Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged cover-story

Rss Feed Group items tagged

Paul Merrell

Investigating Donald Trump, F.B.I. Sees No Clear Link to Russia - The New York Times - 0 views

  • For much of the summer, the F.B.I. pursued a widening investigation into a Russian role in the American presidential campaign. Agents scrutinized advisers close to Donald J. Trump, looked for financial connections with Russian financial figures, searched for those involved in hacking the computers of Democrats, and even chased a lead — which they ultimately came to doubt — about a possible secret channel of email communication from the Trump Organization to a Russian bank.Law enforcement officials say that none of the investigations so far have found any conclusive or direct link between Mr. Trump and the Russian government. And even the hacking into Democratic emails, F.B.I. and intelligence officials now believe, was aimed at disrupting the presidential election rather than electing Mr. Trump.Hillary Clinton’s supporters, angry over what they regard as a lack of scrutiny of Mr. Trump by law enforcement officials, pushed for these investigations. In recent days they have also demanded that James B. Comey, the director of the F.B.I., discuss them publicly, as he did last week when he announced that a new batch of emails possibly connected to Mrs. Clinton had been discovered.
  • Supporters of Mrs. Clinton have argued that Mr. Trump’s evident affinity for Russia’s president, Vladimir V. Putin — Mr. Trump has called him a great leader and echoed his policies toward NATO, Ukraine and the war in Syria — and the hacks of leading Democrats like John D. Podesta, the chairman of the Clinton campaign, are clear indications that Russia has taken sides in the presidential race and that voters should know what the F.B.I. has found. Continue reading the main story Related Coverage 3 U.S. States Turn Down Russian Requests to Monitor Elections OCT. 21, 2016 Donald Trump Says He Might Meet With Putin Before Inauguration OCT. 17, 2016 Advertisement Continue reading the main story The F.B.I.’s inquiries into Russia’s possible role continue, as does the investigation into the emails involving Mrs. Clinton’s top aide, Huma Abedin, on a computer she shared with her estranged husband, Anthony D. Weiner. Mrs. Clinton’s supporters argue that voters have as much right to know what the F.B.I. has found in Mr. Trump’s case, even if the findings are not yet conclusive.
  • Senator Harry Reid of Nevada, the minority leader, responded angrily on Sunday with a letter accusing the F.B.I. of not being forthcoming about Mr. Trump’s alleged ties with Moscow.“It has become clear that you possess explosive information about close ties and coordination between Donald Trump, his top advisers, and the Russian government — a foreign interest openly hostile to the United States, which Trump praises at every opportunity,” Mr. Reid wrote. “The public has a right to know this information.”F.B.I. officials declined to comment on Monday. Intelligence officials have said in interviews over the last six weeks that apparent connections between some of Mr. Trump’s aides and Moscow originally compelled them to open a broad investigation into possible links between the Russian government and the Republican presidential candidate. Still, they have said that Mr. Trump himself has not become a target. And no evidence has emerged that would link him or anyone else in his business or political circle directly to Russia’s election operations.
  •  
    The same story is running on CNN. There is another story moving on MSM that the FBI has found no evidence of Russian attempts to sway the election between the two candidates, instead being aimed at spreading chaos. Combined with FBI Director Comey's announcement last week that the Hillary email criminal investigation has been reopened, at least three temtative conclusions are suggested: [i] Comey and the FBI have mounted a three-pronged attack on Hillary's election run, on the email front, deFUDding Hillary's claim that Trump has ties with Vladimir Putin, and defanging the Hillary claim that Russia is attempting to elect Donald Trump; [ii] MSM is covering those stories; and [iii[ by implication, those who have real power over the U.S. government have decided they don't want Hillary do win the election. All good news for Trump and bad news for the Clintons.
Paul Merrell

Spying by N.S.A. Ally Entangled U.S. Law Firm - NYTimes.com - 0 views

  • The list of those caught up in the global surveillance net cast by the National Security Agency and its overseas partners, from social media users to foreign heads of state, now includes another entry: American lawyers. A top-secret document, obtained by the former N.S.A. contractor Edward J. Snowden, shows that an American law firm was monitored while representing a foreign government in trade disputes with the United States. The disclosure offers a rare glimpse of a specific instance in which Americans were ensnared by the eavesdroppers, and is of particular interest because lawyers in the United States with clients overseas have expressed growing concern that their confidential communications could be compromised by such surveillance. Related Coverage Text: Document Describes Eavesdropping on American Law FirmFEB. 15, 2014 The government of Indonesia had retained the law firm for help in trade talks, according to the February 2013 document. It reports that the N.S.A.’s Australian counterpart, the Australian Signals Directorate, notified the agency that it was conducting surveillance of the talks, including communications between Indonesian officials and the American law firm, and offered to share the information.
  • The Australians told officials at an N.S.A. liaison office in Canberra, Australia, that “information covered by attorney-client privilege may be included” in the intelligence gathering, according to the document, a monthly bulletin from the Canberra office. The law firm was not identified, but Mayer Brown, a Chicago-based firm with a global practice, was then advising the Indonesian government on trade issues. On behalf of the Australians, the liaison officials asked the N.S.A. general counsel’s office for guidance about the spying. The bulletin notes only that the counsel’s office “provided clear guidance” and that the Australian agency “has been able to continue to cover the talks, providing highly useful intelligence for interested US customers.” The N.S.A. declined to answer questions about the reported surveillance, including whether information involving the American law firm was shared with United States trade officials or negotiators.
  • Most attorney-client conversations do not get special protections under American law from N.S.A. eavesdropping. Amid growing concerns about surveillance and hacking, the American Bar Association in 2012 revised its ethics rules to explicitly require lawyers to “make reasonable efforts” to protect confidential information from unauthorized disclosure to outsiders.Last year, the Supreme Court, in a 5-to-4 decision, rebuffed a legal challenge to a 2008 law allowing warrantless wiretapping that was brought in part by lawyers with foreign clients they believed were likely targets of N.S.A. monitoring. The lawyers contended that the law raised risks that required them to take costly measures, like traveling overseas to meet clients, to protect sensitive communications. But the Supreme Court dismissed their fears as “speculative.”The N.S.A. is prohibited from targeting Americans, including businesses, law firms and other organizations based in the United States, for surveillance without warrants, and intelligence officials have repeatedly said the N.S.A. does not use the spy services of its partners in the so-called Five Eyes alliance — Australia, Britain, Canada and New Zealand — to skirt the law.
  • ...4 more annotations...
  • The N.S.A.’s protections for attorney-client conversations are narrowly crafted, said Stephen Gillers, an expert on legal ethics at New York University’s School of Law. The agency is barred from sharing with prosecutors intercepted attorney-client communications involving someone under indictment in the United States, according to previously disclosed N.S.A. rules. But the agency may still use or share the information for intelligence purposes. Andrew M. Perlman, a Suffolk University law professor who specializes in legal ethics and technology issues, said the growth of surveillance was troubling for lawyers. He helped create the bar association’s ethics code revisions that require lawyers to try to avoid being overheard by eavesdroppers. “You run out of options very quickly to communicate with someone overseas,” he said. “Given the difficulty of finding anything that is 100 percent secure, lawyers are in a difficult spot to ensure that all of the information remains in confidence.” 
  • Still, the N.S.A. can intercept the communications of Americans if they are in contact with a foreign intelligence target abroad, such as Indonesian officials. The N.S.A. is then required to follow so-called minimization rules to protect their privacy, such as deleting the identity of Americans or information that is not deemed necessary to understand or assess the foreign intelligence, before sharing it with other agencies. An N.S.A. spokeswoman said the agency’s Office of the General Counsel was consulted when issues of potential attorney-client privilege arose and could recommend steps to protect such information. “Such steps could include requesting that collection or reporting by a foreign partner be limited, that intelligence reports be written so as to limit the inclusion of privileged material and to exclude U.S. identities, and that dissemination of such reports be limited and subject to appropriate warnings or restrictions on their use,” said Vanee M. Vines, the spokeswoman.
  • In justifying the agency’s sweeping powers, the Obama administration often emphasizes the N.S.A.’s role in fighting terrorism and cyberattacks, but disclosures in recent months from the documents leaked by Mr. Snowden show the agency routinely spies on trade negotiations, communications of economic officials in other countries and even foreign corporations.
  • Other documents obtained from Mr. Snowden reveal that the N.S.A. shares reports from its surveillance widely among civilian agencies. A 2004 N.S.A. document, for example, describes how the agency’s intelligence gathering was critical to the Agriculture Department in international trade negotiations. “The U.S.D.A. is involved in trade operations to protect and secure a large segment of the U.S. economy,” that document states. Top agency officials “often rely on SIGINT” — short for the signals intelligence that the N.S.A. eavesdropping collects — “to support their negotiations.”
  •  
    Outrageous.
Paul Merrell

