Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged containment

Rss Feed Group items tagged

Paul Merrell

Eric Holder: The Justice Department could strike deal with Edward Snowden - 0 views

  • Eric Holder: The Justice Department could strike deal with Edward SnowdenMichael IsikoffChief Investigative CorrespondentJuly 6, 2015Former U.S. Attorney General Eric Holder. (Photo: Olivier Douliery-Pool/Getty) Former Attorney General Eric Holder said today that a “possibility exists” for the Justice Department to cut a deal with former NSA contractor Edward Snowden that would allow him to return to the United States from Moscow. In an interview with Yahoo News, Holder said “we are in a different place as a result of the Snowden disclosures” and that “his actions spurred a necessary debate” that prompted President Obama and Congress to change policies on the bulk collection of phone records of American citizens. Asked if that meant the Justice Department might now be open to a plea bargain that allows Snowden to return from his self-imposed exile in Moscow, Holder replied: “I certainly think there could be a basis for a resolution that everybody could ultimately be satisfied with. I think the possibility exists.”
  • But his remarks to Yahoo News go further than any current or former Obama administration official in suggesting that Snowden’s disclosures had a positive impact and that the administration might be open to a negotiated plea that the self-described whistleblower could accept, according to his lawyer Ben Wizner.
  • It’s also not clear whether Holder’s comments signal a shift in Obama administration attitudes that could result in a resolution of the charges against Snowden. Melanie Newman, chief spokeswoman for Attorney General Loretta Lynch, Holder’s successor, immediately shot down the idea that the Justice Department was softening its stance on Snowden. “This is an ongoing case so I am not going to get into specific details but I can say our position regarding bringing Edward Snowden back to the United States to face charges has not changed,” she said in an email.
  • ...1 more annotation...
  • Three sources familiar with informal discussions of Snowden’s case told Yahoo News that one top U.S. intelligence official, Robert Litt, the chief counsel to Director of National Intelligence James Clapper, recently privately floated the idea that the government might be open to a plea bargain in which Snowden returns to the United States, pleads guilty to one felony count and receives a prison sentence of three to five years in exchange for full cooperation with the government.
Paul Merrell

World's Largest Barrier Reef to Disappear in 5 Years | News | teleSUR English - 0 views

  • .ng-hide:not(.ng-hide-animate){display:none !important}.shr-debug{font-weight:bolder;cursor:pointer;color:#008000}.shareaholic-canvas{clear:both}.shareaholic-ui button,.shareaholic-ui .shareaholic-ui-button{border:0;box-shadow:none;text-shadow:none;font-size:12px;padding:6px 10px !important;border-radius:3px;background:transparent;display:inline-block;margin:2px;border:1px solid transparent;line-height:16px;color:#555;cursor:pointer;height:initial;text-transform:initial;}.shareaholic-ui button:hover,.shareaholic-ui .shareaholic-ui-button:hover{color:#000;font-weight:inherit}.shareaholic-ui button.button-primary,.shareaholic-ui .shareaholic-ui-button.button-primary{background-color:#52a8e8;background-image:-webkit-linear-gradient(top,#52a8e8,#377ad0);border:1px solid #3f81ae;border-color:#3f81ae #2e68a1 #1f5496;box-shadow:inset 0 1px 0 0 #72baeb,0 1px 2px 0 #c3c3c3;color:#fff;font-weight:bold;text-shadow:0 -1px 1px #3275bb;-webkit-appearance:none}.shareaholic-ui button.ui-disabled,.shareaholic-ui .shareaholic-ui-button.ui-disabled{background-color:#ccc;background-image:none;border-color:#bbb;box-shadow:none;color:#999;cursor:default;opacity:.5;text-shadow:none}.shareaholic-ui button.icon-only,.shareaholic-ui .shareaholic-ui-button.icon-only{padding:0;}.shareaholic-ui button.icon-only.icon-16,.shareaholic-ui .shareaholic-ui-button.icon-only.icon-16{padding:4px;}.shareaholic-ui button.icon-only.icon-16 i,.shareaholic-ui .shareaholic-ui-button.icon-only.icon-16 i{height:16px;width:16px}.shareaholic-ui button.icon-only.icon-24,.shareaholic-ui .shareaholic-ui-button.icon-only.icon-24{padding:0;}.shareaholic-ui button.icon-only.icon-24 i,.shareaholic-ui .shareaholic-ui-button.icon-only.icon-24 i{height:24px;width:24px}.s
  • According to the report published in the journal Estuarine, Coastal and Shelf Science, saving the reef will take a huge amount of work and money. Poor water quality was seen as the major threat as well as global warming which is causing significant coral bleaching. Chief researcher of the report, John Brodie, told the Guardian, “The current spending is totally inadequate ... You either do it properly or you give up on the reef. It’s that bad.”
Paul Merrell

Joint Chiefs chairman: 'We have not contained' ISIS | TheHill - 0 views

  • The United States has "not contained" the Islamic State in Iraq and Syria (ISIS), the nation's top military officer said Tuesday, contradicting President Obama's remarks last month about the terror group."We have not contained" ISIS, Marine Gen. Joseph Dunford, chairman of the Joint Chiefs of Staff, told lawmakers at a House Armed Services Committee hearing. ADVERTISEMENTThe comment runs counter to what the president said days before ISIS launched a string of attacks across Paris. "I don't think they're gaining strength. What is true is that from the start, our goal has been first to contain, and we have contained them," Obama told ABC News. Ben Rhodes, deputy national security adviser for strategic communication, later said the president's remarks applied specifically to Iraq and Syria. Dunford said ISIS has been "tactically" contained in areas they have been since 2010 but added, "Strategically they have spread since 2010." His remarks were in response to questioning by Rep. Randy Forbes (R-Va.) on whether ISIS has been contained at any time since 2010. Dunford added that ISIS posed a threat beyond Iraq and Syria to countries such as Egypt, Nigeria, Yemen, Afghanistan, Pakistan, Lebanon and Jordan. 
Paul Merrell

Audio Reveals What John Kerry Told Syrians Behind Closed Doors - The New York Times - 0 views

  • Secretary of State John Kerry was clearly exasperated, not least at his own government. Over and over again, he complained to a small group of Syrian civilians that his diplomacy had not been backed by a serious threat of military force, according to an audio recording of the meeting obtained by The New York Times.
  • At the meeting last week, Mr. Kerry was trying to explain that the United States has no legal justification for attacking Mr. Assad’s government, whereas Russia was invited in by the government.
  • His frustrations and dissent within the Obama administration have hardly been a secret, but in the recorded conversation, Mr. Kerry lamented being outmaneuvered by the Russians, expressed disagreement with some of Mr. Obama’s policy decisions and said Congress would never agree to use force. 0:19
  • ...3 more annotations...
  • He also spoke of the obstacles he faces back home: a Congress unwilling to authorize the use of force and a public tired of war.
  • As time ran short, Mr. Kerry told the Syrians that their best hope was a political solution to bring the opposition into a transitional government. Then, he said, “you can have an election and let the people of Syria decide: Who do they want?” A State Department official, speaking on the condition of anonymity, said later that Mr. Kerry was not indicating a shift in the administration’s view of Mr. Assad, only reiterating a longstanding belief that he would be ousted in any fair election. At one point, Mr. Kerry astonished the Syrians at the table when he suggested that they should participate in elections that include President Bashar al-Assad, five years after President Obama demanded that he step down. Mr. Kerry described the election saying it would be set up by Western and regional powers, and the United Nations, “under the strictest standards.” He said that the millions of Syrians who have fled since the war began in 2011 would be able to participate. 0:19
  • “Everybody who’s registered as a refugee anywhere in the world can vote. Are they going to vote for Assad? Assad’s scared of this happening.” But the Syrians were skeptical that people living under government rule inside Syria would feel safe casting ballots against Mr. Assad, even with international observers — or that Russia would agree to elections if it could not ensure the outcome. And that is when the conversation reached an impasse, with Ms. Shehwaro, an educator and social media activist, recalling hopes for a more direct American role. “So you think the only solution is for somebody to come in and get rid of Assad?” Mr. Kerry asked. “Yes,” Ms. Shehwaro said. “Who’s that going to be?” he asked. “Who’s going to do that?”
  •  
    Sounding more and more like Obama won't be willing to commence another overt war. But look for more instances of the U.S. doing strategic bombing for ISIL and Al-Nusrah, as with the attack on the Syrian Army and blowing up the two bridges over the Euphrates that the Syrian Army needed to attack an ISIL stronghold.
Gary Edwards

Feds confiscate investigative reporter's confidential files during raid | The Daily Caller - 3 views

