Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged data

Rss Feed Group items tagged

Paul Merrell

Conflict Erupts in Public Rebuke on C.I.A. Inquiry - NYTimes.com - 0 views

  • A festering conflict between the Central Intelligence Agency and its congressional overseers broke into the open Tuesday when Senator Dianne Feinstein, chairwoman of the Intelligence Committee and one of the C.I.A.’s staunchest defenders, delivered an extraordinary denunciation of the agency, accusing it of withholding information about its treatment of prisoners and trying to intimidate committee staff members investigating the detention program.Describing what she called a “defining moment” for the oversight of American spy agencies, Ms. Feinstein said the C.I.A. had removed documents from computers used by Senate Intelligence Committee staff members working on a report about the agency’s detention program, searched the computers after the committee completed its report and referred a criminal case to the Justice Department in an attempt to thwart their investigation.
  • Ms. Feinstein’s disclosures came a week after it was first reported that the C.I.A. last year had monitored computers used by her staff in an effort to learn how the committee may have gained access to the agency’s own internal review of the detention and interrogation program that became perhaps the most criticized part of the American government’s response to the Sept. 11, 2001, attacks. Ms. Feinstein said the internal review bolstered the conclusions of the committee’s still-classified report on the program, which President Obama officially ended in January 2009 after sharply criticizing it during the 2008 presidential campaign. For an intelligence community already buffeted by controversies over electronic surveillance and armed drone strikes, the rupture with Ms. Feinstein, one of its closest congressional allies, could have broad ramifications.
  • “Feinstein has always pushed the agency in private and defended it in public,” said Amy B. Zegart, who studies intelligence issues at Stanford University. “Now she is skewering the C.I.A. in public. This is a whole new world for the C.I.A.”Ms. Feinstein, who had refused to comment on the dispute between the C.I.A. and her committee, took the Senate floor on Tuesday morning to say the agency’s actions had breached constitutional provisions for the separation of powers and “were a potential effort to intimidate.” “How this will be resolved will show whether the Intelligence Committee can be effective in monitoring and investigating our nation’s intelligence activities, or whether our work can be thwarted by those we oversee,” she said.
  • ...4 more annotations...
  • The dispute came to a head in mid-January when Mr. Brennan told members of the committee that the agency had carried out a search of computers used by committee investigators at a C.I.A. facility in Northern Virginia, where the committee was examining documents the agency had made available for its report. Ms. Feinstein said on Tuesday that during the meeting, Mr. Brennan told her that the C.I.A. had searched a “walled-off committee network drive containing the committee’s own internal work product and communications” and that he was going to “order further forensic evidence of the committee network to learn more about activities of the committee’s oversight staff.”
  • The C.I.A. had carried out the search to determine whether committee investigators may have gained unauthorized access to the internal review of the detention program that the agency had carried out without informing the committee. Ms. Feinstein on Tuesday vigorously disputed this allegation, saying the document had been included — intentionally or not — as part of a dump of millions of pages the C.I.A. had provided for the Intelligence Committee.
  • Mr. Brennan, in a January letter to Ms. Feinstein that a government official who did not want to be identified released on Tuesday, said the committee had not been entitled to the internal review because it contained “sensitive, deliberative, pre-decisional C.I.A. material”— and therefore was protected under executive privilege considerations. The letter, attached to a statement that Mr. Brennan issued to the agency’s employees on Tuesday, raised questions about Ms. Feinstein’s statements earlier in the day concerning at what point the committee came into possession of the internal review. The C.I.A.’s acting general counsel has referred the matter to the Justice Department as a possible criminal offense, a move Ms. Feinstein called a strong-arm tactic by someone with a conflict of interest in the case. She said that that official had previously been a lawyer in the C.I.A.’s Counterterrorism Center — the section of the spy agency that was running the detention and interrogation program — and that his name is mentioned more than 1,600 times in the committee’s report. Ms. Feinstein did not name the lawyer, but she appeared to be referring to Robert Eatinger, the C.I.A.’s senior deputy general counsel. In 2007, The New York Times reported that when a top C.I.A. official in 2005 destroyed videotapes of brutal interrogations of Al Qaeda detainees, Mr. Eatinger had been one of two lawyers to approve their destruction.
  • Ms. Feinstein said that on two occasions in 2010, the C.I.A. had removed documents totaling hundreds of pages from the computer server used by her staff at the Northern Virginia facility. She did not provide any details about the documents, but said that when committee investigators confronted the C.I.A. they received a number of answers — first a denial that the documents had been removed, then an explanation that they had been removed by contractors working at the facility, then an explanation that the removal of documents was ordered by the White House. When the committee approached the White House, she said, it denied giving such an order.Ms. Feinstein’s broadside rallied Senate Democrats, but divided Republicans.
  •  
    The separation of powers Constitutional issue here is plain. The Senate has oversight of the CIA; the CIA has no lawful oversight of the Senate and furthermore is forbidden by law from conducting surveillance within the U.S. But the CIA spied on the Senate, then used evidence it found to file a criminal complaint with the DoJ against Senate staffers. Tit for tat, a criminal complaint has been filed against the CIA staffers.   
Paul Merrell

Obama Lets N.S.A. Exploit Some Internet Flaws, Officials Say - NYTimes.com - 0 views

  • Stepping into a heated debate within the nation’s intelligence agencies, President Obama has decided that when the National Security Agency discovers major flaws in Internet security, it should — in most circumstances — reveal them to assure that they will be fixed, rather than keep mum so that the flaws can be used in espionage or cyberattacks, senior administration officials said Saturday.But Mr. Obama carved a broad exception for “a clear national security or law enforcement need,” the officials said, a loophole that is likely to allow the N.S.A. to continue to exploit security flaws both to crack encryption on the Internet and to design cyberweapons.
  • elements of the decision became evident on Friday, when the White House denied that it had any prior knowledge of the Heartbleed bug, a newly known hole in Internet security that sent Americans scrambling last week to change their online passwords. The White House statement said that when such flaws are discovered, there is now a “bias” in the government to share that knowledge with computer and software manufacturers so a remedy can be created and distributed to industry and consumers.Caitlin Hayden, the spokeswoman for the National Security Council, said the review of the recommendations was now complete, and it had resulted in a “reinvigorated” process to weigh the value of disclosure when a security flaw is discovered, against the value of keeping the discovery secret for later use by the intelligence community.“This process is biased toward responsibly disclosing such vulnerabilities,” she said.
  • One recommendation urged the N.S.A. to get out of the business of weakening commercial encryption systems or trying to build in “back doors” that would make it far easier for the agency to crack the communications of America’s adversaries. Tempting as it was to create easy ways to break codes — the reason the N.S.A. was established by Harry S. Truman 62 years ago — the committee concluded that the practice would undercut trust in American software and hardware products. In recent months, Silicon Valley companies have urged the United States to abandon such practices, while Germany and Brazil, among other nations, have said they were considering shunning American-made equipment and software. Their motives were hardly pure: Foreign companies see the N.S.A. disclosures as a way to bar American competitors.Continue reading the main story Continue reading the main story AdvertisementAnother recommendation urged the government to make only the most limited, temporary use of what hackers call “zero days,” the coding flaws in software like Microsoft Windows that can give an attacker access to a computer — and to any business, government agency or network connected to it. The flaws get their name from the fact that, when identified, the computer user has “zero days” to fix them before hackers can exploit the accidental vulnerability.
  • ...2 more annotations...
  • The N.S.A. made use of four “zero day” vulnerabilities in its attack on Iran’s nuclear enrichment sites. That operation, code-named “Olympic Games,” managed to damage roughly 1,000 Iranian centrifuges, and by some accounts helped drive the country to the negotiating table.Not surprisingly, officials at the N.S.A. and at its military partner, the United States Cyber Command, warned that giving up the capability to exploit undisclosed vulnerabilities would amount to “unilateral disarmament” — a phrase taken from the battles over whether and how far to cut America’s nuclear arsenal.“We don’t eliminate nuclear weapons until the Russians do,” one senior intelligence official said recently. “You are not going to see the Chinese give up on ‘zero days’ just because we do.” Even a senior White House official who was sympathetic to broad reforms after the N.S.A. disclosures said last month, “I can’t imagine the president — any president — entirely giving up a technology that might enable him some day to take a covert action that could avoid a shooting war.”
  • But documents released by Edward J. Snowden, the former N.S.A. contractor, make it clear that two years before Heartbleed became known, the N.S.A. was looking at ways to accomplish exactly what the flaw did by accident. A program code-named Bullrun, apparently named for the site of two Civil War battles just outside Washington, was part of a decade-long effort to crack or circumvent encryption on the web. The documents do not make clear how well it succeeded, but it may well have been more effective than exploiting Heartbleed would be at enabling access to secret data.The government has become one of the biggest developers and purchasers of information identifying “zero days,” officials acknowledge. Those flaws are big business — Microsoft pays up to $150,000 to those who find them and bring them to the company to fix — and other countries are gathering them so avidly that something of a modern-day arms race has broken out. Chief among the nations seeking them are China and Russia, though Iran and North Korea are in the market as well.
  •  
    Note that this is only an elastic policy, not law. Also notice that NYT is now reporting as *fact* that the NSA did the cyber attack on the Iranian enrichment centrifuges. By any legal measure, if true that was an act of war, a war of aggression.  So why wasn't the American public informed that we were at war with Iran? 
Paul Merrell

Classified Report on the C.I.A.'s Secret Prisons Is Caught in Limbo - The New York Times - 0 views