Internet Giants Erect Barriers to Spy Agencies - NYTimes.com - 0 views

  • As fast as it can, Google is sealing up cracks in its systems that Edward J. Snowden revealed the N.S.A. had brilliantly exploited. It is encrypting more data as it moves among its servers and helping customers encode their own emails. Facebook, Microsoft and Yahoo are taking similar steps.
  • After years of cooperating with the government, the immediate goal now is to thwart Washington — as well as Beijing and Moscow. The strategy is also intended to preserve business overseas in places like Brazil and Germany that have threatened to entrust data only to local providers. Google, for example, is laying its own fiber optic cable under the world’s oceans, a project that began as an effort to cut costs and extend its influence, but now has an added purpose: to assure that the company will have more control over the movement of its customer data.
  • A year after Mr. Snowden’s revelations, the era of quiet cooperation is over. Telecommunications companies say they are denying requests to volunteer data not covered by existing law. A.T.&T., Verizon and others say that compared with a year ago, they are far more reluctant to cooperate with the United States government in “gray areas” where there is no explicit requirement for a legal warrant.
  • ...8 more annotations...
  • Eric Grosse, Google’s security chief, suggested in an interview that the N.S.A.'s own behavior invited the new arms race.“I am willing to help on the purely defensive side of things,” he said, referring to Washington’s efforts to enlist Silicon Valley in cybersecurity efforts. “But signals intercept is totally off the table,” he said, referring to national intelligence gathering.“No hard feelings, but my job is to make their job hard,” he added.
  • Hardware firms like Cisco, which makes routers and switches, have found their products a frequent subject of Mr. Snowden’s disclosures, and their business has declined steadily in places like Asia, Brazil and Europe over the last year. The company is still struggling to convince foreign customers that their networks are safe from hackers — and free of “back doors” installed by the N.S.A. The frustration, companies here say, is that it is nearly impossible to prove that their systems are N.S.A.-proof.
  • In Washington, officials acknowledge that covert programs are now far harder to execute because American technology companies, fearful of losing international business, are hardening their networks and saying no to requests for the kind of help they once quietly provided.Continue reading the main story Robert S. Litt, the general counsel of the Office of the Director of National Intelligence, which oversees all 17 American spy agencies, said on Wednesday that it was “an unquestionable loss for our nation that companies are losing the willingness to cooperate legally and voluntarily” with American spy agencies.
  • Mr. Smith also said the company was setting up “transparency centers” abroad so that technical experts of foreign governments could come in and inspect Microsoft’s proprietary source code. That will allow foreign governments to check to make sure there are no “back doors” that would permit snooping by United States intelligence agencies. The first such center is being set up in Brussels.Microsoft has also pushed back harder in court. In a Seattle case, the government issued a “national security letter” to compel Microsoft to turn over data about a customer, along with a gag order to prevent Microsoft from telling the customer it had been compelled to provide its communications to government officials. Microsoft challenged the gag order as violating the First Amendment. The government backed down.
  • Many point to an episode in 2012, when Russian security researchers uncovered a state espionage tool, Flame, on Iranian computers. Flame, like the Stuxnet worm, is believed to have been produced at least in part by American intelligence agencies. It was created by exploiting a previously unknown flaw in Microsoft’s operating systems. Companies argue that others could have later taken advantage of this defect.Worried that such an episode undercuts confidence in its wares, Microsoft is now fully encrypting all its products, including Hotmail and Outlook.com, by the end of this year with 2,048-bit encryption, a stronger protection that would take a government far longer to crack. The software is protected by encryption both when it is in data centers and when data is being sent over the Internet, said Bradford L. Smith, the company’s general counsel.
  • In one slide from the disclosures, N.S.A. analysts pointed to a sweet spot inside Google’s data centers, where they could catch traffic in unencrypted form. Next to a quickly drawn smiley face, an N.S.A. analyst, referring to an acronym for a common layer of protection, had noted, “SSL added and removed here!”
  • Facebook and Yahoo have also been encrypting traffic among their internal servers. And Facebook, Google and Microsoft have been moving to more strongly encrypt consumer traffic with so-called Perfect Forward Secrecy, specifically devised to make it more labor intensive for the N.S.A. or anyone to read stored encrypted communications.One of the biggest indirect consequences from the Snowden revelations, technology executives say, has been the surge in demands from foreign governments that saw what kind of access to user information the N.S.A. received — voluntarily or surreptitiously. Now they want the same.
  • The latest move in the war between intelligence agencies and technology companies arrived this week, in the form of a new Google encryption tool. The company released a user-friendly, email encryption method to replace the clunky and often mistake-prone encryption schemes the N.S.A. has readily exploited.But the best part of the tool was buried in Google’s code, which included a jab at the N.S.A.'s smiley-face slide. The code included the phrase: “ssl-added-and-removed-here-; - )”
Joseph Skues

