Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged U.K.

Rss Feed Group items tagged

Paul Merrell

From Radio to Porn, British Spies Track Web Users' Online Identities - 0 views

  • HERE WAS A SIMPLE AIM at the heart of the top-secret program: Record the website browsing habits of “every visible user on the Internet.” Before long, billions of digital records about ordinary people’s online activities were being stored every day. Among them were details cataloging visits to porn, social media and news websites, search engines, chat forums, and blogs. The mass surveillance operation — code-named KARMA POLICE — was launched by British spies about seven years ago without any public debate or scrutiny. It was just one part of a giant global Internet spying apparatus built by the United Kingdom’s electronic eavesdropping agency, Government Communications Headquarters, or GCHQ. The revelations about the scope of the British agency’s surveillance are contained in documents obtained by The Intercept from National Security Agency whistleblower Edward Snowden. Previous reports based on the leaked files have exposed how GCHQ taps into Internet cables to monitor communications on a vast scale, but many details about what happens to the data after it has been vacuumed up have remained unclear.
  • Amid a renewed push from the U.K. government for more surveillance powers, more than two dozen documents being disclosed today by The Intercept reveal for the first time several major strands of GCHQ’s existing electronic eavesdropping capabilities.
  • The surveillance is underpinned by an opaque legal regime that has authorized GCHQ to sift through huge archives of metadata about the private phone calls, emails and Internet browsing logs of Brits, Americans, and any other citizens — all without a court order or judicial warrant
  • ...17 more annotations...
  • A huge volume of the Internet data GCHQ collects flows directly into a massive repository named Black Hole, which is at the core of the agency’s online spying operations, storing raw logs of intercepted material before it has been subject to analysis. Black Hole contains data collected by GCHQ as part of bulk “unselected” surveillance, meaning it is not focused on particular “selected” targets and instead includes troves of data indiscriminately swept up about ordinary people’s online activities. Between August 2007 and March 2009, GCHQ documents say that Black Hole was used to store more than 1.1 trillion “events” — a term the agency uses to refer to metadata records — with about 10 billion new entries added every day. As of March 2009, the largest slice of data Black Hole held — 41 percent — was about people’s Internet browsing histories. The rest included a combination of email and instant messenger records, details about search engine queries, information about social media activity, logs related to hacking operations, and data on people’s use of tools to browse the Internet anonymously.
  • Throughout this period, as smartphone sales started to boom, the frequency of people’s Internet use was steadily increasing. In tandem, British spies were working frantically to bolster their spying capabilities, with plans afoot to expand the size of Black Hole and other repositories to handle an avalanche of new data. By 2010, according to the documents, GCHQ was logging 30 billion metadata records per day. By 2012, collection had increased to 50 billion per day, and work was underway to double capacity to 100 billion. The agency was developing “unprecedented” techniques to perform what it called “population-scale” data mining, monitoring all communications across entire countries in an effort to detect patterns or behaviors deemed suspicious. It was creating what it said would be, by 2013, “the world’s biggest” surveillance engine “to run cyber operations and to access better, more valued data for customers to make a real world difference.”
  • A document from the GCHQ target analysis center (GTAC) shows the Black Hole repository’s structure.
  • The data is searched by GCHQ analysts in a hunt for behavior online that could be connected to terrorism or other criminal activity. But it has also served a broader and more controversial purpose — helping the agency hack into European companies’ computer networks. In the lead up to its secret mission targeting Netherlands-based Gemalto, the largest SIM card manufacturer in the world, GCHQ used MUTANT BROTH in an effort to identify the company’s employees so it could hack into their computers. The system helped the agency analyze intercepted Facebook cookies it believed were associated with Gemalto staff located at offices in France and Poland. GCHQ later successfully infiltrated Gemalto’s internal networks, stealing encryption keys produced by the company that protect the privacy of cell phone communications.
  • Similarly, MUTANT BROTH proved integral to GCHQ’s hack of Belgian telecommunications provider Belgacom. The agency entered IP addresses associated with Belgacom into MUTANT BROTH to uncover information about the company’s employees. Cookies associated with the IPs revealed the Google, Yahoo, and LinkedIn accounts of three Belgacom engineers, whose computers were then targeted by the agency and infected with malware. The hacking operation resulted in GCHQ gaining deep access into the most sensitive parts of Belgacom’s internal systems, granting British spies the ability to intercept communications passing through the company’s networks.
  • In March, a U.K. parliamentary committee published the findings of an 18-month review of GCHQ’s operations and called for an overhaul of the laws that regulate the spying. The committee raised concerns about the agency gathering what it described as “bulk personal datasets” being held about “a wide range of people.” However, it censored the section of the report describing what these “datasets” contained, despite acknowledging that they “may be highly intrusive.” The Snowden documents shine light on some of the core GCHQ bulk data-gathering programs that the committee was likely referring to — pulling back the veil of secrecy that has shielded some of the agency’s most controversial surveillance operations from public scrutiny. KARMA POLICE and MUTANT BROTH are among the key bulk collection systems. But they do not operate in isolation — and the scope of GCHQ’s spying extends far beyond them.
  • The agency operates a bewildering array of other eavesdropping systems, each serving its own specific purpose and designated a unique code name, such as: SOCIAL ANTHROPOID, which is used to analyze metadata on emails, instant messenger chats, social media connections and conversations, plus “telephony” metadata about phone calls, cell phone locations, text and multimedia messages; MEMORY HOLE, which logs queries entered into search engines and associates each search with an IP address; MARBLED GECKO, which sifts through details about searches people have entered into Google Maps and Google Earth; and INFINITE MONKEYS, which analyzes data about the usage of online bulletin boards and forums. GCHQ has other programs that it uses to analyze the content of intercepted communications, such as the full written body of emails and the audio of phone calls. One of the most important content collection capabilities is TEMPORA, which mines vast amounts of emails, instant messages, voice calls and other communications and makes them accessible through a Google-style search tool named XKEYSCORE.
  • As of September 2012, TEMPORA was collecting “more than 40 billion pieces of content a day” and it was being used to spy on people across Europe, the Middle East, and North Africa, according to a top-secret memo outlining the scope of the program. The existence of TEMPORA was first revealed by The Guardian in June 2013. To analyze all of the communications it intercepts and to build a profile of the individuals it is monitoring, GCHQ uses a variety of different tools that can pull together all of the relevant information and make it accessible through a single interface. SAMUEL PEPYS is one such tool, built by the British spies to analyze both the content and metadata of emails, browsing sessions, and instant messages as they are being intercepted in real time. One screenshot of SAMUEL PEPYS in action shows the agency using it to monitor an individual in Sweden who visited a page about GCHQ on the U.S.-based anti-secrecy website Cryptome.
  • Partly due to the U.K.’s geographic location — situated between the United States and the western edge of continental Europe — a large amount of the world’s Internet traffic passes through its territory across international data cables. In 2010, GCHQ noted that what amounted to “25 percent of all Internet traffic” was transiting the U.K. through some 1,600 different cables. The agency said that it could “survey the majority of the 1,600” and “select the most valuable to switch into our processing systems.”
  • According to Joss Wright, a research fellow at the University of Oxford’s Internet Institute, tapping into the cables allows GCHQ to monitor a large portion of foreign communications. But the cables also transport masses of wholly domestic British emails and online chats, because when anyone in the U.K. sends an email or visits a website, their computer will routinely send and receive data from servers that are located overseas. “I could send a message from my computer here [in England] to my wife’s computer in the next room and on its way it could go through the U.S., France, and other countries,” Wright says. “That’s just the way the Internet is designed.” In other words, Wright adds, that means “a lot” of British data and communications transit across international cables daily, and are liable to be swept into GCHQ’s databases.
  • A map from a classified GCHQ presentation about intercepting communications from undersea cables. GCHQ is authorized to conduct dragnet surveillance of the international data cables through so-called external warrants that are signed off by a government minister. The external warrants permit the agency to monitor communications in foreign countries as well as British citizens’ international calls and emails — for example, a call from Islamabad to London. They prohibit GCHQ from reading or listening to the content of “internal” U.K. to U.K. emails and phone calls, which are supposed to be filtered out from GCHQ’s systems if they are inadvertently intercepted unless additional authorization is granted to scrutinize them. However, the same rules do not apply to metadata. A little-known loophole in the law allows GCHQ to use external warrants to collect and analyze bulk metadata about the emails, phone calls, and Internet browsing activities of British people, citizens of closely allied countries, and others, regardless of whether the data is derived from domestic U.K. to U.K. communications and browsing sessions or otherwise. In March, the existence of this loophole was quietly acknowledged by the U.K. parliamentary committee’s surveillance review, which stated in a section of its report that “special protection and additional safeguards” did not apply to metadata swept up using external warrants and that domestic British metadata could therefore be lawfully “returned as a result of searches” conducted by GCHQ.
  • Perhaps unsurprisingly, GCHQ appears to have readily exploited this obscure legal technicality. Secret policy guidance papers issued to the agency’s analysts instruct them that they can sift through huge troves of indiscriminately collected metadata records to spy on anyone regardless of their nationality. The guidance makes clear that there is no exemption or extra privacy protection for British people or citizens from countries that are members of the Five Eyes, a surveillance alliance that the U.K. is part of alongside the U.S., Canada, Australia, and New Zealand. “If you are searching a purely Events only database such as MUTANT BROTH, the issue of location does not occur,” states one internal GCHQ policy document, which is marked with a “last modified” date of July 2012. The document adds that analysts are free to search the databases for British metadata “without further authorization” by inputing a U.K. “selector,” meaning a unique identifier such as a person’s email or IP address, username, or phone number. Authorization is “not needed for individuals in the U.K.,” another GCHQ document explains, because metadata has been judged “less intrusive than communications content.” All the spies are required to do to mine the metadata troves is write a short “justification” or “reason” for each search they conduct and then click a button on their computer screen.
  • Intelligence GCHQ collects on British persons of interest is shared with domestic security agency MI5, which usually takes the lead on spying operations within the U.K. MI5 conducts its own extensive domestic surveillance as part of a program called DIGINT (digital intelligence).
  • GCHQ’s documents suggest that it typically retains metadata for periods of between 30 days to six months. It stores the content of communications for a shorter period of time, varying between three to 30 days. The retention periods can be extended if deemed necessary for “cyber defense.” One secret policy paper dated from January 2010 lists the wide range of information the agency classes as metadata — including location data that could be used to track your movements, your email, instant messenger, and social networking “buddy lists,” logs showing who you have communicated with by phone or email, the passwords you use to access “communications services” (such as an email account), and information about websites you have viewed.
  • Records showing the full website addresses you have visited — for instance, www.gchq.gov.uk/what_we_do — are treated as content. But the first part of an address you have visited — for instance, www.gchq.gov.uk — is treated as metadata. In isolation, a single metadata record of a phone call, email, or website visit may not reveal much about a person’s private life, according to Ethan Zuckerman, director of Massachusetts Institute of Technology’s Center for Civic Media. But if accumulated and analyzed over a period of weeks or months, these details would be “extremely personal,” he told The Intercept, because they could reveal a person’s movements, habits, religious beliefs, political views, relationships, and even sexual preferences. For Zuckerman, who has studied the social and political ramifications of surveillance, the most concerning aspect of large-scale government data collection is that it can be “corrosive towards democracy” — leading to a chilling effect on freedom of expression and communication. “Once we know there’s a reasonable chance that we are being watched in one fashion or another it’s hard for that not to have a ‘panopticon effect,’” he said, “where we think and behave differently based on the assumption that people may be watching and paying attention to what we are doing.”
  • When compared to surveillance rules in place in the U.S., GCHQ notes in one document that the U.K. has “a light oversight regime.” The more lax British spying regulations are reflected in secret internal rules that highlight greater restrictions on how NSA databases can be accessed. The NSA’s troves can be searched for data on British citizens, one document states, but they cannot be mined for information about Americans or other citizens from countries in the Five Eyes alliance. No such constraints are placed on GCHQ’s own databases, which can be sifted for records on the phone calls, emails, and Internet usage of Brits, Americans, and citizens from any other country. The scope of GCHQ’s surveillance powers explain in part why Snowden told The Guardian in June 2013 that U.K. surveillance is “worse than the U.S.” In an interview with Der Spiegel in July 2013, Snowden added that British Internet cables were “radioactive” and joked: “Even the Queen’s selfies to the pool boy get logged.”
  • In recent years, the biggest barrier to GCHQ’s mass collection of data does not appear to have come in the form of legal or policy restrictions. Rather, it is the increased use of encryption technology that protects the privacy of communications that has posed the biggest potential hindrance to the agency’s activities. “The spread of encryption … threatens our ability to do effective target discovery/development,” says a top-secret report co-authored by an official from the British agency and an NSA employee in 2011. “Pertinent metadata events will be locked within the encrypted channels and difficult, if not impossible, to prise out,” the report says, adding that the agencies were working on a plan that would “(hopefully) allow our Internet Exploitation strategy to prevail.”
Paul Merrell

