed to have more than 40,000 followers, only a dozen people responded to its call before the flashes of photographers and hundreds of police. The demonstration dispersed peacefully and clashes only began more than a month later in Deraa. [1] On February 16, 2011, a demonstration underway in Benghazi, in memory of members of the Islamic Fighting Group in Libya [2] massacred in 1996 in the Abu Selim prison, degenerated into shooting. The next day, a second event, this time in memory of those who died by attacking the Danish consulate during the Muhammad cartoons affair, also degenerated into shooting. At the same time, members of the Islamic Fighting Group in Libya ,coming from Egypt and coordinated by unidentified, hooded individuals, simultaneously attacked four military bases in four different cities. After three days of fighting and atrocities, the rebels launched the uprising of Cyrenaica against Tripolitania [3]; a terrorist attack that the western press falsely presented as a "democratic revolution" against "the regime" of Muammar el-Qaddafi.
  • ...16 more annotations...
  • On February 22nd, John McCain was in Lebanon. He met members of the Future Movement (the party of Saad Hariri) whom he charged to oversee the transfer of arms to Syria around the MP Okab Sakr [4]. Then, leaving Beirut, he inspected the Syrian border and the selected villages including Ersal, which were used as a basis to back mercenaries in the war to come. The meetings chaired by John McCain were clearly the trigger point for a long-prepared Washington plan; the plan that would have the UK and France attack Libya and Syria simultaneously, following the doctrine of "leadership from behind" and the annex of the Treaty of Lancaster House of November 2010. [5]
  • In May 2013, Senator John McCain made his way illegally to near Idleb in Syria via Turkey to meet with leaders of the "armed opposition". His trip was not made public until his return to Washington. [6] This movement was organized by the Syrian Emergency Task Force, which, contrary to its title, is a Zionist Organization led by a Palestinian employee of AIPAC [7]
  • John McCain in Syria. In the foreground at right is the director of the Syrian Emergency Task Force. In the doorway, center, Mohammad Nour.
  • In photographs released at that time, one noticed the presence of Mohammad Nour, a spokesman for the Northern Storm Brigade (of the Al-Nosra Front, that is to say, al-Qaeda in Syria), who kidnapped and held 11 Lebanese Shiite pilgrims in Azaz. [8] Asked about his proximity to al-Qaeda kidnappers, the Senator claimed not to know Mohammad Nour who would have invited himself into this photo. The affair made a great noise and the families of the abducted pilgrims lodged a complaint before the Lebanese judiciary against Senator McCain for complicity in kidnapping. Ultimately, an agreement was reached and the pilgrims were released. Let’s suppose that Senator McCain had told the truth and that he was abused by Mohammad Nour. The object of his illegal trip to Syria was to meet the chiefs of staff of the Free Syrian Army. According to him, the organization was composed "exclusively of Syrians" fighting for "their freedom" against the "Alouite dictatorship” (sic). The tour organizers published this photograph to attest to the meeting.
  • John McCain and the heads of the Free Syrian Army. In the left foreground, Ibrahim al-Badri, with which the Senator is talking. Next, Brigadier General Salim Idris (with glasses).
  • If we can see Brigadier General Idriss Salem, head of the Free Syrian Army, one can also see Ibrahim al-Badri (foreground on the left) with whom the senator is talking. Back from the surprise trip, John McCain claimed that all those responsible for the Free Syrian Army were "moderates who can be trusted" (sic).
  • However, since October 4, 2011, Ibrahim al-Badri (also known as Abu Du’a) was on the list of the five terrorists most wanted by the United States (Rewards for Justice). A premium of up to $ 10 million was offered to anyone who would assist in his capture. [9] The next day, October 5, 2011, Ibrahim al-Badri was included in the list of the Sanctions Committee of the UN as a member of Al Qaeda. [10] In addition, a month before receiving Senator McCain, Ibrahim al-Badri, known under his nom de guerre as Abu Bakr al-Baghdadi, created the Islamic State in Iraq and the Levant (ÉIIL) – all the while still belonging to the staff of the very "moderate" Free Syrian Army. He claimed as his own the attack on the Taj and Abu Ghraib prisons in Iraq, from which he helped between 500 and 1,000 jihadists escape who then joined his organization. This attack was coordinated with other almost simultaneous operations in eight other countries. Each time, the escapees joined the jihadist organizations fighting in Syria. This case is so strange that Interpol issued a note and requested the assistance of the 190 member countries. [11]
  • For my part, I have always said that there was no difference on the ground between the Free Syrian Army, Al-Nosra Front, the Islamic Emirate etc ... All these organizations are composed of the same individuals who continuously change flag. When they pose as the Free Syrian Army, they fly the flag of French colonization and speak only of overthrowing the "dog Bashar." When they say they belong to Al-Nosra Front, they carry the flag of al Qaeda and declare their intention to spread Islam in the world. Finally when they say they are the Islamic Emirate, they brandish the flag of the Caliphate and announce that they will clean the area of all infidels. But whatever the label, they proceed to the same abuses: rape, torture, beheadings, crucifixions. Yet neither Senator McCain nor his companions of the Syrian Emergency Task Force provided the information in their possession on Ibrahim al-Badri to the State Department, nor have they asked for the reward. Nor have they informed the anti-terrorism Committee of the UN.