Non-Hybrid Seeds | Non-Hybrid Vegetable Fruit Grain Herb Seeds - 0 views

  • The Seed Vault is for emergency backup and 1 or 2-person use. The Family Pack is for larger family yards and seed storage. The Homestead and Farm Packs are for large properties, groups and investment-grade seed purchase. The Specialty Packs cover a wide variety of specialty needs. For an overview of Heirloom Organics Non-Hybrid Seed packs, see our seed pack comparison chart. If you are shopping seed suppliers, or are new to the subject on Non-Hybrid Seeds, read our guide: 7 Things You Should Know When Buying Non-Hybrid Seeds.
  • Drying and Storing Herbs for Cooking Knowing what to do with an overabundance of unused herbs is a dilemma many of us encounter. Dealing with an extra supply of herbs on our hands does not only occur as we begin to hang up our gardening hat towards the end of the season. Read More >> Researchers Germinate 4,000-Year-Old Seed Announcing yesterday that a 4,000-year-old seed that was found during an archaeological dig in the Aegean city of Kütahya has germinated, Professor Nejat Bilgen from Dumlupinar University said that being able to analyze the characteristics of plants from centuries ago would be a scientific breakthrough. Read More >>
  • Monsanto Will Soon Be Allowed To Police Itself4A Government of Monsanto, by Monsanto, and for Monsanto2YouTube - DON'T BE FOOLED..... ELENIN IS NIBIRU3Planetary Alignments with Comet Elenin Causing Big Earthquakes2ARE THESE GIANT UFO'S TRAILING COMET ELENIN?3Hyperinflation!See more stories dugg by NonHybrid on Digg.com
Paul Merrell

Ex-Chief of C.I.A. Shapes Response to Detention Report - NYTimes.com - 0 views

  • Just after the Senate Intelligence Committee voted in April to declassify hundreds of pages of a withering report on the Central Intelligence Agency’s detention and interrogation program, C.I.A. Director John O. Brennan convened a meeting of the men who had played a role overseeing the program in its seven-year history.The spies, past and present, faced each other around the long wooden conference table on the seventh floor of the C.I.A.’s headquarters in Northern Virginia: J. Cofer Black, head of the agency’s counterterrorism center at the time of the Sept. 11 attacks; the undercover officer who now holds that job; and a number of other former officials from the C.I.A.’s clandestine service. Over the speakerphone came the distinctive, Queens-accented voice of George J. Tenet.
  • Over the past several months, Mr. Tenet has quietly engineered a counterattack against the Senate committee’s voluminous report, which could become public next month. The effort to discredit the report has set up a three-way showdown among former C.I.A. officials who believe history has been distorted, a White House carefully managing the process and politics of declassifying the document, and Senate Democrats convinced that the Obama administration is trying to protect the C.I.A. at all costs.The report is expected to accuse a number of former C.I.A. officials of misleading Congress and the White House about the program and its effectiveness, but it is Mr. Tenet who might have the most at stake.
  • Mr. Tenet, who declined to be interviewed for this article, has arranged a number of conference calls with former C.I.A. officials to discuss the impending report. After private conversations with Mr. Brennan, he and two other former C.I.A. directors — Porter J. Goss and Michael V. Hayden — drafted a letter to Mr. Brennan asking that, as a matter of fairness, they be allowed to see the report before it was made public. Describing the letter, one former C.I.A. officer who spoke on condition of anonymity said that the former directors “think that those people who were heavily involved in the operations have a right to see what’s being said about them.”Mr. Brennan then passed the letter to Senator Dianne Feinstein, the California Democrat who is chairwoman of the Senate Intelligence Committee.
  • ...4 more annotations...
  • Ms. Feinstein agreed to let a group of former senior C.I.A. officials read a draft of the report, although she initially insisted they be allowed to review it only at the committee’s office. Officials said President Obama’s chief of staff, Denis McDonough, intervened and brokered an arrangement in which the officials could read an unredacted version of the report inside a secure room at the office of the Director of National Intelligence. Ms. Feinstein declined to comment.
  • “While former C.I.A. officials may be working to hide their own past wrongs, there’s no reason Brennan or any other current C.I.A. official should help facilitate the defense of the indefensible,” said Christopher Anders, senior legislative counsel at the American Civil Liberties Union.Spokesmen for the C.I.A. and the White House declined to comment.
  • The April meeting at C.I.A. headquarters highlighted how much of the agency is still seeded with officers who participated in the detention and interrogation program, which Mr. Obama officially ended during his first week in office in 2009.At one point during the meeting, the current head of the counterterrorism center, an officer with the first name Mike, told Mr. Brennan that roughly 200 people under his leadership had at some point participated in the interrogation program. They wanted to know, he said, how Mr. Brennan planned to defend them in public against accusations that the C.I.A. engaged in systematic torture and lied about its efficacy.
  • Mr. Tenet resigned a decade ago amid the wash of recriminations over the C.I.A.’s botched Iraq assessments, and he has given few interviews since his book tour.
  •  
    Major Obama scandal brewing here. The current head of the CIA, John Brennan, has been caught conspiring with former CIA heads and others to counter the Senate Intelligence Committee's pending report on CIA torture and extraordinary rendition, even as Brennan works to delay the report summary's publication by censoring it, resulting in delay while the Committee argues with the CIA over the deletions. All of which sharply contrasts with Obama's publicly expressed desire to have the report published promptly.    The article also makes a very strong case that those CIA officials who participated in the torture and rendition program have been enabled, on Obama's watch, to act as the censors of the Senate Report.  A must-read
Paul Merrell

Europe Is Spying on You - The New York Times - 0 views

  • When Edward Snowden disclosed details of America’s huge surveillance program two years ago, many in Europe thought that the response would be increased transparency and stronger oversight of security services. European countries, however, are moving in the opposite direction. Instead of more public scrutiny, we are getting more snooping. Pushed to respond to the atrocious attacks in Paris and Copenhagen and by the threats posed by the Islamic State to Europe’s internal security, several countries are amending their counterterrorism legislation to grant more intrusive powers to security services, especially in terms of mass electronic surveillance.
  • Governments now argue that to guarantee our security we have to sacrifice some rights. This is a specious argument. By shifting from targeted to mass surveillance, governments risk undermining democracy while pretending to protect it.They are also betraying a long political and judicial tradition affording broad protection to privacy in Europe, where democratic legal systems have evolved to protect individuals from arbitrary interference by the state in their private and family life. The European Court of Human Rights has long upheld the principle that surveillance interferes with the right to privacy. Although the court accepts that the use of confidential information is essential in combating terrorist threats, it has held that the collection, use and storage of such information should be authorized only under exceptional and precise conditions, and must be accompanied by adequate legal safeguards and independent supervision. The court has consistently applied this principle for decades when it was called to judge the conduct of several European countries, which were combating domestic terrorist groups.
  • More recently, as new technologies have offered more avenues to increase surveillance and data collection, the court has reiterated its position in a number of leading cases against several countries, including France, Romania, Russia and Britain, condemned for having infringed the right to private and family life that in the interpretation of the court covers also “the physical and psychological integrity of a person.”
  • ...1 more annotation...
  • Last year, the European Court of Justice set limits on telecommunication data retention. By invalidating a European Union directive for its unnecessary “wide-ranging and particularly serious interference with the fundamental right to respect for private life” and personal data, this court reaffirmed the outstanding place privacy holds in Europe. This judgment echoed a 2006 German Constitutional Court ruling that the German police had breached the individual right to self-determination and human dignity after they conducted a computerized search of suspected terrorists. Regrettably, these judgments are often ignored by key decision-makers. Many of the surveillance policies that have recently been adopted in Europe fail to abide by these legal standards. Worse, many of the new intrusive measures would be applied without any prior judicial review establishing their legality, proportionality or necessity. This gives excessive power to governments and creates a clear risk of arbitrary application and abuse.
Paul Merrell