Western Spy Agencies Secretly Rely on Hackers for Intel and Expertise - The Intercept - 0 views

  • The U.S., U.K. and Canadian governments characterize hackers as a criminal menace, warn of the threats they allegedly pose to critical infrastructure, and aggressively prosecute them, but they are also secretly exploiting their information and expertise, according to top secret documents. In some cases, the surveillance agencies are obtaining the content of emails by monitoring hackers as they breach email accounts, often without notifying the hacking victims of these breaches. “Hackers are stealing the emails of some of our targets… by collecting the hackers’ ‘take,’ we . . .  get access to the emails themselves,” reads one top secret 2010 National Security Agency document. These and other revelations about the intelligence agencies’ reliance on hackers are contained in documents provided by whistleblower Edward Snowden. The documents—which come from the U.K. Government Communications Headquarters agency and NSA—shed new light on the various means used by intelligence agencies to exploit hackers’ successes and learn from their skills, while also raising questions about whether governments have overstated the threat posed by some hackers.
  • By looking out for hacking conducted “both by state-sponsored and freelance hackers” and riding on the coattails of hackers, Western intelligence agencies have gathered what they regard as valuable content: Recently, Communications Security Establishment Canada (CSEC) and Menwith Hill Station (MHS) discovered and began exploiting a target-rich data set being stolen by hackers. The hackers’ sophisticated email-stealing intrusion set is known as INTOLERANT. Of the traffic observed, nearly half contains category hits because the attackers are targeting email accounts of interest to the Intelligence Community. Although a relatively new data source, [Target Offices of Primary Interest] have already written multiple reports based on INTOLERANT collect. The hackers targeted a wide range of diplomatic corps, human rights and democracy activists and even journalists: INTOLERANT traffic is very organized. Each event is labeled to identify and categorize victims. Cyber attacks commonly apply descriptors to each victim – it helps herd victims and track which attacks succeed and which fail. Victim categories make INTOLERANT interesting: A = Indian Diplomatic & Indian Navy B = Central Asian diplomatic C = Chinese Human Rights Defenders D = Tibetan Pro-Democracy Personalities E = Uighur Activists F = European Special Rep to Afghanistan and Indian photo-journalism G = Tibetan Government in Exile
  • In those cases, the NSA and its partner agencies in the United Kingdom and Canada were unable to determine the identity of the hackers who collected the data, but suspect a state sponsor “based on the level of sophistication and the victim set.” In instances where hacking may compromise data from the U.S. and U.K. governments, or their allies, notification was given to the “relevant parties.” In a separate document, GCHQ officials discuss plans to use open source discussions among hackers to improve their own knowledge. “Analysts are potentially missing out on valuable open source information relating to cyber defence because of an inability to easily keep up to date with specific blogs and Twitter sources,” according to one document. GCHQ created a program called LOVELY HORSE to monitor and index public discussion by hackers on Twitter and other social media. The Twitter accounts designated for collection in the 2012 document:
  • ...3 more annotations...
  • These accounts represent a cross section of the hacker community and security scene. In addition to monitoring multiple accounts affiliated with Anonymous, GCHQ monitored the tweets of Kevin Mitnick, who was sent to prison in 1999 for various computer and fraud related offenses. The U.S. Government once characterized Mitnick as one of the world’s most villainous hackers, but he has since turned security consultant and exploit broker. Among others, GCHQ monitored the tweets of reverse-engineer and Google employee, Thomas Dullien. Fellow Googler Tavis Ormandy, from Google’s vulnerability research team Project Zero, is featured on the list, along with other well known offensive security researchers, including Metasploit’s HD Moore and James Lee (aka Egypt) together with Dino Dai Zovi and Alexander Sotirov, who at the time both worked for New York-based offensive security company, Trail of Bits (Dai Zovi has since taken up a position at payment company, Square). The list also includes notable anti-forensics and operational security expert “The Grugq.” GCHQ monitored the tweets of former NSA agents Dave Aitel and Charlie Miller, and former Air Force intelligence officer Richard Bejtlich as well as French exploit vendor, VUPEN (who sold a one year subscription for its binary analysis and exploits service to the NSA in 2012).
  • Documents published with this article: LOVELY HORSE – GCHQ Wiki Overview INTOLERANT – Who Else Is Targeting Your Target? Collecting Data Stolen by Hackers – SIDtoday  HAPPY TRIGGER/LOVELY HORSE/Zool/TWO FACE – Open Source for Cyber Defence/Progress NATO Civilian Intelligence Council – Cyber Panel – US Talking Points
  • The U.S., U.K. and Canadian governments characterize hackers as a criminal menace, warn of the threats they allegedly pose to critical infrastructure, and aggressively prosecute them, but they are also secretly exploiting their information and expertise, according to top secret documents. In some cases, the surveillance agencies are obtaining the content of emails by monitoring hackers as they breach email accounts, often without notifying the hacking victims of these breaches. “Hackers are stealing the emails of some of our targets… by collecting the hackers’ ‘take,’ we . . .  get access to the emails themselves,” reads one top secret 2010 National Security Agency document. These and other revelations about the intelligence agencies’ reliance on hackers are contained in documents provided by whistleblower Edward Snowden. The documents—which come from the U.K. Government Communications Headquarters agency and NSA—shed new light on the various means used by intelligence agencies to exploit hackers’ successes and learn from their skills, while also raising questions about whether governments have overstated the threat posed by some hackers.
Paul Merrell

BBC Protects U.K.'s Close Ally Saudi Arabia With Incredibly Dishonest and Biased Editing - 0 views

