Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged Personal-Information

Rss Feed Group items tagged

Paul Merrell

Court refuses to combine dozens of cases over Clinton emails | TheHill - 0 views

  • A federal court is denying the State Department’s efforts for judges to coordinate on the roughly three-dozen pending lawsuits related to former Secretary Hillary Clinton’s emails.The decision from the U.S. District Court for the District of Columbia is a setback for the department, which had complained that the multiple legal fronts were draining its limited resources.ADVERTISEMENTBut the multiple cases were at such different points in their development, Chief Judge Richard Roberts wrote in an order released Thursday, it made little sense to combine them.“Many of the underlying cases have been pending for several years and a significant number of scheduling orders have already been entered,” Roberts wrote.The decision to deny the State Department’s request was unanimous, Roberts added.
  • However, he noted that individual judges have “committed to informal coordination so as to avoid unnecessary inefficiencies and confusion.”The State Department has complained about the multiple public records lawsuits, which seek to force into the light various documents from Clinton’s personal server during her time at State.Last month, the government filed a request seeking to have a single judge coordinate responses to 32 of them. That would cut down on the “confusion, inefficiencies and advantages given to some requesters at the expense of others,” the department claimed.“It will put some order to what has been a chaotic situation,” government lawyer Elizabeth Shapiro said at the time. In denying the government's motion, the individual cases will continue to move along on a relatively scattershot basis. Any one of the 17 judges involved in the cases has the power to order the State Department to release certain documents or, if they so chose, order new searches on Clinton’s private server.Organizations suing the government called the court’s decision a win.
  • The government's request was a “desperate effort to buy time for itself and Hillary Clinton,” Tom Fitton, the head of the conservative group Judicial Watch, said in a statement. Judicial Watch has filed a total of 18 lawsuits involving Clinton’s emails.“With this obstruction out of the way, we are one step closer to the legal reckoning for Mrs. Clinton’s and the State Department’s contempt for the rule of law.”A State Department spokesman declined to comment.  
Paul Merrell

Swedish Troops to join faux anti ISIS Alliance in Iraq | nsnbc international - 0 views

  • The Swedish government announced on Thursday that Sweden will deploy armed forces to Iraq to support military operations against the Islamic State, a.k.a. ISIS or ISIL. The terrorist organization is known to be overtly and covertly funded and armed by members of the so-called “coalition against the Islamic State”. The deployment of 35 Swedish troops is a minimal contribution but has, nonetheless maximum political effect. That is, that the Scandinavian country lends its political credence to the: “the fight against ISIS“ narrative.
  • Swedish Foreign Minister Margot Wallstöm and Defense Minister Peter Hultquist were quoted in the Swedish daily Dagens Nyheter (Daily News) as saying that “Cooperation against terrorism is the key to success. Sweden will continue to support these common efforts”. The two ministers added that Sweden could eventually expand its mission to 120 troops. The Scandinavian country has a population of about 9.7 million. Political and Legal Implications; Crimes against Peace: To understand the political implications one has to understand the genesis of the war on Syria, why and how it spread to Iraq, related energy-security planning, as well as the direct support of ISIS via NATO member States, Saudi Arabia, as well as other Middle Eastern countries. One also has to understand that the so-called “moderate opposition” and ISIS effectively have the same utility and that arms are transferred in-between the diverse mercenary brigades in the region. None of the above is mentioned in any of the Swedish mainstream media.
  • War Planned Years in Advance: In June 2013 the senior French Statesman and former Foreign Minister Roland Dumas said during an appearance in the French TV channel LPC that top-British officials had asked him, in 2009, if he wanted to participate in ousting the Syrian government with the help of “rebels”. That was years before the first “protests” erupted in 2011: (nsnbc audio archives) Dumas said:
  • ...5 more annotations...
  • “I am going to tell you something. I was in England two years before the violence in Syria on other business. I met with top British officials, who confessed to me, that they were preparing something in Syria. … This was in Britain not in America. Britain was organizing an invasion of rebels into Syria. They even asked me, although I was no longer Minister of Foreign Affairs, if I would like to participate. Naturally, I refused, I said I am French, that does not interest me. … This operation goes way back. It was prepared, preconceived and planned… in the region it is important to know that this Syrian regime has a very anti-Israeli stance. … Consequently, everything that moves in the region…- and I have this from a former Israeli Prime Minister who told me ´we will try to get on with our neighbors but those who don´t agree with us will be destroyed. It is a type of politics, a view of history, why not after all. But one should  know about it”. The Islamic State, a.k.a. ISIS or ISIL has its origin in the Unites States, the UK’s, NATO’s and Middle Eastern NATO allies’ attempt to introduce Al-Qaeda into Iraq as a pretext for the U.S.-led military presence in the country.
  • War For Oil – By Foreign Funded Mercenary Brigades. Details about the genesis of ISIS have been published in the nsnbc international article entitled “ISIS Unveiled: The Identity of the Insurgency in Syria and Iraq”. ISIS initially launched its assaults against Syria via Turkey and Jordan.
  • In 2012 the Iraqi government under the then Prime Minister al-Maliki deployed troops to Iraq’s al-Anbar province to stem up for the trafficking of weapons, munitions and fighters via old smuggling routes to Syria’s oil-rich Deir Ez-Zour province where ISIS had gained a foothold. The al-Maliki government’s initiative made it necessary to re-route much of that traffic via Jordan, where the U.S. JSOC, CIA, USAID and other organizations had established a joint command and intelligence structure with the “opposition” at the Ramtha Air Base as well as in the border town Al-Mafraq. April 22, 2013 the European Union (EU) lifted its ban on the import of Syrian oil from “rebel-held territories”. The export of Syrian oil to Turkey has since then more than doubled. In June 2014 nsnbc international’s editor-in-chief met a person from within the inner circle around the former Lebanese PM and multi-billionaire Saad Hariri. The meeting took place in the Danish capital Copenhagen.
  • Concerned about that the war was developing into a regional war that eventually also would engulf Lebanon the whistleblower presented evidence to support his claim that the final decision to launch the invasion of Iraq with ISIS brigades was made on the sidelines of the Atlantic Council Energy Summit in Turkey on November 22 -23, 2013. He added that ISIS operations via Turkey are run via the U.S. Embassy in Turkey, involving Ambassador Riccardione.
  • Also in 2013, U.S. Senator John McCain met with the then Free Syrian Army (FSA) chief Salim Idriss, ISIS leader al-Badri, a.k.a al-Baghdadi and Caliph Ibrahim in a safe house in the Syrian city of Idlib, near the Turkish border. In 2014 over 5,000 the fighters of the so-called “moderate opposition” groups which are supported by the United States and others would join the ranks of ISIS. ISIS and Jabhat al-Nusrah are currently fighting side-by-side for control over the Damascus suburb and Palestinian refugee camp Yarmouk at the outskirts of the Syrian capital Damascus. The deployment of Swedish troops, regardless how small or symbolic the contingent is, constitutes, arguably, a crime against peace committed by Margot Wallström and Peter Hulquist as it is implausible that the two Swedish Ministers are unaware of the above mentioned information that is readily available in the public domain.
Paul Merrell

Peter King: NSA Should Monitor Congress in Case They're 'Talking to an Al Qaeda Leader'... - 0 views

