Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged director

Rss Feed Group items tagged

8More

NSA surveillance reform bill passes House by 303 votes to 121 | World news | theguardia... - 0 views

  • The first legislation aimed specifically at curbing US surveillance abuses revealed by Edward Snowden passed the House of Representatives on Thursday, with a majority of both Republicans and Democrats.But last-minute efforts by intelligence community loyalists to weaken key language in the USA Freedom Act led to a larger-than-expected rebellion by members of Congress, with the measure passing by 303 votes to 121.The bill's authors concede it was watered down significantly in recent days, but insist it will still outlaw the practice of bulk collection of US telephone metadata by the NSA first revealed by Snowden.Some members of Congress were worried that the bill will fail to prevent the National Security Agency from continuing to collect large amounts of data on ordinary US citizens.
  • “Perfect is rarely possible in politics, and this bill is no exception,” said Republican Jim Sensenbrenner, who has led efforts on the House judiciary committee to rein in the NSA.“In order to preserve core operations of the intelligence and law enforcement agencies, the administration insisted on broadening certain authorities and lessening certain restrictions. Some of the changes raise justifiable concerns. I don’t blame people for losing trust in their government, because the government violated their trust.”
  • But the revised language lost the support of several influential members of the judiciary committee who had previously voted for it, including Republicans Darrell Issa, Ted Poe and Raul Labrador and Democrat Zoe Lofgren.Issa also chairs the House oversight committee. Adam Smith, the most senior Democrat on the armed services committee, also voted against the bill.“Regrettably, we have learned that the intelligence community will run a truck through ambiguity,” said Lofgren during an hour and 15 minutes of debate which preceded the vote. No amendments were allowed.
  • ...4 more annotations...
  • After the vote, Mark Jaycox, a legislative analyst at the Electronic Frontier Foundation, said: “The bill is littered with loopholes. The problem right now, especially after multiple revisions, is that it doesn't effectively end mass surveillance.”In a statement, Zeke Johnson, the director of Amnesty International USA's security and human rights program, said the House had “failed to deliver serious surveillance reform”.
  • The size of the rebellion and the seniority of the rebels may support efforts to tighten language in the legislation as it makes its way to the Senate.Senator Patrick Leahy, the chair of the Senate judiciary committee and the lead Democratic author of the Freedom Act, said that the actions of the house in passing it was an “important step towards reforming our nation's surveillance authorities”which “few could have predicted less than a year ago.”However, in a statement issued on Thursday, Leahy expressed disappointment that the bill, which he had introduced jointly with Sensenbrenner in October, had been diluted.
  • Senator Ron Wyden, the Oregon Democrat who has waged an often lonely campaign against NSA surveillance, said he opposed the House bill in the form that passed on Thursday. "I am gravely concerned that the changes that have been made to the House version of this bill have watered it down so far that it fails to protect Americans from suspicionless mass surveillance," he said.He said the Senate version of the bill remained strong, and that he hoped that its provisions could be preserved.
  • The bill was the first vote on a NSA related matter in either the House or Senate since last July, when Republican congressman Justin Amash failed by 205-217 votes to pass an amendment to an appropriations bill that would have stripped funding for bulk surveillance.The revised USA Freedom Act was supported by the White House. Obama had urged for a solution to ending bulk collection of telephone metadata in ways that would not unduly constrain the NSA.
  •  
    On to the Senate. No meaningful reform from the House. That the measure passed was supported by Obama tells the story of its effectiveness. It will "constrain the NSA."
5More

Justice for the MH17 victims is what we all need | Oriental Review - 0 views

  • After keeping a meaningful two-month pause in covering the course of investigation of the MH17 tragedy, the international press has suddenly broke into another wave of baseless accusations against “pro-Russia separatists”, triggered by a “secret report” made by the BND (Bundesnachrichtendienst, German foreign intelligence) for the Bundestag Control Committee on October 8, 2014. Ten days later the Spiegel alleged that at the meeting the BND president Gerhard Schindler had provided “satellite images and diverse photo evidence” to back up his case “proving that pro-Russian separatists captured a BUK air defense missile system at a Ukrainian military base and fired a missile on July 17 that exploded in direct proximity to the Malaysian aircraft”. The allegation was immediately caught up by a number of other top international media. On October 20 Alexander Nerad’ko, the director of Russia’s Federal Air Transport Agency, invited the German intelligence to publish documentation demonstrating the involvement of the insurgents or the Ukrainian army in the disaster. Unfortunately, his request is not met till now. Ironically, one day before BND presented its report to Bundestag, the former Dutch Foreign Affairs Minister Frans Timmermans has casually let out that “the body of one passenger was found wearing an oxygen mask”.
  • This piece of information trashes the theory (which we used to hold too) of a shoot down by a surface-to-air missile as in this case the instantaneous depressurization of the MH17 passenger cabin would cause immediate death of all passengers. Both Western and Russian experts understand that serious conclusions on the causes of MH17 tragedy should be based on professional forensic study of the wreckage and damaging elements. All available technical data from Ukrainian dispatch lines, surveillance by Russia and USA, information of the Ukrainian Air Defense and Boeing Corporation should be made available for the International MH17 investigation commission. All other “leakages” are pointless talks and deceitful manipulation of the public opinion. E.g. the British barrister Alexander Mercouris has provided a detailed analysis depicting numerous controversies in the German report (as least in its clauses leaked to the press).
  • The Russian experts has already gathered all available data and released the Incident Report on MH17 tragedy back in mid-August this year. Its full text in English is available here.
  • ...1 more annotation...
  • Of course, there are plenty of parties interested in concealing the real facts about flight MH17. Symptomatically, on August 8, 2014 the Ukraine, the Netherlands, Belgium and Australia signed a non-disclosure agreement on the crash investigation. Procrastination and delaying of an objective investigation by these sides and international organizations raises doubts whether the concerned parties will make public the findings and true circumstances of the crash of the Malaysia Airlines Boeing 777. Are the relatives of those who died in the flight MH17 the only interested people in bringing the real perpetrators of this horrible criminal act to justice?
  •  
    The point using the body found wearing an oxygen mark ruling out a surface to air missile because of instant cabin depressurization is a very strong point. Another sign pointing to the Ukraine fighter jet shooting out the cockpit, instantly killing the cockpit crew through depressurization, but the plane continuing to fly on autopilot for a period of time before the passenger cabin depressurized. 
1More

United Nations News Centre - Massive scale-up of assistance needed for countries impact... - 0 views

  • The ongoing civil war in Syria and its spillover effects continue to inflict a devastating human and humanitarian toll on neighbouring Iraq, Lebanon and Jordan, a senior United Nations relief official said today, warning that rising numbers of displaced persons, increasing pressure on refugee hosting countries and dwindling international support left the UN “racing against the clock” to meet the needs on the ground. Describing the Syria crisis and its fallout as “the biggest humanitarian crisis we face today in the world,” John Ging, Operations Director for the UN Office for the Coordination of Humanitarian Affairs (OCHA), who just returned from a week in the sub-region, told reporters at Headquarters that “in fact, it is a disaster for millions and millions of people…which, sadly and tragically, is only getting worse and worse.” He said the unprecedented numbers of affected people reveal the scale of the unfolding tragedy, with an estimated 200,000 people inside the country killed and 10.8 million people in need of humanitarian assistance. In addition, some 3.2 million people have fled to neighbouring countries and 6.4 million internally displaced. He said further that 2.8 million children are out of school, putting an entire generation at risk.
5More

