Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged application

Rss Feed Group items tagged

Gary Edwards

The Ultimate Net Monitoring Tool: NARUS - 0 views

  •  
    Chilling stuff.  Note that Mark Klien is an important whistleblower whose testimony has helped expose the  Federal Government - NSA domestic dragnet that has violated the constitutional rights of hundreds of thousands of law abiding American citizens.  The question I have concerns cooperation between NSA NARUS spying and the IRS. We know that the IRS used key words such as "TEA PARTY", "PATRIOT", "Constitution", and "Tenth Amendment" to target American citizens.  Does the NSA NARUS target Americans in the same way?  Are there political enemy lists with background surveillance information now circulating through different government agencies based on this targeted and illegal spying? The first thing we need to do is protect whistle blowers who are risking it all to protect the constitutional rights of American citizens and save our country.   "The equipment that technician Mark Klein learned was installed in the National Security Agency's "secret room" inside AT&T's San Francisco switching office isn't some sinister Big Brother box designed solely to help governments eavesdrop on citizens' internet communications. Rather, it's a powerful commercial network-analysis product with all sorts of valuable uses for network operators. It just happens to be capable of doing things that make it one of the best internet spy tools around. "Anything that comes through (an internet protocol network), we can record," says Steve Bannerman, marketing vice president of Narus, a Mountain View, California, company. "We can reconstruct all of their e-mails along with attachments, see what web pages they clicked on, we can reconstruct their (voice over internet protocol) calls."" Narus' product, the Semantic Traffic Analyzer, is a software application that runs on standard IBM or Dell servers using the Linux operating system. It's renowned within certain circles for its ability to inspect traffic in real time on high-bandwidth pipes, identifying packets of interest as they r
Gary Edwards

BriteSnow - The Five Software Architecture Generations: From Mainframe to Mobile Apps t... - 0 views

  •  
    "The software technology industry is like an ants' nest. From up close, everything seems random, chaotic, and purposeless, but as we zoom out, pattern, order, and purpose begin to emerge. At least, this is the way I see it. While I love to get very close to the smallest details, once in a while, I like to step back and see how we, the software industry, came to where we are in order to better understand where we are going. From the beginning of software, the two main characteristics of an application that are often opposed to each other are richness (i.e., application function and experience) and reach (i.e., application distribution and access). A model in which both of these characteristics are maximized has always been seen as the Holy Grail of software development. If we step back and look at the evolution of the software application architecture over the last 20 years, based on these two core characteristics, we can plot the journey of the quest for this Holy Grail on a decreasing sinusoid depicting five generations, as shown here."
Paul Merrell

Why You Need a Passport Now! by Robert Wenzel - 0 views

  • At a future point, it may be impossible to get one. PapersPlease.org reports on what the State Department is planning for future passport applicants: The new U.S. passport application forms are back, worse than ever. Ignoring massive public opposition, and despite having recently admitted that it is already using the “proposed” forms illegally without approval, the State Department is trying again to get approval for a pair of impossible-to-complete new passport application forms that would, in effect, allow the State Department to deny you a passport simply by choosing to send you either or both of the new “long forms”. Early last year, the State Department proposed a new “Biographical Questionnaire” for passport applicants, which would have required anyone selected to receive the new long-form DS-5513 to answer bizarre and intrusive personal trivia questions about everything from whether you were circumcised (and if so, with what accompanying religious rituals) to the dates of all of your mother’s pre- and post-natal medical appointments, your parents’ addresses one year before you were born, every address at which you have ever resided, and your lifetime employment history including the names and phone numbers of each of your supervisors at every job you have ever held.
  • Most people would be unable to complete the proposed new form no matter how much time and money they invested in research. Requiring someone to complete Form DS-5513 would amount to de facto denial of their application for a passport — which, as we told the State Department, appeared to be the point of the form. The State Department’s notice of the proposal in the Federal Register didn’t include the form itself. After we published the proposed Form DS-5513, the story went viral and more than 3,000 public comments objecting to the proposal were filed with the State Department in the final 24 hours of the comment period. After that fiasco, the State Department went dark for several months, and claimed that they would “revise” the form. But they didn’t give up, and apparently they didn’t listen to (or didn’t care) what they had been told by members of the public in our comments. The State Department is now seeking approval for a (slightly)revised Form DS-5513 as well as a new Form DS-5520, also for passport applicants, containing many of the same questions.
  • The State Department no longer wants you to tell the passport examiner about the circumstances of your circumcision, but does still want to know the dates and locations of all of your mother’s pre- and post-natal medical appointments, how long she was hospitalized for your birth, and a complete list of everyone who was in the room when you were born. The revised forms no longer ask for all the addresses at which you have lived, but only for those addresses you are least likely to know: all the places you lived from birth until age 18. And so on, as you can see for yourself on the proposed Form DS-5513 and Form DS-5520. Read more here.
Gary Edwards

IRS Lawyer Carter Hull Confirms Tea Party Targeting Ordered By Washington - Investors.com - 0 views