Report Reveals Wider Tracking of Mail in U.S. - NYTimes.com - 0 views

  • In a rare public accounting of its mass surveillance program, the United States Postal Service reported that it approved nearly 50,000 requests last year from law enforcement agencies and its own internal inspection unit to secretly monitor the mail of Americans for use in criminal and national security investigations.The number of requests, contained in a 2014 audit of the surveillance program by the Postal Service’s inspector general, shows that the surveillance program is more extensive than previously disclosed and that oversight protecting Americans from potential abuses is lax.The audit, along with interviews and documents obtained by The New York Times under the Freedom of Information Act, offers one of the first detailed looks at the scope of the program, which has played an important role in the nation’s vast surveillance effort since the terrorist attacks of Sept. 11, 2001.
  • The Postal Service also uses a program called Mail Imaging, in which its computers photograph the exterior of every piece of paper mail sent in the United States. The program’s primary purpose is to process the mail, but in some cases it is also used as a surveillance system that allows law enforcement agencies to request stored images of mail sent to and received by people they are investigating.
  • The mail cover surveillance requests cut across all levels of government — from global intelligence investigations by the United States Army Criminal Investigations Command, which requested 500 mail covers from 2001 through 2012, to state-level criminal inquiries by the Georgia Bureau of Investigation, which requested 69 mail covers in the same period. The Department of Veterans Affairs requested 305, and the State Department’s Bureau of Diplomatic Security asked for 256. The information was provided to The Times under the Freedom of Information request.Continue reading the main story Continue reading the main story Postal officials did not say how many requests came from agencies in charge of national security — including the F.B.I., the Department of Homeland Security and Customs and Border Protection — because release of the information, wrote Kimberly Williams, a public records analyst for the Postal Inspection Service, “would reveal techniques and procedures for law enforcement or prosecutions.”
  •  
    The full article is well worth the read.
Gary Edwards

Jim Kunstler's 2014 Forecast - Burning Down The House | Zero Hedge - 0 views

  •  
    Incredible must read analysis. Take away: the world is going to go "medevil". It's the only way out of this mess. Since the zero hedge layout is so bad, i'm going to post as much of the article as Diigo will allow: Jim Kunstler's 2014 Forecast - Burning Down The House Submitted by Tyler Durden on 01/06/2014 19:36 -0500 Submitted by James H. Kunstler of Kunstler.com , Many of us in the Long Emergency crowd and like-minded brother-and-sisterhoods remain perplexed by the amazing stasis in our national life, despite the gathering tsunami of forces arrayed to rock our economy, our culture, and our politics. Nothing has yielded to these forces already in motion, so far. Nothing changes, nothing gives, yet. It's like being buried alive in Jell-O. It's embarrassing to appear so out-of-tune with the consensus, but we persevere like good soldiers in a just war. Paper and digital markets levitate, central banks pull out all the stops of their magical reality-tweaking machine to manipulate everything, accounting fraud pervades public and private enterprise, everything is mis-priced, all official statistics are lies of one kind or another, the regulating authorities sit on their hands, lost in raptures of online pornography (or dreams of future employment at Goldman Sachs), the news media sprinkles wishful-thinking propaganda about a mythical "recovery" and the "shale gas miracle" on a credulous public desperate to believe, the routine swindles of medicine get more cruel and blatant each month, a tiny cohort of financial vampire squids suck in all the nominal wealth of society, and everybody else is left whirling down the drain of posterity in a vortex of diminishing returns and scuttled expectations. Life in the USA is like living in a broken-down, cob-jobbed, vermin-infested house that needs to be gutted, disinfected, and rebuilt - with the hope that it might come out of the restoration process retaining the better qualities of our heritage.
Paul Merrell

How an arrest in Iraq revealed Isis's $2bn jihadist network | World news | The Guardian - 0 views

  • Seizure of 160 computer flash sticks revealed the inside story of Isis, the band of militants that came from nowhere with nothing to having Syrian oil fields and control of Iraq's second city
  •  
    This article has a strong stench of cover story to hide the financing of the Islamic State of Iraq and the Levant (al Sham), known by the acronyms "ISIL" or "ISIS." The essence of the cover story is here: "'They had taken $36m from al-Nabuk alone [an area in the Qalamoun mountains west of Damascus]. The antiquities there are up to 8,000 years old,' the intelligence official said. 'Before this, the western officials had been asking us where they had gotten some of their money from, $50,000 here, or $20,000 there. It was peanuts. Now they know and we know. They had done this all themselves. *There was no state actor at all behind them, which we had long known.* They don't need one.'" To the contrary, it has been long known that financial backing for ISIL has been coming from the governments of Saudi Arabia, United Arab Emirates, and Qatar. Command and control was by the House of Saud's former chief of intelligence,  Bandar Bush. Supply was via Turkey, with the active involvement of the U.S. State Dept. and CIA. A ratline had been run from Benghazi to Turkey to supply them with weapons formerly controlled by the Libyan government before Gadhafi was deposed.   But political pressure has been growing for the Obama Administration to get tough with the Gulf states and force them to stop funding and supplying both ISIL and al-Nusrah to bring the Syrian War to an end. Suddenly, we have an elaborate cover story absolving the Gulf States of guilt in funding ISIL. Over 160 captured thumb drives decrypted by the CIA, with a set of books detailing its funds, their sources, and a complete list of its commanders. All told, with the money supposedly seized from banks in Mosul, we have an ISIL with $2.375 billion in cash, enough to launch a fledgling ISIL national government in the portions of Syria and Iraq that it has captured.        So now those calling on Obama to crack down on the Gulf states to end their funding of ISIL are supposed to accept this story and walk awa
Gary Edwards