CIA Apparently 'Impersonated' Senate Staffers To Gain Access To Documents On Shared Dri... - 0 views

  • No, the most interesting part of the latest Torture Report details almost falls off the end of the page over at The Huffington Post. It's more hints of CIA spying, ones that go a bit further than previously covered. According to sources familiar with the CIA inspector general report that details the alleged abuses by agency officials, CIA agents impersonated Senate staffers in order to gain access to Senate communications and drafts of the Intelligence Committee investigation. These sources requested anonymity because the details of the agency's inspector general report remain classified. "If people knew the details of what they actually did to hack into the Senate computers to go search for the torture document, jaws would drop. It's straight out of a movie," said one Senate source familiar with the document. Impersonating staff to gain access to Senate Torture Report work material would be straight-up espionage. Before we get to the response that mitigates the severity of this allegation, let's look at what we do know.
  • The CIA accessed the Senate's private network to (presumably) gain access to works-in-progress. This was denied (badly) by CIA director John Brennan. The CIA also claimed Senate staffers had improperly accessed classified documents and reported them to the DOJ, even though they knew the charges were false. Then, after Brennan told his agency to stop spying on the Senate, agents took it upon themselves to improperly access Senate email accounts. This is all gleaned from a few public statements and a one-page summary of an Inspector General's report -- the same unreleased report EPIC is currently suing the agency over. Now, there's this: accusations that the CIA impersonated Senate staffers in hopes of accessing Torture Report documents. Certainly a believable accusation, considering the tactics it's deployed in the very recent past. This is being denied -- or, at least, talked around.
  • A person familiar with the events surrounding the dispute between the CIA and Intelligence Committee said the suggestion that the agency posed as staff to access drafts of the study is untrue. “CIA simply attempted to determine if its side of the firewall could have been accessed through the Google search tool. CIA did not use administrator access to examine [Intelligence Committee] work product,” the source said. So, it was a just an innocuous firewall test. And according to this explanation, it wasn't done to examine the Senate's in-progress Torture Report. But this narrative meshes with previous accusations, including those detailed in the Inspector General's report. Logging on to the shared drives with Senate credentials would allow agents to check the firewall for holes. But it also would allow them to see other Senate documents, presumably only accessible from that "side" of the firewall. While there's been no mention of "impersonation" up to this point, the first violation highlighted by the IG's report seems to be the most likely explanation of what happened here.
  • ...1 more annotation...
  • Five Agency employees, two attorneys and three information technology (IT) staff members, improperly accessed or caused access to the SSCI Majority staff shared drives on the RDINet Accessing another part of the shared network/drive by using someone else's credentials is low-level hackery, but not the first thing that springs to mind when someone says "impersonation." A supposed firewall test would be the perfect cover for sniffing around previously off-limits areas. Much of what has come to light about the agency's actions hints at low-level espionage. There's still more buried in the IG report that the agency is actively trying to keep from being made public. Just because these activities didn't specifically "target" Senate work material, it was all there and able to accessed. It doesn't really matter what the CIA says it was looking for. The fact that it was done at all, and done with such carefree audacity, is the problem. There are presumably ways to perform these checks that don't involve Inspector Generals, damning reports and multiple hacking accusations.
  •  
    So it takes three technical staff and two CIA lawyers to check a firewall? Lawyers? So if I want to check my firewall, I need to hire three technical staff and two lawyers? 
4More

Petraeus Spared Ray McGovern's Question | Consortiumnews - 0 views

  • New York City police arrested ex-CIA analyst Ray McGovern to prevent him from attending a public event where he planned to pose a pointed question to retired Gen. David Petraeus, another sign of how much U.S. neocons love democracy, writes Robert Parry.
  • Former CIA analyst Ray McGovern, who was arrested by New York City police on Thursday night to prevent him from attending a speech by retired Gen. and ex-CIA Director David Petraeus, told me the day before that he was planning to ask a question during the Q-and-A. McGovern, who writes regularly for Consortiumnews.com, compared his goal in New York to his famous questioning of then-Defense Secretary Donald Rumsfeld in Atlanta in 2006 when McGovern pressed Rumsfeld on false statements he had made about Iraq’s WMD and ties to al-Qaeda.
  • But the 75-year-old McGovern was blocked from entering the event at the 92nd Street Y, was roughly put under arrest, and was held overnight in jail. He described his ordeal in an interview with RT, saying “I was warned as soon as I got to the ticket-taker, ‘Ray, you’re not welcome here.’” McGovern, who was suffering from a shoulder injury, said he was caused sharp pain by being forcefully handcuffed. “If you’ve seen the footage, you can see me screaming in pain as they try to pin my left wrist around behind my back,” McGovern told RT.
  • ...1 more annotation...
  • He was hauled off to a local precinct and charged with resisting arrest, criminal trespass and disorderly conduct. He said he spent the night on a stainless steel cot.
6More

FBI demands new powers to hack into computers and carry out surveillance | US news | Th... - 0 views

