Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged black-sites

Rss Feed Group items tagged

Paul Merrell

The disappeared: Chicago police detain Americans at abuse-laden 'black site' | US news ... - 0 views

  • The Chicago police department operates an off-the-books interrogation compound, rendering Americans unable to be found by family or attorneys while locked inside what lawyers say is the domestic equivalent of a CIA black site.
  • The secretive warehouse is the latest example of Chicago police practices that echo the much-criticized detention abuses of the US war on terrorism. While those abuses impacted people overseas, Homan Square – said to house military-style vehicles, interrogation cells and even a cage – trains its focus on Americans, most often poor, black and brown. Unlike a precinct, no one taken to Homan Square is said to be booked. Witnesses, suspects or other Chicagoans who end up inside do not appear to have a public, searchable record entered into a database indicating where they are, as happens when someone is booked at a precinct. Lawyers and relatives insist there is no way of finding their whereabouts. Those lawyers who have attempted to gain access to Homan Square are most often turned away, even as their clients remain in custody inside.
  • The Chicago police department operates an off-the-books interrogation compound, rendering Americans unable to be found by family or attorneys while locked inside what lawyers say is the domestic equivalent of a CIA black site.
  • ...7 more annotations...
  • The facility, a nondescript warehouse on Chicago’s west side known as Homan Square, has long been the scene of secretive work by special police units. Interviews with local attorneys and one protester who spent the better part of a day shackled in Homan Square describe operations that deny access to basic constitutional rights. Alleged police practices at Homan Square, according to those familiar with the facility who spoke out to the Guardian after its investigation into Chicago police abuse, include: Keeping arrestees out of official booking databases. Beating by police, resulting in head wounds. Shackling for prolonged periods. Denying attorneys access to the “secure” facility. Holding people without legal counsel for between 12 and 24 hours, including people as young as 15. At least one man was found unresponsive in a Homan Square “interview room” and later pronounced dead.
  • Brian Jacob Church, a protester known as one of the “Nato Three”, was held and questioned at Homan Square in 2012 following a police raid. Officers restrained Church for the better part of a day, denying him access to an attorney, before sending him to a nearby police station to be booked and charged.
  • The facility, a nondescript warehouse on Chicago’s west side known as Homan Square, has long been the scene of secretive work by special police units. Interviews with local attorneys and one protester who spent the better part of a day shackled in Homan Square describe operations that deny access to basic constitutional rights. Alleged police practices at Homan Square, according to those familiar with the facility who spoke out to the Guardian after its investigation into Chicago police abuse, include: Keeping arrestees out of official booking databases. Beating by police, resulting in head wounds. Shackling for prolonged periods. Denying attorneys access to the “secure” facility. Holding people without legal counsel for between 12 and 24 hours, including people as young as 15. At least one man was found unresponsive in a Homan Square “interview room” and later pronounced dead.
  • “Homan Square is definitely an unusual place,” Church told the Guardian on Friday. “It brings to mind the interrogation facilities they use in the Middle East. The CIA calls them black sites. It’s a domestic black site. When you go in, no one knows what’s happened to you.”
  • The secretive warehouse is the latest example of Chicago police practices that echo the much-criticized detention abuses of the US war on terrorism. While those abuses impacted people overseas, Homan Square – said to house military-style vehicles, interrogation cells and even a cage – trains its focus on Americans, most often poor, black and brown. Unlike a precinct, no one taken to Homan Square is said to be booked. Witnesses, suspects or other Chicagoans who end up inside do not appear to have a public, searchable record entered into a database indicating where they are, as happens when someone is booked at a precinct. Lawyers and relatives insist there is no way of finding their whereabouts. Those lawyers who have attempted to gain access to Homan Square are most often turned away, even as their clients remain in custody inside.
  • “It’s sort of an open secret among attorneys that regularly make police station visits, this place – if you can’t find a client in the system, odds are they’re there,” said Chicago lawyer Julia Bartmes. Chicago civil-rights attorney Flint Taylor said Homan Square represented a routinization of a notorious practice in local police work that violates the fifth and sixth amendments of the constitution. “This Homan Square revelation seems to me to be an institutionalization of the practice that dates back more than 40 years,” Taylor said, “of violating a suspect or witness’ rights to a lawyer and not to be physically or otherwise coerced into giving a statement.”
  • “It’s sort of an open secret among attorneys that regularly make police station visits, this place – if you can’t find a client in the system, odds are they’re there,” said Chicago lawyer Julia Bartmes. Chicago civil-rights attorney Flint Taylor said Homan Square represented a routinization of a notorious practice in local police work that violates the fifth and sixth amendments of the constitution.
Paul Merrell

Revealed: Senate report contains new details on CIA black sites | Al Jazeera America - 0 views

  • A Senate Intelligence Committee report provides the first official confirmation that the CIA secretly operated a black site prison out of Guantánamo Bay, two U.S. officials who have read portions of the report have told Al Jazeera. The officials — who spoke on condition of anonymity because the 6,600-page report on the CIA’s detention and interrogation program remains classified — said top-secret agency documents reveal that at least 10 high-value targets were secretly held and interrogated at Guantánamo’s Camp Echo at various times from late 2003 to 2004. They were then flown to Rabat, Morocco, before being officially sent to the U.S. military’s detention facility at Guantánamo in September 2006. In September 2006, President George W. Bush formally announced that 14 CIA captives had been transferred to Guantánamo and would be prosecuted before military tribunals. He then acknowledged for the first time that the CIA had been operating a secret network of prisons overseas to detain and interrogate high-value targets.
  • The Senate report, according to Al Jazeera’s sources, says that the CIA detained some high-value suspects on Diego Garcia, an Indian Ocean island controlled by the United Kingdom and leased to the United States. The classified CIA documents say the black site arrangement at Diego Garcia was made with the “full cooperation” of the British government. That would confirm long-standing claims by human rights investigators and journalists, whose allegations — based on flight logs and unnamed government sources — have routinely been denied by the CIA. The CIA and State Department declined Al Jazeera’s requests for comment. The Intelligence Committee last week voted 11 to 3 to declassify the report’s 480-page executive summary and 20 conclusions and findings, which incorporate responses from Republican members of the committee and from the CIA. The executive summary will undergo a declassification review, led by the CIA, with input from the State Department and the Office of the Director of National Intelligence, the U.S. officials said. The panel’s chairwoman, Democratic Sen. Dianne Feinstein, said in a statement last Thursday that the full 6,600-page report, with 37,000 footnotes, “will be held for declassification at a later time.”
  • Leaked details of the committee’s report have caused waves in countries like Poland, where the CIA is known to have operated a black site prison — which Polish officials continue to deny having known about. The U.S. officials who spoke to Al Jazeera said that the Senate report reveals 20 prisoners were secretly detained in Poland from 2002 to 2005. They added that Polish officials recently sought assurances from diplomats and visiting U.S. officials that the Senate report would conceal details about Poland’s role in allowing the CIA black site to be operated on Polish soil. Al Jazeera’s sources said U.S. officials reassured their Polish counterparts last year that it was almost certain that the declassified version of the report would not identify the countries that cooperated with the CIA’s detention and interrogation program.
  • ...6 more annotations...
  • According to the Senate report, Al Jazeera’s sources said, a majority of the more than 100 detainees held in CIA custody were detained in secret prisons in Afghanistan and Morocco, where they were subject to torture methods not sanctioned by the Justice Department. Those methods are recalled by the report in vivid narratives lifted from daily logs of the detention and interrogation of about 34 high-value prisoners. The report allegedly notes that about 85 detainees deemed low-value passed through the black sites and were later dumped at Guantánamo or handed off to foreign intelligence services. More than 10 of those handed over to foreign intelligence agencies “to face terrorism charges” are now “unaccounted for” and presumed dead, the U.S. officials said. The Senate report says more than two dozen of these men designated low-value had, in fact, been wrongfully detained and rendered to other countries on the basis of intelligence obtained from CIA captives under torture and from information shared with CIA officials by other governments, both of which turned out to be false. The report allegedly singles out a top CIA official for botching a handful of renditions and outlines agency efforts to cover up the mistakes. The Senate report allegedly accuses “senior CIA officials” of lying during multiple closed-session briefings to members of Congress from 2003 to 2005 about the use of certain “enhanced” interrogation techniques. The report says an agency official lied to Congress in 2005 when he insisted the U.S. was adhering to international treaties barring cruel and degrading treatment of prisoners, the U.S. officials told Al Jazeera.
  • The report not only accuses certain CIA officials of deliberately misleading Congress; Al Jazeera’s sources say it also suggests that the agency sanctioned leaks to selected journalists about phantom plots supposedly disrupted as a result of information gained through the program in order to craft a narrative of success. The Senate report, like a 2009 Senate Armed Services Committee report (PDF), says Air Force psychologists under contract to the CIA reverse-engineered a decades-old resistance-training program taught to U.S. airmen known as survival evasion resistance escape (SERE). According to a SERE training document obtained by Al Jazeera titled “Coercive Exploitation Techniques,” Air Force personnel were taught that communist regimes used “deprivations” of “food, water, sleep and medical care” as well as “the use of threats” in order to weaken a captive’s mental and physical ability to resist interrogation. “Isolation” would be used, according to the SERE program, to deprive the “recipient of all social support” so that he develops a “dependency” on his interrogator. And “physical duress, violence and torture” are used to weaken “mental and physical ability to resist exploitation.” Ironically, perhaps, the SERE document (displayed below) notes that such techniques were used by the Soviet Union, China and North Korea to obtain false confessions.
  • Senate investigators allegedly obtained from the CIA a 2003 “business plan,” written by Air Force psychologists James Mitchell and Bruce Jessen, that contained erroneous details about the positive aspects of the enhanced interrogation program and the veracity of the intelligence its extracted from detainees. The “business plan” states that Al-Qaeda captives were “resistant” to “standard” interrogation techniques, an argument the Senate report found lacked merit because torture techniques were used before they were even questioned. Neither Jessen, who lives in Spokane, Wash., nor Mitchell, who resides in Land o’ Lakes, Fla., responded to phone calls or emails for comment. Both men are featured prominently in the Senate’s report, according to U.S. officials.
  • According to Al Jazeera’s sources, Zain Abidin Mohammed Husain Abu Zubaydah was the only captive subjected to all 10 torture techniques identified in an August 2002 Justice Department memo. But the U.S. officials said the Senate report concludes that the methods applied to Abu Zubaydah went above and beyond the guidelines outlined in that memo and were used before the memo establishing their legality was written. The Senate report allegedly adopts part of a narrative from former FBI special agent Ali Soufan, who first interrogated Abu Zubaydah at the black site and wrote in his book “The Black Banners” that Mitchell was conducting an “experiment” on Abu Zubaydah. For example, the August 2002 Justice Department legal memo authorized sleep deprivation for Abu Zubaydah for 11 consecutive days, but Mitchell kept him awake far longer, the U.S. officials said, citing classified CIA cables. Abu Zubaydah was stripped naked, strapped into a chair and doused with cold water to keep him awake. He was then interrogated and asked what he knew, at which point, his attorney told Al Jazeera, Abu Zubaydah was “psychotic” and would have admitted to anything.
  • Additionally, the report allegedly says that Abu Zubaydah was stuffed into a pet crate (the type used to transport dogs on airplanes) over the course of two weeks and routinely passed out, was shackled by his wrists to the ceiling of his cell and subjected to an endless loop of loud music. One former interrogator briefed about Abu Zubaydah’s interrogations from May to July 2002 told Al Jazeera that the music used to batter the detainee’s senses was by the Red Hot Chili Peppers. Abu Zubaydah’s attorney, Brent Mickum, hopes the Senate report’s executive summary will vindicate what he has been saying for years. “My client was tortured brutally well before any legal memo was issued,” Mickum said. He expects the report to “show that my client was a nonmember of Al-Qaeda, contrary to all of the earlier reports by the Bush administration. I am also confident that the report will show that, after he was deemed to be compliant while he was held in Thailand, that he continued to be tortured on explicit orders from the Bush administration.” The Senate report, according to Al Jazeera’s sources, says that CIA interrogators were under an enormous pressure from top agency officials, themselves under pressure from the White House, to use “enhanced” interrogation techniques to obtain information from detainees connecting Iraq and Al-Qaeda.
  • One interrogator who worked for the CIA and the U.S. military during Bush’s tenure and participated in the interrogations of two high-value CIA prisoners told Al Jazeera — speaking on condition of anonymity because he is still employed by the U.S. government — that the “enhanced” interrogation program was “nothing more than the Stanford Prison Experiment writ large.” (The 1971 Stanford University study shocked the public by demonstrating how easily people placed in authority over more vulnerable others resorted to cruelty.) “Interrogators were being pressured — You have to get info from these people,’” the interrogator told Al Jazeera. “There was no consideration that the person we were interrogating may not know. That was always seen as a resistance technique. ‘They [the detainees] must be lying!’ There was pressure on us from above to produce what they wanted. Not a single person I worked with knew how to conduct an interrogation or [had] ever conducted an interrogation.”
Paul Merrell