  • A veteran Washington D.C. investigative journalist says the Department of Homeland Security confiscated a stack of her confidential files during a raid of her home in August — leading her to fear that a number of her sources inside the federal government have now been exposed. In an interview with The Daily Caller, journalist Audrey Hudson revealed that the Department of Homeland Security and Maryland State Police were involved in a predawn raid of her Shady Side, Md. home on Aug. 6. Hudson is a former Washington Times reporter and current freelance reporter. A search warrant obtained by TheDC indicates that the August raid allowed law enforcement to search for firearms inside her home.
  • But without Hudson’s knowledge, the agents also confiscated a batch of documents that contained information about sources inside the Department of Homeland Security and the Transportation Security Administration, she said. Outraged over the seizure, Hudson is now speaking out. She said no subpoena for the notes was presented during the raid and argues the confiscation was outside of the search warrant’s parameter. “They took my notes without my knowledge and without legal authority to do so,” Hudson said this week. “The search warrant they presented said nothing about walking out of here with a single sheet of paper.”
  • After the search began, Hudson said she was asked by an investigator with the Coast Guard Investigative Service if she was the same Audrey Hudson who had written a series of critical stories about air marshals for The Washington Times over the last decade. The Coast Guard operates under the Department of Homeland Security.
  •  
    If reality is as stated, the reporter has a pretty strong civil rights case against the government officials who knowingly participated in the theft and retention of the reporter's notes, two distinct conspiracies. Under the 4th Amendment, officers executing a search and seizure warrant may lawfully seize the items particularly described in the warrant and any other evidence of crime that is in plain view during the search. It's a big push of credibility to argue that reading documents stored in a bag in search for a gun falls within the "plain view" doctrine. The officer could instead just reach his hand into the bag and feel around for a gun. Quite a few extra steps involved in removing the documents and reading them simply to determine whether the bag contains a gun. Add in the facts that: [i] the supposed recognition of government documents argument does not explain why the officers seized personal handwritten notes too; and [ii] the evidence that the officer who discovered the docs had learned that the reporter was one who had called the conduct of his agency into question, and it comes out smelling a lot more like an attempt to discover the reporters' sources than a legitimate search for guns when the bag was searched.   Only one side heard from so far, of course. But this sounds more like low-level government officials who were ignorant of their legal obligations than a White House-driven scandal. But I wouldn't want to be the government lawyer who authorized the retention of the seized notes and other documents. They should have been returned without retaining copies the instant the lawyer learned of the circumstances of their seizure. There's not only a 4th Amendment liberty interest but also a 1st Amendment freecdom to communicate anonymously right protecting those documents and notes. 
  • ...1 more comment...
  •  
    I listened to an interview with Audrey Hudson last night. It seems to me the key fact is in this clip; "But without Hudson's knowledge, the agents also confiscated a batch of documents that contained information about sources inside the Department of Homeland Security and the Transportation Security Administration, she said." Audrey had written a series of articles describing how the Homeland Security and Transportation agency had been lying about air marshalls and the post 911 program to secure passenger flights. The documents that were stolen listed her sources - the whistle blowers inside the Homeland Security administration who leaked information about the lies and the many problems with the program that the Obama administration was covering up. This sounds to me like another example of Obama hunting down and persecuting whistleblowers. A direct violation of the 1989 - 2007 Whistleblower Protection Act. Not surprisingly, Ms Hudson had not tried to contact any of her whistleblowing sources for fear that the NSA would be watching and that this persecution would happen. Interestingly, the warrant was to seize a "potato launcher". No kidding! It seems Ms. Hudson's husband had, at one time been a licensed arms dealer. He lost that license having sold a gun with faulty paperwork. This event had occurred years earlier, and Mr. Hudson had long since moved on and was currently working for the Coast Guard as an outside contractor/consultant. So they seized the toy "potato launcher", as described in the warrant. But they also ransacked the home looking for the key documents that listed Ms Hudson's inside Homeland Security sources behind her air marshal scandal articles. These documents were the only items seized - other than the "potato launcher" that was the only item listed in the warrant. Seems we've been here before. From wikipedia, the story of Friedrich Gustav Emil Martin Niemöller: ........................... Arrested on 1 July 1937, N
  •  
    "But without Hudson's knowledge, the agents also confiscated a batch of documents that contained information about sources inside the Department of Homeland Security and the Transportation Security Administration, she said."
  •  
    What troubles me the most about this event, assuming the truth of what's reported, is how well known the limitations on execution of a search warrant are within the law enforcement community. If it happened as described, it seems very unlikely that the officer who grabbed the documents did not know he was violating the 4th Amendment. Ditto for the lawyer or other official(s) who learned of what went down shortly thereafter, but kept the documents anyway. There's an arrogance that goes with government and corporate officials who don't have to personally pay damage awards. With no personal monetary liability (in reality, since the government or corporation picks up the tab), it becomes a matter of personal ethics and whether the misbehavior will anger or please the boss. If the ethics are weak, that becomes a pretty simple choice.
Paul Merrell

US v. Comprehensive Drug Testing, Inc., 621 F. 3d 1162 - Court of Appeals, 9th Circuit ... - 0 views

  • Concluding Thoughts
  • This case well illustrates both the challenges faced by modern law enforcement in retrieving information it needs to pursue and prosecute wrongdoers, and the threat to the privacy of innocent parties from a vigorous criminal investigation. At the time of Tamura, most individuals and enterprises kept records in their file cabinets or similar physical facilities. Today, the same kind of data is usually stored electronically, often far from the premises. Electronic storage facilities intermingle data, making them difficult to retrieve without a thorough understanding of the filing and classification systems used—something that can often only be determined by closely analyzing the data in a controlled environment. Tamura involved a few dozen boxes and was considered a broad seizure; but even inexpensive electronic storage media today can store the equivalent of millions of pages of information. 1176*1176 Wrongdoers and their collaborators have obvious incentives to make data difficult to find, but parties involved in lawful activities may also encrypt or compress data for entirely legitimate reasons: protection of privacy, preservation of privileged communications, warding off industrial espionage or preventing general mischief such as identity theft. Law enforcement today thus has a far more difficult, exacting and sensitive task in pursuing evidence of criminal activities than even in the relatively recent past. The legitimate need to scoop up large quantities of data, and sift through it carefully for concealed or disguised pieces of evidence, is one we've often recognized. See, e.g., United States v. Hill, 459 F.3d 966 (9th Cir.2006).
  • This pressing need of law enforcement for broad authorization to examine electronic records, so persuasively demonstrated in the introduction to the original warrant in this case, see pp. 1167-68 supra, creates a serious risk that every warrant for electronic information will become, in effect, a general warrant, rendering the Fourth Amendment irrelevant. The problem can be stated very simply: There is no way to be sure exactly what an electronic file contains without somehow examining its contents—either by opening it and looking, using specialized forensic software, keyword searching or some other such technique. But electronic files are generally found on media that also contain thousands or millions of other files among which the sought-after data may be stored or concealed. By necessity, government efforts to locate particular files will require examining a great many other files to exclude the possibility that the sought-after data are concealed there. Once a file is examined, however, the government may claim (as it did in this case) that its contents are in plain view and, if incriminating, the government can keep it. Authorization to search some computer files therefore automatically becomes authorization to search all files in the same sub-directory, and all files in an enveloping directory, a neighboring hard drive, a nearby computer or nearby storage media. Where computers are not near each other, but are connected electronically, the original search might justify examining files in computers many miles away, on a theory that incriminating electronic data could have been shuttled and concealed there.
  • ...3 more annotations...
  • The advent of fast, cheap networking has made it possible to store information at remote third-party locations, where it is intermingled with that of other users. For example, many people no longer keep their email primarily on their personal computer, and instead use a web-based email provider, which stores their messages along with billions of messages from and to millions of other people. Similar services exist for photographs, slide shows, computer code and many other types of data. As a result, people now have personal data that are stored with that of innumerable strangers. Seizure of, for example, Google's email servers to look for a few incriminating messages could jeopardize the privacy of millions. It's no answer to suggest, as did the majority of the three-judge panel, that people can avoid these hazards by not storing their data electronically. To begin with, the choice about how information is stored is often made by someone other than the individuals whose privacy would be invaded by the search. Most people have no idea whether their doctor, lawyer or accountant maintains records in paper or electronic format, whether they are stored on the premises or on a server farm in Rancho Cucamonga, whether they are commingled with those of many other professionals 1177*1177 or kept entirely separate. Here, for example, the Tracey Directory contained a huge number of drug testing records, not only of the ten players for whom the government had probable cause but hundreds of other professional baseball players, thirteen other sports organizations, three unrelated sporting competitions, and a non-sports business entity—thousands of files in all, reflecting the test results of an unknown number of people, most having no relationship to professional baseball except that they had the bad luck of having their test results stored on the same computer as the baseball players.
  • Second, there are very important benefits to storing data electronically. Being able to back up the data and avoid the loss by fire, flood or earthquake is one of them. Ease of access from remote locations while traveling is another. The ability to swiftly share the data among professionals, such as sending MRIs for examination by a cancer specialist half-way around the world, can mean the difference between death and a full recovery. Electronic storage and transmission of data is no longer a peculiarity or a luxury of the very rich; it's a way of life. Government intrusions into large private databases thus have the potential to expose exceedingly sensitive information about countless individuals not implicated in any criminal activity, who might not even know that the information about them has been seized and thus can do nothing to protect their privacy. It is not surprising, then, that all three of the district judges below were severely troubled by the government's conduct in this case. Judge Mahan, for example, asked "what ever happened to the Fourth Amendment? Was it ... repealed somehow?" Judge Cooper referred to "the image of quickly and skillfully moving the cup so no one can find the pea." And Judge Illston regarded the government's tactics as "unreasonable" and found that they constituted "harassment." Judge Thomas, too, in his panel dissent, expressed frustration with the government's conduct and position, calling it a "breathtaking expansion of the `plain view' doctrine, which clearly has no application to intermingled private electronic data." Comprehensive Drug Testing, 513 F.3d at 1117.
  • Everyone's interests are best served if there are clear rules to follow that strike a fair balance between the legitimate needs of law enforcement and the right of individuals and enterprises to the privacy that is at the heart of the Fourth Amendment. Tamura has provided a workable framework for almost three decades, and might well have sufficed in this case had its teachings been followed. We have updated Tamura to apply to the daunting realities of electronic searches. We recognize the reality that over-seizing is an inherent part of the electronic search process and proceed on the assumption that, when it comes to the seizure of electronic records, this will be far more common than in the days of paper records. This calls for greater vigilance on the part of judicial officers in striking the right balance between the government's interest in law enforcement and the right of individuals to be free from unreasonable searches and seizures. The process of segregating electronic data that is seizable from that which is not must not become a vehicle for the government to gain access to data which it has no probable cause to collect.
  •  
    From a Ninth U.S. Circuit Court of Appeals en banc ruling in 2010. The Court's holding was that federal investigators had vastly overstepped the boundaries of multiple subpoenas and a search warrant --- and the Fourth Amendment --- by seizing records of a testing laboratory and reviewing them for information not described in the warrant or the subpoenas. At issue in this particular case was the government's use of a warrant that found probable cause to believe that the records contained evidence that steroids had been found in the urine of ten major league baseball players but searched the seized records for urine tests of other baseball players. The Court upheld the lower courts' rulings that the government was required to return all records other than those relevant to the ten players identified in the warrant. (The government had instead used the records of other player's urine tests to issue subpoenas for evidence relevant to those players potential use of steroids.) This decision cuts very heavily against the notion that the Fourth Amendment allows the bulk collection of private information about millions of Americans with or without a warrantor court order on the theory that some of the records *may* later become relevant to a lawful investigation.   Or rephrased, here is the en banc decision of the largest federal court of appeals (as many judges as most other federal appellate courts combined), in direct disagreement with the FISA Court orders allowing bulk collection of telephone records and bulk "incidental" collection of Americans' telephone conversations on the theory that the records *might* become relevant to national security investigations. Yet none of the FISA judges in any of the FISA opinions published thus far even cited, let alone distinguished, this Ninth Circuit en banc decision. Which says a lot of the quality of the legal research performed by the FISA Court judges. However, this precedent is front and center in briefs filed with the Ni
Gary Edwards

