Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged SITE

Rss Feed Group items tagged

Paul Merrell

Faced With The Security State, Groklaw Opts Out | Popehat - 0 views

  • For ten years Pamela Jones has run Groklaw, a site collecting, discussing, and explaining legal developments of interest to the open-source software community. Her efforts have, justifiably, won many awards. She's done now.
  • That's not why she's stopping. Pamela Jones is ending Groklaw because she can't trust her government. She's ending it because, in the post-9/11 era, there's no viable and reliable way to assure that our email won't be read by the state — because she can't confidently communicate privately with her readers and tipsters and subjects and friends and family.
  • In making this choice, Jones echoes the words of Lavar Levison, who shut down his encrypted email service Lavabit. Levison said he was doing so rather than "become complicit in crimes against the American people": “I’m taking a break from email,” said Levison. “If you knew what I know about email, you might not use it either.” Lavabit was joined by encryption provider Silent Circle:
  • ...2 more annotations...
  • The extent of NSA surveillance is unknown, but what little we see is deeply unsettling. What our government says about it can't be believed; the government uses deliberately misleading language or outright lies about the scope of surveillance. So I don't blame Pamela Jones or question her decision. It's not the only way. I don't think it's my way, yet — though I am having some very concerned conversations about whether it's safe, or even ethical, to have confidential attorney-client communications by email.
  • I hope that Pamela's decision will arouse the interest, or attention, or outrage, of a few more people, who will in turn talk and write and advocate to get more people involved. Groklaw was a great resource; citizens will care that it's gone. (The government and its minions won't.) Pamela's choice will likely be met with the usual arguments: the government doesn't care about your emails. If you have nothing to hide you have nothing to worry about. This is about protecting us from terrorist attacks, not about snooping into Americans' communications. Don't you remember 9/11? I tire of responding to those. Let me offer one response that applies to all of them: I don't trust my government, I don't trust the people who work for my government, and I believe that the evidence suggests that it's irrational to offer such trust.
Paul Merrell

"Disreputable if Not Outright Illegal": The National Security Agency versus Martin Luth... - 0 views

  • Washington, D.C., September 25, 2013 – During the height of the Vietnam War protest movements in the late 1960s and early 1970s, the National Security Agency tapped the overseas communications of selected prominent Americans, most of whom were critics of the war, according to a recently declassified NSA history. For years those names on the NSA's watch list were secret, but thanks to the decision of an interagency panel, in response to an appeal by the National Security Archive, the NSA has released them for the first time. The names of the NSA's targets are eye-popping. Civil rights leaders Dr. Martin Luther King and Whitney Young were on the watch list, as were the boxer Muhammad Ali, New York Times journalist Tom Wicker, and veteran Washington Post humor columnist Art Buchwald. Also startling is that the NSA was tasked with monitoring the overseas telephone calls and cable traffic of two prominent members of Congress, Senators Frank Church (D-Idaho) and Howard Baker (R-Tennessee). The NSA history, American Cryptology during the Cold War, is a multi-volume study that covers the intersection of secret communications intelligence with Cold War history. The National Security Archive filed the initial mandatory declassification review request for the histories in 2006. The next year, when the NSA denied significant information from the histories the Archive filed an appeal. The Agency declassified more information in 2008 and the Archive posted the first three volumes on its Web site in 2008, with commentary by Matthew Aid. The NSA had denied so much, however, that the Archive filed a final appeal with the Interagency Security Classification Appeals Panel (ISCAP) that same year. Book I remains under appeal. Five years after the Archive's appeal, the ISCAP has compelled the NSA to release more information from Books II and III.
  •  
    Much more on the linked site, including the declassified documents themselves. 
Paul Merrell

Fearing 'enemies,' Turkey blocks YouTube | Europe | DW.DE | 28.03.2014 - 0 views

  • First Twitter, now YouTube. The Turkish telecoms authority TIB said the move to was an "administrative measure." But only a few hours before the measure came into force, a rather provocative recording was posted on the site. According to the official view, the audio clip is one of the most flagrant among the many that anonymous opponents of the government have been leaking online over the last few months. It exposes the Islamic-conservative government led by Prime Minister Recep Tayyip Erdogan just before the municipal elections scheduled to take place on March 30. The conversation that was leaked this time is between Foreign Minister Ahmet Davutoglu and several heads of the intelligence service and the military. Participants of the conversation were apparently looking for a reason to go to war with Syria.
  • According to reports from the Turkish newspaper Hürriyet, the Turkish foreign ministry has confirmed the authenticity of the recording and has explained that the conversation took place in the foreign ministry. The ministry also emphasized, however, that the contents of the recording were distorted. In a statement issued by the Ministry of Foreign Affairs this explanation was given: "Monitoring such a meeting of a highly confidential nature which was held at a location such as the office of the foreign minister, where the most sensitive security issues of the state are discussed; and releasing these conversations to the public are a despicable attack, an act of espionage and a very serious crime against the national security of Turkey. This incident reveals the extent the threats of cyber and electronic attacks that Turkey encounters." The statement called the perpetrators "enemies of our state" and said they would be identified and severely punished as soon as possible.
  • But according to the legal expert, another aspect of the problem is at stake here. "This is a case of espionage. The alleged conversation took place in a secure location and it is on a very sensitive topic - the question of whether there should or should not be a war with Syria," he says. Tokuzlu added that the content of the conversation was clearly supposed to be released to the public in order to influence the results of this Sunday's (30.03.2014) local elections. But blocking the whole YouTube site was never an appropriate solution, Tokuzlu maintains. "There is no reason to block entire sites. You could block individual accounts or videos; that would be legitimate in this sort of a case," he said. Tokuzlu also explained that blocking YouTube could not be compared with the move to block Twitter: "The Security Council in Turkey held an emergency meeting. Right after, YouTube was blocked. That shows how important this case is."
  • ...2 more annotations...
  • The Turkish radio and television supervisory board RTÜK banned several Turkish media outlets from spreading the video or communicating its contents. According to the newspaper Hürriyet, the Turkish federal prosecutor's office has already initiated investigations against those responsible for the video. Measures taken too far According to legal expert Bertan Tokuzlu, the recording gives the impression that the government wanted to make trouble internationally, in order to distract the public from internal problems. "If the government wanted to create a reason for war, that is absolutely not in keeping with international legal standards," says Tokuzlu.
  • The recording also mentions Turkish arms deliveries to Syrian opposition groups. "If that is the case and we have a war crime to deal with, then the public has a right to know this information, according to the European Court of Human Rights," Tokuzlu stressed, adding that the Turkish government's reaction to the publication of the conversation was very thin-skinned. "If the recording provides evidence of a war crime, then that might mean the government will be brought before a war crimes tribunal in the near future. That is a delicate subject."
  •  
    This article is from 28 March 2014. The Turkish government a few days ago restored access to YouTube and Twitter, after reports that more than 300,000 Turks had thwarted the ban by learning to use Tor and VPN tunneling, posing a long-term obstacle to Turkish intelligence service surveillance. The Foreign Ministry recording was of the Foreign Minister and other high Turkish officials discussing plans for a false flag attack on Turkey to justify Turkey launching its own direct military attacks on Syria. Because Turkey is a member of NATO, an attack on Turkey triggers the obligations of other NATO member nations to join Turkey's "defense." 
Paul Merrell