  • Hull has confirmed the premeditated targeting of Tea Party groups went even higher than him or Lerner.
  • Apparently not only Tea Party groups were targeted but actual candidates as well. On March 9, 2010, the day Tea Party candidate Christine O'Donnell revealed her plan to run for Vice President Joe Biden's former Delaware Senate seat , an IRS tax lien was placed on a house purported to be hers, an action that was quickly publicized by those who did not wish her well.
  • Earlier this year, Dennis Martel, special agent with the Department of Treasury in Baltimore, left a message on O'Donnell's cell phone telling her that an official in Delaware state government had improperly accessed her records on that very same day. The problem was that the house was not hers in the first place and the IRS eventually blamed the lien on a computer glitch and withdrew it.
  • ...1 more annotation...
  • To us it is inconceivable that one of only two political appointees was directly involved in targeting of Tea Party groups without White House knowledge and consent. It is said the fish rots from the head, and this one is really beginning to stink.
  •  
    This has gone way too far.  The 2012 elections must be nullified and rescheduled.  Tens of millions of American citizens have been systematically targeted, their civil and Constitutional rights destroyed, and their voices and votes politically eliminated by a massive government conspiracy.  The 2012 election is a fraud.  And nothing short of complete nullification and recall, and the termination of the IRS will do the great Republic justice. excerpt: Scandal: A retiring IRS lawyer implicates the IRS chief counsel's office, headed by an Obama appointee, as well as the head of the IRS' exempt organizations office. The targeting included a Tea Party Senate candidate. In Thursday's hearing before the House Oversight Committee, 72-year-old retiring IRS lawyer Carter Hull implicated the IRS chief counsel's office headed by William J. Wilkins, who attended at least nine White House meetings, and Lois Lerner, head of the exempt-organizations office, in the IRS scandal. In so doing, he made clear the targeting of Tea Party groups started in Washington and was directed from Washington. A tax-law specialist with 48 years of IRS experience, Hull testified that Lerner, the former head of the exempt organizations division, demanded that he send some of the reviews of Tea Party groups to the IRS chief counsel's office in Washington. The chief counsel is one of two political appointees in the IRS. According to Hull's testimony, Lerner, who famously pleaded her Fifth Amendment rights before the same committee, gave an atypical instruction that the Tea Party applications undergo special scrutiny that included an uncommon multilayer review that involved a top adviser to Lerner as well as the chief counsel's office. Hull's name came up earlier in the testimony of Holly Paz, a D.C.-based supervisor in the IRS's tax-exempt status division, who reported to Lerner. It was on May 22, the day after Paz was interviewed by investigators, that Lerner refused to answer questions from
Paul Merrell

New IETF Group to Tackle TLS Implementation in Applications | Threatpost | The First St... - 0 views

  • The NSA surveillance scandal has created ripples all across the Internet, and the latest one is a new effort from the IETF to change the way that encryption is used in a variety of critical application protocols, including HTTP and SMTP. The new TLS application working group was formed to help developers and the people who deploy their applications incorporate the encryption protocol correctly. TLS is the successor to SSL and is used to encrypt information in a variety of applications, but is most often encountered by users in their Web browsers. Sites use it to secure their communications with users, and in the wake of the revelations about the ways that the NSA is eavesdropping on email and Web traffic its use has become much more important. The IETF is trying to help ensure that it’s deployed properly, reducing the errors that could make surveillance and other attacks easier.
  • “There is a renewed and urgent interest in the IETF to increase the security of transmissions over the Internet. Many application protocols have defined methods for using TLS to authenticate the server (and sometimes the client), and to encrypt the connection between the client and server. However, there is a diversity of definitions and requirements, and that diversity has caused confusion for application developers and also has led to lack of interoperability or lack of deployment. Implementers and deployers are faced with multiple security issues in real-world usage of TLS, which currently does not preclude insecure ciphers and modes of operation,” the description in the working group’s charter says.
Paul Merrell

NSA surveillance may be legal - but it's unconstitutional - The Washington Post - 0 views