  • Appearing on Fox News Channel on Sunday, Rep. Peter King (R-NY) dismissed members of Congress calling for the National Security Agency to reform its information gathering practices. He insisted that even members of Congress should be monitored by the NSA, just like every other American, in case they are “talking to an Al Qaeda leader in Iraq or Afghanistan.”
  • King objected to Sen. Bernie Sanders (I-VT) who objected to the NSA monitoring the communications of elected representatives. “I think members of Congress should be treated the same as everyone else,” King said. “If a member of Congress is talking to an Al Qaeda leader in Iraq or Afghanistan, why should that member of Congress be any different from any person on the street?” He added that Sanders was attempting to imply that the NSA is “spying” on Congress. “They’re not spying on anyone,” he added.
  •  
    I checked. King really did say of the NSA, "they're not spying on anyone." Why then should we have an NSA? What a blooper!
Paul Merrell

Land Destroyer: NATO's War on Syria Just Got Dirtier - 0 views

  • But even with the West's capitulation in Syria, and months passing without a shred of credible evidence produced, hacks among Western media continue to perpetuate the original narrative. Among these are of course corporate-financier funded think-tanks and propaganda fronts like the Brookings Institution, Foreign Policy Magazine, the Foundation for the Defense of Democracies (FDD), and establishment papers like the Guardian. In the middle of it all is couch-potato self-proclaimed weapons expert, Eliot Higgins, a representation of the West's propaganda 2.0 campaign.  UK-based Higgins lost his job and now spends his days combing social media sites for "evidence" he then analyzes and reports on. The Western media, with its propagandists expelled from Syria and many of its "sources" in Syria exposed in humiliating attempts to fabricate and manipulate evidence, quickly picked Higgins up and elevated his armchair blogging to "expert analysis." Since then, Higgins has joined the already discredited "Syrian Observatory for Human Rights" another UK-based individual, as the basis upon which the West's Syrian narrative spins. 
  • Whitaker is desperately attempting to keep the wheels on the establishment's new propaganda 2.0 vehicle - manipulating social media, much the way Hersh describes intelligence being manipulated, to create any outcome necessary to bolster a predetermined narrative.  What he doesn't address is the fact that Higgins' work almost entirely depends on videos posted online by people he does not know, who may be misrepresenting who they are, what they are posting, and their motivations for doing so - such is the nature of anonymity on the web and why this evidence alone is useless outside of a larger geopolitical context.  Both Whitaker and Higgins, who maintain that the Syrian government was behind the attacks, fail to address another glaring reality. A false flag attack is designed to look like the work of one's enemy. In other words, terrorists in Syria would use equipment, uniforms, weapons, and tactics that would pin the crime on the Syrian government. All Higgins has proved, thus far, is that the superficial details of the operation made for a convincing false flag attack. 
  • Toward the end of Higgin's piece, he, like his friends at the Guardian, attempt to claim Al Nusra, contrary to Hersh's report, are most likely not capable of producing sarin.
  • ...5 more annotations...
  • The e-mails illustrate prior knowledge of chemical weapons falling into the hands of terrorists who fully planned on using them in a false flag operation. Higgins and others had this information, and now, have Seymour Hersh's report as well, yet they still pose the argument that the militants had neither the ability nor the means to carry out the attacks. In fact, it appears that the Western media and underlings like Higgins went out of their way specifically to discredit the notion from even being considered.  In other words, a concerted cover-up.  The e-mails above, and others in the large cache also reveal the possible motivation for these lies. So-called journalists and researchers peddling the West's narrative appear to have a wide range of lucrative offers presented to them, as well as funding for them to continue doing the work they are already involved in. This of course is only the case so long as their narratives mesh with the institutions, corporations, and individuals cutting the checks. 
  • The e-mails reveal multiple correspondences regarding chemical weapons falling into the hands of terrorists aimed at using them in a false flag operation, Higgins' and Van Dyke's mutual "benefactor" located in Virginia, "near DC" (Langley, Virginia?), and job offers for Higgins from NGOs and a defense contractor involving "open source intelligence," the new buzzword used by Higgins and Whitaker in regards to the new form of propaganda they both participate in. 
  • While perhaps Higgins and company missed that CNN report, it is now revealed that at least Higgins, and several other journalists were told by an American contractor on the ground inside of Syria, that militants had gained access to chemical weapons and more importantly, were planning to use them in a false flag attack - this months before the August 21 attack in Damascus.   The Syrian Electronic Army (SEA) has released e-mails this week between American contractor Matthew Van Dyke and members of the Western media, including Higgins. The e-mails indicated that militants had chemical weapons and were planning to use them in an attack to frame the Syrian government - serving as impetus for wider foreign intervention. SEA's emails have been confirmed by Higgins himself in a series of self-incriminating tweets where he goes, point-by-point, attempting to provide explanations for the damning revelations. 
  • Why would Higgins even mention the possibility of a false flag attack, when all that would do is alienate him from the establishment he is so eagerly trying to be a part of? His recent piece in Foreign Policy and the Guardian's ceaseless promotion of his work are favors that demand reciprocation - in the form of toeing the line and selling a narrative Higgins and others know is deceitful.  That Higgins, the Guardian, and Foreign Policy are prepared to throw veteran journalist Seymour Hersh under the bus to protect their interests, gives us a look into the depths of depravity within which this "new" media Whitaker celebrates, operate.  Worst of all for the West, is that the transparency and accountability they claim to uphold, had to be kept in check by the SEA - an organization wanted by the FBI as "terrorists." We would be led to believe by the likes of Whitaker, Higgins, and Van Dyke that the Syrian government and their supporters are the villains, but in their own words and actions we see the truth. 
  • Note: The full extent of SEA's leaked e-mails exposes Van Dyke and the journalists he associates with as utterly depraved, deceitful, unprincipled individuals each driven by untethered greed and narcissism. The e-mails also reveal that "aid ships" are used to bring in weapons and foreign fighters, that the Syrians are almost entirely behind the government and that the so-called revolution was "fake." Van Dyke is exposed as having conspired to kill a man and his entire family over a trivial personal dispute and much, much more. Readers are encouraged to comb through the archives, and to follow SEA on Twitter  @Official_SEA16.
  •  
    "Brown Moses" (Eliot Higgins) has been the principle source of "evidence" that the Assad government used chemical weapons, arguing strenuously that the "rebels" had no such capability. But the Syrian Electronic Army obtained a large number of emails between Higgins and an American mercenary working in Syria showing beyond doubt that Higgins had been put on notice in May 2013 -- months before the sarin gas attack near Damascus in late August -- that the "rebels" had sarin.   Oopsies!
Paul Merrell

M of A - Media Neglect Turkish False Flag Attack Leak And Its Implications - 0 views

