Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged director

Rss Feed Group items tagged

Paul Merrell

Israeli spy Jonathan Pollard granted parole - CNNPolitics.com - 0 views

  • Convicted spy for Israel Jonathan Pollard has been granted parole and will be released from an American jail on Nov. 21, his lawyer announced Tuesday.
  • Both the Justice Department and Pollard's pro bono attorneys, Eliot Lauer and Jacques Semmelman, confirmed his release date Tuesday.
  • Pollard, now 60, worked as a Navy intelligence analyst and passed on top-secret U.S. government information to Israel. Israel's government admitted paying him for the intelligence in 1998. The country granted Pollard citizenship in 1995 and has lobbied for his release for decades.A number of top U.S. officials have argued against releasing Pollard from his life sentences -- including President George W. Bush's vice president, Dick Cheney, and Defense secretary, Donald Rumsfeld. President Bill Clinton wrote in his autobiography that then-CIA Director George Tenet threatened to quit in 1998 when Clinton appeared to be set to release Pollard.He'd previously been denied parole after a July 2014 hearing. He had a second hearing before the U.S. Parole Commission on July 7, 2015.
Paul Merrell

NSA Will Destroy Archived Metadata When Program Stops - 0 views

  • Four months from now, at the same time that the National Security Agency finally abandons the massive domestic telephone dragnet exposed by whistleblower Edward Snowden, it will also stop perusing the vast archive of data collected by the program. The NSA announced on Monday that it will expunge all the telephone metadata it previously swept up, citing Section 215 of the U.S.A Patriot Act. The program was ruled illegal by a federal appeals court in May. In June, Congress voted to end the program, but gave the NSA until the end of November to phase it out. The historical metadata —  records of American phone calls showing who called who, when, and for how long — will be put out of the reach of analysts on November 29, although technical personnel will have access for three more months. The program started 14 years ago, and operated under rules requiring data be retained for five years, and then destroyed.
  • The only possible hold-up, ironically, would be if any of the civil lawsuits prompted by the program prohibit the destruction of the data. “The telephony metadata” will be “preserved solely because of preservation obligations in pending civil litigation,” the Office of the Director of National Intelligence announced. “As soon as possible, NSA will destroy the Section 215 bulk telephony metadata upon expiration of its litigation preservation obligations.” ACLU staff attorney Alex Abdo told The Intercept his organization is “pleased that the NSA intends to purge the call records it has collected illegally.” But, he added: “Even with today’s pledge, the devil may be in the details.”
Paul Merrell

NSA Doesn't Want Court That Found Phone Dragnet Illegal to Actually Do Anything About It - 0 views

  • The National Security Agency doesn’t think it’s relevant that its dragnet of American telephone data — information on who’s calling who, when, and for how long — was ruled illegal back in May. An American Civil Liberties Union lawsuit is asking the Second Circuit Court of Appeals, which reached that conclusion, to immediately enjoin the program. But the U.S. government responded on Monday evening, saying that Congressional passage of the USA Freedom Act trumped the earlier ruling. The Freedom Act ordered an end to the program — but with a six-month wind-down period.
  • The ACLU still maintains that even temporary revival is a blatant infringement on American’s legal rights. “We strongly disagree with the government’s claim that recent reform legislation was meant to give the NSA’s phone-records dragnet a new lease on life,” said Jameel Jaffer, the ACLU’s deputy legal director in a statement. “The appeals court should order the NSA to end this surveillance now.  It’s unlawful and it’s an entirely unnecessary intrusion into the privacy of millions of people.” On Monday, the Obama administration announced that at the same time the National Security Agency ends the dragnet, it will also stop perusing the vast archive of data collected by the program. Read the U.S. government brief responding to the ACLU below:
  •  
    Go ACLU!
Paul Merrell

Eric Holder: The Justice Department could strike deal with Edward Snowden - 0 views