  • Laura K. Donohue is a professor at Georgetown University Law Center and director of Georgetown’s Center on National Security and the Law. The National Security Agency’s recently revealed surveillance programs undermine the purpose of the Foreign Intelligence Surveillance Act, which was established to prevent this kind of overreach. They violate the Fourth Amendment’s guarantee against unreasonable search and seizure. And they underscore the dangers of growing executive power.
  • Another program, PRISM, disclosed by the Guardian and The Washington Post, allows the NSA and the FBI to obtain online data including e-mails, photographs, documents and connection logs. The information that can be assembledabout any one person — much less organizations, social networks and entire communities — is staggering: What we do, think and believe.The government defends the programs’ legality, saying they comply with FISA and its amendments. It may be right, but only because FISA has ceased to provide a meaningful constraint.Under the traditional FISA, if the government wants to conduct electronic surveillance, it must make a classified application to a special court, identitying or describing the target. It must demonstrate probable cause that the target is a foreign power or an agent thereof, and that the facilities to be monitored will be used by the target.In 2008, Congress added section 702 to the statute, allowing the government to use electronic surveillance to collect foreign intelligence on non-U.S. persons it reasonably believes are abroad, without a court order for each target. A U.S. citizen may not intentionally be targeted.To the extent that the FISC sanctioned PRISM, it may be consistent with the law. But it is disingenuous to suggest that millions of Americans’ e-mails, photographs and documents are “incidental” to an investigation targeting foreigners overseas.
  • Another program, PRISM, disclosed by the Guardian and The Washington Post, allows the NSA and the FBI to obtain online data including e-mails, photographs, documents and connection logs. The information that can be assembledabout any one person — much less organizations, social networks and entire communities — is staggering: What we do, think and believe.The government defends the programs’ legality, saying they comply with FISA and its amendments. It may be right, but only because FISA has ceased to provide a meaningful constraint.
  • ...3 more annotations...
  • Under the traditional FISA, if the government wants to conduct electronic surveillance, it must make a classified application to a special court, identitying or describing the target. It must demonstrate probable cause that the target is a foreign power or an agent thereof, and that the facilities to be monitored will be used by the target.In 2008, Congress added section 702 to the statute, allowing the government to use electronic surveillance to collect foreign intelligence on non-U.S. persons it reasonably believes are abroad, without a court order for each target. A U.S. citizen may not intentionally be targeted.To the extent that the FISC sanctioned PRISM, it may be consistent with the law. But it is disingenuous to suggest that millions of Americans’ e-mails, photographs and documents are “incidental” to an investigation targeting foreigners overseas.The telephony metadata program raises similar concerns. FISA did not originally envision the government accessing records. Following the 1995 Oklahoma City bombing, Congress allowed applications for obtaining records from certain kinds of businesses. In 2001, lawmakers further expanded FISA to give the government access to any business or personal records. Under section 215 of the Patriot Act, the government no longer has to prove that the target is a foreign power. It need only state that the records are sought as part of an investigation to protect against terrorism or clandestine intelligence.
  • The telephony metadata program raises similar concerns. FISA did not originally envision the government accessing records. Following the 1995 Oklahoma City bombing, Congress allowed applications for obtaining records from certain kinds of businesses. In 2001, lawmakers further expanded FISA to give the government access to any business or personal records. Under section 215 of the Patriot Act, the government no longer has to prove that the target is a foreign power. It need only state that the records are sought as part of an investigation to protect against terrorism or clandestine intelligence.This means that FISA can now be used to gather records concerning individuals who are neither the target of any investigation nor an agent of a foreign power. Entire databases — such as telephony metadata — can be obtained, as long as an authorized investigation exists.Congress didn’t pass Section 215 to allow for the wholesale collection of information. As Rep. F. James Sensenbrenner Jr. (R-Wis.), who helped draft the statute, wrote in the Guardian: “Congress intended to allow the intelligence communities to access targeted information for specific investigations. How can every call that every American makes or receives be relevant to a specific investigation?”As a constitutional matter, the Supreme Court has long held that, where an individual has a reasonable expectation of privacy, search and seizure may occur only once the government has obtained a warrant, supported by probable cause and issued by a judge. The warrant must specify the places to be searched and items to be seized.
  • There are exceptions to the warrant requirement. In 1979 the court held that the use of a pen register to record numbers dialed from someone’s home was not a search. The court suggested that people who disclose their communications to others assume the risk that law enforcement may obtain the information.More than three decades later, digitization and the explosion of social-network technology have changed the calculus. In the ordinary course of life, third parties obtain massive amounts of information about us that, when analyzed, have much deeper implications for our privacy than before.As for Section 702 of FISA, the Supreme Court has held that the Fourth Amendment does not protect foreigners from searches conducted abroad. But it has never recognized a foreign intelligence exception to the warrant requirement when foreign-targeted searches result in the collection of vast stores of citizens’ communications.Americans reasonably expect that their movements, communications and decisions will not be recorded and analyzed by the government. A majority of the Supreme Court seems to agree. Last year, the court considered a case involving 28-day GPS surveillance. Justice Samuel Alito suggested that in most criminal investigations, long-term monitoring “impinges on expectations of privacy.” Justice Sonia Sotomayor recognized that following a person’s movements “reflects a wealth of detail about her familial, political, professional, religious, and sexual associations.”The FISC is supposed to operate as a check. But it is a secret court, notorious for its low rate of denial. From 1979 to 2002, it did not reject a single application. Over the past five years, out of nearly 8,600 applications, only two have been denied.
Paul Merrell

CCC | GCHQ to face European Court over mass surveillance - 0 views

  • Three of Britain’s most prominent campaign groups have today announced the launch of a legal challenge against the actions of GCHQ, alleging it has illegally intruded on the privacy of millions of British and European citizens. Big Brother Watch, the Open Rights Group and English PEN, together with German internet activist Constanze Kurz, have filed papers at the European Court of Human Rights bringing an action against the UK Government.

 They allege that by collecting vast amounts of data leaving or entering the UK, including the content of emails and social media messages, the UK’s spy agency has acted illegally. When details recently emerged in the media about the Prism and Tempora programmes, codenames for previously secret online surveillance operations, it was revealed that GCHQ has the capacity to collect more than 21 petabytes of data a day – equivalent to sending all the information in all the books in the British Library 192 times every 24 hours. The disclosures have raised serious parliamentary concerns both in Britain and at the EU level. Deighton Pierce Glynn solicitors represent the applicants, instructing Helen Mountfield QC of Matrix Chambers and Tom Hickman and Ravi Mehta of Blackstone Chambers. The legal action will be funded through donations at www.privacynotprism.org.uk
  •  
    One I missed from October 3, 2013. The case was later filed with the European Court of Human Rights as "Joint Application Under Article 34 of Big Brother Watch, Open Rights Group, English Pen Dr Constanze Kurz (Applicants) - v - United Kingdom (Respondent)." There is no appeal from decisions of this Court.
Paul Merrell

Abbas signs Application for Palestinian ICC Membership - Between a Rock and a Hard Plac... - 0 views

