Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged director

Rss Feed Group items tagged

7More

U.S. surveillance architecture includes collection of revealing Internet, phone metadat... - 0 views

  • On March 12, 2004, acting attorney general James B. Comey and the Justice Department’s top leadership reached the brink of resignation over electronic surveillance orders that they believed to be illegal. President George W. Bush backed down, halting secret foreign-intelligence-gathering operations that had crossed into domestic terrain. That morning marked the beginning of the end of STELLARWIND, the cover name for a set of four surveillance programs that brought Americans and American territory within the domain of the National Security Agency for the first time in decades. It was also a prelude to new legal structures that allowed Bush and then President Obama to reproduce each of those programs and expand their reach.What exactly STELLARWIND did has never been disclosed in an unclassified form. Which parts of it did Comey approve? Which did he shut down? What became of the programs when the crisis passed and Comey, now Obama’s expected nominee for FBI director, returned to private life?Authoritative new answers to those questions, drawing upon a classified NSA history of STELLARWIND and interviews with high-ranking intelligence officials, offer the clearest map yet of the Bush-era programs and the NSA’s contemporary U.S. operations.STELLARWIND was succeeded by four major lines of intelligence collection in the territorial United States, together capable of spanning the full range of modern telecommunications, according to the interviews and documents.
  • Two of the four collection programs, one each for telephony and the Internet, process trillions of “metadata” records for storage and analysis in systems called MAINWAY and MARINA, respectively. Metadata includes highly revealing information about the times, places, devices and participants in electronic communication, but not its contents. The bulk collection of telephone call records from Verizon Business Services, disclosed this month by the British newspaper the Guardian, is one source of raw intelligence for MAINWAY.The other two types of collection, which operate on a much smaller scale, are aimed at content. One of them intercepts telephone calls and routes the spoken words to a system called ­NUCLEON.For Internet content, the most important source collection is the PRISM project reported on June 6 by The Washington Post and the Guardian. It draws from data held by Google, Yahoo, Microsoft and other Silicon Valley giants, collectively the richest depositories of personal information in history.
  • The debate has focused on two of the four U.S.-based collection programs: PRISM, for Internet content, and the comprehensive collection of telephone call records, foreign and domestic, that the Guardian revealed by posting a classified order from the Foreign Intelligence Surveillance Court to Verizon Business Services.The Post has learned that similar orders have been renewed every three months for other large U.S. phone companies, including Bell South and AT&T, since May 24, 2006. On that day, the surveillance court made a fundamental shift in its approach to Section 215 of the Patriot Act, which permits the FBI to compel production of “business records” that are relevant to a particular terrorism investigation and to share those in some circumstances with the NSA. Henceforth, the court ruled, it would define the relevant business records as the entirety of a telephone company’s call database.The Bush administration, by then, had been taking “bulk metadata” from the phone companies under voluntary agreements for more than four years. The volume of information overwhelmed the MAINWAY database, according to a classified report from the NSA inspector general in 2009. The agency spent $146 million in supplemental counterterrorism funds to buy new hardware and contract support — and to make unspecified payments to the phone companies for “collaborative partnerships.”When the New York Times revealed the warrantless surveillance of voice calls, in December 2005, the telephone companies got nervous. One of them, unnamed in the report, approached the NSA with a request. Rather than volunteer the data, at a price, the “provider preferred to be compelled to do so by a court order,” the report said. Other companies followed suit. The surveillance court order that recast the meaning of business records “essentially gave NSA the same authority to collect bulk telephony metadata from business records that it had” under Bush’s asserted authority alone.
  • ...3 more annotations...
  • Telephone metadata was not the issue that sparked a rebellion at the Justice Department, first by Jack Goldsmith of the Office of Legal Counsel and then by Comey, who was acting attorney general because John D. Ashcroft was in intensive care with acute gallstone pancreatitis. It was Internet metadata.At Bush’s direction, in orders prepared by David Addington, the counsel to Vice President Richard B. Cheney, the NSA had been siphoning e-mail metadata and technical records of Skype calls from data links owned by AT&T, Sprint and MCI, which later merged with Verizon.For reasons unspecified in the report, Goldsmith and Comey became convinced that Bush had no lawful authority to do that.MARINA and the collection tools that feed it are probably the least known of the NSA’s domestic operations, even among experts who follow the subject closely. Yet they probably capture information about more American citizens than any other, because the volume of e-mail, chats and other Internet communications far exceeds the volume of standard telephone calls.The NSA calls Internet metadata “digital network information.” Sophisticated analysis of those records can reveal unknown associates of known terrorism suspects. Depending on the methods applied, it can also expose medical conditions, political or religious affiliations, confidential business negotiations and extramarital affairs.What permits the former and prevents the latter is a complex set of policies that the public is not permitted to see.
  • In the urgent aftermath of Sept. 11, 2001, with more attacks thought to be imminent, analysts wanted to use “contact chaining” techniques to build what the NSA describes as network graphs of people who represented potential threats.The legal challenge for the NSA was that its practice of collecting high volumes of data from digital links did not seem to meet even the relatively low requirements of Bush’s authorization, which allowed collection of Internet metadata “for communications with at least one communicant outside the United States or for which no communicant was known to be a citizen of the United States,” the NSA inspector general’s report said.Lawyers for the agency came up with an interpretation that said the NSA did not “acquire” the communications, a term with formal meaning in surveillance law, until analysts ran searches against it. The NSA could “obtain” metadata in bulk, they argued, without meeting the required standards for acquisition.Goldsmith and Comey did not buy that argument, and a high-ranking U.S. intelligence official said the NSA does not rely on it today.As soon as surveillance data “touches us, we’ve got it, whatever verbs you choose to use,” the official said in an interview. “We’re not saying there’s a magic formula that lets us have it without having it.”
  • When Comey finally ordered a stop to the program, Bush signed an order renewing it anyway. Comey, Goldsmith, FBI Director Robert S. Mueller III and most of the senior Bush appointees in the Justice Department began drafting letters of resignation.Then-NSA Director Michael V. Hayden was not among them. According to the inspector general’s classified report, Cheney’s lawyer, Addington, placed a phone call and “General Hayden had to decide whether NSA would execute the Authorization without the Attorney General’s signature.” He decided to go along.The following morning, when Mueller told Bush that he and Comey intended to resign, the president reversed himself.Three months later, on July 15, the secret surveillance court allowed the NSA to resume bulk collection under the court’s own authority. The opinion, which remains highly classified, was based on a provision of electronic surveillance law, known as “pen register, trap and trace,” that was written to allow law enforcement officers to obtain the phone numbers of incoming and outgoing calls from a single telephone line.
  •  
    Note particularly the mention that the FISA Court decision to throw the doors open for government snooping was based on "pen register, trap and trace" law. As suspected, now we are into territory dealt with by the Supreme Court in the pre-internet days of 1979 In Smith v. Maryland, 442 U.S. 735 (1979), More about that next, in a bookmark also tagged with "pen-register".
2More

Why the NSA's Defense of Mass Data Collection Makes No Sense - Bruce Schneier - The Atl... - 0 views

  • The basic government defense of the NSA's bulk-collection programs—whether it be the list of all the telephone calls you made, your email address book and IM buddy list, or the messages you send your friends—is that what the agency is doing is perfectly legal, and doesn’t really count as surveillance, until a human being looks at the data. It's what Director of National Intelligence James R. Clapper meant when he lied to Congress. When asked, "Does the NSA collect any type of data at all on millions or hundreds of millions of Americans?" he replied, "No sir, not wittingly." To him, the definition of "collect" requires that a human look at it. So when the NSA collects—using the dictionary definition of the word—data on hundreds of millions of Americans, it’s not really collecting it, because only computers process it. <div><a href="http://pubads.g.doubleclick.net/gampad/jump?iu=%2F4624%2FTheAtlanticOnline%2Fchannel_politics&t=src%3Dblog%26by%3Dbruce-schneier%26title%3Dwhy-the-nsas-defense-of-mass-data-collection-makes-no-sense%26pos%3Din-article&sz=300x185&c=898722889&tile=3" title=""><img src="http://pubads.g.doubleclick.net/gampad/ad?iu=%2F4624%2FTheAtlanticOnline%2Fchannel_politics&t=src%3Dblog%26by%3Dbruce-schneier%26title%3Dwhy-the-nsas-defense-of-mass-data-collection-makes-no-sense%26pos%3Din-article&sz=300x185&c=898722889&tile=3" alt="" /></a></div> The NSA maintains that we shouldn't worry about human processing, either, because it has rules about accessing all that data. General Keith Alexander, director of the NSA, said that in a recent New York Times interview: "The agency is under rules preventing it from investigating that so-called haystack of data unless it has a 'reasonable, articulable' justification, involving communications with terrorists abroad, he added." There are lots of things wrong with this defense.
  •  
    Bruce Schneier tackles what's wrong with the government defense of NSA bulk surveillance, in The Atlantic, and does a very nice job of it. 
6More

Judicial Watch: Benghazi Documents Point to White House on Misleading Talking Points - ... - 0 views