  • But John McCain is not just the leader of the political opposition to President Obama, he is also one of his senior officials! He is in fact President of the International Republican Institute (IRI), the republican branch of NED / CIA [12], since January 1993. This so-called "NGO" was officially established by President Ronald Reagan to extend certain activities of the CIA, in connection with the British, Canadian and Australian secret services. Contrary to its claims, it is indeed an inter-governmental agency. Its budget is approved by Congress in a budget line dependent of the Secretary of State. It is also because it is a joint agency of the Anglo-Saxon secret services that several states in the world prohibit it from any activity on their territory.
  • he list of interventions by John McCain on behalf of the State Department is impressive. He participated in all the color revolutions of the last twenty years.
  • And an agent that has the best coverage imaginable: he is the official opponent of Barack Obama. As such, he can travel anywhere in the world (he is the most traveled US senator) and meet whoever he wants without fear. If his interlocutors approve Washington policy, he promised them to continue it, if they fight it, he hands over the responsibility to President Obama.
  • In 2003, France’s opposition was not enough to offset the influence of the Committee for the Liberation of Iraq. The United States attacked the country again and this time overthrew President Hussein. Of course, John McCain was a major contributor to the Committee. After handing to a private company the care of plundering the country for a year [17], they tried to partition Iraq into three separate states, but had to give it up due to the resistance of the population. They tried again in 2007, around the Biden-Brownback resolution, but again failed. [18] Hence the current strategy that attempts to achieve this by means of a non-state actor: the Islamic Emirate.
  • The operation was planned well in advance, even before the meeting between John McCain and Ibrahim al-Badri. For example, internal correspondence from the Qatari Ministry of Foreign Affairs, published by my friends James and Joanne Moriarty [19], shows that 5,000 jihadis were trained at the expense of Qatar in NATO’s Libya in 2012, and 2,5 million dollars was paid at the same time to the future Caliph. In January of 2014, the Congress of the United States held a secret meeting at which it voted, in violation of international law, to approve funding for the Al-Nosra Front (Al-Qaeda) and the Islamic emirate in Iraq and the Levant until September 2014. [20] Although it is unclear precisely what was really agreed to during this meeting revealed by the British Reuters news agency [21], and no media US media dared bypass censorship, it is highly probable that the law includes a section on arming and training jihadists.
  • Proud of this US funding, Saudi Arabia has claimed on its public television channel, Al-Arabiya, that the Islamic Emirate was headed by Prince Abdul Rahman al-Faisal, brother of Prince Saud al Faisal (Foreign Minister) and Prince Turki al-Faisal (Saudi ambassador to the United States and the United Kingdom) [22]. The Islamic Emirate represents a new step in the world of mercenaries. Unlike jihadi groups who fought in Afghanistan, Bosnia-Herzegovina and Chechnya around Osama bin Laden, it does not constitute a residual force but actually an army in itself. Unlike previous groups in Iraq, Libya and Syria, around Prince Bandar bin Sultan, they have sophisticated communication services at their disposal for recruitment and civilian officials trained in large western schools capable of instantly taking over the administration of a territory.
  • Brand new Ukrainian weapons were purchased by Saudi Arabia and conveyed by the Turkish secret services who gave them to the Islamic Emirate. Final details were coordinated with the Barzani family at a meeting of jihadist groups in Amman on 1 June 2014. [23] The joint attack on Iraq by the Islamic Emirate and the Kurdistan Regional Government began four days later. The Islamic Emirate seized the Sunni part of the country, while the Kurdistan Regional Government increased its territory by over 40%. Fleeing the atrocities of jihadists, religious minorities left the Sunni area, paving the way for the three-way partition of the country. Violating the Iraqi-US Defense agreement, the Pentagon did not intervene and allowed the Islamic Emirate to continue its conquest and massacres. A month later, while the Kurdish Peshmerga Regional Government had retreated without a fight, and when the emotions of world public opinion became too strong, President Obama gave the order to bomb some positions of the Islamic Emirate. However, according to General William Mayville, director of operations at the headquarters, "These bombings are unlikely to affect the overall capacity of the Islamic Emirate and its activities in other areas of Iraq or Syria ". [24] Obviously, they are not meant to destroy the jihadist army, but only to ensure that each player does not overlap the territory that has been assigned. Moreover, for the moment, they are symbolic and have destroyed only a handful of vehicles. It was ultimately the intervention of the Kurds of the Turkish and Syrian Kurdish PKK which halted the progress of the Islamic Emirate and opened a corridor to allow civilians to escape the massacre.
  • In the latest issue of its magazine, the Islamic Emirate devoted two pages to denounce Senator John McCain as "the enemy" and "double-crosser", recalling his support for the US invasion of Iraq. Lest this accusation remain unknown in the United States, Senator immediately issued a statement calling the Emirate the "most dangerous Islamist terrorist group in the world" [26]. This controversy is there only to distract the gallery. One would like to believe it ... if it were’t for this photograph from May 2013.
  •  
    Thierry Meysann makes the case that Sen. John McCain, working with  was the guiding force behind the Arab Spring, the overthrow of Qadaffi in Libya, and the invasion of Syria by mercenary Islamists, working with a Zionist but deliberately misnomered front group. Thierry goes on to show that McCain played a key role in the creation and deployment of ISIL.  
Paul Merrell