  • PA President Mahmoud Abbas signed the application for Palestine’s accession to the Rome Statute and the International Criminal Court (ICC). Abbas signed the application on Wednesday, in response to the UN Security Council’s rejection of a Jordanian sponsored draft resolution on Tuesday. The resolution called for a fixed timeline for the end of the Israeli occupation of Palestine.
  • The rejected resolution called for a 12-months timeline for a final peace accord between Israel and Palestine and the full withdrawal of Israeli troops from Palestinian territories by the end of 2017.
  • The rejected draft resolution was harshly criticized by imprisoned Fatah leader Marwan Barghouti, other progressive Fatah members as well as by the PFLP and others. One of the major points of contention was that the proposed draft resolution, according to its Palestinian opponents, risked waving the right of return of displaced Palestinians.
  • ...2 more annotations...
  • Russia, China and France voted in favor of the proposed resolution while the U.S. and Australia voted against. The UK, Rwanda, Nigeria and South Korea abstained, thus preventing the necessary majority. The U.S., however, noted that it would have used its veto right as permanent Security Council member, had the draft resolution received the votes necessary for its adoption. The Palestinian Authority led by PA President Mahmoud Abbas noted that the PA would sign an application to accede to the International Criminal Court in the Rome Statute. Arguably, a Palestinian accession to the ICC would endow it with the right to lodge charges for war crimes at the ICC. Signing the Rome Statute, however, is a two-edged sword as it also makes Palestine subject to the ICC.
  • The ICC has been widely criticized for being used to enforce western geopolitical interests as well as of selective prosecution. Whether a Palestinian ICC membership would ever result in the prosecution of Israeli war crimes is highly questionable. Arguably, it more likely that the ICC would be used by non-ICC member USA to demand the prosecution of Palestinians.
Gary Edwards

Obama's Occidental College transcripts provides concrete evidence to annul his presiden... - 1 views

  • f Obama didn’t legally have his name changed from Barry to Barack then the birth certificate he passed to Congress is a fake, a forgery.
  • If his name was registered as Barry Soetoro even though Obama claims his real name is Barack Obama then Obama defrauded the state of California in order to receive college funding. 
  • Obama knowingly presented a false document to the state wherein he claimed to be a foreign student in order to illegally acquire financial aid.
  •  
    Interesting update on Obama.  His Occidental College Registration records are on file with the State of California.  They reveal that he is indeed ineligible to President of the US. The registration form shows that he is an Indonesian national (citizen), and his religion is Islam.   There is no record of a Barack Obama or Barry Soetoro having applied for US Citizenship, or even attempting to renew/re file his citizenship claim of having been born in Hawaii.  Either way though, Obama fails the Constitutional "natural born Citizen" test, as his father was a British colonial citizen of Kenya.  The term "natural born Citizen" requires that both parent be US Citizens. The Occidental College Registration also shows that Obama, aka Barry Soetoro, applied for financial aid and was awarded a fellowship for foreign students from Fulbright Foundation Scholarship program. "Occidental Registration transcript states ~ Name: Barry Soetoro - Religion: Islam - Nationality: Indonesian The smoking gun evidence that annuls Obama's presidency is Obama's college transcripts regarding his application for and receiving of foreign student aid.  Obama's college transcripts from Occidental College indicates that Obama, under the name Barry Soetoro, received financial aid as a foreign student from Indonesia as an undergraduate at the school. The transcript from Occidental College shows that Obama (Barry Soetoro) applied for financial aid and was awarded a fellowship (scholarship) for foreign students from the Fulbright Foundation Scholarship program - an international educational exchange program sponsored by the U.S. government.  Grants are available for U.S. citizens to go abroad and for non-U.S. citizens with no U.S. permanent residence to come to the U.S.  To qualify, for the non-US citizen scholarship to study in the U.S., a student applicant must claim and provide proof of foreign citizenship. This document would seem to provide the smoking gun that many of Obama
Gary Edwards

Bookworm Room » Is the IRS scandal the worst political scandal in American hi... - 0 views

  •  
    Very powerful and well written commentary on the IRS Scandal.  A must read! "Ignore all that. The absolute worst scandal that's emerged lately, and the worst administration scandal in American history is the IRS scandal. Why? Because you, the People, became the targets of a comprehensive federal government effort to stifle dissent, one made using the government's overwhelming and disproportionate policing and taxing powers. All of the other scandals, going back to Andrew Johnson's post-Civil War scandals, Warren G. Harding's 1920s Teapot Dome scandal, Nixon's Watergate, Reagan's Iran-Contra, and Clinton's Oval Office sexcapades have actually been narrowly focused acts of cronyism, garden-variety political chicanery, or personal failings. It's been insider stuff. The IRS scandal, by contrast, is a direct attack on the American people. Right now, Progressives throughout America are pretending that this scandal doesn't matter: "Obama wasn't involved." "Tea Partiers had it coming because they're all corrupt." "Obama would have won the election anyway." "It was just a coincidence that the only groups that had their applications scrutinized, sometimes for years, were politically conservative. It means nothing that, when one group changed its name to sound Progressive, its application was approved in only three weeks." "This is just a bureaucratic snafu." "It's a few rogue agents in Ohio." Those who offer these excuses are either morally flawed themselves or delusional idiots. "
Gary Edwards

Byron York: Justice Department demolishes case against Trump order | Washington Examiner - 1 views