  • Judicial Watch announced today that on April 18, 2014, it obtained 41 new Benghazi-related State Department documents. They include a newly declassified email showing then-White House Deputy Strategic Communications Adviser Ben Rhodes and other Obama administration public relations officials attempting to orchestrate a campaign to “reinforce” President Obama and to portray the Benghazi consulate terrorist attack as being “rooted in an Internet video, and not a failure of policy.”  Other documents show that State Department officials initially described the incident as an “attack” and a possible kidnap attempt. The documents were released Friday as result of a June 21, 2013, Freedom of Information Act (FOIA) lawsuit filed against the Department of State (Judicial Watch v. U.S. Department of State (No. 1:13-cv-00951)) to gain access to documents about the controversial talking points used by then-UN Ambassador Susan Rice for a series of appearances on television Sunday news programs on September 16, 2012.  Judicial Watch had been seeking these documents since October 18, 2012. The Rhodes email was sent on sent on Friday, September 14, 2012, at 8:09 p.m. with the subject line:  “RE: PREP CALL with Susan, Saturday at 4:00 pm ET.”  The documents show that the “prep” was for Amb. Rice’s Sunday news show appearances to discuss the Benghazi attack.
  • The document lists as a “Goal”: “To underscore that these protests are rooted in and Internet video, and not a broader failure or policy.” Rhodes returns to the “Internet video” scenario later in the email, the first point in a section labeled “Top-lines”: [W]e’ve made our views on this video crystal clear. The United States government had nothing to do with it. We reject its message and its contents. We find it disgusting and reprehensible. But there is absolutely no justification at all for responding to this movie with violence. And we are working to make sure that people around the globe hear that message. Among the top administration PR personnel who received the Rhodes memo were White House Press Secretary Jay Carney, Deputy Press Secretary Joshua Earnest, then-White House Communications Director Dan Pfeiffer, then-White House Deputy Communications Director Jennifer Palmieri, then-National Security Council Director of Communications Erin Pelton, Special Assistant to the Press Secretary Howli Ledbetter, and then-White House Senior Advisor and political strategist David Plouffe. The Rhodes communications strategy email also instructs recipients to portray Obama as “steady and statesmanlike” throughout the crisis. Another of the “Goals” of the PR offensive, Rhodes says, is “[T]o reinforce the President and Administration’s strength and steadiness in dealing with difficult challenges.” He later includes as a PR “Top-line” talking point: I think that people have come to trust that President Obama provides leadership that is steady and statesmanlike. There are always going to be challenges that emerge around the world, and time and again, he has shown that we can meet them.
  • The documents Judicial Watch obtained also include a September 12, 2012, email from former Deputy Spokesman at U.S. Mission to the United Nations Payton Knopf to Susan Rice, noting that at a press briefing earlier that day, State Department spokesperson Victoria Nuland explicitly stated that the attack on the consulate had been well planned.  The email sent by Knopf to Rice at 5:42 pm said: Responding to a question about whether it was an organized terror attack, Toria said that she couldn’t speak to the identity of the perpetrators but that it was clearly a complex attack. In the days following the Knopf email, Rice appeared on ABC, CBS, NBC, Fox News and CNN still claiming the assaults occurred “spontaneously” in response to the “hateful video.” On Sunday, September 16 Rice told CBS’s “Face the Nation:” But based on the best information we have to date, what our assessment is as of the present is in fact what began spontaneously in Benghazi as a reaction to what had transpired some hours earlier in Cairo where, of course, as you know, there was a violent protest outside of our embassy–sparked by this hateful video. The Judicial Watch documents confirm that CIA talking points, that were prepared for Congress and may have been used by Rice on “Face the Nation” and four additional Sunday talk shows on September 16, had been heavily edited by then-CIA deputy director Mike Morell. According to one email: The first draft apparently seemed unsuitable….because they seemed to encourage the reader to infer incorrectly that the CIA had warned about a specific attack on our embassy.  On the SVTS, Morell noted that these points were not good and he had taken a heavy hand to editing them. He noted that he would be happy to work with [then deputy chief of staff to Hillary Clinton]] Jake Sullivan and Rhodes to develop appropriate talking points.
  • ...2 more annotations...
  • The documents obtained by Judicial Watch also contain numerous emails sent during the assault on the Benghazi diplomatic facility.  The contemporaneous and dramatic emails describe the assault as an “attack”:
  • “Now we know the Obama White House’s chief concern about the Benghazi attack was making sure that President Obama looked good,” said Judicial Watch President Tom Fitton. “And these documents undermine the Obama administration’s narrative that it thought the Benghazi attack had something to do with protests or an Internet video.  Given the explosive material in these documents, it is no surprise that we had to go to federal court to pry them loose from the Obama State Department.”
  •  
    Has there ever been a White House caught in so many lies as the Obama Administration? Maybe, in Nixon's Watergate years. But IMHO it would take a detailed study to determine the winner. It's close. 
1More

Inside Job Director Charles Ferguson With Charlie Rose: "It's A Wall Street G... - 0 views

  •  
    Great interview of Charles Ferguson, director of "Inside Job".  Stunning stuff.  if you have not yet seen this documentary, watch the interview.  Charles has some scathing remarks about Obama and his Administrations support for the Banksters.  Since the interview took place last March of 2011, two days before Charles won an Oscar for "Inside Job",  there is no discussion of the DOJ and SEC corruption we witnesses in early August of 2011.  The SEC whistleblower program discovered that the SEC destroyed volumes of evidence against the Banksters and their calculated mortgage fraud activities.   
3More

Testimony of the National Intelligence Director - NYTimes.com - 0 views

  • “Edward Snowden, Whistle-Blower” (editorial, Jan. 2) repeats the allegation that James R. Clapper Jr., the director of national intelligence, “lied” to Congress about the collection of bulk telephony metadata. As a witness to the relevant events and a participant in them, I know that allegation is not true.
  • ROBERT S. LITT General Counsel, Office of the Director of National Intelligence Washington, Jan. 3, 2014
  •  
    The NSA's General Counsel attempts to paint James Clapper's lie to Congress as not a lie while acknowledging that his answer was false. Don't look for logic here. Whatever happened to Clapper's later admission that his answer was "the least untruthful answer" he could give in a public session.  Clapper needs to be prosecuted for perjury in his Congressional testimony.   
2More

John Bolton: Edward Snowden 'Ought To Swing From A Tall Oak Tree' - 0 views

  • Former U.S. ambassador to the United Nations John Bolton spoke out against former government contractor Edward Snowden for leaking classified details on the National Security Agency's controversial surveillance practices, suggesting Snowden should "swing from a tall oak tree" as punishment. Speaking on Fox News on Monday, Bolton, who served under former President George W. Bush, characterized Snowden's actions as treason, and urged against any public talk of amnesty.
  •  
    Also echoed by former CIA Director James Woolsey. http://jonathanturley.org/2013/12/18/ex-cia-director-calls-for-snowden-to-be-hanged-by-his-neck-until-he-is-dead/ Personally, I'm against the death penalty but if anyone is to swing from the yardarm, it should be the perverted politicos and bureaucrats who turned this nation into a police state, as well as their willing lackeys like Bolton and Woolsey.  Edward Snowden is a patriot; these guys used the Constitution to wipe their behinds every day. 
4More

Germany Opens Criminal Investigation On Alleged NSA Merkel Phone Tap - 0 views

  • German prosecutors have opened an investigation into the alleged monitoring of Chancellor Angela Merkel’s cellphone by the U.S. National Security Agency, officials said Wednesday, in a move that could again complicate diplomatic relations between the two allies. It was not immediately clear what the new investigation might mean in terms of possible prosecutions of Americans. Documents provided by National Security Agency leaker Edward Snowden indicated in October that the U.S. was monitoring Merkel’s cellphone conversations, as well as those of 35 other foreign leaders. Merkel expressed outrage and accused Washington of a grave breach of trust. In the ensuing diplomatic fallout, President Barack Obama acknowledged Germany’s anger and promised that new guidelines would cut back on such monitoring, except in the case of a national security interest. “The leaders of our close friends and allies deserve to know that if I want to learn what they think about an issue, I will pick up the phone and call them rather than turning to surveillance,” Obama said at the time.
  • Following the news of the German probe, Obama’s deputy national security adviser, Ben Rhodes, said the U.S. believes direct dialogue between the two countries rather than an investigation is the best way to address Germany’s concerns. “We believe we have an open line and good communication” with Merkel and her team, Rhodes told reporters aboard Air Force One as Obama flew to Brussels for a meeting of the Group of Seven nations. After mulling for months whether to open a formal probe, Chief Federal Prosecutor Harald Range determined “that sufficient factual evidence exists that unknown members of U.S. intelligence services spied on the mobile phone of Chancellor Angela Merkel,” his office said. In a similarly thorny diplomatic case, Germany got as far as issuing warrants for 13 unidentified CIA agents suspected of kidnapping a German terrorism suspect and taking him to a detention center in Afghanistan. The case was shelved in 2007 after the U.S. Justice Department said extraditing the agents would harm “American national interests.”
  • In his Wednesday announcement, Range’s office said he was not opening a formal investigation of wider allegations of blanket surveillance of telecommunications data in Germany by U.S. and British intelligence, saying that there was not yet sufficient factual evidence of concrete crimes. His office said that will remain under consideration. Merkel’s spokesman, Steffen Seibert, declined to comment on Range’s decision or on whether the government fears it will weigh on relations with the U.S. The government didn’t exert any influence on the prosecutor, Seibert told reporters. “I am not going to evaluate here the decision he has made,” he said. Separately, the German Parliament earlier this year set up a committee to investigate the scope of spying by the NSA and other intelligence services in Germany.
  •  
    There's a bit of comedy beneath the surface here. When Edward Snowden was in Hong Kong and news of the NSA leak hit, the U.S. Dept. of Justice promptly filed a criminal espionage charge against Snowden and attempted to extradite him from Hong Kong. Snowden left Hong Kong before the extradition paperwork was processed enough to result in his arrest.  Now with a pending criminal investigation of the NSA's espionage activities aimed at Germany's chancellor, the Obama White House says it wants dialog, not a criminal investigation. Would the U.S. honor its extradition treaty with Germany if NSA officials or the Director of Intelligence were charged with espionage in Germany? One might suspect that a dual-standard would be deployed, in effect saying that only espionage charges that the U.S. lodges can justify extradition. Or at least that's the way it worked when Italy tried and convicted in absentia several CIA officials and an Air Force officer of espionage activities, relating to the kidnapping and "extraordinary rendition" of a gentleman in Italy.       But this incident serves as a reminder that when the NSA officials conduct foreign intelligence activities, they will in most cases be deliberately violating the criminal laws of other nations. And the same activity aimed at U.S. citizens is also criminal, which is undoubtedly why Sen. Ron Wyden asked Director of Intelligence Clapper if the NSA had taken account of the Computer Fraud and Abuse Act in its processing of domestic digital communications. Clapper said he would get back to Wyden on that in writing. So far as I'm aware, Wyden is still waiting for that answer. There are lots of comedians in Washington, D.C. Most of them have no idea that they are comedians.   
3More