Blacklisted: The Secret Government Rulebook For Labeling You a TerroristThe Intercept - 0 views

  • The Obama administration has quietly approved a substantial expansion of the terrorist watchlist system, authorizing a secret process that requires neither “concrete facts” nor “irrefutable evidence” to designate an American or foreigner as a terrorist, according to a key government document obtained by The Intercept. The “March 2013 Watchlisting Guidance,” a 166-page document issued last year by the National Counterterrorism Center, spells out the government’s secret rules for putting individuals on its main terrorist database, as well as the no fly list and the selectee list, which triggers enhanced screening at airports and border crossings. The new guidelines allow individuals to be designated as representatives of terror organizations without any evidence they are actually connected to such organizations, and it gives a single White House official the unilateral authority to place entire “categories” of people the government is tracking onto the no fly and selectee lists. It broadens the authority of government officials to “nominate” people to the watchlists based on what is vaguely described as “fragmentary information.” It also allows for dead people to be watchlisted. Over the years, the Obama and Bush Administrations have fiercely resisted disclosing the criteria for placing names on the databases—though the guidelines are officially labeled as unclassified. In May, Attorney General Eric Holder even invoked the state secrets privilege to prevent watchlisting guidelines from being disclosed in litigation launched by an American who was on the no fly list. In an affidavit, Holder called them a “clear roadmap” to the government’s terrorist-tracking apparatus, adding: “The Watchlisting Guidance, although unclassified, contains national security information that, if disclosed … could cause significant harm to national security.”
  • The rulebook, which The Intercept is publishing in full, was developed behind closed doors by representatives of the nation’s intelligence, military, and law-enforcement establishment, including the Pentagon, CIA, NSA, and FBI. Emblazoned with the crests of 19 agencies, it offers the most complete and revealing look into the secret history of the government’s terror list policies to date. It reveals a confounding and convoluted system filled with exceptions to its own rules, and it relies on the elastic concept of “reasonable suspicion” as a standard for determining whether someone is a possible threat. Because the government tracks “suspected terrorists” as well as “known terrorists,” individuals can be watchlisted if they are suspected of being a suspected terrorist, or if they are suspected of associating with people who are suspected of terrorism activity. “Instead of a watchlist limited to actual, known terrorists, the government has built a vast system based on the unproven and flawed premise that it can predict if a person will commit a terrorist act in the future,” says Hina Shamsi, the head of the ACLU’s National Security Project. “On that dangerous theory, the government is secretly blacklisting people as suspected terrorists and giving them the impossible task of proving themselves innocent of a threat they haven’t carried out.” Shamsi, who reviewed the document, added, “These criteria should never have been kept secret.”
Paul Merrell

Canadian risks prison for not giving up phone's passcode - Yahoo News - 0 views

  • Montreal (AFP) - A Canadian charged for refusing to give border agents his smartphone passcode was expected Thursday to become the first to test whether border inspections can include information stored on devices.Alain Philippon, 38, risks up to a year in prison and a fine of up to Can$25,000 (US$20,000) if convicted of obstruction.He told local media that he refused to provide the passcode because he considered information on his smartphone to be "personal."Philippon was transiting through the port city of Halifax on his way home from a Caribbean vacation on Monday when he was selected for an in-depth exam.
  • "Philippon refused to divulge the passcode for his cell phone, preventing border services officers from their duties," Canada Border Services Agency said in an email.The agency insists that the Customs Act authorizes its officers to examine "all goods and conveyances including electronic devices, such as cell phones and laptops."But, according to legal experts, the issue of whether a traveler must reveal the password for an electronic device at a border crossing has not been tested in court. "(It's) one thing for them to inspect it, another thing for them to compel you to help them," Rob Currie, director of the Law and Technology Institute at Dalhousie University, told public broadcaster CBC.Philippon is scheduled to appear in court on May 12.
Paul Merrell

The "Snowden is Ready to Come Home!" Story: a Case Study in Typical Media Deceit - The ... - 0 views