  • Eric Holder: The Justice Department could strike deal with Edward SnowdenMichael IsikoffChief Investigative CorrespondentJuly 6, 2015Former U.S. Attorney General Eric Holder. (Photo: Olivier Douliery-Pool/Getty) Former Attorney General Eric Holder said today that a “possibility exists” for the Justice Department to cut a deal with former NSA contractor Edward Snowden that would allow him to return to the United States from Moscow. In an interview with Yahoo News, Holder said “we are in a different place as a result of the Snowden disclosures” and that “his actions spurred a necessary debate” that prompted President Obama and Congress to change policies on the bulk collection of phone records of American citizens. Asked if that meant the Justice Department might now be open to a plea bargain that allows Snowden to return from his self-imposed exile in Moscow, Holder replied: “I certainly think there could be a basis for a resolution that everybody could ultimately be satisfied with. I think the possibility exists.”
  • But his remarks to Yahoo News go further than any current or former Obama administration official in suggesting that Snowden’s disclosures had a positive impact and that the administration might be open to a negotiated plea that the self-described whistleblower could accept, according to his lawyer Ben Wizner.
  • It’s also not clear whether Holder’s comments signal a shift in Obama administration attitudes that could result in a resolution of the charges against Snowden. Melanie Newman, chief spokeswoman for Attorney General Loretta Lynch, Holder’s successor, immediately shot down the idea that the Justice Department was softening its stance on Snowden. “This is an ongoing case so I am not going to get into specific details but I can say our position regarding bringing Edward Snowden back to the United States to face charges has not changed,” she said in an email.
  • ...1 more annotation...
  • Three sources familiar with informal discussions of Snowden’s case told Yahoo News that one top U.S. intelligence official, Robert Litt, the chief counsel to Director of National Intelligence James Clapper, recently privately floated the idea that the government might be open to a plea bargain in which Snowden returns to the United States, pleads guilty to one felony count and receives a prison sentence of three to five years in exchange for full cooperation with the government.
Paul Merrell

Watchdog: OPM ignored warnings about online background check system | TheHill - 0 views

  • The Office of Personnel Management (OPM) had known since 2012 about security flaws in its online submission system, roughly three years before the agency finally shut down the system to repair it.“OPM has known about vulnerabilities in the system for years, but has not corrected them,” Michael Esser, the assistant inspector general for audits at the OPM, told a House subcommittee on Wednesday.ADVERTISEMENTIn late June, the OPM said it was suspending the Web-based platform, known as e-QIP, after a security review conducted in the wake of massive hacks at the agency uncovered significant defects.The OPM data breach has likely exposed upwards of 18 million people’s sensitive information and is raising pointed questions about why the agency hasn't moved more expediently over the years to correct glaring problems with its networks.The agency’s inspector general has said OPM officials repeatedly failed to heed its warnings, even refusing to shut down several of its weakest computer systems as recommended.
  • On Wednesday, Esser accused the agency of also not responding to alerts about the e-QIP system, which is used to file the background checks for security clearances.  The agency’s oversight arm detailed 18 security vulnerabilities starting in 2012, he said.“I do not know if those vulnerabilities were related to the reason the system was shut down last week,” Esser added.OPM Director Katherine Archuleta has maintained she always takes into account the watchdog’s recommendations. The agency kept the deficient computer systems running, she said, in order to avoid gaps in delivering employee's paychecks and benefits.
Paul Merrell

PayPal to Pay $25 Million to Settle CFPB Case - 0 views

  • By Editor Filed in News May 19th, 2015 @ 11:50 am The Consumer Financial Protection Bureau (CFPB) filed a complaint and proposed consent order in federal court against PayPal, Inc. for illegally signing up consumers for its online credit product, PayPal Credit, formerly known as Bill Me Later. The CFPB alleges that PayPal deceptively advertised promotional benefits that it failed to honor, signed consumers up for credit without their permission, made them use PayPal Credit instead of their preferred payment method, and then mishandled billing disputes.
  • Under the proposed order, PayPal would pay $15 million in consumer redress and a $10 million penalty, and it would be required to improve its disclosures and procedures. “PayPal illegally signed up consumers for its online credit product without their permission and failed to address disputes when they complained,” said CFPB Director Richard Cordray. “Online shopping has become a way of life for many Americans and it’s important that they are treated fairly. The CFPB’s action should send a signal that consumers are protected whether they are opening their wallets or clicking online to make a purchase.”
  • As with credit cards and other forms of credit, consumers using PayPal Credit may incur interest, late fees, and other charges. Consumers often enroll in PayPal Credit while purchasing a good or service online or while creating a PayPal account. Since 2008, PayPal has offered PayPal Credit to consumers across the country making purchases from thousands of online merchants, including eBay. The CFPB alleges that many consumers who were attempting to enroll in a regular PayPal account, or make an online purchase, were signed up for the credit product without realizing it. The company also failed to post payments properly, lost payment checks, and mishandled billing disputes that consumers had with merchants or the company. Tens of thousands of consumers experienced these issues.
Paul Merrell