Is democracy a trade barrier? | European Public Affairs - 0 views

  • The United States and the European Union (EU) are negotiating a trade agreement, the Transatlantic Trade and Investment Partnership (TTIP). The aim is to lower trade barriers. Unfortunately those ‘barriers’ include not just traditional trade tariffs and quotas, but also the laws your elected representatives make.
  • This is why the fight against TTIP is a fight for democracy. It is not about protectionism, but rather the protection of our democratic laws over their business interests.
  •  
    "In a democracy, elected representatives make laws. But with new trade agreements, businesses could co-write legislation. The United States and the European Union (EU) are negotiating a trade agreement, the Transatlantic Trade and Investment Partnership (TTIP). The aim is to lower trade barriers. Unfortunately those 'barriers' include not just traditional trade tariffs and quotas, but also the laws your elected representatives make. For example, Pierre Defraigne, former Deputy Director-General in the EU Commission Department responsible for Trade, sees the core battle of TTIP is over "the norms and standards in terms of environmental, health and consumer protection". This is why the fight against TTIP is a fight for democracy. It is not about protectionism, but rather the protection of our democratic laws over their business interests. If TTIP was to be signed, two new doors will be opened for businesses to influence legislation: 1. Firstly, regulatory co-operation will give access to industry before laws are to be signed. This means regulators and stakeholders work together for the convergence of laws across the Atlantic. 2. And secondly, once laws are enacted, private investors can sue the EU or US in private tribunals, outside of national courts (known as ISDS or investor-state dispute settlement). The example of the chemical Bisphenol A illustrates what both these 'open doors' for business could mean in practice. Used in everything from water bottles to the lining of food cans, Bisphenol A is one of the most ubiquitous endocrine disruptors. As such, it disrupts the hormonal system of the body, which is responsible for all vital features such as growth, sexual development, and even behaviour. Its presence in the natural world is already felt: two out of three fish caught in Austrian rivers are now female. Bisphenol A has been banned in France since 1st January 2015. This ban goes further than the existing EU ban. Meanwhile, Bisphenol A is stil
8More

Why Obama is bombing the Caliph - RT Op-Edge - 0 views

  • This is the way the multi-trillion dollar Global War on Terror (GWOT) ends: not with a bang, but with a bigger bang. The GWOT, since its conceptualization 13 years ago, in the aftermath of 9/11, is the gift that keeps on giving. And no gift is bigger than a Transformer Al-Qaeda on steroids – bigger, brasher, and wealthier than anything Osama Bin Laden and Ayman al-Zawahiri had ever dreamt of; the IS (Islamic State, formerly known as ISIS) of Caliph Ibrahim, former Abu Bakr al-Baghdadi. US President Barack Obama, before deploying his golf holidays in Martha’s Vineyard, casually dropped that bombing the Caliph’s goons in Iraq will take months. One may interpret it as another layer of the Obama administration’s self-avowed “Don't Do Stupid Stuff” foreign policy doctrine, not so subtly mocked by prospective presidential candidate Hillary Clinton. Shock and Awe in 2003 destroyed the whole of Baghdad’s infrastructure in only a few hours. Obama also confirmed the US was showering Iraq again with humanitarian bombing “to protect American interests” (first and foremost) and, as an afterthought, “human rights in Iraq.” One could not possibly expect Obama to declare the US would now bomb “our” allies the House of Saud, who have supported/financed/weaponized IS, in Syria and Iraq. The same erstwhile ISIS that thoroughly enjoyed the marvels of US military training in a secret base in Jordan.
  • Obama also could not possibly explain why the US always supported ISIS in Syria and now decides to bomb them in Iraq. Oh, the perils of ‘Don’t Do Stupid Stuff’. So a quick translation applies.
  • Obama’s bombing of the Caliph’s goons has absolutely nothing to do with US ambassador to the UN Samantha Power’s much beloved R2P (‘responsibility to protect’) doctrine – as in the responsibility to protect up to 150,000 Yazidis, not to mention Kurds and remaining Christians, from a ‘potential’ genocide carried out by the Caliph’s goons. The whole fighter jets + drones bombing exercise, lasting ‘months’, has to do with the Benghazi syndrome. The Caliph’s goons were dead set on conquering Irbil - the capital of Iraqi Kurdistan. The Kurdistan Regional Government (KRG) is led by the wily Massoud Barzani – a long-time US client/vassal. The US maintains a consulate in Irbil. Crammed with CIA types. Or, as the New York Times so lovingly puts it, “thousands of Americans.” Enter Benghazi. This is an electoral year. Obama is absolutely terrified of another Benghazi – which Republicans have been trying non-stop to blame on his administration’s incompetence. The last thing Obama needs is the Caliph’s goons killing ‘diplomats’ in Erbil. That would certainly raise a tsunami of questions all over again about the shady CIA weapon-smuggling racket – as in arming Syrian ‘rebels’ with weapons from Libya - at the time Benghazi took place. As secretary of state, Hillary Clinton, of course, also knew about it all. But then, and especially now, no one should know that the CIA was weaponizing the bulk of the future Caliph’s forces.
  • ...4 more annotations...
  • Obama said this humanitarian bombing adventure could last “months,” but in fact it could last only days. The price is cheap: regime change. As in former Iraqi Prime Minister Nouri al-Maliki blocked from having a third term. That explains why all hell broke loose in Baghdad, as Iraqi parliamentarians clearly saw which way the wind is blowing. Haider al-Abadi was chosen by new President Fuad Masoum, a Kurd, as the new prime minister – hours after Maliki positioned Special Forces in strategic sites in and around the Green Zone and may (or may not) have tried to stage a coup. Maliki maintains that Masoum violated the Iraqi constitution by not selecting him to form a new cabinet; after all, his State of Law bloc got the most votes in last April’s parliamentary elections.
  • Obama, predictably, was delighted. But whatever happens next, Maliki won’t go down quietly – to say the least. Even as the predominant narrative among Sunnis, a substantial number of Kurds and even some Shiite political blocs is that Maliki antagonized Sunnis all-out; and that’s what drove them to support the Caliph en masse (although now many are having second thoughts.) As for the KRG and Barzani, in the Obama administration scheme of things, what matters is that they should not declare independence. As long as Barzani promises to Obama that Kurdistan stays inside Iraq, the KRG will get more bombs and drones and the ‘humanitarian’ operation will speed up. US Special Forces are already deployed all over the huge area where the Caliphate borders the KRG, in so-called desert forward operating positions. And the US for all practical purposes is now the Iraqi Air Force against the Caliph. Watch ‘the Hillarator’ This Obama administration warped R2P – protection for Americans first, refugees second – will accomplish nothing for a key reason; no bombing – ‘humanitarian’ or otherwise - exterminates a political/religious movement, even one as demented as IS. The Caliphate prospers, somewhat, and expands, because unlike that pathetic Free Syrian Army (FSA) it’s winning territory, desert and urban, in both Syria and Iraq; an area bigger than Great Britain already, holding at least 6 million people.
  • As for the much-peddled Washington myth of ‘good’ and ‘bad’ jihadists, the Caliphate also exploded it. Virtually every jihadi Washington - and Riyadh – weaponized and trained in Jordan and in the Turkey-Syria border is now among the Caliph’s goons, wallowing in cash raised from oil smuggling, hardcore blackmail and ‘donations’, and weaponized to their teeth after looting four Iraqi divisions and a Syrian brigade. As for the GWOT gift, it will keep on giving in a bigger and bigger bang because of the dream narrative now displayed for every aspiring multinational jihadi; we are now defending our Caliphate from the mighty Crusader Air Force, no less. The US lost the war in Iraq, miserably, only nine days after the fall of Baghdad, in April 2003. No ‘humanitarian’ bombing will turn it into a victory. And no ‘humanitarian’ bombing will finish the Caliphate off. As for prospective presidential candidate Hillary Clinton, she’s taking no prisoners. She insists the US should have bombed Syria in the first place; then there would be no Caliphate. But now she worries the Caliph will attack Europe and even the US (“I’m thinking a lot about containment, deterrence and defeat”). Predictably positioning herself, Clinton could not but totally dismiss Obama’s foreign policy doctrine, a.k.a. ‘Don’t do stupid stuff’: “‘Don’t do stupid stuff’ is not an organizing principle.” So the world will have to wait until 2017, when she’s finally able to implement her own doctrine/organizing principle: “We came, we saw, he died.”
  • This is the way the multi-trillion dollar Global War on Terror (GWOT) ends: not with a bang, but with a bigger bang. The GWOT, since its conceptualization 13 years ago, in the aftermath of 9/11, is the gift that keeps on giving. And no gift is bigger than a Transformer Al-Qaeda on steroids – bigger, brasher, and wealthier than anything Osama Bin Laden and Ayman al-Zawahiri had ever dreamt of; the IS (Islamic State, formerly known as ISIS) of Caliph Ibrahim, former Abu Bakr al-Baghdadi. US President Barack Obama, before deploying his golf holidays in Martha’s Vineyard, casually dropped that bombing the Caliph’s goons in Iraq will take months. One may interpret it as another layer of the Obama administration’s self-avowed “Don't Do Stupid Stuff” foreign policy doctrine, not so subtly mocked by prospective presidential candidate Hillary Clinton. Shock and Awe in 2003 destroyed the whole of Baghdad’s infrastructure in only a few hours. Obama also confirmed the US was showering Iraq again with humanitarian bombing “to protect American interests” (first and foremost) and, as an afterthought, “human rights in Iraq.”
  •  
    "Enter Benghazi. This is an electoral year. Obama is absolutely terrified of another Benghazi - which Republicans have been trying non-stop to blame on his administration's incompetence. The last thing Obama needs is the Caliph's goons killing 'diplomats' in Erbil. "That would certainly raise a tsunami of questions all over again about the shady CIA weapon-smuggling racket - as in arming Syrian 'rebels' with weapons from Libya - at the time Benghazi took place. As secretary of state, Hillary Clinton, of course, also knew about it all. But then, and especially now, no one should know that the CIA was weaponizing the bulk of the future Caliph's forces." Yup. It's the same reason that the House investigation of the Benghazi incident will never punch through to the truth. The War Party doesn't want its Benghazi CIA ratline for Libyan weapons to Turkey being exposed because that leads directly to the fact that ISIS is a U.S.-Saudi creation. Remember Wayne Madsen's article on why Obama backed down from his planned missile and bombing attack on Syria after the Ghouta false flag Sarin attack in August 2013: ""Some within the Pentagon ranks are so displeased with Obama's policies on Syria, they have let certain members of Congress of both parties know that «smoking gun» proof exists that Obama and CIA director John O. Brennan personally authorized the transfer of arms and personnel from Al-Qaeda-linked Ansar al Sharia Islamist rebels in Libya to Syria's Jabhat al Nusra rebels, who are also linked to Al Qaeda, in what amounts to an illegal «Iran-contra»-like scandal." http://www.strategic-culture.org/news/2013/09/04/american-generals-stand-between-war-and-peace.html And the detailed confirmation that events had actually transpired in accordance with that plan by Yossef Bodansky - Director of the Congressional Task Force on Terrorism and Unconventional Warfare of the US House of Representatives from 1988 to 2004 and the center of an enormous global
6More