  • Some more thoughts on the leaked tape from a meeting in the Turkish foreign ministry which is only very selectively reported in "western" media. A video with recorded voices and English text is available as is the seemingly complete text in two parts. The setting of the recording is this: The voices of the illegal recording believed to belong to Davutoğlu, National Intelligence Organization (MİT) Hakan Fidan, Foreign Ministry Undersecretary Feridun Sinirlioğlu, and Deputy Chief of General Staff Gen. Yaşar Gürel. According to the information obtained from sources, the recording consists of a chat between four officials in Davutoğlu’s office before the commencement of the official meeting with the participation of more civil and military bureaucrats in another room at the Foreign Ministry. It is not clear when exactly the meeting happened. It would fit the situation late last year or early 2014.
  • The major points from my view: Turkey has delivered 2,000 trucks of weapons and ammunition to the insurgents in Syria. There are plans for false flag attacks on Turkey or Turkish property to justify an attack from Turkey on Syria. The Turkish military has great concerns going into and fighting Syria. The general atmosphere between these deciders is one of indecisiveness. Everyone seems to be unclear what Erdogan wants and is waiting for clear orders from above. U.S. military has shortly before the meeting presented fresh plans for a no-fly one over Syria. Then there is the fact in itself that this tape and others leaked. Internal government communication in Turkey and personal communication of Turkish official has been thoroughly compromised. This will hinder future decision making and will erode any trust Turkish government allies may have in it.
  • It is somewhat astonishing how "western" media avoid the content of the leaked tape. An AP report on it makes a lot of the youtube blocking the Turkish government ordered in reaction to the tape. Of the recording itself the AP only mentions this: The four are allegedly heard discussing a military intervention in neighboring Syria, a sensitive political issue in Turkey, although the context of the conversation is not clear. The Washington Post filed that AP report under Technology. This is an incredible disservice to its readers. The Guardian report based on Reuters is not any better: The move by the TIB came hours after an anonymous YouTube account posted a leaked audio recording allegedly of a confidential conversation between Turkish intelligence chief Hakan Fidan, foreign minister Ahmet Davutoglu, undersecretary of the foreign ministry Feridun Sinirlioglu and deputy chief of the general staff, Yasar Gürel, discussing possible military action in Syria. There is no mentioning at all of the false flag attack. The Wall Street Journal comes somewhat nearer to the truth: ... a leaked recording published anonymously on the platform purported to reveal a conversation in which Turkey's foreign minister, spy chief and a top general appear to discuss how to create a pretext for a possible Turkish attack within Syria. For once kudos to the NYT which at least touches one point but leaves out the other important ones: ... the officials were heard discussing a plot to establish a justification for military strikes in Syria. One option that is said to have been discussed was orchestrating an attack on the Tomb of Suleyman Shah ... German media did not do any better.
  • ...2 more annotations...
  • A NATO ally is planning a false flag attack on its own territory which would implicate NATO Article 5 and other NATO countries' forces and the media do not even touch the issue? This is ludicrous. Related to the Syria issue is another thinly sourced trial balloon, the tenth or so, by the unofficial CIA spokesperson David Ignatius in the Washington Post: The Obama administration, stung by reversals in Ukraine and Syria, appears to have decided to expand its covert program of training and assistance for the Syrian opposition, deepening U.S. involvement in that brutal and stalemated civil war. ... Details of the plan were still being debated Thursday, but its likely outlines were described by knowledgeable officials: ... It follows the list of issues that have been discussed on and on over the last three years, more CIA training for insurgents in Jordan, more weapons, maybe some MANPADs. Ignatius source is here seems to be the CIA friends in the Syrian opposition: The expanded program would “send a clear message to the Assad regime that there is no military solution to the struggle,” according to a March memo to the White House from the opposition. Assad “has no incentive to talk” now, the memo argued, because he thinks he is winning. The rationale, bluntly stated, is that to reach an eventual diplomatic settlement in Syria, it is necessary now to escalate the conflict militarily. This has been a hard pill for Obama to swallow, but prodded by the Saudis, he seems to have reached that point.
  • There are so many caveats in here - "appears to have decided", 2still being debated", "seems to have reached that point" - that I do not believe a word of it. The loudly announced, by Ignatius and others, attack on south Syria has yet to appear and the halfhearted attack by the Turkish supported Jihadists in the north seems to be stuck. I do not anticipate any bigger action by Turkey or the U.S. especially as the such action right now would likely lead to harsher reaction by Russia.
  •  
    "A NATO ally is planning a false flag attack on its own territory which would implicate NATO Article 5 and other NATO countries' forces and the media do not even touch the issue? This is ludicrous." Beyond ludicrous. If a NATO member is attacked, all NATO nations are required by treaty to come to that nation's military aid. That Turkey is planning a false flag attack on Syria that could force us into a war deserves far more widespread news coverage.
Paul Merrell

Tech giants oppose NSA reform bill for timid safeguards against spying - RT USA - 0 views

  • Ahead of Thursday’s US House vote on a bill sold as reform of a major US government spying program, top technology firms like Google have joined civil liberties and privacy groups in calling the legislation inadequate in fighting mass surveillance. The Reform Government Surveillance coalition – AOL, Apple, Dropbox, Facebook, Google, LinkedIn, Microsoft, Twitter, and Yahoo – offered a statement on Wednesday denouncing the USA Freedom Act as a weak attempt at ending the government’s bulk storage of domestic phone metadata.
  • The USA Freedom Act would take the mass storage of phone records away from the government. Instead, telecommunications companies would be required to store the data. The bill would require the National Security Agency to get approval to search the telecoms’ cache of records from the often-compliant Foreign Intelligence Surveillance Court. Last-minute changes to the bill rankled privacy groups on Tuesday, leading many of them to decry the backdoor dealings as responsible for a “weakened,” “watered down” bill compared to what had previously passed the House Judiciary and Intelligence Committees earlier this month. On Wednesday, the tech coalition echoed these concerns, calling the amended legislation a move “in the wrong direction” of needed reform regarding mass surveillance. "The latest draft opens up an unacceptable loophole that could enable the bulk collection of Internet users' data," the coalition said. "While it makes important progress, we cannot support this bill as currently drafted and urge Congress to close this loophole to ensure meaningful reform." The loophole referred to by the coalition pertains to the USA Freedom Act’s definition for how and when government officials can search collected phone metadata records.
  • The new language – approved by House leaders and the Obama administration in recent days – modifies the prohibitions on bulk collection of domestic data to allow government officials to search for Americans’ phone records using a “a discrete term, such as a term specifically identifying a person, entity, account, address, or device, used by the Government to limit the scope of the information or tangible things sought.” This revised standard for the USA Freedom Act’s reform of surveillance is too broad and leaves privacy protections at risk, civil liberties groups said on Tuesday. In addition, the legislation’s new language also weakens the bill’s transparency provisions which outlined how much technology companies can disclose to customers about the extent of government requests of user data.
  • ...2 more annotations...
  • In addition to the tech coalition’s protest, the Computer & Communications Industry Association – whose members include Pandora, Samsung, Sprint, and others – said Wednesday it would “not support consideration or passage of the USA Freedom Act in its current form." The Obama administration publicly threw its support behind the amended USA Freedom Act, saying the bill would “provide the public greater confidence in our programs and the checks and balances in the system.” “The bill ensures our intelligence and law enforcement professionals have the authorities they need to protect the nation, while further ensuring that individuals’ privacy is appropriately protected when these authorities are employed,” the White House included.
  • Lawmakers opposed to the secretive negotiations attempted on Tuesday to counter the weakened surveillance reform bill by offering an amendment to the National Defense Authorization Act (NDAA) that is “materially identical” to the version of the USA Freedom Act that was advanced by the House Judiciary and Intelligence Committees earlier this month. Yet the amendment was denied by the House Rules Committee late Tuesday. The House is now scheduled to vote on the USA Freedom Act on Thursday under closed rules, which forbids adding amendments before the final vote.
  •  
    The Obama Administration and NSA supporters in the House of Representatives resort to a successful last-minute ambush attack to eviscerate the modest reforms proposed in the USA Freedom Act. 
Paul Merrell