CIA photos of 'black sites' could complicate Guantanamo trials - The Washington Post - 0 views

  • Military prosecutors this year learned about a massive cache of CIA photographs of its former overseas “black sites” while reviewing material collected for the Senate investigation of the agency’s interrogation program, U.S. officials said. The existence of the approximately 14,000 photographs will probably cause yet another delay in the military commissions at Guantanamo Bay, Cuba, as attorneys for the defendants demand that all the images be turned over and the government wades through the material to decide what it thinks is relevant to the proceedings.
  • The death penalty cases against the five men first began in 2008 under the Bush administration and was abandoned by the Obama administration for a planned trial in federal court in New York. That effort collapsed, and the prosecution was returned to the military in 2011.
  • The electronic images depict external and internal shots of facilities where the CIA held ­al-Qaeda suspects after 9/11, but they do not show detainee interrogations, including the torture of some suspects who were subjected to waterboarding and other brutal techniques. They do include images of naked detainees during transport, according to the officials, who spoke on the condition of anonymity because the material remains classified. The pictures also show CIA personnel and members of foreign intelligence services, as well as psychologists Bruce Jessen and James Mitchell, among the architects of the interrogation program.
  • ...4 more annotations...
  • It’s unclear whether the military prosecutors have been able to review all the photographs and why they hadn’t unearthed them years earlier. Former U.S. officials said Martins’s team was supposed to have the same access as Senate investigators and federal prosecutors to shared electronic drives containing agency documents at a secret location in Virginia. “It raises the question whether the agency is being cooperative with the prosecutors,” said James Harrington, the civilian attorney for 9/11 defendant Ramzi Binalshibh. “It’s beyond preposterous.”
  • mong the images are those of cells and bathrooms at the detention sites, including a facility in Afghanistan known as “Salt Pit,” where the waterboard was photographed.
  • The bulk of the photographs depict black sites in Thailand, Afghanistan and Poland. There are fewer shots of prisons in Romania and Lithuania, which were among the last to be used before they were closed in 2006. A former intelligence official who reviewed some of the photographs of the prison in Thailand described them as nondescript.
  • “Why is it we are still learning about this stuff?” said Joe Margulies, Zubaydah’s attorney. “Who knows what is still out there? What else is there? That’s what is appalling.” James Connell, defense attorney for Ammar al-Baluchi, one of the 9/11 defendants, filed a motion in January 2013 to compel production of “documents and information” relating to where the “accused or a potential witness have been confined.” Connell said the military judge overseeing the case hasn’t ruled on that motion. “If pictures from black sites exist, they are crime scene photographs,” Connell said. “The military commission rules require the prosecution to turn them over to the defense, but federal and international prosecutors should also get a copy — not to mention the public.”
  •  
    So finally the locations of at least some of the CIA "black sites" are out in the open. 
Paul Merrell

Inside the Battle Over the CIA Torture Report - Bloomberg View - 0 views

  • After months of internal wrangling, the Senate Intelligence Committee is finally set to release its report on President George W. Bush-era CIA practices, which among other details will contain information about foreign countries that aided in the secret detention and interrogation of suspected terrorists. Several U.S. officials told us that the negotiations are nearly complete between the Central Intelligence Agency and the committee's Democratic staff, which prepared the classified 6,300-page report and its 600-page, soon-to-be-released declassified executive summary. Dianne Feinstein, the committee's chairman, is set to release the summary early next week. Her staff members had objected vigorously to hundreds of redactions the CIA had proposed in the executive summary. After an often-contentious process to resolve the disputes, managed by top White House officials, Feinstein was able to roll back the majority of the disputed CIA redactions.
  • Among the most significant of Feinstein’s victories, the report will retain information on countries that aided the CIA program by hosting black sites or otherwise participating in the secret rendition of suspected terrorists. The countries will not be identified by name, but in other ways, such as code names like “Country A.” This falls short of Feinstein’s original desire, which was to name the countries explicitly, but represents a big victory for the committee nonetheless. In a victory for the CIA, Feinstein reluctantly agreed to allow the redactions of the pseudonyms of agency personnel mentioned in the report. The CIA maintained that any reference to individuals working under cover that offered clues to their identities could place them in harm’s way. “We need to understand the role that particular countries played across time. Even having pseudonyms for countries in the report is important for a full accounting,” said Raha Wala, senior counsel at Human Rights First, which advocated on behalf of the report’s declassification.
  • The CIA and some Republican senators had argued that even such masked identifications could be deciphered, leading to compromised relationships with those countries’ governments. In June 2013, the top intelligence official at the State Department, Philip Goldberg, wrote a classified letter to Congress warning against the disclosure of the names of countries who had participated in the program.
  • ...4 more annotations...
  • John Rizzo, who served as the CIA's acting general counsel during the black-site program and later wrote a memoir, "Company Man," said the agency has long fought against declassifying any information on the locations of the secret prisons overseas. "That was something we had fought for years and years," Rizzo told us. "Up to now one of the only remaining classified facts about the program was the names of countries where there were black sites." Rizzo said the concern about even referencing the locations of the black sites is that one could piece together the locations with other information that is likely to be in the final public report. One Republican Senate staffer familiar with the negotiations over the report said Feinstein's office relented on some concerns about redacting information that could identify countries hosting the black sites. "Do you scrub enough information to prevent that information from being released?" the staffer said. "It ended up as a half-step in-between, some of the stuff she wanted released and some of the information identifying the countries has been redacted."
  • There is also a risk that any information about foreign countries that aided the CIA programs, even using code names,  could be matched against public reporting that already exists to make them more identifiable. There have been news reports about cooperation by the governments of Poland,  Lithuania, Romania, Thailand and others. "Just because something is leaked doesn’t mean it’s still not secret," Rizzo said. "A national security secret is still a national security secret until the government says otherwise."
  • Originally there had been bipartisan support for the majority staff’s investigation, and the committee’s Republican staff was initially part of the investigation -- but it withdrew early in the process. Even after the Republican staff disowned the investigation, some Republican senators continued to support declassification, including John McCain and Lindsey Graham.
  • The release will not include internal CIA documents that the agency accused Feinstein’s staff of improperly removing from a CIA facility that had been set up for the investigators to work at. Feinstein said that her staff had removed the documents, including a review by Panetta, only after CIA officials tried to surreptitiously remove them from computers being used by the committee’s staff. “What was unique and interesting about the internal documents was not their classification level, but rather their analysis and acknowledgement of significant CIA wrongdoing,” Feinstein said on the Senate floor in July. “The interrogations and the conditions of confinement at the CIA detention sites were far different and far more harsh than the way the CIA had described them to us.”
  •  
    Nations that knowingly hosted the CIA "black sites" won't be named, as though their own citizens should be deprived of that information. I still maintain that there would be no need for redacting CIA agents' names who participated in the torture if they were named in criminal complaints as they are required to be by the Convention Against Torture, which -- through the Constitution's Treaty Clause, is "the law of this land." 
Paul Merrell

Polish Outrage to Paying Victims of CIA Black Sites-and What the Eur Court Said | Just ... - 0 views

  • Poland will be paying a quarter of a million dollars to two Guantánamo detainees, Abu Zubaydah and Abd al-Rahim al-Nashiri. The payment arises in the context of the torture of the terror suspects at a CIA “black site” operating on Polish territory. Last July, the European Court of Human Rights handed down its much-awaited judgments in the cases of Abd al-Rahim al-Nashiri v. Poland and Husayn (Abu Zubaydah) v. Poland in relation to Poland’s involvement in the CIA rendition, detention and interrogation program. The Court ruled that Poland violated the substantive and procedural aspects of the detainees’ right to be free from torture or inhuman or degrading treatment or punishment (Article 3, European Convention on Human Rights). The Court also found violations of, among other rights, Articles 5 (liberty and security), 8 (private and family life), and 13 (effective remedy) of the ECHR. The Court ordered the Polish government to pay €130,000 to Zubaydah and €100,000 to al-Nashiri, within three months from when the judgments become final. Poland appealed the ruling, but the request was rejected by a Grand Chamber panel on February 16, making last weekend the deadline for the payments. The Polish Foreign Ministry said on Friday that it was processing the payments, AP’s Vanessa Gera reported.
  • Poland will be paying a quarter of a million dollars to two Guantánamo detainees, Abu Zubaydah and Abd al-Rahim al-Nashiri. The payment arises in the context of the torture of the terror suspects at a CIA “black site” operating on Polish territory. Last July, the European Court of Human Rights handed down its much-awaited judgments in the cases of Abd al-Rahim al-Nashiri v. Poland and Husayn (Abu Zubaydah) v. Poland in relation to Poland’s involvement in the CIA rendition, detention and interrogation program. The Court ruled that Poland violated the substantive and procedural aspects of the detainees’ right to be free from torture or inhuman or degrading treatment or punishment (Article 3, European Convention on Human Rights). The Court also found violations of, among other rights, Articles 5 (liberty and security), 8 (private and family life), and 13 (effective remedy) of the ECHR. The Court ordered the Polish government to pay €130,000 to Zubaydah and €100,000 to al-Nashiri, within three months from when the judgments become final. Poland appealed the ruling, but the request was rejected by a Grand Chamber panel on February 16, making last weekend the deadline for the payments. The Polish Foreign Ministry said on Friday that it was processing the payments, AP’s Vanessa Gera reported.
  • But the Court took a different, more robust view and found significant responsibility on part of the Polish government. The Court held (my emphasis added): “517. … Notwithstanding the [Article 3] Convention obligation, Poland, for all practical purposes, facilitated the whole process, created the conditions for it to happen and made no attempt to prevent it from occurring. As the Court has already held above, on the basis of their own knowledge of the CIA activities deriving from Poland’s complicity in the [High-Value Detainees Program] Programme and from publicly accessible information on treatment applied in the context of the “war on terror” to terrorist suspects in US custody the authorities – even if they did not witness or participate in the specific acts of ill-treatment and abuse endured by the applicant – must have been aware of the serious risk of treatment contrary to Article 3 occurring on Polish territory.”
  • ...3 more annotations...
  • The ruling, which predated the publication of the redacted version of the Senate Intelligence Committee report on the CIA program, brought important judicial scrutiny to the agency’s post-9/11 practices, including the controversial role played by U.S. allies. The Senate report has since provided some further details about Poland’s involvement, although the country is not identified by name. The AP report notes the frustration of those in Poland who view the ruling as unjustifiably punishing the country for CIA actions. An opposition Polish lawmaker has recorded his discontent, stating that the terror suspects remained in the sole custody of U.S. officials throughout their detention. Former Foreign Minister Radoslaw Sikorski has similarly been quoted by the LA Times’ Carol Williams as saying:  “We might have to pay compensation even though our personnel did nothing wrong. You can imagine how Polish people feel about it … We just wish that intelligence matters were kept confidential.”
  • While some in Poland are expressing their exasperation with the Court’s ruling, the issue of compensation has sparked equal outrage among some in the United States who do not believe that suspects of terrorist attacks should receive payments, as noted by the AP. The controversy over compensation comes just as the U.S. faces renewed calls from some European and other countries to compensate victims of CIA torture. At the UN Human Rights Council last week, the Universal Periodic Review report on the United States documented other UN member states’ objections to U.S. practices.
  • Meanwhile, in Europe, more judgments are pending on this subject, including two involving the same detainees (see: Abu Zubaydah v. Lithuania and Al Nashiri v. Romania). While accountability within the U.S. still seems like a pipe dream, the European Court of Human Right’s more robust approach perhaps offers the only means of securing reparation for human rights abuses committed as part of the “war on terror.” The Court’s approach may also help to educate European citizens on the nature of complicity in grave human rights abuses. By calling for compensation, the Court has also served to weaken the forms of international cooperation that foster such violations in the first place.
Paul Merrell