Exclusive: U.S. may use secrets act to stop suit against Iran sanctions group | Reuters - 0 views

  • (Reuters) - The U.S. government is considering using a powerful national security law to halt a private lawsuit against a non-profit group, United Against A Nuclear Iran, according to a source familiar with the case. Greek businessman and ship owner Victor Restis last year sued UANI for defamation after the New York-based group, whose advisors include former intelligence officials from the United States, Europe and Israel, accused him of violating sanctions on Iran by exporting oil from the country.Earlier this year, U.S. government lawyers declared their interest in the lawsuit, warning that information related to UANI could jeopardize law enforcement activities.An intervention by the government in a private civil lawsuit is rare, and its use of a privilege under state secrets statutes to clamp down on the case would be a highly unusual move. Other cases where the government has invoked the privilege include lawsuits filed against the National Security Agency in the wake of leaks to journalists by former NSA contractor Edward Snowden.
  • Restis' lawyer, Abbe Lowell, also declined to comment, but pointed to court filings in which he argued that the state secrets privilege could not be used without the government first explaining the true nature of its relationship to UANI.Restis denies doing illegal business with Iran. As part of the lawsuit, his lawyers have demanded that UANI produce whatever evidence it had that Restis was violating the sanctions and explain where it came from.Iran denies Western accusations that it has been seeking the capability to assemble nuclear weapons. Diplomatic talks between Iran and the United States, France, Russia, Britain, China and Germany are expected to resume in September, with the aim of reaching a settlement by Nov. 24 that would scale back Iran's nuclear program in exchange for lifting sanctions. An effort by government lawyers to mediate a settlement between UANI and Restis appears to have failed, the source said.
  • UANI advocates economic pressure on Iran to keep the country from building a nuclear arsenal. One of the group's tactics is to name and shame companies and people who do business in Iran.UANI has a small budget. It spent $1.5 million in 2013, according to its tax filings. The group, however, uses sources such as commercially sold satellite imagery for its campaigns.Among its advisory board members are Meir Dagan, the former director of the Israeli intelligence agency Mossad, and August Hanning, the former director of Germany's Federal Intelligence Service.Its chief executive, Mark Wallace, is also the CEO of Tigris Financial Group, an investment company backed by the billionaire American gold investor Thomas Kaplan. Restis did not originally name Kaplan in the defamation lawsuit, but his lawyer is seeking to depose Kaplan as part of the proceedings.
  • ...2 more annotations...
  • The government and lawyers for UANI have previously sought to delay evidence gathering in the case. UANI lawyers have told the court they could not produce certain documents requested by Restis because they would reveal U.S. government secrets.In March, a Justice Department lawyer wrote to U.S. District Judge Edgardo Ramos, who is presiding over the case in Manhattan, confirming the government's interest and requesting a temporary halt to proceedings while the government decided what to do. Ramos granted the stay, but ordered the government to explain why it wanted the material suppressed.In an April 9 letter, Assistant U.S. Attorney Michael Byars wrote that the material in question could be protected under a privilege designed to prevent the public release of law enforcement techniques, confidential sources, undercover operatives and active investigations. But if it invoked the powerful state secrets privilege, the government would be claiming the information would not only interfere with law enforcement efforts but also jeopardize national security.
  • The government has until Sept. 12 to decide whether to use the state secrets privilege.The privilege can be used to block the release of information in a lawsuit, but the government has also used it to force the dismissal of lawsuits. It is unclear whether the privilege would be applied only to certain information in the Restis case or whether it would cause the case to be closed completely.The case is Restis et al v. American Coalition Against Nuclear Iran Inc, (dba United Against A Nuclear Iran) et al, in U.S. District Court for the Southern District of New York, No. 13-05032.
  •  
    More detail on the very interesting Restis case against UANI. The normal rule is that a privilege, once the privileged information is disclosed to one who is not entitled to the privilege, is deemed waived. So Restis' lawyer is correct in stating that the state secrets privilege cannot be used without the government explaining the true nature of its relationship to UANI, assuming the information was not stolen by UANI. The disclosure is new of UANI having former directors of Israeli and German intelligence services on its advisory board. This case looks like a cyst on the verge of rupturing and spewing forth a whole bunch of Dark Government pus.   
7More

White House: racial slurs in NSA intelligence material 'unacceptable' | World news | Th... - 0 views

  • The White House has instructed US security agencies to review their training and policy materials for racial or religious bias after documents leaked by Edward Snowden showed training material for the intelligence agencies referring to "Mohammed Raghead".After an extensive investigation by the Intercept on Wednesday reported that the NSA and the FBI spied on the emails of five prominent US activists and attorneys with Muslim backgrounds, White House spokeswoman Caitlin Hayden said that the administration took accusations of the slurs "extremely seriously." "Upon learning of this matter, the White House immediately requested that the director of national intelligence undertake an assessment of intelligence community policies, training standards or directives that promote diversity and tolerance, and as necessary, make any recommendations changes or additional reforms," Hayden said.It is at least the second time the White House has ordered a review of agency training materials said to include offensive language.
  • Hayden declined to provide additional detail on the scope or duration of the investigation. But it is reminiscent of an earlier incident in which the White House ordered the government's vast counter-terrorism apparatus to find and purge inflammatory training material, particularly that which singled out Muslims for particular scrutiny. In 2011, this reporter published FBI training material instructing newer counter-terrorism agents that Islam itself was a threat to US national security and compared the prophet Muhammad to a cult leader. Initial FBI pushback gave way to an inquiry, at the instruction of the White House, that removed significant quantities of offensive or imprecise training material. That instruction came six years after the "Mohammed Raghead" material and stretched far beyond the FBI. Anti-Islam training material, including some urging "Hiroshima" tactics against Islamic nations, was found and removed from professional education courses for US military officers, at the behest of Army General Martin Dempsey, the chairman of the joint chiefs of staff.
  • The Obama administration has strained to reconcile the vast counter-terrorism bureaucracy with its policy declarations that the US is not at war with Islam and has attempted, with mixed results, to cultivate a less militarized and security-focused relationship with US Muslims, often preferring the term "countering violent extremism" over "counter-terrorism".In some anti-Islam circles, the removal of the instructional material is infamous and considered evidence of an administration capitulation to Islam – the exact opposite of the concern raised by the Intercept on Wednesday. The Intercept report, by former Guardian columnist Glenn Greenwald, Murtaza Hussain and Josh Meyer, suggested a persistent counter-terrorism atmosphere in which the mixture of Muslim heritage or faith and political activism attracted the scrutiny of US security agencies, despite first amendment protections. It presented the cases of five American activists and attorneys of Muslim heritage who appear to have been targeted for surveillance, at least between 2002 and 2008. None have been charged with a crime.
  • ...3 more annotations...
  • The accusation is one of the gravest the US intelligence agencies have faced in the year since the Guardian and other news outlets began publishing material leaked by Snowden. A central aspect of the intelligence agency's public defense is that it cannot surveil US persons for constitutionally-protected activity and that its court-certified privacy protections are too robust to allow for privacy intrusions of the sort the Intercept reported.The allegation threatens to sever the tenuous relationship between US law enforcement and surveillance agencies and American Muslim communities, many of whom have long suspected that their government views them as an internal threat and not a population to be protected.The NSA, the Justice Department and the Office of the Director of National Intelligence sharply pushed back against the accusations that protected speech, unrelated to terrorism or espionage, turned American Muslims into counterterrorism targets.
  • US Muslim leaders and civil rights groups reacted with fury to the Intercept report.A coalition of 44 civil rights organizations wrote Obama on Wednesday to request a meeting with him, attorney general Eric Holder and FBI director James Comey. "In short, the government’s domestic counterterrorism policies treat entire minority communities as suspect, and American Muslims have borne the brunt of government suspicion, stigma and abuse," reads an open letter issued by a coalition that includes the ACLU, the Presbyterian Church (USA), the Arab-American Institute, and dozens of others.In a statement, the law firm Muslim Advocates said the spying, apparently conducted between 2002 and 2008, "confirms the worst fears of American Muslims"."The federal government has targeted Americans, even those who have served their country in the military and government, simply because of their faith or religious heritage," the group said. "The report clearly documents how biased training by the FBI leads to biased surveillance."
  • Vincent Warren, executive director of the Center for Constitutional Rights, issued a statement comparing the surveillance of Nihad Awad of the Council on American-Islamic Relations, named by the Intercept as one of the five surveillance targets, to the infamous surveillance of the Civil Rights Movement."The NSA’s surveillance of Nihad Awad and CAIR fits the same pattern as the FBI surveillance of Martin Luther King Jr, Ella Baker, Jesse Jackson, Malcolm X, and other leaders of the civil rights movement. Then it was based on manufactured suspicions of associations with the Communist party. Now it is seemingly based on unproven claims of tangential associations with Hamas," Warren said.
  •  
    Don't look for the American Muslim community to let go of this one anytime soon. They know they've been profiled since 9-11 but finally have proof.
8More