The Rutherford Institute :: A Historic Analysis of the Fourth Amendment's Reasonable Ex... - 0 views

  • In June 2013, the Guardian newspaper, utilizing documents disclosed by Edward Snowden, a former employee of a National Security Agency (NSA) contractor, reported that the FBI had obtained a ninety-day order from the Foreign Intelligence Surveillance Court (FISC) requiring Verizon Business to provide the NSA daily so-called telephone metadata on all their customers’ communications, although none were suspected of a connection with international terrorism or other wrongdoing. Later public revelations established that the order had been renewed thirty-six times since May 2006, and that companion FISC orders had been directed to all major telecommunications companies. This unprecedented intrusion into the activities that citizens heretofore considered private and personal is effected without any suspicion and without any limitation to information related to some known threat from a foreign actor considered dangerous to the United States. While the FISC has uniformly upheld the constitutionality of the dragnet telephony metadata and search program of the NSA in non-adversary proceedings, Article III courts are divided at present. The United States Supreme Court has recently declared that the Fourth Amendment should be interpreted today to secure the same level of privacy protection as was reasonably expected of citizens when the Amendment was ratified in 1792. In making that assessment, law enforcement resources, investigative priorities, and technological and jurisdictional limitations on the government are all pertinent. As elaborated in the analysis linked below, the historical interpretation of the Fourth Amendment’s privacy guarantees suggests that the NSA’s bulk collection of telephone metadata violates the Constitution.   Click here to view The Rutherford Institute's historic analysis of the Fourth Amendment as it relates to the NSA's surveillance activities.
  •  
    Lengthy historical analysis of the Fourth Amendment as applied to NSA gathering of call metadata, concluding that the Amendment has been violated.
Paul Merrell

CIA Apparently 'Impersonated' Senate Staffers To Gain Access To Documents On Shared Dri... - 0 views

  • No, the most interesting part of the latest Torture Report details almost falls off the end of the page over at The Huffington Post. It's more hints of CIA spying, ones that go a bit further than previously covered. According to sources familiar with the CIA inspector general report that details the alleged abuses by agency officials, CIA agents impersonated Senate staffers in order to gain access to Senate communications and drafts of the Intelligence Committee investigation. These sources requested anonymity because the details of the agency's inspector general report remain classified. "If people knew the details of what they actually did to hack into the Senate computers to go search for the torture document, jaws would drop. It's straight out of a movie," said one Senate source familiar with the document. Impersonating staff to gain access to Senate Torture Report work material would be straight-up espionage. Before we get to the response that mitigates the severity of this allegation, let's look at what we do know.
  • The CIA accessed the Senate's private network to (presumably) gain access to works-in-progress. This was denied (badly) by CIA director John Brennan. The CIA also claimed Senate staffers had improperly accessed classified documents and reported them to the DOJ, even though they knew the charges were false. Then, after Brennan told his agency to stop spying on the Senate, agents took it upon themselves to improperly access Senate email accounts. This is all gleaned from a few public statements and a one-page summary of an Inspector General's report -- the same unreleased report EPIC is currently suing the agency over. Now, there's this: accusations that the CIA impersonated Senate staffers in hopes of accessing Torture Report documents. Certainly a believable accusation, considering the tactics it's deployed in the very recent past. This is being denied -- or, at least, talked around.
  • A person familiar with the events surrounding the dispute between the CIA and Intelligence Committee said the suggestion that the agency posed as staff to access drafts of the study is untrue. “CIA simply attempted to determine if its side of the firewall could have been accessed through the Google search tool. CIA did not use administrator access to examine [Intelligence Committee] work product,” the source said. So, it was a just an innocuous firewall test. And according to this explanation, it wasn't done to examine the Senate's in-progress Torture Report. But this narrative meshes with previous accusations, including those detailed in the Inspector General's report. Logging on to the shared drives with Senate credentials would allow agents to check the firewall for holes. But it also would allow them to see other Senate documents, presumably only accessible from that "side" of the firewall. While there's been no mention of "impersonation" up to this point, the first violation highlighted by the IG's report seems to be the most likely explanation of what happened here.
  • ...1 more annotation...
  • Five Agency employees, two attorneys and three information technology (IT) staff members, improperly accessed or caused access to the SSCI Majority staff shared drives on the RDINet Accessing another part of the shared network/drive by using someone else's credentials is low-level hackery, but not the first thing that springs to mind when someone says "impersonation." A supposed firewall test would be the perfect cover for sniffing around previously off-limits areas. Much of what has come to light about the agency's actions hints at low-level espionage. There's still more buried in the IG report that the agency is actively trying to keep from being made public. Just because these activities didn't specifically "target" Senate work material, it was all there and able to accessed. It doesn't really matter what the CIA says it was looking for. The fact that it was done at all, and done with such carefree audacity, is the problem. There are presumably ways to perform these checks that don't involve Inspector Generals, damning reports and multiple hacking accusations.
  •  
    So it takes three technical staff and two CIA lawyers to check a firewall? Lawyers? So if I want to check my firewall, I need to hire three technical staff and two lawyers? 
Paul Merrell

Pentagon fears blowback from 'humane' Guantánamo video release | The Miami He... - 0 views