  • The BBC loves to boast about how “objective” and “neutral” it is. But a recent article, which it was forced to change, illustrates the lengths to which the British state-funded media outlet will go to protect one of the U.K. government’s closest allies, Saudi Arabia, which also happens to be one of the country’s largest arms purchasers (just this morning, the Saudi ambassador to the U.K. threatened in an op-ed that any further criticism of the Riyadh regime by Jeremy Corbyn could jeopardize the multi-layered U.K./Saudi alliance). Earlier this month, the BBC published an article describing the increase in weapons and money sent by Saudi Arabia and other Gulf regimes to anti-Assad fighters in Syria. All of that “reporting” was based on the claims of what the BBC called “a Saudi government official,” who — because he works for a government closely allied with the U.K. — was granted anonymity by the BBC and then had his claims mindlessly and uncritically presented as fact (it is the rare exception when the BBC reports adversarially on the Saudis). This anonymous “Saudi official” wasn’t whistleblowing or presenting information contrary to the interests of the regime; to the contrary, he was disseminating official information the regime wanted publicized. This was the key claim of the anonymous Saudi official (emphasis added):
  • The well-placed official, who asked not to be named, said supplies of modern, high-powered weaponry including guided anti-tank weapons would be increased to the Arab- and western-backed rebel groups fighting the forces of Syria’s President Bashar al-Assad and his Russian, Iranian and Lebanese allies. He said those groups being supplied did not include either Islamic State (IS) or al-Nusra Front, both of which are proscribed terrorist organizations. Instead, he said the weapons would go to three rebel alliances — Jaish al-Fatah (Army of Conquest), the Free Syrian Army (FSA) and the Southern Front.
  • So the Saudis, says the anonymous official, are only arming groups such as the “Army of Conquest,” but not the al Qaeda affiliate the Nusra Front. What’s the problem with this claim? It’s obvious, though the BBC would not be so impolite as to point it out: The Army of Conquest includes the Nusra Front as one of its most potent components. This is not even in remote dispute; the New York Times’ elementary explainer on the Army of Conquest from three weeks ago states:
  • ...4 more annotations...
  • The alliance consists of a number of mostly Islamist factions, including the Nusra Front, al Qaeda’s Syrian affiliate; Ahrar al-Sham, another large group; and more moderate rebel factions that have received covert arms support from the intelligence services of the United States and its allies. The Telegraph, in an early October article complaining that Russia was bombing “non-ISIL rebels,” similarly noted that the Army of Conquest (bombed by Russia) “includes a number of Islamist groups, most powerful among them Ahrar al-Sham and Jabhat al-Nusra. Jabhat al-Nusra is the local affiliate of al-Qaeda.” Even the Voice of America noted that “Russia’s main target has been the Army of Conquest, an alliance of insurgent groups that includes the al-Nusra Front, al-Qaida’s affiliate in Syria, and the hard-line Islamist group Ahrar al-Sham, as well as some less extreme Islamist groups.”
  • In other words, the claim from the anonymous Saudi official that the BBC uncritically regurgitated — that the Saudis are only arming the Army of Conquest but no groups that “include” the Nusra Front — is self-negating. A BBC reader, Ricardo Vaz, brought this contradiction to the BBC’s attention. As he told The Intercept: “The problem is that the Nusra Front is the most important faction inside the Army of Conquest. So either the Saudi official expected the BBC journalist not to know this, or he expects us to believe they can deliver weapons to factions fighting side by side with an al Qaeda affiliate and that those weapons will not make their way into Nusra’s hands. In any case, this is very close to an official admission that the Saudis (along with Qataris and Turkish) are supplying weapons to an al Qaeda affiliate. This of course is not a secret to anyone who’s paying attention.” In response to Vaz’s complaint, the BBC did not tell its readers about this vital admission. Instead, it simply edited that Saudi admission out of its article. In doing so, it made the already-misleading article so much worse, as the BBC went even further out of its way to protect the Saudis. This is what that passage now states on the current version of the article on the BBC’s site (emphasis added): He said those groups being supplied did not include either Islamic State (IS) or al-Nusra Front, both of which are proscribed terrorist organizations. Instead, he said the weapons would go to the Free Syrian Army and other small rebel groups.
  • So originally, the BBC stated that the “Saudi official” announced that the regime was arming the Army of Conquest. Once it was brought to the BBC’s attention that the Army of Conquest includes the al Qaeda affiliate Nusra Front — a direct contradiction of the Saudi official’s other claim that the Saudis are not arming Nusra — the BBC literally changed the Saudi official’s own statement, whitewashed it, to eliminate his admission that they were arming Army of Conquest. Instead, the BBC now states that the Saudis are arming “the Free Syrian Army and other small rebel groups.” The BBC simply deleted the key admission that the Saudis are arming al Qaeda.
  • But what this does highlight is just how ludicrous — how beyond parody — the 14-year-old war on terror has become, how little it has to do with its original ostensible justification. The regime with the greatest plausible proximity to the 9/11 attack — Saudi Arabia — is the closest U.S. ally in the region next to Israel. The country that had absolutely nothing to do with that attack, and which is at least as threatened as the U.S. by the religious ideology that spurred it — Iran — is the U.S.’s greatest war-on-terror adversary. Now we have a virtual admission from the Saudis that they are arming a group that centrally includes al Qaeda, while the U.S. itself has at least indirectly done the same (just as was true in Libya). And we’re actually at the point where western media outlets are vehemently denouncing Russia for bombing al Qaeda elements, which those outlets are  manipulatively referring to as “non-ISIS groups.” It’s not a stretch to say that the faction that provides the greatest material support to al Qaeda at this point is the U.S. and its closest allies. That is true even as al Qaeda continues to be paraded around as the prime need for the ongoing war. But whatever one’s views are on Syria, it’s telling indeed to watch the BBC desperately protect Saudi officials, not only by granting them anonymity to spout official propaganda, but worse, by using blatant editing games to whitewash the Saudis’ own damaging admissions, ones the BBC unwittingly published. There are many adjectives one can apply to the BBC’s behavior here: “Objective” and “neutral” are most assuredly not among them.
  •  
    Glenn Greenwald riffs on BBC's latest cover-up on behalf of the U.S. allies backing for al-Nusrah.
Paul Merrell

Exclusive: US blocks publication of Chilcot's report on how Britain went to war with Ir... - 0 views

  • Washington is playing the lead role in delaying the publication of the long-awaited report into how Britain went to  war with Iraq, The Independent has learnt. Although the Cabinet Office has been under fire for stalling the progress of the four-year Iraq Inquiry by Sir John Chilcot, senior diplomatic sources in the US and Whitehall indicated that it is officials in the White House and the US Department of State who have refused to sanction any declassification of critical pre- and post-war communications between George W Bush and Tony Blair.Without permission from the US government, David Cameron faces the politically embarrassing situation of having to block evidence, on Washington’s orders, from being included in the report of an expensive and lengthy British inquiry.Earlier this year, The Independent revealed that early drafts of the report challenged the official version of events leading up to the Iraq war, which saw Mr Blair send in 45,000 troops to overthrow Saddam Hussein’s regime.
  •  
    According to The Independent, John Kerry's State Department is busily stifling the report of the U.K.'s four-year Iraq Inquiry into how the U.K. was drawn into the Iraq War, on secrecy grounds. Obama's campaign promise to have the most transparent U.S. administration in history is long forgotten. Government secrecy trumps any investigation into war crimes by prior presidents, even though the U.S. agreed by treaty to investigate and prosecute all war crimes committed by U.S. officials.  Not only that, the Obama Administration now includes a criminal conspiracy to suppress evidence of the commission of war crimes.
Gary Edwards

GAO Audit: Fed Gave $16 Trillion in Emergency Loans to Bankster Cartel! - 0 views

  •  
    The U.S. Federal Reserve gave out $16.1 trillion in emergency loans to U.S. and foreign financial institutions between Dec. 1, 2007 and July 21, 2010, according to figures produced by the government's first-ever audit of the central bank. Last year, the gross domestic product of the entire U.S. economy was $14.5 trillion. Of the $16.1 trillion loaned out, $3.08 trillion went to financial institutions in the U.K., Germany, Switzerland, France and Belgium, the Government Accountability Office's (GAO) analysis shows. Additionally, asset swap arrangements were opened with banks in the U.K., Canada, Brazil, Japan, South Korea, Norway, Mexico, Singapore and Switzerland. Twelve of those arrangements are still ongoing, having been extended through August 2012. Out of all borrowers, Citigroup received the most financial assistance from the Fed, at $2.5 trillion. Morgan Stanley came in second with $2.04 trillion, followed by Merill Lynch at $1.9 trillion and Bank of America at $1.3 trillion. The audit also found that the Fed mostly outsourced its lending operations to the very financial institutions which sparked the crisis to begin with, and that they delegated contracts largely on a no-bid basis. The GAO report recommends new policies that would eliminate such conflicts of interest, and suggests that in the future the Fed should keep better records of their emergency decision-making process.
Paul Merrell

International Media Regurgitating Syrian Rebel Propaganda - 0 views

  • Outside Syria there have been repeated media and diplomatic forecasts of imminent victory for the rebels and defeat for Bashar al-Assad. Ignored in this speculation is the important point that Assad's forces still hold, wholly or in large part, all the main cities and towns of Syria. The difference in perceptions inside and outside Damascus is explained partly by the way the international and regional media describes the war. There are few foreign journalists in the Syrian capital because it is difficult to get visas. By way of contrast, the rebels have a highly sophisticated media operation – often also foreign-based – proffering immediate details of every incident, often backed up by compelling, if selective, YouTube footage. Understandably, the rebel version of events is heavily biased towards their own side and demonises the Syrian government. More surprising is the willingness of the international media, based often in Beirut but also in London and New York, to regurgitate with so little scepticism what is essentially good-quality propaganda. It is as if, prior to the US presidential election in November, foreign journalists had been unable to obtain visas to enter the US and had instead decided to rely on Republican Party militants for their information on the campaign – moreover, Republican activists based in Mexico and Canada.
  • The revolution has turned into a civil war. The uprising of Syrians against a cruel police state that started in March 2011 increasingly looks to Alawites, Christians, Druze and other minorities like a sectarian campaign aimed at their elimination. They watch YouTube pictures of Alawite officers being ritually decapitated and wonder what fate awaits them if Assad is defeated.
  • The policy of the US and its allies is increasingly bizarre: on the one hand, they recognise the opposition National Coalition as the legitimate government of Syria but, on the other, they label its most effective fighting force, the al-Nusra Front, as "a terrorist organisation" linked to al-Qa'ida. Just as in Iraq after 2003, Syria has become a magnet for jihadi fighters across the Muslim world. Washington is showing ever-decreasing enthusiasm for an outright rebel military victory that would strengthen jihadi militants and dissolve the governing machinery of the Syrian state.
  • ...2 more annotations...
  • The Syrian crisis is further complicated and exacerbated by being at the centre of two long-running regional struggles. These are the growing confrontation between Sunni and Shia across the Muslim world and, secondly, the conflict that pits the US, Israel, Saudi Arabia and their allies against Iran and its few friends. It is difficult to see how the present stalemate is going to be broken.
  • Barring full-scale foreign intervention, a negotiated settlement is becoming inevitable though it may be a long time coming.
  •  
    From my ongoing monitoring of news in the Mid-East, this article accurately summarizes the situation in Syria, except for involvement of the Russians on the side of Syria's established government. A fairly large portion of the Russian Navy is now positioned within Syrian ports and Russian ground to air missile systems are positioned around the country, serving as a strong deterrent to Libya-style U.S.-British air support for the "rebel" forces that largely consist of Jihadi foreigners. But U.S. mainstream media continues to falsely paint the situation in Syria as one in which the established Syrian government stands on the precipice of a just military defeat by oppressed native Syrian rebels. For the most part, one must go to foreign news sources to arrive at something closer to the truth, an invasion of Syria instigated and supplied by the U.S., the U.K., Turkey, the Sunni Arab states of Saudi Arabia and Kuwait, and Israel. Syria, a member of a small bloc of nations supportive of Iran, is being used in a surrogate war against Iran, which dares to require payment for its oil exports in gold, silver, or currencies more stable that the U.S. dollar.   
Paul Merrell

