Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged U.S.-breach

Rss Feed Group items tagged

Paul Merrell

Ted Cruz's National Security Plan Features War Crimes | ThinkProgress - 0 views

  • In Thursday night’s GOP debate, the final matchup before the Iowa caucus, Sen. Ted Cruz (R-TX) repeated his promise to conduct “carpet bombing” in the Middle East to combat ISIS forces. Yet he did not acknowledge that carpet bombing is a war crime under the international Geneva Conventions. The Fox News moderators challenged Cruz on his voting record not lining up with his “tough talk” on national security. “You opposed giving President Obama authority to enforce his red line in Syria,” they asked. “You have voted against the Defense Authorization Act for three years. How do you square your rhetoric with your record, sir?” Instead of addressing the discrepancies in his voting record, Cruz defended his past promises of “carpet bombing” and “saturation bombing” parts of Iraq and Syria, saying it was a successful strategy for the United States during the Persian Gulf War.
  • The Geneva Conventions, which the U.S. joined decades ago along with nearly every other country in the world, explicitly forbids carpet bombing. “Area bombardments and other indiscriminate attacks are forbidden,” the agreement reads. “An indiscriminate attack affecting the civilian population or civilian objects and resulting in excessive loss of life, injury to civilians or damage to civilian objects is a grave breach of the Geneva Conventions.” When Cruz said Thursday that the U.S. should “lift the rules of engagement” in wartime, he did not explain whether that included rejecting the Geneva Conventions. Cruz is also incorrect to cite the Gulf War as a positive example of carpet bombing. The U.S. used laser-guided precision bombing during that conflict, which “substantially reduced the accidental damage that would otherwise have befallen civilian buildings.” Even so, thousands of innocent civilians were killed. Cruz, who is poised to win or take second place in the Iowa caucus, has previously offered incorrect information about carpet bombing.
  • Cruz is also not the first GOP candidate to advocate for a practice that violates international law. In December, Republican frontrunner Donald Trump called for the ability to assassinate the family members of terrorists. Such intentional killing of civilians would consitute a war crime.
Paul Merrell

NATO, Russia must talk, security leaders say - POLITICO - 0 views

  • The downing of a Russian fighter jet by Turkey highlights the growing danger posed by a pattern of provocative military behavior by Moscow, U.S. and European security officials said Tuesday, calling for a revival of military-to-military talks between Russia and NATO that were shelved last year. The first-ever shoot-down of a Russian plane by a member of the Western alliance comes after months of brinkmanship by Russian forces on several continents and a series of NATO responses, including stepped-up military exercises, that have placed the former Cold War foes on a footing that at times has looked just short of war.Story Continued Below NATO leaders themselves seemed anxious to find a way to turn down the temperature after a Turkish F-16 destroyed a Russian Su-24 that Turkey claimed had crossed over from Syria. Turkish leaders called it at the least the fourth such incursion in recent weeks, while Russia maintains it did not breach Turkish airspace.
  • On Capitol Hill, Rep. Mike Turner, an Ohio Republican and a member of the Armed Services Committee who also serves as president of the NATO Parliamentary Assembly, said in a statement: "I echo NATO Secretary General Stoltenberg's sentiments calling for all NATO partners to deescalate tensions and focus on the fight against ISIL." Others from across the spectrum viewed the disputed incident as a potential opportunity to de-escalate what has increasingly become a dangerous game of cat and mouse. Some security experts said NATO and Russia should convene a special forum that was established expressly for the two sides to hold military discussions. The forum has atrophied since the alliance cut off most ties over Moscow's annexation of the Ukrainian peninsula of Crimea in March 2014. "The way the Russians have behaved in the last 18 months, sending submarines into harbors, simulating nuclear bombing missions against NATO countries, flying their aircraft without transponders, and having incursions into Turkish air space, something was going to happen," said Ivo Daalder, who stepped down as the U.S. ambassador to NATO in 2013. "Because we don't have mechanisms to talk about this there is a danger that this could lead to escalation."
  • A collection of former defense and foreign ministers of Britain, Poland, Russia, Germany, Turkey and France also reissued their call Tuesday to use the NATO-Russia Council, codified in 2002, to hammer out a broad agreement to "prevent accidental incidents or miscalculations leading to an escalation of tension and even confrontation." Two former NATO secretaries general endorsed the position. The stakes were already high before Tuesday. NATO reported more than 400 intercepts of Russian aircraft in 2014 — four times as much as the year before. Russia also reported that it has detected twice as many NATO fighter aircraft flying near its borders in 2014 than in 2013 — more than 3,000 in all.
  • ...1 more annotation...
  • The report, compiled by the European Leadership Network, the Russian International Affairs Council, the Polish Institute of International Affairs and the International Strategic Research Organisation in Ankara, was funded by the nonprofit Carnegie Corp. of New York and Nuclear Threat Initiative. "Each side is convinced that its actions are justified by the negative changes in their security environment," the task force concluded. "Second, an action-reaction cycle is now in play that will be difficult to stop." Russia has also sent its combat aircraft dangerously close to American and Canadian airspace in recent years. Earlier this year, for example, the North American Air Defense Command reported that two Russian tu-95 Bear bombers were intercepted flying off the coast of Alaska near key U.S. military facilities. The NATO-Russia Council, which grew out of an agreement between the two former enemies in 1997, has been used successfully in the past to work through several highly sensitive disagreements.
  •  
    NATO blinked before Russia did. That's a rebuff for Turkey. 
Gary Edwards

The Empire Takes a Hit: NSA Update - 2 views

........................................................................................ NSA Conversation with retired lawyer and Open Source legal expert, "Marbux". ...........................

Federal-Reserve-Bankster-Cartel NSA

started by Gary Edwards on 15 Jun 13 no follow-up yet
Paul Merrell

FBI never examined hacked DNC servers itself: report | TheHill - 0 views

  • The FBI never examined the Democratic National Committee’s (DNC) computer servers during its investigation into Russian attempts to interfere in the presidential election, BuzzFeed reports.“The DNC had several meetings with representatives of the FBI’s Cyber Division and its Washington (D.C.) Field Office, the Department of Justice’s National Security Division, and U.S. Attorney’s Offices, and it responded to a variety of requests for cooperation, but the FBI never requested access to the DNC’s computer servers,” DNC deputy communications director Eric Walker told BuzzFeed in an email.According to one intelligence official who spoke to the publication, no U.S. intelligence agency has performed its own forensics analysis on the hacked servers.ADVERTISEMENTInstead, the official said, the bureau and other agencies have relied on analysis done by the third-party security firm CrowdStrike, which investigated the breach for the DNC.“Crowdstrike is pretty good. There’s no reason to believe that anything that they have concluded is not accurate,” the intelligence official told BuzzFeed.
Gary Edwards

