Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged classified-records

Rss Feed Group items tagged

Paul Merrell

Ray McGovern Triumphs over State Department | The Dissenter - 0 views

  • If you don’t know Ray McGovern yet, you probably should. You see, Ray just beat down, in court, Hillary Clinton, the State Department, and a small part of Post-Constitutional America.
  • Ray McGovern was put on the State Department’s Diplomatic Security BOLO list– Be On the Look Out– one of a series of proliferating government watch lists. What McGovern did to end up on Diplomatic Security’s dangerous persons list and how he got off the list are a tale of our era, Post-Constitutional America.
  • Ray’s offense was to turn his back on Hillary Clinton, literally. In 2011, at George Washington University during a public event where Clinton was speaking, McGovern stood up and turned his back to the stage. He did not say a word, or otherwise disrupt anything. University cops grabbed McGovern in a headlock and by his arms and dragged him out of the auditorium by force, their actions directed from the side by a man whose name is redacted from public records. Photos of the then-71 year old McGovern taken at the time of his arrest show the multiple bruises and contusions he suffered while being arrested. He was secured to a metal chair with two sets of handcuffs. McGovern was at first refused medical care for the bleeding caused by the handcuffs. It is easy to invoke the words thug, bully, goon. The charges of disorderly conduct were dropped, McGovern was released and it was determined that he committed no crime. But because he had spoken back to power, State’s Diplomatic Security printed up an actual wanted poster citing McGovern’s “considerable amount of political activism” and “significant notoriety in the national media.” Diplomatic Security warned agents should USE CAUTION (their emphasis) when stopping McGovern and conducting the required “field interview.” The poster itself was classified as Sensitive but Unclassified (SBU), one of the multitude of pseudo-secret categories created following 9/11.
  • ...3 more annotations...
  • Subjects of BOLO alerts are considered potential threats to the Secretary of State. Their whereabouts are typically tracked to see if they will be in proximity of the Secretary. If Diplomatic Security sees one of the subjects nearby, they detain and question them. Other government agencies and local police are always notified. The alert is a standing directive that the subject be stopped and seized in the absence of reasonable suspicion or probable cause that he is committing an offense. Stop him for being him. These directives slash across the Fourth Amendment’s prohibitions against unwarranted search and seizure, as well as the First Amendment’s right to free speech, as the stops typically occur around protests.
  • Ray McGovern is not the kind of guy to be stopped and frisked based on State Department retaliation for exercising his First Amendment rights in Post-Constitution America. He sued, and won. The Partnership for Civil Justice Fund took up the case pro bono on Ray’s behalf, suing the State Department. They first had to file a Freedom of Information Act demand to even get ahold of the internal State Department justifications for the BOLO, learning that despite all charges having been dropped against McGovern and despite having determined that he engaged in no criminal activity, the Department of State went on to open an investigation into McGovern, including his political beliefs, activities, statements and associations. The investigative report noted “McGovern does seem to have the capacity to capture a national audience – it is possible his former career with the CIA has the potential to make him ‘attractive’ to the media.” It also cited McGovern’s “political activism, primarily anti-war.” The investigation ran nearly seven months, and resulted in the BOLO.
  • With the documents that so clearly crossed the First Amendment now in hand, the Partnership for Civil Justice Fund went to court. They sought, and won, an injunction against the State Department to stop the Be On the Look-Out alert against McGovern, and to force State to pro-actively advise other law enforcement agencies that it no longer stands. McGovern’s constitutional rights lawsuit against George Washington University, where his arrest during the Clinton speech took place, and the officers who assaulted and arrested him, is ongoing.
Paul Merrell

Increasing Attention to Allegations of 9/11 FBI Cover-Up | 28 Pages.org - 0 views

  • While much of the speculation about the contents of the 28 classified pages from a 9/11 intelligence inquiry center on the secret activities of foreign governments, there is growing scrutiny on the secret activities of our own government—specifically, its investigation of the terrorists both before and after the attacks.
  • Television station WTSP, which serves Sarasota and Tampa Bay, aired a very insightful report last week in which investigative reporter Mike Deeson talked to former Senator Bob Graham and dug deep into the FBI’s concealment of its investigation of the Sarasota 9/11 terror cell. You can watch it here.
  • Meanwhile at Counterpunch, James Ridgeway traces the FBI’s stonewalling of the joint House/Senate intelligence inquiry all the way to the White House and makes the case that the failure to cooperate with the inquiry may well amount to obstruction of justice by George Bush, Dick Cheney and FBI Director Robert Mueller: Finally in his book, Graham describes a letter from a member of the FBI’s congressional staff explaining the Bureau had been uncooperative on orders of the administration.  “We were seeing in writing what we had suspected for some time. The White House was directing the coverup.
  • ...1 more annotation...
  • “Later, when the 911 Commission conducted its own investigation, both Bush and Cheney met with them in a private, off-the-record conversation.” This story and the new piece by Wright strongly suggest the President, Vice President and head of the FBI were engaged in obstruction of justice. If so, that would call for the convening of a federal grand jury. Would the Justice Department, which runs the FBI, do that? Probably not.
Paul Merrell