Ex-Chief of C.I.A. Shapes Response to Detention Report - NYTimes.com - 0 views

  • Just after the Senate Intelligence Committee voted in April to declassify hundreds of pages of a withering report on the Central Intelligence Agency’s detention and interrogation program, C.I.A. Director John O. Brennan convened a meeting of the men who had played a role overseeing the program in its seven-year history.The spies, past and present, faced each other around the long wooden conference table on the seventh floor of the C.I.A.’s headquarters in Northern Virginia: J. Cofer Black, head of the agency’s counterterrorism center at the time of the Sept. 11 attacks; the undercover officer who now holds that job; and a number of other former officials from the C.I.A.’s clandestine service. Over the speakerphone came the distinctive, Queens-accented voice of George J. Tenet.
  • Ms. Feinstein agreed to let a group of former senior C.I.A. officials read a draft of the report, although she initially insisted they be allowed to review it only at the committee’s office. Officials said President Obama’s chief of staff, Denis McDonough, intervened and brokered an arrangement in which the officials could read an unredacted version of the report inside a secure room at the office of the Director of National Intelligence. Ms. Feinstein declined to comment.
  • Mr. Tenet, who declined to be interviewed for this article, has arranged a number of conference calls with former C.I.A. officials to discuss the impending report. After private conversations with Mr. Brennan, he and two other former C.I.A. directors — Porter J. Goss and Michael V. Hayden — drafted a letter to Mr. Brennan asking that, as a matter of fairness, they be allowed to see the report before it was made public. Describing the letter, one former C.I.A. officer who spoke on condition of anonymity said that the former directors “think that those people who were heavily involved in the operations have a right to see what’s being said about them.”Mr. Brennan then passed the letter to Senator Dianne Feinstein, the California Democrat who is chairwoman of the Senate Intelligence Committee.
  • ...4 more annotations...
  • Over the past several months, Mr. Tenet has quietly engineered a counterattack against the Senate committee’s voluminous report, which could become public next month. The effort to discredit the report has set up a three-way showdown among former C.I.A. officials who believe history has been distorted, a White House carefully managing the process and politics of declassifying the document, and Senate Democrats convinced that the Obama administration is trying to protect the C.I.A. at all costs.The report is expected to accuse a number of former C.I.A. officials of misleading Congress and the White House about the program and its effectiveness, but it is Mr. Tenet who might have the most at stake.
  • “While former C.I.A. officials may be working to hide their own past wrongs, there’s no reason Brennan or any other current C.I.A. official should help facilitate the defense of the indefensible,” said Christopher Anders, senior legislative counsel at the American Civil Liberties Union.Spokesmen for the C.I.A. and the White House declined to comment.
  • The April meeting at C.I.A. headquarters highlighted how much of the agency is still seeded with officers who participated in the detention and interrogation program, which Mr. Obama officially ended during his first week in office in 2009.At one point during the meeting, the current head of the counterterrorism center, an officer with the first name Mike, told Mr. Brennan that roughly 200 people under his leadership had at some point participated in the interrogation program. They wanted to know, he said, how Mr. Brennan planned to defend them in public against accusations that the C.I.A. engaged in systematic torture and lied about its efficacy.
  • Mr. Tenet resigned a decade ago amid the wash of recriminations over the C.I.A.’s botched Iraq assessments, and he has given few interviews since his book tour.
  •  
    Major Obama scandal brewing here. The current head of the CIA, John Brennan, has been caught conspiring with former CIA heads and others to counter the Senate Intelligence Committee's pending report on CIA torture and extraordinary rendition, even as Brennan works to delay the report summary's publication by censoring it, resulting in delay while the Committee argues with the CIA over the deletions. All of which sharply contrasts with Obama's publicly expressed desire to have the report published promptly.    The article also makes a very strong case that those CIA officials who participated in the torture and rendition program have been enabled, on Obama's watch, to act as the censors of the Senate Report.  A must-read
2More

George Bush: The Unauthorized Biography « TARPLEY.net - 0 views

  • By Webster Griffin Tarpley and Anton Chaitkin Table of Contents Introduction — American Caligula Chapter 1 – The House of Bush: Born in a Bank Chapter 2 – The Hitler Project Chapter 3 – Race Hygiene: Three Bush Family Alliances Chapter 4 – The Center of Power is in Washington Chapter 5 – Poppy and Mommy Chapter 6 – Bush in World War II Chapter 7 – Skull and Bones: The Racist Nightmare at Yale Chapter 8 – The Permian Basin Gang Chapter 8b – The Bay of Pigs and The Kennedy Assassination Chapter 9 – Bush Challenges Yarborough for The Senate Chapter 10 – Rubbers Goes to Congress Chapter 11 – United Nations Ambassador, Kissinger Clone Chapter 12 – Chairman George in Watergate Chapter 13 – Bush Attempts The Vice Presidency, 1974 Chapter 14 – Bush in Beijing Chapter 15 – CIA Director Chapter 16 – Campaign 1980 Chapter 17 – The Attempted Coup D’Etat of March 30, 1981 Chapter 18 – Iran-Contra Chapter 19 – The Leveraged Buyout Mob Chapter 20 – The Phony War On Drugs Chapter 21 – Omaha Chapter 22 – Bush Takes The Presidency Chapter 23 – The End of History Chapter 24 – The New World Order Chapter 25 – Thyroid Storm
  • Chapter 1 – The House of Bush: Born in a Bank Chapter 2 – The Hitler Project Chapter 3 – Race Hygiene: Three Bush Family Alliances Chapter 4 – The Center of Power is in Washington Chapter 5 – Poppy and Mommy Chapter 6 – Bush in World War II Chapter 7 – Skull and Bones: The Racist Nightmare at Yale Chapter 8 – The Permian Basin Gang Chapter 8b – The Bay of Pigs and The Kennedy Assassination Chapter 9 – Bush Challenges Yarborough for The Senate Chapter 10 – Rubbers Goes to Congress Chapter 11 – United Nations Ambassador, Kissinger Clone Chapter 12 – Chairman George in Watergate Chapter 13 – Bush Attempts The Vice Presidency, 1974 Chapter 14 – Bush in Beijing Chapter 15 – CIA Director Chapter 16 – Campaign 1980 Chapter 17 – The Attempted Coup D’Etat of March 30, 1981 Chapter 18 – Iran-Contra Chapter 19 – The Leveraged Buyout Mob Chapter 20 – The Phony War On Drugs Chapter 21 – Omaha Chapter 22 – Bush Takes The Presidency Chapter 23 – The End of History Chapter 24 – The New World Order Chapter 25 – Thyroid Storm
11More

Cy Vance's Proposal to Backdoor Encrypted Devices Is Riddled With Vulnerabilities | Jus... - 0 views