Boston And More Government Lies : Personal Liberty Digest™ - 0 views

  •  
    "However, now we - at least those of us who pay attention - know, thanks to Glenn Beck, the Saudi person of interest is not just some innocent bystander after all. Just hours after the April 15 bombing, Abdul Rahman Ali Alharbi was put on a terror watch list and had an event file created that indicated he was armed and dangerous; and actions began that would lead to his deportation. Alharbi, who is related to a number of terrorists now residing in Gitmo and/or listed as part of al-Qaida, was admitted to the United States under a "special advisory opinion," indicating someone pulled some strings for him. His strings go a long way - all the way to the White House, where Alharbi was a frequent visitor (seven times since 2009). His file contained one prior event, indicating he was already in the terrorism watch list system. Yet even though he's marked as a terrorist, he was allowed in. Perhaps that explains Michelle Obama's hospital visit. Alharbi and the Obamas are friends. After news of his possible deportation leaked, government officials backtracked. Homeland Security Secretary Janet Napolitano refused to answer questions from a Congressman about Alharbi. An Immigration and Customs Enforcement official told Beck a different Saudi was in custody but not connected to the bombing. Someone altered Alharbi's file on April 17 in a way that disassociated him from the bombing, according to Beck, but an original had been printed out and saved. The change happened around the time that first Secretary of State John Kerry and then President Barack Obama met with the Saudi foreign minister - a meeting that wasn't on Obama's schedule. There are photographs on the Internet that purport to show Alharbi with two other Saudis near the bomb site. If the government will lie about who Alharbi is and whether his is a suspect, what else about the official narrative is a lie? Despite initial claims by the FBI that included a request to help identify the two men
Paul Merrell

Am. Express Co. v. Italian Colors Rest. :: Justia US Supreme Court Center - 0 views

  • Justia.com Opinion Summary: An agreement between American Express and merchants who accept American Express cards, requires that all of their disputes be resolved by arbitration and provides that there “shall be no right or authority for any Claims to be arbitrated on a class action basis.” The merchants filed a class action, claiming that American Express violated section 1 of the Sherman Act and seeking treble damages under section 4 of the Clayton Act. The district court dismissed. The Second Circuit reversed, holding that the class action waiver was unenforceable and that arbitration could not proceed because of prohibitive costs. The Circuit upheld its reversal on remand in light of a Supreme Court holding that a party may not be compelled to submit to class arbitration absent an agreement to do so. The Supreme Court reversed. The FAA reflects an overarching principle that arbitration is a matter of contract and does not permit courts to invalidate a contractual waiver of class arbitration on the ground that the plaintiff’s cost of individually arbitrating a federal statutory claim exceeds the potential recovery. Courts must rigorously enforce arbitration agreements even for claims alleging violation of a federal statute, unless the FAA mandate has been overridden by a contrary congressional command. No contrary congressional command requires rejection of this waiver. Federal antitrust laws do not guarantee an affordable procedural path to the vindication of every claim or indicate an intention to preclude waiver of class-action procedures. The fact that it is not worth the expense involved in proving a statutory remedy does not constitute the elimination of the right to pursue that remedy.
  •  
    Remarkable 5-3 Supreme Court decision in favor of the banksters, in effect overruling a line of prior decisions nearly 30 years old. At issue, whether a credit card monopolists' form contract with merchants containing a mandatory arbitration clause could lawfully bar judicial review under the antitrust laws when the arbitration clause barred class arbitration and the amount merchants could hope to recover was less than a tenth of the expense of litigating claims individually. (Antitrust cases are unusually expensive to prosecute.) For nearly three decades, the Court had implied an exception to the Federal Arbitration Act that allowed plaintiffs to litigate claims subject to arbitration clauses in court to vindicate rights under federal law when arbitration would not provide an effective remedy for the violation of federal law. No more. Upholding the "right" of American Express to insist on a 30 percent share of the price of each sale transacted with an American Express card. Read Justice Kagan's dissent, joined by two other justices, to learn what's wrong with the majority's decision. Her nushell version: "here is the nutshell version of today's opinion, admirably flaunted rather than camoflaged: Too darn bad." The majority did, however, leave it open for Congress to amend the Arbitration Act to resolve the issue. But with corporate and bankster influence in Congress, good luck with that. This decision, unfortunately, has major implications for software developers, as well as other merchants. For example, the current crop of "app store" restrictions on competition enforced by technical measures on app developers by monopolists such as Apple and Microsoft, insisting on a 30 per cent cut of each sale. One can rest assured that such contracts contain similar arbitration clauses
Gary Edwards

Hillary Clinton Email -- Classified Information Was Obvious to Her, and She Lied | Nati... - 1 views

  •  
    "For mishandling 'top secret' information and lying about it, she should be prosecuted. So now Hillary finally knows what the "(C)" stands for in government documents: It's Cartwright . . . as in four-star Marine General James E. Cartwright, the retired 67-year-old former vice chairman of the Joint Chiefs of Staff, the expendable federal official against whom laws protecting classified information actually get enforced. (C), see? Oh wait - sorry. I don't mean to confuse Mrs. Clinton by starting this second paragraph with "(C)". After all, as she diva-'splained to the FBI, she could only "speculate" that "(C)" must have something to do with organizing paragraphs "in alphabetical order." Speculation was necessary, she said, apparently with a straight face, because she didn't really know what "(C)" meant. The question arose because the "(C)" designation - applicable to classified information at the confidential level - turned up in at least one of Clinton's personal e-mails. Those would be the e-mails that, she repeatedly insisted, never, ever contained classified information. Or at least, that's what she insisted until government agencies confessed that hundreds of the e-mails do contain classified information. Then Clinton's "never, ever" tale morphed into the more narrowly tailored lie that there were no e-mails "marked classified." Alas, that claim could not withstand examination of the e-mails, during which the "(C)" markings were found . . . whereupon the explanation underwent more, shall we say, refining. Thus the final, astonishing claim that she didn't know what the markings meant, along with the laugh-out-loud whopper that maybe it was all about alphabetical order. Yeah, that's the ticket! In case you're keeping score: When a person being prosecuted for a crime changes her story multiple times, as if she were playing Twister (kids, ask your parents), the prosecutor gets to prov
Paul Merrell

British Lawmakers Condemn 2011 Intervention in Libya - The New York Times - 0 views