  • The FBI is attempting to persuade an obscure regulatory body in Washington to change its rules of engagement in order to seize significant new powers to hack into and carry out surveillance of computers throughout the US and around the world. Civil liberties groups warn that the proposed rule change amounts to a power grab by the agency that would ride roughshod over strict limits to searches and seizures laid out under the fourth amendment of the US constitution, as well as violate first amendment privacy rights. They have protested that the FBI is seeking to transform its cyber capabilities with minimal public debate and with no congressional oversight. The regulatory body to which the Department of Justice has applied to make the rule change, the advisory committee on criminal rules, will meet for the first time on November 5 to discuss the issue. The panel will be addressed by a slew of technology experts and privacy advocates concerned about the possible ramifications were the proposals allowed to go into effect next year.
  • “This is a giant step forward for the FBI’s operational capabilities, without any consideration of the policy implications. To be seeking these powers at a time of heightened international concern about US surveillance is an especially brazen and potentially dangerous move,” said Ahmed Ghappour, an expert in computer law at University of California, Hastings college of the law, who will be addressing next week’s hearing. The proposed operating changes related to rule 41 of the federal rules of criminal procedure, the terms under which the FBI is allowed to conduct searches under court-approved warrants. Under existing wording, warrants have to be highly focused on specific locations where suspected criminal activity is occurring and approved by judges located in that same district. But under the proposed amendment, a judge can issue a warrant that would allow the FBI to hack into any computer, no matter where it is located. The change is designed specifically to help federal investigators carry out surveillance on computers that have been “anonymized” – that is, their location has been hidden using tools such as Tor.
  • Were the amendment to be granted by the regulatory committee, the FBI would have the green light to unleash its capabilities – known as “network investigative techniques” – on computers across America and beyond. The techniques involve clandestinely installing malicious software, or malware, onto a computer that in turn allows federal agents effectively to control the machine, downloading all its digital contents, switching its camera or microphone on or off, and even taking over other computers in its network.
  • ...2 more annotations...
  • Civil liberties and privacy groups are particularly alarmed that the FBI is seeking such a huge step up in its capabilities through such an apparently backdoor route. Soghoian said of next week’s meeting: “This should not be the first public forum for discussion of an issue of this magnitude.” Jennifer Granick, director of civil liberties at the Stanford center for internet and society, said that “this is an investigative technique that we haven’t seen before and we haven’t thrashed out the implications. It absolutely should not be done through a rule change – it has to be fully debated publicly, and Congress must be involved.” Ghappour has also highlighted the potential fall-out internationally were the amendment to be approved. Under current rules, there are no fourth amendment restrictions to US government surveillance activities in other countries as the US constitution only applies to domestic territory.
  • Another insight into the expansive thrust of US government thinking in terms of its cyber ambitions was gleaned recently in the prosecution of Ross Ulbricht, the alleged founder of the billion-dollar drug site the Silk Road. Experts suspect that the FBI hacked into the Silk Road server, that was located in Reykjavik, Iceland, though the agency denies that. In recent legal argument, US prosecutors claimed that even if they had hacked into the server without a warrant, it would have been justified as “a search of foreign property known to contain criminal evidence, for which a warrant was not necessary”.
  •  
    This rule change has been in the works during the last year.  "The change is designed specifically to help federal investigators carry out surveillance on computers that have been "anonymized" - that is, their location has been hidden using tools such as Tor."  Are we dizzy yet? The State Department is pushing the use of TOR by dissidents in nations whose governments State and the CIA intends to overthrow. Meanwhile, Feed Bag, Inc. wants use of TOR to be sufficient grounds for installing malware on anyone using it to make their systems and all their systems can see or hear be an open book. Let's see. There's the First Amendment right to anonymous speech just to begin with. McIntyre v. Ohio Elections Comm'n, 514 US 334 (1995). ("Under our Constitution, anonymous pamphleteering is not a pernicious, fraudulent practice, but an honorable tradition of advocacy and of dissent. Anonymity is a shield from the tyranny of the majority. It thus exemplifies the purpose behind the Bill of Rights, and of the First Amendment in particular: to protect unpopular individuals from retaliation-and their ideas from suppression-at the hand of an intolerant society. The right to remain anonymous may be abused when it shields fraudulent conduct. But political speech by its nature will sometimes have unpalatable consequences, and, in general, our society accords greater weight to the value of free speech than to the dangers of its misuse.") (Internal citation omitted.) And of course there's the Natural Law liberty to whisper, to utter words in a way that none but the intended recipient can hear. So throw on the violation of the Fifth Amendment's Liberty clause. Then there's the plain language of the Fourth Amendment warrant clause, "particularly describing the *place* to be searched." Not to mention the major reason for the Fourth Amendment, to abolish the "general warrant" that had enabled the Crown to search wherever the warrant's executor's little heart desired.  And th
4More

Risky Business » CounterPunch: Tells the Facts, Names the Names - 0 views

  • Last week, the country’s biggest mortgage lenders scored a couple of key victories that will allow them to ease lending standards, crank out more toxic assets, and inflate another housing bubble.  Here’s what’s going on. On Monday,  the head of the Federal Housing Finance Agency (FHFA), Mel Watt, announced that Fannie and Freddie would slash the minimum down-payment requirement on mortgages from 5 percent to 3 percent while making loans more available to people with spotty credit. If this all sounds hauntingly familiar, it should. It was less than 7 years ago that shoddy lending practices blew up the financial system precipitating the deepest slump since the Great Depression. Now Watt wants to repeat that catastrophe by pumping up another credit bubble.
  • Here’s the story from the Washington Post: “When it comes to taking out a mortgage, two factors can stand in the way: the price of the mortgage,…and the borrower’s credit profile.” On Monday, the head of the agency that oversees the mortgage giants Fannie Mae and Freddie Mac outlined … how he plans to make it easier for borrowers on both fronts. Mel Watt, director of the Federal Housing Finance Agency, did not give exact timing on the initiatives. But most of them are designed to encourage the industry to extend mortgages to a broader swath of borrowers.
  • Here’s what Watt said about his plans in a speech at the Mortgage Bankers Association annual convention in Las Vegas: Saving enough money for a downpayment is often cited as the toughest hurdle for first-time buyers in particular. Watt said that Fannie and Freddie are working to develop “sensible and responsible” guidelines that will allow them to buy mortgages with down payments as low as 3 percent, instead of the 5 percent minimum that both institutions currently require.”
  • ...1 more annotation...
  • It might be worth noting at this point that Watt’s political history casts doubt on his real objectives.   According to Open Secrets, among the Top 20 contributors to Watt’s 2009-2010 campaign were Goldman Sachs, Bank of America, Citigroup Inc., Bank of New York Mellon, American bankers Association, US Bancorp, and The National Association of Realtors. (“Top 20 Contributors, 2009-2010“, Open Secrets)
4More

Peekaboo, I See You: Government Authority Intended for Terrorism is Used for Other Purp... - 0 views

  • The Patriot Act continues to wreak its havoc on civil liberties. Section 213 was included in the Patriot Act over the protests of privacy advocates and granted law enforcement the power to conduct a search while delaying notice to the suspect of the search. Known as a “sneak and peek” warrant, law enforcement was adamant Section 213 was needed to protect against terrorism. But the latest government report detailing the numbers of “sneak and peek” warrants reveals that out of a total of over 11,000 sneak and peek requests, only 51 were used for terrorism. Yet again, terrorism concerns appear to be trampling our civil liberties. Throughout the Patriot Act debate the Department of Justice urged Congress to pass Section 213 because it needed the sneak and peak power to help investigate and prosecute terrorism crimes “without tipping off terrorists.” In 2005, FBI Director Robert Mueller continued the same exact talking point, emphasizing sneak and peek warrants were “an invaluable tool in the war on terror and our efforts to combat serious criminal conduct.”
  • What do the reports reveal? Two things: 1) there has been an enormous increase in the use of sneak and peek warrants and 2) they are rarely used for terrorism cases. First, the numbers: Law enforcement made 47 sneak-and-peek searches nationwide from September 2001 to April 2003. The 2010 report reveals 3,970 total requests were processed. Within three years that number jumped to 11,129. That's an increase of over 7,000 requests. Exactly what privacy advocates argued in 2001 is happening: sneak and peak warrants are not just being used in exceptional circumstances—which was their original intent—but as an everyday investigative tool.
  • Second, the uses: Out of the 3,970 total requests from October 1, 2009 to September 30, 2010, 3,034 were for narcotics cases and only 37 for terrorism cases (about .9%). Since then, the numbers get worse. The 2011 report reveals a total of 6,775 requests. 5,093 were used for drugs, while only 31 (or .5%) were used for terrorism cases. The 2012 report follows a similar pattern: Only .6%, or 58 requests, dealt with terrorism cases. The 2013 report confirms the incredibly low numbers. Out of 11,129 reports only 51, or .5%, of requests were used for terrorism. The majority of requests were overwhelmingly for narcotics cases, which tapped out at 9,401 requests.
  • ...1 more annotation...
  • Section 213 may be less known than Section 215 of the Patriot Act (the clause the government is currently using to collect your phone records), but it's just as important. The Supreme Court ruled in Wilson v. Arkansas and Richards v. Wisconsin that the Fourth Amendment requires police to generally “knock and announce” their entry into property as a means of notifying a homeowner of a search. The idea was to give the owner an opportunity to assert their Fourth Amendment rights. The court also explained that the rule could give way in situations where evidence was under threat of destruction or there were concerns for officer s
4More