Gates Foundation Sells Stake in U.K. Prison Operator G4S - Bloomberg - 0 views

  • The Gates Foundation Asset Trust, the entity that manages the investments for the $40.2 billion Bill & Melinda Gates Foundation, has liquidated its entire stake in G4S Plc (GFS), the world’s biggest security-services provider. “Like other large foundations, the foundation trust evaluates its holdings regularly, both for performance and fit,” John Pinette, a spokesman for the Gates family, said in a statement. “As a result of this, the foundation trust no longer holds an investment in G4S.” The Crawley, England-based company has attracted criticism for its contracts with the Israel prison system. The U.K.’s Guardian newspaper said in an editorial on June 4 that G4S should “end the corporation’s participation in Israel’s brutal occupation” in the West Bank. Since 2011, G4S has conducted a series of reviews in relation to its business in Israel, according to the company’s website. Its latest investigation concluded there was “no plausible case against G4S on the ground of alleged war crimes commited by Israel.”
  • The Gates Foundation Asset Trust, the entity that manages the investments for the $40.2 billion Bill & Melinda Gates Foundation, has liquidated its entire stake in G4S Plc (GFS), the world’s biggest security-services provider. “Like other large foundations, the foundation trust evaluates its holdings regularly, both for performance and fit,” John Pinette, a spokesman for the Gates family, said in a statement. “As a result of this, the foundation trust no longer holds an investment in G4S.” The Crawley, England-based company has attracted criticism for its contracts with the Israel prison system. The U.K.’s Guardian newspaper said in an editorial on June 4 that G4S should “end the corporation’s participation in Israel’s brutal occupation” in the West Bank. Since 2011, G4S has conducted a series of reviews in relation to its business in Israel, according to the company’s website. Its latest investigation concluded there was “no plausible case against G4S on the ground of alleged war crimes commited by Israel.”
  •  
    A very high profile win for the Palestinian Boycott, Divestment, and Sanctions ("BSD") movement as the Gates Foundation divests.  Despite the bravado in this article, G4S announced today that it will not renew any of its contracts to provide security services not only in Palestine but also in Israel. http://electronicintifada.net/blogs/ali-abunimah/g4s-end-israel-prison-contracts-pressure-mounts-over-torture-complicity After the Gates Foundation announced its divestment, the UK government announced that it was launching an investigation of G4S activities in Israel.  The BSD movement, modeled on the BSD campaign that brought down the apartheid government of South Africa, has been racking up more and more wins lately, in each week.  BSD activists are in guarded optimism mode because, they say, G4S has previously lied about its plans in regard to Palestine. In addition to providing prison security services, G4S also operates a series of border checkpoints between Israel, Israel settlements in Palestine, and areas of Palestine still occupied by indigenous Palestinians, including checkpoints along the border of the largest open air prison in the world, the Gaza Strip. The BSD movement has also targeted American companies that profit from Israel's illegal occupation and colonization of Palestine, including Caterpillar Corp. The ultra-high profile divestment by the Gates Foundation just might have been a watershed moment that unleashes a torrent of related actions by other investors around the world.   
Paul Merrell

Popular Security Software Came Under Relentless NSA and GCHQ Attacks - The Intercept - 0 views

  • The National Security Agency and its British counterpart, Government Communications Headquarters, have worked to subvert anti-virus and other security software in order to track users and infiltrate networks, according to documents from NSA whistleblower Edward Snowden. The spy agencies have reverse engineered software products, sometimes under questionable legal authority, and monitored web and email traffic in order to discreetly thwart anti-virus software and obtain intelligence from companies about security software and users of such software. One security software maker repeatedly singled out in the documents is Moscow-based Kaspersky Lab, which has a holding registered in the U.K., claims more than 270,000 corporate clients, and says it protects more than 400 million people with its products. British spies aimed to thwart Kaspersky software in part through a technique known as software reverse engineering, or SRE, according to a top-secret warrant renewal request. The NSA has also studied Kaspersky Lab’s software for weaknesses, obtaining sensitive customer information by monitoring communications between the software and Kaspersky servers, according to a draft top-secret report. The U.S. spy agency also appears to have examined emails inbound to security software companies flagging new viruses and vulnerabilities.
  • The efforts to compromise security software were of particular importance because such software is relied upon to defend against an array of digital threats and is typically more trusted by the operating system than other applications, running with elevated privileges that allow more vectors for surveillance and attack. Spy agencies seem to be engaged in a digital game of cat and mouse with anti-virus software companies; the U.S. and U.K. have aggressively probed for weaknesses in software deployed by the companies, which have themselves exposed sophisticated state-sponsored malware.
  • The requested warrant, provided under Section 5 of the U.K.’s 1994 Intelligence Services Act, must be renewed by a government minister every six months. The document published today is a renewal request for a warrant valid from July 7, 2008 until January 7, 2009. The request seeks authorization for GCHQ activities that “involve modifying commercially available software to enable interception, decryption and other related tasks, or ‘reverse engineering’ software.”
  • ...9 more annotations...
  • The NSA, like GCHQ, has studied Kaspersky Lab’s software for weaknesses. In 2008, an NSA research team discovered that Kaspersky software was transmitting sensitive user information back to the company’s servers, which could easily be intercepted and employed to track users, according to a draft of a top-secret report. The information was embedded in “User-Agent” strings included in the headers of Hypertext Transfer Protocol, or HTTP, requests. Such headers are typically sent at the beginning of a web request to identify the type of software and computer issuing the request.
  • According to the draft report, NSA researchers found that the strings could be used to uniquely identify the computing devices belonging to Kaspersky customers. They determined that “Kaspersky User-Agent strings contain encoded versions of the Kaspersky serial numbers and that part of the User-Agent string can be used as a machine identifier.” They also noted that the “User-Agent” strings may contain “information about services contracted for or configurations.” Such data could be used to passively track a computer to determine if a target is running Kaspersky software and thus potentially susceptible to a particular attack without risking detection.
  • Another way the NSA targets foreign anti-virus companies appears to be to monitor their email traffic for reports of new vulnerabilities and malware. A 2010 presentation on “Project CAMBERDADA” shows the content of an email flagging a malware file, which was sent to various anti-virus companies by François Picard of the Montréal-based consulting and web hosting company NewRoma. The presentation of the email suggests that the NSA is reading such messages to discover new flaws in anti-virus software. Picard, contacted by The Intercept, was unaware his email had fallen into the hands of the NSA. He said that he regularly sends out notification of new viruses and malware to anti-virus companies, and that he likely sent the email in question to at least two dozen such outfits. He also said he never sends such notifications to government agencies. “It is strange the NSA would show an email like mine in a presentation,” he added.
  • The NSA presentation goes on to state that its signals intelligence yields about 10 new “potentially malicious files per day for malware triage.” This is a tiny fraction of the hostile software that is processed. Kaspersky says it detects 325,000 new malicious files every day, and an internal GCHQ document indicates that its own system “collect[s] around 100,000,000 malware events per day.” After obtaining the files, the NSA analysts “[c]heck Kaspersky AV to see if they continue to let any of these virus files through their Anti-Virus product.” The NSA’s Tailored Access Operations unit “can repurpose the malware,” presumably before the anti-virus software has been updated to defend against the threat.
  • The Project CAMBERDADA presentation lists 23 additional AV companies from all over the world under “More Targets!” Those companies include Check Point software, a pioneering maker of corporate firewalls based Israel, whose government is a U.S. ally. Notably omitted are the American anti-virus brands McAfee and Symantec and the British company Sophos.
  • As government spies have sought to evade anti-virus software, the anti-virus firms themselves have exposed malware created by government spies. Among them, Kaspersky appears to be the sharpest thorn in the side of government hackers. In the past few years, the company has proven to be a prolific hunter of state-sponsored malware, playing a role in the discovery and/or analysis of various pieces of malware reportedly linked to government hackers, including the superviruses Flame, which Kaspersky flagged in 2012; Gauss, also detected in 2012; Stuxnet, discovered by another company in 2010; and Regin, revealed by Symantec. In February, the Russian firm announced its biggest find yet: the “Equation Group,” an organization that has deployed espionage tools widely believed to have been created by the NSA and hidden on hard drives from leading brands, according to Kaspersky. In a report, the company called it “the most advanced threat actor we have seen” and “probably one of the most sophisticated cyber attack groups in the world.”
  • Hacks deployed by the Equation Group operated undetected for as long as 14 to 19 years, burrowing into the hard drive firmware of sensitive computer systems around the world, according to Kaspersky. Governments, militaries, technology companies, nuclear research centers, media outlets and financial institutions in 30 countries were among those reportedly infected. Kaspersky estimates that the Equation Group could have implants in tens of thousands of computers, but documents published last year by The Intercept suggest the NSA was scaling up their implant capabilities to potentially infect millions of computers with malware. Kaspersky’s adversarial relationship with Western intelligence services is sometimes framed in more sinister terms; the firm has been accused of working too closely with the Russian intelligence service FSB. That accusation is partly due to the company’s apparent success in uncovering NSA malware, and partly due to the fact that its founder, Eugene Kaspersky, was educated by a KGB-backed school in the 1980s before working for the Russian military.
  • Kaspersky has repeatedly denied the insinuations and accusations. In a recent blog post, responding to a Bloomberg article, he complained that his company was being subjected to “sensationalist … conspiracy theories,” sarcastically noting that “for some reason they forgot our reports” on an array of malware that trace back to Russian developers. He continued, “It’s very hard for a company with Russian roots to become successful in the U.S., European and other markets. Nobody trusts us — by default.”
  • Documents published with this article: Kaspersky User-Agent Strings — NSA Project CAMBERDADA — NSA NDIST — GCHQ’s Developing Cyber Defence Mission GCHQ Application for Renewal of Warrant GPW/1160 Software Reverse Engineering — GCHQ Reverse Engineering — GCHQ Wiki Malware Analysis & Reverse Engineering — ACNO Skill Levels — GCHQ
Paul Merrell

Profiting from Your Thirst as Global Elite Rush to Control Water Worldwide :: The Marke... - 0 views