  • A Senate security officer stepped out of the December chill last year and delivered envelopes marked “Top Secret” to the Pentagon, the C.I.A., the State Department and the Justice Department. Inside each packet was a disc containing a 6,700-page classified report on the C.I.A.’s secret prison program and a letter from Senator Dianne Feinstein, urging officials to read the report to ensure that the lessons were not lost to time. Today, those discs sit untouched in vaults across Washington, still in their original envelopes. The F.B.I. has not retrieved a copy held for it in the Justice Department’s safe. State Department officials, who locked up their copy and marked it “Congressional Record — Do Not Open, Do Not Access” as soon as it arrived, have not read it either. Continue reading the main story Related Coverage document The Senate Committee’s Report on the C.I.A.’s Use of TortureDEC. 9, 2014 Panel Faults C.I.A. Over Brutality and Deceit in Terrorism InterrogationsDEC. 9, 2014 Senate Votes to Turn Presidential Ban on Torture Into LawJUNE 16, 2015 Outside Psychologists Shielded U.S. Torture Program, Report FindsJULY 10, 2015 Nearly a year after the Senate released a declassified 500-page summary of the report, the fate of the entire document remains in limbo, the subject of battles in the courts and in Congress. Until those disputes are resolved, the Justice Department has prohibited officials from the government agencies that possess it from even opening the report, effectively keeping the people in charge of America’s counterterrorism future from reading about its past. There is also the possibility that the documents could remain locked in a Senate vault for good.
  • In a letter to Attorney General Loretta E. Lynch last week, Ms. Feinstein, a California Democrat, said the Justice Department was preventing the government from “learning from the mistakes of the past to ensure that they are not repeated.”Although Ms. Feinstein is eager to see the document circulated, the Senate is now under Republican control. Her successor as head of the Intelligence Committee, Senator Richard M. Burr of North Carolina, has demanded that the Obama administration return every copy of the report. Mr. Burr has declared the report to be nothing more than “a footnote in history.”It was always clear that the full report would remain shielded from public view for years, if not decades. But Mr. Burr’s demand, which means that even officials with top security clearances might never read it, has reminded some officials of the final scene of “Raiders of the Lost Ark,” when the Ark of the Covenant is put into a wooden crate alongside thousands of others in a government warehouse of secrets.
  • The full report is not expected to offer evidence of previously undisclosed interrogation techniques, but the interrogation sessions are said to be described in great detail. The report explains the origins of the program and names the officials involved. The full report also offers details on the role of each agency in the secret prison program.The Justice Department, which played a central role in approving the interrogation methods, has even prohibited its own officials from reading the full report.“The Department of Justice was among those parts of the executive branch that were misled about the program, and D.O.J. officials’ understanding of this history is critical to its institutional role going forward,” Ms. Feinstein wrote to the Justice Department last week in a letter she signed with Senator Patrick J. Leahy of Vermont, the top Democrat on the Judiciary Committee.In court, Justice Department lawyers have agreed with Mr. Burr’s contention that the document belongs to Congress. As evidence, they point to an agreement between the C.I.A. and the Senate as the Intelligence Committee began its lengthy investigation. The Senate was under Democratic control at the time.
  • ...2 more annotations...
  • The American Civil Liberties Union has sued the C.I.A. for access to the document, and at this point the case hinges on who owns it. Senate documents are exempt from public records laws, but executive branch records are not. In May, a federal judge ruled that even though Ms. Feinstein distributed the report to the executive branch, the document still belongs to Congress. That decision is under appeal, with court papers due this month.Justice Department officials defend their stance, saying that handling the document at all could influence the outcome of the lawsuit. They said that a State Department official who opened the report, read it and summarized it could lead a judge to determine that the document was an executive branch record, altering the lawsuit’s outcome. The Justice Department has also promised not to return the records to Mr. Burr until a judge settles the matter.“It’s quite bizarre, and I cannot think of a precedent,” said Steven Aftergood, the director of the Project on Government Secrecy at the Federation of American Scientists. He said there are any number of classified Senate documents that are shared with intelligence agencies and remain as congressional records, even if they are read by members of the executive branch.
  • The agreement says that any “documents, draft and final recommendations, reports or other materials” generated during the investigation are congressional documents. “As such these records are not C.I.A. records under the Freedom of Information Act,” the agreement says.The A.C.L.U. argues that agreement was void once Ms. Feinstein sent the report to the government agencies. Because she clearly intended the executive branch to use the report, the A.C.L.U. contends, the committee gave up control of the document.If Mr. Burr were to succeed in getting copies of the report returned to the Intelligence Committee, Mr. Aftergood said, he could slowly make it irrelevant.“The longer that it’s buried, the less relevant it becomes,” he said.
  •  
    If it is ultimately found that the report is an Executive Branch record, then the FOIA requires disclosure of all "segregable portions" that are not properly classified.  
Paul Merrell

How the NSA is still harvesting your online data | World news | guardian.co.uk - 0 views

  • A review of top-secret NSA documents suggests that the surveillance agency still collects and sifts through large quantities of Americans' online data – despite the Obama administration's insistence that the program that began under Bush ended in 2011.Shawn Turner, the Obama administration's director of communications for National Intelligence, told the Guardian that "the internet metadata collection program authorized by the Fisa court was discontinued in 2011 for operational and resource reasons and has not been restarted."But the documents indicate that the amount of internet metadata harvested, viewed, processed and overseen by the Special Source Operations (SSO) directorate inside the NSA is extensive.While there is no reference to any specific program currently collecting purely domestic internet metadata in bulk, it is clear that the agency collects and analyzes significant amounts of data from US communications systems in the course of monitoring foreign targets.
  • On December 26 2012, SSO announced what it described as a new capability to allow it to collect far more internet traffic and data than ever before. With this new system, the NSA is able to direct more than half of the internet traffic it intercepts from its collection points into its own repositories. One end of the communications collected are inside the United States.The NSA called it the "One-End Foreign (1EF) solution". It intended the program, codenamed EvilOlive, for "broadening the scope" of what it is able to collect. It relied, legally, on "FAA Authority", a reference to the 2008 Fisa Amendments Act that relaxed surveillance restrictions.This new system, SSO stated in December, enables vastly increased collection by the NSA of internet traffic. "The 1EF solution is allowing more than 75% of the traffic to pass through the filter," the SSO December document reads. "This milestone not only opened the aperture of the access but allowed the possibility for more traffic to be identified, selected and forwarded to NSA repositories."
  • It continued: "After the EvilOlive deployment, traffic has literally doubled."The scale of the NSA's metadata collection is highlighted by references in the documents to another NSA program, codenamed ShellTrumpet.On December 31, 2012, an SSO official wrote that ShellTrumpet had just "processed its One Trillionth metadata record".
  • ...4 more annotations...
  • Explaining that the five-year old program "began as a near-real-time metadata analyzer … for a classic collection system", the SSO official noted: "In its five year history, numerous other systems from across the Agency have come to use ShellTrumpet's processing capabilities for performance monitoring" and other tasks, such as "direct email tip alerting."Almost half of those trillion pieces of internet metadata were processed in 2012, the document detailed: "though it took five years to get to the one trillion mark, almost half of this volume was processed in this calendar year".
  • Another SSO entry, dated February 6, 2013, described ongoing plans to expand metadata collection. A joint surveillance collection operation with an unnamed partner agency yielded a new program "to query metadata" that was "turned on in the Fall 2012". Two others, called MoonLightPath and Spinneret, "are planned to be added by September 2013."A substantial portion of the internet metadata still collected and analyzed by the NSA comes from allied governments, including its British counterpart, GCHQ.
  • An SSO entry dated September 21, 2012, announced that "Transient Thurible, a new Government Communications Head Quarters (GCHQ) managed XKeyScore (XKS) Deep Dive was declared operational." The entry states that GCHQ "modified" an existing program so the NSA could "benefit" from what GCHQ harvested."Transient Thurible metadata [has been] flowing into NSA repositories since 13 August 2012," the entry states.
  • A review of top-secret NSA documents suggests that the surveillance agency still collects and sifts through large quantities of Americans' online data – despite the Obama administration's insistence that the program that began under Bush ended in 2011.Shawn Turner, the Obama administration's director of communications for National Intelligence, told the Guardian that "the internet metadata collection program authorized by the Fisa court was discontinued in 2011 for operational and resource reasons and has not been restarted."But the documents indicate that the amount of internet metadata harvested, viewed, processed and overseen by the Special Source Operations (SSO) directorate inside the NSA is extensive.While there is no reference to any specific program currently collecting purely domestic internet metadata in bulk, it is clear that the agency collects and analyzes significant amounts of data from US communications systems in the course of monitoring foreign targets.
Paul Merrell

Turkey could cut off Islamic State's supply lines. So why doesn't it? | David Graeber |... - 0 views

  • n the wake of the murderous attacks in Paris, we can expect western heads of state to do what they always do in such circumstances: declare total and unremitting war on those who brought it about. They don’t actually mean it. They’ve had the means to uproot and destroy Islamic State within their hands for over a year now. They’ve simply refused to make use of it. In fact, as the world watched leaders making statements of implacable resolve at the G20 summit in Antalaya, these same leaders are hobnobbing with Turkey’s president Recep Tayyip Erdoğan, a man whose tacit political, economic, and even military support contributed to Isis’s ability to perpetrate the atrocities in Paris, not to mention an endless stream of atrocities inside the Middle East.
  • How could Isis be eliminated? In the region, everyone knows. All it would really take would be to unleash the largely Kurdish forces of the YPG (Democratic Union party) in Syria, and PKK (Kurdistan Workers’ party) guerillas in Iraq and Turkey. These are, currently, the main forces actually fighting Isis on the ground. They have proved extraordinarily militarily effective and oppose every aspect of Isis’s reactionary ideology. But instead, YPG-controlled territory in Syria finds itself placed under a total embargo by Turkey, and PKK forces are under continual bombardment by the Turkish air force. Not only has Erdoğan done almost everything he can to cripple the forces actually fighting Isis; there is considerable evidence that his government has been at least tacitly aiding Isis itself. It might seem outrageous to suggest that a Nato member like Turkey would in any way support an organisation that murders western civilians in cold blood. That would be like a Nato member supporting al-Qaida. But in fact there is reason to believe that Erdoğan’s government does support the Syrian branch of al-Qaida (Jabhat al-Nusra) too, along with any number of other rebel groups that share its conservative Islamist ideology. The Institute for the Study of Human Rights at Columbia University has compiled a long list of evidence of Turkish support for Isis in Syria.
  • And then there are Erdoğan’s actual, stated positions. Back in August, the YPG, fresh from their victories in Kobani and Gire Spi, were poised to seize Jarablus, the last Isis-held town on the Turkish border that the terror organisation had been using to resupply its capital in Raqqa with weapons, materials, and recruits – Isis supply lines pass directly through Turkey. Commentators predicted that with Jarablus gone, Raqqa would soon follow. Erdoğan reacted by declaring Jarablus a “red line”: if the Kurds attacked, his forces would intervene militarily – against the YPG. So Jarablus remains in terrorist hands to this day, under de facto Turkish military protection.
  • ...3 more annotations...
  • How has Erdoğan got away with this? Mainly by claiming those fighting Isis are “terrorists” themselves. It is true that the PKK did fight a sometimes ugly guerilla war with Turkey in the 1990s, which resulted in it being placed on the international terror list. For the last 10 years, however, it has completely shifted strategy, renouncing separatism and adopting a strict policy of never harming civilians. The PKK was responsible for rescuing thousands of Yazidi civilians threatened with genocide by Isis in 2014, and its sister organisation, the YPG, of protecting Christian communities in Syria as well. Their strategy focuses on pursuing peace talks with the government, while encouraging local democratic autonomy in Kurdish areas under the aegis of the HDP, originally a nationalist political party, which has reinvented itself as a voice of a pan-Turkish democratic left.
  • They have proved extraordinarily militarily effective and with their embrace of grassroots democracy and women’s rights, oppose every aspect of Isis’ reactionary ideology. In June, HDP success at the polls denied Erdoğan his parliamentary majority. Erdoğan’s response was ingenious. He called for new elections, declared he was “going to war” with Isis, made one token symbolic attack on them and then proceeded to unleash the full force of his military against PKK forces in Turkey and Iraq, while denouncing the HDP as “terrorist supporters” for their association with them. There followed a series of increasingly bloody terrorist bombings inside Turkey – in the cities of Diyarbakir, Suruc, and, finally, Ankara – attacks attributed to Isis but which, for some mysterious reason, only ever seemed to target civilian activists associated with the HDP. Victims have repeatedly reported police preventing ambulances evacuating the wounded, or even opening fire on survivors with tear gas.
  • As a result, the HDP gave up even holding political rallies in the weeks leading up to new elections in November for fear of mass murder, and enough HDP voters failed to show up at the polls that Erdoğan’s party secured a majority in parliament. The exact relationship between Erdoğan’s government and Isis may be subject to debate; but of some things we can be relatively certain. Had Turkey placed the same kind of absolute blockade on Isis territories as they did on Kurdish-held parts of Syria, let alone shown the same sort of “benign neglect” towards the PKK and YPG that they have been offering to Isis, that blood-stained “caliphate” would long since have collapsed – and arguably, the Paris attacks may never have happened. And if Turkey were to do the same today, Isis would probably collapse in a matter of months. Yet, has a single western leader called on Erdoğan to do this? The next time you hear one of those politicians declaring the need to crack down on civil liberties or immigrant rights because of the need for absolute “war” against terrorism bear all this in mind. Their resolve is exactly as “absolute” as it is politically convenient. Turkey, after all, is a “strategic ally”. So after their declaration, they are likely to head off to share a friendly cup of tea with the very man who makes it possible for Isis to continue to exist.
Paul Merrell