  • Most sentient people rationally accept that the U.S. media routinely disseminates misleading stories and outright falsehoods in the most authoritative tones. But it’s nonetheless valuable to examine particularly egregious case studies to see how that works. In that spirit, let’s take yesterday’s numerous, breathless reports trumpeting the “BREAKING” news that “Edward Snowden now wants to come home!” and is “now negotiating the terms of his return!” Ever since Snowden revealed himself to the public 20 months ago, he has repeatedly said the same exact thing when asked about his returning to the U.S.: I would love to come home, and would do so if I could get a fair trial, but right now, I can’t. His primary rationale for this argument has long been that under the Espionage Act, the 1917 statute under which he has been charged, he would be barred by U.S. courts from even raising his key defense: that the information he revealed to journalists should never have been concealed in the first place and he was thus justified in disclosing it to journalists. In other words, when U.S. political and media figures say Snowden should “man up,” come home and argue to a court that he did nothing wrong, they are deceiving the public, since they have made certain that whistleblowers charged with “espionage” are legally barred from even raising that defense.
  • Snowden has also pointed out that legal protections for whistleblowers are explicitly inapplicable to those, like him, who are employed by private contractors (rendering President Obama’s argument about why Snowden should “come home” entirely false). One month after Snowden was revealed, Daniel Ellsberg wrote an Op-Ed in the Washington Post arguing that Snowden did the right thing in leaving the U.S. because he would not be treated fairly, and argued Snowden should not return until he is guaranteed a fully fair trial. Snowden has said all of this over and over. In June 2013, when I asked him during the online Guardian chat why he left the U.S. for Hong Kong, he said: “the US Government, just as they did with other whistleblowers, immediately and predictably destroyed any possibility of a fair trial at home . . . That’s not justice, and it would be foolish to volunteer yourself to it if you can do more good outside of prison than in it.” In January 2014, AP reported about a new online chat Snowden gave: “Snowden said returning would be the best resolution. But Snowden said he can’t return because he wouldn’t be allowed to argue at trial that he acted in the public interest when he revealed the National Security Agency’s mass surveillance programs.” In that chat, he said: “Returning to the US, I think, is the best resolution for the government, the public, and myself.”
  • Gingrich: “I think if we can find a way to get him home, get the rest of the documents that he has not leaked . . . it’s worth doing, but I think he’d have to serve jail time, and it’d probably be fairly lengthy. I don’t think the country would tolerate this level of betrayal, not having some very significant jail time — Blitzer: “You say lengthy. What do you think? Gingrich: “I’m not an expert in this, but I’d say more than 10 years.” Where to start? First, Gingrich’s belief that it’s possible to “get the rest of the documents that he has not leaked” is simply adorable. Second, Gingrich is a fascinating choice for CNN to have pontificate on proper punishments given that he is the first House Speaker to ever be punished for ethics violations, for which he was fined $300,000. Third, David Petraeus was just allowed to plead guilty for leaking extremely sensitive secrets — not out of a whistleblowing desire to inform the public but simply to satisfy his mistress — and will almost certainly spend no time in jail; Gingrich, Blitzer, Ignatius and friends would never dare suggest that the General should go to prison (just as DC’s stern law-and-order advocates who demand Snowden’s imprisonment would never dare suggest the same for James Clapper for having lied to Congress).
  • ...1 more annotation...
  • Most important, if you were Snowden, and you constantly heard U.S. political and media elites consigning you to prison for a decade or longer before your trial started, would you remotely believe assurances that you’d get a fair trial? What rational person would ever willingly submit themselves to a penal state that imprisons more of its citizens than any other in the world, run by people with this mentality? And when you examine case studies like this of what U.S. media is not just capable of doing but eager to do — concoct a completely false narrative based on fictitious events and then proceed to spend a full day drawing all sorts of self-serving and propagandistic lessons from it — why would anyone regard what comes spewing forth from them with anything other than extreme suspicion and contempt?
Paul Merrell

Senator blasts CIA for censoring 'torture' report - 0 views

  • Sen. Ron Wyden says the CIA is trying to blunt the impact of an upcoming Senate report examining the harsh treatment of al-Qaida detainees by insisting on censoring the pseudonyms used for agency officers mentioned in the document. "The intelligence leadership doing everything they can to bury the facts," said Wyden, D-Ore., a Senate Intelligence Committee member who has been a frequent critic of the spy agency.
  • President Barack Obama and other senior officials have said the CIA's use of waterboarding, stress positions, sleep deprivation and other harsh techniques on some detainees constituted torture. Many current and former CIA officers dispute that. The Senate report asserts that the harsh treatment didn't work and that CIA officials misled Congress and other government agencies about it. Also to be released is a CIA response, and a separate one by Senate Republicans, which challenge the report's conclusions. CIA officials say they fear the publication of officer pseudonyms — often just a first name such as "Roger"— would lead to the unmasking of undercover officers. Readers could track the same person in different jobs and places, making it easier to discover their identity. Without the pseudonyms, Wyden says, the report would be much harder to understand because readers wouldn't be able to distinguish different CIA officers. Readers wouldn't know, for example, whether same CIA official had been accused of lying multiple times.
  • Wyden pointed out that the 9/11 Commission Report and a 2004 report into abuses at Iraq's Abu Ghraib prison used pseudonyms for CIA officers. "I think it is appropriate to redact specific identifying information so the identities of undercover officers are not publicly exposed," Wyden told The Associated Press. Wyden said the Senate report documents "falsehoods, misdeeds and mistakes" by the CIA. Asked about Wyden's remarks, CIA spokesman Dean Boyd said, "Pseudonyms are redacted to keep individual intelligence officers from being identified and potentially harmed. Making public those pseudonyms associated with individual officers, as well as dates, locations and other identifying information related to those officers, dramatically increases the likelihood that they will be exposed and potentially subject to threats or violence."
  •  
    But if we put the torturers in prison for the rest of their lives where they belong, we wouldn't need to worry about them being under cover or being identified. We could just use their real names. 
Paul Merrell