British Spies Allowed to Access U.S. Data Without a Warrant - NationalJournal.com - 0 views

  • British authorities are capable of tapping into bulk communications data collected by other countries' intelligence services—including the National Security Agency—without a warrant, according to secret government documents released Tuesday. The agreement between the NSA and Britain's spy agency, known as Government Communications Headquarters or GCHQ, potentially puts the Internet and phone data of Americans in the hands of another country without legal oversight when obtaining a warrant is "not technically feasible."   The data, once obtained, can be kept for up to two years, according to internal policies disclosed by the British government. GCHQ was forced to reveal that it can request and receive vast quantities of raw, unanalyzed data collected from foreign governments it partners with during legal proceedings in a closed court hearing in a case brought by various international human-rights organizations, including Privacy International, Liberty U.K., and Amnesty International. The suit challenges certain aspects of GCHQ's surveillance practices.
  • It is well known that the NSA and GCHQ closely share intelligence data with one another, as part of a long-standing surveillance partnership. Some details of the agencies' spy pact were exposed by former NSA contractor Edward Snowden last year, including the existence of GCHQ's Tempora program, which taps into fiber-optic cables to scoop up online and telephone traffic across the Web for up to 30 days. But this is the first time the British government has disclosed that it does not require a warrant to access data collected and maintained by its American counterparts. The revelation appears to counter statements made by an oversight committee of the British Parliament in July of last year that "in each case where GCHQ sought information from the U.S., a warrant for interception, signed by a minister, was already in place."   It is unclear whether any restrictions on Britain's access to NSA surveillance data is imposed by the U.S. However, documents provided by Snowden to The Guardian last year reveal that the NSA shares raw intelligence data with Israel without removing information about U.S. citizens.
  • In a statement, the NSA said it works with a number of partner countries to further its "foreign intelligence mission." But it did not specify whether it was aware of or condoned Britain's apparent warrantless access of its data. "Whenever NSA shares intelligence information, we comply with all applicable rules, including rules designed to safeguard U.S. person information," the agency said. "NSA does not ask its foreign partners to undertake any intelligence activity that the U.S. government would be legally prohibited from undertaking itself." American privacy advocates quickly condemned any warrantless access of U.S. communications data by British authorities.   "The 'arrangement' disclosed today suggests that the two countries are circumventing even the very weak safeguards that have been put in place," Jameel Jaffer, deputy legal director of the American Civil Liberties Union, said in a statement to National Journal. "It underscores both the inadequacy of existing oversight structures and the pressing need for [surveillance] reform."
  •  
    Note that this came out in a court case; it is not a Snowden leak. 
1More

ClassicWHO: Why Petraeus Takedown May Have Been an Inside Job - WhoWhatWhy - 0 views

  • Was the ambitious General David Petraeus targeted for take-down by competing interests in the US military/intelligence hierarchy—years before his abrupt downfall last year in an adultery scandal? Previously unreported documents analyzed by WhoWhatWhy suggest as much. They provide new insight into the scandalous extramarital romance that led to Petraeus’s resignation as CIA director in November after several years of rapid rise—going from a little-known general to a prospective presidential candidate in a stunningly brief time frame.
7More

Pentagon fears blowback from 'humane' Guantánamo video release | The Miami He... - 0 views

  • A Pentagon official is invoking the revulsion of Muslims worldwide over images of U.S. Marines urinating on corpses to predict the global backlash at seeing videos of Guantánamo troops hauling a captive to force-feedings.The Justice Department included the declaration in a renewed bid to prevent the public from seeing 32 videos made by U.S. forces at the detention center in Cuba. “While the videos at issue in this litigation do not in my opinion depict any improper treatment of the detainees, but rather the lawful, humane and appropriate interaction between guards and detainees,” wrote U.S. Navy Rear Adm. Sinclair Harris, “persons and entities hostile to the United States and its detention of enemy belligerents at Guantánamo Bay are likely to think otherwise.”Harris is vice director of operations at the Department of Defense Joint Staff, and said he had watched some of the videos — which lawyers say portray troops forcing captive Abu Wa’el Dhiab to tube feedings. The admiral said he concluded the images could be used for propaganda purposes to stoke anti-American sentiment and put U.S. citizens at risk in Iraq and Afghanistan.
  • Dhiab, 43, was cleared for release from Guantánamo years ago but can’t be repatriated to his native Syria, a nation now wracked with Islamic State violence. Instead, Uruguay has offered him sanctuary in a deal that was sidelined first by the Pentagon then by that South American nation’s elections. He has been protesting by hunger striking.Dhiab wants the videos released, according to one of his attorneys, Cori Crider, and so does a consortium of 16 media organizations, which petitioned a federal court in Washington, D.C. On Oct. 3, Judge Gladys Kessler ordered the U.S. government to obscure the faces and identities in the videos of everyone but the captive, then make them public. Tuesday, U.S. government lawyers notified Kessler’s court that it would file an appeal.
  • Dhiab’s attorney argues that ugly optics are no excuse.“I’ve seen the videos — and of course they’re upsetting,” Crider said Wednesday by email from Reprieve, a London-based law firm that represents Dhiab at no charge. “But that’s no reason to hide the truth from Americans.” “By that logic, think of all the government scandals that never would have seen the light of day,” she added, citing the 2003 photos of guards abusing detainees at Abu Ghraib prison in Iraq and images of the 1968 My Lai massacre that “changed the conversation about Vietnam.”Reprieve’s legal team discovered there were recordings during a forced-feeding challenge; the detention center says it has since discontinued taping the tube feedings for reasons of patient privacy.
  • ...3 more annotations...
  • Harris suggested the videos could lead to the “perceived mistreatment of individuals,” and serve as a recruiting tool for the Islamic State. In his declaration he noted that South Florida journalist Steven Sotloff was forced by his captors to make an anti-Guantánamo statement before he was beheaded earlier this year. When Sotloff was killed, he was clad in an orange jumpsuit that has come to symbolize the prison in southeast Cuba.
  • Harris argued against release based on “prior experience from the release of certain provocative photographs and information.” He noted that “in 2012 the release of a video depicting Marines urinating on the corpses of alleged Taliban members was used as a recruitment tool for the Taliban and led to an Afghan soldier attacking and killing French troops.”It is not known when the U.S. Court of Appeals for the District of Columbia Circuit would take up the Justice Department appeal because Tuesday’s filing was not the appeal itself but notice to the court that the Obama administration was appealing Kessler’s release order.Separately, the prison camps commander Navy Rear Adm. Kyle Cozad, argued that disclosure of the videos would tip captives to certain techniques used by its tackle-and-shackle squad of soldiers — something Judge Kessler ridiculed in her ruling as “implausible” because the captives experience what is portrayed in the videos.
  • Cozad, however, suggested in a heavily redacted 13-page sworn statement that if the videos are released he might restrict access to news media in the cellblocks, a popular distraction at the detention center that the admiral characterized as “important for intellectual stimulation and overall morale.”He also listed a series of assaults that apparently occurred since he took over this summer, including a captive who resisted his force-feeding by biting a guard and another who hit a soldier in the face with a handcuffed fist.He called the videos a useful tool for the prison, saying staff likened them to “an NFL team watching video of the previous week’s football game to determine what plays worked well, what they did wrong, and what they could do better during the next game.”
  •  
    If DOJ does not win its appeal, watch for the GITMO prisoner to be suddenly released in order to moot his case so the video doesn't have to be disclosed.  
2More