Canadian Spies Collect Domestic Emails in Secret Security Sweep - The Intercept - 0 views

  • Canada’s electronic surveillance agency is covertly monitoring vast amounts of Canadians’ emails as part of a sweeping domestic cybersecurity operation, according to top-secret documents. The surveillance initiative, revealed Wednesday by CBC News in collaboration with The Intercept, is sifting through millions of emails sent to Canadian government agencies and departments, archiving details about them on a database for months or even years. The data mining operation is carried out by the Communications Security Establishment, or CSE, Canada’s equivalent of the National Security Agency. Its existence is disclosed in documents obtained by The Intercept from NSA whistleblower Edward Snowden. The emails are vacuumed up by the Canadian agency as part of its mandate to defend against hacking attacks and malware targeting government computers. It relies on a system codenamed PONY EXPRESS to analyze the messages in a bid to detect potential cyber threats.
  • Last year, CSE acknowledged it collected some private communications as part of cybersecurity efforts. But it refused to divulge the number of communications being stored or to explain for how long any intercepted messages would be retained. Now, the Snowden documents shine a light for the first time on the huge scope of the operation — exposing the controversial details the government withheld from the public. Under Canada’s criminal code, CSE is not allowed to eavesdrop on Canadians’ communications. But the agency can be granted special ministerial exemptions if its efforts are linked to protecting government infrastructure — a loophole that the Snowden documents show is being used to monitor the emails. The latest revelations will trigger concerns about how Canadians’ private correspondence with government employees are being archived by the spy agency and potentially shared with police or allied surveillance agencies overseas, such as the NSA. Members of the public routinely communicate with government employees when, for instance, filing tax returns, writing a letter to a member of parliament, applying for employment insurance benefits or submitting a passport application.
  • Chris Parsons, an internet security expert with the Toronto-based internet think tank Citizen Lab, told CBC News that “you should be able to communicate with your government without the fear that what you say … could come back to haunt you in unexpected ways.” Parsons said that there are legitimate cybersecurity purposes for the agency to keep tabs on communications with the government, but he added: “When we collect huge volumes, it’s not just used to track bad guys. It goes into data stores for years or months at a time and then it can be used at any point in the future.” In a top-secret CSE document on the security operation, dated from 2010, the agency says it “processes 400,000 emails per day” and admits that it is suffering from “information overload” because it is scooping up “too much data.” The document outlines how CSE built a system to handle a massive 400 terabytes of data from Internet networks each month — including Canadians’ emails — as part of the cyber operation. (A single terabyte of data can hold about a billion pages of text, or about 250,000 average-sized mp3 files.)
  • ...1 more annotation...
  • The agency notes in the document that it is storing large amounts of “passively tapped network traffic” for “days to months,” encompassing the contents of emails, attachments and other online activity. It adds that it stores some kinds of metadata — data showing who has contacted whom and when, but not the content of the message — for “months to years.” The document says that CSE has “excellent access to full take data” as part of its cyber operations and is receiving policy support on “use of intercepted private communications.” The term “full take” is surveillance-agency jargon that refers to the bulk collection of both content and metadata from Internet traffic. Another top-secret document on the surveillance dated from 2010 suggests the agency may be obtaining at least some of the data by covertly mining it directly from Canadian Internet cables. CSE notes in the document that it is “processing emails off the wire.”
  •  
    " CANADIAN SPIES COLLECT DOMESTIC EMAILS IN SECRET SECURITY SWEEP BY RYAN GALLAGHER AND GLENN GREENWALD @rj_gallagher@ggreenwald YESTERDAY AT 2:02 AM SHARE TWITTER FACEBOOK GOOGLE EMAIL PRINT POPULAR EXCLUSIVE: TSA ISSUES SECRET WARNING ON 'CATASTROPHIC' THREAT TO AVIATION CHICAGO'S "BLACK SITE" DETAINEES SPEAK OUT WHY DOES THE FBI HAVE TO MANUFACTURE ITS OWN PLOTS IF TERRORISM AND ISIS ARE SUCH GRAVE THREATS? NET NEUTRALITY IS HERE - THANKS TO AN UNPRECEDENTED GUERRILLA ACTIVISM CAMPAIGN HOW SPIES STOLE THE KEYS TO THE ENCRYPTION CASTLE Canada's electronic surveillance agency is covertly monitoring vast amounts of Canadians' emails as part of a sweeping domestic cybersecurity operation, according to top-secret documents. The surveillance initiative, revealed Wednesday by CBC News in collaboration with The Intercept, is sifting through millions of emails sent to Canadian government agencies and departments, archiving details about them on a database for months or even years. The data mining operation is carried out by the Communications Security Establishment, or CSE, Canada's equivalent of the National Security Agency. Its existence is disclosed in documents obtained by The Intercept from NSA whistleblower Edward Snowden. The emails are vacuumed up by the Canadian agency as part of its mandate to defend against hacking attacks and malware targeting government computers. It relies on a system codenamed PONY EXPRESS to analyze the messages in a bid to detect potential cyber threats. Last year, CSE acknowledged it collected some private communications as part of cybersecurity efforts. But it refused to divulge the number of communications being stored or to explain for how long any intercepted messages would be retained. Now, the Snowden documents shine a light for the first time on the huge scope of the operation - exposing the controversial details the government withheld from the public. Under Canada's criminal code, CSE is no
Paul Merrell

Investigating Donald Trump, F.B.I. Sees No Clear Link to Russia - The New York Times - 0 views

  • For much of the summer, the F.B.I. pursued a widening investigation into a Russian role in the American presidential campaign. Agents scrutinized advisers close to Donald J. Trump, looked for financial connections with Russian financial figures, searched for those involved in hacking the computers of Democrats, and even chased a lead — which they ultimately came to doubt — about a possible secret channel of email communication from the Trump Organization to a Russian bank.Law enforcement officials say that none of the investigations so far have found any conclusive or direct link between Mr. Trump and the Russian government. And even the hacking into Democratic emails, F.B.I. and intelligence officials now believe, was aimed at disrupting the presidential election rather than electing Mr. Trump.Hillary Clinton’s supporters, angry over what they regard as a lack of scrutiny of Mr. Trump by law enforcement officials, pushed for these investigations. In recent days they have also demanded that James B. Comey, the director of the F.B.I., discuss them publicly, as he did last week when he announced that a new batch of emails possibly connected to Mrs. Clinton had been discovered.
  • Supporters of Mrs. Clinton have argued that Mr. Trump’s evident affinity for Russia’s president, Vladimir V. Putin — Mr. Trump has called him a great leader and echoed his policies toward NATO, Ukraine and the war in Syria — and the hacks of leading Democrats like John D. Podesta, the chairman of the Clinton campaign, are clear indications that Russia has taken sides in the presidential race and that voters should know what the F.B.I. has found. Continue reading the main story Related Coverage 3 U.S. States Turn Down Russian Requests to Monitor Elections OCT. 21, 2016 Donald Trump Says He Might Meet With Putin Before Inauguration OCT. 17, 2016 Advertisement Continue reading the main story The F.B.I.’s inquiries into Russia’s possible role continue, as does the investigation into the emails involving Mrs. Clinton’s top aide, Huma Abedin, on a computer she shared with her estranged husband, Anthony D. Weiner. Mrs. Clinton’s supporters argue that voters have as much right to know what the F.B.I. has found in Mr. Trump’s case, even if the findings are not yet conclusive.
  • Senator Harry Reid of Nevada, the minority leader, responded angrily on Sunday with a letter accusing the F.B.I. of not being forthcoming about Mr. Trump’s alleged ties with Moscow.“It has become clear that you possess explosive information about close ties and coordination between Donald Trump, his top advisers, and the Russian government — a foreign interest openly hostile to the United States, which Trump praises at every opportunity,” Mr. Reid wrote. “The public has a right to know this information.”F.B.I. officials declined to comment on Monday. Intelligence officials have said in interviews over the last six weeks that apparent connections between some of Mr. Trump’s aides and Moscow originally compelled them to open a broad investigation into possible links between the Russian government and the Republican presidential candidate. Still, they have said that Mr. Trump himself has not become a target. And no evidence has emerged that would link him or anyone else in his business or political circle directly to Russia’s election operations.
  •  
    The same story is running on CNN. There is another story moving on MSM that the FBI has found no evidence of Russian attempts to sway the election between the two candidates, instead being aimed at spreading chaos. Combined with FBI Director Comey's announcement last week that the Hillary email criminal investigation has been reopened, at least three temtative conclusions are suggested: [i] Comey and the FBI have mounted a three-pronged attack on Hillary's election run, on the email front, deFUDding Hillary's claim that Trump has ties with Vladimir Putin, and defanging the Hillary claim that Russia is attempting to elect Donald Trump; [ii] MSM is covering those stories; and [iii[ by implication, those who have real power over the U.S. government have decided they don't want Hillary do win the election. All good news for Trump and bad news for the Clintons.
Paul Merrell