BENGHAZI - THE BIGGEST COVER-UP SCANDAL IN U.S. HISTORY? - WAS BENGHAZI A CIA GUN-RUNNI... - 0 views

  •  
    "LibertyNEWS.com - Editorial Team Special Report It's never fun to admit you've been lied to and duped. There is no comfort in realizing a high-level group in government has conned you. The wound created from such a realization would be deep and painful when paired with extraordinary insult when you realize the cons are people you not only trusted, but people who are tasked with protecting your rights, your liberty, your life. When these people betray you, you're in trouble - big trouble. Unfortunately, we believe America is being betrayed by powerful individuals tasked with our protection. These people are found in the White House, the Congress, the CIA and other government entities - and they're lying to you. Then they're covering it up on an epic scale, in a never-before-seen manner. Here are the basics of what the schemers in government and the complicit media would like for us all to focus on and buy into: Why wasn't there better security at the consulate (keep this misleading word in mind) in Benghazi? Why didn't authorization come to move special forces in for protection and rescue? Why was an obscure video blamed when everyone knew the video had nothing to do with it? Did Obama's administration cover-up the true nature of the attacks to win an election? Truth is, as we're starting to believe, the above questions are convenient, tactical distractions. And truth is, answers to these questions, if they ever come, will never lead to revelations of the REAL TRUTH and meaningful punishment of anyone found responsible. Rep. Darrell Issa knows this, members of the House Committee investigating the Benghazi attacks know this, the White House knows this, and much of the big corporate media infrastructure knows it, too. How do they know it? Because they know the truth. They know the truth, but cannot and/or will not discuss it in public. Here are the basics that we (America, in general) should be focusing on, but aren't: Why do media
Paul Merrell

Ex-Blackwater Guards Given Long Terms for Killing Iraqis - NYTimes.com - 0 views

  • One by one, four former Blackwater security contractors wearing blue jumpsuits and leg irons stood before a federal judge on Monday and spoke publicly for the first time since a deadly 2007 shooting in Iraq.The men had been among several private American security guards who fired into Baghdad’s crowded Nisour Square on Sept. 16, 2007, and last October they were convicted of killing 14 unarmed Iraqis in what prosecutors called a wartime atrocity. Yet on Monday, as they awaited sentences that they knew would send them to prison for most if not all of their lives, they defiantly asserted their innocence.
  • The judge, Royce C. Lamberth, strongly disagreed, sentencing Mr. Slatten to life in prison and handing 30-year sentences to the three others. A fifth former guard, Jeremy P. Ridgeway of California, had pleaded guilty to voluntary manslaughter and testified against his former colleagues. He has not been sentenced but testified that he hoped to avoid any prison time.The ruling ended a long investigation into the Nisour Square shooting, a signature, gruesome moment in the Iraq war that highlighted America’s reliance on private contractors to maintain security in combat zones.
  • No such company was more powerful than Blackwater, which won more than $1 billion in government contracts. Its employees, most of them military veterans, protected American diplomats overseas and became enmeshed in the Central Intelligence Agency’s clandestine counterterrorism operations. Its founder, Erik Prince, was a major donor to the Republican Party.
  • ...2 more annotations...
  • The Nisour Square shooting transformed Blackwater from America’s most prominent security contractor into a symbol of unchecked and privatized military power. The incident also became a notorious low point in the war, along with the massacre by Marines of 24 civilians at Haditha and the abuses at Abu Ghraib prison.
  • While the prosecution ends with the sentences, the legal case is sure to continue for years. The case raised many new legal issues, including whether State Department contractors are covered by American criminal law when operating overseas.The 30-year sentences, while significant, could have been much longer. For using machine guns to commit violent crimes, they faced mandatory minimum 30-year sentences under a law passed during the crack cocaine epidemic. Prosecutors had wanted the judge to hand down sentences of 50 years or more.
Paul Merrell

Hackers Use Old Lure on Web to Help Syrian Government - NYTimes.com - 0 views

  • To the young Syrian rebel fighter, the Skype message in early December 2013 appeared to come from a woman in Lebanon, named Iman Almasri, interested in his cause. Her picture, in a small icon alongside her name, showed a fair-skinned 20-something in a black head covering, wearing sunglasses.They chatted online for nearly two hours, seemingly united in their opposition to the rule of Bashar al-Assad, the Syrian leader still in power after a civil war that has taken more than 200,000 lives. Eventually saying she worked “in a programing company in Beirut,” the woman asked the fighter whether he was talking from his computer or his smartphone. He sent her a photo of himself and asked for another of her in return. She sent one immediately, apologizing that it was a few years old.“Angel like,” he responded. “You drive me crazy.”
  • What the fighter did not know was that buried in the code of the second photo was a particularly potent piece of malware that copied files from his computer, including tactical battle plans and troves of information about him, his friends and fellow fighters. The woman was not a friendly chat partner, but a pro-Assad hacker — the photos all appear to have been plucked from the web.
  • The Syrian conflict has been marked by a very active, if only sporadically visible, cyberbattle that has engulfed all sides, one that is less dramatic than the barrel bombs, snipers and chemical weapons — but perhaps just as effective. The United States had deeply penetrated the web and phone systems in Syria a year before the Arab Spring uprisings spread throughout the country. And once it began, Mr. Assad’s digital warriors have been out in force, looking for any advantage that could keep him in power.In this case, the fighter had fallen for the oldest scam on the Internet, one that helped Mr. Assad’s allies. The chat is drawn from a new study by the intelligence-gathering division of FireEye, a computer security firm, which has delved into the hidden corners of the Syrian conflict — one in which even a low-tech fighting force has figured out a way to use cyberespionage to its advantage. FireEye researchers found a collection of chats and documents while researching malware hidden in PDF documents, which are commonly used to share letters, books or other images. That quickly took them to the servers where the stolen data was stored.
Gary Edwards

2012 ELECTION - NEIL HOWE STYLE « The Burning Platform - 0 views

  •  
    Excellent analysis of the 2012 elections based on recent polling data and the voting history of five generations. excerpt: Pundits have long been predicting that the presidential election will be much closer and much meaner in 2012 than it was in 2008. Closer it now is. According to the RCP Poll Average, the race is now a virtual tie: Incumbent Obama now leads by a mere 1.8 percent over Romney, whereas challenger Obama led McCain by 7.6 percent exactly four years ago. It will certainly revolve around a very different array of issues-much less argument about the war on terror and GOP performance, and a lot more about the stagnating economy and Democratic performance. In one respect, however, the next election will be a replay of the last: There will be a historically large divide in the preferences of younger voters (under 30) versus older voters (65+). In 2008, this divide (21 percentage points) was wider than in any election since the advent of age-bracketed voting data in the 1960s. The second-biggest divide (16 percentage points) was back in 1972, when nearly half of all young voters voted for McGovern while older voters went overwhelmingly for Nixon. I've been tracking generational leanings in the polls pretty carefully. The Pew Research Center has issued several reports (most notably, The Generation Gap and the 2012 Election) exploring this divide, and Time followed up with its own cover story ("The New Generation Gap"). More recently, Mike and Morley, Forbes, The New York Times, and many others have also weighed in. Bottom line: Every generation is today a bit more favorable toward Obama than they were in 2010 and a good deal less favorable than in 2008. The partisan gap between the Democrat-leaning young and the Republican-leaning old, however, remains as strong as ever-at around 20 percent. Back in 2008, the big story was how and why today's rising Millennial Generation voted by a large and decisive margin for the D
Gary Edwards