DOJ Seeks Removal Of Restrictions On Computer Search Warrants - 0 views

  • The Justice Department recently submitted proposed new rules on the procedures and practices of the department’s agencies and bureaus. Among the suggested changes is a modification of the Federal Rules of Criminal Procedure Rule 41(b), which empowers a federal court to issue a warrant allowing the federal government to conduct a search of a computer or computer network involved in a criminal investigation. Under current regulations, a warrant issued by a federal court is only valid in that court’s district. As there are 94 federal judicial districts, investigating a widespread attack may require either petitioning dozens of district courts or acting extrajudicially by not seeking a warrant. An extrajudicial investigation, however, cannot be used if criminal convictions are sought, as evidence gathered in this manner is not typically admissible in court. The Justice Department is seeking to make remote access warrants to search, seize and copy electronic information valid for all federal districts.
  • The Justice Department argues that due to the sophistication of cyber-criminals, an offending computer or computer cluster can sit in a district separate from the district where the hackers that infected the target computer anonymously are and separate from the investigators’ district. “Criminals are using multiple computers in many districts simultaneously as part of complex criminal schemes, and effectively investigating and disrupting these schemes often requires remote access to Internet-connected computers in many different districts,” wrote then-acting Assistant Attorney General Mythili Raman in a September letter to the Advisory Committee on the Criminal Rules. “Botnets are a significant threat to the public: they are used to conduct large-scale denial of service attacks, steal personal and financial data, and distribute malware designed to invade the privacy of users of the host computers,” Raman continued. In the letter, Raman cited an investigation of a child porn site that uses The Onion Router Network, or Tor, to anonymize its traffic. The Justice Department argues that it knows the site’s hosting server location, but without a warrant local to the server, the department is prevented from retrieving the server’s user records — including IP and MAC addresses. In most cases, however, law enforcement do not know the physical location of the site’s server, making it impossible to request a specific warrant.
  • In these cases, the Justice Department could request a blanket warrant. This would allow the department to set up a “zero-day” attack on the server — an attack exploiting a manufacturer-unknown or -permitted security flaw, allowing access to the system’s operating software. However, a Texas judge denied the FBI access to such a warrant, saying the Justice Department’s use of “zero-day” attacks in its investigation exposes the public and the target to unknown risks. One typical type of a “zero-day” attack is an infected email that could affect a large number of innocent people if the target used a public computer to access his email. The FBI planned to install a Remote Administration Tool, or RAT, which would distribute such emails in a partially-targeted spam mail distribution. Last year, Federal Magistrate Judge Stephen Smith of the Houston Division of the Southern District of Texas ruled that this was a gross overreach of investigatory intrusion, blocking the plan temporarily. A “zero-day” attack has the potential to activate and control the targeted computer’s peripherals, such as webcams and microphones.
  • ...2 more annotations...
  • Following this ruling, based on the assumptions that federal law enforcement fundamentally act in good faith and that there may be a legitimate need for remote exploitation of computer data, the Justice Department sought to introduce changes to the rules that would overcome Smith’s objections. The proposed change to Rule 41(b) would allow magistrate judges “… to issue a warrant to use remote access to search electronic storage media and to seize electronically stored information located within or outside that district.” The Justice Department has indicated that it wants warrants permitting multiple computers to be searched at the same time, as well as permission to search all of the email and social media accounts accessible from a single computer. Such access would constitute a violation of the Electronic Communications Privacy Act, as the government, under the act, must make demonstrate probable cause to each targeted service provider and obtain and serve a warrant for each service provider. A warrant to search every account active on a computer would be actively bypassing the act’s numerous safeguards.
  • Privacy advocates fear that this rule change would allow prosecutors and the Justice Department to seek out magistrates likely to give them their requested warrants, creating a situation in which the federal government could have a “warrant shop” with just one judge for the whole of the nation. In light of allegations of federal government over-policing — including revelations of aggressive domestic and international electronic spying by the FBI and the National Security Agency — many advocates argue that an examination of the federal government’s commitment to the Fourth Amendment is needed. “The proposed amendment would significantly expand the government’s authority to conduct remote searches of electronic storage media,” the American Civil Liberties Union wrote in a memorandum early last month. “It would also expand the government’s power to engage in computer hacking in the course of criminal investigations, including through the use of malware and other techniques that pose a risk to internet security and that raise Fourth Amendment and policy concerns. “In light of these concerns, the ACLU recommends that the Advisory Committee exercise extreme caution before granting the government new authority to remotely search individuals’ electronic data.” The rules are scheduled to be discussed at the meeting of the Judiciary’s Committee on Rules of Practice and Procedure later this month.
  •  
    The proposed rule change is at pp. 499-501 here. http://www.uscourts.gov/uscourts/RulesAndPolicies/rules/Agenda%20Books/Standing/ST2014-05.pdf#page499 (very large PDF).  This is not just about the government being granted permission to exploit vulnerabilities unknown to the computer owner; the issue arose in a case where the government sought judicial permission to implant a Trojan Horse in a suspect's computer. Moreover, the proposed rule goes far beyond the confines of that case, purporting to authorize the government to skip merrily along searching computers not specified in the warrant, along the purported botnet. To put the icing on the cake, the government wants to be relieved from the requirement that they apply for a warrant in the district in which the computer to be searched is located. ("Oh, Goody! Let's start shopping around for the judges we like instead of the ones we are now required to persuade. What? The Mississippi judge refused to sign the warrant? Oh well, let's try it with that other judge we like, the one in Gnome, Alaska.") In other words, what the government seeks is authority for "general warrants," the very evil that the 4th Amendment was designed to outlaw. Even more outrageously, the proposed rule provides in part: "For a warrant to use remote access to search electronic storage media and seize or copy electronically stored information, the officer must make reasonable efforts to serve a copy of the warrant on the person whose property *was* searched or whose information *was* seized or copied. Service may be accomplished by any means, including electronic means, reasonably calculated to reach that person." Not the use of the past tense "was." So after they have drained your computer of all its data, they may permissibly install a batch file that will display a copy of the warrant on your monitor the next time you boot your computer. With a big red lipstick imprint of a kiss imprinted in the warrant's bottom margin, no doubt
  •  
    The proposed rule change is at pp. 499-501 here. http://www.uscourts.gov/uscourts/RulesAndPolicies/rules/Agenda%20Books/Standing/ST2014-05.pdf#page499 (very large PDF).  This is not just about the government being granted permission to exploit vulnerabilities unknown to the computer owner; the issue arose in a case where the government sought judicial permission to implant a Trojan Horse in a suspect's computer. Moreover, the proposed rule goes far beyond the confines of that case, purporting to authorize the government to skip merrily along searching computers not specified in the warrant, along the purported botnet. To put the icing on the cake, the government wants to be relieved from the requirement that they apply for a warrant in the district in which the computer to be searched is located. In other words, what the government seeks is authority for "general warrants," the very evil that the 4th Amendment was designed to outlaw. Even more outrageously, the proposed rule provides in part: "For a warrant to use remote access to search electronic storage media and seize or copy electronically stored information, the officer must make reasonable efforts to serve a copy of the warrant on the person whose property *was* searched or whose information *was* seized or copied. Service may be accomplished by any means, including electronic means, reasonably calculated to reach that person." Not the use of the past tense "was." So after they have drained your computer of all its data, they may permissibly install a batch file that will display a copy of the warrant on your monitor the next time you boot your computer. With a big red lipstick imprint of a kiss imprinted at the bottom.  To be continued after this is intially posted to Diigo so the content isn't cut off.   
Paul Merrell

Poland asks European court to hide CIA secret torture prison case from public - RT News - 0 views