  • A committee of British lawmakers issued a damning assessment on Wednesday of the 2011 intervention in Libya led by Britain and France, concluding that the military action had lacked a coherent strategy, had been based on poor intelligence and had led to a political collapse that aided the rise of the Islamic State in North Africa.
  • The report from the foreign affairs committee of the House of Commons directly blamed the former prime minister, David Cameron, saying he “was ultimately responsible for the failure to develop a coherent Libya strategy.”In echoing many criticisms from another inquiry, published this year, into Britain’s role in the Iraq war under one of Mr. Cameron’s predecessors, Tony Blair, the report suggested that lessons from that conflict had not been learned.Fearing civilian deaths, an international coalition assembled by Britain and France launched air and missile strikes in March 2011, after Col. Muammar el-Qaddafi’s forces threatened to attack the rebel-held city of Benghazi.Libya descended into chaos, and a power vacuum ensued after the Qaddafi government collapsed, allowing fighters for the Islamic State, also known as ISIS or ISIL, to gain a significant foothold in the country, and the report suggested that Britain had lost interest in the country after Colonel Qaddafi lost power. Advertisement Continue reading the main story The mission represented a significant shift from the Iraq war, with Britain and France assuming the main leadership role — Mr. Cameron had pressed for military action alongside the French president at the time, Nicolas Sarkozy — and the United States taking an active, but less visible, role.
  • In many ways, the report mirrored the assessment of President Obama, who offered a candid appraisal of the intervention in an interview published in The Atlantic this year. “It didn’t work,” Mr. Obama said, citing what he described as his misplaced faith that “the Europeans” in general would be invested in the follow-up. He also said that Mr. Cameron had soon become “distracted by other things” and that Mr. Sarkozy had been voted out of office the next year.The report by the 11-person committee, which included six lawmakers from Mr. Cameron’s Conservative Party, criticized the British strategy as flawed from its inception, concluding that it “was founded on erroneous assumptions and an incomplete understanding of the evidence.”
  • ...1 more annotation...
  • There had been, they said, no thorough assessment of the nature of the rebellion in Libya or of the real threat to civilians. Nor, they added, had there been any attempt at political engagement with the government, leaving military intervention as the sole focus. Today’s Headlines Wake up each morning to the day’s top news, analysis and opinion delivered to your inbox. Please verify you're not a robot by clicking the box. Invalid email address. Please re-enter. Sign Up Receive occasional updates and special offers for The New York Times's products and services. Thank you for subscribing to Today’s Headlines. An error has occurred. Please try again later. You are already subscribed to this email. View all New York Times newsletters. See Sample Manage Email Preferences Not you? Privacy Policy “By the summer of 2011, the limited intervention to protect civilians had drifted into an opportunist policy of regime change,” the lawmakers said.The consequence of the military action was “political and economic collapse, intermilitia and intertribal warfare, humanitarian and migrant crises, widespread human rights violations, the spread of Qaddafi regime weapons across the region and the growth of ISIL in North Africa,” the lawmakers said.
Paul Merrell

NSA Data Will Soon Be Used By Domestic Law Enforcement - 0 views

  • If you’re reading this, then I’m willing to bet that you’ve been called many different names throughout your life. If I were to hazard a guess, I would say they were names like kook, paranoid, conspiracy theorist, alarmist, insane, or gullible. And after this week, you can go by a new name: Vindicated. I’m of course talking about recent revelations from the NSA. Long before Edward Snowden came along, it was no secret that the NSA was spying on everyone without good cause. Anyone who believed that fact was called a conspiracy theorist, but their fears were eventually validated. These same people also understood that the NSA’s surveillance powers would never be used exclusively against terrorists and hostile governments. The power they have is just too tempting for any government. If various government agencies weren’t using the NSA’s surveillance apparatus to solve domestic crimes, it was only a matter of time before it was used for just that.
  • And again, they called us conspiracy theorists for believing that. And again, we were right all long. A while back, we noted a report showing that the “sneak-and-peek” provision of the Patriot Act that was alleged to be used only in national security and terrorism investigations has overwhelmingly been used in narcotics cases. Now the New York Times reports that National Security Agency data will be shared with other intelligence agencies like the FBI without first applying any screens for privacy. The ACLU of Massachusetts blog Privacy SOS explains why this is important: What does this rule change mean for you? In short, domestic law enforcement officials now have access to huge troves of American communications, obtained without warrants, that they can use to put people in cages. FBI agents don’t need to have any “national security” related reason to plug your name, email address, phone number, or other “selector” into the NSA’s gargantuan data trove. They can simply poke around in your private information in the course of totally routine investigations. And if they find something that suggests, say, involvement in illegal drug activity, they can send that information to local or state police. That means information the NSA collects for purposes of so-called “national security” will be used by police to lock up ordinary Americans for routine crimes.
  • Anybody who knows anything about how governments work, should not surprised. You can’t give them any kind of power, and expect them to use it responsibly. You can’t give them any stipulations. Eventually they’ll find a legal loophole to work around any limitations that have been placed on them. In other news, the Pentagon admitted this week that they’ve been deploying military drones over the United States for domestic surveillance purposes. Much like the NSA’s surveillance apparatus, we were assured that drones were for terrorists in faraway lands. Nothing so Orwellian would ever be used against ordinary American citizens at home. Yet here we are, with more to come.
  •  
    The Privacy Act, 5 U.S.C. 552a, provides in relevant part: "(a)(4) the term "record" means any item, collection, or grouping of information about an individual that is maintained by an agency, including, but not limited to, his education, financial transactions, medical history, and criminal or employment history and that contains his name, or the identifying number, symbol, or other identifying particular assigned to the individual, such as a finger or voice print or a photograph[.] ... "(b) Conditions of Disclosure.-No agency shall disclose any record which is contained in a system of records by any means of communication to any person, or to another agency, except pursuant to a written request by, or with the prior written consent of, the individual to whom the record pertains, unless disclosure of the record would be- ... "(7) to another agency or to an instrumentality of any governmental jurisdiction within or under the control of the United States for a civil or criminal law enforcement activity if the activity is authorized by law, and if the head of the agency or instrumentality has made a written request to the agency which maintains the record specifying the particular portion desired and the law enforcement activity for which the record is sought[.]" So a separate written request for each "portion" of any individual record that describes the "law enforcement activity for which the record is sought[.]" That doesn't sound like the contemplated unfettered access to bulk raw data. And it gets even better, with a right to sue for any violation, attorney fees and expenses, and a statutory minimum of $1,000 damages per violation just for winning the case.  
Paul Merrell

Dropbox - Goverment Data Requests Principles - 0 views

  • Dropbox's Government Data Requests PrinciplesWe understand that when you entrust us with your digital life, you expect us to keep your stuff safe. Like most online services, we sometimes receive requests from governments seeking information about our users. These principles describe how we deal with the requests we receive and how we’ll work to try to change the laws to make them more protective of your privacy.Be transparent:  Online services should be allowed to report the exact number of government data requests received, the number of accounts affected by those requests, and the laws used to justify the requests. We’ll continue to advocate for the right to provide this important information. Learn more.Our Transparency Report discloses the number of law enforcement requests we receive and the number of accounts affected. Currently, our report doesn’t include specific details about the number of national security requests we receive from the US government, if any. We’ve urged the courts and the government to allow services like Dropbox to disclose the precise number of national security requests they receive and the number of accounts affected. We’ll continue this fight. In the meantime, we’re providing as much information about national security requests received and accounts affected as allowed.Fight blanket requests:  Government data requests should be limited to specific people and investigations. We’ll resist requests directed to large groups of people or that seek information unrelated to a specific investigation. Learn more.
  • Protect all users:  Laws authorizing governments to request user data from online services shouldn’t treat people differently based on their citizenship or where they live. We’ll work hard to reform these laws. Learn more.Certain laws give people different protections based on where they live or their citizenship. These laws don’t reflect the global nature of online services. We’re committed to extending fundamental privacy protections to all users: government data requests shouldn’t be in bulk, they should relate to specific individuals and investigations, and a neutral third party should evaluate and sign off on requests for content before they issue.Provide trusted services:  Governments should never install backdoors into online services or compromise infrastructure to obtain user data. We’ll continue to work to protect our systems and to change laws to make it clear that this type of activity is illegal. Learn more.
  •  
    Remember the first PRISM documents? They said that Dropbox was next in line to be added to NSA's data collection. Evidently Dropbox execs have been feeling some customer heat from that. Notice of this new policy was sent to all Dropbox users tonight.
Gary Edwards