British Spies Allowed to Access U.S. Data Without a Warrant - NationalJournal.com - 0 views

  • British authorities are capable of tapping into bulk communications data collected by other countries' intelligence services—including the National Security Agency—without a warrant, according to secret government documents released Tuesday. The agreement between the NSA and Britain's spy agency, known as Government Communications Headquarters or GCHQ, potentially puts the Internet and phone data of Americans in the hands of another country without legal oversight when obtaining a warrant is "not technically feasible."   The data, once obtained, can be kept for up to two years, according to internal policies disclosed by the British government. GCHQ was forced to reveal that it can request and receive vast quantities of raw, unanalyzed data collected from foreign governments it partners with during legal proceedings in a closed court hearing in a case brought by various international human-rights organizations, including Privacy International, Liberty U.K., and Amnesty International. The suit challenges certain aspects of GCHQ's surveillance practices.
  • It is well known that the NSA and GCHQ closely share intelligence data with one another, as part of a long-standing surveillance partnership. Some details of the agencies' spy pact were exposed by former NSA contractor Edward Snowden last year, including the existence of GCHQ's Tempora program, which taps into fiber-optic cables to scoop up online and telephone traffic across the Web for up to 30 days. But this is the first time the British government has disclosed that it does not require a warrant to access data collected and maintained by its American counterparts. The revelation appears to counter statements made by an oversight committee of the British Parliament in July of last year that "in each case where GCHQ sought information from the U.S., a warrant for interception, signed by a minister, was already in place."   It is unclear whether any restrictions on Britain's access to NSA surveillance data is imposed by the U.S. However, documents provided by Snowden to The Guardian last year reveal that the NSA shares raw intelligence data with Israel without removing information about U.S. citizens.
  • In a statement, the NSA said it works with a number of partner countries to further its "foreign intelligence mission." But it did not specify whether it was aware of or condoned Britain's apparent warrantless access of its data. "Whenever NSA shares intelligence information, we comply with all applicable rules, including rules designed to safeguard U.S. person information," the agency said. "NSA does not ask its foreign partners to undertake any intelligence activity that the U.S. government would be legally prohibited from undertaking itself." American privacy advocates quickly condemned any warrantless access of U.S. communications data by British authorities.   "The 'arrangement' disclosed today suggests that the two countries are circumventing even the very weak safeguards that have been put in place," Jameel Jaffer, deputy legal director of the American Civil Liberties Union, said in a statement to National Journal. "It underscores both the inadequacy of existing oversight structures and the pressing need for [surveillance] reform."
  •  
    Note that this came out in a court case; it is not a Snowden leak. 
Paul Merrell

These Are all the Countries Where the US Has a Military Presence | Global Research - Ce... - 0 views

  • On Mar. 24, US president Barack Obama announced that all 9,800 US troops currently stationed in Afghanistan will remain until the end of 2015. This generated a fair amount of criticism: it was, after all, Obama’s promise that the last American troop would leave the country in 2014. How have Obama’s plans for pulling out of Afghanistan fared so far? http://t.co/avoxwJzzQw pic.twitter.com/3S5FJ3lgho — FiveThirtyEight (@FiveThirtyEight) March 26, 2015
  • Those expecting the US to leave Afghanistan, however, should take a minute to consider this: the US still hasn’t left Germany. In fact, there are quite a few places the US hasn’t left, and while certainly most of them don’t pose a threat to American soldiers, they reveal a pattern about the US staying, rather than leaving. According to official information provided by the Department of Defense (DoD) and its Defense Manpower Data Center (DMDC) there are still about 40,000 US troops, and 179 US bases in Germany, over 50,000 troops in Japan (and 109 bases), and tens of thousands of troops, with hundreds of bases, all over Europe. Over 28,000 US troops are present in 85 bases in South Korea, and have been since 1957. Altogether, based on information contained in the DoD’s latest Base Structure Report (BSR), the US has bases in at least 74 countries and troops practically all over the world, ranging from thousands to just one in some countries (it could be a military attaché, for instance).
  • By comparison, France has bases in 10 countries, and the UK has bases in seven. Calculating the extent of the US military presence abroad is not an easy task. The data released by the Department of Defense is incomplete, and inconsistencies are found within documents. Quartz has requested clarification from the Department of Defense, but hasn’t received a response. In his forthcoming book Base Nation: How US Military Bases Abroad Harm America and the World, David Vine, associate professor of anthropology at American University details the difficulties of assessing the US military presence abroad. He writes: according to the most recent publicized count, the U.S. military currently still occupies 686 “base sites” outside the fifty states and Washington, DC. While 686 base sites is quite a figure in its own right, that tally strangely excludes many well-known U.S. bases, like those in Kosovo, Kuwait, and Qatar. Less surprisingly, the Pentagon’s count also excludes secret (or secretive) American bases, like those reported in Israel and Saudi Arabia. There are so many bases, the Pentagon itself doesn’t even know the true total. That is not the only issue—even a definitive count of bases would include a wide range of facilities. “Base” itself is an umbrella term that includes locations referred to as “post,” “station,” “camp,” or “fort” by different military bodies. Vine explains:
  • ...1 more annotation...
  • bases come in all sizes and shapes, from massive sites in Germany and Japan to small radar facilities in Peru and Puerto Rico. […] Even military resorts and recreation areas in places like Tuscany and Seoul are bases of a kind; worldwide, the military runs more than 170 golf courses. The map below represents US military bases abroad, according to the official BSR, and from independent research conducted by Vine (and Quartz) using verified news reports as well as cross-referencing information with Google Maps. This map does not take into account NATO bases, including a rumored base in Turkmenistan and a base in Algeria, reported by Wikileaks to be a suspected US base.
Paul Merrell

NSA Data Will Soon Be Used By Domestic Law Enforcement - 0 views

  • If you’re reading this, then I’m willing to bet that you’ve been called many different names throughout your life. If I were to hazard a guess, I would say they were names like kook, paranoid, conspiracy theorist, alarmist, insane, or gullible. And after this week, you can go by a new name: Vindicated. I’m of course talking about recent revelations from the NSA. Long before Edward Snowden came along, it was no secret that the NSA was spying on everyone without good cause. Anyone who believed that fact was called a conspiracy theorist, but their fears were eventually validated. These same people also understood that the NSA’s surveillance powers would never be used exclusively against terrorists and hostile governments. The power they have is just too tempting for any government. If various government agencies weren’t using the NSA’s surveillance apparatus to solve domestic crimes, it was only a matter of time before it was used for just that.
  • And again, they called us conspiracy theorists for believing that. And again, we were right all long. A while back, we noted a report showing that the “sneak-and-peek” provision of the Patriot Act that was alleged to be used only in national security and terrorism investigations has overwhelmingly been used in narcotics cases. Now the New York Times reports that National Security Agency data will be shared with other intelligence agencies like the FBI without first applying any screens for privacy. The ACLU of Massachusetts blog Privacy SOS explains why this is important: What does this rule change mean for you? In short, domestic law enforcement officials now have access to huge troves of American communications, obtained without warrants, that they can use to put people in cages. FBI agents don’t need to have any “national security” related reason to plug your name, email address, phone number, or other “selector” into the NSA’s gargantuan data trove. They can simply poke around in your private information in the course of totally routine investigations. And if they find something that suggests, say, involvement in illegal drug activity, they can send that information to local or state police. That means information the NSA collects for purposes of so-called “national security” will be used by police to lock up ordinary Americans for routine crimes.
  • Anybody who knows anything about how governments work, should not surprised. You can’t give them any kind of power, and expect them to use it responsibly. You can’t give them any stipulations. Eventually they’ll find a legal loophole to work around any limitations that have been placed on them. In other news, the Pentagon admitted this week that they’ve been deploying military drones over the United States for domestic surveillance purposes. Much like the NSA’s surveillance apparatus, we were assured that drones were for terrorists in faraway lands. Nothing so Orwellian would ever be used against ordinary American citizens at home. Yet here we are, with more to come.
  •  
    The Privacy Act, 5 U.S.C. 552a, provides in relevant part: "(a)(4) the term "record" means any item, collection, or grouping of information about an individual that is maintained by an agency, including, but not limited to, his education, financial transactions, medical history, and criminal or employment history and that contains his name, or the identifying number, symbol, or other identifying particular assigned to the individual, such as a finger or voice print or a photograph[.] ... "(b) Conditions of Disclosure.-No agency shall disclose any record which is contained in a system of records by any means of communication to any person, or to another agency, except pursuant to a written request by, or with the prior written consent of, the individual to whom the record pertains, unless disclosure of the record would be- ... "(7) to another agency or to an instrumentality of any governmental jurisdiction within or under the control of the United States for a civil or criminal law enforcement activity if the activity is authorized by law, and if the head of the agency or instrumentality has made a written request to the agency which maintains the record specifying the particular portion desired and the law enforcement activity for which the record is sought[.]" So a separate written request for each "portion" of any individual record that describes the "law enforcement activity for which the record is sought[.]" That doesn't sound like the contemplated unfettered access to bulk raw data. And it gets even better, with a right to sue for any violation, attorney fees and expenses, and a statutory minimum of $1,000 damages per violation just for winning the case.  
Paul Merrell

War Gear Flows to Police Departments - NYTimes.com - 0 views

  • During the Obama administration, according to Pentagon data, police departments have received tens of thousands of machine guns; nearly 200,000 ammunition magazines; thousands of pieces of camouflage and night-vision equipment; and hundreds of silencers, armored cars and aircraft. The equipment has been added to the armories of police departments that already look and act like military units. Police SWAT teams are now deployed tens of thousands of times each year, increasingly for routine jobs.
  • As the nation’s wars abroad wind down, many of the military’s surplus tools of combat have ended up in the hands of state and local law enforcement. Totals below are the minimum number of pieces acquired since 2006 in a selection of categories.
  • Congress created the military-transfer program in the early 1990s, when violent crime plagued America’s cities and the police felt outgunned by drug gangs. Today, crime has fallen to its lowest levels in a generation, the wars have wound down, and despite current fears, the number of domestic terrorist attacks has declined sharply from the 1960s and 1970s.Continue reading the main story Police departments, though, are adding more firepower and military gear than ever. Some, especially in larger cities, have used federal grant money to buy armored cars and other tactical gear. And the free surplus program remains a favorite of many police chiefs who say they could otherwise not afford such equipment.
  • ...4 more annotations...
  • The number of SWAT teams has skyrocketed since the 1980s, according to studies by Peter B. Kraska, an Eastern Kentucky University professor who has been researching the issue for decades.The ubiquity of SWAT teams has changed not only the way officers look, but also the way departments view themselves. Recruiting videos feature clips of officers storming into homes with smoke grenades and firing automatic weapons.
  • The Pentagon program does not push equipment onto local departments. The pace of transfers depends on how much unneeded equipment the military has, and how much the police request. Equipment that goes unclaimed typically is destroyed. So police chiefs say their choice is often easy: Ask for free equipment that would otherwise be scrapped, or look for money in their budgets to prepare for an unlikely scenario.
  • Pentagon data suggest how the police are arming themselves for such worst-case scenarios. Since 2006, the police in six states have received magazines that carry 100 rounds of M-16 ammunition, allowing officers to fire continuously for three times longer than normal. Twenty-two states obtained equipment to detect buried land mines.Continue reading the main story Continue reading the main story AdvertisementIn the Indianapolis suburbs, officers said they needed a mine-resistant vehicle to protect against a possible attack by veterans returning from war.
  • The police in 38 states have received silencers, which soldiers use to muffle gunfire during raids and sniper attacks.
Paul Merrell