Core Secrets: NSA Saboteurs in China and Germany - The Intercept - 0 views

  • The National Security Agency has had agents in China, Germany, and South Korea working on programs that use “physical subversion” to infiltrate and compromise networks and devices, according to documents obtained by The Intercept. The documents, leaked by NSA whistleblower Edward Snowden, also indicate that the agency has used “under cover” operatives to gain access to sensitive data and systems in the global communications industry, and that these secret agents may have even dealt with American firms. The documents describe a range of clandestine field activities that are among the agency’s “core secrets” when it comes to computer network attacks, details of which are apparently shared with only a small number of officials outside the NSA.
  • with vast amounts of customer data, including phone records and email traffic. But documents published today by The Intercept suggest that even as the agency uses secret operatives to penetrate them, companies have also cooperated more broadly to undermine the physical infrastructure of the internet than has been previously confirmed. In addition to so-called “close access” operations, the NSA’s “core secrets” include the fact that the agency works with U.S. and foreign companies to weaken their encryption systems; the fact that the NSA spends “hundreds of millions of dollars” on technology to defeat commercial encryption; and the fact that the agency works with U.S. and foreign companies to penetrate computer networks, possibly without the knowledge of the host countries. Many of the NSA’s core secrets concern its relationships to domestic and foreign corporations.
  • Sentry Eagle includes six programs: Sentry Hawk (for activities involving computer network exploitation, or spying), Sentry Falcon (computer network defense), Sentry Osprey (cooperation with the CIA and other intelligence agencies), Sentry Raven (breaking encryption systems), Sentry Condor (computer network operations and attacks), and Sentry Owl (collaborations with private companies). Though marked as a draft from 2004, it refers to the various programs in language indicating that they were ongoing at the time, and later documents in the Snowden archive confirm that some of the activities were going on as recently as 2012.
  • ...3 more annotations...
  • The agency’s core secrets are outlined in a 13-page “brief sheet” about Sentry Eagle, an umbrella term that the NSA used to encompass its most sensitive programs “to protect America’s cyberspace.” “You are being indoctrinated on Sentry Eagle,” the 2004 document begins, before going on to list the most highly classified aspects of its various programs. It warns that the details of the Sentry Eagle programs are to be shared with only a “limited number” of people, and even then only with the approval of one of a handful of senior intelligence officials, including the NSA director. “The facts contained in this program constitute a combination of the greatest number of highly sensitive facts related to NSA/CSS’s overall cryptologic mission,” the briefing document states. “Unauthorized disclosure…will cause exceptionally grave damage to U.S. national security. The loss of this information could critically compromise highly sensitive cryptologic U.S. and foreign relationships, multi-year past and future NSA investments, and the ability to exploit foreign adversary cyberspace while protecting U.S. cyberspace.”
  • The most controversial revelation in Sentry Eagle might be a fleeting reference to the NSA infiltrating clandestine agents into “commercial entities.” The briefing document states that among Sentry Eagle’s most closely guarded components are “facts related to NSA personnel (under cover), operational meetings, specific operations, specific technology, specific locations and covert communications related to SIGINT enabling with specific commercial entities (A/B/C).” It is not clear whether these “commercial entities” are American or foreign or both. Generally the placeholder “(A/B/C)” is used in the briefing document to refer to American companies, though on one occasion it refers to both American and foreign companies. Foreign companies are referred to with the placeholder “(M/N/O).” The NSA refused to provide any clarification to The Intercept.
  • Documents: Sentry Eagle Brief Sheet (13 pages) TAREX Classification Guide (7 pages) Exceptionally Controlled Information Listing (6 pages) ECI WHIPGENIE Classification Guide (7 pages) ECI Pawleys Classification Guide (4 pages) ECI Compartments (4 pages) CNO Core Secrets Slide Slices (10 pages) CNO Core Secrets Security Structure (3 pages) Computer Network Exploitation Classification Guide (8 pages) CNO Core Secrets (7 pages)
Paul Merrell

Revealed: NSA pushed 9/11 as key 'sound bite' to justify surveillance | Al Jazeera America - 0 views

  • The National Security Agency advised its officials to cite the 9/11 attacks as justification for its mass surveillance activities, according to a master list of NSA talking points. The document, obtained by Al Jazeera through a Freedom of Information Act request, contains talking points and suggested statements for NSA officials (PDF) responding to the fallout from media revelations that originated with former NSA contractor Edward Snowden. Invoking the events of 9/11 to justify the controversial NSA programs, which have caused major diplomatic fallout around the world, was the top item on the talking points that agency officials were encouraged to use. Under the subheading “Sound Bites That Resonate,” the document suggests the statement “I much prefer to be here today explaining these programs, than explaining another 9/11 event that we were not able to prevent.”
  • NSA head Gen. Keith Alexander used a slightly different version of that statement when he testified before Congress on June 18 in defense of the agency’s surveillance programs. Asked to comment on the document, NSA media representative Vanee M. Vines pointed Al Jazeera to Alexander’s congressional testimony on Tuesday, and said the agency had no further comment. In keeping with the themes listed in the talking points, the NSA head told legislators that “it is much more important for this country that we defend this nation and take the beatings than it is to give up a program that would result in this nation being attacked.” Critics have long noted the tendency of senior U.S. politicians and security officials to use the fear of attacks like the one that killed almost 3,000 Americans to justify policies ranging from increased defense spending to the invasion of Iraq.
  • Al Jazeera obtained the 27 pages of talking points from the NSA this week in response to a FOIA request filed June 13. The statements had been prepared for agency officials facing questions from Congress or the media over the revelations contained in classified documents that Snowden leaked to journalists Glenn Greenwald, Barton Gellman and others. A letter accompanying the documents notes that the talking points “are prepared and approved for a speaker to use and do not necessarily represent what the speaker actually said at the event.” The NSA has not yet turned over to Al Jazeera the documents the agency used to prepare the talking points, saying those materials require additional review before they can be released.  The attacks on the World Trade Center and the Pentagon also appear at the top of another talking-points document titled “Media Leaks One Card,” which contains 13 bullet points to explain the rationale behind the surveillance programs. Those points include “First responsibility is to defend the nation” and “NSA and its partners must make sure we connect the dots so that the nation is never attacked again like it was on 9/11.”
  • ...2 more annotations...
  • The master talking points list goes on to explain, under a subheading titled “We Needed to Connect the Dots,” that “post-9/11 we made several changes and added a number of capabilities to enable us to connect the dots.” Continuing revelations from the Snowden documents reveal surveillance on a scale that appears to go far beyond the scope of monitoring potential attackers, however. The agency’s “head of state collection” program, for example, reportedly included the monitoring of German Chancellor Angela Merkel’s mobile phone. The talking points document advises officials to emphasize the word “lawful” when discussing NSA surveillance programs, and to state that “our allies have benefited … just as we have.” “We believe that over 100 nations are capable of collecting signals intelligence or operating a lawful intercept capability that enable them to monitor communications,” the document continued.
  • Critics have called into question the veracity of the claim that NSA surveillance has thwarted more than 50 “potential” attacks. They claim evidence to support such assertions is lacking. NSA officials are advised to respond to questions about any potential civil liberties violations by citing talking points that say there have not been any “willful violations” and that the NSA is committed to “upholding the privacy and civil liberties of the American people.”
  •  
    27 pages of talking points appended to the article, plus a two-page cover letter. It's the scripts for just about everything official that's been coming out of NSA and the Administration. Interesting reading; they cover some things that haven't yet come up.   
Paul Merrell

NSA Spying Relies on AT&T's 'Extreme Willingness to Help' - ProPublica - 0 views

  • he National Security Agency’s ability to spy on vast quantities of Internet traffic passing through the United States has relied on its extraordinary, decades-long partnership with a single company: the telecom giant AT&T. While it has been long known that American telecommunications companies worked closely with the spy agency, newly disclosed NSA documents show that the relationship with AT&T has been considered unique and especially productive. One document described it as “highly collaborative,” while another lauded the company’s “extreme willingness to help.”
  • AT&T’s cooperation has involved a broad range of classified activities, according to the documents, which date from 2003 to 2013. AT&T has given the NSA access, through several methods covered under different legal rules, to billions of emails as they have flowed across its domestic networks. It provided technical assistance in carrying out a secret court order permitting the wiretapping of all Internet communications at the United Nations headquarters, a customer of AT&T. The NSA’s top-secret budget in 2013 for the AT&T partnership was more than twice that of the next-largest such program, according to the documents. The company installed surveillance equipment in at least 17 of its Internet hubs on American soil, far more than its similarly sized competitor, Verizon. And its engineers were the first to try out new surveillance technologies invented by the eavesdropping agency. One document reminds NSA officials to be polite when visiting AT&T facilities, noting: “This is a partnership, not a contractual relationship.” The documents, provided by the former agency contractor Edward Snowden, were jointly reviewed by The New York Times and ProPublica.
  • It is not clear if the programs still operate in the same way today. Since the Snowden revelations set off a global debate over surveillance two years ago, some Silicon Valley technology companies have expressed anger at what they characterize as NSA intrusions and have rolled out new encryption to thwart them. The telecommunications companies have been quieter, though Verizon unsuccessfully challenged a court order for bulk phone records in 2014. At the same time, the government has been fighting in court to keep the identities of its telecom partners hidden. In a recent case, a group of AT&T customers claimed that the NSA’s tapping of the Internet violated the Fourth Amendment protection against unreasonable searches. This year, a federal judge dismissed key portions of the lawsuit after the Obama administration argued that public discussion of its telecom surveillance efforts would reveal state secrets, damaging national security.
Paul Merrell