  • Less than a week after the attacks in Paris — while the public and policymakers were still reeling, and the investigation had barely gotten off the ground — Cy Vance, Manhattan’s District Attorney, released a policy paper calling for legislation requiring companies to provide the government with backdoor access to their smartphones and other mobile devices. This is the first concrete proposal of this type since September 2014, when FBI Director James Comey reignited the “Crypto Wars” in response to Apple’s and Google’s decisions to use default encryption on their smartphones. Though Comey seized on Apple’s and Google’s decisions to encrypt their devices by default, his concerns are primarily related to end-to-end encryption, which protects communications that are in transit. Vance’s proposal, on the other hand, is only concerned with device encryption, which protects data stored on phones. It is still unclear whether encryption played any role in the Paris attacks, though we do know that the attackers were using unencrypted SMS text messages on the night of the attack, and that some of them were even known to intelligence agencies and had previously been under surveillance. But regardless of whether encryption was used at some point during the planning of the attacks, as I lay out below, prohibiting companies from selling encrypted devices would not prevent criminals or terrorists from being able to access unbreakable encryption. Vance’s primary complaint is that Apple’s and Google’s decisions to provide their customers with more secure devices through encryption interferes with criminal investigations. He claims encryption prevents law enforcement from accessing stored data like iMessages, photos and videos, Internet search histories, and third party app data. He makes several arguments to justify his proposal to build backdoors into encrypted smartphones, but none of them hold water.
  • Before addressing the major privacy, security, and implementation concerns that his proposal raises, it is worth noting that while an increase in use of fully encrypted devices could interfere with some law enforcement investigations, it will help prevent far more crimes — especially smartphone theft, and the consequent potential for identity theft. According to Consumer Reports, in 2014 there were more than two million victims of smartphone theft, and nearly two-thirds of all smartphone users either took no steps to secure their phones or their data or failed to implement passcode access for their phones. Default encryption could reduce instances of theft because perpetrators would no longer be able to break into the phone to steal the data.
  • Vance argues that creating a weakness in encryption to allow law enforcement to access data stored on devices does not raise serious concerns for security and privacy, since in order to exploit the vulnerability one would need access to the actual device. He considers this an acceptable risk, claiming it would not be the same as creating a widespread vulnerability in encryption protecting communications in transit (like emails), and that it would be cheap and easy for companies to implement. But Vance seems to be underestimating the risks involved with his plan. It is increasingly important that smartphones and other devices are protected by the strongest encryption possible. Our devices and the apps on them contain astonishing amounts of personal information, so much that an unprecedented level of harm could be caused if a smartphone or device with an exploitable vulnerability is stolen, not least in the forms of identity fraud and credit card theft. We bank on our phones, and have access to credit card payments with services like Apple Pay. Our contact lists are stored on our phones, including phone numbers, emails, social media accounts, and addresses. Passwords are often stored on people’s phones. And phones and apps are often full of personal details about their lives, from food diaries to logs of favorite places to personal photographs. Symantec conducted a study, where the company spread 50 “lost” phones in public to see what people who picked up the phones would do with them. The company found that 95 percent of those people tried to access the phone, and while nearly 90 percent tried to access private information stored on the phone or in other private accounts such as banking services and email, only 50 percent attempted contacting the owner.
  • ...8 more annotations...
  • In addition to his weak reasoning for why it would be feasible to create backdoors to encrypted devices without creating undue security risks or harming privacy, Vance makes several flawed policy-based arguments in favor of his proposal. He argues that criminals benefit from devices that are protected by strong encryption. That may be true, but strong encryption is also a critical tool used by billions of average people around the world every day to protect their transactions, communications, and private information. Lawyers, doctors, and journalists rely on encryption to protect their clients, patients, and sources. Government officials, from the President to the directors of the NSA and FBI, and members of Congress, depend on strong encryption for cybersecurity and data security. There are far more innocent Americans who benefit from strong encryption than there are criminals who exploit it. Encryption is also essential to our economy. Device manufacturers could suffer major economic losses if they are prohibited from competing with foreign manufacturers who offer more secure devices. Encryption also protects major companies from corporate and nation-state espionage. As more daily business activities are done on smartphones and other devices, they may now hold highly proprietary or sensitive information. Those devices could be targeted even more than they are now if all that has to be done to access that information is to steal an employee’s smartphone and exploit a vulnerability the manufacturer was required to create.
  • Privacy is another concern that Vance dismisses too easily. Despite Vance’s arguments otherwise, building backdoors into device encryption undermines privacy. Our government does not impose a similar requirement in any other context. Police can enter homes with warrants, but there is no requirement that people record their conversations and interactions just in case they someday become useful in an investigation. The conversations that we once had through disposable letters and in-person conversations now happen over the Internet and on phones. Just because the medium has changed does not mean our right to privacy has.
  • Vance attempts to downplay this serious risk by asserting that anyone can use the “Find My Phone” or Android Device Manager services that allow owners to delete the data on their phones if stolen. However, this does not stand up to scrutiny. These services are effective only when an owner realizes their phone is missing and can take swift action on another computer or device. This delay ensures some period of vulnerability. Encryption, on the other hand, protects everyone immediately and always. Additionally, Vance argues that it is safer to build backdoors into encrypted devices than it is to do so for encrypted communications in transit. It is true that there is a difference in the threats posed by the two types of encryption backdoors that are being debated. However, some manner of widespread vulnerability will inevitably result from a backdoor to encrypted devices. Indeed, the NSA and GCHQ reportedly hacked into a database to obtain cell phone SIM card encryption keys in order defeat the security protecting users’ communications and activities and to conduct surveillance. Clearly, the reality is that the threat of such a breach, whether from a hacker or a nation state actor, is very real. Even if companies go the extra mile and create a different means of access for every phone, such as a separate access key for each phone, significant vulnerabilities will be created. It would still be possible for a malicious actor to gain access to the database containing those keys, which would enable them to defeat the encryption on any smartphone they took possession of. Additionally, the cost of implementation and maintenance of such a complex system could be high.
  • Vance also suggests that the US would be justified in creating such a requirement since other Western nations are contemplating requiring encryption backdoors as well. Regardless of whether other countries are debating similar proposals, we cannot afford a race to the bottom on cybersecurity. Heads of the intelligence community regularly warn that cybersecurity is the top threat to our national security. Strong encryption is our best defense against cyber threats, and following in the footsteps of other countries by weakening that critical tool would do incalculable harm. Furthermore, even if the US or other countries did implement such a proposal, criminals could gain access to devices with strong encryption through the black market. Thus, only innocent people would be negatively affected, and some of those innocent people might even become criminals simply by trying to protect their privacy by securing their data and devices. Finally, Vance argues that David Kaye, UN Special Rapporteur for Freedom of Expression and Opinion, supported the idea that court-ordered decryption doesn’t violate human rights, provided certain criteria are met, in his report on the topic. However, in the context of Vance’s proposal, this seems to conflate the concepts of court-ordered decryption and of government-mandated encryption backdoors. The Kaye report was unequivocal about the importance of encryption for free speech and human rights. The report concluded that:
  • States should promote strong encryption and anonymity. National laws should recognize that individuals are free to protect the privacy of their digital communications by using encryption technology and tools that allow anonymity online. … States should not restrict encryption and anonymity, which facilitate and often enable the rights to freedom of opinion and expression. Blanket prohibitions fail to be necessary and proportionate. States should avoid all measures that weaken the security that individuals may enjoy online, such as backdoors, weak encryption standards and key escrows. Additionally, the group of intelligence experts that was hand-picked by the President to issue a report and recommendations on surveillance and technology, concluded that: [R]egarding encryption, the U.S. Government should: (1) fully support and not undermine efforts to create encryption standards; (2) not in any way subvert, undermine, weaken, or make vulnerable generally available commercial software; and (3) increase the use of encryption and urge US companies to do so, in order to better protect data in transit, at rest, in the cloud, and in other storage.
  • The clear consensus among human rights experts and several high-ranking intelligence experts, including the former directors of the NSA, Office of the Director of National Intelligence, and DHS, is that mandating encryption backdoors is dangerous. Unaddressed Concerns: Preventing Encrypted Devices from Entering the US and the Slippery Slope In addition to the significant faults in Vance’s arguments in favor of his proposal, he fails to address the question of how such a restriction would be effectively implemented. There is no effective mechanism for preventing code from becoming available for download online, even if it is illegal. One critical issue the Vance proposal fails to address is how the government would prevent, or even identify, encrypted smartphones when individuals bring them into the United States. DHS would have to train customs agents to search the contents of every person’s phone in order to identify whether it is encrypted, and then confiscate the phones that are. Legal and policy considerations aside, this kind of policy is, at the very least, impractical. Preventing strong encryption from entering the US is not like preventing guns or drugs from entering the country — encrypted phones aren’t immediately obvious as is contraband. Millions of people use encrypted devices, and tens of millions more devices are shipped to and sold in the US each year.
  • Finally, there is a real concern that if Vance’s proposal were accepted, it would be the first step down a slippery slope. Right now, his proposal only calls for access to smartphones and devices running mobile operating systems. While this policy in and of itself would cover a number of commonplace devices, it may eventually be expanded to cover laptop and desktop computers, as well as communications in transit. The expansion of this kind of policy is even more worrisome when taking into account the speed at which technology evolves and becomes widely adopted. Ten years ago, the iPhone did not even exist. Who is to say what technology will be commonplace in 10 or 20 years that is not even around today. There is a very real question about how far law enforcement will go to gain access to information. Things that once seemed like merely science fiction, such as wearable technology and artificial intelligence that could be implanted in and work with the human nervous system, are now available. If and when there comes a time when our “smart phone” is not really a device at all, but is rather an implant, surely we would not grant law enforcement access to our minds.
  • Policymakers should dismiss Vance’s proposal to prohibit the use of strong encryption to protect our smartphones and devices in order to ensure law enforcement access. Undermining encryption, regardless of whether it is protecting data in transit or at rest, would take us down a dangerous and harmful path. Instead, law enforcement and the intelligence community should be working to alter their skills and tactics in a fast-evolving technological world so that they are not so dependent on information that will increasingly be protected by encryption.
4More