From Radio to Porn, British Spies Track Web Users' Online Identities - 0 views

  • HERE WAS A SIMPLE AIM at the heart of the top-secret program: Record the website browsing habits of “every visible user on the Internet.” Before long, billions of digital records about ordinary people’s online activities were being stored every day. Among them were details cataloging visits to porn, social media and news websites, search engines, chat forums, and blogs. The mass surveillance operation — code-named KARMA POLICE — was launched by British spies about seven years ago without any public debate or scrutiny. It was just one part of a giant global Internet spying apparatus built by the United Kingdom’s electronic eavesdropping agency, Government Communications Headquarters, or GCHQ. The revelations about the scope of the British agency’s surveillance are contained in documents obtained by The Intercept from National Security Agency whistleblower Edward Snowden. Previous reports based on the leaked files have exposed how GCHQ taps into Internet cables to monitor communications on a vast scale, but many details about what happens to the data after it has been vacuumed up have remained unclear.
  • Amid a renewed push from the U.K. government for more surveillance powers, more than two dozen documents being disclosed today by The Intercept reveal for the first time several major strands of GCHQ’s existing electronic eavesdropping capabilities.
  • The surveillance is underpinned by an opaque legal regime that has authorized GCHQ to sift through huge archives of metadata about the private phone calls, emails and Internet browsing logs of Brits, Americans, and any other citizens — all without a court order or judicial warrant
  • ...17 more annotations...
  • A huge volume of the Internet data GCHQ collects flows directly into a massive repository named Black Hole, which is at the core of the agency’s online spying operations, storing raw logs of intercepted material before it has been subject to analysis. Black Hole contains data collected by GCHQ as part of bulk “unselected” surveillance, meaning it is not focused on particular “selected” targets and instead includes troves of data indiscriminately swept up about ordinary people’s online activities. Between August 2007 and March 2009, GCHQ documents say that Black Hole was used to store more than 1.1 trillion “events” — a term the agency uses to refer to metadata records — with about 10 billion new entries added every day. As of March 2009, the largest slice of data Black Hole held — 41 percent — was about people’s Internet browsing histories. The rest included a combination of email and instant messenger records, details about search engine queries, information about social media activity, logs related to hacking operations, and data on people’s use of tools to browse the Internet anonymously.
  • Throughout this period, as smartphone sales started to boom, the frequency of people’s Internet use was steadily increasing. In tandem, British spies were working frantically to bolster their spying capabilities, with plans afoot to expand the size of Black Hole and other repositories to handle an avalanche of new data. By 2010, according to the documents, GCHQ was logging 30 billion metadata records per day. By 2012, collection had increased to 50 billion per day, and work was underway to double capacity to 100 billion. The agency was developing “unprecedented” techniques to perform what it called “population-scale” data mining, monitoring all communications across entire countries in an effort to detect patterns or behaviors deemed suspicious. It was creating what it said would be, by 2013, “the world’s biggest” surveillance engine “to run cyber operations and to access better, more valued data for customers to make a real world difference.”
  • A document from the GCHQ target analysis center (GTAC) shows the Black Hole repository’s structure.
  • The data is searched by GCHQ analysts in a hunt for behavior online that could be connected to terrorism or other criminal activity. But it has also served a broader and more controversial purpose — helping the agency hack into European companies’ computer networks. In the lead up to its secret mission targeting Netherlands-based Gemalto, the largest SIM card manufacturer in the world, GCHQ used MUTANT BROTH in an effort to identify the company’s employees so it could hack into their computers. The system helped the agency analyze intercepted Facebook cookies it believed were associated with Gemalto staff located at offices in France and Poland. GCHQ later successfully infiltrated Gemalto’s internal networks, stealing encryption keys produced by the company that protect the privacy of cell phone communications.
  • Similarly, MUTANT BROTH proved integral to GCHQ’s hack of Belgian telecommunications provider Belgacom. The agency entered IP addresses associated with Belgacom into MUTANT BROTH to uncover information about the company’s employees. Cookies associated with the IPs revealed the Google, Yahoo, and LinkedIn accounts of three Belgacom engineers, whose computers were then targeted by the agency and infected with malware. The hacking operation resulted in GCHQ gaining deep access into the most sensitive parts of Belgacom’s internal systems, granting British spies the ability to intercept communications passing through the company’s networks.
  • In March, a U.K. parliamentary committee published the findings of an 18-month review of GCHQ’s operations and called for an overhaul of the laws that regulate the spying. The committee raised concerns about the agency gathering what it described as “bulk personal datasets” being held about “a wide range of people.” However, it censored the section of the report describing what these “datasets” contained, despite acknowledging that they “may be highly intrusive.” The Snowden documents shine light on some of the core GCHQ bulk data-gathering programs that the committee was likely referring to — pulling back the veil of secrecy that has shielded some of the agency’s most controversial surveillance operations from public scrutiny. KARMA POLICE and MUTANT BROTH are among the key bulk collection systems. But they do not operate in isolation — and the scope of GCHQ’s spying extends far beyond them.
  • The agency operates a bewildering array of other eavesdropping systems, each serving its own specific purpose and designated a unique code name, such as: SOCIAL ANTHROPOID, which is used to analyze metadata on emails, instant messenger chats, social media connections and conversations, plus “telephony” metadata about phone calls, cell phone locations, text and multimedia messages; MEMORY HOLE, which logs queries entered into search engines and associates each search with an IP address; MARBLED GECKO, which sifts through details about searches people have entered into Google Maps and Google Earth; and INFINITE MONKEYS, which analyzes data about the usage of online bulletin boards and forums. GCHQ has other programs that it uses to analyze the content of intercepted communications, such as the full written body of emails and the audio of phone calls. One of the most important content collection capabilities is TEMPORA, which mines vast amounts of emails, instant messages, voice calls and other communications and makes them accessible through a Google-style search tool named XKEYSCORE.
  • As of September 2012, TEMPORA was collecting “more than 40 billion pieces of content a day” and it was being used to spy on people across Europe, the Middle East, and North Africa, according to a top-secret memo outlining the scope of the program. The existence of TEMPORA was first revealed by The Guardian in June 2013. To analyze all of the communications it intercepts and to build a profile of the individuals it is monitoring, GCHQ uses a variety of different tools that can pull together all of the relevant information and make it accessible through a single interface. SAMUEL PEPYS is one such tool, built by the British spies to analyze both the content and metadata of emails, browsing sessions, and instant messages as they are being intercepted in real time. One screenshot of SAMUEL PEPYS in action shows the agency using it to monitor an individual in Sweden who visited a page about GCHQ on the U.S.-based anti-secrecy website Cryptome.
  • Partly due to the U.K.’s geographic location — situated between the United States and the western edge of continental Europe — a large amount of the world’s Internet traffic passes through its territory across international data cables. In 2010, GCHQ noted that what amounted to “25 percent of all Internet traffic” was transiting the U.K. through some 1,600 different cables. The agency said that it could “survey the majority of the 1,600” and “select the most valuable to switch into our processing systems.”
  • According to Joss Wright, a research fellow at the University of Oxford’s Internet Institute, tapping into the cables allows GCHQ to monitor a large portion of foreign communications. But the cables also transport masses of wholly domestic British emails and online chats, because when anyone in the U.K. sends an email or visits a website, their computer will routinely send and receive data from servers that are located overseas. “I could send a message from my computer here [in England] to my wife’s computer in the next room and on its way it could go through the U.S., France, and other countries,” Wright says. “That’s just the way the Internet is designed.” In other words, Wright adds, that means “a lot” of British data and communications transit across international cables daily, and are liable to be swept into GCHQ’s databases.
  • A map from a classified GCHQ presentation about intercepting communications from undersea cables. GCHQ is authorized to conduct dragnet surveillance of the international data cables through so-called external warrants that are signed off by a government minister. The external warrants permit the agency to monitor communications in foreign countries as well as British citizens’ international calls and emails — for example, a call from Islamabad to London. They prohibit GCHQ from reading or listening to the content of “internal” U.K. to U.K. emails and phone calls, which are supposed to be filtered out from GCHQ’s systems if they are inadvertently intercepted unless additional authorization is granted to scrutinize them. However, the same rules do not apply to metadata. A little-known loophole in the law allows GCHQ to use external warrants to collect and analyze bulk metadata about the emails, phone calls, and Internet browsing activities of British people, citizens of closely allied countries, and others, regardless of whether the data is derived from domestic U.K. to U.K. communications and browsing sessions or otherwise. In March, the existence of this loophole was quietly acknowledged by the U.K. parliamentary committee’s surveillance review, which stated in a section of its report that “special protection and additional safeguards” did not apply to metadata swept up using external warrants and that domestic British metadata could therefore be lawfully “returned as a result of searches” conducted by GCHQ.
  • Perhaps unsurprisingly, GCHQ appears to have readily exploited this obscure legal technicality. Secret policy guidance papers issued to the agency’s analysts instruct them that they can sift through huge troves of indiscriminately collected metadata records to spy on anyone regardless of their nationality. The guidance makes clear that there is no exemption or extra privacy protection for British people or citizens from countries that are members of the Five Eyes, a surveillance alliance that the U.K. is part of alongside the U.S., Canada, Australia, and New Zealand. “If you are searching a purely Events only database such as MUTANT BROTH, the issue of location does not occur,” states one internal GCHQ policy document, which is marked with a “last modified” date of July 2012. The document adds that analysts are free to search the databases for British metadata “without further authorization” by inputing a U.K. “selector,” meaning a unique identifier such as a person’s email or IP address, username, or phone number. Authorization is “not needed for individuals in the U.K.,” another GCHQ document explains, because metadata has been judged “less intrusive than communications content.” All the spies are required to do to mine the metadata troves is write a short “justification” or “reason” for each search they conduct and then click a button on their computer screen.
  • Intelligence GCHQ collects on British persons of interest is shared with domestic security agency MI5, which usually takes the lead on spying operations within the U.K. MI5 conducts its own extensive domestic surveillance as part of a program called DIGINT (digital intelligence).
  • GCHQ’s documents suggest that it typically retains metadata for periods of between 30 days to six months. It stores the content of communications for a shorter period of time, varying between three to 30 days. The retention periods can be extended if deemed necessary for “cyber defense.” One secret policy paper dated from January 2010 lists the wide range of information the agency classes as metadata — including location data that could be used to track your movements, your email, instant messenger, and social networking “buddy lists,” logs showing who you have communicated with by phone or email, the passwords you use to access “communications services” (such as an email account), and information about websites you have viewed.
  • Records showing the full website addresses you have visited — for instance, www.gchq.gov.uk/what_we_do — are treated as content. But the first part of an address you have visited — for instance, www.gchq.gov.uk — is treated as metadata. In isolation, a single metadata record of a phone call, email, or website visit may not reveal much about a person’s private life, according to Ethan Zuckerman, director of Massachusetts Institute of Technology’s Center for Civic Media. But if accumulated and analyzed over a period of weeks or months, these details would be “extremely personal,” he told The Intercept, because they could reveal a person’s movements, habits, religious beliefs, political views, relationships, and even sexual preferences. For Zuckerman, who has studied the social and political ramifications of surveillance, the most concerning aspect of large-scale government data collection is that it can be “corrosive towards democracy” — leading to a chilling effect on freedom of expression and communication. “Once we know there’s a reasonable chance that we are being watched in one fashion or another it’s hard for that not to have a ‘panopticon effect,’” he said, “where we think and behave differently based on the assumption that people may be watching and paying attention to what we are doing.”
  • When compared to surveillance rules in place in the U.S., GCHQ notes in one document that the U.K. has “a light oversight regime.” The more lax British spying regulations are reflected in secret internal rules that highlight greater restrictions on how NSA databases can be accessed. The NSA’s troves can be searched for data on British citizens, one document states, but they cannot be mined for information about Americans or other citizens from countries in the Five Eyes alliance. No such constraints are placed on GCHQ’s own databases, which can be sifted for records on the phone calls, emails, and Internet usage of Brits, Americans, and citizens from any other country. The scope of GCHQ’s surveillance powers explain in part why Snowden told The Guardian in June 2013 that U.K. surveillance is “worse than the U.S.” In an interview with Der Spiegel in July 2013, Snowden added that British Internet cables were “radioactive” and joked: “Even the Queen’s selfies to the pool boy get logged.”
  • In recent years, the biggest barrier to GCHQ’s mass collection of data does not appear to have come in the form of legal or policy restrictions. Rather, it is the increased use of encryption technology that protects the privacy of communications that has posed the biggest potential hindrance to the agency’s activities. “The spread of encryption … threatens our ability to do effective target discovery/development,” says a top-secret report co-authored by an official from the British agency and an NSA employee in 2011. “Pertinent metadata events will be locked within the encrypted channels and difficult, if not impossible, to prise out,” the report says, adding that the agencies were working on a plan that would “(hopefully) allow our Internet Exploitation strategy to prevail.”
Paul Merrell