  •  
    "James Robart, the U.S. district judge in Washington State, offered little explanation for his decision to stop President Trump's executive order temporarily suspending non-American entry from seven terror-plagued countries. Robart simply declared his belief that Washington State, which in its lawsuit against Trump argued that the order is both illegal and unconstitutional, would likely win the case when it is tried. Now the government has answered Robart, and unlike the judge, Justice Department lawyers have produced a point-by-point demolition of Washington State's claims. Indeed, for all except the most partisan, it is likely impossible to read the Washington State lawsuit, plus Robart's brief comments and writing on the matter, plus the Justice Department's response, and not come away with the conclusion that the Trump order is on sound legal and constitutional ground. Beginning with the big picture, the Justice Department argued that Robart's restraining order violates the separation of powers, encroaches on the president's constitutional and legal authority in the areas of foreign affairs, national security, and immigration, and "second-guesses the president's national security judgment" about risks faced by the United States. Indeed, in court last week, Robart suggested that he, Robart, knows as much, or perhaps more, than the president about the current state of the terrorist threat in Yemen, Somalia, Libya, and other violence-plagued countries. In an exchange with Justice Department lawyer Michelle Bennett, Robart asked, "How many arrests have there been of foreign nationals for those seven countries since 9/11?" "Your Honor, I don't have that information," said Bennett. "Let me tell you," said Robart. "The answer to that is none, as best I can tell. So, I mean, you're here arguing on behalf of someone [President Trump] that says: We have to protect the United States from these individuals coming from these countries, and there's no support for that."
Gary Edwards

Obama's Occidental College transcripts provides concrete evidence to annul his presiden... - 1 views

  •  
    Occidental Registration transcript states ~ Name: Barry Soetoro - Religion: Islam - Nationality: Indonesian The smoking gun evidence that annuls Obama's presidency is Obama's college transcripts regarding his application for and receiving of foreign student aid.  Obama's college transcripts from Occidental College indicates that Obama, under the name Barry Soetoro, received financial aid as a foreign student from Indonesia as an undergraduate at the school. The transcript from Occidental College shows that Obama (Barry Soetoro) applied for financial aid and was awarded a fellowship (scholarship) for foreign students from the Fulbright Foundation Scholarship program - an international educational exchange program sponsored by the U.S. government.  Grants are available for U.S. citizens to go abroad and for non-U.S. citizens with no U.S. permanent residence to come to the U.S.  To qualify, for the non-US citizen scholarship to study in the U.S., a student applicant must claim and provide proof of foreign citizenship. This document would seem to provide the smoking gun that many of Obama's detractors have been seeking.  The United States Constitution requires that Presidents (and Vice Presidents) of the United States be natural born citizens of the United States.
Paul Merrell

Remarks by Director David H. Petraeus at In-Q-Tel CEO Summit - Central Intelligence Agency - 0 views

  • In any event, our partnership with In-Q-Tel is essential to helping identify and deliver groundbreaking technologies with mission-critical applications to the CIA and to our partner agencies.
  • As you know, our Agency has a global charter to collect intelligence. It’s our job to ensure that challenges that arise in any corner of the world are not surprises to the President or to other policymakers. Certainly, we will continue relentlessly to pursue terrorists and support the troops in several different theaters. That is imperative, and the last year has seen considerable achievement in the fight against al-Qa‘ida and its affiliates. But, to use the kids’ soccer analogy, we cannot turn the counterterrorist fight into a game of magnetball, in which the leadership is always focused on the counterterror mission. Everyone can’t flock to the ball and lose sight of the rest of the field—the whole rest of the world. And it’s an enormous field to cover:  again, the whole world, with proliferation of weapons and technology, cyber threats, counterintelligence threats, the next developments in the evolution of the Arab Spring, Iran, North Korea, China, illegal narcotics, emerging powers, non-state organizations, and even lone wolves. Our duty is nothing less than to be on top of every potential foreign challenge and opportunity facing the United States—and we now have to do it without the steady budget growth we saw in the years after 9/11. And this is why my job is so intellectually stimulating.
  • First, given the digital transparency I just mentioned, we have to rethink our notions of identity and secrecy. In the digital world, data is everywhere, as you all know well. Data is created constantly, often unknowingly and without permission. Every byte left behind reveals information about location, habits, and, by extrapolation, intent and probable behavior. The number of data points that can be collected is virtually limitless—presenting, of course, both enormous intelligence opportunities and equally large counterintelligence challenges. We must, for example, figure out how to protect the identity of our officers who increasingly have a digital footprint from birth, given that proud parents document the arrival and growth of their future CIA officer in all forms of social media that the world can access for decades to come. Moreover, we have to figure out how to create the digital footprint for new identities for some officers. As you all know, exploiting the intelligence opportunities—which is an easier subject to discuss in an unclassified setting than the counterintelligence challenges—will require a new class of in-place and remote sensors that operate across the electromagnetic spectrum. Moreover, these sensors will be increasingly interconnected.
  • ...2 more annotations...
  • The current “Internet of PCs” will move, of course, toward an “Internet of Things”—of devices of all types—50 to 100 billion of which will be connected to the Internet by 2020. As you know, whereas machines in the 19th century learned to do, and those in the 20th century learned to think at a rudimentary level, in the 21st century, they are learning to perceive—to actually sense and respond. Key applications developed by our In-Q-Tel investment companies are focused on technologies that are driving the Internet of Things. These include: Item identification, or devices engaged in tagging; Sensors and wireless sensor networks—devices that indeed sense and respond; Embedded systems—those that think and evaluate; And, finally, nanotechnology, allowing these devices to be small enough to function virtually anywhere.
  • Items of interest will be located, identified, monitored, and remotely controlled through technologies such as radio-frequency identification, sensor networks, tiny embedded servers, and energy harvesters—all connected to the next-generation Internet using abundant, low cost, and high-power computing—the latter now going to cloud computing, in many areas greater and greater supercomputing, and, ultimately, heading to quantum computing. In practice, these technologies could lead to rapid integration of data from closed societies and provide near-continuous, persistent monitoring of virtually anywhere we choose. “Transformational” is an overused word, but I do believe it properly applies to these technologies, particularly to their effect on clandestine tradecraft. Taken together, these developments change our notions of secrecy and create innumerable challenges—as well as opportunities.
  •  
    I missed this gem before, from March 1, 2012. Speech by then-CIA chief Gen. David Patraeus to a group of reps. from ICT startups who are employed by CIA through its In-Q-Tel technology development non-profit corp. See https://www.iqt.org/about-iqt/ Patraeus announces that the Internet of Things (devices of all kinds) is becoming an intelligence target. And that boils down to everything from your clock radio to your home's climate control system and more becoming a potential intelligence source. If the CIA is investing in this, you can bit your bippy that NSA is too; Patraeus mentions that "partner agencies" are also receiving applications via the In-Q-Tel investments.  Finally, Patraeus also acknowledges that the intelligence mission extends far beyond counter-terrorism, offering some detail. So it seems that before the Snowden leaks his the press, the intelligence mission was not all about counter-terrorism.
Paul Merrell