Exclusive: TSA's Secret Behavior Checklist to Spot Terrorists - The Intercept - 0 views

  • Fidgeting, whistling, sweaty palms. Add one point each. Arrogance, a cold penetrating stare, and rigid posture, two points. These are just a few of the suspicious signs that the Transportation Security Administration directs its officers to look out for — and score — in airport travelers, according to a confidential TSA document obtained exclusively by The Intercept. The checklist is part of TSA’s controversial program to identify potential terrorists based on behaviors that it thinks indicate stress or deception — known as the Screening of Passengers by Observation Techniques, or SPOT. The program employs specially trained officers, known as Behavior Detection Officers, to watch and interact with passengers going through screening. The document listing the criteria, known as the “Spot Referral Report,” is not classified, but it has been closely held by TSA and has not been previously released. A copy was provided to The Intercept by a source concerned about the quality of the program.
  • Fidgeting, whistling, sweaty palms. Add one point each. Arrogance, a cold penetrating stare, and rigid posture, two points. These are just a few of the suspicious signs that the Transportation Security Administration directs its officers to look out for — and score — in airport travelers, according to a confidential TSA document obtained exclusively by The Intercept. The checklist is part of TSA’s controversial program to identify potential terrorists based on behaviors that it thinks indicate stress or deception — known as the Screening of Passengers by Observation Techniques, or SPOT. The program employs specially trained officers, known as Behavior Detection Officers, to watch and interact with passengers going through screening.
  • The document listing the criteria, known as the “Spot Referral Report,” is not classified, but it has been closely held by TSA and has not been previously released. A copy was provided to The Intercept by a source concerned about the quality of the program. The checklist ranges from the mind-numbingly obvious, like “appears to be in disguise,” which is worth three points, to the downright dubious, like a bobbing Adam’s apple. Many indicators, like “trembling” and “arriving late for flight,” appear to confirm allegations that the program picks out signs and emotions that are common to many people who fly.
  • ...5 more annotations...
  • A TSA spokesperson declined to comment on the criteria obtained by The Intercept. “Behavior detection, which is just one element of the Transportation Security Administration’s (TSA) efforts to mitigate threats against the traveling public, is vital to TSA’s layered approach to deter, detect and disrupt individuals who pose a threat to aviation,” a spokesperson said in an emailed statement.
  • Since its introduction in 2007, the SPOT program has attracted controversy for the lack of science supporting it. In 2013, the Government Accountability Office found that there was no evidence to back up the idea that “behavioral indicators … can be used to identify persons who may pose a risk to aviation security.” After analyzing hundreds of scientific studies, the GAO concluded that “the human ability to accurately identify deceptive behavior based on behavioral indicators is the same as or slightly better than chance.” The inspector general of the Department of Homeland Security found in 2013 that TSA had failed to evaluate SPOT, and “cannot ensure that passengers at United States airports are screened objectively, show that the program is cost-effective, or reasonably justify the program’s expansion.” Despite those concerns, TSA has trained and deployed thousands of Behavior Detection Officers, and the program has cost more than $900 million since it began in 2007, according to the GAO.
  • The 92-point checklist listed in the “Spot Referral Report” is divided into various categories with a point score for each. Those categories include a preliminary “observation and behavior analysis,” and then those passengers pulled over for additional inspection are scored based on two more categories: whether they have “unusual items,” like almanacs and “numerous prepaid calling cards or cell phones,” and a final category for “signs of deception,” which include “covers mouth with hand when speaking” and “fast eye blink rate. Points can also be deducted from someone’s score based on observations about the traveler that make him or her less likely, in TSA’s eyes, to be a terrorist. For example, “apparent” married couples, if both people are over 55, have two points deducted off their score. Women over the age of 55 have one pointed deducted; for men, the point deduction doesn’t come until they reach 65. Last week, the ACLU sued TSA to obtain records related to its behavior detection programs, alleging that they lead to racial profiling. The lawsuit is based on a Freedom of Information Act request the ACLU filed last November asking for numerous documents related to the program, including the scientific justification for the program, changes to the list of behavior indicators, materials used to train officers and screen passengers, and what happens to the information collected on travelers.
  • “The TSA has insisted on keeping documents about SPOT secret, but the agency can’t hide the fact that there’s no evidence the program works,” said Hugh Handeyside, staff attorney with the ACLU National Security Project, in a statement announcing the lawsuit. Being on the lookout for suspicious behavior is a “common sense approach” that is used by law enforcement, according to TSA. “No single behavior alone will cause a traveler to be referred to additional screening or will result in a call to a law enforcement officer (LEO),” the agency said in its emailed statement. “Officers are trained and audited to ensure referrals for additional screening are based only on observable behaviors and not race or ethnicity.” One former Behavior Detection Officer manager, who asked not to be identified, said that SPOT indicators are used by law enforcement to justify pulling aside anyone officers find suspicious, rather than acting as an actual checklist for specific indicators. “The SPOT sheet was designed in such a way that virtually every passenger will exhibit multiple ‘behaviors’ that can be assigned a SPOT sheet value,” the former manager said.
  • The signs of deception and fear “are ridiculous,” the source continued. “These are just ‘catch all’ behaviors to justify BDO interaction with a passenger. A license to harass.” The observations of a TSA screener or a Behavior Detection Officer shouldn’t be the basis for referring someone to law enforcement. “The program is flawed and unnecessarily delays and harasses travelers. Taxpayer dollars would be better spent funding real police at TSA checkpoints,” the former manager said. A second former Behavior Detection Officer manager, who also asked not to be identified, told The Intercept that the program suffers from lack of science and simple inconsistency, with every airport training its officers differently. “The SPOT program is bullshit,” the manager told The Intercept. “Complete bullshit.”
  •  
    I've completely boycotted airlines in the U.S. since 2002 because I refuse to submit to the outrageous treatment by government that is now required to board a commercial airliner. If the airlines want my business, they need to start lobbying to end the politics of fear and the Gestapo tactics of government. plus pushing for an honest investigation of the 9/11/2001 incidents.  
Paul Merrell