  • Poland has asked the European Court of Human Rights to bar media and public presence during an upcoming hearing on Poland’s complicity with the CIA’s “extraordinary rendition” program that delivered terror suspects to secret prisons around the world. The public hearing in Strasbourg, France, scheduled for Dec. 3, will be the first arguments testing allegations that the Polish government allowed the CIA to operate a jail for supposed Al-Qaeda fighters in Poland. The request for a private hearing “will be examined by the court shortly,” a court spokesperson told Reuters. Poland cited national security concerns as to why it wants the hearing to remain confidential.
  • "We should have the right to review this case in public," said Adam Bodnar, vice president of the Warsaw-based Helsinki Foundation for Human Rights. "I do not see a reason for confidentiality of proceedings." Bodnar added that most of the evidence about the alleged CIA jail is already public, and keeping it secret is pointless now. His organization was instrumental in uncovering evidence of Poland’s cooperation with the agency.
  • The European Court of Human Rights (ECHR) case was brought by lawyers for Abu Zubaydah and Abd al-Rahim al-Nashiri, both now detainees waiting for charges at Guantanamo Bay.
  • ...2 more annotations...
  • The men allege they were kidnapped and held by the CIA at an intelligence training facility near Stare Kiejkuty, in northeast Poland. There, suspects “were subjected to enforced disappearance and tortured between 2002 and 2005,” Amnesty International said. Nashiri claims that while at the Polish site, he was subjected to torture, or “enhanced interrogation techniques,” and other harsh treatments, “such as ‘mock execution’ with a gun and threats of sexual assault against his family members,” Amnesty reported. Zubaydah was waterboarded 83 times in one month while in secret CIA detention.
  • Hosting such a secret prison violates the European Convention on Human Rights and the UN Convention Against Torture, both of which all European Union member states are bound to follow.
  •  
    I'll be surprised if the gag order is granted. The European Court of Human Rights has already handled a prior case involving CIA extraordinary rendition of a German citizen, holding the former Yugoslavian Republic of Macedonia liable for collaboration. That case was handled publicly and its public decision stands as a milestone indictment of the CIA's methods of waging War on Terror. http://hudoc.echr.coe.int/sites/eng/pages/search.aspx?i=001-115621  
Paul Merrell

Lawmakers want Internet sites to flag 'terrorist activity' to law enforcement - The Was... - 0 views

  • Social media sites such as Twitter and YouTube would be required to report videos and other content posted by suspected terrorists to federal authorities under legislation approved this past week by the Senate Intelligence Committee. The measure, contained in the 2016 intelligence authorization, which still has to be voted on by the full Senate, is an effort to help intelligence and law enforcement officials detect threats from the Islamic State and other terrorist groups.
  •  
    Chipping away at the First Amendment. 
Paul Merrell

Violence in Israel and the Palestinian territories - the Guardian briefing | News | The... - 0 views

  • Israel and the occupied Palestinian territories have been convulsed by a wave of escalating violence in recent days. The lethal tensions ratcheted up sharply last Thursday when a married couple, Jewish settlers from Neria in the northern West Bank, were shot and killed in a car in front of their four children near Beit Furik, allegedly by members of a five-man Hamas cell who were subsequently arrested. Two more Israelis were stabbed and killed in Jerusalem’s Old City on Saturday by a Palestinian youth, who was shot dead at the scene. On Sunday, an 18-year-old Palestinian was shot dead by Israeli forces in clashes near the West Bank town of Tulkarem. The mounting friction has seen attacks by settlers on Palestinians, clashes between Palestinians and Israeli security forces and attempted attacks continue. On Wednesday. there were incidents in Jerusalem, where a Palestinian woman stabbed an Israeli man who then shot and seriously wounded her in the Old City, the southern Israeli city of Kiryat Gat, where a Palestinian was killed after reportedly trying to seize a gun from a soldier and stabbing him, and when a female Israeli settler’s car was stoned near Beit Sahour, which adjoins Bethlehem, in an incident in which it appears other settlers fired on Palestinians, seriously injuring a youth.
  • On the Palestinian side, anger escalated earlier this week after a 13-year-old boy in Bethlehem’s Aida refugee camp was shot and killed by an Israeli sniper in an incident the Israeli military has claimed was “unintentional” as soldiers were aiming at another individual.
  • Jerusalem has remained tense now for almost a year. Most analysts blame the recent heightened tension on several factors. Key among them has been the issue of the religious site in Jerusalem known to Muslims as al-Haram al-Sharif, or the Noble Sanctuary, and Jews as the Temple Mount. A long-running campaign by some fundamentalist Jews and their supporters for expanding their rights to worship in the Al-Aqsa mosque compound on the Temple Mount, supported by rightwing members of Israeli prime minister Binyamin Netanyahu’s own cabinet, has raised the suspicion – despite repeated Israeli denials – that Israel intends to change the precarious status quo for the site, which has been governed under the auspices of the Jordanian monarchy since 1967.
  • ...6 more annotations...
  • Recent Israeli police actions at the site scandalised the Muslim world and raised tensions. Israel has also banned two volunteer Islamic watch groups – male and female – accusing them of harassing Jews during the hours they are allowed to visit. That has combined with the lack of a peace process and growing resentment and frustration in Palestinian society aimed at both Israel and the Palestinian president, Mahmoud Abbas, and the Palestinian Authority. Israel has complained in recent weeks of an increase in stone throwing and molotov cocktail attacks on West Bank roads and in areas adjoining mainly Palestinian areas of Jerusalem, where an elderly motorist died after crashing his car during an alleged stoning attack. In response, Netanyahu and his cabinet have loosened live-fire regulations over the use of .22 calibre bullets on Palestinian demonstrators. Although described by Israel as “less lethal”, it is this type of ammunition that killed 13-year-old Abdul Rahman Shadi on Monday.
  • Part of the problem is the leadership on both sides. Netanyahu leads a rightwing/far-right coalition with the smallest of majorities. Several cabinet ministers support the settler movement and have publicly criticised him for not cracking down harder on Palestinian protest. Netanyahu’s weakness is reflected on the Palestinian side, where the ageing Abbas is seen as isolated, frustrated and increasingly out of step with other members of the Palestinian leadership, who would like a tougher line against Israel over continued settlement building and the absence of any peace process.
  • In his recent speech to the UN general assembly, Abbas went further than he had ever done before in threatening to end what he claims is Palestine’s unilateral adherence to the Oslo accords, which he said Israel refuses to honour. “We cannot continue to be bound by these signed agreements with Israel and Israel must assume fully its responsibilities of an occupying power,” he said. Abbas, however, stopped short of ending security cooperation between Israel and Palestinian security forces – mainly aimed at Hamas on the West Bank – and asked the UN for international protection. His speech at the United Nations has been seen as a move to placate growing discontents in Palestinian society. Both Abbas and Netanyahu are now both engaged in a delicate balancing act, trying to avoid further escalation that would be detrimental to both while trying not to lose the support of key constituencies. On Abbas’s side, that has meant ordering Palestinian factions and security forces to desist from joining the conflict, while on Netanyahu’s side it has seen numerous warnings of harsh measures – many of which have been repeatedly announced.
  • Nentanyahu does not want to risk a position where Abbas ends security cooperation and in the local jargon “hands back the keys” – in other words revokes the Oslo accords and insists on Israel once again taking full responsibility for administering the occupied territories. For his part, Abbas is said to see a limited popular uprising as useful because of the message it delivers to both Israel and the international community of the mounting risks of a moribund peace process and how serious things could become if security cooperation were to end.
  • At the end of the last round of the peace process last year, US diplomats warned about this potential outcome and Washington has largely withdrawn from a guiding role, exhausted by the lack of progress and frustrated with Netanyahu. Despite the Palestinian desire for a new multilateral international approach, it has failed to materialise as have any US guarantees to Abbas that they intend to advance the peace process. While Syria, migration and Russia are preoccupying western governments, Israel and Palestine have been largely left to their own devices.
  • Flare-ups of violence have a habit of coming and going but hopes that this one is coming to an end appear premature for now. However, the likelihood of the current violence fading away still remains the strongest bet. The biggest risk is a miscalculation by either side, which is out of the hands of either leader, that would alter the dynamics. Individuals on both sides have led some of the worst attacks: Jewish extremists in the summer burning three members of a Palestinian family to death, and “lone wolf attacks” launched by Palestinians angry about al-Aqsa and other issues. With neither side having a clear exit strategy, there is a risk is that Netanyahu and Abbas are being led by events rather than leading.
Paul Merrell