  • A disturbing trend in the water sector is accelerating worldwide. The new “water barons” --- the Wall Street banks and elitist multibillionaires --- are buying up water all over the world at unprecedented pace. Familiar mega-banks and investing powerhouses such as Goldman Sachs, JP Morgan Chase, Citigroup, UBS, Deutsche Bank, Credit Suisse, Macquarie Bank, Barclays Bank, the Blackstone Group, Allianz, and HSBC Bank, among others, are consolidating their control over water. Wealthy tycoons such as T. Boone Pickens, former President George H.W. Bush and his family, Hong Kong’s Li Ka-shing, Philippines’ Manuel V. Pangilinan and other Filipino billionaires, and others are also buying thousands of acres of land with aquifers, lakes, water rights, water utilities, and shares in water engineering and technology companies all over the world. The second disturbing trend is that while the new water barons are buying up water all over the world, governments are moving fast to limit citizens’ ability to become water self-sufficient (as evidenced by the well-publicized Gary Harrington’s case in Oregon, in which the state criminalized the collection of rainwater in three ponds located on his private land, by convicting him on nine counts and sentencing him for 30 days in jail). Let’s put this criminalization in perspective:
  • Billionaire T. Boone Pickens owned more water rights than any other individuals in America, with rights over enough of the Ogallala Aquifer to drain approximately 200,000 acre-feet (or 65 billion gallons of water) a year. But ordinary citizen Gary Harrington cannot collect rainwater runoff on 170 acres of his private land. It’s a strange New World Order in which multibillionaires and elitist banks can own aquifers and lakes, but ordinary citizens cannot even collect rainwater and snow runoff in their own backyards and private lands.
  • In 2008, Goldman Sachs called water “the petroleum for the next century” and those investors who know how to play the infrastructure boom will reap huge rewards, during its annual “Top Five Risks” conference. Water is a U.S.$425 billion industry, and a calamitous water shortage could be a more serious threat to humanity in the 21st century than food and energy shortages, according to Goldman Sachs’s conference panel. Goldman Sachs has convened numerous conferences and also published lengthy, insightful analyses of water and other critical sectors (food, energy). Goldman Sachs is positioning itself to gobble up water utilities, water engineering companies, and water resources worldwide. Since 2006, Goldman Sachs has become one of the largest infrastructure investment fund managers and has amassed a $10 billion capital for infrastructure, including water.
  • ...7 more annotations...
  • Citigroup’s top economist Willem Buitler said in 2011 that the water market will soon be hotter the oil market (for example, see this and this): “Water as an asset class will, in my view, become eventually the single most important physical-commodity based asset class, dwarfing oil, copper, agricultural commodities and precious metals.” In its recent 2012 Water Investment Conference, Citigroup has identified top 10 trends in the water sector, as follows:
  • Specifically, a lucrative opportunity in water is in hydraulic fracturing (or fracking), as it generates massive demand for water and water services. Each oil well developed requires 3 to 5 million gallons of water, and 80% of this water cannot be reused because it’s three to 10 times saltier than seawater. Citigroup recommends water-rights owners sell water to fracking companies instead of to farmers because water for fracking can be sold for as much as $3,000 per acre-foot instead of only $50 per acre/foot to farmers.
  • One of the world’s largest banks, JPMorgan Chase has aggressively pursued water and infrastructure worldwide. In October 2007, it beat out rivals Morgan Stanley and Goldman Sachs to buy U.K.’s water utility Southern Water with partners Swiss-based UBS and Australia’s Challenger Infrastructure Fund. This banking empire is controlled by the Rockefeller family; the family patriarch David Rockefeller is a member of the elite and secretive Bilderberg Group, Council on Foreign Relations, and Trilateral Commission.
  • Barclays PLC is a U.K.-based major global financial services provider operating in all over the world with roots in London since 1690; it operates through its subsidiary Barclays Bank PLC and its investment bank called Barclays Capital. Barclays Bank’s unit Barclays Global Investors manages an exchange-traded fund (ETF) called iShares S&P Global Water, which is listed on the London Stock Exchanges and can be purchased like any ordinary share through a broker. Touting the iShares S&P Global Water as offering “a broad based exposure to shares of the world’s largest water companies, including water utilities and water equipment stocks” of water companies around the world, this fund as of March 31, 2007 was valued at U.S.$33.8 million.
  • Deutsche Bank is one of the major players in the water sector worldwide. Its Deutsche Bank Advisors have identified water as a part of the climate investment strategies. In its presentation, “Global Warming: Implications for Investors,” they have identified the four following major areas for water investment: § Distribution and management: (1) Supply and recycling, (2) water distribution and sewage, (3) water management and engineering. § Water purification: (1) Sewage purification, (2) disinfection, (3) desalination, (4) monitoring. § Water efficiency (demand): (1) Home installation, (2) gray-water recycling, (3) water meters. § Water and nutrition: (1) Irrigation, (2) bottled water.
  • Moreover, Deutsche Bank has channeled €6 billion (U.S.$8.55 billion) into climate change funds, which will target companies with products that cut greenhouse gases or help people adapt to a warmer world, in sectors from agriculture to power and construction (Reuters, October 18, 2007). In addition to SCM, Deutsche Bank also has the RREEF Infrastructure, part of RREEF Alternative Investments, headquartered in New York with main hubs in Sydney, Singapore, and London. RREEF Infrastructure has more than €6.7 billion in assets under management. One of its main targets is utilities, including electricity networks, water-treatment or distribution operations, and natural-gas networks. In October 2007, RREEF partnered with Goldman Sachs, GE, Prudential, and Babcok & Brown Ltd. to bid unsuccessfully for U.K.’s water utility Southern Water. § Crediting the boom in European infrastructure investment, the RREEF fund by August 2007 had raised €2 billion (U.S.$2.8 billion); Europe’s infrastructure market is valued at between U.S.$4 trillion to U.S.$6 trillion (DowJones Financial News Online, August 7, 2007). § Bulgaria --- Deutsche Bank Bulgaria is planning to participate in large infrastructure projects, including public-private partnership projects in water and sewage worth up to €1 billion (Sofia Echo Media, February 26, 2008). § Middle East --- Along with Ithmaar Bank B.S.C. (an private-equity investment bank in Bahrain), Deutsche Bank co-managed a U.S.$2 billion Shari'a-compliant Infrastructure and Growth Capital Fund and plans to target U.S.$630 billion in regional infrastructure.
  • In my 2008 article, I overlooked the astonishingly large land purchases (298,840 acres, to be exact) by the Bush family in 2005 and 2006. In 2006, while on a trip to Paraguay for the United Nation’s children’s group UNICEF, Jenna Bush (daughter of former President George W. Bush and granddaughter of former President George H.W. Bush) reportedly bought 98,840 acres of land in Chaco, Paraguay, near the Triple Frontier (Bolivia, Brazil, and Paraguay). This land is said to be near the 200,000 acres purchased by her grandfather, George H.W. Bush, in 2005. The lands purchased by the Bush family sit over not only South America’s largest aquifer --- but the world’s as well --- Acuifero Guaraní, which runs beneath Argentina, Brazil, Paraguay, and Uruguay. This aquifer is larger than Texas and California combined. Online political magazine Counterpunch quoted Argentinean pacifist Adolfo Perez Esquivel, the winner of 1981 Nobel Peace Prize, who “warned that the real war will be fought not for oil, but for water, and recalled that Acuifero Guaraní is one of the largest underground water reserves in South America….”
  •  
     Like the land rush for Arctic lands soon to be bared of ice by global warming, banksters are also moving to capitalize on looming water shortages, aided by IMF privatization loan conditions the the dwindling of potable water supplies globally via pollution, deforestation, and aquifer depletion. All trace to the common problem over human overpopulation of the planet.  
Paul Merrell

European Lawmakers Demand Answers on Phone Key Theft - The Intercept - 0 views

  • European officials are demanding answers and investigations into a joint U.S. and U.K. hack of the world’s largest manufacturer of mobile SIM cards, following a report published by The Intercept Thursday. The report, based on leaked documents provided by NSA whistleblower Edward Snowden, revealed the U.S. spy agency and its British counterpart Government Communications Headquarters, GCHQ, hacked the Franco-Dutch digital security giant Gemalto in a sophisticated heist of encrypted cell-phone keys. The European Parliament’s chief negotiator on the European Union’s data protection law, Jan Philipp Albrecht, said the hack was “obviously based on some illegal activities.” “Member states like the U.K. are frankly not respecting the [law of the] Netherlands and partner states,” Albrecht told the Wall Street Journal. Sophie in ’t Veld, an EU parliamentarian with D66, the Netherlands’ largest opposition party, added, “Year after year we have heard about cowboy practices of secret services, but governments did nothing and kept quiet […] In fact, those very same governments push for ever-more surveillance capabilities, while it remains unclear how effective these practices are.”
  • “If the average IT whizzkid breaks into a company system, he’ll end up behind bars,” In ’t Veld added in a tweet Friday. The EU itself is barred from undertaking such investigations, leaving individual countries responsible for looking into cases that impact their national security matters. “We even get letters from the U.K. government saying we shouldn’t deal with these issues because it’s their own issue of national security,” Albrecht said. Still, lawmakers in the Netherlands are seeking investigations. Gerard Schouw, a Dutch member of parliament, also with the D66 party, has called on Ronald Plasterk, the Dutch minister of the interior, to answer questions before parliament. On Tuesday, the Dutch parliament will debate Schouw’s request. Additionally, European legal experts tell The Intercept, public prosecutors in EU member states that are both party to the Cybercrime Convention, which prohibits computer hacking, and home to Gemalto subsidiaries could pursue investigations into the breach of the company’s systems.
  • According to secret documents from 2010 and 2011, a joint NSA-GCHQ unit penetrated Gemalto’s internal networks and infiltrated the private communications of its employees in order to steal encryption keys, embedded on tiny SIM cards, which are used to protect the privacy of cellphone communications across the world. Gemalto produces some 2 billion SIM cards a year. The company’s clients include AT&T, T-Mobile, Verizon, Sprint and some 450 wireless network providers. “[We] believe we have their entire network,” GCHQ boasted in a leaked slide, referring to the Gemalto heist.
  • ...4 more annotations...
  • While Gemalto was indeed another casualty in Western governments’ sweeping effort to gather as much global intelligence advantage as possible, the leaked documents make clear that the company was specifically targeted. According to the materials published Thursday, GCHQ used a specific codename — DAPINO GAMMA — to refer to the operations against Gemalto. The spies also actively penetrated the email and social media accounts of Gemalto employees across the world in an effort to steal the company’s encryption keys. Evidence of the Gemalto breach rattled the digital security community. “Almost everyone in the world carries cell phones and this is an unprecedented mass attack on the privacy of citizens worldwide,” said Greg Nojeim, senior counsel at the Center for Democracy & Technology, a non-profit that advocates for digital privacy and free online expression. “While there is certainly value in targeted surveillance of cell phone communications, this coordinated subversion of the trusted technical security infrastructure of cell phones means the US and British governments now have easy access to our mobile communications.”
  • For Gemalto, evidence that their vaunted security systems and the privacy of customers had been compromised by the world’s top spy agencies made an immediate financial impact. The company’s shares took a dive on the Paris bourse Friday, falling $500 million. In the U.S., Gemalto’s shares fell as much 10 percent Friday morning. They had recovered somewhat — down 4 percent — by the close of trading on the Euronext stock exchange. Analysts at Dutch financial services company Rabobank speculated in a research note that Gemalto could be forced to recall “a large number” of SIM cards. The French daily L’Express noted today that Gemalto board member Alex Mandl was a founding trustee of the CIA-funded venture capital firm In-Q-Tel. Mandl resigned from In-Q-Tel’s board in 2002, when he was appointed CEO of Gemplus, which later merged with another company to become Gemalto. But the CIA connection still dogged Mandl, with the French press regularly insinuating that American spies could infiltrate the company. In 2003, a group of French lawmakers tried unsuccessfully to create a commission to investigate Gemplus’s ties to the CIA and its implications for the security of SIM cards. Mandl, an Austrian-American businessman who was once a top executive at AT&T, has denied that he had any relationship with the CIA beyond In-Q-Tel. In 2002, he said he did not even have a security clearance.
  • AT&T, T-Mobile and Verizon could not be reached for comment Friday. Sprint declined to comment. Vodafone, the world’s second largest telecom provider by subscribers and a customer of Gemalto, said in a statement, “[W]e have no further details of these allegations which are industrywide in nature and are not focused on any one mobile operator. We will support industry bodies and Gemalto in their investigations.” Deutsche Telekom AG, a German company, said it has changed encryption algorithms in its Gemalto SIM cards. “We currently have no knowledge that this additional protection mechanism has been compromised,” the company said in a statement. “However, we cannot rule out this completely.”
  • Update: Asked about the SIM card heist, White House press secretary Josh Earnest said he did not expect the news would hurt relations with the tech industry: “It’s hard for me to imagine that there are a lot of technology executives that are out there that are in a position of saying that they hope that people who wish harm to this country will be able to use their technology to do so. So, I do think in fact that there are opportunities for the private sector and the federal government to coordinate and to cooperate on these efforts, both to keep the country safe, but also to protect our civil liberties.”
  •  
    Watch for massive class action product defect litigation to be filed against the phone companies.and mobile device manufacturers.  In most U.S. jurisdictions, proof that the vendors/manufacturers  knew of the product defect is not required, only proof of the defect. Also, this is a golden opportunity for anyone who wants to get out of a pricey cellphone contract, since providing a compromised cellphone is a material breach of warranty, whether explicit or implied..   
Paul Merrell