CFPB Determined to Regulate Billion Dollar Payday Loan Industry - Top US & World News |... - 0 views

  • The Consumer Financial Protection Bureau (CFPB) has a new set of rules aimed at preventing payday loan operations from targeting low-income borrowers who will be buried by high fees and rising debt loads. Payday loans are traditionally a loan of $500 or less wherein the borrower “provides a personal check dated on their next payday for the full balance or give the lender permission to debit their bank accounts. The total includes charges often ranging from $15 to $30 per $100 borrowed. Interest-only payments, sometimes referred to as rollovers, are common.” Using these lenders to make ends meet, borrowers are taken advantage of which has traditionally been a state regulatory issue. However now the federal government will be stepping in to curb this extortive multibillion dollar industry. Fees from payday loans can quickly accumulate, causing some borrowers to “lose their bank accounts and cars, or even risk prison time”.
  • Richard Corday, director of the CFPB, said: “Extending credit to people in a way that sets them up to fail and ensnares considerable numbers of them in extended debt traps, is simply not responsible lending.” These new rules cover payday loans, vehicle loans, loans using a car as collateral and various other forms of high-cost lending. Enders will be responsible for making sure debtors can repay the loan in full on time before extending the loan by checking their income, borrowing history, previous financial obligations and any other indicators that the borrower would most likely default or roll over the loan. • A 60 day respite between loans • Lenders must provide affordable repayment options • Loans cannot exceed $500 • Loans cannot have multiple finance charges • Loans cannot use a vehicle as collateral Regulations on interest rates and repayments as a share of income include mandatory capping off to prevent run-a-way fees.
  • Back in February, the CFPB warned about the payday loan industry which is largely unregulated and functions outside of proper oversight and accountability. The CFPB estimates that the $46 billion payday loan or cash advance industry has no oversight, refuses to give full disclosures of interest and fees involved, and takes an annual percentage of an excess of 300% against borrowers. The Consumer Federation of America (CFA) counts 32 states in the US that “permit payday loans at triple-digit interest rates, or with no rate cap at all.” Shockingly 80% of payday loans are rolled over within 14 days while an estimated 50% of these loans are “in a sequence at least 10 loans long.”
  •  
    The first sentence if false; no rules have been adopted or even been published. In fact, these aren't even formal rule proposals or advance notice of public rulemaking, all of which must be poublished in the Federal Register, per the Administrative Procedures Act.   The Bureau is still in the information gathering stage.
Paul Merrell

Israeli Drone Feeds Hacked By British and American Intelligence - 0 views

  • MERICAN AND BRITISH INTELLIGENCE secretly tapped into live video feeds from Israeli drones and fighter jets, monitoring military operations in Gaza, watching for a potential strike against Iran, and keeping tabs on the drone technology Israel exports around the world. Under a classified program code-named “Anarchist,” the U.K.’s Government Communications Headquarters, or GCHQ, working with the National Security Agency, systematically targeted Israeli drones from a mountaintop on the Mediterranean island of Cyprus. GCHQ files provided by former NSA contractor Edward Snowden include a series of “Anarchist snapshots” — thumbnail images from videos recorded by drone cameras. The files also show location data mapping the flight paths of the aircraft. In essence, U.S. and British agencies stole a bird’s-eye view from the drones.
  • Several of the snapshots, a subset collected in 2009 and 2010, appear to show drones carrying missiles. Although they are not clear enough to be conclusive, the images offer rare visual evidence to support reports that Israel flies attack drones — an open secret that the Israeli government won’t acknowledge. “There’s a good chance that we are looking at the first images of an armed Israeli drone in the public domain,” said Chris Woods, author of Sudden Justice, a history of drone warfare. “They’ve gone to extraordinary lengths to suppress information on weaponized drones.” The Intercept is publishing a selection of the drone snapshots in an accompanying article.
  • Additionally, in 2012, a GCHQ analyst reported “regular collects of Heron TP carrying weapons,” referring to a giant drone made by the state-owned Israel Aerospace Industries, known as IAI. Anarchist operated from a Royal Air Force installation in the Troodos Mountains, near Mount Olympus, the highest point on Cyprus. The Troodos site “has long been regarded as a ‘Jewel in the Crown’ by NSA as it offers unique access to the Levant, North Africa, and Turkey,” according to an article from GCHQ’s internal wiki. Last August, The Intercept published a portion of a GCHQ document that revealed that NSA and GCHQ tracked weapons signals from Troodos, and earlier reporting on the Snowden documents indicated that the NSA targeted Israeli drones and an Israeli missile system for tracking, but the details of the operations have not been previously disclosed. “This access is indispensable for maintaining an understanding of Israeli military training and operations and thus an insight to possible future developments in the region,” a GCHQ report from 2008 enthused. “In times of crisis this access is critical and one of the only avenues to provide up to the minute information and support to U.S. and Allied operations in the area.”
  • ...1 more annotation...
  • The documents highlight the conflicted relationship between the United States and Israel and U.S. concerns about Israel’s potentially destabilizing actions in the region. The two nations are close counterterrorism partners, and have a memorandum of understanding, dating back to 2009, that allows Israel access to raw communications data collected by the NSA. Yet they are nonetheless constantly engaged in a game of spy versus spy. Last month, the Wall Street Journal reported that, although President Obama had pledged to stop spying on friendly heads of state, the White House carved out an exception for Israeli Prime Minister Benjamin Netanyahu and other top Israeli officials. Michael Hayden, former head of the CIA and NSA, told the Journal that the intelligence relationship with Israel was “the most combustible mixture of intimacy and caution that we have.”
Paul Merrell