Louis Freeh's Latest Investigation: Billionaire Businessman Accused of Bribing African ... - 0 views

  • Louis Freeh, the former FBI director whose wife was deeded half of a $3 million beachside penthouse by a businessman–just nine days after Freeh cleared that same businessman of wrongdoing–is onto a new job: Helping exonerate a billionaire businessman accused of bribing an African government. As I reported here the other day, Freeh has made piles of money since leaving government service by hiring himself out to conduct allegedly independent corporate and political investigations.  These investigations are clearly a growth business, because now Freeh’s firm is helping coordinate the defense of an Israeli billionaire who is being investigated on three continents in regard to bribes he allegedly paid to win a mining stake in one of the world’s poorest countries.
  • The case involves Israeli billionaire Beny Steinmetz, who controls BSGR, a holding company that in 2008 obtained a huge stake in a gigantic iron mine in the West African nation of Guinea. BSGR reportedly paid nothing for its rights to Simandou and two years later flipped 51% of its stake to a Brazilian mining giant for $2.5 billion – twice the size of Guinea’s annual budget. The deal was consummated two weeks before the death of Lansana Conté, a homicidal dictator who had ruled since a 1984 coup. An investigation by the current government of Guinea found that a shell company controlled by BSGR paid at least $2.4 million to Mamadie Touré, a wife of the former dictator, in return for her help in acquiring the rights to the mine for BSGR. Earlier this year the government annulled BSGR’s stake in the mine, saying the firm had obtained it through corruption. Police in France and Switzerland raided offices linked to Steinmetz, and in the United States, there is an ongoing court case in the Southern District of New York about the Simandou affair as well as a huge Foreign Corrupt Practices Act investigation led by the Justice Department. The Justice Department could indict Steinmetz if it’s shown that he played a direct role in paying bribes. (See this fantastic New Yorker account if you want the full story. Also see the great work by Global Witness.)
6More

Palestinians Seen Gaining Momentum in Quest for Statehood - NYTimes.com - 0 views

  • When the Palestinians sought statehood at the United Nations in 2011, it was widely dismissed as a symbolic gambit to skirt negotiations with Israel and Washington’s influence over the long-running conflict. But the Palestinians have begun to translate a series of such symbolic steps, culminating in last week’s move to join the International Criminal Court, into a strategy that has begun to create pressure on Israel.While many prominent Israelis have called for unilateral action to set the country’s borders, it is Palestinians who have gained political momentum with moves made outside of negotiations. The Palestinians are, in effect, establishing a legal state. International recognition, by 135 countries and counting, is what Palestinians are betting could eventually force changes on the ground — without their leaders having to make the concessions or assurances they have long avoided.
  • President Abbas, having joined the International Criminal Court after months of rebuffing internal pressure to do so, now faces calls from a frustrated public to go further, by halting security coordination with Israel or dissolving the Palestinian Authority. While both steps would be problematic for the Palestinians as well as the Israelis, Palestinian leaders see it as a way to further squeeze Israel. Without the authority, Israel would have to provide services and maintain order across the West Bank without Palestinian security forces, which would likely be both costly and chaotic, and could intensify international frustration with Israel’s occupation.“I’m a little surprised with the negative American reaction because Palestinians either pursue peaceful legal approaches or pursue violent illegal approaches,” said Ghassan Khatib, vice president of Birzeit University in the West Bank. “But if all the doors are closed, and if the Israelis and the Americans will stop funding, then the P.A. will collapse, and that will play to the hands of the extreme elements in Palestinian society, including Hamas.”
  • President Mahmoud Abbas of the Palestinian Authority seems undeterred and increasingly indifferent to American diplomacy. He vowed Sunday to resubmit a Security Council resolution that failed last week “again and again” and to “join 100, 200, 300” international organizations, despite the risk that Israeli and American sanctions could lead to his government’s collapse.
  • ...3 more annotations...
  • “Those states that have recognized the State of Palestine, that’s not an insignificant number, they’ve reached a kind of critical mark,” said Mark Ellis, director of the London-based International Bar Association. “We’ve added an additional complexity to this very long 66-year-old journey. I think it’s intriguing.”
  • In some ways, the dual Palestinian tracks seem contradictory — how could they continue to make the case for statehood if they collapse the provisional authority the Oslo Accords created two decades ago for state-building? But it is the Palestine Liberation Organization, not the Palestinian Authority, that represents Palestinians on the world stage. Mr. Ellis, the international-law expert, said that Palestine met the criteria for statehood — permanent population, defined territory, government, and recognition by other states — and that those would not be nullified if the authority disappeared and chaos ensued on the ground. Mustafa Barghouti, one of many Palestinian leaders pressing Mr. Abbas to collapse the authority, envisions “a government in exile” for a “state under occupation.”
  • “This would mean liberating the Palestinian movement from all these restrictions and obligations by Israel — it’s like declaring civil disobedience,” Mr. Barghouti said. “In a way, it’s the end of the Oslo era. For me, it was the end many years ago. For Abbas, it was the end only this week.”
5More

Verizon's New, Encrypted Calling App Plays Nice With the NSA - Businessweek - 0 views

  • Verizon is the latest big company to enter the post-Snowden market for secure communication, and it's doing so with an encryption standard that comes with a way for law enforcement to access ostensibly secure phone conversations.Verizon Voice Cypher, the product introduced on Thursday with the encryption company Cellcrypt, offers business and government customers end-to-end encryption for voice calls on iOS, Android, or BlackBerry devices equipped with a special app. The encryption software provides secure communications for people speaking on devices with the app, regardless of their wireless carrier, and it can also connect to an organization's secure phone system. Cellcrypt and Verizon both say that law enforcement agencies will be able to access communications that take place over Voice Cypher, so long as they're able to prove that there's a legitimate law enforcement reason for doing so. Seth Polansky, Cellcrypt's vice president for North America, disputes the idea that building technology to allow wiretapping is a security risk. "It's only creating a weakness for government agencies," he says. "Just because a government access option exists, it doesn't mean other companies can access it." 
  • Phone carriers like Verizon are required by U.S. law to build networks that can be wiretapped. But the legislation known as the Communications Assistance for Law Enforcement Act requires phone carriers to decrypt communications for the government only if they have designed their technology to make it possible to do so. If Verizon and Cellcrypt had structured their encryption so that neither company had the information necessary to decrypt the calls, they would not have been breaking the law.
  • Other companies have designed their encryption in this way, including AT&T, which offers encrypted phone service for business customers. Apple and Android recently began protecting content stored on users's phones in a way that would keep the tech companies from being able to comply with requests from law enforcement. The move drew public criticism from FBI Director James Comey, and some security experts expect that a renewed effort to stir passage of legislation banning such encryption will accompany Silicon Valley's increased interest in developing these services. Verizon believes major demand for its new encryption service will come from governmental agencies conveying sensitive but unclassified information over the phone, says Tim Petsky, a senior product manager for Verizon Wireless. Corporate customers who are concerned about corporate espionage are also itching for answers. "You read about breaches in security almost every week in the press," says Petsky. "Enterprise customers have been asking about ways to secure their communications and up until this point, we didn't have a solution." 
  • ...2 more annotations...
  • There has been increased interest in encryption from individual consumers, too, largely thanks to the NSA revelations leaked by Edward Snowden. Yahoo and Google began offering end-to-end encrypted e-mail services this year. Silent Circle, a startup catering to consumer and enterprise clients, has been developing end-to-end voice encryption for phones calls. Verizon's service, with a monthly price of $45 per device, isn't targeting individual buyers and won't be offered to average consumers in the near future.But Verizon's partner, Cellcrypt, looks upon selling to large organizations as the first step toward bringing down the price before eventually offering a consumer-level encryption service. "At the end of the day, we'd love to have this be a line item on your Verizon bill," says Polansky.
  • Many people in the security industry believe that a designed access point creates a vulnerability for criminals or spies to exploit. Last year reports surfaced that the FBI was pushing legislation that would require many forms of Internet communication to be wiretap-ready. A group of prominent security experts responded strongly: "Requiring software vendors to build intercept functionality into their products is unwise and will be ineffective, with the result being serious consequences (PDF) for the economic well-being and national security of the United States," they wrote in a report issued in May. 
8More