Ten Years Ago: The London 7/7 Mock Terror Drill: What Relationship to the Real Time Ter... - 0 views

  • uly 7, 2005, ten years ago, the London 7/7 bombings. Was there advanced knowledge of the attacks? Was it a conspiracy? The following text was first published by Global Research on August 8, 2005 A fictional “scenario” of multiple bomb attacks on London’s underground took place at exactly the same time as the bomb attack on July 7, 2005.
  • Peter Power, Managing Director of Visor Consultants, a private firm on contract to the London Metropolitan Police, described in a BBC interview how he had organized and conducted the anti-terror drill, on behalf of an unnamed business client. The fictional scenario was based on simultaneous bombs going off at exactly the same time at the underground stations where the real attacks were occurring:
Paul Merrell

Edward Snowden says Hillary Clinton 'ridiculous' to think emails were secure | US news ... - 0 views

  • Edward Snowden has branded as “completely ridiculous” the idea that Hillary Clinton’s personal email server was secure while she was secretary of state. The National Security Agency whistleblower was speaking in an interview with Al-Jazeera. In 2014, Clinton accused Snowden of inadvertently helping terrorists. Since then she has toned down such criticism and said the NSA needs to be more transparent. On Thursday, Snowden was asked what he would say to Clinton now that she is being investigated for sending emails containing classified information while using a private server. “This is a problem,” Snowden said, “because anyone who has the clearances that the secretary of state has, or the director of any top-level agency has, knows how classified information should be handled.”
  • He added: “If an ordinary worker at the State Department or the CIA … were sending details about the security of embassies, which is alleged to be in her email, meetings with private government officials, foreign government officials and the statements that were made to them in confidence over unclassified email systems, they would not only lose their jobs and lose their clearance, they would very likely face prosecution for it.”
  • He did comment on Clinton’s choice of email server, Platte River Networks. “When the unclassified systems of the United States government, which has a full-time information security staff, regularly gets hacked, the idea that someone keeping a private server in the renovated bathroom of a server farm in Colorado is more secure is completely ridiculous,” he said.
  • ...1 more annotation...
  • He went on to question the credibility of politicians like John Kerry, Clinton’s successor as secretary of state, and compared “the good that they’re doing for the country” to the work of people like Jimmy Wales, the co-founder of Wikipedia, who he said was “improving the world”.
  •  
    Is that a wooden stake you're holding in your hand, Edward? And what's the sledge hammer for?
Paul Merrell

Hillary Clinton Goes to Militaristic, Hawkish Think Tank, Gives Militaristic, Hawkish S... - 0 views