Obama Comes Out of the Closet and Embraces Gay Marriage « azizonomics - 0 views

  •  
    Good discussion about the crap being thrown at Americans, as big media bangs the drum of nonsense, and the "sturm und drang" of election politics rolls on.  What really matters is what's not being discussed; the destruction of America, American individual liberty, and our Constitutional way of life.   excerpt: It just seems like an easy issue for Obama to posture on, while trampling the Constitution into the dirt. When it comes to civil liberties, Obama has always talked a good game, and then acted more authoritarian than Bush. He talked about an end to the abuses of the Bush years and an open and transparent government, yet extended the Fourth-Amendment-shredding Patriot Act, empowered the TSA to produce naked body scans and engage in humiliatingly sexual pat-downs, signed indefinite detention of American citizens into law, claimed and exercised the power to assassinate American citizens without trial, and aggressively prosecuted whistleblowers. Under his watch the U.S. army even produced a document planning for the reeducation of political activists in internment camps. Reeducation camps? In America? And some on the left are still crowing that talking about being in favour of gay marriage makes him "pro-civil liberties"? Is this a joke? Here are a few metrics that we should be judging Obama on: People not in the labour force is spiking:
Paul Merrell

Conflict Erupts in Public Rebuke on C.I.A. Inquiry - NYTimes.com - 0 views

  • A festering conflict between the Central Intelligence Agency and its congressional overseers broke into the open Tuesday when Senator Dianne Feinstein, chairwoman of the Intelligence Committee and one of the C.I.A.’s staunchest defenders, delivered an extraordinary denunciation of the agency, accusing it of withholding information about its treatment of prisoners and trying to intimidate committee staff members investigating the detention program.Describing what she called a “defining moment” for the oversight of American spy agencies, Ms. Feinstein said the C.I.A. had removed documents from computers used by Senate Intelligence Committee staff members working on a report about the agency’s detention program, searched the computers after the committee completed its report and referred a criminal case to the Justice Department in an attempt to thwart their investigation.
  • Ms. Feinstein’s disclosures came a week after it was first reported that the C.I.A. last year had monitored computers used by her staff in an effort to learn how the committee may have gained access to the agency’s own internal review of the detention and interrogation program that became perhaps the most criticized part of the American government’s response to the Sept. 11, 2001, attacks. Ms. Feinstein said the internal review bolstered the conclusions of the committee’s still-classified report on the program, which President Obama officially ended in January 2009 after sharply criticizing it during the 2008 presidential campaign. For an intelligence community already buffeted by controversies over electronic surveillance and armed drone strikes, the rupture with Ms. Feinstein, one of its closest congressional allies, could have broad ramifications.
  • “Feinstein has always pushed the agency in private and defended it in public,” said Amy B. Zegart, who studies intelligence issues at Stanford University. “Now she is skewering the C.I.A. in public. This is a whole new world for the C.I.A.”Ms. Feinstein, who had refused to comment on the dispute between the C.I.A. and her committee, took the Senate floor on Tuesday morning to say the agency’s actions had breached constitutional provisions for the separation of powers and “were a potential effort to intimidate.” “How this will be resolved will show whether the Intelligence Committee can be effective in monitoring and investigating our nation’s intelligence activities, or whether our work can be thwarted by those we oversee,” she said.
  • ...4 more annotations...
  • The dispute came to a head in mid-January when Mr. Brennan told members of the committee that the agency had carried out a search of computers used by committee investigators at a C.I.A. facility in Northern Virginia, where the committee was examining documents the agency had made available for its report. Ms. Feinstein said on Tuesday that during the meeting, Mr. Brennan told her that the C.I.A. had searched a “walled-off committee network drive containing the committee’s own internal work product and communications” and that he was going to “order further forensic evidence of the committee network to learn more about activities of the committee’s oversight staff.”
  • The C.I.A. had carried out the search to determine whether committee investigators may have gained unauthorized access to the internal review of the detention program that the agency had carried out without informing the committee. Ms. Feinstein on Tuesday vigorously disputed this allegation, saying the document had been included — intentionally or not — as part of a dump of millions of pages the C.I.A. had provided for the Intelligence Committee.
  • Mr. Brennan, in a January letter to Ms. Feinstein that a government official who did not want to be identified released on Tuesday, said the committee had not been entitled to the internal review because it contained “sensitive, deliberative, pre-decisional C.I.A. material”— and therefore was protected under executive privilege considerations. The letter, attached to a statement that Mr. Brennan issued to the agency’s employees on Tuesday, raised questions about Ms. Feinstein’s statements earlier in the day concerning at what point the committee came into possession of the internal review. The C.I.A.’s acting general counsel has referred the matter to the Justice Department as a possible criminal offense, a move Ms. Feinstein called a strong-arm tactic by someone with a conflict of interest in the case. She said that that official had previously been a lawyer in the C.I.A.’s Counterterrorism Center — the section of the spy agency that was running the detention and interrogation program — and that his name is mentioned more than 1,600 times in the committee’s report. Ms. Feinstein did not name the lawyer, but she appeared to be referring to Robert Eatinger, the C.I.A.’s senior deputy general counsel. In 2007, The New York Times reported that when a top C.I.A. official in 2005 destroyed videotapes of brutal interrogations of Al Qaeda detainees, Mr. Eatinger had been one of two lawyers to approve their destruction.
  • Ms. Feinstein said that on two occasions in 2010, the C.I.A. had removed documents totaling hundreds of pages from the computer server used by her staff at the Northern Virginia facility. She did not provide any details about the documents, but said that when committee investigators confronted the C.I.A. they received a number of answers — first a denial that the documents had been removed, then an explanation that they had been removed by contractors working at the facility, then an explanation that the removal of documents was ordered by the White House. When the committee approached the White House, she said, it denied giving such an order.Ms. Feinstein’s broadside rallied Senate Democrats, but divided Republicans.
  •  
    The separation of powers Constitutional issue here is plain. The Senate has oversight of the CIA; the CIA has no lawful oversight of the Senate and furthermore is forbidden by law from conducting surveillance within the U.S. But the CIA spied on the Senate, then used evidence it found to file a criminal complaint with the DoJ against Senate staffers. Tit for tat, a criminal complaint has been filed against the CIA staffers.   
Paul Merrell