Canadian Spies Collect Domestic Emails in Secret Security Sweep - The Intercept - 0 views

  • Canada’s electronic surveillance agency is covertly monitoring vast amounts of Canadians’ emails as part of a sweeping domestic cybersecurity operation, according to top-secret documents. The surveillance initiative, revealed Wednesday by CBC News in collaboration with The Intercept, is sifting through millions of emails sent to Canadian government agencies and departments, archiving details about them on a database for months or even years. The data mining operation is carried out by the Communications Security Establishment, or CSE, Canada’s equivalent of the National Security Agency. Its existence is disclosed in documents obtained by The Intercept from NSA whistleblower Edward Snowden. The emails are vacuumed up by the Canadian agency as part of its mandate to defend against hacking attacks and malware targeting government computers. It relies on a system codenamed PONY EXPRESS to analyze the messages in a bid to detect potential cyber threats.
  • Last year, CSE acknowledged it collected some private communications as part of cybersecurity efforts. But it refused to divulge the number of communications being stored or to explain for how long any intercepted messages would be retained. Now, the Snowden documents shine a light for the first time on the huge scope of the operation — exposing the controversial details the government withheld from the public. Under Canada’s criminal code, CSE is not allowed to eavesdrop on Canadians’ communications. But the agency can be granted special ministerial exemptions if its efforts are linked to protecting government infrastructure — a loophole that the Snowden documents show is being used to monitor the emails. The latest revelations will trigger concerns about how Canadians’ private correspondence with government employees are being archived by the spy agency and potentially shared with police or allied surveillance agencies overseas, such as the NSA. Members of the public routinely communicate with government employees when, for instance, filing tax returns, writing a letter to a member of parliament, applying for employment insurance benefits or submitting a passport application.
  • Chris Parsons, an internet security expert with the Toronto-based internet think tank Citizen Lab, told CBC News that “you should be able to communicate with your government without the fear that what you say … could come back to haunt you in unexpected ways.” Parsons said that there are legitimate cybersecurity purposes for the agency to keep tabs on communications with the government, but he added: “When we collect huge volumes, it’s not just used to track bad guys. It goes into data stores for years or months at a time and then it can be used at any point in the future.” In a top-secret CSE document on the security operation, dated from 2010, the agency says it “processes 400,000 emails per day” and admits that it is suffering from “information overload” because it is scooping up “too much data.” The document outlines how CSE built a system to handle a massive 400 terabytes of data from Internet networks each month — including Canadians’ emails — as part of the cyber operation. (A single terabyte of data can hold about a billion pages of text, or about 250,000 average-sized mp3 files.)
  • ...1 more annotation...
  • The agency notes in the document that it is storing large amounts of “passively tapped network traffic” for “days to months,” encompassing the contents of emails, attachments and other online activity. It adds that it stores some kinds of metadata — data showing who has contacted whom and when, but not the content of the message — for “months to years.” The document says that CSE has “excellent access to full take data” as part of its cyber operations and is receiving policy support on “use of intercepted private communications.” The term “full take” is surveillance-agency jargon that refers to the bulk collection of both content and metadata from Internet traffic. Another top-secret document on the surveillance dated from 2010 suggests the agency may be obtaining at least some of the data by covertly mining it directly from Canadian Internet cables. CSE notes in the document that it is “processing emails off the wire.”
  •  
    " CANADIAN SPIES COLLECT DOMESTIC EMAILS IN SECRET SECURITY SWEEP BY RYAN GALLAGHER AND GLENN GREENWALD @rj_gallagher@ggreenwald YESTERDAY AT 2:02 AM SHARE TWITTER FACEBOOK GOOGLE EMAIL PRINT POPULAR EXCLUSIVE: TSA ISSUES SECRET WARNING ON 'CATASTROPHIC' THREAT TO AVIATION CHICAGO'S "BLACK SITE" DETAINEES SPEAK OUT WHY DOES THE FBI HAVE TO MANUFACTURE ITS OWN PLOTS IF TERRORISM AND ISIS ARE SUCH GRAVE THREATS? NET NEUTRALITY IS HERE - THANKS TO AN UNPRECEDENTED GUERRILLA ACTIVISM CAMPAIGN HOW SPIES STOLE THE KEYS TO THE ENCRYPTION CASTLE Canada's electronic surveillance agency is covertly monitoring vast amounts of Canadians' emails as part of a sweeping domestic cybersecurity operation, according to top-secret documents. The surveillance initiative, revealed Wednesday by CBC News in collaboration with The Intercept, is sifting through millions of emails sent to Canadian government agencies and departments, archiving details about them on a database for months or even years. The data mining operation is carried out by the Communications Security Establishment, or CSE, Canada's equivalent of the National Security Agency. Its existence is disclosed in documents obtained by The Intercept from NSA whistleblower Edward Snowden. The emails are vacuumed up by the Canadian agency as part of its mandate to defend against hacking attacks and malware targeting government computers. It relies on a system codenamed PONY EXPRESS to analyze the messages in a bid to detect potential cyber threats. Last year, CSE acknowledged it collected some private communications as part of cybersecurity efforts. But it refused to divulge the number of communications being stored or to explain for how long any intercepted messages would be retained. Now, the Snowden documents shine a light for the first time on the huge scope of the operation - exposing the controversial details the government withheld from the public. Under Canada's criminal code, CSE is no
Paul Merrell

Failed NATO Invasion of Moldova SITREP, by Scott | The Vineyard of the Saker - 0 views