  • A Pentagon official is invoking the revulsion of Muslims worldwide over images of U.S. Marines urinating on corpses to predict the global backlash at seeing videos of Guantánamo troops hauling a captive to force-feedings.The Justice Department included the declaration in a renewed bid to prevent the public from seeing 32 videos made by U.S. forces at the detention center in Cuba. “While the videos at issue in this litigation do not in my opinion depict any improper treatment of the detainees, but rather the lawful, humane and appropriate interaction between guards and detainees,” wrote U.S. Navy Rear Adm. Sinclair Harris, “persons and entities hostile to the United States and its detention of enemy belligerents at Guantánamo Bay are likely to think otherwise.”Harris is vice director of operations at the Department of Defense Joint Staff, and said he had watched some of the videos — which lawyers say portray troops forcing captive Abu Wa’el Dhiab to tube feedings. The admiral said he concluded the images could be used for propaganda purposes to stoke anti-American sentiment and put U.S. citizens at risk in Iraq and Afghanistan.
  • Dhiab, 43, was cleared for release from Guantánamo years ago but can’t be repatriated to his native Syria, a nation now wracked with Islamic State violence. Instead, Uruguay has offered him sanctuary in a deal that was sidelined first by the Pentagon then by that South American nation’s elections. He has been protesting by hunger striking.Dhiab wants the videos released, according to one of his attorneys, Cori Crider, and so does a consortium of 16 media organizations, which petitioned a federal court in Washington, D.C. On Oct. 3, Judge Gladys Kessler ordered the U.S. government to obscure the faces and identities in the videos of everyone but the captive, then make them public. Tuesday, U.S. government lawyers notified Kessler’s court that it would file an appeal.
  • Dhiab’s attorney argues that ugly optics are no excuse.“I’ve seen the videos — and of course they’re upsetting,” Crider said Wednesday by email from Reprieve, a London-based law firm that represents Dhiab at no charge. “But that’s no reason to hide the truth from Americans.” “By that logic, think of all the government scandals that never would have seen the light of day,” she added, citing the 2003 photos of guards abusing detainees at Abu Ghraib prison in Iraq and images of the 1968 My Lai massacre that “changed the conversation about Vietnam.”Reprieve’s legal team discovered there were recordings during a forced-feeding challenge; the detention center says it has since discontinued taping the tube feedings for reasons of patient privacy.
  • ...3 more annotations...
  • Harris suggested the videos could lead to the “perceived mistreatment of individuals,” and serve as a recruiting tool for the Islamic State. In his declaration he noted that South Florida journalist Steven Sotloff was forced by his captors to make an anti-Guantánamo statement before he was beheaded earlier this year. When Sotloff was killed, he was clad in an orange jumpsuit that has come to symbolize the prison in southeast Cuba.
  • Harris argued against release based on “prior experience from the release of certain provocative photographs and information.” He noted that “in 2012 the release of a video depicting Marines urinating on the corpses of alleged Taliban members was used as a recruitment tool for the Taliban and led to an Afghan soldier attacking and killing French troops.”It is not known when the U.S. Court of Appeals for the District of Columbia Circuit would take up the Justice Department appeal because Tuesday’s filing was not the appeal itself but notice to the court that the Obama administration was appealing Kessler’s release order.Separately, the prison camps commander Navy Rear Adm. Kyle Cozad, argued that disclosure of the videos would tip captives to certain techniques used by its tackle-and-shackle squad of soldiers — something Judge Kessler ridiculed in her ruling as “implausible” because the captives experience what is portrayed in the videos.
  • Cozad, however, suggested in a heavily redacted 13-page sworn statement that if the videos are released he might restrict access to news media in the cellblocks, a popular distraction at the detention center that the admiral characterized as “important for intellectual stimulation and overall morale.”He also listed a series of assaults that apparently occurred since he took over this summer, including a captive who resisted his force-feeding by biting a guard and another who hit a soldier in the face with a handcuffed fist.He called the videos a useful tool for the prison, saying staff likened them to “an NFL team watching video of the previous week’s football game to determine what plays worked well, what they did wrong, and what they could do better during the next game.”
  •  
    If DOJ does not win its appeal, watch for the GITMO prisoner to be suddenly released in order to moot his case so the video doesn't have to be disclosed.  
Paul Merrell

Quick facts: What you need to know about the Syria crisis | Mercy Corps - 0 views

  • Editor's note: This article was originally published on August 13, 2013; it was updated on August 29, 2014 to reflect the latest information. Syria’s civil war is the worst humanitarian disaster of our time. The number of innocent civilians suffering — more than nine million people are displaced, thus far — and the increasingly dire impact on neighboring countries can seem to overwhelming to understand.
  • Three years after it began, the full-blown civil war has killed over 190,000 people, half of whom are believed to be civilians. Bombings are destroying crowded cities and horrific human rights violations are widespread. Basic necessities like food and medical care are sparse. The U.N. estimates that over 6.5 million people are internally displaced — an increase of more than two million in just six months. When you also consider refugees, over half of the country’s pre-war population of 23 million is need urgent humanitarian assistance, whether they still remain in the country or have escaped across the borders.
  • Three million Syrians have registered with the United Nations High Commission of Refugees, who is leading the regional emergency response. But hundreds of thousands more await registration.
  • ...4 more annotations...
  • Every year of the conflict has seen an exponential growth in refugees. In 2012, there were 100,000 refugees. By April 2013, there were 800,000. That doubled to 1.6 million in less than four months. There are now three million Syrians scattered throughout the region — an increasing number that will soon surpass Afghans as the world's largest refugee population. At this rate, the UN predicts there could be four million Syrian refugees by the end of this year — the worst exodus since the Rwandan genocide 20 years ago.
  • The lack of clean water and sanitation in crowded, makeshift settlements is an urgent concern. Diseases like cholera and polio can easily spread — even more life-threatening without enough medical services. In some areas with the largest refugee populations, water shortages have reached emergency levels; the supply is as low as 30 liters per person per day — one-tenth of what the average American uses.
  • According to the U.N., more than half of all Syrian refugees are under the age of 18. Most have been out of school for months, if not years.
  • In December 2013, the U.N. issued its largest ever appeal for a single crisis — according to their estimates, $6.5 billion is necessary to meet the needs of all those affected by the crisis, both inside and outside Syria, an increase from last year's $5 billion. Yet that previous appeal was only 62 percent funded.
  •  
    The U.S. stated basis for supplying weapons and other aid to "moderate Syrian rebels" is humanitarian, that the Assad government is is a repressive government. Nonetheless, President Assad was recently overwhelmingly reelected by Syrian citizens. That fact and the recently updated statistics on this web page certainly put the lie to any "humanitarian" purpose on the part of U.S. government. So why is the U.S. doing this? It's because the U.S. Congress snaps to attention each time the Israeli government demands through the Israel Lobby in the U.S. that the U.S. shed more blood to destabilize and Balkanize Israel's neighbors. And because the radical Sunni dictatorships the U.S. props up on the Arab Gulf Coast push for war against Shia-majority nations in the region.  And it's because Barack Obama is willing to kill countless thousands of people for political reasons. We are ruled by cold-blooded murderers.
Paul Merrell

Nuclear Lab Whistleblower Case Moves Forward - 0 views

  • In 2013 a contract employee at the Los Alamos National Laboratory found himself stripped of his security clearance and suspended from his job shortly after he published an article arguing the benefits of getting rid of nuclear weapon stockpiles. This month he begins mediation with the lab after his second whistleblower claim was accepted by the National Nuclear Security Administration. Dr. James Doyle worked at the Los Alamos lab, one of the laboratories in the Department of Energy nuclear complex, for 17 years. Prior to submitting his article for publication, he had it reviewed by a classification analyst at the lab, met with the director of the security office to address any concerns, and made it clear in the article that he was providing his own opinion as an individual and not as an Energy Department employee. But just two days after the article was published by the International Institute for Strategic Studies, Dr. Doyle was accused of disclosing classified information. Lab officials searched his personal computer, retroactively classified the article, and suspended his security clearance. Dr. Doyle was understandably confused and filed a complaint alleging that lab officials were retaliating against him for expressing unpopular opinions in the article. After filing the complaint, Dr. Doyle was fired from his position at the lab and his whistleblower complaint was rejected. While the Department maintains that his termination was due to budget cuts, Dr. Doyle believes it was due to his push-back against the retroactive classification of his article.
  • Several nuclear watchdog groups, including the Project On Government Oversight, rallied around Dr. Doyle, sending a letter in 2014 to the Secretary of Energy and the Inspector General urging a review of his case. Dr. Doyle filed a second complaint because he was fired before his first complaint was resolved. The Nuclear Security & Deterrence Monitor reported last week in an article titled “NNSA Accepts Second Whistleblower Claim From Laid-Off Los Alamos Analyst” (behind a paywall) that this claim was accepted in late 2014 and that Dr. Doyle began mediation with the lab this month. This is a step in the right direction, and one step further than his first complaint ever got.
Paul Merrell