Google mulled ditching US after NSA scandal - 0 views

  • Google, the giant of the Internet, thought about moving its servers out of the U.S. after the NSA debacle, said Eric Schmidt, the company's chairman, on Friday at the Paley International Council Summit in New York.
  • "Actually, we thought about that and there are many, many reasons why it's impossible for Google to leave the United States, although it's attractive," Schmidt said. "But the reason it's an interesting idea is because American firms are subject to these rules, the [Foreign Intelligence Surveillance Act] rules, Patriot Act and so forth, and this government surveillance is really a problem.
  • Schmidt said that Google was presented with data of internal monitoring of traffic between its servers where the government had reversed engineered protocols that exchanged random data between the company's servers. "Google's position is we are outraged on this," he said. "It's government overreach, is the best way to explain it. This kind of government surveillance is also a huge business risk, he said. Because other governments do not want the U.S. breaching their citizens' data, they will begin to demand control over the servers of American businesses located in their country. "If you're a member of the government from one of these countries, what are you going to do? You're going to say 'what can I do in my country to prevent this?'" he said. "Well, the most obvious thing you can do is prevent all of those American services, and all of that snooping and so forth, by requiring data localization. By requiring servers be in your country under your control, which breaks the Internet."
Gary Edwards

Nate Jackson: Does Seeking to Jail Political Opponents Count as a 'Smidgen of Corruptio... - 0 views

  • And they wonder why people don’t trust the NSA’s mass metadata collection. The conversations that began at least in 2010 continued for three years. In fact, two days before Lerner “apologized” and outed the whole conspiracy, she wrote an email to the acting IRS commissioner’s chief of staff detailing ongoing discussions with DOJ officials. “These new documents show that the Obama IRS scandal is also an Obama DOJ and FBI scandal,” said Judicial Watch President Tom Fitton. “The FBI and Justice Department worked with Lois Lerner and the IRS to concoct some reason to put President Obama’s opponents in jail before his reelection. And this abuse resulted in the FBI’s illegally obtaining confidential taxpayer information. How can the Justice Department and FBI investigate the very scandal in which they are implicated?”
  • The answer to that last, albeit rhetorical, question is that they can’t and they aren’t. Any “investigation” by the DOJ or FBI will no doubt exonerate anyone of importance in the Obama administration. If any guilt is unavoidable, it will be hung around the necks of those rascals in Cincinnati or some other unfortunate scapegoat. All while Lerner continues to enjoy her comfortable retirement, and Obama himself remains untouched. On top of the serious breach of law and abuse of power in targeting Obama’s political opponents, the agencies' carefully crafted stonewall blocked the timely release of information. As with Hillary Clinton’s emails and the Benghazi cover-up, the slow bleed of information leaves the public tired of hearing “old news” and makes it all the more certain the perpetrators won’t face real accountability, much less justice.
  • Finally, we’re reminded of a commencement speech Obama delivered in 2009 at Arizona State University, after university officials declined to give Obama an honorary doctorate. Obama “joked” that “[university president Michael] Crowe and the Board of Regents will soon learn all about being audited by the IRS.” Clearly, that wasn’t much of a joke.
  •  
    "There was "not even a smidgen of corruption" at the IRS, Barack Obama told us in February 2014, though he conceded "there were some bone-headed decisions." That was a bald-faced lie at the time, and new information only reinforces that conclusion. While the mainstream media turns a blind eye and deaf ear, Judicial Watch has continued digging for information regarding IRS targeting of Tea Party and Patriot groups leading up to (and almost surely aiding in) Obama's re-election in 2012. And they discovered some serious collusion that sounds more like something out of Soviet Russia or Red China than here in the U.S. "Judicial Watch … released new Department of Justice (DOJ) and Internal Revenue Service (IRS) documents that include an official 'DOJ Recap' report detailing an October 2010 meeting between Lois Lerner, DOJ officials and the FBI to plan for the possible criminal prosecution of targeted nonprofit organizations for alleged illegal political activity." In other words, imprisoning political opponents. Remember when the IRS initially blamed the whole fiasco on a couple of low-level employees in Cincinnati? Good times. The documents reveal numerous conversations between the three agencies, including Lois Lerner, about creative ways to charge and jail conservatives for the "crime" of political activity opposing Obama. To do so, the DOJ and FBI needed to illegally obtain taxpayer information from the IRS. So the IRS sent the FBI more than one million pages of taxpayer information on 113,000 non-profit groups."
Paul Merrell

After Brit spies 'snoop' on families' lawyers, UK govt admits: We flouted human rights ... - 0 views

  • The British government has admitted that its practice of spying on confidential communications between lawyers and their clients was a breach of the European Convention on Human Rights (ECHR). Details of the controversial snooping emerged in November: lawyers suing Blighty over its rendition of two Libyan families to be tortured by the late and unlamented Gaddafi regime claimed Her Majesty's own lawyers seemed to have access to the defense team's emails. The families' briefs asked for a probe by the secretive Investigatory Powers Tribunal (IPT), a move that led to Wednesday's admission. "The concession the government has made today relates to the agencies' policies and procedures governing the handling of legally privileged communications and whether they are compatible with the ECHR," a government spokesman said in a statement to the media, via the Press Association. "In view of recent IPT judgments, we acknowledge that the policies applied since 2010 have not fully met the requirements of the ECHR, specifically Article 8. This includes a requirement that safeguards are made sufficiently public."
  • The guidelines revealed by the investigation showed that MI5 – which handles the UK's domestic security – had free reign to spy on highly private and sensitive lawyer-client conversations between April 2011 and January 2014. MI6, which handles foreign intelligence, had no rules on the matter either until 2011, and even those were considered void if "extremists" were involved. Britain's answer to the NSA, GCHQ, had rules against such spying, but they too were relaxed in 2011. "By allowing the intelligence agencies free rein to spy on communications between lawyers and their clients, the Government has endangered the fundamental British right to a fair trial," said Cori Crider, a director at the non-profit Reprieve and one of the lawyers for the Libyan families. "For too long, the security services have been allowed to snoop on those bringing cases against them when they speak to their lawyers. In doing so, they have violated a right that is centuries old in British common law. Today they have finally admitted they have been acting unlawfully for years."
  • Crider said it now seemed probable that UK snoopers had been listening in on the communications over the Libyan case. The British government hasn't admitted guilt, but it has at least acknowledged that it was doing something wrong – sort of. "It does not mean that there was any deliberate wrongdoing on the part of the security and intelligence agencies, which have always taken their obligation to protect legally privileged material extremely seriously," the government spokesman said. "Nor does it mean that any of the agencies' activities have prejudiced or in any way resulted in an abuse of process in any civil or criminal proceedings. The agencies will now work with the independent Interception of Communications Commissioner to ensure their policies satisfy all of the UK's human rights obligations." So that's all right, then.
  •  
    If you follow the "November" link you'[l learn that yes, indeed, the UK government lawyers were happily getting the content of their adversaries privileged attorney-client communications. Conspicuously, the promises of reform make no mention of what is surely a disbarment offense in the U.S. I doubt that it's different in the UK. Discovery rules of procedure strictly limit how parties may obtain information from the other side. Wiretapping the other side's lawyers is not a permitted from of discovery. Hopefully, at least the government lawyers in the case in which the misbehavior was discovered have been referred for disciplinary action.  
Paul Merrell