  • It’s hard to overestimate the value of planning in advance, especially when it comes to getting reservations in popular restaurants and invading countries by military force. In the week of the May 9th Victory Day two significant failures took place  each one remarkable in its own way. Each event went completely unreported by the Western corporate and government media, but discussed on Social Media.
  • In the following three weeks after the incident with the USS Florida, while Russia was preparing for Victory Day celebrations and all eyes were on Moscow, attention of Ukrainians was fully concentrated on the visit of Victoria Nuland to Kiev on April 26th allegedly to discuss the implementation of the Minsk II Agreement and the future elections in Donetsk and Lugansk republics. Since the day when President Putin said that the republics can have their elections anytime they want, the question of these elections ceased to be a subject of blackmail toward the Kremlin.   It appeared that the true reason for Nuland’s visit could be located to the west of Kiev, rather than the east. Just recently, Robert D. Kaplan, a former Stratfor’s Chief Geopolitical Analyst, and currently a senior fellow at the Center for a New American Security (CNAS) has published a book “In Europe’s Shadow” where he lays out a plan to reunite Romania with “its lost province of Moldova.” Nuland visited Moldova back in January, with the task to coerce Moldova’s government and its oligarchs to change the country’s Constitution provision of neutrality. Before she left, she gave a short speech at the American Embassy in Bucharest after a private dinner with PM Ciolos and President Klaus. “We powerfully support the desire of the people in Moldova to have responsible leaders who can implement reforms. This is the best way to assure the future of Moldova. Romania and the United States, in conjunction with NATO, have support programs in place to assure the security of Moldova but the government has to work to implement these programs.”
  • Moldova is one of the poorest countries in Eastern Europe, and its economy heavily relies on Russia. According to the CIA Fact Book: Moldova’s annual remittances of about $1.12 billion comes from the roughly one million Moldovans working in Europe, Russia, and other former Soviet Bloc countries; Moldova imports almost all of its energy supplies from Russia and Ukraine; Moldova’s dependence on Russian energy is underscored by a more than $5 billion debt to Russian natural gas supplier Gazprom; Moldova signed an Association Agreement and a Deep and Comprehensive Free Trade Agreement with the EU during fall 2014, however its biggest trade partner remains Russia. Everyone understands that a NATO membership will cut all economic ties with Russia, including jobs, and it will turn Moldova into a failed state, or in the CIA doublespeak, the country would stop being vulnerable to “Russian pressure.” Apparently, the failure of Moldova as a state, and its disappearance as a nation is also what the EU wants. On January 6, the new Moldovan Ambassador to Germany was presenting his credentials when, out of the blue, the German president asked the new ambassador what the procedure was for Republic of Moldova to formally unite with Romania. On May 4th, the Katehon reported on Vladimir Plahotniuc’s (the infamous Moldavian oligarch and mafia boss) visit to the US and his meeting with Victoria Nuland there. As the Victory Day celebration was approaching, we all fully anticipated from the US to conduct terror acts, military excursions/drills, and political and legal attacks on Russia as the US and the EU always do to harass Russia during its major national and Church holidays.
  • ...6 more annotations...
  • Starting with April 21st,  we saw a flurry of “news” about Ukraine and Romania joining NATO Black Sea flotilla and the organization of Romanian-Ukrainian-Bulgarian brigade similar to that created by Poland. On April 26, Georgia (Gruzia) pitched in via the Georgia Today: “creation of NATO Black Sea Fleet Gains US Support” and praising Turkey, Bulgaria and Romania for calls to expand the Western military. All what Russia said to all this NATO generated noise was a brief statement of  Russia’s envoy to NATO Alexander Grushko. “NATO should be in a position to know that all necessary steps will be taken from our side to neutralize the emerging threats.” With all these  preparations for the war on Russia going on, NATO also planned military drills in neutral Moldova, chosen to start on May 2nd, the day of remembrance for the victims of the Odessa Massacre. Meanwhile, the patriots of Moldavia who worked together regardless of their political views, discovered something interesting and saved Moldova. NATO reported that for drills they would be entering Moldova in four formations, and that the total of motorized units will be 50+. However, the very first formation that made an attempt to enter the territory of Moldova contained 100+ unites. This was just one formation. And there was expected three more formations.
  • The plan of NATO was to enter the country with too large for this tiny country forces, to stage a bloody false flag attack during the Victory Day celebration in Moldova with the participation of Ukrainian Right Sector terrorists masquerading as “pro-Russia separatists.” This plot worked in Ukraine, so it should work in Moldova, right? That’s the true reason why Nuland was in Kiev two weeks prior. After this false flag attack, a Romanian fleet was planned to enter Ukrainian territorial waters “by invitation of the Ukrainian government” and arrive to Odessa in order to block Russian fleets from interfering and helping Transnistria. But… Coming back to the bizarre incident near Gibraltar, when one NATO member’s tiny 20 tone Costal Guards’ boat was attacked by another NATO member for interfering with the 18,000 tones behemoth of a submarine  of the third NATO member. The NATO plan apparently was to stealthy and quietly position the Ohio-class ballistic guided-missile submarine USS Florida (SSGN 728) in the Mediterranean or even in the Black Sea so it would be able to shoot into Moldova to overwhelm Moldovan minuscule defense forces. We have to remember that it was the USS Florida “that opened up the Libya intervention,” firing more than 90 cruise missiles to destroy Libya’s air defenses and clearing the way for NATO air strikes. “Never before in the history of the United States of America has one ship conducted that much land attack strikes, conventionally, in one short time period,” Rear Adm. Rick Breckenridge had said.
  • However, thanks to Spanish Costal Guards the submarine was discovered and talked about all around the world via social media and the press. The USS Florida had no other options but to retreat and return to home base. In fact, there were TWO incidents on the same April 16th  day involving the USS Florida. First, it was  the Spanish patrol boat belonged to the Servicio de Vigilancia Aduanera, at whom the British Navy opened  fire.  A bit later,  the Guardia Civil vessel Rio Cedeña tried to cut across the submarine’s bow and was photographed  by multiple witnesses.
  • According to V.V. Pyakin, a political analyst with the Concept Technologies Foundation, a think tank located in St. Petersburg, NATO was in a process of conducting a full-scale invasion of Moldova with the annexation of a Southern part of Ukraine including Odessa to construct a NATO Navy base there. Moldova was supposed to become a part of Romania automatically with the US military forces arriving to the capital and taking  over the government of Moldova. That’s why NATO needed all those military “drills” in the Black Sea region and in the Baltics simultaneously. When the patriotic forces of Moldavia discovered that NATO was about to enter the territory of Moldova in four formations, 100+ motorized units each, they protested loudly and blocked the entrance of NATO troops on the border. Meanwhile, the biggest political fraction in Moldova threatened with the impeachment of the president for treason, if  NATO troops would be allowed to enter the country. Reports from Moldova at the time disclosed that American troops stopped at the border crossing didn’t have proper ID and other papers. Moldovans came to greet them with the banners “Moldova is a neutral country” and “Stop bases of NATO,” “Stop NATO” and “NATO go home.” As the result, on April 28th only about 60 units and 200 servicemen the U.S. Army 2nd Cavalry Regimental Engineer Squadron were allowed to enter the country.
  • When a formation of American military crossed the Romanian-Moldova border allegedly to take part in  Dragon Pioneer 2016 NATO military drills, Moldavian opposition leaders expressed protests. Several members of the Parliament blocked the road.  They reported to Russian and international media and news outlets that the US troops didn’t have an international agreement signed by the defense ministers of Moldova and USA. They also lacked a legal government agreement on the entrance of the heavy military equipment and weaponry to the territory of the country. 60% of American servicemen didn’t have valid military IDs. According to a TASS report,  “To prevent collisions, officers from the Fulger (Lightning) police battalion of special purpose intervened, which were specially delivered from Chisinau. After checking the documents, a column of military vehicles followed the US to the place of temporary location at the site of Negresht,” said the inspectorate.” “The initiative to invite the US troops into the country and hold the exhibition of American technology belongs to the Minister of Defense of Moldova Anatol Șalaru, who is famous for the organization of the “Museum of Soviet occupation” in Chisinau, calls to repeal neutrality and make the country a member of NATO, and the fight against monuments of the Soviet era.” This move was harshly criticized by Igor Dodon, whose party has the largest faction in Parliament and controls a quarter of the seats.
  • He stated: “We believe military exercises involving US troops on Moldovan territory is a flagrant violation of the constitutional principle of neutrality of Moldova. In this regard, the deputies from the Party of socialists have already initiated a number of procedures. They will continue, and this will be one of the reasons for introducing in May the initiative to dismiss the government.” By Victory Day it became apparent that the Nuland-Kogan-NATO plan for invasion of Moldova was foiled. All Americans could do was   to “crush” a Victory Day parade in the center of Moldova’s capital by coming uninvited and bringing their motorized vehicles to it. And that’s where NATO troops and Moldovan patriots came face to face. Pindos lost their freaking mind:  An American Colonel demands from the citizen of Moldova to leave the central square ПИНДОСЫ ОХРЕНЕЛИ В КОНЕЦ! Американский полковник предлагает покинуть центральную площадь Кишинева гражданину РМ pic.twitter.com/FfECO3NBXi — Серж Высоцкий (@Albertich50) May 12, 2016 An American Colonel demands from the citizen of Moldova to leave the central square
Paul Merrell

Obama equates Israel's creation to African-Americans gaining right to vote - 0 views

  •      President Obama gave another interview to Jeffrey Goldberg, at the Atlantic.
  • And this about anti-Semitism and anti-Zionism. If you don’t think Israel has a right to exist as a homeland for the Jewish people, you’re anti-Semitic. Goldberg: I know that you’ve talked about this with Jewish organizations, with some of your Jewish friends—how you define the differences and the similarities between these two concepts. Obama: You know, I think a good baseline is: Do you think that Israel has a right to exist as a homeland for the Jewish people, and are you aware of the particular circumstances of Jewish history that might prompt that need and desire? And if your answer is no, if your notion is somehow that that history doesn’t matter, then that’s a problem, in my mind. If, on the other hand, you acknowledge the justness of the Jewish homeland, you acknowledge the active presence of anti-Semitism—that it’s not just something in the past, but it is current—if you acknowledge that there are people and nations that, if convenient, would do the Jewish people harm because of a warped ideology. If you acknowledge those things, then you should be able to align yourself with Israel where its security is at stake, you should be able to align yourself with Israel when it comes to making sure that it is not held to a double standard in international fora, you should align yourself with Israel when it comes to making sure that it is not isolated.
  • But you should be able to say to Israel, we disagree with you on this particular policy. We disagree with you on settlements. We think that checkpoints are a genuine problem. We disagree with you on a Jewish-nationalist law that would potentially undermine the rights of Arab citizens. And to me, that is entirely consistent with being supportive of the State of Israel and the Jewish people. Now for someone in Israel, including the prime minister, to disagree with those policy positions—that’s OK too. And we can have a debate, and we can have an argument. But you can’t equate people of good will who are concerned about those issues with somebody who is hostile towards Israel. And you know, I actually believe that most American Jews, most Jews around the world, and most Jews in Israel recognize as much. And that’s part of the reason why I do still have broad-based support among American Jews. It’s not because they dislike Israel, it’s not because they aren’t worried about Iran having a nuclear weapon or what Hezbollah is doing in Lebanon. It’s because I think they recognize, having looked at my history and having seen the actions of my administration, that I’ve got Israel’s back, but there are values that I share with them that may be at stake if we’re not able to find a better path forward than what feels like a potential dead-end right now.
  • ...1 more annotation...
  • The president also equated the foundation of Israel with the civil rights movement in the U.S. [T]o me, being pro-Israel and pro-Jewish is part and parcel with the values that I’ve been fighting for since I was politically conscious and started getting involved in politics. There’s a direct line between supporting the right of the Jewish people to have a homeland and to feel safe and free of discrimination and persecution, and the right of African Americans to vote and have equal protection under the law. These things are indivisible in my mind. But what is also true, by extension, is that I have to show that same kind of regard to other peoples. And I think it is true to Israel’s traditions and its values—its founding principles—that it has to care about those Palestinian kids. Says Donald Johnson, who tipped me to this: “I  understand the long history of antisemitism as an argument for having a Jewish state, but why can’t people be honest about the price paid by the Palestinians? I know the answer.”
  •  
    Oh, I didn't know that: The American civil rights movement created paramilitary forces and overthrew the U.S. government, driving nearly all of the white people into one corner of the country, then set up their own national democratic goverrnment in the remainder, granted citizenship to any black people who wanted to emmigrate to the United Black States of America but denied all others citizenship, and enacted 51 laws that granted more rights to black citizens than their remaining few token whites, etc.  Horse feathers. Obama just shamed the American civil rights movement and he deserves to be tarred and feathered for it. 
Paul Merrell

GUANTANAMO BAY NAVY BASE, Cuba: Guantánamo judge to CIA: Disclose 'black site... - 0 views