Our Condolences: How the U.S. Paid For Death and Damage in Afghanistan - 0 views

  • An armored vehicle ran over a six-year-old boy’s legs: $11,000. A jingle truck was “blown up by mistake”: $15,000. A controlled detonation broke eight windows in a mosque: $106. A boy drowned in an anti-tank ditch: $1,916. A 10-ton truck ran over a cucumber crop: $180. A helicopter “shot bullets hitting and killing seven cows”: $2,253. Destruction of 200 grape vines, 30 mulberry trees and one well: $1,317. A wheelbarrow full of broken mirrors: $4,057. A child who died in a combat operation: $2,414. These are among the payments that the United States has made to ordinary Afghans over the course of American military operations in the country, according to databases covering thousands of such transactions obtained by The Intercept under the Freedom of Information Act. Many of the payments are for mundane incidents such as traffic accidents or property damage, while others, in flat bureaucratic language, tell of “death of his wife and 2 minor daughters,” “injuries to son’s head, arms, and legs,” “death of husband,” father, uncle, niece.
  • The databases are incomplete, reflecting fragmented record keeping in Afghanistan, particularly on the issue of harm to civilians. The payments The Intercept has analyzed and presented in the graphic accompanying this story are not a complete accounting, but they do offer a small window into the thousands of fractured lives and personal tragedies that take place during more than a decade of war.
  •  
    Trillions for war but peanuts for victims.
Paul Merrell

Privacy Day | ACLU of Oregon - 0 views

  • Help strengthen Oregon's privacy protections and limit the use of dragnet surveillance. We are advocating for:•    SB 339 - Strict guidelines for the use of automatic license plate readers (ALPR) •    SB 640 - A warrant requirement to access email, phone, and location records •    SB 641 - A warrant requirement to search cell phones Advances in technology have made it too easy for law enforcement to track where you go, what you do, and who you are with. Most of the data the government collects is about innocent people who are not suspected of any crimes. Yet the government collects that personal information - or accesses it directly from your internet or cell phone provider – and can keep it for years on end.  Technology has changed but your rights haven't.
  •  
    Privacy measures that the ACLU is pushing at the state level in Oregon. Links are to short summaries of legislation.
Paul Merrell

A Few Comments on the David Petraeus Plea Deal: What Money And Connections Buy You | Po... - 0 views

  • David Petraeus, who suffered a fall worthy of a Greek tragedy when was caught leaking classified information to his biographer-girlfriend, has reached a plea deal with the feds, in the person of the U.S. Attorney's Office for the Western District of North Carolina.
  •  
    Ken White, former federal prosecutor and my favorite blawger, has a righteous rant about the injustice of DoJ's sweet deal for former CIA head David Patraeus
Paul Merrell

Wikimedia v. NSA | American Civil Liberties Union - 0 views

  • The ACLU has filed a lawsuit challenging the constitutionality of the NSA’s mass interception and searching of Americans’ international communications. At issue is the NSA's “upstream” surveillance, through which the U.S. government monitors almost all international – and many domestic – text-based communications. The ACLU’s lawsuit, filed in March 2015 in the U.S. District Court for the District of Maryland, is brought on behalf of nearly a dozen educational, legal, human rights, and media organizations that collectively engage in hundreds of billions of sensitive Internet communications and have been harmed by NSA surveillance.
  • The plaintiffs in the lawsuit are: Wikimedia Foundation, The National Association of Criminal Defense Lawyers, Human Rights Watch, Amnesty International USA, PEN American Center, Global Fund for Women, The Nation Magazine, The Rutherford Institute, and The Washington Office on Latin America. These plaintiffs’ sensitive communications have been copied, searched, and likely retained by the NSA. Upstream surveillance hinders the plaintiffs’ ability to ensure the basic confidentiality of their communications with crucial contacts abroad – among them journalists, colleagues, clients, victims of human rights abuses, and the tens of millions of people who read and edit Wikipedia pages. Read the complaint » Upstream surveillance, which the government claims is authorized by the FISA Amendments Act of 2008, is designed to ensnare all of Americans’ international communications, including emails, web-browsing content, and search engine queries. It is facilitated by devices installed, with the help of companies like Verizon and AT&T, directly on the internet “backbone” – the network of high-capacity cables, switches, and routers across which Internet traffic travels.
  • The NSA intercepts and copies private communications in bulk while they are in transit, and then searches their contents using tens of thousands of keywords associated with NSA targets. These targets, chosen by intelligence analysts, are never approved by any court, and the limitations that do exist are weak and riddled with exceptions. Under the FAA, the NSA may target any foreigner outside the United States believed likely to communicate “foreign intelligence information” – a pool of potential targets so broad that it encompasses journalists, academic researchers, corporations, aid workers, business persons, and others who are not suspected of any wrongdoing.
  • ...1 more annotation...
  • Through its general, indiscriminate searches and seizures of the plaintiffs’ communications, upstream surveillance invades their Fourth Amendment right to privacy, infringes on their First Amendment rights to free expression and association, and exceeds the statutory limits of the FAA itself. The nature of plaintiffs' work and the law’s permissive guidelines for targeting make it likely that the NSA is also retaining and reading their communications, from email exchanges between Amnesty staff and activists, to Wikipedia browsing by readers abroad. The ACLU litigated an earlier challenge to surveillance conducted under the FAA – Clapper v. Amnesty – which was filed less than an hour after President Bush signed the FAA into law in 2008. In a 5-4 vote, the Supreme Court dismissed the case in February 2013 on the grounds that the plaintiffs could not prove they had been spied on. Edward Snowden has said that the ruling contributed to his decision to expose the full scope of NSA surveillance a few months later. Among his disclosures was upstream surveillance, the existence of which was later confirmed by the government.
Paul Merrell

Suppressing Key Facts, How the American Public Is Deceived by the "News" | Global Research - 0 views

  • If the public is systematically lied-to by the Government and by a virtually uniformly cooperative press suppressing key facts in order to pump that lie, such as was the case during 2002 and 2003 in the lead-up to America’s invasion of Iraq, then there can’t possibly be an authentic democracy, because democracy is founded upon a truthfully informed public, and so any ‘news’ institution that violates its solemn public trust of reporting the truth, the whole truth, and nothing but the truth, is traitorous to democracy itself.  That’s why the press has been called “the fourth estate” of government. The first three “estates” are the aristocracy, the clergy, and the public. If the press represent not the public, but instead one of the two other classes — the aristocracy and/or the clergy — then what exists is a dictatorship by that actually ruling class against the public, not a democracy by the public. The public cannot rule in such a country. They instead are manipulated in it. They may be manipulated to believe that they rule, but it’s only a manipulated illusion then; it’s not real; it’s a fraud, of the most massive type. Such a country cannot possibly be a real democracy; it’s a fraudulent ‘democracy.’ Evidence will be presented here that democracy no longer exists in the United States. Part of this evidence is personal, something that I always prefer to avoid, but which happens to be integral to this particular news-report and analysis. So: it’s necessary, in this case.
Paul Merrell