Courthouse News Service - 0 views

  • During secret proceedings in Washington, a key witness in undermining the $9.5 billion judgment Chevron faces in Ecuador repudiated much of his explosive testimony, transcripts made public today show.     Since agreeing to testify for the oil giant, Judge Alberto Guerra's fortunes have changed, and so have Chevron's.     Roughly two years ago, Guerra took to the witness stand in a New York federal courtroom and swore that lawyers for rainforest villagers bribed him to ghostwrite a multibillion-dollar Ecuadorean court judgment against Chevron for oil contamination to the Amazon jungle.     About a year before he made a deal with Chevron, Guerra had little more than $100 to his name. He also owed tens of thousands of dollars in debt and could not afford to visit his children living in the United States.     U.S. District Judge Lewis Kaplan had warned early on in proceedings that he did not "assume that anyone's hands in this are clean," yet he credited Guerra's testimony last year in ruling that the Ecuadoreans obtained their award "by corrupt means."     The Ecuadoreans have long attacked Guerra, who has a contract with Chevron for various perks, including at least $326,000, an immigration attorney and a car, as a "paid-for" participant in the oil giant's self-styled witness-protection program.     Kaplan's decision conceded that "Guerra's credibility is not impeccable," but found that his account was "corroborated extensively by independent evidence."
  • Both that credibility and the corroborating evidence came under withering attack this year during closed-door proceedings before an international arbitration tribunal.     Though the hearings took place without press or public access at the World Bank in Washington on April 23 and 24, the tribunal agreed to release transcripts of the proceedings in response to a Courthouse News request that the Reporters Committee for Freedom of the Press supported.     Courthouse News obtained advanced copies of more than 3,000 pages of transcripts, which were formally released on Monday.     They show Guerra putting a new twist on an old saying. "Money talks, gold screams," Guerra said in a June 25, 2012, meeting with Chevron representatives - a meeting Chevron recorded.     Testifying about this comment at the arbitration hearing, Guerra said Chevron showed him a safe filled with money. He recounted Chevron's representatives telling him: "Look, look, look what's down there. We have $20,000 there."     He remembered replying: "Oh, OK, very well, very well."     Guerra said he had only $146 in his bank account a year earlier, and owed tens of thousands more to finish the construction of his house. He said he could not scrape money for airfare to visit his children in the United States.
  •  Minutes from Guerra's meeting with Chevron that came to light during the tribunal proceedings showed that Chevron's lawyers hoped to find evidence that the Ecuadorean government had pressured the Guerra to rule against the company.     Guerra disappointed by saying that Ecuadorean President Rafael Correa's administration "never butted in" to the process, the transcript shows.     "These guys are idiots, but the truth, the truth, I attest, damn, they never got involved," Guerra added, referring to Correa's government.     The remark appears to undercut the foundation of Chevron's arbitration case, which asks the tribunal to blame the Ecuadorean government for a miscarriage of justice.     Guerra stood by those comments on the arbitration panel's witness stand.      "My position is that the government did not intervene," Guerra said.     The only time an Ecuadorean government official tried to elbow into the case, Guerra testified, was under a prior administration. Correa's predecessors pushed to dismiss the case in Chevron's favor in 2003, he said.
  • ...4 more annotations...
  •  Guerra also acknowledged bluntly on the witness stand that he had lied in telling Chevron's team that attorneys for the Ecuadoreans offered him $300,000.     "Yes, sir, I lied there," Guerra told Eric Bloom, who represents Ecuador for the firm Winston & Strawn. "I wasn't truthful."     Guerra maintains that other attorneys for the Ecuadoreans, specifically Steven Donziger and Pablo Fajardo, offered money in return for ghostwriting the judgment on behalf of Judge Nicolas Zambrano, the final jurist to preside over the case.     Shifting the details of this supposed arrangement, though, Guerra walked back his allegation that Zambrano offered him 20 percent.     "That was my sworn statement in New York, but what I said is that, because of a circumstance, because of a situation, I mentioned 20 percent when it wasn't true, and I think that, as a gentleman, I should say the truth, and we did not discuss - I did not discuss 20 percent with Mr. Zambrano - but we did discuss that he would share with me from what he received," he said.     In his nearly 500-page ruling, Judge Kaplan pointed to bank records, daily planners, shipping records and airplane tickets as corroborating evidence that outweighed Guerra's credibility problems.
  • Particularly persuasive for Kaplan was evidence that Ecuador's national airline, Tame, certified delivery of packages between Guerra and Zambrano.     Guerra told the arbitrators this spring, however, that all 11 of these packages "had nothing to do with the [Chevron] case."     As for his plane tickets to the rainforest from Aug. 11 and 12, 2010, Guerra said they occurred during an irrelevant time period.     "If I traveled during those dates, it wasn't for me to provide assistance to the Chevron case," he said.     Guerra testified that Chevron representatives told him that they would have raised his pay if he could provide them with the key physical evidence they were looking for: a draft of the judgment.     "We were unable to find the main document," Guerra recalled them saying. "Had we been able to find it, we would have been able to offer you a larger amount, something like that, we have $18,000 for you, and we're going to take the computer with us."     Though Guerra did not have a copy of the judgment, Ecuador's forensic expert Christopher Racich testified that he found a running draft of the judgment against Chevron on Zambrano's hard drives.
  • Ecuador now argues that this forensic evidence - which Courthouse News reported exclusively early this year - proves Zambrano painstakingly wrote the ruling and saved it hundreds of times throughout the case.     Chevron has not been able to produce emails between Guerra, Zambrano and the purported ghostwriters, Donziger and Fajardo, Ecuador's forensic expert says.     Guerra acknowledged to the arbitrators that that the bounty of physical evidence he promised Chevron fell short.     There are no calendars and day planners marked with meetings scheduled between Fajardo, Donziger or Guerra, he acknowledged.     While Guerra said he had payments from Zambrano from April 2011 and February 2012, he testified that these "had no connection to the Chevron case."     For Chevron, the thousands of pages of transcripts show that the company "proved its case before the International Arbitration Tribunal."     "Witness and expert testimony confirmed that the Ecuadorean judgment against Chevron was ghostwritten by Steven Donziger and his team and that the Ecuadorian government is responsible for any further remediation," Chevron spokesman Morgan Crinklaw said in a statement. "Chevron also proved that Ecuador breached the U.S.-Ecuador Bilateral Investment Treaty and international law."     Donziger, who still works for the Ecuadorean villagers seeking to collect from Chevron, said in a statement that Guerra's latest testimony "demonstrates once and for all that Chevron's so-called racketeering case has completely fallen apart."
  •   "Guerra has been the linchpin of Chevron's entire body of trumped up evidence and he now stands not only as an admitted liar, but also as a shocking symbol of how Chevron's management has become so obsessed with evading its legal obligations in Ecuador that it is willing to risk presenting false evidence in court to try to frame adversary counsel and undermine the rule of law," Donziger added.
  •  
    Chevron has a "witness-protection program" as an excuse for paying off witnesses? And for paying them to lie under oath, it appears. Never in my legal career did I ever here of a non-governmental entity with a witness protection program. This reeks to high heavens.  Hats off to Courthouse News for digging deep on this one.   
Paul Merrell