Obama May Find It Impossible to Mend Frayed Ties to Netanyahu - NYTimes.com - 0 views

  • But now that Mr. Netanyahu has won after aggressively campaigning against a Palestinian state and Mr. Obama’s potential nuclear deal with Iran, the question is whether the president and prime minister can ever repair their relationship — and whether Mr. Obama will even try.On Wednesday, part of the answer seemed to be that the president would not make the effort. Continue reading the main story Related Coverage Win in Israel Sets Netanyahu on Path to Rebuild and Redefine GovernmentMARCH 18, 2015 Palestinian Leaders See Validation of Their Statehood EffortMARCH 18, 2015 Netanyahu Soundly Defeats Chief Rival in Israeli ElectionsMARCH 17, 2015 News Analysis: Deep Wounds and Lingering Questions After Israel’s Bitter RaceMARCH 17, 2015 In strikingly strong criticism, the White House called Mr. Netanyahu’s campaign rhetoric, in which he railed against Israeli Arabs because they went out to vote, an attempt to “marginalize Arab-Israeli citizens” and inconsistent with the values that bind Israel and the United States. The White House press secretary, Josh Earnest, told reporters traveling with Mr. Obama on Air Force One on Wednesday that Mr. Netanyahu’s statement was “deeply concerning and it is divisive and I can tell you that these are views the administration intends to communicate directly to the Israelis.”
  • And with Mr. Netanyahu’s last-minute turnaround against a Palestinian state alongside Israel, several administration officials said that the Obama administration may now agree to passage of a United Nations Security Council resolution embodying principles of a two-state solution that would be based on the pre-1967 lines between Israel and the West Bank and Gaza Strip and mutually agreed swaps.Most foreign policy experts say that Israel would have to cede territory to the Palestinians in exchange for holding on to major Jewish settlement blocks in the West Bank.
  • Such a Security Council resolution would be anathema to Mr. Netanyahu. Although the principles are United States policy, until now officials would never have endorsed them in the United Nations because the action would have been seen as too antagonistic to Israel.Continue reading the main story “The premise of our position internationally has been to support direct negotiations between the Israelis and the Palestinians,” a senior White House official said. “We are now in a reality where the Israeli government no longer supports direct negotiations. Therefore we clearly have to factor that into our decisions going forward.”
  • ...7 more annotations...
  • Administration officials said that although the relationship between Israel and the United States would remain strong, it would not be managed by Mr. Obama and Mr. Netanyahu. Instead it would be left to Secretary of State John Kerry, one of Mr. Netanyahu’s only remaining friends in the administration, and to Pentagon officials who handle the close military alliance with Israel. “The president is a pretty pragmatic person and if he felt it would be useful, he will certainly engage,” said a senior administration official, who asked not to be identified while discussing Mr. Obama’s opinions of Mr. Netanyahu. “But he’s not going to waste his time.”
  • Another source of administration anger is Ron Dermer, Israel’s ambassador to Washington and an American-born former Republican political operative. Some administration officials said that it would improve the atmosphere if Mr. Dermer stepped down — he helped orchestrate an invitation from Speaker John A. Boehner to have Mr. Netanyahu address Congress without first consulting the White House — but it would not change the underlying divisions over policy.
  • Despite the fractured relationship between Mr. Obama and Mr. Netanyahu, Israel, which has received more American aid since the end of World War II than any other country, will continue to get more than $3 billion annually in mostly military funding. In addition, the United States military will continue to work closely with the Israel Defense Forces to maintain Israel’s military edge against its regional adversaries.Foreign policy experts said that the United States would for the most part continue to side with Israel internationally, even as a growing number of European allies seek to pressure Israel to stop settlement expansion in the West Bank and to recognize Palestinian statehood.
  • But Daniel Levy, a former Israeli peace negotiator who is now the head of the Middle East and North Africa program at the European Council on Foreign Relations, warned that the administration’s patience was growing thin. “What the Obama administration is saying is that, ‘Yes, we’re still committed to you,’ ” Mr. Levy said. “But if you don’t give us something to work with, we can’t continue to carry the rest of the world for you.”Mr. Netanyahu’s objections to a nuclear deal with Iran, and his decision to firmly ally himself with Mr. Obama’s Republican opponents in expressing his ire over the Iran talks, may well have hardened the president’s decision to push for an agreement, one Obama adviser said Wednesday. At the very least, Mr. Netanyahu’s opposition has done nothing to steer Mr. Obama away from his preferred course of reining in Iran’s nuclear ambitions through an international agreement that would sharply limit Tehran’s ability to produce nuclear fuel for at least 10 years, in exchange for a gradual easing of economic sanctions. Mr. Kerry and Mohammad Javad Zarif, the Iranian foreign minister, are continuing talks in Lausanne, Switzerland, this week with the goal of reaching an agreement by the end of the month.
  • “We do think we’re going to get something,” one senior administration official said. He noted, pointedly, “We are backed by the P-5 plus 1” — using the diplomatic moniker for Britain, France, Russia, China and Germany, and the United States. Mr. Netanyahu, the official added, should “look carefully” at his own anti-deal coalition, which, besides congressional Republicans, consists mostly of the Sunni Arab states that all detest Israel but lately have come to fear a rising Iran more.
  • Although Mr. Netanyahu is certain to be a major critic of any Iran agreement and to push Republicans in Congress to oppose it, Aaron David Miller, a former State Department official who is now a vice president at the Woodrow Wilson International Center for Scholars, said that in the end the Israeli leader would not get his way. “You will have an Iran deal,” Mr. Miller said. ”The Israelis will not like it. But in the end, Israel will not be able to block it.”That is in part because the administration expects lawmakers will be reluctant to reject a deal for fear that they would be held responsible for what could happen after — either a nuclear-armed Iran or war with Iran.
  • After Iran, administration officials said the next major confrontation with Mr. Netanyahu would most likely be over continued Israeli settlement building in the West Bank. The Palestinians plan to file a case in the International Criminal Court in April contending that the settlements are a continuing war crime.Martin S. Indyk, Mr. Obama’s former special envoy on recent negotiations between the Israelis and the Palestinians and now the executive vice president of the Brookings Institution, said that although the United States would always be a strong supporter of Israel, Mr. Netanyahu was in dangerous terrain. “Israel does not need to be, and should not aspire to be, a nation that dwells alone,” Mr. Indyk said.
  •  
    Haven't made my way back to it yet, but Obama called Netanyahu to congratulate him on reelection, but gave him some marching orders, then the White House leaked enough to make it clear that the tail is no longer wagging the dog.  Coupled with this NY Times piece yesterday, Netanyahu undoubtedly got the message. He did a 180 degree about face today.
Paul Merrell

File Says N.S.A. Found Way to Replace Email Program - The New York Times - 0 views

  • When the National Security Agency’s bulk collection of records about Americans’ emails came to light in 2013, the government conceded the program’s existence but said it had shut down the effort in December 2011 for “operational and resource reasons.” While that particular secret program stopped, newly disclosed documents show that the N.S.A. had found a way to create a functional equivalent. The shift has permitted the agency to continue analyzing social links revealed by Americans’ email patterns, but without collecting the data in bulk from American telecommunications companies — and with less oversight by the Foreign Intelligence Surveillance Court.
  • The disclosure comes as a sister program that collects Americans’ phone records in bulk is set to end this month. Under a law enacted in June, known as the U.S.A. Freedom Act, the program will be replaced with a system in which the N.S.A. can still gain access to the data to hunt for associates of terrorism suspects, but the bulk logs will stay in the hands of phone companies.The newly disclosed information about the email records program is contained in a report by the N.S.A.’s inspector general that was obtained by The New York Times through a lawsuit under the Freedom of Information Act. One passage lists four reasons that the N.S.A. decided to end the email program and purge previously collected data. Three were redacted, but the fourth was uncensored. It said that “other authorities can satisfy certain foreign intelligence requirements” that the bulk email records program “had been designed to meet.”The report explained that there were two other legal ways to get such data. One was the collection of bulk data that had been gathered in other countries, where the N.S.A.’s activities are largely not subject to regulation by the Foreign Intelligence Surveillance Act and oversight by the intelligence court. Because of the way the Internet operates, domestic data is often found on fiber optic cables abroad.
  • The N.S.A. had long barred analysts from using Americans’ data that had been swept up abroad, but in November 2010 it changed that rule, documents leaked by Edward J. Snowden have shown. The inspector general report cited that change to the N.S.A.’s internal procedures.The other replacement source for the data was collection under the FISA Amendments Act of 2008, which permits warrantless surveillance on domestic soil that targets specific noncitizens abroad, including their new or stored emails to or from Americans.“Thus,” the report said, these two sources “assist in the identification of terrorists communicating with individuals in the United States, which addresses one of the original reasons for establishing” the bulk email records program.
  • ...2 more annotations...
  • Timothy Edgar, a privacy official in the Office of the Director of National Intelligence in both the George W. Bush and Obama administrations who now teaches at Brown University, said the explanation filled an important gap in the still-emerging history of post-Sept. 11, 2001, surveillance. Advertisement Continue reading the main story Advertisement Continue reading the main story “The document makes it clear that N.S.A. is able to get all the Internet metadata it needs through foreign collection,” he said. “The change it made to its procedures in 2010 allowed it to exploit metadata involving Americans. Once that change was made, it was no longer worth the effort to collect Internet metadata inside the United States, in part because doing so requires N.S.A. to deal with” restrictions by the intelligence court.Observers have previously suggested that the N.S.A.’s November 2010 rules change on the use of Americans’ data gathered abroad might be connected to the December 2011 end of the bulk email records program. Marcy Wheeler of the national security blog Emptywheel, for example, has argued that this was probably what happened.
  • And officials, who spoke on the condition of anonymity to discuss sensitive collection programs, have said the rules change and the FISA Amendments Act helped make the email records program less valuable relative to its expense and trouble. The newly disclosed documents amount to official confirmation.
Paul Merrell