Hillary's email problems just won't go away - Josh Gerstein - POLITICO - 0 views

  • Hillary Clinton’s email problem is a “drip,drip,drip” that just won’t stop. On Monday, it turned into a steady trickle. As the Democratic front-runner tried to shift attention to policy issues and the retail politics of Iowa, a series of developments in court and on Capitol Hill showed that Clinton’s email saga is unlikely to end soon. Story Continued Below A federal judge on Monday scheduled a hearing for later this week to discuss whether the State Department has ensured the retrieval of all official records Clinton, the former secretary of state, and her top aides held on personal email accounts or devices. This came after a lawyer for the technology firm that maintained Clinton’s private server after she left office held out the prospect that at least some of the data is likely preserved on a backup server. New figures emerged in a court filing about the number of potentially classified messages held in Clinton’s private account, now up to 305. And a Republican senator pressed Clinton’s personal lawyer for answers on how the emails were stored and whether he had the security clearance to retain a thumb drive of potentially sensitive data.
Paul Merrell

Documenting use of overhead imagery on civilian US targets - 0 views

  • New Documents Trace Controversial Use of Drones and other Aerial Surveillance for Domestic National Security – from Safeguarding Major Sporting Events to Law Enforcement to Tracking Wildfires
  • “FBI spy plane zeroes in on Dearborn area” was the headline in The Detroit News on August 5, 2015. The story, which broke the news that the FBI had conducted at least seven surveillance flights recently over downtown Detroit, also raised a broader issue. It illustrated the fact that along with the controversy concerning electronic surveillance activities focused on telephone and e-mail records of United States citizens there exists a corresponding source of controversy – the use of satellites and assorted aircraft (manned and unmanned) to collect imagery and conduct aerial surveillance of civilian targets within the United States. Today, the National Security Archive posts over forty documents, many appearing online for the first time, related to the domestic use of overhead imagery and the controversy it has generated. Among those documents are:
  • Annual activity reports of the Civil Applications Committee, created in 1975 to provide a forum for interaction between the Intelligence Community and civil agencies wanting information from “national systems” (Document 2, Document 4, Document 6, Document 13, Document 16). Articles from a classified National Reconnaissance Office magazine discussing the use of NRO imagery spacecraft to aid in disaster relief (Document 9, Document 10, Document 23). Articles from the National Geospatial-Intelligence Agency’s Pathfinder magazine, which describe how the NGA uses overhead imagery to provide data to assorted agencies with responsibilities in security operations and planning for National Special Security Events (Document 12, Documents 20a, 20b, 20c, Document 26). Examples of imagery, obtained by the KH-9 spy camera, of two targets in New York – the World Trade Center and Shea Stadium (Document 29). Detailed NGA, NORTHCOM, and Air Combat Command internal regulations governing the collection, dissemination and use of domestic imagery (Document 17, Document 19, Document 34).  A description and assessments of the Customs and Border Protection service’s use of drones (Document 24, Document 30, Document 35, Document 37).
Paul Merrell

James Clapper Confirms VADM Mike Rogers Needlessly Obfuscated in Confirmation Hearing |... - 0 views

  • On Friday, James Clapper finally provided Ron Wyden an unclassified response to a question he posed on January 29, admitting that the NSA conducts back door searches. (via Charlie Savage) As reflected in the August 2013 Semiannual Assessment of Compliance with Procedures and Guidelines Issued Pursuant to Section 702, which we declassified and released on August 21, 2013, there have been queries, using U.S. person identifiers, of communications lawfully acquired to obtain foreign intelligence by targeting non U.S. persons reasonably believed to be located outside the U.S. pursuant to Section 702 of FISA. It has taken just 9 months for Clapper to admit that, contrary to months of denials, the NSA (and FBI, which he doesn’t confirm but which the Report makes clear, as well as the CIA) can get the content of Americans’ communications without a warrant. But Clapper’s admission that this fact was declassified in August should disqualify Vice Admiral Mike Rogers from confirmation as CyberComm head (I believe he started serving as DIRNSA head, which doesn’t require confirmation, yesterday). Because it means Rogers refused to answer a question the response to which was already declassified.
  • Udall: If I might, in looking ahead, I want to turn to the 702 program and ask a policy question about the authorities under Section 702 that’s written into the FISA Amendments Act. The Committee asked your understanding of the legal rationale for NASA [sic] to search through data acquired under Section 702 using US person identifiers without probable cause. You replied the NASA–the NSA’s court approved procedures only permit searches of this lawfully acquired data using US person identifiers for valid foreign intelligence purposes and under the oversight of the Justice Department and the DNI. The statute’s written to anticipate the incidental collection of Americans’ communications in the course of collecting the communications of foreigners reasonably believed to be located overseas. But the focus of that collection is clearly intended to be foreigners’ communications, not Americans. But declassified court documents show that in 2011 the NSA sought and obtained the authority to go through communications collected under Section 702 and conduct warrantless searches for the communications of specific Americans. Now, my question is simple. Have any of those searches been conducted?
  • Rogers: I apologize Sir, I’m not in a position to answer that as the nominee. Udall: You–yes. Rogers: But if you would like me to come back to you in the future if confirmed to be able to specifically address that question I will be glad to do so, Sir. Udall: Let me follow up on that. You may recall that Director Clapper was asked this question in a hearing earlier this year and he didn’t believe that an open forum was the appropriate setting in which to discuss these issues. The problem that I have, Senator Wyden’s had, and others is that we’ve tried in various ways to get an unclassified answer — simple answer, yes or no — to the question. We want to have an answer because it relates — the answer does — to Americans’ privacy. Can you commit to answering the question before the Committee votes on your nomination?
  • ...3 more annotations...
  • Rogers: Sir, I believe that one of my challenges as the Director, if confirmed, is how do we engage the American people — and by extension their representatives — in a dialogue in which they have a level of comfort as to what we are doing and why. That is no insignificant challenge for those of us with an intelligence background, to be honest. But I believe that one of the takeaways from the situation over the last few months has been as an intelligence professional, as a senior intelligence leader, I have to be capable of communicating in a way that we are doing and why to the greatest extent possible. That perhaps the compromise is, if it comes to the how we do things, and the specifics, those are perhaps best addressed in classified sessions, but that one of my challenges is I have to be able to speak in broad terms in a way that most people can understand. And I look forward to that challenge. Udall: I’m going to continue asking that question and I look forward to working with you to rebuild the confidence. [my emphasis]
  • I assume that now that Clapper has given him the okay to discuss unclassified topics with Congress, Rogers will now provide a forthright answer, all the while claiming he was ignorant about the answer at the time (fine! then make me DIRNSA because I know more about it!). But Rogers’ response went far beyond such an answer. He refused — not just in the hearing but even after it — to commit to answering a question with a completely unclassified answer. And as I pointed out in this post, his written answers were even more obfuscatory. I don’t get a vote. But I think this should disqualify him as a nominee.
  • Update: Here’s the exchange in Rogers’ questions for the record on back door searches. What is your understanding of the legal rationale for NSA to search through data acquired under section 702 using U.S. Persons identifiers without probable cause? Information acquired by NSA under Section 702 of FI SA must be handled in strict accordance with minimization procedures adopted by the Attorney General and approved by the Foreign Intelligence Surveillance Court. As required by the statute and certifications approving Section 702 acquisitions, such activities must be limite d to targeting non-U.S. persons reasonably believed to be located outside the United States . NSA’s Court-approved procedures only permit searches of this lawfully acquired data using U.S. person identifiers for valid foreign intelligence purposes and under the oversight of the Department of Justice and Office of Director of National Intelligence.
Paul Merrell