DiGenova: Rice Ordered 'Spreadsheets | The Daily Caller - 0 views

  • Former President Barack Obama’s national security adviser Susan Rice ordered U.S. spy agencies to produce “detailed spreadsheets” of legal phone calls involving Donald Trump and his aides when he was running for president, according to former U.S. Attorney Joseph diGenova. “What was produced by the intelligence community at the request of Ms. Rice were detailed spreadsheets of intercepted phone calls with unmasked Trump associates in perfectly legal conversations with individuals,” diGenova told The Daily Caller News Foundation Investigative Group Monday. “The overheard conversations involved no illegal activity by anybody of the Trump associates, or anyone they were speaking with,” diGenova said. “In short, the only apparent illegal activity was the unmasking of the people in the calls.”
  • Other official sources with direct knowledge and who requested anonymity confirmed to TheDCNF diGenova’s description of surveillance reports Rice ordered one year before the 2016 presidential election. Also on Monday, Fox News and Bloomberg News, citing multiple sources reported that Rice had requested the intelligence information that was produced in a highly organized operation. Fox said the unmasked names of Trump aides were given to officials at the National Security Council (NSC), the Department of Defense, James Clapper, President Obama’s Director of National Intelligence, and John Brennan, Obama’s CIA Director. Joining Rice in the alleged White House operations was her deputy Ben Rhodes, according to Fox. Critics of the atmosphere prevailing throughout the Obama administration’s last year in office point to former Obama Deputy Defense Secretary Evelyn Farkas who admitted in a March 2 television interview on MSNBC that she “was urging my former colleagues,” to “get as much information as you can, get as much intelligence as you can, before President Obama leaves the administration.”
  • Michael Doran, former NSC senior director, told TheDCNF Monday that “somebody blew a hole in the wall between national security secrets and partisan politics.” This “was a stream of information that was supposed to be hermetically sealed from politics and the Obama administration found a way to blow a hole in that wall,” he said.
  • ...1 more annotation...
  • Doran charged that potential serious crimes were undertaken because “this is a leaking of signal intelligence.” “That’s a felony,” he told TheDCNF. “And you can get 10 years for that. It is a tremendous abuse of the system. We’re not supposed to be monitoring American citizens. Bigger than the crime, is the breach of public trust.” Waurishuk said he was most dismayed that “this is now using national intelligence assets and capabilities to spy on the elected, yet-to-be-seated president.” “We’re looking at a potential constitutional crisis from the standpoint that we used an extremely strong capability that’s supposed to be used to safeguard and protect the country,” he said. “And we used it for political purposes by a sitting president. That takes on a new precedent.”
Paul Merrell

Attorney general announces Sara Netanyahu will be indicted for fraud - Israel News - Ha... - 0 views

  • Attorney General Avichai Mendelblit said Friday the prime minister’s wife Sara Netanyahu will be indicted for fraud and breach of trust for excessive spending on catering at the prime minister’s residence while falsely claiming the house did not employ a cook. The indictment for spending 359,000 shekels ($102,000) of state funds on the catering is subject to a hearing, whose date has not yet been announced.
  •  
    Prosecutors are closing in on the Netanyahus. Still to come, several more serious charges against the Prime Minister himself. Unlike the U.S., Israel has a history of prosecuting and imprisoning high officials for corruption. But who succeeds Netanyahu when he is forced from office?
Paul Merrell

10 Things Americans Underestimate About Our Massive Surveillance State | Alternet - 0 views

  • Americans may be upset about the latest revelations in the government’s ability to spy on citizens via their online lives, but no one should be surprised. We've underestimated and overlooked many key aspects of the government’s ability to track our lives for years. The bottom line, which resonates most strongly among civil liberties advocates on the left and conservative libertarians on the right, is not just the loss of privacy but also the growing power of the state to target and oppress people who it judges to be critics and enemies. That list doesn’t just include foreign terrorists of the al-Qaeda mold, or even the Chinese government that has  stolen the most advanced U.S. weapon plans; it also includes domestic whistleblowers, protesters and journalists—all of whom have been  targeted by the Obama administration Justice Department.   Let’s go through 10 points about these latest revelations of domestic spying to better understand what Americans have underestimated and overlooked about electronic eavesdropping.
Paul Merrell