ACLU sues over NSA surveillance program - The Washington Post - 0 views

  • The American Civil Liberties Union filed a lawsuit Tuesday challenging the constitutionality of the U.S. government surveillance program that collects the telephone records of millions of Americans from U.S. telecommunications companies. It is the first substantive lawsuit following reports in The Washington Post and the Guardian last week that detailed two vast surveillance programs run by the National Security Agency under laws authorized by Congress after the attacks of Sept. 11, 2001.
  • The ACLU suit, filed in the U.S. District Court for the Southern District of New York, challenges the legality of the spy agency’s collection of customer “metadata,” including the phone numbers dialed and the length of calls. The lawsuit asks the court to force the government to end the program and purge any records it has collected, and to declare that the surveillance is unconstitutional.
  • The program, details of which were first disclosed by the Guardian, collects such information, used by intelligence analysts to detect patterns and personal connections, on every phone call made or received by U.S. customers of major American phone companies. The once-secret program was acknowledged last week by Director of National Intelligence James R. Clapper Jr., who is named in the ACLU lawsuit.
Paul Merrell

Using Metadata to find Paul Revere - Kieran Healy - 0 views

  • London, 1772. I have been asked by my superiors to give a brief demonstration of the surprising effectiveness of even the simplest techniques of the new-fangled Social Networke Analysis in the pursuit of those who would seek to undermine the liberty enjoyed by His Majesty’s subjects. This is in connection with the discussion of the role of “metadata” in certain recent events and the assurances of various respectable parties that the government was merely “sifting through this so-called metadata” and that the “information acquired does not include the content of any communications”. I will show how we can use this “metadata” to find key persons involved in terrorist groups operating within the Colonies at the present time. I shall also endeavour to show how these methods work in what might be called a relational manner.
  •  
    It's just metadata; we're not reading your mail, they say. So it doesn't matter, right?  Wrong.
Paul Merrell

Asia Times Online :: Digital Blackwater rules - 0 views

  • But when it comes to how a 29-year old IT wizard with little formal education has been able to access a batch of ultra-sensitive secrets of the US intelligence-national security complex, that's a no-brainer; it's all about the gung-ho privatization of spying - referred to by a mountain of euphemisms of the "contractor reliance" kind. In fact the bulk of the hardware and software used by the dizzying network of 16 US intelligence agencies is privatized. A Washington Post investigation found out that US homeland security, counter-terror and spy agencies do business with over 1,900 companies. [2] An obvious consequence of this contractor tsunami - hordes of "knowledge" high-tech proletarians in taupe cubicles - is their indiscriminate access to ultra-sensitive security. A systems administrator like Snowden can have access to practically everything.
  • So then we may have a case of Hong Kong and Beijing having to reach an agreement. Yet even if they decided to extradite Snowden, he could argue in court this was "an offence of a political character". The bottom line - this could drag on for years. And it's too early to tell how Beijing would play it for maximum leverage. A "win-win" situation from a Chinese point of view would be to balance its commitment to absolute non-interference in foreign domestic affairs, its desire not to rock the fragile bilateral relation boat, but also what non-pivoting move the US government would offer in return.
  • Since 1996, before the British handover to China, an extradition treaty applies between the tiger and the wolf. [4] The US Department of Justice is already surveying its options. It's important to remember that the Hong Kong judicial system is independent from China's - according to the Deng Xiaoping-conceptualized "one country, two systems". As much as Washington may go for extraditing Snowden, he may also apply for political asylum. In both cases he may stay in Hong Kong for months, in fact years. The Hong Kong government cannot extradite anyone claiming he will be persecuted in his country of origin. And crucially, article 6 of the treaty stipulates, "a fugitive offender shall not be surrendered if the offence of which that person is accused or was convicted is an offence of a political character." Another clause stipulates that a fugitive shall not be surrendered if that implicates "the defense, foreign affairs or essential public interest or policy" of - guess who - the People's Republic of China.
  • ...1 more annotation...
  • What he stressed is how they all work under a false premise; "If a surveillance program produces information of value, it legitimizes it ... In one step, we've managed to justify the operation of the Panopticon". Oh yes, make no mistake; Snowden has carefully read his Michel Foucault (he also stressed his revulsion facing "the capabilities of this architecture of oppression"). Foucault's deconstruction of the Panopticon's architecture is now a classic (see it here in an excerpt of his 1975 masterpiece Discipline and Punish). The Panopticon was the ultimate surveillance system, designed by utilitarian philosopher Jeremy Bentham in the 18th century. The Panopticon - a tower surrounded by cells, a pre-Orwellian example of "architecture of oppression" - was not originally conceived for the surveillance of a prison, but of a factory crammed with landless peasants on forced labor. Oh, but those were rudimentary proto-capitalist days. Welcome to the (savagely privatized) future, where the NSA black hole, "Digital Blackwater", lords over all as the ultimate Panopticon.
Paul Merrell