9 Calif. law enforcement agencies connected to cellphone spying technology - 0 views

  • News10 submitted numerous public records requests to every major law enforcement agency in Northern California to find out which departments are using StingRay technology. A StingRay is a device law enforcement uses to track people and collect real time data from every cellphone within a certain radius.
  • Some agencies provided documentation, but none would discuss how StingRays work, or even admit they have them. However, records show at least seven Northern California agencies have the technology and two more just received grants to buy it in 2014.
  • San Jose Police Department provided News10 with documentation that provided insight into what agencies have the technology and why they want it.A 2012 grant application submitted to the Bay Area Urban Area Shield Initiative (UASI), which was approved, said San Jose police requested feedback from numerous other agencies that already use StingRays."Research of the product included testing by San Jose Police and technology and equipment feedback from the U.S. Marshals Service, (REDACTED), the Oakland Police Department, the Sacramento Sheriff's Department, the San Diego Sheriff's Department, the Los Angeles Police Department, and the Los Angeles Sheriff's Department. This technology is in use at the law enforcement agencies listed [above]," the application states.They explain how the surveillance system would be used in conjunction with Oakland and San Francisco police in another section of the grant application."We will work with the Fusion Center to partner with San Francisco and Oakland to ensure we have the ability to cover all of the Bay Area in deploying cellphone tracking technology in any region of the Bay Area at a moment's notice."
  • ...2 more annotations...
  • This graphic illustrates how a StingRay works. Signals from cellphones within the device's radius are bounced to law enforcement. The information relayed may include names, phone numbers, locations, call records and even text messages.
  • Terrorism is used as the primary justification for purchasing StingRay technology in every grant application obtained by News10. San Jose police, Fremont police, the Alameda County District Attorney's Office and Oakland police say a StingRay could be used to track and disrupt terrorist networks and protect critical infrastructure.However, arrest records from Oakland and Los Angeles show that StingRays are being used for routine police work. Lye says the potential for "mission creep" is concerning."Mission creep is an unfortunate but extremely common phenomenon with surveillance technology," she said. "By 'mission creep,' I mean the phenomenon in which one purpose is offered to justify the collection of the data, but the data is ultimately used for many other entirely separate purposes."
Gary Edwards

Articles of Impeachment Against Obama - 0 views

  •  
    Sarasota, FL ( August 12, 2013) - The National Black Republican Association (NBRA) based in Sarasota, FL, headed by Chairman Frances Rice, filed Articles of Impeachment against President Barack Obama with the following language.   We, black American citizens, in order to free ourselves and our fellow citizens from governmental tyranny, do herewith submit these Articles of Impeachment to Congress for the removal of President Barack H. Obama, aka, Barry Soetoro, from office for his attack on liberty and commission of egregious acts of despotism that constitute high crimes and misdemeanors.   On July 4, 1776, the founders of our nation declared their independence from governmental tyranny and reaffirmed their faith in independence with the ratification of the Bill of Rights in 1791.   Asserting their right to break free from the tyranny of a nation that denied them the civil liberties that are our birthright, the founders declared:   "When a long train of abuses and usurpations, pursuing invariably the same Object evinces a design to reduce them under absolute Despotism, it is their right, it is their duty, to throw off such Government, and to provide new Guards for their future security."  -  Declaration of Independence, July 4, 1776.   THE IMPEACHMENT POWER   Article II, Section IV of the United States Constitution provides: "The President, Vice President and all civil Officers of the United States, shall be removed from Office on Impeachment for, and Conviction of, Treason, Bribery, or other high Crimes and Misdemeanors."   THE ARTICLES OF IMPEACHMENT   In his conduct of the office of President of the United States, Barack H. Obama, aka Barry Soetoro, personally and through his subordinates and agents, in violation or disregard of the constitutional rights of citizens and in violation of his constitutional duty to take care that the laws be faithfully executed, has prevented, obstructed, and impeded the administration of justice, in that:   ARTICL
Paul Merrell

Emails Show Feds Asking Florida Cops to Deceive Judges | Threat Level | WIRED - 0 views