Distrust of US surveillance threatens data deal | TheHill - 0 views

  • European privacy regulators are putting U.S. surveillance practices under the microscope, this time with a crucial transatlantic data deal hanging in the balance.Legal and privacy advocates say European nations are poised to strike down the deal if they decide the U.S. hasn't done enough to reform its spying programs.The new test comes after the European Commission and the Commerce Department — after months of tense negotiations — reached a deal this week permitting Facebook, Google and thousands of other companies to continue legally handling Europeans’ personal data.ADVERTISEMENTCritics though have long warned that unless the U.S. overhauls its privacy and national security laws, there is no legal framework that can stand up in European court, where privacy is considered a fundamental right under the EU Charter.A working group of 28 EU nations’ data protection authorities — domestic entities separate from the Commission that will be in charge of enforcing the new agreement — may now cast the deciding vote.The group is spending the next few months picking through the so-called Privacy Shield agreement to determine if it adequately protects the personal data of European citizens.
  • “The Commission has said, ‘We’re satisfied. We believe them. We believe the U.S. has substantially changed its practices,’ and they are no longer going off the [Edward] Snowden revelations in the media,” said Susan Foster, a privacy attorney at Mintz Levin who works in both the EU and the U.S.“Whether the working group will go along with it is another question.”The privacy advocate whose complaint against Facebook brought down the Privacy Shield’s 15-year-old predecessor agreement is already questioning the new deal’s validity.“With all due respect ... a couple of letters by the outgoing Obama administration is by no means a legal basis to guarantee the fundamental rights of 500 million European users in the long run, when there is explicit U.S. law allowing mass surveillance,” Max Schrems of Austria said in a statement Tuesday.The United States has been fighting against the perception that it tramples on civil liberties after ex-National Security Agency contractor Edward Snowden revealed the breadth of the agency’s snooping.One sticking point in the Privacy Shield negotiations was over the scope of an exception allowing surveillance for national security purposes.
  • In announcing the deal, Commission officials insisted that the U.S. had provided “detailed written assurances” that surveillance of Europeans’ data by intelligence agencies would be subject to appropriate limitations.“The U.S. has clarified that they do not carry out indiscriminate surveillance of Europeans,” Andrus Ansip, Vice President for the Digital Single Market on the European Commission, said Tuesday.The U.S. has also agreed to create an office in the State Department, to address complaints from EU citizens who feel their data has been inappropriately accessed by intelligence authorities.Complicating the working group’s approval of the deal is the hodgepodge of competing regulators in Europe. Each nation has an agency in charge of its own country’s regulation. Some countries — such as Germany — are seen as tougher on privacy than others, like France or the U.K.While some countries consider U.S. privacy protections to be satisfactory, in others they are seen as woefully inadequate.
  • ...2 more annotations...
  • Defenders of U.S. intelligence practices often point to France and the U.K., arguing they are equally intrusive with their citizens' data.A recent public report “pretty clearly documented that the protections are patchy, vary hugely and are nonexistent in some of the countries,” Foster noted.Privacy advocates dismiss those arguments.“You cannot pick the worst member state, like the U.K., and claim you are ‘equivalent’ to that,” Schrems said Tuesday. “First, this is not a price [sic] you want to win, secondly you have to meet the standards of the European Court of Justice, EU law and the EU Charter of Fundamental Rights — not the standard of the worst member state.”The U.S. has made significant reforms to federal spying powers under the Obama administration.The Privacy and Civil Liberties Oversight Board — a small bipartisan watchdog — on Friday said the government has begun addressing each of the nearly two-dozen recommendations it made following Snowden's revelations.“[I]mportant measures have been taken to enhance the protection of Americans’ privacy and civil liberties and to strengthen the transparency of the government’s surveillance efforts, without jeopardizing our counterterrorism efforts,” the five-member board said.
  • But whether European countries believe those changes are sufficient to sign off on the Privacy Shield is uncertain. Each of the EU’s 28 member states must approve the deal before it can be finalized.“A lot of this is going to come down to whether the data protection authorities are persuaded by the U.S.’s portrayal of the cumulative protections given to European citizens and the cumulative carving back on the NSA surveillance programs,” Foster said.If the European working group is not satisfied with the assurances from the Commerce Department, the consequences could be dire. Businesses fear a chilling of transatlantic trade, valued at $1 trillion in 2014.The most likely outcome, experts say, would be a patchwork of country-to-country regulations that would make it extremely expensive for companies to comply.Legislative changes in the U.S. seem unlikely. Congress is close to passing a privacy law considered crucial to getting seeing the Privacy Shield approved. But the bill — which gives EU citizens the right to sue in U.S. courts over the misuse of personal data — has sparked controversy on Capitol Hill.Some lawmakers are expressing frustration that the EU has used the threat of enforcement action against U.S. companies to push Congress to make more concessions.“It’s been hard enough to get the Judicial Redress Act passed — if they’re going to make more demands on Congress, there won’t be a lot of willing listeners here,” Sen. Chris Murphy (D-Conn.) told The Hill on Thursday.
Paul Merrell

Shaker Aamer, Last British Guantanamo Detainee Released - 0 views

  • Shaker Aamer, the last British resident in Guantanamo Bay, was released on Friday after being detained without charge for almost 14 years.On September 25th, U.S. and U.K. authorities confirmed that Aamer was to be returned to the U.K. within days. The release comes after Aamer endured well over a decade of torture, detention without charge or trial, and solitary confinement. Aamer’s high profile case has highlighted everything that is wrong with the war on terror — detention without charge or trial, government complicity in torture and lack of accountability for war crimes, gross obstruction of justice, and the humiliating and dehumanising treatment of detainees.A keen community worker and U.K. resident, Aamer is married to a British woman and four British children living in London. He was volunteering for a charity in Afghanistan in 2001 when he was abducted and sold for a bounty to U.S. forces. He was tortured, eventually cracking and agreeing to his captors’ accusations against him. Satisfied with the confession of an abused and broken man, U.S. forces took him to Guantánamo Bay on Valentine’s Day 2002.In a September Daily Mail piece entitled “Torture and the man who could expose Britain’s dirtiest secrets,” journalist Peter Oborne said, “My view is that Mr Aamer may have paid the price for knowing too much. The CIA had very good reason to be terrified of what he might reveal when he emerged from jail.”
  •  
    "And the King will answer them, 'Truly, I say to you, as you did it to one of the least of these my brothers, you did it to me." --- Matthew 25:40. 
Paul Merrell

UK ordered to hold inquests into civilian deaths during Iraq war | UK news | guardian.c... - 0 views

  • A series of public inquests should be held into the deaths of civilians who are alleged to have been killed unlawfully by the British military following the 2003 invasion of Iraq, the high court has ruled.In a ground-breaking judgment that could have an impact on how the British military is able to conduct operations among civilians in the future, the court ruled on Friday that up to 161 deaths should be the subject of hearings modelled upon coroners' inquests.In practice, a series of hearings – possibly amounting to more than 100 – are likely to be held as a result of the judgment, which follows a three-year legal battle on behalf of the Iraqis' families.
  • Each hearing must involve a "full, fair and fearless investigation accessible to the victim's families and to the public", the court ruled, and should examine not only the immediate circumstances but other issues surrounding each death.As a first step, the court ordered Philip Hammond, the defence secretary, to announce within six weeks whether any of the deaths are to result in prosecutions, or to explain any further delays over prosecuting decisions.After years of judicial review proceedings, and in the face of determined opposition from the Ministry of Defence, which appeared anxious to maintain control over any investigative process, the court concluded that hearings modelled upon coroners' inquests were the best way for the British authorities to meet their obligations under article 2 of the European convention on human rights (ECHR), which protects the right to life.
  • The court also ruled that this should be just the start of the process by which public hearings will examine the alleged misconduct of some members of the British armed forces who served in Iraq.Following the completion of the Article 2 hearings – into allegedly unlawful killings – further hearings should be established in order to meet the UK's obligations under Article 3 of the ECHR, the court said. These will inquire into allegations of torture and lesser mistreatment of individuals detained by British troops in Iraq, focusing on a sample of the most serious of the 700-plus cases in which such allegations have been made.In December last year the MoD said it had paid out £14m in compensation and costs to 205 Iraqis who alleged unlawful imprisonment and mistreatment, and that it was negotiating a further 196 payments. Several hundred more claims were expected to be lodged.
  • ...1 more annotation...
  • The court said it had examined "allegations of the most serious kind involving murder, manslaughter, the wilful infliction of serious bodily injury, sexual indignities, cruel inhuman and degrading treatment and large scale violation of international humanitarian law".The judgment from Sir John Thomas, president of the Queen's Bench Division, and Mr Justice Silber, added that there was evidence to support claims that some of the abuse had been systemic, and questioned whether responsibility for poor training and a failure to investigate promptly lay with senior officers and figures in government
  •  
    These UK proceedings are under authority of the E.U. Convention on Human Rights, whose relevant provisions echo those of the UN Convention on Human Rights, which both the U.K. and the U.S. are party to.  The Brits' willingness to prosecute its own soldiers, senior officers, and figures in government for war crimes sharply contrasts to the U.S., where Barack Obama immediately upon taking office rejected calls for the Iraqi war crimes investigation and prosecution of U.S. military members and Executive Branch officials, saying that he wanted to look forward, not back.  This was a very thin answer to the nation's Nuremburg Prosecution principles later embodied in international law at the instigation of the U.S. Good on the Brits. Shame on the U.S.   
Paul Merrell

Iran to send 4,000 troops to aid President Assad forces in Syria - Middle East - World ... - 0 views