WikiLeaks Cables Portray Saudi Arabia As A Cash Machine For Terrorists - 0 views

  • Saudi Arabia is the world’s largest source of funds for Islamist militant groups such as the Afghan Taliban and Lashkar-e-Taiba – but the Saudi government is reluctant to stem the flow of money, according to Hillary Clinton. “More needs to be done since Saudi Arabia remains a critical financial support base for al-Qaida, the Taliban, LeT and other terrorist groups,” says a secret December 2009 paper signed by the US secretary of state. Her memo urged US diplomats to redouble their efforts to stop Gulf money reaching extremists in Pakistan and Afghanistan.
  • “Donors in Saudi Arabia constitute the most significant source of funding to Sunni terrorist groups worldwide,” she said. Three other Arab countries are listed as sources of militant money: Qatar, Kuwait and the United Arab Emirates. The cables highlight an often ignored factor in the Pakistani and Afghan conflicts: that the violence is partly bankrolled by rich, conservative donors across the Arabian Sea whose governments do little to stop them. The problem is particularly acute in Saudi Arabia, where militants soliciting funds slip into the country disguised as holy pilgrims, set up front companies to launder funds and receive money from government-sanctioned charities. One cable details how the Pakistani militant outfit Lashkar-e-Taiba, which carried out the 2008 Mumbai attacks, used a Saudi-based front company to fund its activities in 2005. Meanwhile officials with the LeT’s charity wing, Jamaat-ud-Dawa, travelled to Saudi Arabia seeking donations for new schools at vastly inflated costs – then siphoned off the excess money to fund militant operations. Militants seeking donations often come during the hajj pilgrimage – “a major security loophole since pilgrims often travel with large amounts of cash and the Saudis cannot refuse them entry into Saudi Arabia”. Even a small donation can go far: LeT operates on a budget of just $5.25m (£3.25m) a year, according to American estimates.
  • Saudi officials are often painted as reluctant partners. Clinton complained of the “ongoing challenge to persuade Saudi officials to treat terrorist funds emanating from Saudi Arabia as a strategic priority”. Washington is critical of the Saudi refusal to ban three charities classified as terrorist entities in the US. “Intelligence suggests that these groups continue to send money overseas and, at times, fund extremism overseas,” she said. There has been some progress. This year US officials reported that al-Qaida’s fundraising ability had “deteriorated substantially” since a government crackdown. As a result Bin Laden’s group was “in its weakest state since 9/11” in Saudi Arabia. Any criticisms are generally offered in private. The cables show that when it comes to powerful oil-rich allies US diplomats save their concerns for closed-door talks, in stark contrast to the often pointed criticism meted out to allies inPakistan and Afghanistan. Instead, officials at the Riyadh embassy worry about protecting Saudi oilfields from al-Qaida attacks. The other major headache for the US in the Gulf region is the United Arab Emirates. The Afghan Taliban and their militant partners the Haqqani network earn “significant funds” through UAE-based businesses, according to one report. The Taliban extort money from the large Pashtun community in the UAE, which is home to 1 million Pakistanis and 150,000 Afghans. They also fundraise by kidnapping Pashtun businessmen based in Dubai or their relatives.
  • ...2 more annotations...
  • “Some Afghan businessmen in the UAE have resorted to purchasing tickets on the day of travel to limit the chance of being kidnapped themselves upon arrival in either Afghanistan or Pakistan,” the report says. Last January US intelligence sources said two senior Taliban fundraisers hadregularly travelled to the UAE, where the Taliban and Haqqani networkslaundered money through local front companies. One report singled out a Kabul-based “Haqqani facilitator”, Haji Khalil Zadran, as a key figure. But, Clinton complained, it was hard to be sure: the UAE’s weak financial regulation and porous borders left US investigators with “limited information” on the identity of Taliban and LeT facilitators. The lack of border controls was “exploited by Taliban couriers and Afghan drug lords camouflaged among traders, businessmen and migrant workers”, she said. In an effort to stem the flow of funds American and UAE officials are increasinglyco-operating to catch the “cash couriers” – smugglers who fly giant sums of money into Pakistan and Afghanistan.
  • In common with its neighbours Kuwait is described as a “source of funds and a key transit point” for al-Qaida and other militant groups. While the government has acted against attacks on its own soil, it is “less inclined to take action against Kuwait-based financiers and facilitators plotting attacks outside of Kuwait”. Kuwait has refused to ban the Revival of Islamic Heritage Society, a charity the US designated a terrorist entity in June 2008 for providing aid to al-Qaida and affiliated groups, including LeT. There is little information about militant fundraising in the fourth Gulf country singled out, Qatar, other than to say its “overall level of CT co-operation with the US is considered the worst in the region”. The funding quagmire extends to Pakistan itself, where the US cables detail sharp criticism of the government’s ambivalence towards funding of militant groups that enjoy covert military support. The cables show how before the Mumbai attacks in 2008, Pakistani and Chinese diplomats manoeuvred hard to block UN sanctions against Jamaat-ud-Dawa. But in August 2009, nine months after sanctions were finally imposed, US diplomats wrote: “We continue to see reporting indicating that JUD is still operating in multiple locations in Pakistan and that the group continues to openly raise funds”. JUD denies it is the charity wing of LeT.
  •  
    Question for Hillary: Since you have known at least since December, 2009 that these Arab nations are funding al Qaida and its offshoot organizations, if elected will you impose strong sanctions on them to halt their funding of terrorism?
Paul Merrell

Whether to Go to War Against Russia Is Top Issue in U.S. Presidential Race | Global Res... - 0 views

  • The United States government has already declared that in regards to what it alleges to be a Russian cyberattack against the U.S. Democratic Party, the U.S. reserves the right to go to war against Russia. NATO has accordingly changed its policy so as to assert that a cyberattack (in this case actually cyber-espionage, such as the U.S. government itself perpetrates against even its own allies such as Angela Merkel by tapping her phone) constitutes an act of war by the alleged cyberattacker, and so requires all NATO member nations to join any cyberattacked NATO nation in war against its alleged (cyber)attacker, if the cyberattacked member declares war against its alleged cyberattacker. Excuses are being sought for a war against Russia; and expanding the definition of “invasion,” to include mere espionage, is one such excuse. But it’s not the only one that the Obama Administration has cooked up. U.S. Senator Mike Lee has asserted that President Barack Obama must obtain a declaration of war against Syria — which is allied with and defended by Russia — before invading Syria. Syria has, for the past few years, already been invaded by tens of thousands of foreign jihadists (financed mainly by the royal Sauds and Qataris, and armed mainly with U.S. weaponry) who are trying to overthrow and replace the Syrian government so that pipelines can be built through Syria into Europe to transport Saudi oil and Qatari gas into the EU, the world’s biggest energy-market, which now is dominated by Russia’s oil and gas. Since Syria is already being defended by Russia (those royals’ major competitor in the oil and gas markets), America’s invasion of Syria would necessarily place U.S. and Russia into an air-war against each other (for the benefit of those royal Arabs — who finance jihadist groups, as even Hillary Clinton acknowledges): Syria would thus become a battleground in a broader war against Russia. So: declaring war against Syria would be a second excuse for World War III, and one which would especially serve the desires not only of U.S. ‘defense’ firms but of the U.S. aristocracy’s royal Arabic allies, who buy much of those ‘defense’ firms’ exports (weaponry), and also U.S. oilfield services firms such as pipelines by Halliburton. (It’s good business for them, no one else. Taxpayers and war-victims pay, but those corporations — and royal families — would profit.)
  • The U.S. government also declares that Russia ‘conquered’ Crimea in 2014 and that Russia must restore it to Ukraine. The U.S. government wants Ukraine to be accepted into NATO, so that all NATO nations will be at war against Russia if Russia doesn’t return Crimea to Ukraine, of which Crimea had only briefly (1954-2014) been a part, until Crimeans voted on 16 March 2014 to rejoin Russia. This Crimean issue is already the basis for America’s economic sanctions against Russia, and thus Russia’s continuing refusal to coerce Crimeans to accept again being part of Ukraine would be yet a third excuse for WW III.
  • Hillary Clinton says “As President, I will make it clear, that the United States will treat cyber attacks just like any other attack.” She alleges that when information was unauthorizedly made public from Democratic National Committee computers, the cyberattacker was Russia. She can be counted as a strong proponent of that excuse for WW3. She’s with Barack Obama and the other neocons on that. She has furthermore said that the U.S. should shoot down any Russian and Syrian bombers in Syria — the phrase for that proposed U.S. policy is to “establish a no-fly zone” there. She makes clear: “I am advocating the no-fly zone.” It would be war against not only Syria, but Russia. (After all: a no-fly zone in which the U.S. is shooting down the government’s planes and Russia’s planes, would be war by the U.S. against both Syria and Russia, but that’s what she wants to do.) She can thus be counted as a strong proponent of those two excuses for WW3.
  • ...4 more annotations...
  • On the matter of Crimea, she has said that “Putin invaded and annexed Crimea,” and “In the wake of Russia’s illegal annexation of Crimea in early 2014, some have argued that NATO expansion either caused or exacerbated Russia’s aggression. I disagree with that argument.” She believes that the expansion of NATO right up to Russia’s borders is good, not horrific and terrifying (as it is to Russians — just like USSR’s conquering of Mexico would have been terrifying to Americans if USSR did that during the Cold War). Furthermore, because Ukraine is the main transit-route for Russian gas-pipelines into Europe, the coup that in 2014 overthrew the neutralist democratically elected President of Ukraine and replaced him by leaders who seek NATO membership for Ukraine and who have the power to cut off those pipelines, was strongly supported by both Obama and Clinton. She can thus be counted as a strong proponent of all three excuses for WW3. U.S. President Obama has made unequivocally clear that he regards Russia as being by far the world’s most “aggressive” nation; and Clinton, too, commonly uses the term “aggression” as describing Russia (such as she did by her denial that “NATO expansion either caused or exacerbated Russia’s aggression”). To her, Russia’s opposing real aggression by the U.S. (in this case, America’s 2014 coup that overthrew the democratically elected Ukrainian President for whom 75% of Crimeans had voted), constitutes ‘Russia’s aggression’, somehow. Furthermore, as regards whether Crimea’s rejoining Russia was ‘illegal’ as she says: does she also deny the right of self-determination of peoples regarding the residents of Catalonia though the Spanish government accepts it there, and also by the residents of Scotland though the British government accepts it there? Or is she simply determined to have as many excuses to invade Russia as she can have? She has never condemned the independence movements in Scotland or Catalonia. The United States is clearly on a path toward war with Russia. Donald Trump opposes all aspects of that policy.
  • That’s the main difference between the two U.S. Presidential candidates. Trump makes ridiculous statements about the ‘need’ to increase ‘defense’ spending during this period of soaring federal debt, but he has consistently condemned the moves toward war against Russia and said that America’s real enemy is jihadists, and that Russia is on our side in this war — the real war — not an enemy of America such as Hillary Clinton and Barack Obama claim. Both candidates (Trump and Clinton) are war-hawks, but Hillary wants to go to war against both jihadists and Russia, whereas Trump wants to go to war only against jihadists. Trump’s charge that Hillary would be a catastrophic President is borne out not only by her past record in public office, but by her present positions on these issues.
  • Americans are being offered, by this nation’s aristocracy, a choice between a marginally competent and deeply evil psychopath Hillary Clinton, versus an incompetent but far less evil psychopath Donald Trump, and the nation’s press are reporting instead a choice between two candidates of whom one (the actually evil Clinton) is presented as being far preferable to the other (the actually incompetent Trump), and possibly as being someone who might improve this nation if not the world. Virtually none of America’s Establishment is willing to report the truth: that the nation’s rotting will get worse under either person as President, but that only under Trump might this nation (and the world) stand a reasonable likelihood of surviving at all (i.e., nuclear war with Russia being averted). Things won’t get better, but they definitely could get a hell of a lot worse — and this is the issue, the real one, in the present election: WW3, yes or no on that. Hillary Clinton argues that she, with her neoconservative backing (consisting of the same people who cheer-led the invasion of Russia-friendly Iraq, and who shared her joy in doing the same to Russia-friendly Libya — “We came, we saw, he died, ha ha!”), is the better person to have her finger on the nuclear button with Russia. This U.S. Presidential election will be decided upon the WW3-issue, unless the American electorate are incredibly stupid (or else terribly deceived): Is she correct to allege that she and not Trump should have control over the nuclear button against Russia? She’s even more of a neoconservative than Obama is, and this is why she has the endorsement of neoconservatives in this election. And that is the issue.
  • The real question isn’t whether America and the world will be improved by the next U.S. President; it’s whether America and the world will be destroyed by the next U.S. President. All else is mere distraction, by comparison. And the U.S. public now are extremely distracted — unfortunately, even by the candidates themselves. The pathetic Presidential candidates that the U.S. aristocracy has provided to Americans, for the public’s votes in the final round, don’t focus on this reality. Anyone who thinks that the majority of billionaires can’t possibly believe in a ‘winnable’ nuclear war and can’t possibly be wanting WW3 should read this. That was published by the Council on Foreign Relations, Wall Street’s international-affairs think tank. They mean business. And that’s the source of neoconservatism — the top U.S.-based international corporations, mainly in ‘defense’ and oil and Wall Street. (Clinton’s career is based upon precisely those three segments, whereas Trump’s is based instead upon real estate and entertainment, neither of which segments is neoconservative.) It doesn’t come from nowhere; it comes from the people who buy and sell politicians.
  •  
    A must-read
Paul Merrell