Startup turns carbon dioxide into fuels - 0 views

  • The research has received funding from the Air Force Office of Scientific Research (AFSOR), the National Science Foundation and the Department of Energy (DOE). The collaboration between Liquid Light and the University was supported by the DOE Small Business Innovation Research program and the AFOSR Small Business Technology Transfer program. Princeton's agreement with Liquid Light allowed the company to continue to collaborate with Bocarsly and his research team. Before long, new discoveries were emerging. "They started noticing interesting chemistry that we wouldn't have predicted," said Bocarsly.
  • The Princeton scientists did some additional studies, and made a surprising discovery: They could turn CO2, which contains only one carbon, into a compound with a carbon-carbon bond, which vastly increases the possibilities for creating commercial applications. This was radical because although the reaction is certainly possible, it is highly unlikely to happen because so many other competing reactions are occurring. "Everyone who electrochemically reduces CO2 today makes compounds with only one carbon," said Bocarsly. "Nobody makes things with carbon-carbon bonds." He paused. "But we can." "That was a very 'wow' moment," recalled Cole, "because we thought that our process could only make methanol. But now we were finding that we could make a variety of products, and that is what makes this technology commercially interesting." She said Liquid Light scientists can now make more than 20 different products from CO2.
  • One of the chemicals Liquid Light can make is isopropanol, commonly known as rubbing alcohol and an important industrial chemical. Another is butanol, which could be commercially important as a fuel. Liquid Light's technology offers the potential to make these chemicals at lower cost than today's methods, which involve starting with fossil fuels such as petroleum and natural gas.
  • ...3 more annotations...
  • Why does pyridinium work so well as a catalyst for the reaction? Based on its structure, the ring-shaped molecule is an unlikely catalyst for this reaction because it shuttles just one electron at a time. But to convert CO2 to methanol requires six electrons, and to make higher-carbon molecules takes even more electrons. Bocarsly and his team — in collaboration with Steven Bernasek, professor of chemistry — are doing studies to understand the steps in the chemical reaction, and they are making rapid progress. "There are clearly some intermediate products formed during the reaction that do not sit around for a long time and are not there in very high concentrations," said Bocarsly.
  • The Princeton team also is studying the factors that determine which products can be made from CO2. The researchers have found that very subtle changes in the electrode surface can lead to production of different chemicals. For example, CO2 plus a pyridinium catalyst and a platinum electrode make methanol. However, the same catalyst and a different electrode give a different product. The team published its findings on how the reaction is affected by catalyst concentration, temperature and pressure in the journal ChemSusChem last year.
  • Citing government statistics that the United States generates about 5.5 billion metric tons of CO2 per year, Teamey said it will not be hard to obtain the starting materials for this new industry. However, the CO2 needs to be relatively pure, a requirement that rules out gasoline tailpipes and coal-fired power plants. Instead, said Teamey, the CO2 could come from manufacturing facilities, such as fertilizer manufacturers and cement plants, which according to Teamey emit some 100 million tons of high-purity CO2 each year.
  •  
    "Today, carbon dioxide (CO2) is a hot topic. Scientists around the globe are searching for ways to store, dispose of, or prevent the formation of the greenhouse gas, which is a major driver of global climate change. Liquid Light hopes to take this concept one step further and harness waste CO2 as a source of carbon to make industrial chemicals and fuels. The technology behind the process is simple: Take CO2 and mix it in a water-filled chamber with an electrode and a catalyst. The ensuing chemical reaction converts CO2 into a new molecule, methanol, which can be used as a fuel, an industrial solvent or a starting material for the manufacture of other chemicals. Liquid Light's founders include Bocarsly and his former graduate student Emily Cole, who earned her Ph.D. from Princeton in 2009. Cole helped revive efforts in Bocarsly's lab to study the conversion of CO2 into usable fuels, which led to the launch of Liquid Light and an ongoing collaboration that Bocarsly said has been extremely positive for his research team at the University. "We've made some discoveries that wouldn't have been made in a university setting, and this has really accelerated the research," Bocarsly said. "It is a very productive relationship." Back in the 1990s, a former Ph.D. student of Bocarsly's named Chao Lin conducted some of the earliest experiments on turning CO2 into methanol. He used palladium metal as the electrode and pyridinium, an inexpensive ring-shaped molecule, as the catalyst. By plugging the electrode into an electrical outlet, he could drive an electrochemical reaction that converted CO2 into methanol. As Bocarsly recalled, Lin was quite excited about his success. However, said Bocarsly, "We published that finding in 1994 and there was approximately zero interest in it." The work languished until 2005 when Cole, then a new graduate student, told Bocarsly she wanted to work on a clean-energy project. She took up the challenge of reproducing Lin's results, but this time
Gary Edwards

JW: Obama Admin Knew About Benghazi Before It Happened - 0 views

  • The State Department has yet to turn over any documents from the secret email accounts of Hillary Clinton and other top State Department officials. “These documents are jaw-dropping. No wonder we had to file more FOIA lawsuits and wait over two years for them.  If the American people had known the truth – that Barack Obama, Hillary Clinton and other top administration officials knew that the Benghazi attack was an al-Qaeda terrorist attack from the get-go – and yet lied and covered this fact up – Mitt Romney might very well be president. And why would the Obama administration continue to support the Muslim Brotherhood even after it knew it was tied to the Benghazi terrorist attack and to al Qaeda? These documents also point to connection between the collapse in Libya and the ISIS war – and confirm that the U.S. knew remarkable details about the transfer of arms from Benghazi to Syrian jihadists,” stated Tom Fitton, Judicial Watch president.  “These documents show that the Benghazi cover-up has continued for years and is only unraveling through our independent lawsuits. The Benghazi scandal just got a whole lot worse for Barack Obama and Hillary Clinton.”
  • The DOD documents also contain the first official documentation that the Obama administration knew that weapons were being shipped from the Port of Benghazi to rebel troops in Syria. An October 2012 report confirms: Weapons from the former Libya military stockpiles were shipped from the port of Benghazi, Libya to the Port of Banias and the Port of Borj Islam, Syria. The weapons shipped during late-August 2012 were Sniper rifles, RPG’s, and 125 mm and 155mm howitzers missiles. During the immediate aftermath of, and following the uncertainty caused by, the downfall of the ((Qaddafi)) regime in October 2011 and up until early September of 2012, weapons from the former Libya military stockpiles located in Benghazi, Libya were shipped from the port of Benghazi, Libya to the ports of Banias and the Port of Borj Islam, Syria. The Syrian ports were chosen due to the small amount of cargo traffic transiting these two ports. The ships used to transport the weapons were medium-sized and able to hold 10 or less shipping containers of cargo. The DIA document further details: The weapons shipped from Syria during late-August 2012 were Sniper rifles, RPG’s and 125mm and 155mm howitzers missiles.  The numbers for each weapon were estimated to be: 500 Sniper rifles, 100 RPG launchers with 300 total rounds, and approximately 400 howitzers missiles [200 ea – 125mm and 200ea – 155 mm.] The heavily redacted document does not disclose who was shipping the weapons.
  • Another DIA report, written in August 2012 (the same time period the U.S. was monitoring weapons flows from Libya to Syria), said that the opposition in Syria was driven by al Qaeda and other extremist Muslim groups: “the Salafist, the Muslim Brotherhood, and AQI are the major forces driving the insurgency in Syria.” The growing sectarian direction of the war was predicted to have dire consequences for Iraq, which included the “grave danger” of the rise of ISIS: The deterioration of the situation has dire consequences on the Iraqi situation and are as follows: This creates the ideal atmosphere for AQI [al Qaeda Iraq] to return to its old pockets in Mosul and Ramadi, and will provide a renewed momentum under the presumption of unifying the jihad among Sunni Iraq and Syria, and the rest of the Sunnis in the Arab world against what it considers one enemy, the dissenters. ISI could also declare an Islamic state through its union with other terrorist organizations in Iraq and Syria, which will create grave danger in regards to unifying Iraq and the protection of its territory. Some of the “dire consequences” are blacked out but the DIA presciently warned one such consequence would be the “renewing facilitation of terrorist elements from all over the Arab world entering into Iraqi Arena.”
  • ...1 more annotation...
  • From a separate lawsuit, the State Department produced a document created the morning after the Benghazi attack by Hillary Clinton’s offices, and the Operations Center in the Office of the Executive Secretariat that was sent widely through the agency, including to Joseph McManus (then-Hillary Clinton’s executive assistant).  At 6:00 am, a few hours after the attack, the top office of the State Department sent a “spot report” on the “Attack on U.S. Diplomatic Mission in Benghazi” that makes no mention of videos or demonstrations: Four COM personnel were killed and three were wounded in an attack by dozens of fighters on the U.S. Diplomatic Mission in Benghazi beginning approximately 1550 Eastern Time….
  •  
    "Administration knew three months before the November 2012 presidential election of ISIS plans to establish a caliphate in Iraq  Administration knew of arms being shipped from Benghazi to Syria (Washington, DC) - Judicial Watch announced today that it obtained more than 100 pages of previously classified "Secret" documents from the Department of Defense (DOD)and the Department of State revealing that DOD almost immediately reported that the attack on the U.S. Consulate in Benghazi was committed by the al Qaeda and Muslim Brotherhood-linked "Brigades of the Captive Omar Abdul Rahman" (BCOAR), and had been planned at least 10 days in advance. Rahman is known as the Blind Sheikh, and is serving life in prison for his involvement in the 1993 World Trade Center bombing and other terrorist acts.  The new documents also provide the first official confirmation that shows the U.S. government was aware of arms shipments from Benghazi to Syria.  The documents also include an August 2012 analysis warning of the rise of ISIS and the predicted failure of the Obama policy of regime change in Syria. The documents were released in response to a court order in accordance with a May 15, 2014, Freedom of Information Act (FOIA) lawsuit filed against both the DOD and State Department seeking communications between the two agencies and congressional leaders "on matters related to the activities of any agency or department of the U.S. government at the Special Mission Compound and/or classified annex in Benghazi." Spelling and punctuation is duplicated in this release without corrections. A Defense Department document from the Defense Intelligence Agency (DIA), dated September 12, 2012, the day after the Benghazi attack, details that the attack on the compound had been carefully planned by the BOCAR terrorist group "to kill as many Americans as possible."  The document was sent to then-Secretary of State Hillary Clinton, then-Defense Secretary Leon P
Paul Merrell