The Torture Report and the "Glomar Fig Leaf" | Just Security - 0 views

  • Buried in the SSCI’s report is an arresting passage that suggests that the CIA was quietly releasing information about the torture program to journalists while it was contending in court that release of such information to the public would compromise national security. After the April 15, 2005 National Security Principals Committee meeting, the CIA drafted an extensive document describing the CIA’s Detention and Interrogation Program for an anticipated media campaign.  CIA attorneys, discussing aspects of the campaign involving off-the-record disclosures, cautioned against attributing the information to the CIA itself.  One senior attorney stated that the proposed press briefing was “minimally acceptable, but only if not attributed to a CIA official.”  The CIA attorney continued: “This should be attributed to an ‘official knowledgeable’ about the program (or some similar obfuscation), but should not be attributed to a CIA or intelligence official.”
  • Referring to CIA efforts to deny Freedom of Information Act (FOIA) requests for previously acknowledged information, the attorney noted that, “[o]ur Glomar fig leaf is getting pretty thin.”  Another CIA attorney noted that the draft “makes the [legal] declaration I just wrote about the secrecy of the interrogation program a work of fiction.” The reference to the “Glomar fig leaf” related to an argument the CIA was making in ACLU litigation that was pending before Judge Alvin K.  Hellerstein in the Southern District of New York.  In connection with Freedom of Information Act requests we’d filed in October 2003 and June 2004, we were seeking, among other things, three documents we’d learned of from media reports: the Memorandum of Notification (MON) in which President Bush had authorized the CIA to establish black sites overseas, and two memos in which lawyers from the Office of Legal Counsel had concluded that CIA interrogators could lawfully torture prisoners in their custody.  The CIA responded with a “Glomar” response—it argued that the existence or non-existence of the three documents was a properly classified fact. 
  • As the SSCI report makes clear, CIA lawyers didn’t really believe what the agency was saying in its sworn declarations.  They understood that the sworn declarations the agency was filing in federal court were “work[s] of fiction.”  The agency was telling the courts that nothing could be disclosed about its torture program without compromising national security, but at the same time, it was providing quotations and “facts” to the media in order to persuade the public that its activities were lawful, necessary and effective. If all of this sounds familiar, it’s because the CIA is now doing precisely the same thing with respect to the targeted-killing program. To the courts, the CIA says that any disclosure about the program will gravely compromise national security.  To the media, it supplies a continuous stream of cherry-picked facts meant to cast the program in the most favorable light.
  • ...1 more annotation...
  • The SSCI report makes clear that some CIA lawyers were uncomfortable with the chasm between the agency’s representations to the court in the torture FOIA litigation and the agency’s actual conduct.  According to the SSCI, some CIA lawyers “urged that CIA leadership … ‘confront the inconsistency’ between CIA court declarations ‘about how critical it is to keep this information secret’ and the CIA ‘planning to reveal darn near the entire” program.’” Presumably those lawyers were worried about the possibility that a court would sanction the agency’s declarants; perhaps they were also worried about compliance with their own professional obligations. One wonders whether the CIA’s lawyers are worried about the same things today.
Paul Merrell

Files on UK role in CIA rendition accidentally destroyed, says minister | World news | ... - 0 views

  • The British government's problems with missing files deepened dramatically when the Foreign Office claimed documents on the UK's role in the CIA's global abduction operation had been destroyed accidentally when they became soaked with water.In a statement that human rights groups said "smacked of a cover-up", the department maintained that records of post-9/11 flights in and out of Diego Garcia, the British territory in the Indian Ocean, were "incomplete due to water damage".The claim comes amid media reports in the US that a Senate report due to be published later this year identifies Diego Garcia as a location where the CIA established a secret prison as part of its extraordinary rendition programme. According to one report, classified CIA documents state that the prison was established with the "full cooperation" of the UK government.
  • Ministers of successive governments have repeatedly given misleading or incomplete information about the CIA's use of Diego Garcia. In February 2008, the then foreign secretary, David Miliband, was forced to apologise to MPs and explain that Tony Blair's "earlier explicit assurances that Diego Garcia had not been used for rendition flights" had not been correct. Miliband said at this point that two rendition flights had landed, but that the detainees on board had not disembarked.Miliband's admission was made after human rights groups produced irrefutable evidence that aircraft linked to the rendition programme had landed on Diego Garcia. Since then, far more aircraft have been shown to have been involved in the operation.The "water damage" claim was given in response to a parliamentary question by the Tory chair of the Treasury select committee, Andrew Tyrie, who has been investigating the UK's involvement in the rendition programme for several years.
  • The British government is particularly sensitive about the allegations that Diego Garcia hosted one of the CIA's prisons, at times claiming that it knows only that which it is told by Washington. Although the island has operated as a US military base since the islanders were evicted in the 1960s, it remains a British territory, and its use during the rendition programme would have placed the UK in breach of a raft of international and domestic laws.Belhaj and his wife are suing MI6, the agency's former head of counter-terrorism Sir Mark Allen and Jack Straw, who was foreign secretary at the time that the couple were abducted.Last month, the Commons cross-party defence committee suggested that information about the extent to which the CIA used the island as a "black site" to transfer detainees was still being withheld. "Recent developments have once again brought into question the validity of assurances by the US about its use of Diego Garcia," it said.The committee warned that it will assess the implications for Britain and for "public confidence" in its previous statements on US use of Diego Garcia, and said the US should not in future be permitted to use the island, to transfer terror suspects, for combat operations, "or any other politically sensitive activity", without the explicit authorisation from the UK government.
  • ...1 more annotation...
  • Although Miliband told MPs that detainees had not been held on Diego Garcia, others have contradicted this assertion.Manfred Nowak, as United Nations special rapporteur on torture, said he had received "credible evidence from well-placed sources familiar with the situation on the island" that CIA detainees had been held there between 2002 and 2003.General Barry McCaffrey, a former head of Southcom, the US military's southern command, has twice stated publicly that Diego Garcia has been used by the US to hold prisoners, saying in one radio interview in May 2004: "We're probably holding around 3,000 people, you know, Bagram air field, Diego Garcia, Guantánamo, 16 camps throughout Iraq."In 2003, Time magazine quoted "a regional intelligence official" as saying that a man accused of plotting the 2002 Bali nightclub bombing was being interrogated on Diego Garcia. Five years later the magazine reported that a CIA counter-terrorism official said a high-value prisoner or prisoners were being held and interrogated on the island.In August 2008, the Observer reported that former US intelligence officers "unofficially told senior Spanish judge Baltasar Garzón that Mustafa Setmarian, a Spanish-based Syrian accused of running terrorist training camps in Afghanistan, was taken to Diego Garcia in late 2005 and held there for months".
Paul Merrell