Ron Paul: 'Thankful' for Edward Snowden - Breanna Edwards - POLITICO.com - 0 views

  • Former Rep. Ron Paul of Texas praised NSA leaker Edward Snowden for his part in exposing how much information the government has been collecting from private citizens.“We should be thankful for individuals like Edward Snowden and Glenn Greenwald who see injustice being carried out by their own government and speak out, despite the risk,” Paul said in a statement posted on the website of Campaign for Liberty, a nonprofit political organization which focuses on educating about constitutional issues, which he chairs. “They have done a great service to the American people by exposing the truth about what our government is doing in secret.”
  • “The government does not need to know more about what we are doing. We need to know more about what the government is doing,” Paul added in obvious criticism of the Obama administration. “The Fourth Amendment is clear; we should be secure in our persons, houses, papers, and effects, and all warrants must have probable cause. Today the government operates largely in secret, while seeking to know everything about our private lives – without probable cause and without a warrant.”
Paul Merrell

France Threatens Google With Privacy Fines - ABC News - 0 views

  • France is giving Google three months to be more upfront about the data it collects from users — or be fined. Other European countries aren't far behind.
  • The French agency that regulates information technology says that five other European countries are taking similar steps in a staggered offensive against Google's privacy policy between now and the end of July. It says Google largely ignored earlier recommendations from European regulators.
  • Paris' formal warning gives the company three months to make changes to its privacy practices. They include specifying to users what it is using personal data for, and how long it's held. Regulators also want Google to let users opt out of having their data centralized — for example, when data from online searches, Gmail and YouTube are crunched into a single location.
  •  
    Note that we have yet to hear from European regulatory entities with power to inflict far bigger hurt on cloud companies like Google, e.g., the EC's DG Competition, national security forces, E.U. Parliament, etc. 
Paul Merrell

How Congress unknowingly legalized PRISM in 2007 - 0 views

  • On Sept. 11, 2007, the National Security Agency signed up Microsoft as its first partner for PRISM, a massive domestic surveillance program whose existence was reported by the Washington Post today. That’s barely a month after Congress passed, and President George W. Bush signed, the Protect America Act.
  • The Bush Administration portrayed the PAA as a technical fix designed to close a gap in America’s surveillance capabilities that had been opened by a then-recent ruling of the secretive Foreign Intelligence Surveillance Court (FISC). It proved to be much more than that. While the details are still classified, reports suggested that the FISC had ruled that it was illegal for the government to intercept communications between two foreign endpoints if the communications happened to pass through the United States. Warning that the U.S. would suddenly lose the ability to continue its surveillance of terrorists, the administration pushed the PAA through Congress in a matter of days.
  • In reality, the PAA represented a sweeping change to American surveillance law. Before conducting surveillance, the PAA only required executive branch officials to “certify” that there were “reasonable procedures” in place for ensuring that surveillance “concerns” persons located outside the United States and that the foreign intelligence is a “significant purpose” of the program. A single certification could cover a broad program intercepting the communications of numerous individuals. And there was no requirement for judicial review of individual surveillance targets within a “certified” program.
  • ...2 more annotations...
  • Today’s report suggests that the moment the PAA was the law of the land, the NSA started using it to obtain unfettered access to the servers of the nation’s leading online services. To comply with the requirement that the government not target Americans, PRISM searches are reportedly “designed to produce at least 51 percent confidence in a target’s ‘foreignness’” — the lowest conceivable standard. PRISM training materials reportedly instruct users that if searches happen to turn up the private information of Americans, “it’s nothing to worry about.”
  • Retroactive immunity for telecom companies dominated the 2008 debate, overshadowing the more important issue of the sweeping new powers that Congress had just granted to the executive branch. When Congress finally passed the FISA Amendments Act in July 2008, it included both immunity and a four-year extension of the government’s warrantless spying powers. But few members of Congress realized the breadth of the surveillance powers they were effectively approving.
« First ‹ Previous 321 - 340 of 415 Next › Last »
Showing 20 items per page