Operation AURORAGOLD: How the NSA Hacks Cellphone Networks Worldwide - 0 views

  • In March 2011, two weeks before the Western intervention in Libya, a secret message was delivered to the National Security Agency. An intelligence unit within the U.S. military’s Africa Command needed help to hack into Libya’s cellphone networks and monitor text messages. For the NSA, the task was easy. The agency had already obtained technical information about the cellphone carriers’ internal systems by spying on documents sent among company employees, and these details would provide the perfect blueprint to help the military break into the networks. The NSA’s assistance in the Libya operation, however, was not an isolated case. It was part of a much larger surveillance program—global in its scope and ramifications—targeted not just at hostile countries.
  • According to documents contained in the archive of material provided to The Intercept by whistleblower Edward Snowden, the NSA has spied on hundreds of companies and organizations internationally, including in countries closely allied to the United States, in an effort to find security weaknesses in cellphone technology that it can exploit for surveillance. The documents also reveal how the NSA plans to secretly introduce new flaws into communication systems so that they can be tapped into—a controversial tactic that security experts say could be exposing the general population to criminal hackers. Codenamed AURORAGOLD, the covert operation has monitored the content of messages sent and received by more than 1,200 email accounts associated with major cellphone network operators, intercepting confidential company planning papers that help the NSA hack into phone networks.
  • Karsten Nohl, a leading cellphone security expert and cryptographer who was consulted by The Intercept about details contained in the AURORAGOLD documents, said that the broad scope of information swept up in the operation appears aimed at ensuring virtually every cellphone network in the world is NSA accessible.
  • ...11 more annotations...
  • “Collecting an inventory [like this] on world networks has big ramifications,” Nohl said, because it allows the NSA to track and circumvent upgrades in encryption technology used by cellphone companies to shield calls and texts from eavesdropping. Evidence that the agency has deliberately plotted to weaken the security of communication infrastructure, he added, was particularly alarming. “Even if you love the NSA and you say you have nothing to hide, you should be against a policy that introduces security vulnerabilities,” Nohl said, “because once NSA introduces a weakness, a vulnerability, it’s not only the NSA that can exploit it.”
  • The AURORAGOLD operation is carried out by specialist NSA surveillance units whose existence has not been publicly disclosed: the Wireless Portfolio Management Office, which defines and carries out the NSA’s strategy for exploiting wireless communications, and the Target Technology Trends Center, which monitors the development of new communication technology to ensure that the NSA isn’t blindsided by innovations that could evade its surveillance reach. The center’s logo is a picture of the Earth overshadowed by a large telescope; its motto is “Predict – Plan – Prevent.”
  • The NSA documents reveal that, as of May 2012, the agency had collected technical information on about 70 percent of cellphone networks worldwide—701 of an estimated 985—and was maintaining a list of 1,201 email “selectors” used to intercept internal company details from employees. (“Selector” is an agency term for a unique identifier like an email address or phone number.) From November 2011 to April 2012, between 363 and 1,354 selectors were “tasked” by the NSA for surveillance each month as part of AURORAGOLD, according to the documents. The secret operation appears to have been active since at least 2010.
  • By covertly monitoring GSMA working groups in a bid to identify and exploit security vulnerabilities, the NSA has placed itself into direct conflict with the mission of the National Institute for Standards and Technology, or NIST, the U.S. government agency responsible for recommending cybersecurity standards in the United States. NIST recently handed out a grant of more than $800,000 to GSMA so that the organization could research ways to address “security and privacy challenges” faced by users of mobile devices. The revelation that the trade group has been targeted for surveillance may reignite deep-seated tensions between NIST and NSA that came to the fore following earlier Snowden disclosures. Last year, NIST was forced to urge people not to use an encryption standard it had previously approved after it emerged NSA had apparently covertly worked to deliberately weaken it.
  • The NSA focuses on intercepting obscure but important technical documents circulated among the GSMA’s members known as “IR.21s.” Most cellphone network operators share IR.21 documents among each other as part of agreements that allow their customers to connect to foreign networks when they are “roaming” overseas on a vacation or a business trip. An IR.21, according to the NSA documents, contains information “necessary for targeting and exploitation.” The details in the IR.21s serve as a “warning mechanism” that flag new technology used by network operators, the NSA’s documents state. This allows the agency to identify security vulnerabilities in the latest communication systems that can be exploited, and helps efforts to introduce new vulnerabilities “where they do not yet exist.” The IR.21s also contain details about the encryption used by cellphone companies to protect the privacy of their customers’ communications as they are transmitted across networks. These details are highly sought after by the NSA, as they can aid its efforts to crack the encryption and eavesdrop on conversations.
  • One of the prime targets monitored under the AURORAGOLD program is the London-headquartered trade group, the GSM Association, or the GSMA, which represents the interests of more than 800 major cellphone, software, and internet companies from 220 countries. The GSMA’s members include U.S.-based companies such as Verizon, AT&T, Sprint, Microsoft, Facebook, Intel, Cisco, and Oracle, as well as large international firms including Sony, Nokia, Samsung, Ericsson, and Vodafone. The trade organization brings together its members for regular meetings at which new technologies and policies are discussed among various “working groups.” The Snowden files reveal that the NSA specifically targeted the GSMA’s working groups for surveillance.
  • Last year, the Washington Post reported that the NSA had already managed to break the most commonly used cellphone encryption algorithm in the world, known as A5/1. But the information collected under AURORAGOLD allows the agency to focus on circumventing newer and stronger versions of A5 cellphone encryption, such as A5/3. The documents note that the agency intercepts information from cellphone operators about “the type of A5 cipher algorithm version” they use, and monitors the development of new algorithms in order to find ways to bypass the encryption. In 2009, the British surveillance agency Government Communications Headquarters conducted a similar effort to subvert phone encryption under a project called OPULENT PUP, using powerful computers to perform a “crypt attack” to penetrate the A5/3 algorithm, secret memos reveal. By 2011, GCHQ was collaborating with the NSA on another operation, called WOLFRAMITE, to attack A5/3 encryption. (GCHQ declined to comment for this story, other than to say that it operates within legal parameters.)
  • The extensive attempts to attack cellphone encryption have been replicated across the Five Eyes surveillance alliance. Australia’s top spy agency, for instance, infiltrated an Indonesian cellphone company and stole nearly 1.8 million encryption keys used to protect communications, the New York Times reported in February.
  • The NSA’s documents show that it focuses on collecting details about virtually all technical standards used by cellphone operators, and the agency’s efforts to stay ahead of the technology curve occasionally yield significant results. In early 2010, for instance, its operatives had already found ways to penetrate a variant of the newest “fourth generation” smartphone-era technology for surveillance, years before it became widely adopted by millions of people in dozens of countries. The NSA says that its efforts are targeted at terrorists, weapons proliferators, and other foreign targets, not “ordinary people.” But the methods used by the agency and its partners to gain access to cellphone communications risk significant blowback. According to Mikko Hypponen, a security expert at Finland-based F-Secure, criminal hackers and foreign government adversaries could be among the inadvertent beneficiaries of any security vulnerabilities or encryption weaknesses inserted by the NSA into communication systems using data collected by the AURORAGOLD project.
  • Vines, the NSA spokeswoman, told The Intercept that the agency was committed to ensuring an “open, interoperable, and secure global internet.” “NSA deeply values these principles and takes great care to honor them in the performance of its lawful foreign-intelligence mission,” Vines said.
  • Documents published with this article: AURORAGOLD – Project Overview AURORAGOLD Working Group IR.21 – A Technology Warning Mechanism AURORAGOLD – Target Technology Trends Center support to WPMO NSA First-Ever Collect of High-Interest 4G Cellular Signal AURORAGOLD Working Aid WOLFRAMITE Encryption Attack OPULENT PUP Encryption Attack NSA/GCHQ/CSEC Network Tradecraft Advancement Team
  •  
    Notice that they've cracked even 4G.
Paul Merrell

Pentagon: Isis is 'beyond anything we've seen' and must be contained | World news | the... - 0 views

  • Senior Pentagon officials described the Islamic State (Isis) militant group as an “apocalyptic” organisation that posed an “imminent threat” on Thursday, yet the highest ranking officer in the US military said that in the short term, it was sufficient for the United States to “contain” the group that has reshaped the map of Iraq and Syria. Army general Martin Dempsey, chairman of the joint chiefs of staff, told reporters in a Pentagon briefing that while Isis would eventually have to be defeated, the US should concentrate on building allies in the region to oppose the group that murdered an American journalist, James Foley. “It is possible to contain them,” Dempsey said, in a Pentagon press conference alongside the defense secretary, Chuck Hagel. “They can be contained, but not in perpetuity. This is an organisation that has an apocalyptic, end-of-days strategic vision which will eventually have to be defeated.”
  • Dempsey’s comments came a day after secretary of state John Kerry said Isis “must be destroyed” following the killing of Foley, the first American known to have died at the hands of Isis. President Obama had referred to the organisation as a “cancer”. Their remarks raised expectations that the administration was preparing for a wider war aimed at wiping out Isis, rather than stopping its advances in Iraq. Internal administration deliberations over a response to Isis continue, and US officials predicted that there would be little departure from the strategy of limited airstrikes launched since 8 August. One said the military plan “may ultimately evolve”.
Paul Merrell

Canadian Spies Collect Domestic Emails in Secret Security Sweep - The Intercept - 0 views