'Clinton death list': 33 spine-tingling cases - 0 views

  •  
    "(Editor's note: This list was originally published in August 2016 and has gone viral on the web. WND is running it again as American voters cast their ballots for the nation's next president on Election Day.) How many people do you personally know who have died mysteriously? How about in plane crashes or car wrecks? Bizarre suicides? People beaten to death or murdered in a hail of bullets? And what about violent freak accidents - like separate mountain biking and skiing collisions in Aspen, Colorado? Or barbells crushing a person's throat? Bill and Hillary Clinton attend a funeral Apparently, if you're Bill or Hillary Clinton, the answer to that question is at least 33 - and possibly many more. Talk-radio star Rush Limbaugh addressed the issue of the "Clinton body count" during an August show. "I swear, I could swear I saw these stories back in 1992, back in 1993, 1994," Limbaugh said. He cited a report from Rachel Alexander at Townhall.com titled, "Clinton body count or left-wing conspiracy? Three with ties to DNC mysteriously die." Limbaugh said he recalled Ted Koppel, then-anchor of ABC News' "Nightline," routinely having discussions on the issue following the July 20, 1993, death of White House Deputy Counsel Vince Foster. In fact, Limbaugh said, he appeared on Koppel's show. "One of the things I said was, 'Who knows what happened here? But let me ask you a question.' I said, 'Ted, how many people do you know in your life who've been murdered? Ted, how many people do you know in your life that have died under suspicious circumstances?' "Of course, the answer is zilch, zero, nada, none, very few," Limbaugh chuckled. "Ask the Clintons that question. And it's a significant number. It's a lot of people that they know who have died, who've been murdered. "And the same question here from Rachel Alexander. It's amazing the cycle that exists with the Clintons. [Citing Townhall]: 'What it
Paul Merrell

Activists Take Credit for Notorious FBI Raid That Spilled Secrets-Forty-two Years Ago |... - 0 views

  • It’s a mystery I covered from the start and now it has been solved. A big breaking story this morning features startling revelations about the infamous raid by antiwar activists on the FBI office in Media, Pennsylvania, (yes, that’s the name) in 1971, on the night of the Ali-Frazier “fight of the century,” who are finally exposing themselves in a new book and film. The book is by the Washington Post reporter who received some of the leak files back then, Betty Medsger. The activists, none of them household names then or now, cleared out all the files there that day and this led to the first big scoops on illegal FBI surveillance and the notorious COINTELPRO program, which we covered so widely at Crawdaddy that decade. One of the perps even waved to Edward Snowden on the Today show today and said, “Hi, from one whistleblower to another.” And The New York Times has now posted a thirteen-minute video.
  • Of course, by 1971, there had been rumors and personal reports about undercover FBI snooping, including use of electronic surveillance, for years but with little black-and-white official evidence. Hell, we even had a break-in at the Crawdaddy office that seemed suspicious and, as a longtime (if minor) antiwar activist, I always figured I might have drawn some official attention. But the Media raid proved incredibly valuable, even as it made many of us more paranoid. Indeed, as NBC reports: Among the stolen files: plans to enhance “paranoia” among “New Left” groups by instilling fears that “there is an FBI agent behind every mailbox.” Another instructed agents in the Philadelphia area to monitor the “clientele” of “Afro-American type bookstores” and recruit informants among the “the Negro militant movement.” The raid and its results didn’t immediately stop COINTELPRO, then run by good old Deep Throat himself, Mark Felt.
  • the Media raid had finally produced some of the aims sought by the burglars. From NBC: “These documents were explosive,” said Medsger, who was the first reporter to write about them after receiving a batch of the files anonymously in the mail. Her book traces how the stolen files led to a landmark Senate investigation of intelligence and law enforcement agency abuses by the late Idaho Sen. Frank Church, and eventually to new Justice Department guidelines that barred the bureau from conducting investigations based on First Amendment protected political activity. After the burglary, said Medsger, “The FBI was never the same.” Glenn Greenwald weighs in on today’s revelations. He is, of course, supportive of the 1971 action.
  •  
    The New York Times video is worth watching for its historical footage and the linked post by Glenn Greenwald adds valuable perspective about the failure of NYT and the LA Times to do anything with the documents. Only the Washington Post pushed the story. One might wonder if these days, any mainstream media might have covered the Snowden documents had The Guardian not told The Washington Post that the Guardian was going to run with the story regardless. 
Paul Merrell

Pakistan TV Exposes bin Laden Killing Hoax and Documentary Exposes 9/11 Official Story ... - 0 views

  • Review of “September 11 – The New Pearl Harbor.”  A documentary by Massimo Mazzucco. David Ray Griffin There have been several good films and videos about 9/11. But the new film by award-winning film-maker Massimo Mazzucco is in a class by itself. For those of us who have been working on 9/11 for a long time, this is the film we have been waiting for. Whereas there are excellent films treating the falsity of particular parts of the official account, such as the Twin Towers or WTC 7, Mazzucco has given us a comprehensive documentary treatment of 9/11, dealing with virtually all of the issues. There have, of course, been films that treated the fictional official story as true. And there are films that use fictional stories to portray people’s struggles after starting to suspect the official story to be false. But there is no fiction in Mazzucco’s film – except in the sense that it clearly and relentlessly exposes every part of the official account as fictional.
  • Because of his intent at completeness, Mazzucco has given us a 5-hour film. It is so fascinating and fast-paced that many will want to watch it in one sitting. But this is not necessary, as the film, which fills 3 DVDs, consists of 7 parts, each of which is divided into many short chapters. These 7 parts treat Air Defence, The Hijackers, The Airplanes, The Pentagon, Flight 93, The Twin Towers, and Building 7. In each part, after presenting facts that contradict the official story, Mazzucco deals with the claims of the debunkers (meaning those who try to debunk the evidence provided by the 9/11 research community). The Introduction, reflecting the film’s title, deals with 12 uncanny parallels between Pearl Harbor and September 11. The film can educate people who know nothing about 9/11 (beyond the official story), those with a moderate amount of knowledge about the various problems with the official story, and even by experts. (I myself learned many things.) Mazzucco points out that his film covers 12 years of public debate about 9/11. People who have been promoting 9/11 truth for many of these years will see that their labors have been well-rewarded: There is now a high-quality, carefully-documented film that dramatically shows the official story about 9/11 to be a fabrication through and through. This is truly the film we have been waiting for.
  • Availability: The film is freely available to the world at: 1. The film-maker’s own website, complete with detailed index: http://www.luogocomune.net/site/modules/sections/index.php?op=viewarticle&artid=167 2. On YouTube: http://www.youtube.com/watch?v=O1GCeuSr3Mk
  •  
    High praise from David Ray Griffin. I watched the whole thing. Incredibly well-done debunking of those who attempt to defend the "official" version of what happened on 9-11.
Paul Merrell