News Roundup and Notes: August 18, 2014 | Just Security - 0 views

  • Over the weekend, the U.S. military carried out further airstrikes in Iraq, targeting Islamic State militants near the Mosul Dam, involving “a mix of fighter, bomber, attack and remotely piloted aircraft.” The nine strikes on Saturday and 14 strikes on Sunday were carried out under authority “to support humanitarian efforts in Iraq,” to protect U.S. personnel and facilities, and to support Iraqi and Kurdish defense forces [U.S. Central Command]. President Obama notified Congress of the latest American involvement yesterday, stating that “[t]he failure of the Mosul Dam could threaten the lives of large numbers of civilians, endanger U.S. personnel and facilities, including the U.S. Embassy in Baghdad.” Obama said the operations will be “limited in their scope and duration.” The significantly expanded air campaign, including the first reported use of U.S. bombers, has strengthened the Kurdish forces’ ground offensive to reclaim the strategic dam from Islamic State control [Wall Street Journal’s Matt Bradley et al.; Washington Post’s Liz Sly et al.]. Iraqi state television reported early today that Iraqi and Kurdish forces are now in control of the dam [Reuters], although there are reports of continued heavy fighting around the Mosul Dam [Al Jazeera]. Joe Parkinson [Wall Street Journal] covers how the U.S. has gained a “controversial new ally” in the Kurdistan Workers’ Party (PKK), as a number of PKK fighters joined the U.S.-backed Kurdish battle in northern Iraq over the weekend.
  • Israel-Palestine With the five-day truce between Israel and Hamas set to expire tonight, Israeli and Palestinian negotiators are continuing discussions in Cairo, although significant gaps remain between the two sides. While Israel is pushing for tougher security measures, Palestine is demanding an end to the Gaza blockade without preconditions [Associated Press; Reuters’ Nidal Al-Mughrabi and Jeffrey Heller]. Israeli troops have demolished the homes of two Palestinians suspected to have been behind the abduction and killing of the three Israeli teenagers in the West Bank in June [Haaretz’s Gili Cohen]. An IDF spokesperson said that the demolition “conveys a clear message to terrorists and their accomplices that there is a personal price to pay when engaging in terror and carrying out attacks against Israelis” [Al Jazeera]. Haaretz’s editorial board notes how the Israeli offensive in Gaza has generated “a very public crisis in relations between Israel and the United States” and warns that “Netanyahu must ease the tension with Washington and act to repair the rift with Obama.” The Wall Street Journal (Joshua Mitnick) explores how Israeli Prime Minister Benjamin Netanyahu’s “containment strategy” in the ongoing conflict is “a contrast from the tough talk against terrorism that fueled his political ascent.”
  • ulian Borger [The Guardian] notes how the potential International Criminal Court investigation into alleged war crimes in Gaza by both Israeli and Hamas forces has become a “fraught political battlefield.” Marwan Bishara [Al Jazeera] explains how and why the UN has been “sidelined” in the Middle East conflict. Meanwhile, the British government is facing a legal challenge over its decision to not suspend existing licenses for the sale of military hardware to Israel following the launch of Operation Protective Edge in Gaza last month [The Guardian’s Jamie Doward].
  • ...3 more annotations...
  • Texas Governor Rick Perry [Politico Magazine] writes that “[c]learly more strikes will be necessary, with nothing less than a sustained air campaign to degrade and destroy Islamic State forces.” The Hill (Alexander Bolton) notes that Democrats in both chambers have called for a vote in Congress over military strikes in Iraq, while Senate Majority Leader Harry Reid “almost certainly wants to avoid [a vote] as he seeks to keep the upper chamber majority in his party’s hands.” The United Kingdom has also expanded its military involvement in Iraq, with Defence Secretary Michael Fallon confirming that British warplanes are no longer confined to the initial humanitarian mission to assist Iraq’s Yazidi minority [The Guardian’s Nicholas Watt]. The UN Security Council has placed six individuals affiliated with extremist organizations in Iraq and Syria, including the Islamic State, on its sanctions list [UN News Centre]. Army Col. Joel Rayburn, writing in the Washington Post, considers the legacy of Nouri al-Maliki. While Maliki has agreed to step down as prime minister, Rayburn argues that “the damage he has wrought will define his country for decades to come.” Mike Hanna [Al Jazeera America] explains why Maliki’s ouster “is no magic bullet for Iraq,” noting that a “change of prime minister doesn’t in itself alter Iraq’s political or security equation.” And Ali Khedery [New York Times] writes how the latest change in government “really is Iraq’s last chance.”
  • Journalist James Risen, who faces prison over his refusal to reveal the source of a CIA operation story, has called President Obama “the greatest enemy of press freedom in a generation” [New York Times’ Maureen Dowd]. The International Atomic Energy Agency said that Iran has promised to co-operate with an investigation to be carried out by the nuclear watchdog, following a “useful” meeting in Tehran [Reuters’ Fredrik Dahl and Mehrdad Balali]. Sky News reports that WikiLeaks founder Julian Assange is planning to “soon” leave the Ecuadorian embassy in London, after spending more than two years inside the building. Assange said he is planning to meet with the British government to resolve his “lack of legal protection.”
  • If you want to receive your news directly to your inbox, sign up here for the Just Security Early Edition. For the latest information from Just Security, follow us on Twitter (@just_security) and join the conversation on Facebook. To submit news articles and notes for inclusion in our daily post, please email us at news@justsecurity.org. Don’t forget to visit The Pipeline for a preview of upcoming events and blog posts on U.S. national security.
  •  
    Until about a month ago, I thought that Barack Obama would leave only two lasting accomplishments for future history books: [i] first African-American President; and [ii] ending the U.S. war in Iraq. Make it item 1 only now. It's no longer U.S. military "mission creep" in Iraq; it's full bore reinvasion topped off with a U.S. enguineered coup of the Iraqi government.   Just Security is a very high quality politico-legal site for issues involving U.S. and U.S.-sponsored violence and surveillance issues. It's based at the Center for Human Rights and Global Justice at New York University School of Law. Their emailed weekday newsletter is great for the topics I try to follow.  
Paul Merrell