N.S.A. Able to Foil Basic Safeguards of Privacy on Web - NYTimes.com - 1 views

  • The National Security Agency is winning its long-running secret war on encryption, using supercomputers, technical trickery, court orders and behind-the-scenes persuasion to undermine the major tools protecting the privacy of everyday communications in the Internet age, according to newly disclosed documents.
  • The agency has circumvented or cracked much of the encryption, or digital scrambling, that guards global commerce and banking systems, protects sensitive data like trade secrets and medical records, and automatically secures the e-mails, Web searches, Internet chats and phone calls of Americans and others around the world, the documents show.
  • The N.S.A. hacked into target computers to snare messages before they were encrypted. In some cases, companies say they were coerced by the government into handing over their master encryption keys or building in a back door. And the agency used its influence as the world’s most experienced code maker to covertly introduce weaknesses into the encryption standards followed by hardware and software developers around the world.
  • ...11 more annotations...
  • “For the past decade, N.S.A. has led an aggressive, multipronged effort to break widely used Internet encryption technologies,” said a 2010 memo describing a briefing about N.S.A. accomplishments for employees of its British counterpart, Government Communications Headquarters, or GCHQ. “Cryptanalytic capabilities are now coming online. Vast amounts of encrypted Internet data which have up till now been discarded are now exploitable.”
  • Some of the agency’s most intensive efforts have focused on the encryption in universal use in the United States, including Secure Sockets Layer, or SSL; virtual private networks, or VPNs; and the protection used on fourth-generation, or 4G, smartphones. Many Americans, often without realizing it, rely on such protection every time they send an e-mail, buy something online, consult with colleagues via their company’s computer network, or use a phone or a tablet on a 4G network.
  • For at least three years, one document says, GCHQ, almost certainly in collaboration with the N.S.A., has been looking for ways into protected traffic of popular Internet companies: Google, Yahoo, Facebook and Microsoft’s Hotmail. By 2012, GCHQ had developed “new access opportunities” into Google’s systems, according to the document. (Google denied giving any government access and said it had no evidence its systems had been breached).
  • Paul Kocher, a leading cryptographer who helped design the SSL protocol, recalled how the N.S.A. lost the heated national debate in the 1990s about inserting into all encryption a government back door called the Clipper Chip. “And they went and did it anyway, without telling anyone,” Mr. Kocher said. He said he understood the agency’s mission but was concerned about the danger of allowing it unbridled access to private information.
  • The documents are among more than 50,000 shared by The Guardian with The New York Times and ProPublica, the nonprofit news organization. They focus on GCHQ but include thousands from or about the N.S.A. Intelligence officials asked The Times and ProPublica not to publish this article, saying it might prompt foreign targets to switch to new forms of encryption or communications that would be harder to collect or read. The news organizations removed some specific facts but decided to publish the article because of the value of a public debate about government actions that weaken the most powerful privacy tools.
  • The files show that the agency is still stymied by some encryption, as Mr. Snowden suggested in a question-and-answer session on The Guardian’s Web site in June. “Properly implemented strong crypto systems are one of the few things that you can rely on,” he said, though cautioning that the N.S.A. often bypasses the encryption altogether by targeting the computers at one end or the other and grabbing text before it is encrypted or after it is decrypted.
  • Because strong encryption can be so effective, classified N.S.A. documents make clear, the agency’s success depends on working with Internet companies — by getting their voluntary collaboration, forcing their cooperation with court orders or surreptitiously stealing their encryption keys or altering their software or hardware.
  • At Microsoft, as The Guardian has reported, the N.S.A. worked with company officials to get pre-encryption access to Microsoft’s most popular services, including Outlook e-mail, Skype Internet phone calls and chats, and SkyDrive, the company’s cloud storage service.
  • Simultaneously, the N.S.A. has been deliberately weakening the international encryption standards adopted by developers. One goal in the agency’s 2013 budget request was to “influence policies, standards and specifications for commercial public key technologies,” the most common encryption method. Cryptographers have long suspected that the agency planted vulnerabilities in a standard adopted in 2006 by the National Institute of Standards and Technology and later by the International Organization for Standardization, which has 163 countries as members. Classified N.S.A. memos appear to confirm that the fatal weakness, discovered by two Microsoft cryptographers in 2007, was engineered by the agency. The N.S.A. wrote the standard and aggressively pushed it on the international group, privately calling the effort “a challenge in finesse.” “Eventually, N.S.A. became the sole editor,” the memo says.
  • But the agencies’ goal was to move away from decrypting targets’ tools one by one and instead decode, in real time, all of the information flying over the world’s fiber optic cables and through its Internet hubs, only afterward searching the decrypted material for valuable intelligence. A 2010 document calls for “a new approach for opportunistic decryption, rather than targeted.” By that year, a Bullrun briefing document claims that the agency had developed “groundbreaking capabilities” against encrypted Web chats and phone calls. Its successes against Secure Sockets Layer and virtual private networks were gaining momentum.
  • Ladar Levison, the founder of Lavabit, wrote a public letter to his disappointed customers, offering an ominous warning. “Without Congressional action or a strong judicial precedent,” he wrote, “I would strongly recommend against anyone trusting their private data to a company with physical ties to the United States.”
  •  
    Lengthy article, lots of new information on NSA decryption capabilities, none of it good for those who value their data privacy.
  •  
    Thanks Paul - nice job cutting this monster down to size :)
Paul Merrell

McCain urges mass US military aid for Ukraine - Channel NewsAsia - 0 views

  • US Senator John McCain called for massive military assistance to Ukraine on Saturday, while warning that Russia's actions in its former Soviet neighbour could lead to unprecedented measures by the United States and its allies."Ukraine is going to need a long-term military assistance programme from the United States," McCain told reporters following a US senate delegation visit to the Ukrainian capital, voicing what he said was a personal opinion.
  • McCain said he was "deeply concerned" about previous reports of Russian troops moving closer to Ukraine's eastern border and conducting snap military drill there, after having effectively seized Crimea at the start of the month.He said an all-out Russian invasion of eastern Ukraine "will be a breach of such enormous consequence that the United States of America and our European allies will be contemplating action that we have not ever (contemplated) in our relations with Russia."
  • The US senators - who met with Ukraine's new leaders and members of the Maidan protest movement in Kiev - did not mince their words on the eve of the Crimean referendum, organised by the self-appointed pro-Moscow regional authorities but slammed as illegal by the new authorities in Kiev and foreign capitals.McCain spoke of a "phony referendum" while his colleague Richard Durbin described a "Soviet-style election in Crimea. We know the outcome, we always knew the outcome of those elections long before they took place."
  •  
    Our War Party is on the warpath.
Paul Merrell

Jeremy Hammond Sentenced To 10 Years In Prison - 0 views

  • NEW YORK -- Convicted hacker Jeremy Hammond was sentenced Friday to 10 years in prison for stealing internal emails from the global intelligence firm Stratfor.
  • Hammond, 28, has a lengthy criminal record for his protests both online and off against targets like the 2004 Republican National Convention and pro-Iraq War activists. But stealing Stratfor files as part of the online hacking collective Anonymous gave him a new level of notoriety. In May, he pleaded guilty to one conspiracy charge for hacking the Texas-based private intelligence firm Strategic Forecasting, or Stratfor. The security breach resulted in the theft of employee emails and account information for approximately 860,000 Stratfor subscribers and clients, including information from 60,000 credit cards. Although Hammond did not use the credit cards himself, he urged supporters to use them to make donations to charities. The resulting fraudulent charges led to headaches for nonprofits and for the private individuals who had their phone numbers and email addresses exposed. The government charges originally added up to 30 years in prison, but Hammond took a plea deal for violating the Computer Fraud and Abuse Act, a federal anti-hacking law also used to prosecute internet freedom activist Aaron Swartz. He admitted to hacking several other websites, including the Arizona Department of Public Safety, Special Forces Gear, the Boston Police Patrolmen's Association, and the sheriff's office in Jefferson County, Ala.
  • Nearly 5 million emails obtained in the Stratfor hack were turned over to WikiLeaks by Hammond and published as the “Global Intelligence Files.” They revealed domestic spying on activists, including Occupy Wall Street. The resulting media publicity led some, including 4,000 online petition backers and Pentagon Papers leaker Daniel Ellsberg, to hail him as a whistleblower. But to the federal government, he was little more than a common thief. “While he billed himself as fighting for an anarchist cause, in reality, Jeremy Hammond caused personal and financial chaos for individuals whose identities and money he took and for companies whose businesses he decided he didn’t like," United States Attorney Preet Bharara said in a May statement. On Friday, Hammond, who has been in detention for 20 months, struck back. While apologizing to the innocent people who had their personal information exposed as a result of his leaks, he lashed out at the FBI, and Hector Xavier Monsegur, an informant widely known by his online name "Sabu." For months, Hammond claimed, Sabu guided him as he hacked the Stratfor website and thousands more around the world.
  • ...1 more annotation...
  • Before being cut off by U.S. District Court Judge Loretta Preska, Hammond claimed that foreign government targets included Turkey, Brazil and Iran. Preska had already imposed a protective order preventing the release of the countries' names, which were in Hammond's statement as well as in sentencing paperwork. The government had disputed his claims involving the countries, and Preska responded by ordering that their names be redacted. She cut Hammond off in court Friday before he was able to list all of the countries in violation of the order.
  •  
    Jeremy Hammond draws the maximum 10-year sentence. 
Paul Merrell