McCain and the POW Cover-Up | The American Conservative - 0 views

  • Eighteen months ago, TAC publisher Ron Unz discovered an astonishing account of the role the 2008 Republican presidential nominee, John McCain, had played in suppressing information about what happened to American soldiers missing in action in Vietnam. Below, we present in full Sydney Schanberg’s explosive story. * * * John McCain, who has risen to political prominence on his image as a Vietnam POW war hero, has, inexplicably, worked very hard to hide from the public stunning information about American prisoners in Vietnam who, unlike him, didn’t return home. Throughout his Senate career, McCain has quietly sponsored and pushed into federal law a set of prohibitions that keep the most revealing information about these men buried as classified documents. Thus the war hero who people would logically imagine as a determined crusader for the interests of POWs and their families became instead the strange champion of hiding the evidence and closing the books.
  • Almost as striking is the manner in which the mainstream press has shied from reporting the POW story and McCain’s role in it, even as the Republican Party has made McCain’s military service the focus of his presidential campaign. Reporters who had covered the Vietnam War turned their heads and walked in other directions. McCain doesn’t talk about the missing men, and the press never asks him about them. The sum of the secrets McCain has sought to hide is not small. There exists a telling mass of official documents, radio intercepts, witness depositions, satellite photos of rescue symbols that pilots were trained to use, electronic messages from the ground containing the individual code numbers given to airmen, a rescue mission by a special forces unit that was aborted twice by Washington—and even sworn testimony by two Defense secretaries that “men were left behind.” This imposing body of evidence suggests that a large number—the documents indicate probably hundreds—of the U.S. prisoners held by Vietnam were not returned when the peace treaty was signed in January 1973 and Hanoi released 591 men, among them Navy combat pilot John S. McCain.
  •  
    Perhaps no other moral principle is so deeply burned into the psyche of the American soldier than "leave no one behind." It is a permutation of the Golden Rule that allows of no cost-benefit analysis. Commonly, hundreds of lives have been lost to save only a few. That we left behind hundreds of members of the U.S. military as prisoners of war in Viet Nam is morally reprensible. That John McCain, himself a former POW,  played and still plays a key role in the cover-up conspiracy is well beyond morally reprehensible.   
Paul Merrell

US Operating on Both Sides of Syrian-Iraqi Border - Providing Cover for Terrorists in S... - 0 views

  • US may attempt to arm and provide air cover for terrorists in Syria after claiming success in fighting ISIS in Iraq using Kurds.
  • To further justify expanding across the border and into Syria already ongoing US military operations in Iraq, the Western media has begun claiming that ISIS leadership, “fearing” US airstrikes, are fleeing to safety in neighboring Syria. The Wall Street Journal in its article, “Iraqis Say Some Commanders of Insurgency in Iraq Retreat to Syria,” claimed: According to the Iraqis, the commanders went to eastern Syria, where Islamic State has built an operational base amid the chaos of civil war over the past few years. The insurgents are able to dash across the border into Syria, where that base continues to offer the space to recruit and reorganize largely unchallenged. “They’ve got much better cover in Syria than they do in Iraq,” said Will McCants, an expert on militant Islam at the Brookings Institution and a former State Department adviser. “When they have that kind of strategic depth, they’re just allowed to live another day.”
  • Image: Clearly, ISIS’ path into Iraq began not in Syria, but in NATO member Turkey’s territory. ISIS is nothing more than an extension of the US-backed terrorist forces assembled for the explicit purpose of overthrowing the Syrian government. 
  • ...1 more annotation...
  • Clearly, the answer, left for readers to arrive at on their own, is that these “successful” US airstrikes in Iraq must be carried over into Syria – where mission creep can do the rest, finally dislodging the Syrian government from power after an ongoing proxy war has failed to do so since 2011. After arming and aiding the Kurds in fighting ISIS in Iraq, the US will attempt to make a similar argument regarding the arming of terrorists in Syria and providing them direct US air support to defeat ISIS – and of course – Damascus. It should be remembered that ISIS itself is a creation of the United States, Saudi Arabia, Israel, Qatar, and has been harbored and provided material assistance by NATO-member Turkey for years. Portrayed by various names by the Western media – ISIS, al-Nusra, the “Free Syrian Army” – in reality it is a conglomerate of Western-backed mercenary forces raised as early as 2007 to overthrow the government in Damascus  and confront Iranian influence across the entire region, including in Lebanon and in Iraq.
  •  
    Cartalucci is on a roll. The false flag sarin gas attack in Ghouta, Syria, didn't work because John Kerry stuck his foot in his mouth about Syria getting rid of all his chemical warfare agents and Russian Foreign Minister Lavrov and Syrian President Assad offered to do just that. Trapped by Kerry's loose lips, Obama had to call off the U.S. missile strikes and bombing on Syria to rescue the miniscule "Free Syrian Army," Al Nusrah, and other jihadi mercenaries being paid for by the House of Saud and Qattar, So the Syrian government forces got to keep the mercenaries on the run. Flip to plan B: a new excuse for U.S. war against Syria. ISIL is created, including a cover story that it got its hundreds of millions of dollars by robbing banks. Then, it's arranged for the commanders of four Iraq Army divisions to depart when only 1,000 or so ISIL troops attacked Mosul. Left without commanders and softened up by massive psychological warfare operations broadcasting how ISIL was beheading Iraqi troops that they caught, and the four divisions of troops fled south, leaving even their heavy weapons behind.   Out of nowhere, a new Islamic menace is manufactured, spanning about a third each of Syria and Iraq. But Barack Obama to the rescue with the combined  propaganda power of the War Party and Israel Lobby, the U.S. bombers and drones are sent in on their humanitarian mission to rescue about 40,000 Yahidzi (sp?) trapped by ISIL (now the Islamic Caliphate) on a mountaintop.   Then the U.S. expands its bombing to win back the Mosul Dam because it's such a threat to the U.S. Embassy in Baghdad if the dam breaks. Terrorized by the U.S. bombing, ISIL commanders are now said by the NYT and Wall St. J. to be retreating into Syria. Voila! Now the U.S. can send bombs and missiles to Syria ostensibly to kill ISIL leadership and troops, but in reality to bomb the heck out of the Syrian government forces. The road to Tehran still runs through Damascus, as a neocon would say.
Gary Edwards

XKeyscore: NSA tool collects 'nearly everything a user does on the internet' | World ne... - 1 views