Start-Up Site Hires Critic of Wall St. - NYTimes.com - 0 views

  • Matt Taibbi, who made a name as a fierce critic of Wall Street at Rolling Stone magazine, has joined First Look Media, the latest big-name journalist to leave an established brand to enter the thriving and well-financed world of news start-ups.Mr. Taibbi will start his own publication focusing on financial and political corruption, he said in an interview on Wednesday. First Look is financed by the eBay founder Pierre Omidyar, who is worth $8.5 billion, according to Forbes. Mr. Omidyar has pledged $250 million to the project.
  • “It’s obvious that we’re entering a new phase in the history of journalism,” Mr. Taibbi said. “This is clearly the future, and this was an opportunity for me to be part of helping to found something and create something that might carry us into the next generation.”The site, as yet unnamed, will open this year. Mr. Taibbi will write for it and take an editorial role, while based in New York. There will be “an emphasis on bringing in talented writers who can have fun with the subject in addition to producing solid investigative journalism,” he said.
  • Mr. Taibbi is noted for capturing the spirit of the aftermath of the financial crisis with a series of articles in Rolling Stone that examined the misbehavior of Wall Street executives and the risky lending practices that led to a near collapse of the global economy. He used vivid writing and colorful language to describe the root causes of the crisis, including the now-famous metaphor he used to describe Goldman Sachs, calling the bank “a great vampire squid wrapped around the face of humanity, relentlessly jamming its blood funnel into anything that smells like money.”
  •  
    More detail here on Taibbi's move to First Look Media. If correct, the new mag will retain Taibbi's focus on Wall Street misbehavior but will bring in other writers to "have fun with the subject." Tyler Durden of ZeroHedge.com would seem like a natural fit. 
Paul Merrell

The Sound of Torture - The Intercept - 0 views

  • Suddenly there was a chilling scream. “Allah,” someone wailed. “Allah! Allah!” As I wrote at the time, this wasn’t a cry of religious ecstasy. It was the sound of deep pain, coming from elsewhere in the town library, which had been turned into a detention center by Iraqi security forces who were advised by American soldiers and contractors. I was embedded with the Americans for a week, and I had already heard two of them, from the Wisconsin National Guard, talk about seeing their Iraqi partners trussing up prisoners like animals at a slaughter. During raids, I had seen these Iraqis beat their detainees — muggings as a form of questioning — while their American advisers watched.
  • The CIA’s violations of its detainees are the tip of the torture iceberg. We run the risk, in the necessary debate sparked by the Senate’s release of 500 pages on CIA interrogation abuses, of focusing too narrowly on what happened to 119 detainees held at the agency’s black sites from 2002-2006. The problem of American torture — how much occurred, what impact it had, who bears responsibility — is much larger. Across Iraq and Afghanistan, American soldiers and the indigenous forces they fought alongside committed a large number of abuses against a considerable number of people. It didn’t begin at Abu Ghraib and it didn’t end there. The evidence, which has emerged in a drip-drip way over the years, is abundant though less dramatic than the aforementioned 500-page executive summary of the Senate’s still-classified report on the CIA.
  • Just as the CIA opposed release of the Senate torture report, the Pentagon and White House continue to do their best to suppress the evidence. The Daily Beast noted the other day that the Obama Administration, responding to pressure from the Pentagon, continues to fight in court to prevent the publication of thousands of photos of detainee abuse. The argument against release is nearly identical to the argument used by the CIA to repress the Senate’s report—it could put American lives in danger. To her credit, Sen. Dianne Feinstein pushed back and published an executive summary of her committee’s 6,000-page report (which has caused practically no protest or violence overseas). Repression is the gut instinct of institutions that have something to hide, and I came across that in Samarra, too. Shortly after I witnessed the threatened execution of a detainee (an Iraqi soldier pointed his AK-47 at a prisoner who was against a wall with his hands up), an order came down from the American command to get me out of Samarra. I was told to pack my backpack for the next convoy out of town. After I made a flurry of calls on my satellite phone, the order was rescinded. Someone wanted the truth to come out.
  • ...2 more annotations...
  • Here’s a partial reading list of essential reporting on torture in Iraq and Afghanistan: Senate Report on Abuses of Military Detainees (2008): http://media.washingtonpost.com/wp-srv/nation/pdf/12112008_detaineeabuse.pdf Haditha Killings by Tim McGirk: http://content.time.com/time/world/article/0,8599,1174649,00.html Taguba Report on Abuses at Abu Ghraib: https://www.aclu.org/sites/default/files/torturefoia/released/TR3.pdf Abu Ghraib Abuses by Seymour Hersh: http://www.newyorker.com/magazine/2004/05/10/torture-at-abu-ghraib Special Forces in Afghanistan by Matt Aikens: http://www.rollingstone.com/feature/a-team-killings-afghanistan-special-forces Constitution Project’s Task Force on Detainee Treament (See especially chapter 3): http://detaineetaskforce.org/report/ “The Dark Side” by Jane Mayer: http://www.amazon.com/The-Dark-Side-Inside-American/dp/0307456293
  • “None of Us Were Like This Before” by Joshua Phillips: http://www.amazon.com/None-Were-Like-This-Before/dp/1844678849 The Killing of Dilawar by Carlotta Gall: http://www.nytimes.com/2003/03/04/international/asia/04AFGH.html “Pay Any Price” by James Risen (See especially Chapter 7): http://www.barnesandnoble.com/w/pay-any-price-james-risen/1117916812?ean=9780544341418 “Dirty Wars” by Jeremy Scahill (a founder of The Intercept): http://www.amazon.com/Dirty-Wars-The-World-Battlefield/dp/156858671X “How to Break a Terrorist” by Matthew Alexander: http://www.amazon.com/How-Break-Terrorist-Interrogators-Brutality/dp/B0085S1S5K “The Black Banners” by Ali Soufan: http://www.amazon.com/Black-Banners-Inside-Against-al-Qaeda/dp/0393079422 “Kandahar’s Mystery Executions” by Anand Gopal: http://harpers.org/archive/2014/09/kandahars-mystery-executions/ “No Good Men Among the Living” by Anand Gopal: http://www.amazon.com/No-Good-Men-Among-Living/dp/0805091793
Paul Merrell

The Mysterious Case of Prisoner 212 - The Intercept - 0 views

  • Researchers and reporters had long counted the total number of prisoners who cycled through Guantanamo at 779, but the Senate intelligence committee’s report on CIA torture revealed that there was one more previously unknown detainee. Ibn al-Shaykh al-Libi, also known as prisoner 212, was held at a secret black site at Guantanamo Bay, according to the report, bringing the total number of detainees to 780. That al-Libi was held by the CIA is long established.  After all, al-Libi’s name is notorious as the source of bad information used by the Bush administration to tie Saddam Hussein to Al-Qaeda to support the US invasion of Iraq — information he provided while being tortured in Egyptian custody, and later recanted. More than a single digit change in the tally, al-Libi’s hitherto unknown presence at Guantanamo underscores how much remains unknown about the total number of detainees and their fates. The Senate report includes a list of 119 men– a rare official disclosure of the individuals held and in many cases tortured by the CIA. Only a fraction of those had previously been acknowledged as CIA detainees, though journalists and human rights groups had pieced together the population of prisoners from disclosures about Guantanamo, leaked documents, and court proceedings.
  • The black sites in the Senate report are identified by color code names, but journalists and human rights groups quickly identified them. As the Miami Herald’s Carol Rosenberg first noted, the report confirms that al-Libi was at one of Guantanamo’s black sites—“Maroon” and “Indigo” in the report. Al-Libi was secreted away from Guantanamo in 2004 along with four other so-called high value detainees, before the Supreme Court determined that prisoners at the naval base had the right to challenge their detention. Disappearing those detainees gave the CIA leeway to continue secret interrogations outside the view of any court system. Al-Libi ultimately ended up in prison in Libya, where he died in 2009. The Senate report doesn’t cover everyone caught up in the CIA’s net. The Open Society Foundations, for example, published a report last year detailing 136 cases of individuals suspected to have been detained or rendered by the CIA. The Senate report misses some high-profile cases, however, because it didn’t include rendition — when the CIA handed prisoners over to third countries for interrogation or imprisonment. (As the Intercept’s Peter Maass noted last week, it also doesn’t touch on detainee abuse by the military.)
  • According to the Intercept’s research, there are still 50 former CIA prisoners named by Senate investigators whose fates are unknown, and who have not, to our knowledge, spoken to the media or human rights groups. If you have any information about the names listed here, email the authors at cora.currier@theintercept.com or margot.williams@theintercept.com, or communicate with us anonymously via SecureDrop.
Paul Merrell