Israeli spies reportedly looking for 'smoking gun' on Iran deal - Diplomacy and Defense... - 0 views

  • Israel is searching for a "smoking gun" to prove Iran was in breach of an interim agreement reached last week with the world powers over its nuclear program, Britain's Sunday Times reported. The order, which the Sunday report said came from Prime Minister Benjamin Netanyahu, aims to foil U.S. President Barack Obama's efforts to convince Congress to support the deal signed in Geneva last week and refrain from imposing additional sanctions on Iran. According to the report, Netanyahu has ordered the Mossad and Israel Defense Forces' Military Intelligence to dig up evidence of an Iranian ploy ahead of the implementation of the deal.
  •  
    A desired result in search of evidence, not what one would call a principled investigation. Who could trust the results of such an investigation with its pre-determined outcome? With the Israeli intelligence community's long history of false reports in furtherance of government goals, any such report will bear a heavy presumption of relying on fabricated or staged evidence.
Paul Merrell

SteveLendmanBlog - 0 views

  • cuador is in the eye of the storm. Obama's earlier 2010 attempt to forcibly unseat popular President Rafael Correa failed.  He's trying again. Ecuadorean democracy is being attacked. Since early June, US-orchestrated right-wing protests (mainly in Quito and Guayaquil) erupted. They continue at times violently to replace Correa with fascist rule. They began on the pretext of announced higher inheritance and capital gains taxes affecting about 2% of the population - the Law to Redistribute the Wealth now being debated after Correa halted its implementation to make rich Ecuadorians pay more along with creating more social enterprises, collectives and cooperatives.  Protest leaders want Correa forcibly ousted. Interior Minister Jose Serrano revealed a plot to storm the presidential palace, block airports and bridges on the Colombian and Peruvian borders, as well as attack security forces.
  • Serrano said opposition lawmakers Andres Paez and Lourdes Tiban conspired with former Col. Mario Pazmino to instigate violence and chaos during protests. Pazmino was former army military intelligence head - "very close to the CIA," according to Correa. In 2008, he was sacked for colluding with Colombia's bombing of Ecuador.
  • On Thursday, violent clashes erupted. Right-wing extremists attacked Ecuadorean police near Quito's presidential palace. Their plan to breach their lines failed. Four officers sustained injuries.
  • ...1 more annotation...
  • Washington wants Correa's government replaced by a regime it controls, neo-colonial rule most Ecuadoreans oppose - following the pattern of earlier failed Venezuelan protests.  So far, popular support for Correa prevails. At the same time, dark forces headquartered in Washington never end their dirty game for unchallenged global dominance - a plot to create unfit to live in ruler-serf societies worldwide.
Paul Merrell

Leaked Emails ot Save the Children confirms Pakistan full of CIA agents!! - 0 views