  • Canada’s electronic surveillance agency is covertly monitoring vast amounts of Canadians’ emails as part of a sweeping domestic cybersecurity operation, according to top-secret documents. The surveillance initiative, revealed Wednesday by CBC News in collaboration with The Intercept, is sifting through millions of emails sent to Canadian government agencies and departments, archiving details about them on a database for months or even years. The data mining operation is carried out by the Communications Security Establishment, or CSE, Canada’s equivalent of the National Security Agency. Its existence is disclosed in documents obtained by The Intercept from NSA whistleblower Edward Snowden. The emails are vacuumed up by the Canadian agency as part of its mandate to defend against hacking attacks and malware targeting government computers. It relies on a system codenamed PONY EXPRESS to analyze the messages in a bid to detect potential cyber threats.
  • Last year, CSE acknowledged it collected some private communications as part of cybersecurity efforts. But it refused to divulge the number of communications being stored or to explain for how long any intercepted messages would be retained. Now, the Snowden documents shine a light for the first time on the huge scope of the operation — exposing the controversial details the government withheld from the public. Under Canada’s criminal code, CSE is not allowed to eavesdrop on Canadians’ communications. But the agency can be granted special ministerial exemptions if its efforts are linked to protecting government infrastructure — a loophole that the Snowden documents show is being used to monitor the emails. The latest revelations will trigger concerns about how Canadians’ private correspondence with government employees are being archived by the spy agency and potentially shared with police or allied surveillance agencies overseas, such as the NSA. Members of the public routinely communicate with government employees when, for instance, filing tax returns, writing a letter to a member of parliament, applying for employment insurance benefits or submitting a passport application.
  • Chris Parsons, an internet security expert with the Toronto-based internet think tank Citizen Lab, told CBC News that “you should be able to communicate with your government without the fear that what you say … could come back to haunt you in unexpected ways.” Parsons said that there are legitimate cybersecurity purposes for the agency to keep tabs on communications with the government, but he added: “When we collect huge volumes, it’s not just used to track bad guys. It goes into data stores for years or months at a time and then it can be used at any point in the future.” In a top-secret CSE document on the security operation, dated from 2010, the agency says it “processes 400,000 emails per day” and admits that it is suffering from “information overload” because it is scooping up “too much data.” The document outlines how CSE built a system to handle a massive 400 terabytes of data from Internet networks each month — including Canadians’ emails — as part of the cyber operation. (A single terabyte of data can hold about a billion pages of text, or about 250,000 average-sized mp3 files.)
  • ...1 more annotation...
  • The agency notes in the document that it is storing large amounts of “passively tapped network traffic” for “days to months,” encompassing the contents of emails, attachments and other online activity. It adds that it stores some kinds of metadata — data showing who has contacted whom and when, but not the content of the message — for “months to years.” The document says that CSE has “excellent access to full take data” as part of its cyber operations and is receiving policy support on “use of intercepted private communications.” The term “full take” is surveillance-agency jargon that refers to the bulk collection of both content and metadata from Internet traffic. Another top-secret document on the surveillance dated from 2010 suggests the agency may be obtaining at least some of the data by covertly mining it directly from Canadian Internet cables. CSE notes in the document that it is “processing emails off the wire.”
  •  
    " CANADIAN SPIES COLLECT DOMESTIC EMAILS IN SECRET SECURITY SWEEP BY RYAN GALLAGHER AND GLENN GREENWALD @rj_gallagher@ggreenwald YESTERDAY AT 2:02 AM SHARE TWITTER FACEBOOK GOOGLE EMAIL PRINT POPULAR EXCLUSIVE: TSA ISSUES SECRET WARNING ON 'CATASTROPHIC' THREAT TO AVIATION CHICAGO'S "BLACK SITE" DETAINEES SPEAK OUT WHY DOES THE FBI HAVE TO MANUFACTURE ITS OWN PLOTS IF TERRORISM AND ISIS ARE SUCH GRAVE THREATS? NET NEUTRALITY IS HERE - THANKS TO AN UNPRECEDENTED GUERRILLA ACTIVISM CAMPAIGN HOW SPIES STOLE THE KEYS TO THE ENCRYPTION CASTLE Canada's electronic surveillance agency is covertly monitoring vast amounts of Canadians' emails as part of a sweeping domestic cybersecurity operation, according to top-secret documents. The surveillance initiative, revealed Wednesday by CBC News in collaboration with The Intercept, is sifting through millions of emails sent to Canadian government agencies and departments, archiving details about them on a database for months or even years. The data mining operation is carried out by the Communications Security Establishment, or CSE, Canada's equivalent of the National Security Agency. Its existence is disclosed in documents obtained by The Intercept from NSA whistleblower Edward Snowden. The emails are vacuumed up by the Canadian agency as part of its mandate to defend against hacking attacks and malware targeting government computers. It relies on a system codenamed PONY EXPRESS to analyze the messages in a bid to detect potential cyber threats. Last year, CSE acknowledged it collected some private communications as part of cybersecurity efforts. But it refused to divulge the number of communications being stored or to explain for how long any intercepted messages would be retained. Now, the Snowden documents shine a light for the first time on the huge scope of the operation - exposing the controversial details the government withheld from the public. Under Canada's criminal code, CSE is no
Paul Merrell

JPMorgan to pay record $920 million to resolve trading probes - 1 views

  • JPMorgan Chase is set to pay a record $920 million to resolve probes from three federal agencies over its role in the manipulation of global markets for metals and Treasurys.The figure was released Tuesday morning by the Commodity Futures Trading Commission in a statement from Commissioner Dan Berkovitz. Last week, news reports indicated that the New York-based bank was nearing a settlement of almost $1 billion.The penalty is a record for spoofing, which is when sophisticated traders flood markets with orders that they have no intention of actually executing. The practice was banned after the 2008 financial crisis and regulators have made it a priority to stamp out.Of the $920 million, $436.4 million is a criminal monetary penalty, $172 million is a “criminal disgorgement amount” and $311.7 million is for victim compensation, according to the Department of Justice.
  • JPMorgan Chase is set to pay a record $920 million to resolve probes from three federal agencies over its role in the manipulation of global markets for metals and Treasurys.The figure was released Tuesday morning by the Commodity Futures Trading Commission in a statement from Commissioner Dan Berkovitz. Last week, news reports indicated that the New York-based bank was nearing a settlement of almost $1 billion.The penalty is a record for spoofing, which is when sophisticated traders flood markets with orders that they have no intention of actually executing. The practice was banned after the 2008 financial crisis and regulators have made it a priority to stamp out.Of the $920 million, $436.4 million is a criminal monetary penalty, $172 million is a “criminal disgorgement amount” and $311.7 million is for victim compensation, according to the Department of Justice.
  • The bank, the biggest U.S. lender by assets, has entered into a deferred prosecution agreement with the DOJ that will expire in three years if the firm satisfies its obligations under the deal. 
  • ...4 more annotations...
  • In his statement, the CFTC’s Berkovitz said he opposed the ruling from his agency that JPMorgan’s actions “should not result in any disqualifications under the ‘bad actor’ provisions of the securities laws.” He is apparently referring to the fact that the settlement isn’t expected to result in business restrictions on other areas of the firm.
  • The bank also has quietly settled a long-running lawsuit that accused the bank of manipulating precious metals markets with “spoofing” trades. The lawsuit was filed in 2015 by Daniel Shak, the hedge fund operator and high-stakes poker player, and two metals traders, Mark Grumet and Thomas Wacker.The three plaintiffs had accused JPMorgan of manipulating the silver futures market from 2010 through 2011 through spoofing trades. Details of the settlement were not disclosed in court filings.
  • In September 2019, federal prosecutors charged Nowak and two other former JPMorgan precious metals traders, Gregg Smith and Christopher Jordan, with participating in a racketeering conspiracy in connection with a multiyear scheme to manipulate the markets and defraud customers, as well as other crimes related to alleged spoofing.A superseding indictment was filed in the criminal case two months later, adding another defendant, ex-JPMorgan executive Jeffrey Ruffo, who had worked in hedge fund sales on the firm’s precious metals desk.All four defendants have pleaded not guilty. Trial in that case is scheduled to begin next April in Chicago federal court.
  • The CFTC noted in their press release that the agency continues to pursue civil litigation against Nowak and  Smith, for spoofing and attempted price manipulation.Although Shak’s lawsuit has been settled, JPMorgan still faces a class action lawsuit related to alleged spoofing in the precious metals markets.
Paul Merrell

NYPD Blows Whistle on New Hillary Emails: Money Laundering, Sex Crimes with Children, C... - 1 views