For sale: Systems that can secretly track where cellphone users go around the globe - T... - 0 views

  • Makers of surveillance systems are offering governments across the world the ability to track the movements of almost anybody who carries a cellphone, whether they are blocks away or on another continent. The technology works by exploiting an essential fact of all cellular networks: They must keep detailed, up-to-the-minute records on the locations of their customers to deliver calls and other services to them. Surveillance systems are secretly collecting these records to map people’s travels over days, weeks or longer, according to company marketing documents and experts in surveillance technology.
  • The world’s most powerful intelligence services, such as the National Security Agency and Britain’s GCHQ, long have used cellphone data to track targets around the globe. But experts say these new systems allow less technically advanced governments to track people in any nation — including the United States — with relative ease and precision.
  • It is unclear which governments have acquired these tracking systems, but one industry official, speaking on the condition of anonymity to share sensitive trade information, said that dozens of countries have bought or leased such technology in recent years. This rapid spread underscores how the burgeoning, multibillion-dollar surveillance industry makes advanced spying technology available worldwide. “Any tin-pot dictator with enough money to buy the system could spy on people anywhere in the world,” said Eric King, deputy director of Privacy International, a London-based activist group that warns about the abuse of surveillance technology. “This is a huge problem.”
  • ...9 more annotations...
  • Yet marketing documents obtained by The Washington Post show that companies are offering powerful systems that are designed to evade detection while plotting movements of surveillance targets on computerized maps. The documents claim system success rates of more than 70 percent. A 24-page marketing brochure for SkyLock, a cellular tracking system sold by Verint, a maker of analytics systems based in Melville, N.Y., carries the subtitle “Locate. Track. Manipulate.” The document, dated January 2013 and labeled “Commercially Confidential,” says the system offers government agencies “a cost-effective, new approach to obtaining global location information concerning known targets.”
  • tracking systems that access carrier location databases are unusual in their ability to allow virtually any government to track people across borders, with any type of cellular phone, across a wide range of carriers — without the carriers even knowing. These systems also can be used in tandem with other technologies that, when the general location of a person is already known, can intercept calls and Internet traffic, activate microphones, and access contact lists, photos and other documents. Companies that make and sell surveillance technology seek to limit public information about their systems’ capabilities and client lists, typically marketing their technology directly to law enforcement and intelligence services through international conferences that are closed to journalists and other members of the public.
  • Security experts say hackers, sophisticated criminal gangs and nations under sanctions also could use this tracking technology, which operates in a legal gray area. It is illegal in many countries to track people without their consent or a court order, but there is no clear international legal standard for secretly tracking people in other countries, nor is there a global entity with the authority to police potential abuses.
  • (Privacy International has collected several marketing brochures on cellular surveillance systems, including one that refers briefly to SkyLock, and posted them on its Web site. The 24-page SkyLock brochure and other material was independently provided to The Post by people concerned that such systems are being abused.)
  • Verint, which also has substantial operations in Israel, declined to comment for this story. It says in the marketing brochure that it does not use SkyLock against U.S. or Israeli phones, which could violate national laws. But several similar systems, marketed in recent years by companies based in Switzerland, Ukraine and elsewhere, likely are free of such limitations.
  • The tracking technology takes advantage of the lax security of SS7, a global network that cellular carriers use to communicate with one another when directing calls, texts and Internet data. The system was built decades ago, when only a few large carriers controlled the bulk of global phone traffic. Now thousands of companies use SS7 to provide services to billions of phones and other mobile devices, security experts say. All of these companies have access to the network and can send queries to other companies on the SS7 system, making the entire network more vulnerable to exploitation. Any one of these companies could share its access with others, including makers of surveillance systems.
  • Companies that market SS7 tracking systems recommend using them in tandem with “IMSI catchers,” increasingly common surveillance devices that use cellular signals collected directly from the air to intercept calls and Internet traffic, send fake texts, install spyware on a phone, and determine precise locations. IMSI catchers — also known by one popular trade name, StingRay — can home in on somebody a mile or two away but are useless if a target’s general location is not known. SS7 tracking systems solve that problem by locating the general area of a target so that IMSI catchers can be deployed effectively. (The term “IMSI” refers to a unique identifying code on a cellular phone.)
  • Verint can install SkyLock on the networks of cellular carriers if they are cooperative — something that telecommunications experts say is common in countries where carriers have close relationships with their national governments. Verint also has its own “worldwide SS7 hubs” that “are spread in various locations around the world,” says the brochure. It does not list prices for the services, though it says that Verint charges more for the ability to track targets in many far-flung countries, as opposed to only a few nearby ones. Among the most appealing features of the system, the brochure says, is its ability to sidestep the cellular operators that sometimes protect their users’ personal information by refusing government requests or insisting on formal court orders before releasing information.
  • Another company, Defentek, markets a similar system called Infiltrator Global Real-Time Tracking System on its Web site, claiming to “locate and track any phone number in the world.” The site adds: “It is a strategic solution that infiltrates and is undetected and unknown by the network, carrier, or the target.”
  •  
    The Verint company has very close ties to the Iraeli government. Its former parent company Comverse, was heavily subsidized by Israel and the bulk of its manufacturing and code development was done in Israel. See https://en.wikipedia.org/wiki/Comverse_Technology "In December 2001, a Fox News report raised the concern that wiretapping equipment provided by Comverse Infosys to the U.S. government for electronic eavesdropping may have been vulnerable, as these systems allegedly had a back door through which the wiretaps could be intercepted by unauthorized parties.[55] Fox News reporter Carl Cameron said there was no reason to believe the Israeli government was implicated, but that "a classified top-secret investigation is underway".[55] A March 2002 story by Le Monde recapped the Fox report and concluded: "Comverse is suspected of having introduced into its systems of the 'catch gates' in order to 'intercept, record and store' these wire-taps. This hardware would render the 'listener' himself 'listened to'."[56] Fox News did not pursue the allegations, and in the years since, there have been no legal or commercial actions of any type taken against Comverse by the FBI or any other branch of the US Government related to data access and security issues. While no real evidence has been presented against Comverse or Verint, the allegations have become a favorite topic of conspiracy theorists.[57] By 2005, the company had $959 million in sales and employed over 5,000 people, of whom about half were located in Israel.[16]" Verint is also the company that got the Dept. of Homeland Security contract to provide and install an electronic and video surveillance system across the entire U.S. border with Mexico.  One need not be much of a conspiracy theorist to have concerns about Verint's likely interactions and data sharing with the NSA and its Israeli equivalent, Unit 8200. 
Paul Merrell

The Ron Paul Institute for Peace and Prosperity : End Torture, Shut Down the CIA! - 0 views