Cuomo to Ban Fracking in New York State, Citing Health Risks - NYTimes.com - 0 views

  • Gov. Andrew M. Cuomo’s administration announced on Wednesday that it would ban hydraulic fracturing in New York State because of concerns over health risks, ending years of uncertainty over the controversial method of natural gas extraction.State officials concluded that fracking, as the method is known, could contaminate the air and water and pose inestimable dangers to public health.That conclusion was delivered during a year-end cabinet meeting convened by Mr. Cuomo in Albany. It came amid increased calls by environmentalists to ban fracking, which uses water and chemicals to release natural gas trapped in deeply buried shale deposits.
  • Gov. Andrew M. Cuomo’s administration announced on Wednesday that it would ban hydraulic fracturing in New York State because of concerns over health risks, ending years of uncertainty over the controversial method of natural gas extraction.State officials concluded that fracking, as the method is known, could contaminate the air and water and pose inestimable dangers to public health.That conclusion was delivered during a year-end cabinet meeting convened by Mr. Cuomo in Albany. It came amid increased calls by environmentalists to ban fracking, which uses water and chemicals to release natural gas trapped in deeply buried shale deposits.
  • The question of whether to allow fracking has been one of the most divisive public policy debates in New York in years, pitting environmentalists against others who saw it as a critical way to bring jobs to economically stagnant portions of upstate.
  • ...5 more annotations...
  • He repeatedly put off making a decision on how to proceed, most recently citing an ongoing — and seemingly never-ending — study by state health officials.On Wednesday, six weeks after Mr. Cuomo won re-election to a second term, the long-awaited health study finally materialized.In a presentation at the cabinet meeting, the acting state health commissioner, Dr. Howard A. Zucker, said the examination had found “significant public health risks” associated with fracking.Holding up scientific studies to animate his arguments, Dr. Zucker listed concerns about water contamination and air pollution, and said there was insufficient scientific evidence to affirm the long-term safety of fracking.Dr. Zucker said his review boiled down to a simple question: Would he want to live in a community that allowed fracking?He said the answer was no.
  • New York has had a de facto ban on the procedure for more than five years, predating Mr. Cuomo’s election. Over the course of his first term, Mr. Cuomo at times sent conflicting signals about how he would proceed.In 2012, Mr. Cuomo flirted with approving a limited program in several struggling Southern Tier counties along New York’s border with Pennsylvania. But later that year, Mr. Cuomo bowed to entreaties from environmental advocates, announcing instead that his administration would start the regulatory process over by beginning a new study to evaluate the health risks.
  • The governor’s uncertain stance on fracking also hurt his standing with some liberal activists. Pledging to ban fracking, a little-known law professor won about a third of the vote in the Democratic primary in September, a strong showing that Mr. Cuomo later attributed in part to support from fracking opponents.Complicating matters, dozens of communities across New York have passed moratoriums and bans on fracking, and in June, the state’s highest court, the Court of Appeals, ruled that towns could use zoning ordinances to ban fracking.Recognizing the sensitivity of the issue, Mr. Cuomo both affirmed the fracking ban on Wednesday and tried to keep some distance from it, saying that he was deferring to the expertise of his health and environmental conservation commissioners.
  • Nevertheless, environmental groups cast the governor as a hero. Michael Brune, the executive director of the Sierra Club, said Mr. Cuomo “set himself apart as a national political leader who stands up for people” over the energy industry.But advocates of fracking accused him of giving in to fear-mongering by environmentalists.
  • Document Health Department Report on Fracking in New York State The Cuomo administration decided to ban hydraulic fracturing after concluding that the method posed inestimable public-health risks.
2More

Ukraine Massacre has CIA Fingerprints Says Oliver Stone | News | teleSUR - 0 views

  • Revered film maker Oliver Stone revealed that the overthrow of the Ukrainian president in February 2014, in which more than 50 people were killed, has the hallmarks of the techniques used by the CIA to remove undesirable leaders in Venezuela, Chile and Iran. After a four-hour interview with the ousted, legitimately elected president Viktor Yanukovych, Stone concluded that a “third party” played a part in the massacre, and that the resulting shooting had “CIA fingerprints on it.” “It seems clear that the so-called ‘shooters’ who killed 14 police men, wounded some 85, and killed 45 protesting civilians, were outside third party agitators. Many witnesses, including Yanukovych and police officials, believe these foreign elements were introduced by pro-Western factions -- with CIA fingerprints on it,” the director wrote on his Facebook page.
  • Stone went on to point out the “similar technique” used against former Venezuelan President Hugo Chavez's elected government in 2002, when he was briefly driven out, which also used “mysterious shooters in office buildings.” Just like in the Maiden Massacre, the mainstream media portrayed the latter event as the work of a brutal, authoritarian government. “Create enough chaos, as the CIA did in Iran ‘53, Chile ‘73, and countless other coups, and the legitimate government can be toppled. It’s America’s soft power technique called ‘Regime Change 101,'” Stone said. The documentary-maker, who spoke to Yanukovych for a new film, said that the United States would not be able to hide its crimes for much longer. “The truth is not being aired in the West. It’s a surreal perversion of history that’s going on once again, as in Bush pre-Iraq ‘WMD’ campaign. But I believe the truth will finally come out in the West, I hope, in time to stop further insanity,” Stone concluded.
3More

Israel to ask U.S. congressmen to halt aid to Palestinians - Diplomacy and Defense Isra... - 0 views