  • The latest revelations will add to the intense public and congressional debate around the extent of NSA surveillance programs. They come as senior intelligence officials testify to the Senate judiciary committee on Wednesday, releasing classified documents in response to the Guardian's earlier stories on bulk collection of phone records and Fisa surveillance court oversight.
  • The files shed light on one of Snowden's most controversial statements, made in his first video interview published by the Guardian on June 10
  • "I, sitting at my desk," said Snowden, could "wiretap anyone, from you or your accountant, to a federal judge or even the president, if I had a personal email".
  • ...23 more annotations...
  • US officials vehemently denied this specific claim. Mike Rogers, the Republican chairman of the House intelligence committee, said of Snowden's assertion: "He's lying. It's impossible for him to do what he was saying he could do."
  • But training materials for XKeyscore detail how analysts can use it and other systems to mine enormous agency databases by filling in a simple on-screen form giving only a broad justification for the search. The request is not reviewed by a court or any NSA personnel before it is processed.
  • XKeyscore, the documents boast, is the NSA's "widest reaching" system developing intelligence from computer networks – what the agency calls Digital Network Intelligence (DNI). One presentation claims the program covers "nearly everything a typical user does on the internet", including the content of emails, websites visited and searches, as well as their metadata.
  • Analysts can also use XKeyscore and other NSA systems to obtain ongoing "real-time" interception of an individual's internet activity.
  • Under US law, the NSA is required to obtain an individualized Fisa warrant only if the target of their surveillance is a 'US person', though no such warrant is required for intercepting the communications of Americans with foreign targets.
  • But XKeyscore provides the technological capability, if not the legal authority, to target even US persons for extensive electronic surveillance without a warrant provided that some identifying information, such as their email or IP address, is known to the analyst.
  • One training slide illustrates the digital activity constantly being collected by XKeyscore and the analyst's ability to query the databases at any time.
  • The purpose of XKeyscore is to allow analysts to search the metadata as well as the content of emails and other internet activity, such as browser history, even when there is no known email account (a "selector" in NSA parlance) associated with the individual being targeted.
  • Analysts can also search by name, telephone number, IP address, keywords, the language in which the internet activity was conducted or the type of browser used.
  • One document notes that this is because "strong selection [search by email address] itself gives us only a very limited capability" because "a large amount of time spent on the web is performing actions that are anonymous."
  • Email monitoring
  • One top-secret document describes how the program "searches within bodies of emails, webpages and documents", including the "To, From, CC, BCC lines" and the 'Contact Us' pages on websites".
  • To search for emails, an analyst using XKS enters the individual's email address into a simple online search form, along with the "justification" for the search and the time period for which the emails are sought.
  • One document, a top secret 2010 guide describing the training received by NSA analysts for general surveillance under the Fisa Amendments Act of 2008, explains that analysts can begin surveillance on anyone by clicking a few simple pull-down menus designed to provide both legal and targeting justifications.
  • Once options on the pull-down menus are selected, their target is marked for electronic surveillance and the analyst is able to review the content of their communications:
  • Chats, browsing history and other internet activity
  • Beyond emails, the XKeyscore system allows analysts to monitor a virtually unlimited array of other internet activities, including those within social media.
  • An NSA tool called DNI Presenter, used to read the content of stored emails, also enables an analyst using XKeyscore to read the content of Facebook chats or private messages.
  • The XKeyscore program also allows an analyst to learn the IP addresses of every person who visits any website the analyst specifies.
  • The quantity of communications accessible through programs such as XKeyscore is staggeringly large. One NSA report from 2007 estimated that there were 850bn "call events" collected and stored in the NSA databases, and close to 150bn internet records. Each day, the document says, 1-2bn records were added.
  • William Binney, a former NSA mathematician, said last year that the agency had "assembled on the order of 20tn transactions about US citizens with other US citizens", an estimate, he said, that "only was involving phone calls and emails". A 2010 Washington Post article reported that "every day, collection systems at the [NSA] intercept and store 1.7bn emails, phone calls and other type of communications."
  • The ACLU's deputy legal director, Jameel Jaffer, told the Guardian last month that national security officials expressly said that a primary purpose of the new law was to enable them to collect large amounts of Americans' communications without individualized warrants.
  • "The government doesn't need to 'target' Americans in order to collect huge volumes of their communications," said Jaffer. "The government inevitably sweeps up the communications of many Americans" when targeting foreign nationals for surveillance.
  •  
    "One presentation claims the XKeyscore program covers 'nearly everything a typical user does on the internet' ................................................................. A top secret National Security Agency program allows analysts to search with no prior authorization through vast databases containing emails, online chats and the browsing histories of millions of individuals, according to documents provided by whistleblower Edward Snowden. The NSA boasts in training materials that the program, called XKeyscore, is its "widest-reaching" system for developing intelligence from the internet. The latest revelations will add to the intense public and congressional debate around the extent of NSA surveillance programs. They come as senior intelligence officials testify to the Senate judiciary committee on Wednesday, releasing classified documents in response to the Guardian's earlier stories on bulk collection of phone records and Fisa surveillance court oversight. The files shed light on one of Snowden's most controversial statements, made in his first video interview published by the Guardian on June 10. "I, sitting at my desk," said Snowden, could "wiretap anyone, from you or your accountant, to a federal judge or even the president, if I had a personal email". US officials vehemently denied this specific claim. Mike Rogers, the Republican chairman of the House intelligence committee, said of Snowden's assertion: "He's lying. It's impossible for him to do what he was saying he could do." But training materials for XKeyscore detail how analysts can use it and other systems to mine enormous agency databases by filling in a simple on-screen form giving only a broad justification for the search. The request is not reviewed by a court or any NSA personnel before it is processed. XKeyscore, the documents boast, is the NSA's "widest reaching" system developing intelligence from computer networks - what the agency calls Digital Network Intelligence (DNI). One
  •  
    "But training materials for XKeyscore detail how analysts can use it and other systems to mine enormous agency databases by filling in a simple on-screen form giving only a broad justification for the search. The request is not reviewed by a court or any NSA personnel before it is processed. " Note in that regard that Snowden said in an earlier interview that use of this system rarely was audited and that when audited, the most common request if changes were requested was to beef up the justification for the search. The XScore system puts the lie to just about everything the Administration has claimed about intense oversight by all three branches of federal government and about not reading emails or listening to (Skype) phone calls. The lies keep stacking up in an ever-deepening pile.
Gary Edwards

Impeach Judge James Robart for violating sovereignty and Constitution - 0 views

  •  
    "It's still hard to believe we now live in a country where a district judge can demand that we bring in refugees from state sponsors of terror and failed states saturated with terrorists and no data systems during a time of war. It's almost unfathomable that a district judge, an institution created by Congress, can overturn long-standing refugee law and bar the federal government from prioritizing persecuted religious minorities for refugee resettlement. All in contravention to statute, numerous clauses of the Constitution, the social contract, the social compact, popular sovereignty, jurisdictional sovereignty, and 200 years of case law. If Obergefell redefined the building block of all civilization, Judge James Robart's ruling redefined the building block of a sovereign nation. It's hard to comprehend a judicial opinion more divorced from our Constitution, sovereignty, fundamental laws, founding values, history, and tradition. It's also hard to imagine an opinion that is of greater consequence - unless it is ignored. In the long run, Congress must strip the federal judiciary of their power grab and restore Congress' plenary power over immigration, as it was since our founding. However, in the meantime, it's time to make impeachment great again. Impeachment was a critical check on abuse of power   Before the growth of political parties killed the separation of powers, the tool of impeachment was regarded by our founders as one of the most effective ways of checking the executive and judicial branches of government. By my count, impeachment is referenced 58 times in the Federalist Papers and countless times during the Constitutional Convention. Impeachment [U.S.CONST. art. II, §4] was not only reserved for those who engage in criminal behavior. It was clearly designed to check abuse of power. As the Congressional Research Service observes, Congress has identified "improperly exceeding or abusing the powers of the office" as a criterion for
1 - 20 of 156 Next › Last »
Showing 20 items per page