WASHINGTON: Citing redactions, Feinstein delays release of report on CIA interrogations... - 0 views

  • The Obama administration censored significant portions of the findings of an investigation into the CIA’s use of harsh interrogation methods on suspected terrorists, forcing the chairwoman of the Senate Intelligence Committee to delay their release “until further notice.”The postponement late Friday added to serious frictions over the investigation between the administration and lawmakers, who have been pressing for the swiftest, most extensive publication of the findings on one of darkest chapters in the CIA’s 65-year history.Feinstein announced the delay only hours after the White House returned the document to her after it completed its declassification review
  • “A preliminary review of the report indicates that there have been significant redactions. We need additional time to understand the basis for these redactions and determine their justification,” Sen. Dianne Feinstein, D-Calif., said in a statement.Sen. Mark Udall, D-Colo., a member of the committee who’s been fiercely critical of the CIA interrogation program, also decried the blackouts, saying President Barack Obama had pledged to ensure a release of the findings.“I am concerned about the excessive redactions Chairman Feinstein referenced in her statement, especially given the president’s unequivocal commitment to declassifying the Senate Intelligence Committee’s study,” Udall said. “I promised earlier this year to hold the president to his word and I intend to do so.”Udall vowed to work with Feinstein to declassify the findings “to the fullest extent possible, correct the record on the CIA’s brutal and ineffective detention and interrogation program, and ensure the CIA learns from its past mistakes.”
  • Reacting to Feinstein’s announcement, Director of National Intelligence James Clapper said that more than 85 percent of the report had been declassified and half of the redactions were in footnotes. “The redactions were the result of an extensive and unprecedented inter-agency process, headed up by my office, to protect sensitive classified information,” Clapper said in a statement. “We are confident that the declassified document delivered to the committee will provide the public with a full view of the committee’s report on the detention and interrogation program, and we look forward to a constructive dialogue with the committee.”
  •  
    The Great CIA Torture Cover-up Continues, now in its 12th year. And even the summary of the Senate report, sanitized by the Senate Intelligence Committee for complete public release, now gets axed by CIA. Our great-great-grandchildren might even get to read the full report, long after everyone involved in these war crimes has died.  
Paul Merrell

UAE Terror List Nibs NATO's Covert Infrastructure in The Bud | nsnbc international - 0 views

  • The United Arab Emirates designated a large number of organizations, topped by the Muslim Brotherhood. The list includes a large number of other organizations who have been implicated in US/NATO subversion worldwide, such as CAIR and CANVAS. On November 15 that Cabinet of the United Arab Emirates (UAE) adopted a list that designates eighty-three organizations as terrorist organizations. The UAE’s government notes that the list is not final, implying others could be added but noting that those organizations who find themselves on the list have the possibility to apply for being removed from the list. The UAE stressed that it saw it necessary to designate the included organizations as terrorist organizations to protect the security of the emirates.
  • The United Arab Emirates designated a large number of organizations, topped by the Muslim Brotherhood. The list includes a large number of other organizations who have been implicated in US/NATO subversion worldwide, such as CAIR and CANVAS. On November 15 that Cabinet of the United Arab Emirates (UAE) adopted a list that designates eighty-three organizations as terrorist organizations. The UAE’s government notes that the list is not final, implying others could be added but noting that those organizations who find themselves on the list have the possibility to apply for being removed from the list. The UAE stressed that it saw it necessary to designate the included organizations as terrorist organizations to protect the security of the emirates.
  • The list includes organizations which are currently legally operating in at lest seven European countries and at least two organizations which are legally operating in the United States. Among those operating in the United States are the Council on American-Islamic Relations, CAIR and the Muslim American Society. CAIR is commonly perceived as the successor organization of the Muslim Brotherhood and Hamas associated organizations such as WAMY and the Institute of Islamic Thought whose leadership had direct links to the White House but who were outlawed when their involvement in terrorism became too much part of the public record.
  • ...3 more annotations...
  • It is noteworthy that many of the leading members of Syrian Transitional National Council, who first met in Turkey and which was backed by the USA and other core NATO members had direct links to CAIR. The organization’s leadership is known for having close ties to, among others, U.S. security adviser and “Grand Architect” or NATO’s current military-politico strategies, Zbigniev Brzezinski. Or, in other words, to Rockefeller money. U.S. State Department spokesman Jeff Rathke commented on the UAE’s anti-terror list, saying: “We have examined the list of organizations that were classified as terrorist groups that was published by the United Arab Emirates a few days ago, and we are aware that two of the organizations on that list are based in the United States. We are trying to get information on the reasons behind this decision”.
  • The inclusion of CANVAS in the list is widely perceived as a direct slap into the face of NATO covert operations planners, the U.S. State Department and the CIA. CANVAS, a.k.a. DEMOZ has been implicated in U.S.-backed subversion from the former Republic of Yugoslavia to Egypt and Ukraine. In December 2013 the National Security Agency of Kuwait released a social media video that explained the role CANVAS played in promoting dissent in Kuwait. It is noteworthy that virtually identical CANVAS/DEMOZ flyers, instructing people in how to prepare for violent clashes with state authorities were distributed during the Rabaa al-Adweya and Nadah Square sit ins in Egypt and during the armed ouster of the Ukrainian government in February 2014.
  • Organizations in the following countries outside the United Arab Emirates are affected: * Afghanistan * Algeria * Belgium * Denmark * Egypt * France * Germany * India * Iraq * Italy * Lebanon * Libya * Mali * Norway * Palestine * Pakistan * Philippines * Russian Federation * Saudi Arabia * Sweden * Somalia * Syria * Tunisia * United Kingdom * United States of America * Uzbekistan * Yemen. Affected regions / regional operations: GCC, EU, AL, AU. The list of organizations which the Cabinet of the United Arab Emirates designated as terrorist organizations includes:
Paul Merrell

Tomgram: Shamsi and Harwood, An Electronic Archipelago of Domestic Surveillance | TomDi... - 0 views