  • Police in Florida have, at the request of the U.S. Marshals Service, been deliberately deceiving judges and defendants about their use of a controversial surveillance tool to track suspects, according to newly obtained emails. At the request of the Marshals Service, the officers using so-called stingrays have been routinely telling judges, in applications for warrants, that they obtained knowledge of a suspect’s location from a “confidential source” rather than disclosing that the information was gleaned using a stingray. A series of five emails (.pdf) written in April, 2009, were obtained today by the American Civil Liberties Union showing police officials discussing the deception. The organization has filed Freedom of Information Act requests with police departments throughout Florida seeking information about their use of stingrays.
  • The initial email, which bears the subject line “Trap and Trace Confidentiality,” was sent by Sarasota police Sgt. Kenneth Castro to colleagues at the North Port (Florida) Police Department. It was sent after Assistant State Attorney Craig Schaefer contacted police to express concern about an application for a probable cause warrant filed by a North Port police detective. The application “specifically outlined” for the court the investigative means used to locate the suspect. Castro informs his colleague that the application should be revised to conceal the use of the surveillance equipment. “In the past,” Castro writes, “and at the request of the U.S. Marshalls (sic), the investigative means utilized to locate the suspect have not been revealed so that we may continue to utilize this technology without the knowledge of the criminal element. In reports or depositions we simply refer to the assistance as ‘received information from a confidential source regarding the location of the suspect.’ To date this has not been challenged, since it is not an integral part of the actual crime that occurred.”
  • He then requests that “If this is in fact one of your cases, could you please entertain either having the Detective submit a new PCA and seal the old one, or at minimum instruct the detectives for future cases, regarding the fact that it is unnecessary to provide investigative means to anyone outside of law enforcement, especially in a public document.” Capt. Robert Estrada, at the North Port Police Department, later confirmed in an email, “[W]e have changed the PCA within the agency after consulting with the [State Attorney's Office]. The PCA that was already within the court system according to the SAO will have to remain since it has already been submitted. At some point and time the SAO will submit the changed document as an addendum. We have implemented within our detective bureau to not use this investigative tool on our documents in the future.”
  • ...1 more annotation...
  • The release of the emails showing interference by a state attorney and the U.S. Marshals Service comes two weeks after agents from the Marshals Service took the extraordinary measure of seizing other public documents related to stingrays from the Sarasota Police Department in order to prevent the ACLU from examining them. The documents, which were responsive to a FOIA request seeking information about Sarasota’s use of the devices, had been set aside for ACLU attorneys to examine in person. But hours before they arrived for the appointment to view the documents, someone from the Marshals Service swooped in to seize the documents and cart them to another location. ACLU staff attorney Nathan Freed Wessler called the move “truly extraordinary and beyond the worst transparency violations” the group has seen regarding documents detailing police use of the technology.
  •  
    Unfortunately for the cops, stingrays also provide location information. See http://www.wired.com/2014/03/harris-stingray-nda/ That brings them directly within the scope of a ruling a few days ago by the Eleventh U.S. Circuit Court of Appeals (territory includer Florida) that law enforcement must obtain a warrant based on probable cause to believe that a crime has occurred in order to use a device that provides location data. http://www.ca11.uscourts.gov/opinions/ops/201212928.pdf
Paul Merrell

'This Week' Transcript: Ambassador Samantha Power - ABC News - 0 views

  • STEPHANOPOULOS: And we are joined now by the U.S. Ambassador to the United Nations Samantha Power. Thanks for coming back to This Week. And you know, the president said he's prepared to strike Syria. Those strikes could be imminent. Will the United States try to get UN Security Council authorization first? Or do you accept now that's just not going to be possible? SAMANTHA POWER, U.S. AMBASSADOR TO THE UNITED NATIONS: Well, let me say that Secretary Kerry just convened a meeting of the Security Council on Friday which showcased just how much support there is on the Security Council and in the broader international community for the anti-ISIL effort. STEPHANOPOULOS: But the Russia veto.
  • POWER: Russia has vetoed in the past, but on very different issues. I think Russia has made clear for a long time its opposition to ISIL. The Iraqis have appealed to the international community to come to their defense not only in Iraq, but also to go after safe havens in foreign countries. And what they mean by that of course is Syria. And they're quite explicit about that. So they have made an appeal to the international community for collective defense. And we think we have a legal basis we need if the president decides... STEPHANOPOULOS: Without a UN authorization. POWER: Consistent with the UN charter, we -- it will depend on the facts and circumstances of any particular strike in Syria, but we have a legal basis we need.
  •  
    Context: U.S. Ambassador to the U.N., Samantha Power, holds the U.N. Security Council's rotating chair this month. Powers'  claims a right for the U.S. to wage war against ISIL in Syria on grounds of the collective security exception to the U.N. Charter's prohibition; that is, that the U.S. has a collective security agreement with the nation of Iraq, that makes it lawful for the U.S. to strike ISIL. True enough as a matter of international law, ignoring the fact that Obama has yet to obtain permission from the U.S. Congress, which the U.S. Constitution requires him to do. But ISIL is not the nation of Syria; hence to attack ISIL in Syria, an additional exception is necessary for both Iraq and the U.S. The only other recognized exception that might seem to do deals with the situation when a nation in which a private organization inflicting harm on another nation  is "unwilling or unable" to protect the second nation (Iraq) from the depradations of the private organization. And that is where Powers' legal analysis dissembles because the U.S. has been actively attempting to overthrow the Syrian government via proxy terrorist organizations including ISIL. So the U.S. lacks clean hands in claiming any lawful right to invade Syria on the theory that the Syrian government is unwilling or unable to put down the ISIL organization. The Syrian government is certainly willing and has been attempting to do so. But its inability to do so thus far is entirely due to the U.S., its Gulf Coast state allies, and its ally Turkey continuing to supply ISIL and other terrorist groups in Syria with weapons, training, and supplies, aimed at overthrowing the Syrian government. The doctrine of unclean hands has limited applicability in international law governing human rights. See Lisa LaPlante, The Law of Remedies and the Clean Hands Doctrine: Exclusionary Reparation Policies in Peru's Political Transition, 23 Am Univ Int Law Rev 50 (2007), https://digitalcommons.wcl.american.edu/cg
Paul Merrell

U.S. deserter needs Iraq war crimes evidence to be refugee: EU court | Reuters - 0 views

  • (Reuters) - A U.S. soldier who deserted because he thought the Iraq war was illegal could have grounds for seeking asylum in Germany but only if he can show he would have been involved in war crimes, Europe's highest court said on Thursday.