Hacker claims to have breached CIA director's personal email - 0 views

  • An anonymous hacker claims to have breached CIA Director John Brennan's personal email account and has posted documents online, including a list of email addresses purportedly from Brennan's contact file. The CIA said it referred the matter to the proper authorities, but would not comment further. The hacker spoke to the New York Post, which described him in an article published Sunday as "a stoner high school student," motivated by his opposition to U.S. foreign policy and support for Palestinians. His Twitter account, @phphax, includes links to files that he says are Brennan's contact list, a log of phone calls by then-CIA deputy director Avril Haines, and other documents.
  • The hacker also claimed to have breached a Comcast account belonging to Homeland Security Secretary Jeh Johnson, and released what appeared to be personal information. One document purporting to come from Brennan's AOL email account contains a spreadsheet of people, including senior intelligence officials, along with their Social Security numbers, although the hacker redacted the numbers in the version he posted on Twitter. It's unclear why Brennan would have stored such a document in his private email account. Based on the titles, the document appears to date from 2009 or before. When people visit the White House and other secure facilities, they are required to supply their Social Security numbers. Brennan could have been forwarding a list of invitees to the White House when he was President Barack Obama's counter terrorism adviser, the job he held before he became CIA director in 2013.
  • The hacker told the Post he had obtained a 47-page version of Brennan's application for a security clearance, known as an SF86. That document — millions of which were stolen from the federal personnel office last year by hackers linked to China — contains detailed information about past jobs, foreign contacts, finances and other sensitive personal details. No such document appears to be posted on the hacker's Twitter account, but it's not clear whether the hacker posted it elsewhere.
  •  
    Got to love it. I can think of few people more deserving of getting their email accounts cracked.
3More

Middle Class Political Economist: Gigantic Journalistic Investigation Begins Ripping Ma... - 0 views

  • Via the Tax Justice Network, I've just learned of a massive, multi-national joint investigation into secrecy jurisdictions by three very heavy hitters, the Guardian, BBC Panorama, and the U.S.-based International Consortium of Investigative Journalists (ICIJ). Though they are starting out with the United Kingdom and the seriously understudied situation in the British Virgin Islands, ICIJ has announced that this is just the start of a multi-year investigative project and that there are "many more countries to come in the next 12 months." Further, according to ICIJ, the investigation involves literally "dozens of jurisdictions and in collaboration with dozens of media partners and freelance journalists around the world" (emphasis in original).
  • As I write this, the first and second articles (Nov. 25 and 26) in the Guardian's series rank number two and number one in the "most viewed" articles in the last 24 hours. One of the most amazing articles discusses the use of "nominee" directors, people who pretend to be a company or foundation's directors in order to hide the true ownership from authorities. Incredibly, these nominee directors frequently do not know the companies they are supposedly responsible for; they just know that they are getting paid for the use of their names. Be sure to check out the BBC undercover film linked from this Guardian article.
  • But let's not forget: tax havens cost the middle class worldwide hundreds of billions of dollars in tax revenue that they have to make up. The evidence is mounting that they are a central piece of the world financial system. Fundamental reform is necessary and a massive journalistic effort like this one will help produce the outrage to make it possible. I'm looking forward to more fruits of this investigation.
8More

FBI sharply increases use of Patriot Act provision to collect US citizens' records - Op... - 0 views

  • The FBI has dramatically increased its use of a controversial provision of the Patriot Act to secretly obtain a vast store of business records of U.S. citizens under President Barack Obama, according to recent Justice Department reports to Congress. The bureau filed 212 requests for such data to a national security court last year – a 1,000-percent increase from the number of such requests four years earlier, the reports show. Follow @openchannelblog The FBI’s increased use of the Patriot Act’s “business records” provision — and the wide ranging scope of its requests -- is getting new scrutiny in light of last week’s disclosure that that the provision was used to obtain a top-secret national security order requiring telecommunications companies to turn over records of millions of telephone calls. Advertise | AdChoices Taken together, experts say, those revelations show the government has broadly interpreted the Patriot Act provision as enabling it to collect data not just on specific individuals, but on millions of Americans with no suspected terrorist connections. And it shows that the Foreign Intelligence Surveillance Court  accepted that broad interpretation of the law.
  • “That they were using this (provision) to do mass collection of data is definitely the biggest surprise,” said Robert Chesney, a top national security lawyer at the University of Texas Law School. “Most people who followed this closely were not aware they were doing this.  We’ve gone from producing records for a particular investigation to the production of all records for a massive pre-collection database. It’s incredibly sweeping.”  
  • But little-noticed statements by FBI Director Robert Mueller in recent years – as well as interviews with former senior law enforcement officials – hint at what Chesney calls a largely unnoticed “sea change” in the way the U.S. government collects data for terrorism and other national security investigations.
  • ...5 more annotations...
  • The Patriot Act provision, known as Section 215, allows the FBI to require the production of business records and any other “tangible things” -- including “books, records, papers, documents and other items,” for an authorized terrorism or foreign intelligence investigation. The Patriot Act was a broad expansion of law enforcement powers enacted by Congress with overwhelming bipartisan support in the aftermath of the Sept. 11, 2001, terrorist attacks. In addition to Section 215, other provisions expanded the FBI’s power to issue so-called “national security letters,” requiring individuals and business to turn over a more limited set of records without any court order at all.  Advertise | AdChoices In contrast to standard grand jury subpoenas, material obtained under both Section 215 orders and national security letters must be turned over under so-called “gag orders” that forbid the business or institution that receives the order from notifying its customers or publicly referring to the matter.
  • Saying they wanted to put an end to “secret law,  eight U.S. senators — led by Sens. Jeff Merkley, D-Ore., and Mike Lee, R-Utah — on Tuesday introduced a bill to require the Justice Department to declassify national security court decisions that have permitted the use of the “business records” provision for such purposes.
  • In 2010, the number of requests jumped to 205 (all again granted, with 176 modified.) In the latest report filed on April 30, the department reported there had been 212 such requests in 2012 – all approved by the court, but 200 of them modified.These sharp increase in the use of Section 215 has drawn little attention until now because the number of national security letters (NSLs) issued by the bureau has been so much greater -- 15,229 in 2012. But FBI Director Mueller, in little-noticed written responses to Congress two years ago, explained that the bureau was encountering resistance from telecommunications companies in turning over “electronic communication transaction” records in response to national security letters.“Beginning in late 2009, certain electronic communications service providers no longer honored NSLs to obtain” records because of what their lawyers cited as “an ambiguity” in the law. (What Mueller didn’t say was this came at a time when all the major telecommunications companies were still facing lawsuits over their cooperation with the government on surveillance programs.) As a result, Mueller said, the FBI had switched over to demanding the same data under Section 215. “This change accounts for a significant increase in the volume of business records requests,” Mueller wrote.
  • From the earliest days of the Patriot Act, Section 215 was among the most hotly disputed of its provisions. Critics charged the language – “tangible things” -- was so broad that it would even permit the FBI to obtain library and bookstore records to inspect what citizens were reading.Ashcroft confronted criticismLargely to tamp down those concerns, then-Attorney General John Ashcroft declassified information about the FBI’s use of the provision in September 2003, saying in a statement that “the number of times Section 215 has been used to date is zero.” Ashcroft added that he was releasing the information “to counter the troubling amount of public distortion and misinformation” about Section 215. But in the years since, the FBI’s use of Section 215 quietly exploded, with virtually no public notice or debate. In 2009, as part of an annual report to Congress, the Justice Department reported there had been 21 applications for business records to the Foreign Intelligence Surveillance Court (FISC) under Section 215 – all of which were granted, though nine were modified by the court. (The reports do not explain how or why the orders were modified.) 
  • The motion also asks the court to consider the constitutionality of the “gag order” written into Section 215.“There should be no room for secret law,” said Jameel Jaffer, the ACLU’s deputy legal director, adding that disclosure of the FISC rulings is essential if the debate Obama called for is to take place. “The public has a right to know what limits apply to the government’s surveillance authority, and what safeguards are in place to protect individual privacy.” 
8More

Shady Companies With Ties to Israel Wiretap the U.S. for the NSA | Threat Level | Wired... - 0 views