  • End Torture, Shut Down the CIA! Written by Ron Paul Sunday July 27, 2014
  • Remember back in April, 2007, when then-CIA director George Tenet appeared on 60 Minutes, angrily telling the program host, “we don’t torture people”? Remember a few months later, in October, President George W. Bush saying, “this government does not torture people”? We knew then it was not true because we had already seen the photos of Iraqis tortured at Abu Ghraib prison four years earlier.   Still the US administration denied that torture was torture, preferring to call it “enhanced interrogation” and claiming that it had disrupted so many terrorist plots. Of course, we later found out that the CIA had not only lied about the torture of large numbers of people after 9/11, but it had vastly exaggerated any valuable information that came from such practices. However secret rendition of prisoners to other places was ongoing.
  • The US not only tortured people in its own custody, however. Last week the European Court of Human Rights found that the US government transferred individuals to secret detention centers in Poland (and likely elsewhere) where they were tortured away from public scrutiny. The government of Poland was ordered to pay hundreds of thousands of dollars in damages to two victims for doing nothing to stop their torture on Polish soil.
  • ...1 more annotation...
  • Meanwhile, former CIA director George Tenet and other senior current and former CIA officials are said to be frantically attempting to prepare a response to a planned release of an unclassified version of a 6,500 page Senate Intelligence Committee study on the torture practices of that agency. The CIA was already caught tapping into the computers of Senate investigators last year, looking to see what information might be contained in the report. Those who have seen the report have commented that it details far more brutal CIA practices than have been revealed to this point.   Revelations of US secret torture sites overseas and a new Senate investigation revealing widespread horrific CIA torture practices should finally lead to the abolishment of this agency. Far from keeping us safer, CIA covert actions across the globe have led to destruction of countries and societies and unprecedented resentment toward the United States. For our own safety, end the CIA!
  •  
    Ron Paul calls for shutting down the CIA. He's not the first. For example, former President Harry Truman, who established the CIA, said years after he left office that the Agency was operating so far outside its authority that it should be shut down. And JFK was also seriously considering ending the CIA. By statute, the CIA is limited to intelligence gathering, acting as the central intelligence agency for gathering and reporting to the President on all intelligence from all other intelligence agencies.  One error in Paul's article, where he says that the recent decisions were the first time the European Court of Human Rights had connected any EU country to U.S. torture practices. The first was in 2012 in the case of El-Masri v. The Former Yugoslav Republic of Macedonia, No. 39630/09, European Court of Human Rights (Grand Chamber Judgment of 13 December 2012), http://hudoc.echr.coe.int/sites/fra-press/pages/search.aspx?i=003-4184975-4955119, also at http://tinyurl.com/c88qs74. See also El-Masri Application, http://www.law.columbia.edu/ipimages/Human_Rights_Institute/ctlm%20docs/ElMasriApplication.pdf.
Paul Merrell

Al Nusrah Front announces detention of 45 UN peacekeepers - The Long War Journal - 0 views

  • In a statement released on its official Twitter feed on Aug. 30, the Al Nusrah Front announced its responsibility for the detention of 45 members of the United Nations Disengagement Observer Force (UNDOF). The peacekeepers were captured during recent fighting at the Quneitra border crossing, which connects Syria to the Israeli-controlled portion of the Golan Heights. The key crossing was captured by a coalition of rebel forces, including the Al Nusrah Front, earlier this week. The announcement by Al Nusrah, which is al Qaeda's official branch in Syria, was first obtained and translated by the SITE Intelligence Group. Al Nusrah attempts to justify the capture of the men by arguing that the UN has failed to support the Syrian people during the rebellion against Bashar al Assad's regime. The al Qaeda branch also accuses the UN of looking the other way when it comes to Assad's crimes.
  •  
    Much more detail in the article. War Party content alert: the article appears on a web site operated as a project of a non-profit organization whose chairman of the board is ex-CIA director R. James Woolsey. a War Party stalwart. 
Paul Merrell

Morocco Crushed Dissent Using a U.S. Interrogation Site, Rights Advocates Say - NYTimes... - 0 views

  • After landing at the Rabat airport in 2010, Zakaria Moumni, a former kickboxing world champion, was distressed when he was taken aside by security agents, arrested, blindfolded and taken on a ride under a blanket in the back seat of a car to a secret facility. He says he was held there for four days, during which he was deprived of food and water.“There is no worse feeling than this hopelessness of being blindfolded and handcuffed naked without being able to control anything,” said Mr. Moumni, 34, who spoke from Paris, where he now lives. “They told me that I was in a slaughterhouse and that I was going to leave in small pieces.”
  • The facility where Mr. Moumni was taken, on Interior Ministry property in a forest in the city of Temara, a few miles south of Rabat, had been established years earlier as a black site for the Central Intelligence Agency to hold “enhanced interrogations” of terrorism suspects. But over the years after the Sept. 11, 2001 attacks, it proved to be a handy tool for the security forces of the Moroccan government as well.
Paul Merrell

Privacy Day | ACLU of Oregon - 0 views

  • Help strengthen Oregon's privacy protections and limit the use of dragnet surveillance. We are advocating for:•    SB 339 - Strict guidelines for the use of automatic license plate readers (ALPR) •    SB 640 - A warrant requirement to access email, phone, and location records •    SB 641 - A warrant requirement to search cell phones Advances in technology have made it too easy for law enforcement to track where you go, what you do, and who you are with. Most of the data the government collects is about innocent people who are not suspected of any crimes. Yet the government collects that personal information - or accesses it directly from your internet or cell phone provider – and can keep it for years on end.  Technology has changed but your rights haven't.
  •  
    Privacy measures that the ACLU is pushing at the state level in Oregon. Links are to short summaries of legislation.
Paul Merrell

What's Scarier: Terrorism, or Governments Blocking Websites in its Name? - The Intercept - 0 views

  • Forcibly taking down websites deemed to be supportive of terrorism, or criminalizing speech deemed to “advocate” terrorism, is a major trend in both Europe and the West generally. Last month in Brussels, the European Union’s counter-terrorism coordinator issued a memo proclaiming that “Europe is facing an unprecedented, diverse and serious terrorist threat,” and argued that increased state control over the Internet is crucial to combating it. The memo noted that “the EU and its Member States have developed several initiatives related to countering radicalisation and terrorism on the Internet,” yet argued that more must be done. It argued that the focus should be on “working with the main players in the Internet industry [a]s the best way to limit the circulation of terrorist material online.” It specifically hailed the tactics of the U.K. Counter-Terrorism Internet Referral Unit (CTIRU), which has succeeded in causing the removal of large amounts of material it deems “extremist”:
  • In addition to recommending the dissemination of “counter-narratives” by governments, the memo also urged EU member states to “examine the legal and technical possibilities to remove illegal content.” Exploiting terrorism fears to control speech has been a common practice in the West since 9/11, but it is becoming increasingly popular even in countries that have experienced exceedingly few attacks. A new extremist bill advocated by the right-wing Harper government in Canada (also supported by Liberal Party leader Justin Trudeau even as he recognizes its dangers) would create new crimes for “advocating terrorism”; specifically: “every person who, by communicating statements, knowingly advocates or promotes the commission of terrorism offences in general” would be a guilty and can be sent to prison for five years for each offense. In justifying the new proposal, the Canadian government admits that “under the current criminal law, it is [already] a crime to counsel or actively encourage others to commit a specific terrorism offence.” This new proposal is about criminalizing ideas and opinions. In the government’s words, it “prohibits the intentional advocacy or promotion of terrorism, knowing or reckless as to whether it would result in terrorism.”
  • If someone argues that continuous Western violence and interference in the Muslim world for decades justifies violence being returned to the West, or even advocates that governments arm various insurgents considered by some to be “terrorists,” such speech could easily be viewed as constituting a crime. To calm concerns, Canadian authorities point out that “the proposed new offence is similar to one recently enacted by Australia, that prohibits advocating a terrorist act or the commission of a terrorism offence-all while being reckless as to whether another person will engage in this kind of activity.” Indeed, Australia enacted a new law late last year that indisputably targets political speech and ideas, as well as criminalizing journalism considered threatening by the government. Punishing people for their speech deemed extremist or dangerous has been a vibrant practice in both the U.K. and U.S. for some time now, as I detailed (coincidentally) just a couple days before free speech marches broke out in the West after the Charlie Hebdo attacks. Those criminalization-of-speech attacks overwhelmingly target Muslims, and have resulted in the punishment of such classic free speech activities as posting anti-war commentary on Facebook, tweeting links to “extremist” videos, translating and posting “radicalizing” videos to the Internet, writing scholarly articles in defense of Palestinian groups and expressing harsh criticism of Israel, and even including a Hezbollah channel in a cable package.
  • ...2 more annotations...
  • Beyond the technical issues, trying to legislate ideas out of existence is a fool’s game: those sufficiently determined will always find ways to make themselves heard. Indeed, as U.S. pop star Barbra Streisand famously learned, attempts to suppress ideas usually result in the greatest publicity possible for their advocates and/or elevate them by turning fringe ideas into martyrs for free speech (I have zero doubt that all five of the targeted sites enjoyed among their highest traffic dates ever today as a result of the French targeting). But the comical futility of these efforts is exceeded by their profound dangers. Who wants governments to be able to unilaterally block websites? Isn’t the exercise of this website-blocking power what has long been cited as reasons we should regard the Bad Countries — such as China and Iran — as tyrannies (which also usually cite “counterterrorism” to justify their censorship efforts)?
  • s those and countless other examples prove, the concepts of “extremism” and “radicalizing” (like “terrorism” itself) are incredibly vague and elastic, and in the hands of those who wield power, almost always expand far beyond what you think it should mean (plotting to blow up innocent people) to mean: anyone who disseminates ideas that are threatening to the exercise of our power. That’s why powers justified in the name of combating “radicalism” or “extremism” are invariably — not often or usually, but invariably — applied to activists, dissidents, protesters and those who challenge prevailing orthodoxies and power centers. My arguments for distrusting governments to exercise powers of censorship are set forth here (in the context of a prior attempt by a different French minister to control the content of Twitter). In sum, far more damage has been inflicted historically by efforts to censor and criminalize political ideas than by the kind of “terrorism” these governments are invoking to justify these censorship powers. And whatever else may be true, few things are more inimical to, or threatening of, Internet freedom than allowing functionaries inside governments to unilaterally block websites from functioning on the ground that the ideas those sites advocate are objectionable or “dangerous.” That’s every bit as true when the censors are in Paris, London, and Ottawa, and Washington as when they are in Tehran, Moscow or Beijing.
Paul Merrell