  • The military judge in the USS Cole bombing case has ordered the CIA to give defense lawyers details — names, dates and places — of its secret overseas detention and interrogation of the man accused of planning the bombing, two people who have read the still-secret order said Thursday.Army Col. James L. Pohl issued the five-page order Monday. It was sealed as document 120C on the war court website Thursday morning and, according to those who have read it, orders the agency to provide a chronology of the overseas odyssey of Abd al Rahim al Nashiri, 49, from his capture in Dubai in 2002 to his arrival at Guantánamo four years later.The order sets the stage for a showdown between the CIA and a military judge, if the agency refuses to turn over the information to the prosecution for the defense teams. The order comes while the CIA fights a bitter, public battle with the Senate on its black site torture investigation.
  • The judge’s order instructs prosecutors to provide nine categories of closely guarded classified CIA information to the lawyers — including the names of agents, interrogators and medical personnel who worked at the so-called black sites. The order covers “locations, personnel and communications,” interrogation notes and cables between the black sites and headquarters that sought and approved so-called enhanced interrogation techniques, the two sources said.It does not, however, order the government to turn over Office of Legal Counsel memos that both blessed and defined the so-called Torture Program that sent CIA captives to secret interrogations across the world after the Sept. 11, 2001 attacks — out of reach of International Committee of the Red Cross delegates.“It’s a nuclear bomb that may shut down the case,” said one person who read the order and is not a part of the Cole case.
Paul Merrell

9/11 lawyers trade barbs over CIA 'black site' translator turned Guantánamo d... - 0 views

  • The Sept. 11 trial judge and prosecutors struggled Wednesday to find a way forward out of the startling discovery that a former CIA linguist tasked to translate for an alleged 9/11 plotter earlier worked at a secret CIA prison.Defense lawyers, who say their clients were tortured in the agency’s secret prison network, asked to take sworn testimony from the man. They also asked the judge to halt the intended two-week pretrial hearing, the first since August, to conduct an inquiry and perhaps new background checks on defense team staff in the complex, five-man death-penalty prosecution. About 130 people, both military and civilian, work at the Office of the Chief Defense Counsel.“This has so decimated any trust on this team,” said defense attorney Cheryl Bormann, her voice cracking, “we can't go forward.”
  • Army Col. James L. Pohl, the judge, said he’d hear from prosecutors Thursday on the request to question the former CIA linguist who had been working temporarily for the team representing accused terrorist Ramzi Bin al Shibh since August. A new translator, who just got his security clearance on Friday, was flown in Tuesday from Miami. Meantime, defense and prosecution attorneys traded accusations over how the contract linguist came to sit beside Bin al Shibh on Monday in a courtroom where four of the five accused 9/11 conspirators said they recognized him from their years of secret detention.
  • War court Arabic language linguists come from a pool of names provided by approved Pentagon contractors. They require special security clearances that allow them to work with secret intelligence. Bin al Shibh’s lead counsel, Jim Harrington, said after court that he and a co-counsel vetted the linguist in August, and he had no idea of the translator’s previous CIA work before the alleged terrorist disclosed it in court Monday.“The problem is I cannot trust him because he was working at the black site with the CIA, and we know him from there,” said Bin al Shibh, a Yemeni accused of functioning as a 9/11 plot deputy.
  • ...3 more annotations...
  • Bormann wants to investigate “every defense team member” past and present for undisclosed previous work, and told the judge the prosecution filing on the CIA linguist episode was an “out and out falsehood.” Nevin asked the judge to suspend proceedings “until we can get to the bottom of this issue.”The issue is the latest to beleaguer preparation for the trial of the five men accused of conspiring in the Sept. 11, 2001 terror attacks, and, as defense lawyers see it, fodder for an eventual motion to dismiss the case for outrageous government conduct.It had already been sidelined by what defense lawyers called an FBI infiltration of their privilege by agents secretly questioning team members then having them sign non-disclosure agreements.
  • It was the FBI snooping episode that set up this week’s CIA linguist scandal. Little is known about what the FBI was investigating in secret approaches and questioning of defense teams. But as a result, Bin al Shibh’s earlier translator lost his security clearance and his job.They settled on a new permanent linguist, who didn’t arrive on this remote base until Tuesday.In between, the temporary translator who worked at a CIA black site had been filling in since August, off and on, according to Harrington — and had met Bin al Shibh earlier.
  • But Bin al Shibh only disclosed in court Monday that he recognized the linguist from a secret prison where Bin al Shibh had been held captive before his arrival at Guantánamo in 2006. Accused accomplices Ammar al Baluchi and Walid bin Attash recognized him, too, as did Mohammed. The three were apparently seeing the translator for the first time at Guantánamo in court Monday.
  •  
    Dismissal for outrageous conduct is what needs to happen. And the officials who ordered the penetration of the defense team in the FBI and CIA need to be dismissed from government and prosecuted criminally. 
Paul Merrell

Speech Recognition is NSA's Best-Kept Open Secret - The Intercept - 0 views

  • Siri can understand what you say. Google can take dictation. Even your new smart TV is taking verbal orders. So is there any doubt the National Security Agency has the ability to translate spoken words into text? But precisely when the NSA does it, with which calls, and how often, is a well-guarded secret. It’s not surprising that the NSA isn’t talking about it. But oddly enough, neither is anyone else: Over the years, there’s been almost no public discussion of the NSA’s use of automated speech recognition.
  • Siri can understand what you say. Google can take dictation. Even your new smart TV is taking verbal orders. So is there any doubt the National Security Agency has the ability to translate spoken words into text? But precisely when the NSA does it, with which calls, and how often, is a well-guarded secret. It’s not surprising that the NSA isn’t talking about it. But oddly enough, neither is anyone else: Over the years, there’s been almost no public discussion of the NSA’s use of automated speech recognition. One minor exception was in 1999, when a young Australian cryptographer named Julian Assange stumbled across an NSA patent that mentioned “machine transcribed speech.”
  • One minor exception was in 1999, when a young Australian cryptographer named Julian Assange stumbled across an NSA patent that mentioned “machine transcribed speech.” Assange, who went on to found WikiLeaks, said at the time: “This patent should worry people. Everyone’s overseas phone calls are or may soon be tapped, transcribed and archived in the bowels of an unaccountable foreign spy agency.” The most comprehensive post-Snowden descriptions of NSA’s surveillance programs are strangely silent when it comes to speech recognition. The report from the President’s Review Group on Intelligence and Communications Technologies doesn’t mention it, and neither does the October 2011 FISA Court ruling, or the detailed reports from the Privacy and Civil Liberties Oversight Board.
  • ...3 more annotations...
  • There is some mention of speech recognition in the “Black Budget” submitted to Congress each year. But there’s no clear sign that anybody on the Hill has ever really noticed. As The Intercept reported on Tuesday, items from the Snowden archive document the widespread use of automated speech recognition by the NSA. The strategic advantage, invasive potential and policy implications of being able to turn spoken words into text are not trivial: Suddenly, voice conversations, historically considered ephemeral and unsearchable, can be scanned, catalogued and archived — not perfectly, but well enough to dramatically increase the effective scope of eavesdropping. Former senior NSA executive turned whistleblower Thomas Drake, who’s seen NSA’s automated speech recognition at work, says the silence is telling.
  • “You’re seeing a black hole,” Drake told The Intercept. “That means there’s something there that’s really significant. You’re seeing some of the fuzzy contours of this whole other program.”
  • Senator Ron Wyden, D-Ore., arguably the foremost congressional critic of NSA overreach, wouldn’t comment directly on the question of speech recognition. But, he said through a spokesperson: “After 14 years on the Intelligence Committee, I’ve learned that senators must be constantly on the lookout for secret interpretations of the law and advances in surveillance that Congress isn’t aware of.” He added: “For centuries, individual privacy was protected in part by the limited resources of governments. It simply wasn’t possible for governments to secretly collect information on every single citizen without investing in massive networks of spies and informants. But in the 21st century mass surveillance is no longer difficult and expensive — it’s increasingly cheap and easy. The only privacy protections that will matter in the future are the ones that are written into law and defended by public demand for freedom and openness.”
  •  
    A "black hole" at the NSA? Voice-to-text is indeed an ultra-powerful intelligence tool, but only if you are gathering verbal conversations. As content, verbal conversations should be off-limits without a court order. But is NSA honoring that limitation? And is the FISA Court enforcing it?
Paul Merrell

After Criticism, Washington Post Disavows 'Russian Propaganda' Blacklist Of Indie Media - 0 views

  • AUSTIN, Texas — Amid a wave of widespread criticism and legal threats, the Washington Post has added a lengthy editor’s note to an article which alleged that a host of independent media websites were spreading Russian propaganda. Washington Post added editor's note to top of "Russian propaganda" story after being called out for shoddy reportinghttps://t.co/dWKbZJGS9a pic.twitter.com/skGiZUX2Ls — Ben Norton (@BenjaminNorton) December 7, 2016 The article, written by Craig Timberg and published on Nov. 24, relied largely on information compiled by PropOrNot, an anonymous group that claims to be comprised of media analysts and researchers. At the time the Post story was published, the group’s homepage featured a list of 200 websites, including MintPress News and many other well-established independent media outlets, which the organization alleges are either deliberately or inadvertently spreading Russian propaganda. Among other criticisms levied against the group, PropOrNot’s research depends on overly broad criteria. According to its own stated methodology, criticism of the ”US, Obama, Hillary Clinton, the EU, Angela Merkel, NATO, Ukraine, Jewish people, US allies, the ‘mainstream media,’ and democrats, the center-right or center-left, and moderates of all stripes,” would be grounds for inclusion on “The List.” The Post added an editor’s note to the article on Wednesday in an apparent attempt to distance the newspaper from the controversy. “The Washington Post on Nov. 24 published a story on the work of four sets of researchers who have examined what they say are Russian propaganda efforts to undermine American democracy and interests,” the note begins.
  • While Timberg’s article does refer to the work of multiple researchers, the bulk of the report relied on allegations made by PropOrNot. The Washington Post continued: “One of them was PropOrNot, a group that insists on public anonymity, which issued a report identifying more than 200 websites that, in its view, wittingly or unwittingly published or echoed Russian propaganda. A number of those sites have objected to being included on PropOrNot’s list, and some of the sites, as well as others not on the list, have publicly challenged the group’s methodology and conclusions. The Post, which did not name any of the sites, does not itself vouch for the validity of PropOrNot’s findings regarding any individual media outlet, nor did the article purport to do so.” Numerous websites, including MintPress, have objected to their inclusion on “The List.” On Tuesday, James Moody, the lawyer representing the publisher of the website Naked Capitalism, demanded a formal retraction and public apology on Tuesday. Moody wrote: “You did not provide even a single example of ‘fake news’ allegedly distributed or promoted by Naked Capitalism or indeed any of the 200 sites on the PropOrNot blacklist. You provided no discussion or assessment of the credentials or backgrounds of these so-called ‘researchers’ (Clint Watts, Andrew Weisburd, and J.M. Berger and the “team” at PropOrNot), and no discussion or analysis of the methodology, protocol or algorithms such ‘researchers’ may or may not have followed.” Backlash against both PropOrNot and the Post’s story hasn’t just come from media outlets included on “The List,” though.
  • “The group promoted by the Post … embodies the toxic essence of Joseph McCarthy, but without the courage to attach individual names to the blacklist,” wrote Ben Norton and Glenn Greenwald in The Intercept, which was not featured on the PropOrNot list, on Nov. 26. The Post’s editor’s note concludes: “Since publication of The Post’s story, PropOrNot has removed some sites from its list.” However, MintPress and Naked Capitalism remain on “The List,” as do respected alternative and independent media sites Antiwar.com, Black Agenda Report, Truthout, and Truthdig. Overall, the Post’s new position seemed poorly received by many of the media analysts who have criticized the story. On Wednesday evening, Adam Johnson, a reporter who writes for Fairness and Accuracy in Reporting, tweeted that the Post editors who refuse to retract the story are “a bunch of cowards.” what a bunch of cowards. "This blacklist that served as the entire news basis of our piece is bullshit but we wont retract the story" https://t.co/V5ZSwSMgTg — Adam H. Johnson (@adamjohnsonNYC) December 7, 2016 Timberg’s article appeared amid widespread outcry over the apparent threat of “fake news” against American democracy. Kevin Gosztola, managing editor of Shadowproof, told MintPress editor-in-chief Mnar Muhawesh that the rush to create “blacklists” of media outlets undermines the freedom of the press.
  • ...1 more annotation...
  • “When you start to put people on lists you’re actually diminishing speech,” Gosztola said in an interview with Muhawesh for “Behind the Headline.”
  •  
    The Washington Post backpedals from its "fake news" story.
Paul Merrell