EU issues guidelines on labelling products from Israeli settlements | World news | The ... - 0 views

  • The European Union has issued new guidelines for the labelling of products from illegal Israeli settlements in the occupied Palestinian territories, after years of deliberation and in the teeth of fierce Israeli opposition. Binyamin Netanyahu, the Israeli prime minister, made a personal appeal to a number of key European figures in the runup to the decision, in which he said the plan was discriminatory, indicative of double standards, and would embolden those who seek to “eliminate” Israel. The measures will primarily cover fruit and vegetables and should affect less than 1% of all trade from Israel to the EU, which is worth about €30bn. EU officials said existing measures for produce brought into Britain have had no negative economic effect.
  • On some products, like fruit and vegetables, the labelling referring to settlements will be mandatory, while on others it will be voluntary. Israel sees the move as a political stigma that rewards Palestinian violence and will push consumers away. It immediately summoned the EU ambassador to Israel, Lars Faaborg-Andersen, in protest. The Israeli foreign ministry said the EU has chosen “for political motives, to take an unusual and discriminatory step” at a time when Israel is facing a wave of terror. In a statement, the ministry said it was “surprised and even angered by the fact that the EU chooses to implement a double standard against Israel, while ignoring 200 territorial disputes taking place today around the world, including within [the EU] or right on [Israel’s] doorstep”. The EU’s claim that the decision was a “technical step” was baseless and cynical, the statement added.
  • Despite insisting in public that the new guidelines provide clarity to consumers, European diplomats have privately made it clear the move is designed to put pressure on Israel over its continued settlement building in the occupied territories and the absence of a peace dialogue; a sharp rise in violence between Israelis and Palestinians has claimed 90 lives in the last month. Announcing the new guidelines, a European commission official said it had “adopted this morning the Interpretative Notice on indication of origin of goods from the territories occupied by Israel since June 1967”. Although the new guidelines are expected to have little real economic impact, they do carry a political significance for Israel, not least because of the widespread agreement among European governments over their implementation. The decision to push ahead with issuing the guidelines also marks the second major defeat in a year for Netanyahu on an international stage, following his defeat over the Iran nuclear accord, amid mounting evidence of Israel’s growing international isolation.
  • ...2 more annotations...
  • Senior European officials insist that European consumers are entitled to know the source of goods previously labelled as Israeli. Israeli politicians – including Netanyahu – have made comparisons between labelling and the Nazi era, with some suggesting the move is immoral and antisemitic.
  • On Tuesday, a letter leaked to the Guardian showed that Netanyahu had written or spoken to a number of senior European figures, including European parliament president Martin Schulz, asking for their help to block the move. In a letter to Schulz, the Israeli prime minister said the move was politicised, adding that it could “lead to an actual boycott [of Israel], emboldening those who are not interested in Israeli-Palestinian peace but eliminating Israel altogether”. Since 2003, the EU has placed a numerical code on Israeli imports to allow customs to distinguish between products made within the Green Line and those that are produced beyond it. The UK adopted labelling guidelines for settlement products three years ago.
  •  
    Too mild. Under international law, the EU should do a total ban on importing all products from the Occupied Territories. 
Paul Merrell

N.S.A. Devises Radio Pathway Into Computers - NYTimes.com - 1 views

  • The National Security Agency has implanted software in nearly 100,000 computers around the world that allows the United States to conduct surveillance on those machines and can also create a digital highway for launching cyberattacks.While most of the software is inserted by gaining access to computer networks, the N.S.A. has increasingly made use of a secret technology that enables it to enter and alter data in computers even if they are not connected to the Internet, according to N.S.A. documents, computer experts and American officials.The technology, which the agency has used since at least 2008, relies on a covert channel of radio waves that can be transmitted from tiny circuit boards and USB cards inserted surreptitiously into the computers. In some cases, they are sent to a briefcase-size relay station that intelligence agencies can set up miles away from the target.
  • The radio frequency technology has helped solve one of the biggest problems facing American intelligence agencies for years: getting into computers that adversaries, and some American partners, have tried to make impervious to spying or cyberattack. In most cases, the radio frequency hardware must be physically inserted by a spy, a manufacturer or an unwitting user.
  • The N.S.A. and the Pentagon’s Cyber Command have implanted nearly 100,000 “computer network exploits” around the world, but the hardest problem is getting inside machines isolated from outside communications.
  • ...8 more annotations...
  • the program, code-named Quantum, has also been successful in inserting software into Russian military networks and systems used by the Mexican police and drug cartels, trade institutions inside the European Union, and sometime partners against terrorism like Saudi Arabia, India and Pakistan, according to officials and an N.S.A. map that indicates sites of what the agency calls “computer network exploitation.”“What’s new here is the scale and the sophistication of the intelligence agency’s ability to get into computers and networks to which no one has ever had access before,” said James Andrew Lewis, the cybersecurity expert at the Center for Strategic and International Studies in Washington. “Some of these capabilities have been around for a while, but the combination of learning how to penetrate systems to insert software and learning how to do that using radio frequencies has given the U.S. a window it’s never had before.”
  • Over the past two months, parts of the program have been disclosed in documents from the trove leaked by Edward J. Snowden, the former N.S.A. contractor. A Dutch newspaper published the map of areas where the United States has inserted spy software, sometimes in cooperation with local authorities, often covertly. Der Spiegel, a German newsmagazine, published the N.S.A.'s catalog of hardware products that can secretly transmit and receive digital signals from computers, a program called ANT. The New York Times withheld some of those details, at the request of American intelligence officials, when it reported, in the summer of 2012, on American cyberattacks on Iran.
  • A program named Treasure Map tried to identify nearly every node and corner of the web, so that any computer or mobile device that touched it could be located.
  • A 2008 map, part of the Snowden trove, notes 20 programs to gain access to big fiber-optic cables — it calls them “covert, clandestine or cooperative large accesses” — not only in the United States but also in places like Hong Kong, Indonesia and the Middle East. The same map indicates that the United States had already conducted “more than 50,000 worldwide implants,” and a more recent budget document said that by the end of last year that figure would rise to about 85,000. A senior official, who spoke on the condition of anonymity, said the actual figure was most likely closer to 100,000.
  • The N.S.A.'s efforts to reach computers unconnected to a network have relied on a century-old technology updated for modern times: radio transmissions.In a catalog produced by the agency that was part of the Snowden documents released in Europe, there are page after page of devices using technology that would have brought a smile to Q, James Bond’s technology supplier.
  • One, called Cottonmouth I, looks like a normal USB plug but has a tiny transceiver buried in it. According to the catalog, it transmits information swept from the computer “through a covert channel” that allows “data infiltration and exfiltration.” Another variant of the technology involves tiny circuit boards that can be inserted in a laptop computer — either in the field or when they are shipped from manufacturers — so that the computer is broadcasting to the N.S.A. even while the computer’s user enjoys the false confidence that being walled off from the Internet constitutes real protection.The relay station it communicates with, called Nightstand, fits in an oversize briefcase, and the system can attack a computer “from as far away as eight miles under ideal environmental conditions.” It can also insert packets of data in milliseconds, meaning that a false message or piece of programming can outrace a real one to a target computer. Similar stations create a link between the target computers and the N.S.A., even if the machines are isolated from the Internet.
  • Computers are not the only targets. Dropoutjeep attacks iPhones. Other hardware and software are designed to infect large network servers, including those made by the Chinese.Most of those code names and products are now at least five years old, and they have been updated, some experts say, to make the United States less dependent on physically getting hardware into adversaries’ computer systems.
  • But the Stuxnet strike does not appear to be the last time the technology was used in Iran. In 2012, a unit of the Islamic Revolutionary Guards Corps moved a rock near the country’s underground Fordo nuclear enrichment plant. The rock exploded and spewed broken circuit boards that the Iranian news media described as “the remains of a device capable of intercepting data from computers at the plant.” The origins of that device have never been determined.
  •  
    Even radio transceivers emplanted in USB jacks. So now to be truly secure, we need not only an air gap but also a Faraday cage protecting the air gap. 
Paul Merrell