  • Washington’s decision to arm Syria’s Sunni Muslim rebels has plunged America into the great Sunni-Shia conflict of the Islamic Middle East, entering a struggle that now dwarfs the Arab revolutions which overthrew dictatorships across the region. For the first time, all of America’s ‘friends’ in the region are Sunni Muslims and all of its enemies are Shiites. Breaking all President Barack Obama’s rules of disengagement, the US is now fully engaged on the side of armed groups which include the most extreme Sunni Islamist movements in the Middle East.The Independent on Sunday has learned that a military decision has been taken in Iran – even before last week’s presidential election – to send a first contingent of 4,000 Iranian Revolutionary Guards to Syria to support President Bashar al-Assad’s forces against the largely Sunni rebellion that has cost almost 100,000 lives in just over two years.  Iran is now fully committed to preserving Assad’s regime, according to pro-Iranian sources which have been deeply involved in the Islamic Republic’s security, even to the extent of proposing to open up a new ‘Syrian’ front on the Golan Heights against Israel.
  • In years to come, historians will ask how America – after its defeat in Iraq and its humiliating withdrawal from Afghanistan scheduled for  2014 – could have so blithely aligned itself with one side in a titanic Islamic struggle stretching back to the seventh century death of the Prophet Mohamed. The profound effects of this great schism, between Sunnis who believe that the father of Mohamed’s wife was the new caliph of the Muslim world and Shias who regard his son in law Ali as his rightful successor – a seventh century battle swamped in blood around the present-day Iraqi cities of Najaf and Kerbala – continue across the region to this day. A 17th century Archbishop of Canterbury, George Abbott, compared this Muslim conflict to that between “Papists and Protestants”.
  • Iraq, a largely Shiite nation which America ‘liberated’ from Saddam Hussein’s Sunni minority in the hope of balancing the Shiite power of Iran, has – against all US predictions – itself now largely fallen under Tehran’s influence and power.  Iraqi Shiites as well as Hizballah members, have both fought alongside Assad’s forces.
  • ...6 more annotations...
  • Washington’s excuse for its new Middle East adventure – that it must arm Assad’s enemies because the Damascus regime has used sarin gas against them – convinces no-one in the Middle East.  Final proof of the use of gas by either side in Syria remains almost as nebulous as President George W. Bush’s claim that Saddam’s Iraq possessed weapons of mass destruction.For the real reason why America has thrown its military power behind Syria’s Sunni rebels is because those same rebels are now losing their war against Assad.  The Damascus regime’s victory this month in the central Syrian town of  Qusayr, at the cost of Hizballah lives as well as those of government forces, has thrown the Syrian revolution into turmoil, threatening to humiliate American and EU demands for Assad to abandon power.  Arab dictators are supposed to be deposed – unless they are the friendly kings or emirs of the Gulf – not to be sustained.  Yet Russia has given its total support to Assad, three times vetoing UN Security Council resolutions that might have allowed the West to intervene directly in the civil war.
  • In the Middle East, there is cynical disbelief at the American contention that it can distribute arms – almost certainly including anti-aircraft missiles – only to secular Sunni rebel forces in Syria represented by the so-called Free Syria Army.  The more powerful al-Nusrah Front, allied to al-Qaeda, dominates the battlefield on the rebel side
  • From now on, therefore, every suicide bombing in Damascus - every war crime committed by the rebels - will be regarded in the region as Washington’s responsibility. The very Sunni-Wahabi Islamists who killed thousands of Americans on 11th September, 2011 – who are America’s greatest enemies as well as Russia’s – are going to be proxy allies of the Obama administration.
  • Iran’s support for Damascus will grow rather than wither.  They point out that the Taliban recently sent a formal delegation for talks in Tehran and that America will need Iran’s help in withdrawing from Afghanistan.  The US, the Iranians say, will not be able to take its armour and equipment out of the country during its continuing war against the Taliban without Iran’s active assistance.  One of the sources claimed – not without some mirth -- that the French were forced to leave 50 tanks behind when they left because they did not have Tehran’s help.
  • Israel’s policies in the region have been knocked askew by the Arab revolutions, leaving its prime minister, Benjamin Netanyahu, hopelessly adrift amid the historic changes.Only once over the past two years has Israel fully condemned atrocities committed by the Assad regime, and while it has given medical help to wounded rebels on the Israeli-Syrian border, it fears an Islamist caliphate in Damascus far more than a continuation of Assad’s rule.  One former Israel intelligence commander recently described Assad as “Israel’s man in Damascus”. 
  • Another of the region’s supreme ironies is that Hamas, supposedly the ‘super-terrorists’ of Gaza, have abandoned Damascus and now support the Gulf Arabs’ desire to crush Assad.  Syrian government forces claim that Hamas has even trained Syrian rebels in the manufacture and use of home-made rockets.
  •  
    Astute analysis of the Mideast situation, saving the lack of mention that to the U.S., U.K., and France, it's all about competing natural gas pipeline projects. Iran sending in its Revolutionary Guard troops to support the Syrian Assad government in response to Obama's decision to provide arms to the "rebels" under the pretext of Syrian use of chemical weapons. No surprise there, except to the Chief Idiot in the White House, who apparently has not yet figured out that every U.S. escalation is countered with a larger escalation from Syria's supporters and that the "rebels" already were being supplied with arms by other nations.   And using Syria to spark a regional Sunni v. Shia war is beyond idiotic, a formula for World War III.   Note the author's skepticism about U.S. claims of WMD use. 
Paul Merrell

How US Propaganda Plays in Syrian War - Consortiumnews - 0 views

  • U.S. foreign policymakers have experimented at planting propaganda in social media and then citing it as evidence to support their goals, a process now playing out in the Syrian “regime change,” as Rick Sterling explains.
  • The major achievement of The Syria Campaign has been the branding and promotion of the “White Helmets,” also known as “Syria Civil Defense,” which began with a British military contractor, James LeMesurier, giving some rescue training to Syrians in Turkey with funding provided by the U.S. and U.K. The group stole this name from the REAL Syria Civil Defense as documented in this recent report from Aleppo. The “White Helmets” are marketed in the West as civilian volunteers doing rescue work. On Sept. 22, it was announced that the Right Livelihood Award , the so-called “Alternative Nobel Prize,” is being given to the U.S./U.K.-created White Helmets “for their outstanding bravery, compassion and humanitarian engagement in rescuing civilians from the destruction of the Syrian civil war.”  But the White Helmets are largely a propaganda tool promoting Western intervention against Syria. Unlike a legitimate rescue organization such as the Red Cross or Red Crescent, the “White Helmets” only work in areas controlled by the armed opposition. As shown in this video, the White Helmets pick up the bodies of individuals executed by the terrorists; they claim to be unarmed but are not; and they falsely claim to be neutral.
  • Many of the videos from Al Qaeda/terrorist-dominated areas of Syria have the “White Helmets” logo because the White Helmets work in alliance with these extremist groups as primarily a media marketing tool to raise public support for continuing the support to the armed opposition as well as the demonization of the Syrian government.  The Rights Livelihood press release said the White Helmets “remain outspoken in calling for an end to hostilities in the country.” But that is false, too. The White Helmets actively call for U.S./NATO military intervention through a “No Fly Zone,” which would begin with attacks upon and destruction of government anti-aircraft positions and aircraft. A Major Act of War Taking over the skies above another country is an act of war that would require a major U.S. military operation, according to senior American generals.
  • ...6 more annotations...
  • The New York Times reported that in 2012 General Martin E. Dempsey, chairman of the Joint Chiefs of Staff, told the White House that imposing a no-fly zone in Syria would require up to 70,000 American servicemen to destroy Syria’s antiaircraft system and then impose round-the-clock control over Syrian airspace. General Carter Ham, former commander of the U.S. Africa Command who oversaw the aerial attacks on Libya in 2011, said on CBS News that “I worry sometimes that, when people say ‘impose a no-fly zone,’ there is this almost antiseptic view that this is an easily accomplished military task. It’s extraordinarily difficult. … “It first entails — we should make no bones about it. It first entails killing a lot of people and destroying the Syrian air defenses and those people who are manning those systems. And then it entails destroying the Syrian air force, preferably on the ground, in the air if necessary. This is a violent combat action that results in lots of casualties and increased risk to our own personnel.”
  • In other words, an appeal for a “no-fly zone” is not a call for a non-violent solution. It is seeking a bloody act of war by the United States against Syria, a nation that poses no threat to America. It also would almost surely be carried out in violation of international law since a United Nations Security Council resolution would face vetoes from Russia and probably China. Also, the White Helmets have never criticized or called for the end of funding to extremist organizations including Nusra Front, Al Qaeda’s Syrian affiliate. On the contrary, White Helmets are generally embedded with this organization which is defined as “terrorist” by even the U.S., which is likely why the head of the White Helmets, Raed Saleh, was denied entry to the U.S. The foreign and marketing company origins of the White Helmets were exposed over 1½ years ago – and since then, writer Vanessa Beeley has revealed the organization in more depth in articles such as “Who Are the White Helmets?” and “War by Way of Deception.”  Despite these exposés, understanding of the White Helmets is limited, with many liberal and progressive people uncritically accepting the propaganda and misinformation about Syria. Much of the progressive media has effectively blocked or censored critical examinations amid a flood of propaganda about “barrel bombs” dropped by the “brutal dictator” and his “regime.” 
  • In the last week, Netflix started showing a 40-minute documentary movie about the “White Helmets” that amounts to a promotional video. A substantial portion of it takes place in Turkey where we see trainees in hotel rooms making impassioned phone calls to inquire about their families in Syria.  The “family values” theme is evident throughout, a good marketing angle. The political message of the video is also clear: after a bombing attack, “It’s the Russians …. they say they are fighting ISIS but they are targeting civilians.” The movie includes video previously promoted by the White Helmets such as the “Miracle Baby” rescue, an incident that may or may not have been staged. The video includes self-promoting proclamations such as “You are real heroes.” While no doubt there are some real rescues in the midst of war, many of the videos purporting to show the heroes at work have an unrealistic and contrived look to them as revealed here.
  • “Alternative media” in the West has echoed mainstream media regarding the Syria conflict. The result is that many progressive individuals and groups are confused or worse. For example, the activist group CodePink recently issued a media release promoting the Netflix White Helmets propaganda video. 
  • The White Helmets video is produced by Grain Media and Violet Films/Ultra-Violet Consulting, which advertises itself as a marketing corporation specializing in social media management, grant writing, crowd building and campaign implementation. The only question is who paid them to produce this video.  There is growing resistance to this manipulation and deception. In response to a petition to give the Nobel Peace Prize to the White Helmets, there is a counter petition at Change.org. Following the Right Livelihood Awards’ announcement, there will soon be a petition demanding retraction of the award to the White Helmets. The story of the White Helmets is principally a “feel good” hoax to manipulate public perception about the conflict in Syria and continue the drive for “regime change.” That’s why big money was paid to “Purpose” to “incubate” The Syria Campaign to brand and promote the White Helmets using Facebook, Twitter, etc. That’s why more big money was paid to create a self-promotional documentary. 
  • The judges at Rights Livelihood were probably influenced by the documentary since critical examination of facts around Syria is so rare. It’s a sad commentary on the media. As veteran war correspondent Stephen Kinzer recently wrote, “Coverage of the Syrian war will be remembered as one of the most shameful episodes in the history of the American press.”
Paul Merrell