  • New York Police Department detectives and prosecutors working an alleged underage sexting case against former Congressman Anthony Weiner have turned over a newly-found laptop he shared with wife Huma Abedin to the FBI with enough evidence “to put Hillary (Clinton) and her crew away for life,” NYPD sources told True Pundit. NYPD sources said Clinton’s “crew” also included several unnamed yet implicated members of Congress in addition to her aides and insiders. The NYPD seized the computer from Weiner during a search warrant and detectives discovered a trove of over 500,000 emails to and from Hillary Clinton, Abedin and other insiders during her tenure as secretary of state. The content of those emails sparked the FBI to reopen its defunct email investigation into Clinton on Friday.
  • But new revelations on the contents of that laptop, according to law enforcement sources, implicate the Democratic presidential candidate, her subordinates, and even select elected officials in far more alleged serious crimes than mishandling classified and top secret emails, sources said. NYPD sources said these new emails include evidence linking Clinton herself and associates to: Money laundering Child exploitation Sex crimes with minors (children) Perjury Pay to play through Clinton Foundation Obstruction of justice Other felony crimes NYPD detectives and a NYPD Chief, the department’s highest rank under Commissioner, said openly that if the FBI and Justice Department fail to garner timely indictments against Clinton and co- conspirators, NYPD will go public with the damaging emails now in the hands of FBI Director James Comey and many FBI field offices. “What’s in the emails is staggering and as a father, it turned my stomach,” the NYPD Chief said. “There is not going to be any Houdini-like escape from what we found. We have copies of everything. We will ship them to Wikileaks or I will personally hold my own press conference if it comes to that.”
  • The NYPD Chief said once Comey saw the alarming contents of the emails he was forced to reopen a criminal probe against Clinton. “People are going to prison,” he said. Meanwhile, FBI sources said Abedin and Weiner were cooperating with federal agents, who have taken over the non-sexting portions the case from NYPD. The husband-and-wife Clinton insiders  are both shopping for separate immunity deals, sources said. “If they don’t cooperate they are going to see long sentences,” a federal law enforcement source said. NYPD sources said Weiner or Abedin stored all the emails in a massive Microsoft Outlook program on the laptop. The emails implicate other current and former members of Congress and one high-ranking Democratic Senator as having possibly engaged in criminal activity too, sources said. Prosecutors in the office of US Attorney Preet Bharara have issued a subpoena for Weiner’s cell phones and travel records, law enforcement sources confirmed. NYPD said it planned to order the same phone and travel records on Clinton and Abedin, however, the FBI said it was in the process of requesting the identical records. Law enforcement sources are particularly interested in cell phone activity and travel to the Bahamas, U.S. Virgin Islands and other locations that sources would not divulge.
  • ...4 more annotations...
  • The new emails contain travel documents and itineraries indicating Hillary Clinton, President Bill Clinton, Weiner and multiple members of Congress and other government officials accompanied convicted pedophile billionaire Jeffrey Epstein on his Boeing 727 on multiple occasions to his private island in the U.S Virgin Islands, sources said. Epstein’s island has also been dubbed Orgy Island or Sex Slave Island where Epstein allegedly pimps out underage girls and boys to international dignitaries. Both NYPD and FBI sources confirm based on the new emails they now believe Hillary Clinton traveled as Epstein’s guest on at least six occasions, probably more when all the evidence is combed, sources said. Bill Clinton, it has been confirmed in media reports spanning recent years, that he too traveled with Epstein over 20 times to the island.
  • According to other uncovered emails, Abedin and Clinton both sent and received thousands of classified and top secret documents to personal email accounts including Weiner’s unsecured campaign web site which is managed by Democratic political consultants in Washington D.C. Weiner maintained little known email accounts that the couple shared on the website anthonyweiner.com. Weiner, a former seven-term Democratic Congressman from New York, primarily used that domain to campaign for Congress and for his failed mayoral bid of New York City. At one point, FBI sources said, Abedin and Clinton’s classified and top secret State Department documents and emails were stored in Weiner’s email on a server shared with a dog grooming service and a western Canadian bicycle shop. However, Weiner and Abedin, who is Hillary Clinton’s closest personal aide, weren’t the only people with access to the Weiner’s email account. Potentially dozens of unknown individuals had access to Abedin’s sensitive State Department emails that were stored in Weiner’s email account, FBI sources confirmed. FEC records show Weiner paid more than $92,000 of congressional campaign funds to Anne Lewis Strategies LLC to manage his email and web site. According to FBI sources, the D.C.-based political consulting firm has served as the official administrator of the anthonyweiner.com domain since 2010, the same time Abedin was working at the State Department. This means technically Weiner and Abedin’s emails, including top secret State Department emails, could have been accessed, printed, discussed, leaked, or distributed by untold numbers of personnel at the Anne Lewis consulting firm because they can control where the website and it emails are pointed, FBI sources said.
  • According to FBI sources, the bureau’s newly-minted probe into Clinton’s use and handling of emails while she served as secretary of state, has also been broadened to include investigating new email-related revelations, including: Abedin forwarded classified and top secret State Department emails to Weiner’s email Abedin stored emails, containing government secrets, in a special folder shared with Weiner warehousing over 500,000 archived State Department emails. Weiner had access to these classified and top secret documents without proper security clearance to view the records Abedin also used a personal yahoo address and her Clintonemail.com address to send/receive/store classified and top secret documents A private consultant managed Weiner’s site for the last six years, including three years when Clinton was secretary of state, and therefore, had full access to all emails as the domain’s listed registrant and administrator via Whois email contacts. Because Weiner’s campaign website is managed by the third-party consultant and political email guru, FBI agents are burdened with the task of trying to decipher just how many people had access to Weiner’s server and emails and who were these people. Or if the server was ever compromised by hackers, or other actors.
  • Abedin told FBI agents in an April interview that she didn’t know how to consistently print documents or emails from her secure Dept. of State system. Instead, she would forward the sensitive emails to her yahoo, Clintonemail.com and her email linked to Weiner. Abedin said, according to FBI documents, she would then access those email accounts via webmail from an unclassified computer system at the State Dept. and print the documents, many of which were classified and top secret, from the largely unprotected webmail portals. Clinton did not have a computer in her office on Mahogany Row at the State Dept. so she was not able to read timely intelligence unless it was printed out for her, Abedin said. Abedin also said Clinton could not operate the secure State Dept. fax machine installed in her Chappaqua, NY home without assistance. Perhaps more alarming, according to the FBI’s 302 Report detailing its interview with Abedin, none of the multiple FBI agents and Justice Department officials who conducted the interview pressed Abedin to further detail the email address linked to Weiner. There was never a follow up, according to the 302 report. But now, all that has changed, with the FBI’s decision to reopen the Clinton email investigation and the husband and wife seeking immunity deals to testify against Clinton and other associates about the contents of the laptop’s emails.
  •  
    "New York Police Department detectives and prosecutors working an alleged underage sexting case against former Congressman Anthony Weiner have turned over a newly-found laptop he shared with wife Huma Abedin to the FBI with enough evidence "to put Hillary (Clinton) and her crew away for life," NYPD sources told True Pundit. NYPD sources said Clinton's "crew" also included several unnamed yet implicated members of Congress in addition to her aides and insiders. The NYPD seized the computer from Weiner during a search warrant and detectives discovered a trove of over 500,000 emails to and from Hillary Clinton, Abedin and other insiders during her tenure as secretary of state. The content of those emails sparked the FBI to reopen its defunct email investigation into Clinton on Friday. But new revelations on the contents of that laptop, according to law enforcement sources, implicate the Democratic presidential candidate, her subordinates, and even select elected officials in far more alleged serious crimes than mishandling classified and top secret emails, sources said. NYPD sources said these new emails include evidence linking Clinton herself and associates to: Money laundering Child exploitation Sex crimes with minors (children) Perjury Pay to play through Clinton Foundation Obstruction of justice Other felony crimes NYPD detectives and a NYPD Chief, the department's highest rank under Commissioner, said openly that if the FBI and Justice Department fail to garner timely indictments against Clinton and co- conspirators, NYPD will go public with the damaging emails now in the hands of FBI Director James Comey and many FBI field offices. "What's in the emails is staggering and as a father, it turned my stomach," the NYPD Chief said. "There is not going to be any Houdini-like escape from what we found. We have copies of everything. We will ship them to Wikileaks or I will personally hold my own press conference if it comes to that." The NYPD
Paul Merrell

Snowden obtained nearly 2 million classified files in NSA leak - Pentagon report - RT USA - 0 views

  • Edward Snowden downloaded 1.7 million intelligence files from US agencies, the most secrets ever to be stolen from the US government in a single instance in the nation’s history, according to lawmakers who have viewed a classified Pentagon report.
  • “This is straight from the government’s playbook,” Wizner said. “Remember, the government told the Supreme Court that publication of the Pentagon Papers would cause grave danger to national security. That was not true then, and this report is not true now. Overblown claims of national security rarely stand the test of time.” Sources came forward in August, two months after the press began reporting Snowden’s leaks, to admit that authorities were unsure exactly how many documents Snowden obtained. Two anonymous officials told NBC News at the time that the NSA was using poor compartmentalization techniques - meaning that Snowden, an IT systems administrator, was able to freely comb through agency networks containing a wide range of data. NSA Director Keith Alexander said in August that the government knew what Snowden had taken, while the NBC sources in fact said the NSA was “overwhelmed” with trying to find out the details. Alexander said in an October speech that the documents were “being put out in a way that does the maximum damage to NSA and our nation.” He also told the audience that Snowden had far fewer documents to reporters than this week’s Pentagon report described. “I wish there was a way to prevent it,” he told a Baltimore, Maryland crowd. “Snowden has shared somewhere between 50,000 and 200,000 documents with reporters. These will continue to come out.”
  •  
    The seizure of all devices containing data by UK officials from David Miranda, Glenn Greenwald's partner, under dubious authority of an anti-terrorism statute, tends to show that NSA and GCHA in fact do not know how many -- or which -- documents Snowden acquired. I am extremely dubious of this 1.7 million documents claim. IIRC, Greenwald said at some point that he had been given about 50K documents.  
1 - 20 of 401 Next › Last »
Showing 20 items per page