  • Here are the emails. An article written by Umar Cheema is also on the Web, will post link once I am on my laptop. http://cirp.pk/e-mail.htm (edit: although some names have been blacked out, you can still view them by taking mouse over the links! e.g. First email is by Hassan Noor.. to Mike Novell, tkrift (??), Amanullah Khan.. CC is Afnan Aleem) These basically proves that everyone in the Abbotabad commission (except Mr Ashraf Qazi), including a very senior judge and general, were working under the influence of Save The Children NGO Retired General Nadeem was directly working under them! Afridi was NOT tortured by ISI. He did give ISI some false statements which the ISI didn't dig deeper because it suited them! (Example he was working for CIA since 2008, not 2009 as ISI was led to believe) Edit: Here is the article: http://www.thenews.com.pk/Todays-Ne...s-Abbottabad-Commission-was-penetrated-by-CIA -- All these NGOs should be banned and thrashed! ISI should publically hang foreign agents! (Even if they are Generals)
  • The NGO has neither denied the email record and the contents it carried (when shown by The News for seeking version) nor offered specific comments but that: “Our assistance to the Abbottabad Commission and its members including Gen Nadeem was within the legal parameters and Abbottabad Commission mandate to find facts.” Nadeem was not available for comments, however, his close aide termed the allegations as utterly “rubbish and non-sense” when comments were sought after showing the email record A transcript of internal wrangling: Muhammad Hassan Noor Saadi, deputy country director of Save the Children, met Gen (R) Nadeem on November 20, 2012 that followed his email to four senior colleagues. The report was primarily compiled by ‘our friend’, his email reads, and was endorsed by the Chairman but one of the members, Ashraf Qazi, was not in agreement with them. He wrote a dissenting note criticising Chairman Justice (R) Javed Iqbal and Gen (R) Nadeem ‘for being soft on certain institutions (including Save the Children).’
  • Another member, Abbas Khan, was neither willing to sign the report in its current shape, discloses email record, nor wanted to put a dissenting note hence decided to prolong his stay in the US where he went on the ‘pretext of medical ground’. More alarmingly, the NGO was granted access to the Commission’s report well before it was sent to the prime minister. Save the Children had uninterrupted access to the four drafts prepared in June 2012 by the members including the chairman, email record available with The News indicates. All favours granted to Save the Children on behalf of the Commission were in clear breach of public trust raising question marks about the integrity of the members. The chairman of the NGO, Save the Children, was contacted by The News. He initially agreed to meet but later stopped taking calls and did not respond to messages sent to him.Nadeem also felt confident, the email record shows, that he would be able to convince the panel with the answers given by the NGO and urge his colleagues to go by the facts presented by Save the Children instead of believing on the contents of Afridi’s statement. Gen (R) Nadeem also advised the NGO, an email of the country director reads, to fight the expulsion of our expatriate as otherwise the ISI would move quickly to close down the country programme before the Commission report comes out.
  • ...3 more annotations...
  • Record shows Abbottabad Commission was penetrated by CIA​ Umar Cheema Friday, August 02, 2013 From Print Edition ISLAMABAD: A mind-blowing detail has emerged from the internal correspondence of NGO Save the Children disclosing its infiltration into the Abbottabad Commission to save its skin following allegations of the CIA’s penetration into the NGO in a hunt for Osama bin Laden through Dr Shakil Afridi, now under arrest in Peshawar. “Some of us suspected that the khakis had access to the record and receive daily updates but never realised an NGO had infiltrated too,” said an official privy to the Commission’s working. The leaked communication indicates that Lt Gen (retd) Nadeem Ahmed, an unofficial representative of the Army and ISI in the Commission, was allegedly cultivated by Save the Children who would offer him ‘how-to-do’ bailout advice, even sharing details about the internal politics of the Commission and classified record, something in radical contradiction to his reputation as a thorough professional and a man of integrity. He briefed the deputy country director of Save the Children, according to the email, about the views of different members, staunch opposition from a panel colleague, Ashraf Jehangir Qazi, resulting in his dissenting note on the NGO and other institutions, and Gen (retd) Nadeem’s plan to effectively counter this note in collaboration with Justice (R) Javed Iqbal, the Chairman.
  • The Commission could not issue the report with that note and therefore now they are working on developing counter arguments on the note, read the email. The Commission needs to have a lot of comments removed from the note before it is in a shape that allows the report to be shared, the email continues, otherwise it can jeopardize the integrity of the members of the Commission. Justice (R) Javed Iqbal and Gen (R) Nadeem ‘have to work extra hard to factually prove a lot of things wrong that this third member is referring to,’ read the email of deputy country director. The email then explained the position of the fourth member, Abbas Ali Khan, absent from discussion. He is not willing to sign the report in the current shape, reads Hassan’s email, but also does not want to put in a note of dissent and therefore continues to prolong his stay in the US where he went on the pretext of treatment. As a way forward, the email continues, the two members will work with the third member (Ashraf Qazi) and try to come to a point where the note is significantly reduced and numbers of comments are taken out of the report. Gen (R) Nadeem’s advisory role of the NGO: The email also brings to light his role as adviser to the NGO. To a question that what Save the Children should do, Nadeem advised the deputy country director to build relationship and confidence with the Ministry of Interior and Economic Affairs Division. “It would take few months for you to be back to complete normalcy,” Gen (R) Nadeem advised.
  • In another email generated on August 29, 2012, David Wright, the country director, wrote that ‘on my instructions Hassan asked Gen (R) Nadeem to give an honest assessment as to what he thinks our chances are of surviving this.’ Gen (R) Nadeem replied that he felt confident regarding the answers we (NGO) will give to the questions proposed, ‘he could convince the other commission members to go with the fact rather than the content of Afridi’s statement.’ Gen (R) Nadeem also advised to fight the expulsion of our expatriates, Wrights email continued. “He felt if we did not do this and the expats left, the ISI would then move quickly to close down the country programme before the Commission report comes out.” Report draft shared with the NGO: Wright’s another email indicates that the draft was shared more than once with the NGO. Referring to a meeting of two senior officers of Save the Children with Gen (R) Nadeem, the country director said they were shown the report written by the Chairman of the Commission. The email said there were four versions of the report in June 2012 and these were reduced to two in August that year. However, they have reservations about the latest version shared in August as ‘the report which was originally thought to be our saviour, will be the tool for this expulsion.’ We will do our best, the email reads, to work ‘with our friends and try and get our responses in before the report is finalised.’ SOURCE: THE NEWS Record shows Abbottabad Commission was penetrated by CIA - thenews.com.pk
Paul Merrell

Verizon's New, Encrypted Calling App Plays Nice With the NSA - Businessweek - 0 views

  • Verizon is the latest big company to enter the post-Snowden market for secure communication, and it's doing so with an encryption standard that comes with a way for law enforcement to access ostensibly secure phone conversations.Verizon Voice Cypher, the product introduced on Thursday with the encryption company Cellcrypt, offers business and government customers end-to-end encryption for voice calls on iOS, Android, or BlackBerry devices equipped with a special app. The encryption software provides secure communications for people speaking on devices with the app, regardless of their wireless carrier, and it can also connect to an organization's secure phone system. Cellcrypt and Verizon both say that law enforcement agencies will be able to access communications that take place over Voice Cypher, so long as they're able to prove that there's a legitimate law enforcement reason for doing so. Seth Polansky, Cellcrypt's vice president for North America, disputes the idea that building technology to allow wiretapping is a security risk. "It's only creating a weakness for government agencies," he says. "Just because a government access option exists, it doesn't mean other companies can access it." 
  • Phone carriers like Verizon are required by U.S. law to build networks that can be wiretapped. But the legislation known as the Communications Assistance for Law Enforcement Act requires phone carriers to decrypt communications for the government only if they have designed their technology to make it possible to do so. If Verizon and Cellcrypt had structured their encryption so that neither company had the information necessary to decrypt the calls, they would not have been breaking the law.
  • Other companies have designed their encryption in this way, including AT&T, which offers encrypted phone service for business customers. Apple and Android recently began protecting content stored on users's phones in a way that would keep the tech companies from being able to comply with requests from law enforcement. The move drew public criticism from FBI Director James Comey, and some security experts expect that a renewed effort to stir passage of legislation banning such encryption will accompany Silicon Valley's increased interest in developing these services. Verizon believes major demand for its new encryption service will come from governmental agencies conveying sensitive but unclassified information over the phone, says Tim Petsky, a senior product manager for Verizon Wireless. Corporate customers who are concerned about corporate espionage are also itching for answers. "You read about breaches in security almost every week in the press," says Petsky. "Enterprise customers have been asking about ways to secure their communications and up until this point, we didn't have a solution." 
  • ...2 more annotations...
  • There has been increased interest in encryption from individual consumers, too, largely thanks to the NSA revelations leaked by Edward Snowden. Yahoo and Google began offering end-to-end encrypted e-mail services this year. Silent Circle, a startup catering to consumer and enterprise clients, has been developing end-to-end voice encryption for phones calls. Verizon's service, with a monthly price of $45 per device, isn't targeting individual buyers and won't be offered to average consumers in the near future.But Verizon's partner, Cellcrypt, looks upon selling to large organizations as the first step toward bringing down the price before eventually offering a consumer-level encryption service. "At the end of the day, we'd love to have this be a line item on your Verizon bill," says Polansky.
  • Many people in the security industry believe that a designed access point creates a vulnerability for criminals or spies to exploit. Last year reports surfaced that the FBI was pushing legislation that would require many forms of Internet communication to be wiretap-ready. A group of prominent security experts responded strongly: "Requiring software vendors to build intercept functionality into their products is unwise and will be ineffective, with the result being serious consequences (PDF) for the economic well-being and national security of the United States," they wrote in a report issued in May. 
« First ‹ Previous 41 - 60 of 64 Next ›
Showing 20 items per page