NSA shares raw intelligence including Americans' data with Israel | World news | The Gu... - 0 views

  • The National Security Agency routinely shares raw intelligence data with Israel without first sifting it to remove information about US citizens, a top-secret document provided to the Guardian by whistleblower Edward Snowden reveals.Details of the intelligence-sharing agreement are laid out in a memorandum of understanding between the NSA and its Israeli counterpart that shows the US government handed over intercepted communications likely to contain phone calls and emails of American citizens. The agreement places no legally binding limits on the use of the data by the Israelis.The disclosure that the NSA agreed to provide raw intelligence data to a foreign country contrasts with assurances from the Obama administration that there are rigorous safeguards to protect the privacy of US citizens caught in the dragnet. The intelligence community calls this process "minimization", but the memorandum makes clear that the information shared with the Israelis would be in its pre-minimized state.
  • The deal was reached in principle in March 2009, according to the undated memorandum, which lays out the ground rules for the intelligence sharing.The five-page memorandum, termed an agreement between the US and Israeli intelligence agencies "pertaining to the protection of US persons", repeatedly stresses the constitutional rights of Americans to privacy and the need for Israeli intelligence staff to respect these rights.But this is undermined by the disclosure that Israel is allowed to receive "raw Sigint" – signal intelligence. The memorandum says: "Raw Sigint includes, but is not limited to, unevaluated and unminimized transcripts, gists, facsimiles, telex, voice and Digital Network Intelligence metadata and content."According to the agreement, the intelligence being shared would not be filtered in advance by NSA analysts to remove US communications. "NSA routinely sends ISNU [the Israeli Sigint National Unit] minimized and unminimized raw collection", it says.
  • In a statement to the Guardian, an NSA spokesperson did not deny that personal data about Americans was included in raw intelligence data shared with the Israelis. But the agency insisted that the shared intelligence complied with all rules governing privacy."Any US person information that is acquired as a result of NSA's surveillance activities is handled under procedures that are designed to protect privacy rights," the spokesperson said.The NSA declined to answer specific questions about the agreement, including whether permission had been sought from the Foreign Intelligence Surveillance (Fisa) court for handing over such material.
  • ...3 more annotations...
  • While NSA documents tout the mutually beneficial relationship of Sigint sharing, another report, marked top secret and dated September 2007, states that the relationship, while central to US strategy, has become overwhelmingly one-sided in favor of Israel."Balancing the Sigint exchange equally between US and Israeli needs has been a constant challenge," states the report, titled 'History of the US – Israel Sigint Relationship, Post-1992'. "In the last decade, it arguably tilted heavily in favor of Israeli security concerns. 9/11 came, and went, with NSA's only true Third Party [counter-terrorism] relationship being driven almost totally by the needs of the partner."
  • In another top-secret document seen by the Guardian, dated 2008, a senior NSA official points out that Israel aggressively spies on the US. "On the one hand, the Israelis are extraordinarily good Sigint partners for us, but on the other, they target us to learn our positions on Middle East problems," the official says. "A NIE [National Intelligence Estimate] ranked them as the third most aggressive intelligence service against the US."Later in the document, the official is quoted as saying: "One of NSA's biggest threats is actually from friendly intelligence services, like Israel. There are parameters on what NSA shares with them, but the exchange is so robust, we sometimes share more than we intended."
  • The Guardian asked the Obama administration how many times US data had been found in the raw intelligence, either by the Israelis or when the NSA reviewed a sample of the files, but officials declined to provide this information. Nor would they disclose how many other countries the NSA shared raw data with, or whether the Fisa court, which is meant to oversee NSA surveillance programs and the procedures to handle US information, had signed off the agreement with Israel.In its statement, the NSA said: "We are not going to comment on any specific information sharing arrangements, or the authority under which any such information is collected. The fact that intelligence services work together under specific and regulated conditions mutually strengthens the security of both nations."NSA cannot, however, use these relationships to circumvent US legal restrictions. Whenever we share intelligence information, we comply with all applicable rules, including the rules to protect US person information."
Paul Merrell

BP Settlement in Gulf Oil Spill Is Raised to $20.8 Billion - The New York Times - 0 views

  • The Justice Department on Monday announced a final settlement with the oil giant BP of $20.8 billion for its role in the disastrous 2010 Gulf of Mexico oil spill, raising the total from the initial $18.7 billion settlement announced in July.At either amount, it is the largest environmental settlement — and the largest civil settlement with any single entity — in the nation’s history.The United States attorney general, Loretta Lynch, called the filing of the final settlement “a major step forward in our effort to deliver justice to the gulf region in the wake of the Deepwater Horizon tragedy — the largest environmental disaster our nation has ever endured.”Gina McCarthy, the Environmental Protection Agency administrator, estimated that the final settlement represented a payment of $1,725 for each barrel of oil spilled in the disaster. The maximum amount that a judge could have assessed in the case was $4,300 a barrel.
  • The settlement resolves a 2010 lawsuit filed by the Justice Department against BP. It includes civil claims under the Clean Water Act, for which BP has agreed to pay a $5.5 billion penalty, the largest civil penalty in the history of environmental law. Also, it includes natural resources damages claims under the Oil Pollution Act, for which BP has agreed to pay $7.1 billion, on top of the $1 billion it previously committed to pay for early restoration work. Continue reading the main story Related in Opinion Editorial: BP Deal Will Lead to a Cleaner GulfJULY 8, 2015 In addition, the settlement includes economic damages claims, for which BP has agreed to pay $4.9 billion to the five gulf states — Alabama, Florida, Louisiana, Mississippi and Texas — and up to $1 billion to local governments. Louisiana, the hardest hit of the states, will receive $5 billion of the $8.8 billion allocated for restoration.Ms. Lynch said the increase in the total settlement represented a “refining of the numbers” over the initial settlement. “Over time, we refine numbers as the settlement is finalized,” she said.
  • Geoff Morrell, BP senior vice president for United States communications, said in a statement that the revised overall figure did not change the settlement announced in July, but included amounts previously spent or disclosed by the company. The settlement, he said, “resolves the largest litigation liabilities remaining from the tragic accident,” and provides the company “certainty with respect to its financial obligations.”Under the draft restoration plan, $8.8 billion would be allocated to restore the gulf ecosystem.
  • ...1 more annotation...
  • A panel responsible for assessing the damages to the gulf ecosystems found effects on the region’s wildlife, including fish, oysters, plankton, birds and sea mammals; habitat, including marshes and beaches; and recreational activities.The proposed $8.8 billion in restoration would be invested across the five gulf states over 15 years, in a range of projects intended to restore those resources.“This restoration plan ensures that the funds will be distributed in ways that make sense,” Ms. McCarthy said.
  •  
    Let's see. $20.8 billion total settlement. $8.8 billion going to environmental restoration. The Feds pocket $12 billion. And it's all pennies on the dollar in terms of ongoing damage.  The Feds, knowing that they can profit from environmental havoc committed by corporations, only paused deep ocean drilling permits for a few months, hoping for more damage to be caused by other companies.  The real scandal was and is that BP had a long and extremely well-documented history of causing environmental disasters in their pursuit of oil profits. Were there truly any environmental justice, the result would have been corporate capital punishment and virtually all of its executives in prison for the remainder of their lives, preferably at hard labor cleaning up the mess they created. But throw enough zeros after the settlement number and the human beings whose penny-pinching on safety caused the disaster walk free, free to do it all over again. They must have joined the same Too Big to Jail Golf Club that the banksters use.  
Paul Merrell

NSA infiltrates links to Yahoo, Google data centers worldwide, Snowden documents say - ... - 0 views

  • The National Security Agency has secretly broken into the main communications links that connect Yahoo and Google data centers around the world, according to documents obtained from former NSA contractor Edward Snowden and interviews with knowledgeable officials. By tapping those links, the agency has positioned itself to collect at will from hundreds of millions of user accounts, many of them belonging to Americans. The NSA does not keep everything it collects, but it keeps a lot.
  • According to a top-secret accounting dated Jan. 9, 2013, the NSA’s acquisitions directorate sends millions of records every day from internal Yahoo and Google networks to data warehouses at the agency’s headquarters at Fort Meade, Md. In the preceding 30 days, the report said, field collectors had processed and sent back 181,280,466 new records — including “metadata,” which would indicate who sent or received e-mails and when, as well as content such as text, audio and video.The NSA’s principal tool to exploit the data links is a project called MUSCULAR, operated jointly with the agency’s British counterpart, the Government Communications Headquarters . From undisclosed interception points, the NSA and the GCHQ are copying entire data flows across fiber-optic cables that carry information among the data centers of the Silicon Valley giants.
  • The infiltration is especially striking because the NSA, under a separate program known as PRISM, has front-door access to Google and Yahoo user accounts through a court-approved process. The MUSCULAR project appears to be an unusually aggressive use of NSA tradecraft against flagship American companies. The agency is built for high-tech spying, with a wide range of digital tools, but it has not been known to use them routinely against U.S. companies.
  • ...1 more annotation...
  • In a statement, Google’s chief legal officer, David Drummond, said the company has “long been concerned about the possibility of this kind of snooping” and has not provided the government with access to its systems.“We are outraged at the lengths to which the government seems to have gone to intercept data from our private fiber networks, and it underscores the need for urgent reform,” he said.
  •  
    It says later in this 3-page article that Google's data centers back up their content to each other in case one goes down. So no question that U.S. citizens' data is collected, I think. See also closely related article, Why the NSA Wanted More Access, http://www.washingtonpost.com/blogs/the-switch/wp/2013/10/30/prism-already-gave-the-nsa-access-to-tech-giants-heres-why-it-wanted-more/ ("Scooping up data is deep in the NSA's DNA, and it may simply have been unable to help itself."). See also http://apps.washingtonpost.com/g/page/world/how-the-nsas-muscular-program-collects-too-much-data-from-yahoo-and-google/543/ (excerpts from documents discussed in the main article). 
‹ Previous 21 - 40 of 1205 Next › Last »
Showing 20 items per page