M of A - "Dramatic Rescue! Man With Kid Runs Towards Camera!" - 44 Staged Pictures - 0 views

  • A man with a kid in arm runs towards the camera. The kid's face is heavily colored, but it looks otherwise fine. On the lower left we see the back of a man with a "White Helmets" logo on his vest. Dust in the background. Always dust or smoke. A bunch of men looking very busy but are they actually doing anything? That would be a lucky by-chance photo shot for any normal photographer. Even in country where rubble from a fresh bombing may be around some near corner. But this is a typical "White Helmets rescue kid" propaganda picture. The photo above is, except for maybe the old rubble, likely completely staged. There the 43 similar pictures below the fold to demonstrate that. Just ask yourself: Could all these very similar by-chance pics, taken within about a year, be real? Really?
  • The pictures above all look astonishingly similar: rubble, dust or rather haze from a smoke grenade in the background, dusted/greasepaint bloody kids who have no visible trauma, the rescuer with the kid moving towards the camera. Dramatic, high quality scenes which do get distributed by news agencies and published again and again by major "western" media. Isn't it an amazing fortune that so many kids get rescued alive by the "White Helmets", without any serious wounds visible, just moments after bomb impacts? This week after week? With all the same attributes in each picture? No photo editor at any of the big media ever wondered about that? These staged photos are part of the war propaganda against the Syrian people and their government. The "White Helmets" take and distribute these photos. They also distribute lots of "kids rescued from rubble" videos. We wrote about those a month ago: Other typical features of these movies, see this one, are smoke (grenades) in the streets, dramatic but small open fires nearby, dust or some red color on the children's face or arms. The camera is often used in a hectic, intentionally amateurish first person view, a style extensively developed in the 1999 horror clip Blair Witch Project. Sometimes sounds of additional "bomb impact" bangs or screaming/wailing women are added. The "White Helmets" are part of the (anti-)Syria Campaign. "Kid rescued from rubble" is their standard shtick. They are financed with some $60+ million from your taxes by the U.S., the UK and other governments. Such money will buy a lot of good cameras and props and will pay for many actors and extras.
  • The Syria Campaign was created by Purpose Campaigns LLC. The company fabricates and runs for you any world-wide "grass root" movement you would like. With Purpose LLC or other such companies involved, big dollars will buy you big effects. How about an automated Twitter campaign to spread anti-Shia sectarianism? Someone paid for it and here it is. The "White Helmets" campaign demonstrates the amazing manipulation potential such companies and their high paying customers have.
  •  
    A U.S.-U.K. propaganda front operating behind ISIL and al-Nusrah lines. See also: http://www.moonofalabama.org/2016/06/gallery-dramatic-rescue-man-with-kid-runs-towards-camera-43-staged-pictures.html#c6a00d8341c640e53ef01b8d1fb87c3970c amd https://www.youtube.com/watch?v=5k6hSS6xBTw&feature=youtu.be The U.S. State Department admits to providing $23 million to this group operating behind al-Nusrah and ISIL lines. 
Gary Edwards

'Clinton death list': 33 spine-tingling cases - 0 views

  •  
    "(Editor's note: This list was originally published in August 2016 and has gone viral on the web. WND is running it again as American voters cast their ballots for the nation's next president on Election Day.) How many people do you personally know who have died mysteriously? How about in plane crashes or car wrecks? Bizarre suicides? People beaten to death or murdered in a hail of bullets? And what about violent freak accidents - like separate mountain biking and skiing collisions in Aspen, Colorado? Or barbells crushing a person's throat? Bill and Hillary Clinton attend a funeral Apparently, if you're Bill or Hillary Clinton, the answer to that question is at least 33 - and possibly many more. Talk-radio star Rush Limbaugh addressed the issue of the "Clinton body count" during an August show. "I swear, I could swear I saw these stories back in 1992, back in 1993, 1994," Limbaugh said. He cited a report from Rachel Alexander at Townhall.com titled, "Clinton body count or left-wing conspiracy? Three with ties to DNC mysteriously die." Limbaugh said he recalled Ted Koppel, then-anchor of ABC News' "Nightline," routinely having discussions on the issue following the July 20, 1993, death of White House Deputy Counsel Vince Foster. In fact, Limbaugh said, he appeared on Koppel's show. "One of the things I said was, 'Who knows what happened here? But let me ask you a question.' I said, 'Ted, how many people do you know in your life who've been murdered? Ted, how many people do you know in your life that have died under suspicious circumstances?' "Of course, the answer is zilch, zero, nada, none, very few," Limbaugh chuckled. "Ask the Clintons that question. And it's a significant number. It's a lot of people that they know who have died, who've been murdered. "And the same question here from Rachel Alexander. It's amazing the cycle that exists with the Clintons. [Citing Townhall]: 'What it
Paul Merrell

EU Committee Issues Report On NSA Surveillance; Snowden To Testify - Slashdot - 0 views

  • the EU Parliament's Civil Liberties Committee published the draft of their report on the impact of dragnet surveillance by the NSA on EU citizens (PDF).
  •  
    Lengthy but truly amazing resolution now goes to Parliament for a vote. A lot of very tough love for the U.S. in there. Highly recommended reading if you have the time for a lengthy document. It's an action plan for what Parliament intends to do about privacy violations by the NSA, GCHQ, Norway, Sweden, and Germany. If this passes, the U.S. and U.K. will be forced to give major ground. Gist of the document: civil liberties including privacy rights in correspondence trump national security and anti-terrorism. The E.U. would bow out of an Orwellian future.
Paul Merrell

Response to Government References to MSF Syria Statement | Doctors Without Borders - 0 views

  • Over the last two days, the American, British, and other governments have referred to reports from several groups, including Doctors Without Borders/Médecins Sans Frontières (MSF), while stating that the use of chemical weapons in Syria was “undeniable” and designating the perpetrators. MSF today warned that its medical information could not be used as evidence to certify the precise origin of the exposure to a neurotoxic agent or to attribute responsibility. On August 24, MSF announced that three hospitals it supplies in Syria’s Damascus governorate had reportedly received 3,600 patients displaying neurotoxic symptoms, of which 355 died. Although our information indicates mass exposure to a neurotoxic agent, MSF clearly stated that scientific confirmation of the toxic agent was required, and therefore called for an independent investigation to shed light on what would constitute, if confirmed, a massive and unacceptable violation of international humanitarian law. MSF also stated that in its role as an independent medical humanitarian organization, it was not in a position to determine responsibility for the event. Now that an investigation is underway by United Nations inspectors, MSF rejects that our statement be used as a substitute for the investigation or as a justification for military action. MSF's sole purpose is to save lives, alleviate the suffering of populations torn by Syrian conflict, and bear witness when confronted with a critical event, in strict compliance with the principles of neutrality and impartiality.
  •  
    Doctors without Borders takes the U.S. and U.K. governments to task for their misstatements of what the organization reported regarding the alleged chemical incident in Damascus. The information DWB previously published was at best second hand hearsay from hospitals DWB *supplies* in Damascus, not information developed by DWB doctors. DWB stresses that the information is unconfirmed, and that it lacks sufficient information to identify the toxic agent or to attribute blame. Kerchunk! There go several key pieces of the U.S. position. not the least of which is the casualty count. See also other DWB publications: -- Disclaimer Concerning Information Purportedly About MSF in Syria, http://www.doctorswithoutborders.org/press/release.cfm?id=7042&cat=press-release -- Syria: Thousands Suffering Neurotoxic Symptoms Treated in Hospitals Supported by MSF, http://www.doctorswithoutborders.org/press/release.cfm?id=7029&cat=press-release    
Paul Merrell

EU votes to support suspending U.S. data sharing agreements, including passenger flight... - 0 views

  • The European Parliament on Thursday adopted a joint, cross-party resolution to begin investigations into widespread surveillance of Europeans by the U.S. National Security Agency (NSA). Read this EU to vote to suspend U.S. data sharing agreements, passenger records amid NSA spying scandal Read more In the vote, 483 voted for the resolution, 98 against, and 65 abstained on a vote that called on the U.S. to suspend and review any laws and surveillance programs that "violate the fundamental right of EU citizens to privacy and data protection," as well as Europe's "sovereignty and jurisdiction." The vote also gave backing to the suspension of data sharing deals between the two continents, should the European Commission take action against its U.S. ally.
  • The U.S. government faces continued criticism and pressure from its international allies following news that its intelligence agencies spied on foreign nationals under its so-called PRISM program. The U.K. government was also embroiled in the NSA spying saga, after its signals intelligence intercepting station GCHQ tapped submarine fiber optic cables under its own secret program, code named Tempora. Reuters reported on Wednesday that the Commission is examining whether the U.K. broke EU law, which could lead to fines imposed by the highest court in Europe.
  • Should the Commission decide it necessary to suspend the data sharing agreement of passenger details — including personal and sensitive individual data — it could ultimately lead to the grounding of flights between the EU and the U.S. Dutch MEP Sophie in 't Veld said in a statement after the vote: "We must consider now if the PNR and SWIFT agreements are still tenable in the circumstances." Critics say PNR data has never helped catch a suspected criminal or terrorist before. SWIFT data sharing, which provides U.S. authorities with secure banking details in a bid to crack down on terrorist financing, could also be suspended. A spokesperson for the D66 delegation in Brussels confirmed by email that the English version of the joint motion is "the right one and is leading," despite claims that there were "translation error[s]" between the different versions of the joint resolution.
  • ...3 more annotations...
  • Members of the European Parliament (MEPs) in a plenary session in Strasbourg voted in favor of a section of the resolution that called on the Commission to "give consideration to all the instruments at their disposal in discussions and negotiations with the U.S. [...] including the possible suspension of the passenger name record (PNR) and terrorist finance tracking program (TFTP) agreements."
  • An EU source familiar with proceedings confirmed that the Commission now has the authority from the Parliament to suspend PNR and TFTP, but it falls at the Commission's discretion. Resolutions passed by the Parliament are not legally binding, but give backing to the Commission should the executive body wish to enact measures against a foreign power or entity. A Commission spokesperson confirmed that there are "no deadlines" on deciding whether it will follow up on the Parliament's resolution.
  • The Parliament's Civil Liberties, Justice and Home Affairs committee was given the authority by Thursday's vote to set up an inquiry to gather evidence from both U.S. and EU sources to assess the impact of the surveillance activities on EU citizens' fundamental right to privacy and data protection.
1 - 20 of 82 Next › Last »
Showing 20 items per page