  • After freezing the transfer of tax revenues to the Palestinian Authority, Israel is taking additional steps to punish the PA’s for its request to join the International Criminal Court at The Hague. A senior Israeli official said on Sunday Jerusalem would be contacting pro-Israel members of the U.S. Congress to ensure the enforcement of legislation stipulating that if the Palestinians initiate any action against Israel at the ICC, the State Department would have to stop American aid to the PA, which comes to some $400 million annually. The stop-gap funding bill was passed in Congress last month. Both houses of the new Congress to be seated later this month will be controlled by the Republican Party, with many key positions filled by senators and representatives who are pro-Israel and anti-Palestinian. The law regarding the Palestinians initiating action at the ICC is strongly worded and states that President Barack Obama cannot waive a decision to halt aid to the PA.
  • The U.S. administration is concerned about the ramifications of halting the financial assistance, which is liable to make it impossible for the PA to pay the salaries of tens of thousands of employees. Although Arab states have promised to provide the PA with a financial security net, the Americans believe that, as in the past, the Arab states won’t cough up the money they promised and won’t work to keep the PA afloat. Earlier Sunday, Foreign Ministry Director-General Nissim Ben Sheetrit said that Israel’s response to the Palestinian bid at the ICC would be much harsher and more comprehensive than freezing the PA’s tax revenues. Ben Sheetrit made the remarks at a conference held in Jerusalem for Israel’s envoys to Europe. “Israel is about to switch from defense to attack mode,” he said. Sheetrit said, however, that unlike in the past, Israel will not launch a wave of settlement construction in response to the Palestinian moves. He also added Israel had no interest in undermining security cooperation with the PA or to cause its collapse.
  • The security cabinet is expected to meet later in the week to decide on the new measures.   Prime Minister Benjamin Netanyahu told the weekly cabinet meeting on Sunday that “The Palestinian Authority has chosen to launch a confrontation with Israel,” adding that Israel would not sit idly by but would respond. “We won’t let them drag Israel Defense Forces soldiers and officers to The Hague,” said Netanyahu. “The ones who must give an accounting are the heads of the Palestinian Authority, who formed an alliance with the Hamas war criminals.”
4More

U.S. Stockpiling Fighting Vehicles, Gear in Kuwait Ahead of Anti-ISIS Offensive - US News - 0 views

  • Since June, the U.S. military has been slowly stockpiling massive amounts of its gear coming out of Afghanistan at a depot in Kuwait adjacent to a bustling commercial port, in preparation for ultimately shipping it across the border into Iraq for an allied offensive against the Islamic State group.
  • The gear, primarily from the Army, will be fixed up and held as top U.S. planners in Iraq determine what they’ll need to defeat the Islamic State group in the coming months, says Air Force Maj. Gen. Rowayne “Wayne” Schatz, the director of operations and plans for U.S. Transportation Command. “From June to December, we’ve worked a lot on moving items into Kuwait,” he says. “The Army is holding the gear there, and it has room to hold it, as the mission fleshes out.”
  • “I don’t want to disclose any timelines,” Lt. Gen. James Terry, commander of the Combined Joint Task Force-Operation Inherent Resolve, said during a news conference at the Pentagon. The task force is focusing on supporting, rebuilding and training Iraq's fractured military and National Guard forces to prepare them to take on the vicious extremist army. Terry cited Mosul and Anbar province, along with the cities of Ramadi and Baiji, as key areas his forces will try to wrest away from Islamic State group control.
  •  
    And yes, President Obama promised no American boots on the ground in the "war against ISIL." No American troops will drive those thousands of MRAPS in Iraq or Syria; the vehicles are being fitted with remote control devices and will be driven by CIA personnel stationed in the U.S. who will concurrently operate protective drones. And of course, their target will be ISIL. Mr. Obama has no intention of giving in to Saudi Arabia's demand that the Assad regime be removed first, John Kerry's deal with the Saudis notwithstanding. Fauugh! 
11More

Pentagon report: scope of intelligence compromised by Snowden 'staggering' | World news... - 0 views

  • • Classified assessment describes impact of leaks as 'grave' • Report does not include specific detail to support conclusions• 12 of 39 heavily redacted pages released after Foia request• Read the full Defense Intelligence Agency report
  • A top-secret Pentagon report to assess the damage to national security from the leak of classified National Security Agency documents by Edward Snowden concluded that “the scope of the compromised knowledge related to US intelligence capabilities is staggering”.The Guardian has obtained a copy of the Defense Intelligence Agency's classified damage assessment in response to a Freedom of Information Act (Foia) lawsuit filed against the Defense Department earlier this year. The heavily redacted 39-page report was prepared in December and is titled “DoD Information Review Task Force-2: Initial Assessment, Impacts Resulting from the Compromise of Classified Material by a Former NSA Contractor.”But while the DIA report describes the damage to US intelligence capabilities as “grave”, the government still refuses to release any specific details to support this conclusion. The entire impact assessment was redacted from the material released to the Guardian under a presidential order that protects classified information and several other Foia exemptions.Only 12 pages of the report were declassified by DIA and released. A Justice Department attorney said DIA would continue to process other internal documents that refer to the DIA report for possible release later this year.
  • The classified damage assessment was first cited in a news report published by Foreign Policy on January 9. The Foreign Policy report attributed details of the DIA assessment to House intelligence committee chairman Mike Rogers and its ranking Democrat Dutch Ruppersberger. The lawmakers said the White House had authorized them to discuss the document in order to undercut the narrative of Snowden being portrayed as a heroic whistleblower.The DIA report has been cited numerous times by Rogers and Rusppersberger and other lawmakers who claimed Snowden’s leaks have put US personnel at risk.
  • ...8 more annotations...
  • But details to back up Rogers' claims are not included in the declassified material released to the Guardian.Neither he nor any other lawmaker has disclosed specific details from the DIA report but they have continued to push the “damage” narrative in interviews with journalists and during appearances on Sunday talk shows.
  • The declassified material does not state the number of documents Snowden is alleged to have taken, which Rogers and Ruppersberger have claimed, again citing the DIA’s assessment, was 1.7m. Nor does the declassified portion of the report identify Snowden by name.“[Redacted] a former NSA contractor compromised [redacted] from NSA Net and the Joint Worldwide Intelligence Communications System (JWICS),” the report says. “On 6 June 2013, media groups published the first stories based on this material, and on 9 June 2013 they identified the source as an NSA contractor who had worked in Hawaii.”JWICS is identified as a “24 hour a day network designed to meet the requirements for secure [top-secret/sensitive compartmented information] multi-media intelligence communications worldwide. The Defense Intelligence Agency (DIA) has directed that all Special Security Offices (SSOs) will install the JWICS.”The Washington Post, quoting anonymous sources, reported last October that Snowden “lifted the documents from a top-secret network run by the Defense Intelligence Agency and used by intelligence arms of the Army, Air Force, Navy and Marines.” The Post further claimed that Snowden “took 30,000 documents that involve the intelligence work of one of the services” and that he gained access to the documents through JWICS.
  • A top-secret Pentagon report to assess the damage to national security from the leak of classified National Security Agency documents by Edward Snowden concluded that “the scope of the compromised knowledge related to US intelligence capabilities is staggering”. The Guardian has obtained a copy of the Defense Intelligence Agency's classified damage assessment in response to a Freedom of Information Act (Foia) lawsuit filed against the Defense Department earlier this year. The heavily redacted 39-page report was prepared in December and is titled “DoD Information Review Task Force-2: Initial Assessment, Impacts Resulting from the Compromise of Classified Material by a Former NSA Contractor.” But while the DIA report describes the damage to US intelligence capabilities as “grave”, the government still refuses to release any specific details to support this conclusion. The entire impact assessment was redacted from the material released to the Guardian under a presidential order that protects classified information and several other Foia exemptions.
  • Only 12 pages of the report were declassified by DIA and released. A Justice Department attorney said DIA would continue to process other internal documents that refer to the DIA report for possible release later this year. Steven Aftergood, director of the Project on Government Secrecy at the Federation of American Scientists, questioned the decision to withhold specific details. "The essence of the report is contained in the statement that 'the scope of the compromised knowledge related to US intelligence capabilities is staggering'. But all elaboration of what this striking statement means has been withheld," he said. The assessment excluded NSA-related information and dealt exclusively with non-NSA defense materials. The report was distributed to multiple US military commands around the world and all four military branches.
  • The classified damage assessment was first cited in a news report published by Foreign Policy on January 9. The Foreign Policy report attributed details of the DIA assessment to House intelligence committee chairman Mike Rogers and its ranking Democrat Dutch Ruppersberger. The lawmakers said the White House had authorized them to discuss the document in order to undercut the narrative of Snowden being portrayed as a heroic whistleblower. The DIA report has been cited numerous times by Rogers and Rusppersberger and other lawmakers who claimed Snowden’s leaks have put US personnel at risk. In January, Rogers asserted that the report concluded that most of the documents Snowden took "concern vital operations of the US Army, Navy, Marine Corps and Air Force". "This report confirms my greatest fears — Snowden’s real acts of betrayal place America’s military men and women at greater risk. Snowden’s actions are likely to have lethal consequences for our troops in the field," Rogers said in a statement at the time.
  • But details to back up Rogers' claims are not included in the declassified material released to the Guardian. Neither he nor any other lawmaker has disclosed specific details from the DIA report but they have continued to push the “damage” narrative in interviews with journalists and during appearances on Sunday talk shows. The declassified portion of the report obtained by the Guardian says only that DIA “assesses with high confidence that the information compromise by a former NSA contractor [redacted] and will have a GRAVE impact on US national defense”. The declassified material does not state the number of documents Snowden is alleged to have taken, which Rogers and Ruppersberger have claimed, again citing the DIA’s assessment, was 1.7m.
  • No evidence has surfaced to support persistent claims from pundits and lawmakers that Snowden has provided any of the NSA documents he obtained to a “foreign adversary”. Ben Wizner, Snowden’s attorney at the American Civil Liberties Union, said: "This report, which makes unsubstantiated claims about alleged harm to national security, is from December of 2013. Just this month, Keith Alexander admitted in an interview that he doesn’t 'think anybody really knows what he [Snowden] actually took with him, because the way he did it, we don’t have an accurate way of counting'. In other words, the government’s so-called damage assessment is based entirely on guesses, not on facts or evidence."
  • Steven Aftergood, of the Federation of American Scientists, pointed out that the report's finding that the Snowden leaks had a "grave" impact did not follow any of the levels defined in the annex. "That is a bit odd," he said, adding: "Within this hierarchy, it is not clear where 'grave impact' would fall."
6More