  • Uncle Sam’s Databases of Suspicion A Shadow Form of National ID
  • We do know that the nation’s domestic-intelligence network is massive, including at least 59 federal agencies, over 300 Defense Department units, and approximately 78 state-based fusion centers, as well as the multitude of law enforcement agencies they serve. We also know that local law enforcement agencies have themselves raised concerns about the system’s lack of privacy protections.
  • The SAR database is part of an ever-expanding domestic surveillance system established after 9/11 to gather intelligence on potential terrorism threats. At an abstract level, such a system may seem sensible: far better to prevent terrorism before it happens than to investigate and prosecute after a tragedy. Based on that reasoning, the government exhorts Americans to “see something, say something” -- the SAR program’s slogan. Indeed, just this week at a conference in New York City, FBI Director James Comey asked the public to report any suspicions they have to authorities. “When the hair on the back of your neck stands, listen to that instinct and just tell somebody,” said Comey. And seeking to reassure those who do not want to get their fellow Americans in trouble based on instinct alone, the FBI director added, “We investigate in secret for a very good reason, we don't want to smear innocent people.”
  • ...15 more annotations...
  • At a fundamental level, suspicious activity reporting, as well as the digital and physical infrastructure of networked computer servers and fusion centers built around it, depends on what the government defines as suspicious.  As it happens, this turns out to include innocuous, First Amendment-protected behavior. As a start, a little history: the Nationwide Suspicious Activity Reporting Initiative was established in 2008 as a way for federal agencies, law enforcement, and the public to report and share potential terrorism-related information. The federal government then developed a list of 16 behaviors that it considered “reasonably indicative of criminal activity associated with terrorism.” Nine of those 16 behaviors, as the government acknowledges, could have nothing to do with criminal activity and are constitutionally protected, including snapping photographs, taking notes, and “observation through binoculars.”
  • There are any number of problems with this approach, starting with its premise.  Predicting who exactly is a future threat before a person has done anything wrong is a perilous undertaking. That’s especially the case if the public is encouraged to report suspicions of neighbors, colleagues, and community members based on a “hair-on-the-back-of-your-neck” threshold. Nor is it any comfort that the FBI promises to protect the innocent by investigating “suspicious” people in secret. The civil liberties and privacy implications are, in fact, truly hair-raising, particularly when the Bureau engages in abusive and discriminatory sting operations and other rights violations.
  • A few months later, a scathing report from the Senate subcommittee on homeland security described similar intelligence problems in state-based fusion centers. It found that Department of Homeland Security (DHS) personnel assigned to the centers “forwarded ‘intelligence’ of uneven quality -- oftentimes shoddy, rarely timely, sometimes endangering citizens’ civil liberties and Privacy Act protections... and more often than not unrelated to terrorism.”
  • Law enforcement officials, including the Los Angeles Police Department’s top counterterrorism officer, have themselves exhibited skepticism about suspicious activity reporting (out of concern with the possibility of overloading the system). In 2012, George Washington University’s Homeland Security Policy Institute surveyed counterterrorism personnel working in fusion centers and in a report generally accepting of SARs noted that the program had “flooded fusion centers, law enforcement, and other security outfits with white noise,” complicating “the intelligence process” and distorting “resource allocation and deployment decisions.” In other words, it was wasting time and sending personnel off on wild goose chases.
  • Under federal regulations, the government can only collect and maintain criminal intelligence information on an individual if there is a “reasonable suspicion” that he or she is “involved in criminal conduct or activity and the information is relevant to that criminal conduct or activity.” The SAR program officially lowered that bar significantly, violating the federal government’s own guidelines for maintaining a “criminal intelligence system.” There’s good reason for, at a minimum, using a reasonable suspicion standard. Anything less and it’s garbage in, garbage out, meaning counterterrorism “intelligence” databases become anything but intelligent.
  • yet another burgeoning secret database that the federal government calls its “consolidated terrorism watchlist.” Inclusion in this database -- and on government blacklists that are generated from it -- can bring more severe repercussions than unwarranted law enforcement attention. It can devastate lives.
  • There is hope, however. In August, four years after the ACLU filed a lawsuit on behalf of 13 people on the no-fly list, a judge ruled that the government’s redress system is unconstitutional. In early October, the government notified Mashal and six others that they were no longer on the list. Six of the ACLU’s clients remain unable to fly, but at least the government now has to disclose just why they have been put in that category, so that they can contest their blacklisting. Soon, others should have the same opportunity.
  • As of August 2013, there were approximately 47,000 people, including 800 U.S. citizens and legal permanent residents like Mashal, on that secretive no-fly list, all branded as “known or suspected terrorists.” All were barred from flying to, from, or over the United States without ever being given a reason why. On 9/11, just 16 names had been on the predecessor “no transport” list. The resulting increase of 293,650% -- perhaps more since 2013 -- isn’t an accurate gauge of danger, especially given that names are added to the list based on vague, broad, and error-prone standards.
  • The No Fly List is only the best known of the government’s web of terrorism watchlists. Many more exist, derived from the same master list.  Currently, there are more than one million names in the Terrorist Identities Datamart Environment, a database maintained by the National Counterterrorism Center. This classified source feeds the Terrorist Screening Database (TSDB), operated by the FBI’s Terrorist Screening Center. The TSDB is an unclassified but still secret list known as the “master watchlist.” containing what the government describes as “known or suspected terrorists,” or KSTs.
  • Nothing encapsulates the post-9/11, Alice-in-Wonderland inversion of American notions of due process more strikingly than this “blacklist first, innocence later... maybe” mindset. The Terrorist Screening Database is then used to fill other lists. In the context of aviation, this means the no-fly list, as well as the selectee and expanded selectee lists. Transportation security agents subject travelers on the latter two lists to extra screenings, which can include prolonged and invasive interrogation and searches of laptops, phones, and other electronic devices. Around the border, there’s the State Department’s Consular Lookout and Support System, which it uses to flag people it thinks shouldn’t get a visa, and the TECS System, which Customs and Border Protection uses to determine whether someone can enter the country.
  • According to documents recently leaked to the Intercept, as of August 2013 that master watchlist contained 680,000 people, including 5,000 U.S. citizens and legal permanent residents. The government can add people’s names to it according to a shaky “reasonable suspicion” standard. There is, however, growing evidence that what’s “reasonable” to the government may only remotely resemble what that word means in everyday usage. Information from a single source, even an uncorroborated Facebook post, can allow a government agent to watchlist an individual with virtually no outside scrutiny. Perhaps that’s why 40% of those on the master watchlist have “no recognized terrorist group affiliation,” according to the government’s own records.
  • This opens up the possibility of increased surveillance and tense encounters with the police, not to speak of outright harassment, for a large but undivulged number of people. When a police officer stops a person for a driving infraction, for instance, information about his or her KST status will pop up as soon a driver’s license is checked.  According to FBI documents, police officers who get a KST hit are warned to “approach with caution” and “ask probing questions.” When officers believe they’re about to go face to face with a terrorist, bad things can happen. It’s hardly a stretch of the imagination, particularly after a summer of police shootings of unarmed men, to suspect that an officer approaching a driver whom he believes to be a terrorist will be quicker to go for his gun. Meanwhile, the watchlisted person may never even know why his encounters with police have taken such a peculiar and menacing turn. According to the FBI's instructions, under no circumstances is a cop to tell a suspect that he or she is on a watchlist.
  • Inside the United States, no watchlist may be as consequential as the one that goes by the moniker of the Known or Appropriately Suspected Terrorist File. The names on this blacklist are shared with more than 17,000 state, local, and tribal police departments nationwide through the FBI’s National Crime Information Center (NCIC). Unlike any other information disseminated through the NCIC, the KST File reflects mere suspicion of involvement with criminal activity, so law enforcement personnel across the country are given access to a database of people who have secretly been labeled terrorism suspects with little or no actual evidence, based on virtually meaningless criteria.
  • And once someone is on this watchlist, good luck getting off it. According to the government’s watchlist rulebook, even a jury can’t help you. “An individual who is acquitted or against whom charges are dismissed for a crime related to terrorism,” it reads, “may nevertheless meet the reasonable standard and appropriately remain on, or be nominated to, the Terrorist Watchlist.” No matter the verdict, suspicion lasts forever.
  • The SARs program and the consolidated terrorism watchlist are just two domestic government databases of suspicion. Many more exist. Taken together, they should be seen as a new form of national ID for a growing group of people accused of no crime, who may have done nothing wrong, but are nevertheless secretly labeled by the government as suspicious or worse. Innocent until proven guilty has been replaced with suspicious until determined otherwise. Think of it as a new shadow system of national identification for a shadow government that is increasingly averse to operating in the light. It’s an ID its “owners” don’t carry around with them, yet it’s imposed on them whenever they interact with government agents or agencies. It can alter their lives in disastrous ways, often without their knowledge. And they could be you. If this sounds dystopian, that’s because it is.
Paul Merrell