The Sound of Torture - The Intercept - 0 views

  • Suddenly there was a chilling scream. “Allah,” someone wailed. “Allah! Allah!” As I wrote at the time, this wasn’t a cry of religious ecstasy. It was the sound of deep pain, coming from elsewhere in the town library, which had been turned into a detention center by Iraqi security forces who were advised by American soldiers and contractors. I was embedded with the Americans for a week, and I had already heard two of them, from the Wisconsin National Guard, talk about seeing their Iraqi partners trussing up prisoners like animals at a slaughter. During raids, I had seen these Iraqis beat their detainees — muggings as a form of questioning — while their American advisers watched.
  • The CIA’s violations of its detainees are the tip of the torture iceberg. We run the risk, in the necessary debate sparked by the Senate’s release of 500 pages on CIA interrogation abuses, of focusing too narrowly on what happened to 119 detainees held at the agency’s black sites from 2002-2006. The problem of American torture — how much occurred, what impact it had, who bears responsibility — is much larger. Across Iraq and Afghanistan, American soldiers and the indigenous forces they fought alongside committed a large number of abuses against a considerable number of people. It didn’t begin at Abu Ghraib and it didn’t end there. The evidence, which has emerged in a drip-drip way over the years, is abundant though less dramatic than the aforementioned 500-page executive summary of the Senate’s still-classified report on the CIA.
  • Just as the CIA opposed release of the Senate torture report, the Pentagon and White House continue to do their best to suppress the evidence. The Daily Beast noted the other day that the Obama Administration, responding to pressure from the Pentagon, continues to fight in court to prevent the publication of thousands of photos of detainee abuse. The argument against release is nearly identical to the argument used by the CIA to repress the Senate’s report—it could put American lives in danger. To her credit, Sen. Dianne Feinstein pushed back and published an executive summary of her committee’s 6,000-page report (which has caused practically no protest or violence overseas). Repression is the gut instinct of institutions that have something to hide, and I came across that in Samarra, too. Shortly after I witnessed the threatened execution of a detainee (an Iraqi soldier pointed his AK-47 at a prisoner who was against a wall with his hands up), an order came down from the American command to get me out of Samarra. I was told to pack my backpack for the next convoy out of town. After I made a flurry of calls on my satellite phone, the order was rescinded. Someone wanted the truth to come out.
  • ...2 more annotations...
  • Here’s a partial reading list of essential reporting on torture in Iraq and Afghanistan: Senate Report on Abuses of Military Detainees (2008): http://media.washingtonpost.com/wp-srv/nation/pdf/12112008_detaineeabuse.pdf Haditha Killings by Tim McGirk: http://content.time.com/time/world/article/0,8599,1174649,00.html Taguba Report on Abuses at Abu Ghraib: https://www.aclu.org/sites/default/files/torturefoia/released/TR3.pdf Abu Ghraib Abuses by Seymour Hersh: http://www.newyorker.com/magazine/2004/05/10/torture-at-abu-ghraib Special Forces in Afghanistan by Matt Aikens: http://www.rollingstone.com/feature/a-team-killings-afghanistan-special-forces Constitution Project’s Task Force on Detainee Treament (See especially chapter 3): http://detaineetaskforce.org/report/ “The Dark Side” by Jane Mayer: http://www.amazon.com/The-Dark-Side-Inside-American/dp/0307456293
  • “None of Us Were Like This Before” by Joshua Phillips: http://www.amazon.com/None-Were-Like-This-Before/dp/1844678849 The Killing of Dilawar by Carlotta Gall: http://www.nytimes.com/2003/03/04/international/asia/04AFGH.html “Pay Any Price” by James Risen (See especially Chapter 7): http://www.barnesandnoble.com/w/pay-any-price-james-risen/1117916812?ean=9780544341418 “Dirty Wars” by Jeremy Scahill (a founder of The Intercept): http://www.amazon.com/Dirty-Wars-The-World-Battlefield/dp/156858671X “How to Break a Terrorist” by Matthew Alexander: http://www.amazon.com/How-Break-Terrorist-Interrogators-Brutality/dp/B0085S1S5K “The Black Banners” by Ali Soufan: http://www.amazon.com/Black-Banners-Inside-Against-al-Qaeda/dp/0393079422 “Kandahar’s Mystery Executions” by Anand Gopal: http://harpers.org/archive/2014/09/kandahars-mystery-executions/ “No Good Men Among the Living” by Anand Gopal: http://www.amazon.com/No-Good-Men-Among-Living/dp/0805091793
Gary Edwards

Columbine Survivor Pens Bold Open Letter to Obama Rejecting Gun Control: 'Whose Side Ar... - 0 views

  •  
    Amazing letter from Columbine survivor, Evan Todd, to Obama, explaining why Obama's gun control proposals are non sense. Evan Todd's open letter to Obama, below. - Mr. President, As a student who was shot and wounded during the Columbine massacre, I have a few thoughts on the current gun debate. In regards to your gun control initiatives: Universal Background Checks First, a universal background check will have many devastating effects. It will arguably have the opposite impact of what you propose. If adopted, criminals will know that they can not pass a background check legally, so they will resort to other avenues. With the conditions being set by this initiative, it will create a large black market for weapons and will support more criminal activity and funnel additional money into the hands of thugs, criminals, and people who will do harm to American citizens. Second, universal background checks will create a huge bureaucracy that will cost an enormous amount of tax payers dollars and will straddle us with more debt. We cannot afford it now, let alone create another function of government that will have a huge monthly bill attached to it. Third, is a universal background check system possible without universal gun registration? If so, please define it for us. Universal registration can easily be used for universal confiscation. I am not at all implying that you, sir, would try such a measure, but we do need to think about our actions through the lens of time. It is not impossible to think that a tyrant, to the likes of Mao, Castro, Che, Hitler, Stalin, Mussolini, and others, could possibly rise to power in America. It could be five, ten, twenty, or one hundred years from now - but future generations have the natural right to protect themselves from tyrannical government just as much as we currently do. It is safe to assume that this liberty that our forefathers secured has been a thorn in the side of would-be tyrants ever since the Second Amendmen
Paul Merrell

Israel's ex-security chiefs stand with the international community on Iran deal - Diplo... - 0 views

  • Amid the cries of woe echoing from the cabinet since Sunday, we could have expected the former intelligence chiefs to join the government’s battle to convince the world of the dangers of the Geneva agreement. But that didn’t happen. “When I heard the reactions in Jerusalem, I mistakenly thought for a moment that Iran had begun to develop a nuclear warhead,” said former Military Intelligence chief Amos Yadlin. His predecessor, Aharon Ze’evi-Farkash, warned about the expected damage from the increasingly bitter rift between Israel and the United States.
  • The question at this late stage is what alternatives Israel has. It was Netanyahu who decided in previous years not to attack the nuclear sites. And now Iran is gradually emerging from its international isolation thanks to the negotiations with the world powers. For a moment it seemed that Israel, as it quarrels with the United States and the European Union on settlement construction, insisted on filling Iran’s shoes as international pariah.
  •  
    Poor Bibi and crew. Their justification for goading the U.S. into war against Iran just got taken off the table. And they're upset about it because it never was really about the mythical Iranian nuclear weaponization. It was about removing the only military force in the region capable of stopping an Israeli invasion. Iran, the nation that came to the aid of Syria when the Izzies and the Saudis wanted to destabilize Syria and break it into smaller pieces and almost persauded the U.S. to launch missile strikes against Syria under the pretext of a false flag nerve gas attack actually carried out by Saudi puppet jihadis. Poor Bibi. No U.S. war against Iran. And to be told this by a black president. (Israel's right-wing is far from kind to black Africans in Israel. They get treated like they were Arab Palestinians.) But Bibi can't burn that bridge with the U.S. and stay in power. U.S. support is the only reason that Israel still exists.        
Gary Edwards

Security, the Edward Snowden Way - Datamation - 0 views

  • NoScript NoScript is a free extension for Mozilla-based web browsers, including Firefox. It blocks executable web content by default. This blocking includes JavaScript, Java, Flash and Silverlight. You can whitelist sites if you want to use such content on a site-by-site basis. Or, if you choose, you can make all sites active by default and choose to blacklist sites you think might be dangerous. A visual button tells you if active content has been blocked on the current site.
  • PGP In the first chapter of his book “No Place to Hide,” journalist Glenn Greenwald wrote that Edward Snowden contacted him using the alias “Cincinnatus,” and said he would tell Greenwald some highly newsworthy facts, but only if he installed Pretty Good Privacy (PGP) first. (Greenwald didn’t know the magnitude of the scoop being offered to him and didn’t get around to installing PGP for months, thus delaying the leak.) PGP, of course, is a 23-year-old encryption program that can be used for email, as well as files and other things.
  • Tor Tor is a free application that routes your Internet traffic through a global volunteer network of thousands of relays that play a shell game with your data so your location and Internet travels are concealed. Tor, which used to stand for “The Onion router” in a reference to layers of encryption, encrypts data in multiple layers that prevents snoops from being able to figure out any details about your web travels, such as where you are or what you’re looking at. Tor was developed in part by US government funding as a way to enable citizens in repressive countries to communicate safely. And the NSA has a lot of respect for it. But in a recent controversy, two Carnegie Mellon researchers said they would give a talk at the Black Hat USA 2014 conference next month telling how to identify Tor users inexpensively (for only $3,000). The session was cut from the lineup because university lawyers didn’t approve it. The institute that the researchers work for is funded by the Pentagon, but the Department of Homeland Security said they did not request that the talk be cancelled.
  •  
    "Whether you think NSA whistleblower Edward Snowden is a hero or a traitor, you have to admit: The guy knows how to keep his information secure. The fact that Snowden isn't sitting in Guantanamo right now with ankle cuffs and a bag over his head demonstrates his ability to avoid detection. Snowden spoke at the Hope X conference in New York this month via a Google+ Hangout from Russia, and called on developers to build privacy and security into everyday products. He also hinted that he planned to work on building such technology. If you look into the details of what's been happening with tracking, surveillance, spying, hacking and global cyber industrial espionage, you can see that Snowden is right. We all need a lot better protection from snoops of all stripes. But how does the non-expert get started? One option is to listen to Snowden himself. Over the past year, Snowden has in one format or another, made specific product recommendations. Here are the products Snowden has explicitly recommended since the trove of documents on the NSA has been publicly revealed. (The list is in alphabetical order.) Ghostery Ghostery, made by a company called Evidon, is a browser extension for Chrome, Firefox, Safari and Internet Explorer. It exists for two purposes. The first is to block tracking code, which makes browsing the web both more private and also faster. The second purpose is, somewhat contradictory -- Evidon collects data from you to help advertisers avoid being blocked. It also enables website owners to gain insights into the tracking code deployed on their site by third-party advertising companies. Note that Snowden recommended Ghostery some time ago. But this month, the Electronic Frontier Foundation launched a competing product that I would imagine Snowden would recommend called Privacy Badger."
  •  
    I'd back Snowden in 2016 as a write-in candidate for President.
Paul Merrell