World Bank Rules in Venezuela's Favor, Rejects "Exorbitant Compensation" in Tidewater N... - 0 views

  • The International Center for Settlement of Investment Disputes (ICSID) of the World Bank ruled in favor of Venezuela on Monday, rejecting the "exorbitant compensation" demanded by Tidewater. The U.S.-based energy shipping firm was awarded US$46 million in compensation for eleven vessels expropriated by the Bolivarian government of late President Hugo Chavez in 2009.   According to the Venezuelan Ministry of Petroleum, the ICSID decision confirms that the government's nationalization of Tidewater's assets in Venezuela was "totally legal in all aspects".   "The much higher amounts claimed were rejected because the tribunal found that the nationalization was lawful," stated lawyer George Kahale, who represented Venezuela in the case.
  • In 2007, the Chavez government issued a law-decree nationalizing all remaining oil production sites under foreign control and mandating that all all oil extraction in Venezuela be undertaken in the context of joint ventures, in which the state oil company PDVSA retains the majority stake. This move subsequently triggered a wave of lawsuits by foreign transnationals in international arbitration bodies demanding compensation for nationalized assets. Last year, ICSID ordered Venezuela to pay Exxon Mobil US$1.6 billion, which represented only 13% of the amount demanded by the transnational firm and was consequently claimed as a victory for the Bolivarian Republic. For Kahale, the Tidewater case marks an important landmark, setting a precedent for future cases.
  • "Venezuela's positions on the central issues of the legality of the nationalization, the appropriate valuation date for determining compensation, and the appropriate discount rate for calculating compensation were all accepted by the tribunal in what is likely to be an important precedent for other cases." The Bolivarian government has yet to declare if it will seek revisions or annulment of the US$46 million award, but Kahale added that the decision was being "carefully reviewed". Venezuela announced its decision to leave the ICSID in 2012, citing institutional bias in favor of transnational corporations on the part of the Washington-based body. Venezuela's departure from the international arbitrations organization does not, however, affect the status of the 27 pending cases against the Bolivarian nation.
  •  
    Sounds like a big precedential win for Venezuela with 27 related cases yet to go resulting from  Venezuela's 2007 nationalization of all remaining oil production sites under foreign control.  
Paul Merrell

Use Tor or 'EXTREMIST' Tails Linux? Congrats, you're on the NSA's list * The Register - 0 views

  • Alleged leaked documents about the NSA's XKeyscore snooping software appear to show the paranoid agency is targeting Tor and Tails users, Linux Journal readers – and anyone else interested in online privacy.Apparently, this configuration file for XKeyscore is in the divulged data, which was obtained and studied by members of the Tor project and security specialists for German broadcasters NDR and WDR. <a href="http://pubads.g.doubleclick.net/gampad/jump?iu=/6978/reg_security/front&sz=300x250%7C300x600&tile=3&c=33U7ZK6qwQrMkAACSrTugAAAP1&t=ct%3Dns%26unitnum%3D3%26unitname%3Dwww_top_mpu%26pos%3Dtop%26test%3D0" target="_blank"> <img src="http://pubads.g.doubleclick.net/gampad/ad?iu=/6978/reg_security/front&sz=300x250%7C300x600&tile=3&c=33U7ZK6qwQrMkAACSrTugAAAP1&t=ct%3Dns%26unitnum%3D3%26unitname%3Dwww_top_mpu%26pos%3Dtop%26test%3D0" alt=""></a> In their analysis of the alleged top-secret documents, they claim the NSA is, among other things:Specifically targeting Tor directory servers Reading email contents for mentions of Tor bridges Logging IP addresses used to search for privacy-focused websites and software And possibly breaking international law in doing so. We already know from leaked Snowden documents that Western intelligence agents hate Tor for its anonymizing abilities. But what the aforementioned leaked source code, written in a rather strange custom language, shows is that not only is the NSA targeting the anonymizing network Tor specifically, it is also taking digital fingerprints of any netizens who are remotely interested in privacy.
  • These include readers of the Linux Journal site, anyone visiting the website for the Tor-powered Linux operating system Tails – described by the NSA as "a comsec mechanism advocated by extremists on extremist forums" – and anyone looking into combining Tails with the encryption tool Truecrypt.If something as innocuous as Linux Journal is on the NSA's hit list, it's a distinct possibility that El Reg is too, particularly in light of our recent exclusive report on GCHQ – which led to a Ministry of Defence advisor coming round our London office for a chat.
  • If you take even the slightest interest in online privacy or have Googled a Linux Journal article about a broken package, you are earmarked in an NSA database for further surveillance, according to these latest leaks.This is assuming the leaked file is genuine, of course.Other monitored sites, we're told, include HotSpotShield, FreeNet, Centurian, FreeProxies.org, MegaProxy, privacy.li and an anonymous email service called MixMinion. The IP address of computer users even looking at these sites is recorded and stored on the NSA's servers for further analysis, and it's up to the agency how long it keeps that data.The XKeyscore code, we're told, includes microplugins that target Tor servers in Germany, at MIT in the United States, in Sweden, in Austria, and in the Netherlands. In doing so it may not only fall foul of German law but also the US's Fourth Amendment.
  • ...2 more annotations...
  • The nine Tor directory servers receive especially close monitoring from the NSA's spying software, which states the "goal is to find potential Tor clients connecting to the Tor directory servers." Tor clients linking into the directory servers are also logged."This shows that Tor is working well enough that Tor has become a target for the intelligence services," said Sebastian Hahn, who runs one of the key Tor servers. "For me this means that I will definitely go ahead with the project.”
  • While the German reporting team has published part of the XKeyscore scripting code, it doesn't say where it comes from. NSA whistleblower Edward Snowden would be a logical pick, but security experts are not so sure."I do not believe that this came from the Snowden documents," said security guru Bruce Schneier. "I also don't believe the TAO catalog came from the Snowden documents. I think there's a second leaker out there."If so, the NSA is in for much more scrutiny than it ever expected.
Paul Merrell

Britain faces exposure over links to CIA secret torture sites | World news | The Observer - 0 views