Court upholds NSA snooping | TheHill - 0 views

  • A district court in California has issued a ruling in favor of the National Security Agency in a long-running case over the spy agency’s collection of Internet records.The challenge against the controversial Upstream program was tossed out because additional defense from the government would have required “impermissible disclosure of state secret information,” Judge Jeffrey White wrote in his decision.ADVERTISEMENTUnder the program — details of which were revealed through leaks from Edward Snowden and others — the NSA taps into the fiber cables that make up the backbone of the Internet and gathers information about people's online and phone communications. The agency then filters out communications of U.S. citizens, whose data is protected with legal defenses not extended to foreigners, and searches for “selectors” tied to a terrorist or other target.In 2008, the Electronic Frontier Foundation (EFF) sued the government over the program on behalf of five AT&T customers, who said that the collection violated the constitutional protections to privacy and free speech.
  • But “substantial details” about the program still remain classified, White, an appointee under former President George W. Bush, wrote in his decision. Moving forward with the merits of a trial would risk “exceptionally grave damage to national security,” he added. <A HREF="http://ws-na.amazon-adsystem.com/widgets/q?rt=tf_mfw&ServiceVersion=20070822&MarketPlace=US&ID=V20070822%2FUS%2Fthehill07-20%2F8001%2Fdffbe72d-f425-4b83-b07e-357ae9d405f6&Operation=NoScript">Amazon.com Widgets</A> The government has been “persuasive” in using its state secrets privilege, he continued, which allows it to withhold evidence from a case that could severely jeopardize national security.   In addition to saying that the program appeared constitutional, the judge also found that the AT&T customers did not even have the standing to sue the NSA over its data gathering.While they may be AT&T customers, White wrote that the evidence presented to the court was “insufficient to establish that the Upstream collection process operates in the manner” that they say it does, which makes it impossible to tell if their information was indeed collected in the NSA program.  The decision is a stinging rebuke to critics of the NSA, who have seen public interest in their cause slowly fade in the months since Snowden’s revelations.
  • The EFF on Tuesday evening said that it was considering next steps and noted that the court focused on just one program, not the totality of the NSA’s controversial operations.“It would be a travesty of justice if our clients are denied their day in court over the ‘secrecy’ of a program that has been front-page news for nearly a decade,” the group said in a statement.“We will continue to fight to end NSA mass surveillance.”The name of the case is Jewel v. NSA. 
  •  
    The article should have mentioned that the decision was on cross-motions for *partial* summary judgment. The Jewel case will proceed on other plaintiff claims. 
Paul Merrell

Israeli Drone Feeds Hacked By British and American Intelligence - 0 views

  • MERICAN AND BRITISH INTELLIGENCE secretly tapped into live video feeds from Israeli drones and fighter jets, monitoring military operations in Gaza, watching for a potential strike against Iran, and keeping tabs on the drone technology Israel exports around the world. Under a classified program code-named “Anarchist,” the U.K.’s Government Communications Headquarters, or GCHQ, working with the National Security Agency, systematically targeted Israeli drones from a mountaintop on the Mediterranean island of Cyprus. GCHQ files provided by former NSA contractor Edward Snowden include a series of “Anarchist snapshots” — thumbnail images from videos recorded by drone cameras. The files also show location data mapping the flight paths of the aircraft. In essence, U.S. and British agencies stole a bird’s-eye view from the drones.
  • Several of the snapshots, a subset collected in 2009 and 2010, appear to show drones carrying missiles. Although they are not clear enough to be conclusive, the images offer rare visual evidence to support reports that Israel flies attack drones — an open secret that the Israeli government won’t acknowledge. “There’s a good chance that we are looking at the first images of an armed Israeli drone in the public domain,” said Chris Woods, author of Sudden Justice, a history of drone warfare. “They’ve gone to extraordinary lengths to suppress information on weaponized drones.” The Intercept is publishing a selection of the drone snapshots in an accompanying article.
  • Additionally, in 2012, a GCHQ analyst reported “regular collects of Heron TP carrying weapons,” referring to a giant drone made by the state-owned Israel Aerospace Industries, known as IAI. Anarchist operated from a Royal Air Force installation in the Troodos Mountains, near Mount Olympus, the highest point on Cyprus. The Troodos site “has long been regarded as a ‘Jewel in the Crown’ by NSA as it offers unique access to the Levant, North Africa, and Turkey,” according to an article from GCHQ’s internal wiki. Last August, The Intercept published a portion of a GCHQ document that revealed that NSA and GCHQ tracked weapons signals from Troodos, and earlier reporting on the Snowden documents indicated that the NSA targeted Israeli drones and an Israeli missile system for tracking, but the details of the operations have not been previously disclosed. “This access is indispensable for maintaining an understanding of Israeli military training and operations and thus an insight to possible future developments in the region,” a GCHQ report from 2008 enthused. “In times of crisis this access is critical and one of the only avenues to provide up to the minute information and support to U.S. and Allied operations in the area.”
  • ...1 more annotation...
  • The documents highlight the conflicted relationship between the United States and Israel and U.S. concerns about Israel’s potentially destabilizing actions in the region. The two nations are close counterterrorism partners, and have a memorandum of understanding, dating back to 2009, that allows Israel access to raw communications data collected by the NSA. Yet they are nonetheless constantly engaged in a game of spy versus spy. Last month, the Wall Street Journal reported that, although President Obama had pledged to stop spying on friendly heads of state, the White House carved out an exception for Israeli Prime Minister Benjamin Netanyahu and other top Israeli officials. Michael Hayden, former head of the CIA and NSA, told the Journal that the intelligence relationship with Israel was “the most combustible mixture of intimacy and caution that we have.”
Paul Merrell