The Mysterious Case of Prisoner 212 - The Intercept - 0 views

  • Researchers and reporters had long counted the total number of prisoners who cycled through Guantanamo at 779, but the Senate intelligence committee’s report on CIA torture revealed that there was one more previously unknown detainee. Ibn al-Shaykh al-Libi, also known as prisoner 212, was held at a secret black site at Guantanamo Bay, according to the report, bringing the total number of detainees to 780. That al-Libi was held by the CIA is long established.  After all, al-Libi’s name is notorious as the source of bad information used by the Bush administration to tie Saddam Hussein to Al-Qaeda to support the US invasion of Iraq — information he provided while being tortured in Egyptian custody, and later recanted. More than a single digit change in the tally, al-Libi’s hitherto unknown presence at Guantanamo underscores how much remains unknown about the total number of detainees and their fates. The Senate report includes a list of 119 men– a rare official disclosure of the individuals held and in many cases tortured by the CIA. Only a fraction of those had previously been acknowledged as CIA detainees, though journalists and human rights groups had pieced together the population of prisoners from disclosures about Guantanamo, leaked documents, and court proceedings.
  • The black sites in the Senate report are identified by color code names, but journalists and human rights groups quickly identified them. As the Miami Herald’s Carol Rosenberg first noted, the report confirms that al-Libi was at one of Guantanamo’s black sites—“Maroon” and “Indigo” in the report. Al-Libi was secreted away from Guantanamo in 2004 along with four other so-called high value detainees, before the Supreme Court determined that prisoners at the naval base had the right to challenge their detention. Disappearing those detainees gave the CIA leeway to continue secret interrogations outside the view of any court system. Al-Libi ultimately ended up in prison in Libya, where he died in 2009. The Senate report doesn’t cover everyone caught up in the CIA’s net. The Open Society Foundations, for example, published a report last year detailing 136 cases of individuals suspected to have been detained or rendered by the CIA. The Senate report misses some high-profile cases, however, because it didn’t include rendition — when the CIA handed prisoners over to third countries for interrogation or imprisonment. (As the Intercept’s Peter Maass noted last week, it also doesn’t touch on detainee abuse by the military.)
  • According to the Intercept’s research, there are still 50 former CIA prisoners named by Senate investigators whose fates are unknown, and who have not, to our knowledge, spoken to the media or human rights groups. If you have any information about the names listed here, email the authors at cora.currier@theintercept.com or margot.williams@theintercept.com, or communicate with us anonymously via SecureDrop.
Paul Merrell

Pentagon: 9/11 defense team linguist was CIA asset | The Miami Herald The Miami Herald - 0 views

  • The military confirmed Tuesday that a linguist tasked to serve on the death-penalty defense of an alleged Sept. 11 plotter had previously worked for the CIA but would not say whether he worked at a black site.The revelation Monday by alleged plot deputy Ramzi bin al Shibh, 42, brought this week’s resumption of the Sept. 11 hearings, the first in six months, to a screeching halt. All but one of the five alleged 9/11 conspirators said they independently recognized the stony-faced translator seated beside bin al Shibh at the war court from their years in the spy agency’s secret overseas prisons.The five men, led by alleged mastermind Khalid Sheik Mohammed, 49, are accused of orchestrating, financing and training the men who hijacked four aircraft and killed nearly 3,000 people at the World Trade Center, Pentagon and a Pennsylvania field on Sept. 11, 2001.
  • Defense attorneys accuse the CIA of torturing their clients and then seeking to hide the evidence from their death-penalty trials. They also allege U.S. government and military interference is designed to disrupt their work with the accused.The five defendants return to court Wednesday to figure a way forward after the revelation, the latest snag in pretrial hearings for the case that has no trial date. The judge, Army Col. James L. Pohl, gave lawyers Tuesday to conduct research, and trade classified court filings — starting with one by the prosecution Monday night that apparently described the controversial contract linguist’s intelligence background.Tuesday afternoon, a Pentagon spokesman, Army Lt. Col. Myles B. Caggins, said the linguist “has in the past made readily available to prospective supervisors his prior work experience with the United States government, including with the CIA.”
  • Caggins would not say whether the linguist worked at a CIA “black site,” an overseas prison where agents secretly interrogated prisoners and subjected them to brutal techniques — waterboarding, nudity, sleep deprivation, painful shackling and a quasi-medical procedure called rectal rehydration. He did, however, distance the case prosecutor, Brig. Gen. Mark Martins, from the disruption, saying his office “does not have any role in providing linguists to defense teams in military commissions.” He said defense lawyers get to vet their own linguists.“We vetted him. He denied it,” Bin al Shibh’s attorney, Jim Harrington, said Tuesday evening. Harrington said his team pointedly asked the linguist whether he had “participated in any interrogation, questioning or done any work with respect to detainees. Any place. His résumé denies it. It says he worked someplace else — Reston, Va., from 2002 to 2006.”Bin al Shibh was held in a series of secret overseas prison from his capture in Pakistan on Sept. 11, 2002until his arrival at Guantánamo four years later. Even then, according to the so-called Senate Torture Report, he remained in CIA custody.Defense lawyers want more information.
  • ...1 more annotation...
  • “We will be filing motions for discovery regarding the former CIA interpreter utilized by Mr. Bin al Shibh’s defense team,” said attorney Cheryl Bormann, defending the alleged terror trainer Walid bin Attash, 36, who she said was shaken at seeing someone from a black site.Bormann also said she would be seeking a court order from Judge Pohl similar to the one Pohl styled after disclosure that FBI agents were investigating and questioning members of the 9/11 defense team: Instructing the defense team members to disclose if they worked for the CIA or a CIA contractor, absolving them of any Non Disclosure Order they signed with the CIA.“If people aren’t truthful about their background,” Bormann said, “there’s really no way for us to determine whether or not they are inappropriately assigned to our team.”
  •  
    So, it sounds like the CIA was trying to sneak an agent who understands Arabic into the GITMO defendants' defense team. This, after the FBI was caught interrogating a defense team member. Time to dismiss the charges and free the defendants, I think. These men can't get a fair trial. 
Paul Merrell

Guantánamo hearing halted by supposed CIA 'black site' worker serving as war ... - 0 views

  • The 9/11 trial judge abruptly recessed the first hearing in the case since August on Monday after some of the alleged Sept. 11 plotters said they recognized a war court linguist as a former secret CIA prison worker.Alleged plot deputy Ramzi bin al Shibh, 42, made the revelation just moments into the hearing by informing the judge he had a problem with his courtroom translator. The interpreter, Bin al Shibh claimed, worked for the CIA during his 2002 through 2006 detention at a so-called “Black Site.”“The problem is I cannot trust him because he was working at the black site with the CIA, and we know him from there,” he said.This week’s is the first hearing for the five men accused of conspiring in the Sept. 11, 2001 attacks — that killed nearly 3,000 people in New York, the Pentagon and Pennsylvania — since the public release of portions of a sweeping Senate Intelligence Committee study of the agency’s secret prisons known as “The Torture Report.”
  • Instead the issue became, apparently, a stony-faced translator who was sitting alongside Bin al Shibh in court when the hearing started. Lawyers for the alleged mastermind, Khalid Sheik Mohammed, 49, and his nephew, Ammar al Baluchi, 37, said they learned about the recognition just as court began. The judge ordered a quick recess, excused Campoamor-Sanchez and summoned the chief prosecutor, Army Brig. Gen. Mark Martins, for questioning.Court resumed briefly with the linguist missing. Martins sought, and got, a continuing recess until 9 a.m. Wednesday, to look into the issue and file a written pleading with the court. Pleadings are sealed for at least 15 days for intelligence agencies’ scrub of secret information.Mohammed’s attorney, David Nevin, asked Pohl to order the suspected CIA worker to not leave this remote base in southeast Cuba and to submit to defense questioning.
  • Cheryl Bormann, attorney for another alleged plotter, Walid bin Attash, 36, told the judge, Army Col. James L. Pohl, that her client “was visibly shaken” at recognizing a man in the maximum-security war court.“My client relayed to me this morning that there is somebody in this courtroom who was participating in his illegal torture,” she said.Bormann said it was either “the biggest coincidence ever” or “part of the pattern of the infiltration of defense teams.” Monday’s hearing was supposed to start with a presentation by a Justice Department lawyer, Fernando Campoamor-Sanchez, on FBI agents secretly questioning members of the Bin al Shibh defense team. The Sept. 11 legal defense teams have called the FBI’s action spying on privileged attorney-client conversations.
  • ...2 more annotations...
  • War court translators are provided by one of two Defense Department contractors paid by the Pentagon unit that runs the war court, called the Office of the Convening Authority for Military Commissions. It’s run by retired Marine Maj. Gen. Vaughn Ary, a former military lawyer. The contractors are Leidos and All World.Ary’s office provides a list of qualified translators to the Office of Military Commissions Defense unit, and, in the capital cases, each one gets a dedicated translator assigned to the team. Teams can object to the choice, and have done so in the past, as unsuitable, according to earlier war court sessions.The war court’s Chief Defense Counsel, Air Force Col. Karen Mayberry, said after the court session Monday that the translator sitting with Bin al Shibh in court was not permanently assigned to his team, or the 9/11 case. The Bin al Shibh team had lost its translator after an FBI investigation secretly questioned Sept. 11 defense team members. Monday’s translator, the one that Bin al Shibh said he recognized from a CIA prison, had worked for years on war court defense teams, but none with the Sept. 11 death-penalty case, according to Mayberry. Monday’s translator was filling in for this session because, although the Bin al Shibh team had chosen a new team translator, the new permanent translator had not yet gotten a security clearance, which can be a lengthy process.
  • Bin al Shibh and the other four men are accused of helping to orchestrate, train, and arrange travel for the 19 men who hijacked four U.S. passenger aircraft on Sept. 11, 2001. The prosecutor is seeking their execution, if they are convicted. The CIA held and interrogated them for three to four years in secret overseas prisons before they were brought to Guantánamo in September 2006. But even once they got here, they continued to be in CIA custody, according to the Senate report. Jay Connell, attorney for Baluchi, 37, said Sunday it is still not known when the agency relinquished control of the men, who are held in a secret prison called Camp 7.
1 - 20 of 85 Next › Last »
Showing 20 items per page