Is there a second NSA leaker after Snowden? | TheHill - 0 views

  • Top experts say there could be a new person leaking details about the National Security Agency, in addition to former contractor Edward Snowden.Glenn Greenwald, the journalist most closely associated to Snowden, said he suspects someone else has been involved in leaking out new documents, and other experts have backed up the claim.ADVERTISEMENTThe existence of a second leaker “seems clear at this point,” Greenwald wrote on Twitter over the weekend. “The lack of sourcing to Snowden on this & that last [Der Spiegel] article seems petty telling,” he added, after German broadcasters reported that the NSA was tracking people searching for details about privacy software. 
  • Neither the Der Spiegel article from December nor last week’s story, both of which were partly written by privacy advocate and security researcher Jacob Appelbaum, specifically mentioned that the information emanated from leaks by Snowden.“That's particularly notable given that virtually every other article using Snowden documents - including der Spiegel - specifically identified him as the source,” Greenwald said in an email to The Hill on Monday.Other people who have seen Snowden’s trove of documents have agreed that the documents revealed by German outlets seem to indicate a second source.
  • Bruce Schneier, a cryptologist and cybersecurity expert who has helped the Guardian review Snowden’s disclosures, said he did “not believe that this came from the Snowden documents.”“I think there’s a second leaker out there,” he wrote in a blog post last week. If true, it could add another headache for the NSA, which has struggled for more than a year to contain the fallout from Snowden’s revelations. Defenders of the NSA say that the disclosures have hurt U.S. security and empowered terrorists and other enemies abroad.Among other internal reforms, the spy agency has beefed up its clearance procedures to prevent another employee from passing along secret documents to journalists or governments in Beijing and Moscow.
  • ...1 more annotation...
  • “If in fact this is a post-Snowden NSA leak, then it’s probably just proof that you can always build a bigger mousetrap; that doesn’t mean you’re going to catch the mice,” said Stephen Vladeck, a law professor at American University who specializes in national security issues.Vladeck added that leaks about controversial national security programs are in many ways inevitable, and may not be tied to Snowden’s leaks in any way.For Greenwald, however, a second leaker would be affirmation of Snowden’s actions.“I've long thought one of the most significant and enduring consequences of Snowden's successful whistleblowing will be that he will inspire other leakers to come forward,” he told The Hill. 
Paul Merrell

The ultimate goal of the NSA is total population control | Antony Loewenstein | Comment... - 0 views

  • William Binney is one of the highest-level whistleblowers to ever emerge from the NSA. He was a leading code-breaker against the Soviet Union during the Cold War but resigned soon after September 11, disgusted by Washington’s move towards mass surveillance.On 5 July he spoke at a conference in London organised by the Centre for Investigative Journalism and revealed the extent of the surveillance programs unleashed by the Bush and Obama administrations.
  • “At least 80% of fibre-optic cables globally go via the US”, Binney said. “This is no accident and allows the US to view all communication coming in. At least 80% of all audio calls, not just metadata, are recorded and stored in the US. The NSA lies about what it stores.”The NSA will soon be able to collect 966 exabytes a year, the total of internet traffic annually. Former Google head Eric Schmidt once argued that the entire amount of knowledge from the beginning of humankind until 2003 amount to only five exabytes.Binney, who featured in a 2012 short film by Oscar-nominated US film-maker Laura Poitras, described a future where surveillance is ubiquitous and government intrusion unlimited.“The ultimate goal of the NSA is total population control”, Binney said, “but I’m a little optimistic with some recent Supreme Court decisions, such as law enforcement mostly now needing a warrant before searching a smartphone.”
  • It shows that the NSA is not just pursuing terrorism, as it claims, but ordinary citizens going about their daily communications. “The NSA is mass-collecting on everyone”, Binney said, “and it’s said to be about terrorism but inside the US it has stopped zero attacks.”The lack of official oversight is one of Binney’s key concerns, particularly of the secret Foreign Intelligence Surveillance Court (Fisa), which is held out by NSA defenders as a sign of the surveillance scheme's constitutionality.“The Fisa court has only the government’s point of view”, he argued. “There are no other views for the judges to consider. There have been at least 15-20 trillion constitutional violations for US domestic audiences and you can double that globally.”
  • ...4 more annotations...
  • He praised the revelations and bravery of former NSA contractor Edward Snowden and told me that he had indirect contact with a number of other NSA employees who felt disgusted with the agency’s work. They’re keen to speak out but fear retribution and exile, not unlike Snowden himself, who is likely to remain there for some time.
  • Binney recently told the German NSA inquiry committee that his former employer had a “totalitarian mentality” that was the "greatest threat" to US society since that country’s US Civil War in the 19th century. Despite this remarkable power, Binney still mocked the NSA’s failures, including missing this year’s Russian intervention in Ukraine and the Islamic State’s take-over of Iraq.The era of mass surveillance has gone from the fringes of public debate to the mainstream, where it belongs. The Pew Research Centre released a report this month, Digital Life in 2025, that predicted worsening state control and censorship, reduced public trust, and increased commercialisation of every aspect of web culture.It’s not just internet experts warning about the internet’s colonisation by state and corporate power. One of Europe’s leading web creators, Lena Thiele, presented her stunning series Netwars in London on the threat of cyber warfare. She showed how easy it is for governments and corporations to capture our personal information without us even realising.Thiele said that the US budget for cyber security was US$67 billion in 2013 and will double by 2016. Much of this money is wasted and doesn't protect online infrastructure. This fact doesn’t worry the multinationals making a killing from the gross exaggeration of fear that permeates the public domain.
  • Wikileaks understands this reality better than most. Founder Julian Assange and investigative editor Sarah Harrison both remain in legal limbo. I spent time with Assange in his current home at the Ecuadorian embassy in London last week, where he continues to work, release leaks, and fight various legal battles. He hopes to resolve his predicament soon.At the Centre for Investigative Journalism conference, Harrison stressed the importance of journalists who work with technologists to best report the NSA stories. “It’s no accident”, she said, “that some of the best stories on the NSA are in Germany, where there’s technical assistance from people like Jacob Appelbaum.” A core Wikileaks belief, she stressed, is releasing all documents in their entirety, something the group criticised the news site The Intercept for not doing on a recent story. “The full archive should always be published”, Harrison said.
  • With 8m documents on its website after years of leaking, the importance of publishing and maintaining source documents for the media, general public and court cases can’t be under-estimated. “I see Wikileaks as a library”, Assange said. “We’re the librarians who can’t say no.”With evidence that there could be a second NSA leaker, the time for more aggressive reporting is now. As Binney said: “I call people who are covering up NSA crimes traitors”.
Paul Merrell

Senate Bill Requires Report on "All" NSA Bulk Collection | Federation Of American Scien... - 0 views

  • The National Security Agency would be required to prepare an unclassified report on “all NSA bulk collection activities,” the Senate Appropriations Committee directed in its report on the Fiscal Year 2015 Department of Defense Appropriations bill, published yesterday. The Committee told the NSA to prepare a report “describing all NSA bulk collection activities, including when such activities began, the cost of such activities, what types of records have been collected in the past, what types of records are currently being collected, and any plans for future bulk collection.” Such a report would be expected to clarify whether NSA bulk collection extends beyond the acknowledged telephone metadata program in Section 215 of the USA Patriot Act. The required report is to be “unclassified to the greatest extent possible,” the Senate Committee said. In the reporting requirements that it imposed on NSA, the Senate Appropriations Committee notably went beyond what was required by the Senate or House Intelligence Committees. The Appropriations Committee also directed NSA to submit additional reports on the total number of records acquired and reviewed by NSA in its bulk telephone metadata program over the past five years, and an estimate of the number of records of U.S. persons that have been acquired and reviewed in the telephone metadata program. Another unclassified report is required to provide “a list of terrorist activities that were disrupted, in whole or in part, with the aid of information obtained through NSA’s telephone metadata program.”
  • Update: Identical reporting language was included by the Senate Appropriations Committee last year in its report on the FY2014 Defense Appropriations bill (h/t @byersalex), yet the required NSA reports were not produced. At Emptywheel, Marcy Wheeler questions the utility of the proposed reports, particularly since the Senate Committee language lacks a clear, unambiguous definition of “bulk collection.”
« First ‹ Previous 381 - 400 of 415 Next ›
Showing 20 items per page