Exclusive: As Saudis bombed Yemen, U.S. worried about legal blowback | Reuters - 0 views

  • The Obama administration went ahead with a $1.3 billion arms sale to Saudi Arabia last year despite warnings from some officials that the United States could be implicated in war crimes for supporting a Saudi-led air campaign in Yemen that has killed thousands of civilians, according to government documents and the accounts of current and former officials.State Department officials also were privately skeptical of the Saudi military's ability to target Houthi militants without killing civilians and destroying "critical infrastructure" needed for Yemen to recover, according to the emails and other records obtained by Reuters and interviews with nearly a dozen officials with knowledge of those discussions.U.S. government lawyers ultimately did not reach a conclusion on whether U.S. support for the campaign would make the United States a "co-belligerent" in the war under international law, four current and former officials said. That finding would have obligated Washington to investigate allegations of war crimes in Yemen and would have raised a legal risk that U.S. military personnel could be subject to prosecution, at least in theory.
  • For instance, one of the emails made a specific reference to a 2013 ruling from the war crimes trial of former Liberian president Charles Taylor that significantly widened the international legal definition of aiding and abetting such crimes.The ruling found that "practical assistance, encouragement or moral support" is sufficient to determine liability for war crimes. Prosecutors do not have to prove a defendant participated in a specific crime, the U.N.-backed court found.Ironically, the U.S. government already had submitted the Taylor ruling to a military commission at Guantanamo Bay, Cuba, to bolster its case that Khalid Sheikh Mohammed and other al Qaeda detainees were complicit in the Sept 11, 2001 attacks.The previously undisclosed material sheds light on the closed-door debate that shaped U.S. President Barack Obama’s response to what officials described as an agonizing foreign policy dilemma: how to allay Saudi concerns over a nuclear deal with Iran - Riyadh's arch-rival - without exacerbating a conflict in Yemen that has killed thousands.The documents, obtained by Reuters under the Freedom of Information Act, date from mid-May 2015 to February 2016, a period during which State Department officials reviewed and approved the sale of precision munitions to Saudi Arabia to replenish bombs dropped in Yemen. The documents were heavily redacted to withhold classified information and some details of meetings and discussion.(A selection of the documents can be viewed here: tmsnrt.rs/2dL4h6L; tmsnrt.rs/2dLbl2S; tmsnrt.rs/2dLb7Ji; tmsnrt.rs/2dLbbIX)
  • In a statement issued to Reuters before Saturday's attack, National Security Council spokesman Ned Price said, "U.S. security cooperation with Saudi Arabia is not a blank check. ... We have repeatedly expressed our deep concern about airstrikes that allegedly killed and injured civilians and also the heavy humanitarian toll paid by the Yemeni people."The United States continues to urge the Kingdom to take additional steps to avoid "future civilian harm," he added.
Paul Merrell

WikiLeaks Reveals The "Snowden Stopper": CIA Tool To Track Whistleblowers - 0 views

  • As the latest installment of it’s ‘Vault 7’ series, WikiLeaks has just dropped a user manual describing a CIA project known as ‘Scribbles’ (a.k.a. the “Snowden Stopper”), a piece of software purportedly designed to allow the embedding of ‘web beacon’ tags into documents “likely to be stolen.” The web beacon tags are apparently able to collect information about an end user of a document and relay that information back to the beacon’s creator without being detected. Per WikiLeaks’ press release:
  • Today, April 28th 2017, WikiLeaks publishes the documentation and source code for CIA’s “Scribbles” project, a document-watermarking preprocessing system to embed “Web beacon”-style tags into documents that are likely to be copied by Insiders, Whistleblowers, Journalists or others. The released version (v1.0 RC1) is dated March, 1st 2016 and classified SECRET//ORCON/NOFORN until 2066. Scribbles is intended for off-line preprocessing of Microsoft Office documents. For reasons of operational security the user guide demands that “[t]he Scribbles executable, parameter files, receipts and log files should not be installed on a target machine, nor left in a location where it might be collected by an adversary.”
  • The ‘Scribbles’ User Guide explains how the tool generates a random watermark for each document, inserts that watermark into the document, saves all such processed documents in an output directory, and creates a log file which identifies the watermarks inserted into each document. Scribbles can watermark multiple documents in one batch and is designed to watermark several groups of documents.
  • ...1 more annotation...
  • Dr. Martin McHugh, Information Technology Programme chair at Dublin Institute of Technology, gave the RT more details on how the “Scribbles” tool can be used for “bad as well as good.” “Methods of tracking have historically been developed for our protection but have evolved to become used to track us without our knowledge.” “Web beacons typically go unnoticed. A tiny file is loaded as part of a webpage. Once this file is accessed, it records unique information about you, such as your IP address and sends this back to the creator of the beacon.” But, the “Scribbles” user guide notes there is just one small problem with the program…it only works with Microsoft Office products.  So, if end users use other programs such as OpenOffice of LibreOffice then the CIA’s watermarks become visible to the end user and their cover is blown.
Paul Merrell

CIA 'mistakenly' destroys copy of 6,700-page US torture report - Crunchs Magazine - 0 views

  • The CIA inspector general’s office has said it “mistakenly” destroyed its only copy of a comprehensive Senate torture report, despite lawyers for the Justice Department assuring a federal judge that copies of the documents were being preserved. The erasure of the document by the spy agency’s internal watchdog was deemed an “inadvertent” foul-up by the inspector general, according to Yahoo News. One intelligence community source told Yahoo News, which first reported the development, that last summer CIA inspector general officials deleted an uploaded computer file with the report and then accidentally destroyed a disk that also contained the document.
  • The 6,700-page report contains thousands of secret files about the CIA’s use of “enhanced” interrogation methods, including waterboarding, sleep deprivation and other aggressive interrogation techniques at “black site” prisons overseas. The full version of the report remains classified, but a 500-page executive summary was released to the public in 2014. Christoper R. Sharpley, the CIA’s acting inspector general (CIA IG), alerted the Senate intelligence panel that his office’s copy of the report had vanished in August. And Senator Dianne Feinstein, the driving force behind the 2014 report, sent letters to the CIA and Justice Department confirming the spy agency’s inspector general “has misplaced and/or accidentally destroyed” its copy of the report. Douglas Cox, a City University of New York School of Law professor who specialises in tracking the preservation of federal records told Yahoo News: “It’s breathtaking that this could have happened, especially in the inspector general’s office – they’re the ones that are supposed to be providing accountability within the agency itself.”
  • Another copy of the report exists elsewhere within the CIA, which is waiting for the conclusion of a years-long legal battle over the document.
  •  
    Uh-huh ...
« First ‹ Previous 121 - 138 of 138
Showing 20 items per page