  • In addition to constructing the Stellar Wind center, and then running the operation, secretive contractors with questionable histories and little oversight were also used to do the actual bugging of the entire U.S. telecommunications network. According to a former Verizon employee briefed on the program, Verint, owned by Comverse Technology, taps the communication lines at Verizon, which I first reported in my book The Shadow Factory in 2008. Verint did not return a call seeking comment, while Verizon said it does not comment on such matters. At AT&T the wiretapping rooms are powered by software and hardware from Narus, now owned by Boeing, a discovery made by AT&T whistleblower Mark Klein in 2004. Narus did not return a call seeking comment. What is especially troubling is that both companies have had extensive ties to Israel, as well as links to that country’s intelligence service, a country with a long and aggressive history of spying on the U.S.
  • In fact, according to Binney, the advanced analytical and data mining software the NSA had developed for both its worldwide and international eavesdropping operations was secretly passed to Israel by a mid-level employee, apparently with close connections to the country. The employee, a technical director in the Operations Directorate, “who was a very strong supporter of Israel,” said Binney, “gave, unbeknownst to us, he gave the software that we had, doing these fast rates, to the Israelis.” Because of his position, it was something Binney should have been alerted to, but wasn’t. “In addition to being the technical director,” he said, “I was the chair of the TAP, it’s the Technical Advisory Panel, the foreign relations council. We’re supposed to know what all these foreign countries, technically what they’re doing…. They didn’t do this that way, it was under the table.” After discovering the secret transfer of the technology, Binney argued that the agency simply pass it to them officially, and in that way get something in return, such as access to communications terminals. “So we gave it to them for switches,” he said. “For access.”
  • But Binney now suspects that Israeli intelligence in turn passed the technology on to Israeli companies who operate in countries around the world, including the U.S. In return, the companies could act as extensions of Israeli intelligence and pass critical military, economic and diplomatic information back to them. “And then five years later, four or five years later, you see a Narus device,” he said. “I think there’s a connection there, we don’t know for sure.” Narus was formed in Israel in November 1997 by six Israelis with much of its money coming from Walden Israel, an Israeli venture capital company. Its founder and former chairman, Ori Cohen, once told Israel’s Fortune Magazine that his partners have done technology work for Israeli intelligence. And among the five founders was Stanislav Khirman, a husky, bearded Russian who had previously worked for Elta Systems, Inc. A division of Israel Aerospace Industries, Ltd., Elta specializes in developing advanced eavesdropping systems for Israeli defense and intelligence organizations. At Narus, Khirman became the chief technology officer.
  • ...4 more annotations...
  • A few years ago, Narus boasted that it is “known for its ability to capture and collect data from the largest networks around the world.” The company says its equipment is capable of “providing unparalleled monitoring and intercept capabilities to service providers and government organizations around the world” and that “Anything that comes through [an Internet protocol network], we can record. We can reconstruct all of their e-mails, along with attachments, see what Web pages they clicked on, we can reconstruct their [Voice over Internet Protocol] calls.” Like Narus, Verint was founded by in Israel by Israelis, including Jacob “Kobi” Alexander, a former Israeli intelligence officer. Some 800 employees work for Verint, including 350 who are based in Israel, primarily working in research and development and operations, according to the Jerusalem Post. Among its products is STAR-GATE, which according to the company’s sales literature, lets “service providers … access communications on virtually any type of network, retain communication data for as long as required, and query and deliver content and data …” and was “[d]esigned to manage vast numbers of targets, concurrent sessions, call data records, and communications.”
  • In a rare and candid admission to Forbes, Retired Brig. Gen. Hanan Gefen, a former commander of the highly secret Unit 8200, Israel’s NSA, noted his former organization’s influence on Comverse, which owns Verint, as well as other Israeli companies that dominate the U.S. eavesdropping and surveillance market. “Take NICE, Comverse and Check Point for example, three of the largest high-tech companies, which were all directly influenced by 8200 technology,” said Gefen. “Check Point was founded by Unit alumni. Comverse’s main product, the Logger, is based on the Unit’s technology.”
  • According to a former chief of Unit 8200, both the veterans of the group and much of the high-tech intelligence equipment they developed are now employed in high-tech firms around the world. “Cautious estimates indicate that in the past few years,” he told a reporter for the Israeli newspaper Ha’artez in 2000, “Unit 8200 veterans have set up some 30 to 40 high-tech companies, including 5 to 10 that were floated on Wall Street.” Referred to only as “Brigadier General B,” he added, “This correlation between serving in the intelligence Unit 8200 and starting successful high-tech companies is not coincidental: Many of the technologies in use around the world and developed in Israel were originally military technologies and were developed and improved by Unit veterans.
  • Equally troubling is the issue of corruption. Kobi Alexander, the founder and former chairman of Verint, is now a fugitive, wanted by the FBI on nearly three dozen charges of fraud, theft, lying, bribery, money laundering and other crimes. And two of his top associates at Comverse, Chief Financial Officer David Kreinberg and former General Counsel William F. Sorin, were also indicted in the scheme and later pleaded guilty, with both serving time in prison and paying millions of dollars in fines and penalties. When asked about these contractors, the NSA declined to “verify the allegations made.”
  •  
    So, allegedly a Zionist working in NSA passed NSA's telecommunications data mining software to Israel, was identified, but was never prosecuted. And the Verint CEO is now a fugitive from justice on charges of "fraud, theft, lying, money laundering, and other crimes." What's not to like in having this company processing all of our telephone metadata?
3More

Reagan and Obama budget directors urge to cut Pentagon spending - RT USA - 0 views

  • Speaking at a Thomson Reuters Newsmaker event this week, David Stockman and Peter Orszag both said the US could save tremendously if it shifted spending away from the Pentagon, ending the trend of dumping a large chunk of the federal budget on maintaining overseas military bases and lengthy occupations.Stockman, who was budget director from 1981 to 1985 under Republican Ronald Reagan, is considered by Reuters to be “a key architect of tax-cutting policies” enacted during that administration. And although Peter— a former budget director for Democrat President Barack Obama — comes from the other side of the aisle, both say military spending should be slashed to save the country.“We ought to go back to [President Dwight] Eisenhower’s standard on defense,” Stockman said during the discussion. In 1960, he said, Eisenhower closed out his presidency by warning Congress that continuous spending aimed at the Pentagon would feed and foster the military industrial complex that exists today.
  • “Go back to that,” said Stockman. “We could save two trillion dollars over the next 10 years simply by going back to the Eisenhower standard: Getting out of this imperial foreign policy of invasion and occupation; demobilize our forces.”Stockman said that having one-and-a-half million service members in the Armed Forces is “ridiculous,” and that the US could sustain with a military less than one-third of that. “Why do we have a million in our reserves in National Guard?” he asked. “We are spending a quarter of a trillion dollars a year just on manpower and benefits just for all of those people I’ve mentioned, and we have no industrial enemies anywhere in the world.”Orszag failed to go into as great of detail as Stockman in terms of defense spending, instead emphasizing that scaling back Social Security payments and ending income tax cuts could best solve the country’s financial woes.
  • Orszag says governments are right to use spending to stretch out the economic adjustments to keep large segments of population from losing their jobs, which itself can cause long-lasting problems,” reports Reuters.That isn’t to say, however, that he shied away from taking an axe to the Defense Department’s budget in the past. After leaving the Obama White House, he authored an op-ed for Bloomberg News in 2012 where he outlined ways to pinch pennies by giving Uncle Sam less to work with.“In the abstract, reducing defense costs seems pretty simple: Just cut back on some of the really expensive equipment,” Orszag wrote. “The cost of building the F-35 fighter, for example, has been estimated at more than $100 million per plane. The new littoral combat ship, designed to operate in coastal regions, is projected to cost about $600 million per ship.”
6More

Senators accuse government of using 'secret law' to collect Americans' data | World new... - 0 views

  • A bipartisan group of 26 US senators has written to intelligence chiefs to complain that the administration is relying on a "secret body of law" to collect massive amounts of data on US citizens.The senators accuse officials of making misleading statements and demand that the director of national intelligence James Clapper answer a series of specific questions on the scale of domestic surveillance as well as the legal justification for it.In their strongly-worded letter to Clapper, the senators said they believed the government may be misinterpreting existing legislation to justify the sweeping collection of telephone and internet data revealed by the Guardian."We are concerned that by depending on secret interpretations of the Patriot Act that differed from an intuitive reading of the statute, this program essentially relied for years on a secret body of law," they say.
  • "This and misleading statements by intelligence officials have prevented our constituents from evaluating the decisions that their government was making, and will unfortunately undermine trust in government more broadly."This is the strongest attack yet from Congress since the disclosures began, and comes after Clapper admitted he had given "the least untruthful answer possible" when pushed on these issues by Senators at a hearing before the latest revelations by the Guardian and the Washington Post.In a press statement, the group of senators added: "The recent public disclosures of secret government surveillance programs have exposed how secret interpretations of the USA Patriot Act have allowed for the bulk collection of massive amounts of data on the communications of ordinary Americans with no connection to wrongdoing."
  • They said: "Reliance on secret law to conduct domestic surveillance activities raises serious civil liberty concerns and all but removes the public from an informed national security and civil liberty debate." A spokesman for the office of the director of national intelligence (ODNI) acknowledged the letter. "The ODNI received a letter from 26 senators this morning requesting further engagement on vital intelligence programs recently disclosed in the media, which we are still evaluating. The intelligence and law enforcement communities will continue to work with all members of Congress to ensure the proper balance of privacy and protection for American citizens."The letter was organised by Oregan Democrat Ron Wyden, a member of the intelligence committee, but includes four Republican senators: Mark Kirk, Mike Lee, Lisa Murkowski and Dean Heller.
  • ...3 more annotations...
  • The senators said they were seeking public answers to the following questions in order to give the American people the information they need to conduct an informed public debate. The specific questions include:• How long has the NSA used Patriot Act authorities to engage in bulk collection of Americans' records? Was this collection underway when the law was reauthorized in 2006?• Has the NSA used USA Patriot Act authorities to conduct bulk collection of any other types of records pertaining to Americans, beyond phone records?• Has the NSA collected or made any plans to collect Americans' cell-site location data in bulk?• Have there been any violations of the court orders permitting this bulk collection, or of the rules governing access to these records? If so, please describe these violations.
  • They ask Clapper to publicly provide information about the duration and scope of the program and provide examples of its effectiveness in providing unique intelligence, if such examples exist.The senators also expressed their concern that the program itself has a significant impact on the privacy of law-abiding Americans and that the Patriot Act could be used for the bulk collection of records beyond phone metadata."The Patriot Act's 'business records' authority can be used to give the government access to private financial, medical, consumer and firearm sales records, among others," said a press statement.In addition to raising concerns about the law's scope, the senators noted that keeping the official interpretation of the law secret and the instances of misleading public statements from executive branch officials prevented the American people from having an informed public debate about national security and domestic surveillance.
  • A bipartisan group of 26 US senators has written to intelligence chiefs to complain that the administration is relying on a "secret body of law" to collect massive amounts of data on US citizens.The senators accuse officials of making misleading statements and demand that the director of national intelligence James Clapper answer a series of specific questions on the scale of domestic surveillance as well as the legal justification for it.In their strongly-worded letter to Clapper, the senators said they believed the government may be misinterpreting existing legislation to justify the sweeping collection of telephone and internet data revealed by the Guardian."We are concerned that by depending on secret interpretations of the Patriot Act that differed from an intuitive reading of the statute, this program essentially relied for years on a secret body of law," they say."This and misleading statements by intelligence officials have prevented our constituents from evaluating the decisions that their government was making, and will unfortunately undermine trust in government more broadly."
« First ‹ Previous 41 - 60 of 688 Next › Last »
Showing 20 items per page