The Woman at the Center of the C.I.A.'s Torture Report - 0 views

  • or the past eight months, there has been a furious battle raging behind closed doors at the White House, the C.I.A., and in Congress. The question has been whether the Senate Select Committee on Intelligence would be allowed to use pseudonyms as a means of identifying characters in the devastating report it released last week on the C.I.A.’s abusive interrogation and detention program. Ultimately, the committee was not allowed to, and now we know one reason why. The NBC News investigative reporter Matthew Cole has pieced together a remarkable story revealing that a single senior officer, who is still in a position of high authority over counterterrorism at the C.I.A.—a woman who he does not name—appears to have been a source of years’ worth of terrible judgment, with tragic consequences for the United States. Her story runs through the entire report. She dropped the ball when the C.I.A. was given information that might very well have prevented the 9/11 attacks; she gleefully participated in torture sessions afterward; she misinterpreted intelligence in such a way that it sent the C.I.A. on an absurd chase for Al Qaeda sleeper cells in Montana. And then she falsely told congressional overseers that the torture worked.
  • Had the Senate Intelligence Committee been permitted to use pseudonyms for the central characters in its report, as all previous congressional studies of intelligence failures, including the widely heralded Church Committee report in 1975, have done, it might not have taken a painstaking, and still somewhat cryptic, investigation after the fact in order for the American public to hold this senior official accountable. Many people who have worked with her over the years expressed shock to NBC that she has been entrusted with so much power. A former intelligence officer who worked directly with her is quoted by NBC, on background, as saying that she bears so much responsibility for so many intelligence failures that “she should be put on trial and put in jail for what she has done.” Instead, however, she has been promoted to the rank of a general in the military, most recently working as the head of the C.I.A.’s global-jihad unit. In that perch, she oversees the targeting of terror suspects around the world. (She was also, in part, the model for the lead character in “Zero Dark Thirty.”)
  • Amazingly, perhaps, more than thirteen years after the 9/11 attacks, no one at the C.I.A. has ever been publicly held responsible for this failure. Evidently, the C.I.A. was adamant in its negotiations with the White House and the Senate Intelligence Committee that the American public never learn the names of anyone directly involved in this failure.
  • ...3 more annotations...
  • According to sources in the law-enforcement community who I have interviewed over the years, and who I spoke to again this week, this woman—whose name the C.I.A. has asked the news media to withhold—had supervision over an underling at the agency who failed to share with the F.B.I. the news that two of the future 9/11 hijackers had entered the United States prior to the terrorist attacks.
  • As NBC recounts, this egregious chapter was apparently only the first in a long tale, in which the same C.I.A. official became a driving force in the use of waterboarding and other sadistic interrogation techniques that were later described by President Obama as “torture.” She personally partook in the waterboarding of Khalid Sheikh Mohammed, the architect of the 9/11 attacks, at a black site in Poland. According to the Senate report, she sent a bubbly cable back to C.I.A. headquarters in 2003, anticipating the pain they planned to inflict on K.S.M. in an attempt to get him to confirm a report from another detainee, about a plot to use African-American Muslims training in Afghanistan for future terrorist attacks. “i love the Black American Muslim at AQ camps in Afghanuistan (sic). … Mukie (K.S.M.) is going to be hatin’ life on this one,” she wrote, according to the report. But, as NBC notes, she misconstrued the intelligence gathered from the other detainee. Somehow, the C.I.A. mistakenly believed that African-American Muslim terrorists were already in the United States. The intelligence officials evidently pressed K.S.M. so hard to confirm this, under such physical duress, that he eventually did, even though it was false—leading U.S. officials on a wild-goose chase for black Muslim Al Qaeda operatives in Montana. According to the report, the same woman oversaw the extraction of this false lead, as well as the months-long rendition and gruesome interrogation of another detainee whose detention was a case of mistaken identity. Later, in 2007, she accompanied then C.I.A. director Michael Hayden to brief Congress, where she insisted forcefully that the torture program had been a tremendous and indispensable success.
  • Readers can speculate on how the pieces fit together, and who the personalities behind this program are. But without even pseudonyms, it is exceedingly hard to connect the dots. It seems entirely possible—though, again, one can only speculate—that the C.I.A. overcompensated for its pre-9/11 intelligence failures by employing overly harsh measures later. Once they’d made a choice that America had never officially made before—of sanctioning torture—it seems possible that they felt they had to defend its efficacy, despite mounting evidence to the contrary. If so, this would be worth learning. But without names, or even pseudonyms, it is almost impossible to piece together the puzzle, or hold anyone in the American government accountable. Evidently, that is exactly what the C.I.A. was fighting for during its eight-month-long redaction process, behind all those closed doors.
« First ‹ Previous 541 - 560 of 688 Next › Last »
Showing 20 items per page