  • US Senate report may confirm that Diego Garcia was used for extraordinary rendition after 9/11
  • The government stands accused of seeking to conceal Britain's role in extraordinary rendition, ahead of the release of a declassified intelligence report that exposes the use of torture at US secret prisons around the world.
  • Now, in a letter to the human rights group Reprieve, former foreign secretary William Hague has confirmed that the UK government has held discussions with the US about what it intends to reveal in the report which, according to al-Jazeera, acknowledges that the British territory of Diego Garcia was used for extraordinary rendition."We have made representations to seek assurances that ordinary procedures for clearance of UK material will be followed in the event that UK material provide[d] to the Senate committee were to be disclosed," Hague wrote.Cori Crider, a director at Reprieve, accused the UK government of seeking to redact embarrassing information: "This shows that the UK government is attempting to censor the US Senate's torture report. In plain English, it is a request to the US to keep Britain's role in rendition out of the public domain."
  • ...2 more annotations...
  • Lawyers representing a number of terrorist suspects held at Guantánamo Bay believe their clients were rendered via Diego Garcia. Papers found in Libya indicated that the US planned to transport Abdul-Hakim Belhaj, an opponent of Muammar Gaddafi, and his wife via the territory, an atoll in the Indian Ocean leased by Britain to the US. The government has denied Belhaj was rendered via Diego Garcia, but there are suspicions that others were held on the atoll.Crider said the UK's attempts to lobby the US into redacting parts of the report "turns the government's defence in the Libyan renditions case of Abdul-Hakim Belhaj and his wife entirely on its head".The government has consistently sought to block Belhaj from bringing a case against it.
  • "The government protested America would be angered if this kidnap case ever went to trial – and now we learn the British government is leaning on the Americans not to air Britain's dirty laundry. It exposes their litigation stance as mere posturing," she added.Confirmation that a British territory was involved in extraordinary rendition could leave the government vulnerable to legal action. Last month the European court of human rights ruled that the Polish government actively assisted the CIA's European "black site" programme, which saw detainees interrogated in secret prisons across the continent.The court concluded it was "established beyond reasonable doubt" that Abu Zubaydah, a Guantánamo detainee the US mistakenly believed to be a senior member of al-Qaida, was flown from a secret site in Thailand to another CIA prison in Stare Kiejkuty in northern Poland.The judges concluded that not only was Poland "informed of and involved in the preparation and execution of the [High Value Detainee] Programme on its territory", but also "for all practical purposes, facilitated the whole process, created the conditions for it to happen and made no attempt to prevent it", prompting lawyers to ask what else it has been used for since.
Paul Merrell

"Support MH17 Truth": OSCE Monitors Identify "Shrapnel and Machine Gun-Like Holes" indi... - 0 views

  • The facts speak clear and loud and are beyond the realm of speculation: The cockpit shows traces of shelling! You can see the entry and exit holes. The edge of a portion of the holes is bent inwards. These are the smaller holes, round and clean, showing the entry points most likely that of a 30 millimeter caliber projectile. (Revelations of German Pilot: Shocking Analysis of the “Shooting Down” of Malaysian MH17. “Aircraft Was Not Hit by a Missile” Global Research, July 30, 2014)
  • Based on detailed analysis Peter Haisenko reached  the conclusion that the MH17 was not downed by a missile attack: This aircraft was not hit by a missile in the central portion. The destruction is limited to the cockpit area. Now you have to factor in that this part is constructed of specially reinforced material The OSCE Mission It is worth noting that the initial statements by OSCE observers (July 31) broadly confirm the findings of Peter Haisenko: Monitors from the Organization for Security and Cooperation in Europe reported that shrapnel-like holes were found in two separate pieces of the fuselage of the ill-fated Malaysia Airlines aircraft that was believed to have been downed by a missile in eastern Ukraine. Michael Bociurkiw of the OSCE group of monitors at his daily briefing described part of the plane’s fuselage dotted with “shrapnel-like, almost machine gun-like holes.” He said the damage was inspected by Malaysian aviation-security officials .(Wall Street Journal, July 31, 2014)
  • The monitoring OSCE team has not found evidence of a missile fired from the ground as conveyed by official White House statements. As we recall, the US ambassador to the UN Samantha Power stated –pointing a finger at Russia– that the Malaysian MH17 plane was “likely downed by a surface-to-air missile operated from a separatist-held location”: The team of international investigators with the Organisation for Security and Cooperation in Europe (OSCE) are uncertain if the missile used was fired from the ground as US military experts have previously suggested, the Wall Street Journal (WSJ) reported. (Malay Mail online, emphasis added) The initial OSCE findings tend to dispel the claim that a BUK missile system brought down the plane. Evidently, inasmuch as the perforations are attributable to shelling, a shelling operation conducted from the ground could not have brought down an aircraft traveling above 30,000 feet.
  • ...6 more annotations...
  • Peter Haisenko’s study is corroborated by the Russian Ministry of Defense which pointed to a Ukrainian Su-25 jet in the flight corridor of the MH17, within proximity of the plane. Ironically, the presence of a military aircraft is also confirmed by a BBC  report conducted at the crash site on July 23. All the eyewitnesses  interviewed by the BBC confirmed the presence of a Ukrainian military aircraft flying within proximity of Malaysian Airlines MH17 at the time that it was shot down: 
  • Eyewitness #1: There were two explosions in the air. And this is how it broke apart. And [the fragments] blew apart like this, to the sides. And when … Eyewitness #2: … And there was another aircraft, a military one, beside it. Everybody saw it. Eyewitness #1: Yes, yes. It was flying under it, because it could be seen. It was proceeding underneath, below the civilian one. Eyewitness #3: There were sounds of an explosion. But they were in the sky. They came from the sky. Then this plane made a sharp turn-around like this. It changed its trajectory and headed in that direction [indicating the direction with her hands]. BBC Report below
  • The original BBC Video Report published by BBC Russian Service on July 23, 2014 has since been removed from the BBC archive.  In a bitter irony, The BBC is censoring its own news productions. Media Spin The media is now saying that a missile was indeed fired but it was not the missile that brought down the plane, it was the shrapnel from the missile which punctured the plane and then led to a loss of pressure.  According to Ukraine’s National security spokesman Andriy Lysenko in a contradictory statement, the MH17 aircraft “suffered massive explosive decompression after being hit by a shrapnel missile.”  (See IBT, Australia) In an utterly absurd report, the BBC quoting the official Ukraine statement  says that:
  • The downed Malaysia Airlines jet in eastern Ukraine suffered an explosive loss of pressure after it was punctured by shrapnel from a missile. They say the information came from the plane’s flight data recorders, which are being analysed by British experts. However, it remains unclear who fired a missile, with pro-Russia rebels and Ukraine blaming each other. Many of the 298 people killed on board flight MH17 were from the Netherlands. Dutch investigators leading the inquiry into the crash have refused to comment on the Ukrainian claims.
  • The shrapnel marks should be distinguished from the small entry and exit holes “most likely that of a 30 millimeter caliber projectile” fired from a military aircraft. These holes could not have been caused by a missile attack as hinted by the MSM. While the MSN is saying that the “shrapnel like holes” can be caused by a missile (see BBC report above), the OSCE has confirmed the existence of what it describes as “machine gun like holes”, without however acknowledging that these cannot be caused by a missile. In this regard, the GSh-302 firing gun operated by an Su-25 is able to fire 3000 rpm which explains the numerous entry and exit holes. According to the findings of Peter Haisenko: If we now consider the armament of a typical SU 25 we learn this: It is equipped with a double-barreled 30-mm gun, type GSh-302 / AO-17A, equipped with: a 250 round magazine of anti-tank incendiary shells and splinter-explosive shells (dum-dum), arranged in alternating order. The cockpit of the MH 017 has evidently been fired at from both sides: the entry and exit holes are found on the same fragment of it’s cockpit segment (op cit)
  • The accusations directed against Russia including the sanctions regime imposed by Washington are based on a lie. The evidence does not support the official US narrative to the effect that the MH17 was shot down by a BUK missile system operated by the DPR militia.
  •  
    Looks like John Kerry may be about to get caught in another major lie. 
« First ‹ Previous 61 - 80 of 575 Next › Last »
Showing 20 items per page