    The European Court of Justice added that even if Andre Shepherd could prove war crimes were very likely to have been committed, he would still have to show he had no alternative to desertion, such as becoming a conscientious objector.

    The Luxembourg-based court was asked for guidance by a German court after Shepherd took legal action when German authorities rejected his asylum application.

     
     
     
     
     
     

    The final decision will be taken by the German court in accordance with the European court's ruling.

  • Shepherd, who served in Iraq between September 2004 and February 2005 as an Apache helicopter mechanic in the 412th Aviation Support Battalion, deserted in 2007 after being ordered to return to Iraq. He applied for asylum in Germany, where he was based. He remains in Germany."When I read and heard about people being ripped to shreds from machine guns or being blown to bits by the Hellfire missiles I began to feel ashamed about what I was doing," Shepherd told a news conference in Frankfurt in 2008."I could not in good conscience continue to serve," the army specialist from Cleveland, Ohio, said.Shepherd believed he should no longer participate in a war he considered unlawful and in war crimes he believed were committed in Iraq. He said he risked criminal prosecution in the United States because of his desertion.
Paul Merrell

Island puts its EU Bid on Ice | nsnbc international - 0 views

  • Foreign Minister Sveinsson issued a formal statement, saying that he had informed the current Latvian EU President as well as the European Commission about Island’s decision to withdraw its EU membership application.
  • The application was submitted to the EU six years ago. Gunnar Bragi Sveinsson explained: “The EU and Iceland have discussed the country’s position on the status of its bid to join the European Union. … The government doesn’t intend to resume preparing for EU membership”. The decision didn’t come without forewarning. In January Island’s Prime Minister Sigmundur Davið Gunnlaugsson went on the record about the possible withdrawal of Island’s EU membership application, saying: “Participation in EU talks is not really valid any more. .. Both due to changes in the European Union and because it’s not in line with the policies of the ruling government to accept everything that the last government was willing to accept. Because of that we are back to square one”. The announcement about Island’s withdrawal of its application for EU membership comes as EU-skeptic parties in the Scandinavian neighbor country Denmark complain that their parties are denied access to documents which other parties receive. That is, documents pertaining an upcoming decision about whether Denmark should abolish its reservations about the coordination of Danish and EU law.
  • One of the primary drivers behind Island’s reservations with regard to an EU membership are EU fishing quota which, according to Icelandic fishery experts would be devastating for the Atlantic  island nation’s fishery and related industries. Island is a member of the European Economic Area (EEA), the European Free Trade Association (EFTA) and a member of the Schengen areas. Reservations about a full EU membership are also driven by an increasing EU interference in national sovereignty with regard to legislation, the development of a military column within the EU, lack of transparency, money spent on influencing EU election outcomes by infiltrating social media, corruption and interference into domestic economic and monetary policies such as in Greece.
  • ...1 more annotation...
  • Foreign Minister Sveinsson noted that any future decision about Island’s EU membership would have to be based on the outcome of a referendum. So far, Island is content with its EEA and EFFTA membership.
  •  
    Make that Iceland rather than Island. Why buy a ticket to travel on a sinking ship?
clausonlaw22

How Much Does Mental Health Disability Pay In 2023 - 0 views

  •  
    How Much Does Mental Health Disability Pay In 2023 Social Security Disability Insurance (SSDI or SSD) is the sole source of income for millions of Americans who are unable to work due to a non-work-related injury or illness. SSDI benefits are available only to workers and former workers with a substantial employment history. Both physical and mental disabilities are covered under the Social Security Act. While SSDI pays the same benefits for qualifying mental impairments as it does for physical impairments, the amount each individual receives in benefits depends on their history of earnings. This blog post will explain how Social Security defines qualifying disabilities, including mental impairments, and determines each individual's benefit payment. At The Clauson Law Firm, we know how important it is for every disability applicant and benefit recipient to understand how their benefits are arrived at, what affects their continued benefits, and how their benefits can change over time. Contact Clauson Law today if you have questions about qualifying for SSDI benefits or need help filing a claim or appealing a denial. We've helped thousands of disabled people across the U.S. with their disability claims. Mental Impairments And Social Security Disability More than 40% of SSD cases in the United States have some mental health or intellectual impairment as a component in the claim. Mental health impairments can result from an almost unlimited array of circumstances, including traumatic stress; depression; genetic predisposition to depression, bipolar disorder, or schizophrenia; or traumatic brain injury (TBI); one of the many forms of dementia; and others. The ways in which mental impairments affect the person suffering can often interfere with their ability to perform work on a regular basis. These are discussed in detail in the section "Common Mental Disabilities that May Qualify for SSDI" below. But first, let's look at how you qualify for SSD benefits and how you
  •  
    How Much Does Mental Health Disability Pay In 2023
1 - 20 of 180 Next › Last »
Showing 20 items per page