  • Leading Democratic presidential candidate Hillary Clinton this morning delivered a foreign policy speech at the Brookings Institution in Washington. By itself, the choice of the venue was revealing. Brookings served as Ground Zero for centrist think tank advocacy of the Iraq War, which Clinton (along with potential rival Joe Biden) notoriously and vehemently advocated. Brookings’ two leading “scholar”-stars — Kenneth Pollack and Michael O’Hanlon — spent all of 2002 and 2003 insisting that invading Iraq was wise and just, and spent the years after that assuring Americans that the “victorious” war and subsequent occupation were going really well (in April 2003, O’Hanlon debated with himself over whether the strategy that led to the “victory” in his beloved war should be deemed “brilliant” or just extremely “clever,” while in June 2003, Pollack assured New York Times readers that Saddam’s WMD would be found).
  • Since then, O’Hanlon in particular has advocated for increased military force in more countries than one can count. That’s not surprising: Brookings is funded in part by one of the Democratic Party’s favorite billionaires, Haim Saban, who is a dual citizen of the U.S. and Israel and once said of himself: “I’m a one-issue guy, and my issue is Israel.” Pollack advocated for the attack on Iraq while he was “Director of Research of the Saban Center for Middle East Policy.” Saban became the Democratic Party’s largest fundraiser — even paying $7 million for the new DNC building — and is now a very substantial funder of Hillary Clinton’s campaign. In exchange, she’s written a personal letter to him publicly “expressing her strong and unequivocal support for Israel in the face of the Boycott, Divestment and Sanction movement.” So the hawkish Brookings is the prism through which Hillary Clinton’s foreign policy worldview can be best understood. The think tank is filled with former advisers to both Bill and Hillary Clinton, and would certainly provide numerous top-level foreign policy officials in any Hillary Clinton administration. As she put it today at the start: “There are a lot of long-time friends and colleagues who perch here at Brookings.” And she proceeded to deliver exactly the speech one would expect, reminding everyone of just how militaristic and hawkish she is.
  • Clinton proclaimed that she “too [is] deeply concerned about Iranian aggression and the need to confront it. It’s a ruthless, brutal regime that has the blood of Americans, many others and including its own people on its hands.” Even worse, she said, “Its political rallies resound with cries of ‘Death to America.’ Its leaders talk about wiping Israel off the face of the map, most recently just yesterday, and foment terror against it. There is absolutely no reason to trust Iran.” She repeated that claim several times for emphasis: “They vow to destroy Israel. And that’s worth saying again. They vow to destroy Israel.” She vowed that in dealing with Iran, she will be tougher and more aggressive than Reagan was with the Soviet Union: “You remember President Reagan’s line about the Soviets: Trust but verify? My approach will be distrust and verify.” She also explicitly threatened Iran with war if they fail to comply: “I will not hesitate to take military action if Iran attempts to obtain a nuclear weapon, and I will set up my successor to be able to credibly make the same pledge.” She even depicted the Iran Deal as making a future war with Iran easier and more powerful:
  • ...4 more annotations...
  • Should it become necessary in the future having exhausted peaceful alternatives to turn to military force, we will have preserved and in some cases enhanced our capacity to act. And because we have proven our commitment to diplomacy first, the world will more likely join us. As for Israel itself, Clinton eagerly promised to shower it with a long, expensive, and dangerous list of gifts. Here’s just a part of what that country can expect from the second President Clinton: I will deepen America’s unshakeable commitment to Israel’s security, including our long standing tradition of guaranteeing Israel’s qualitative military edge. I’ll increase support for Israeli rocket and missile defenses and for intelligence sharing. I’ll sell Israel the most sophisticated fire aircraft ever developed. The F-35. We’ll work together to develop and implement better tunnel detection technology to prevent arms smuggling and kidnapping as well as the strongest possible missile defense system for Northern Israel, which has been subjected to Hezbollah’s attacks for years.
  • She promised she “will sustain a robust military presence in the [Persian Gulf] region, especially our air and naval forces.” She vowed to “increase security cooperation with our Gulf allies” — by which she means the despotic regimes in Saudi Arabia, United Arab Emirates and Qatar, among others. She swore she will crack down even further on Hezbollah: “It’s time to eliminate the false distinction that some still make between the supposed political and military wings. If you’re part of Hezbollah, you’re part of a terrorist organization, plain and simple.” Then she took the ultimate pledge: “I would not support this agreement for one second if I thought it put Israel in greater danger.” So even if the deal would benefit the U.S., she would not support it “for one second” if it “put Israel in greater danger.” That’s an unusually blunt vow to subordinate the interests of the U.S. to that foreign nation.
  • But when it comes to gifts to Israel, that’s not all! Echoing the vow of several GOP candidates to call Netanyahu right away after being elected, Clinton promised: “I would invite the Israeli prime minister to the White House during my first month in office to talk about all of these issues and to set us on a course of close, frequent consultation right from the start, because we both rely on each other for support as partners, allies and friends.” She then addressed “the people of Israel,” telling them: “Let me say, you’ll never have to question whether we’re with you. The United States will always be with you.” For good measure, she heaped praise on “my friend Chuck Schumer,” who has led the battle to defeat the Iran Deal, gushing about what an “excellent leader in the Senate” he will make. What’s a little warmongering among friends? Just as was true in her book, she implicitly criticized Obama — who boasts that he has bombed seven predominantly Muslim countries — of being insufficiently militaristic, imperialistic, and violent. She said she wanted more involvement in Syria from the start (though did not call for the U.S. to accept any of its refugees). In a clear rebuke to the current president, she decreed that any criticisms U.S. officials may utter of Israel should be done only in private (“in private and behind, you know, closed doors”), not in public, lest “it open[] the door to everybody else to delegitimize Israel to, you know, pile on in ways that are not good for the — the strength and stability, not just of Israel.” About Russia, she said, “I think we have not done enough” and put herself “in the category of people who wanted us to do more in response to the annexation of Crimea and the continuing destabilization of Ukraine.”
  • Two words that did not come out of Clinton’s mouth during the entire event: “Palestinians” (do they exist?) and “Libya” (that glorious war she supported that was going to be the inspiring template for future “humanitarian interventions” before it predictably destroyed that whole country).
  •  
    Glenn Greenwald tags Hillary pandering to the Chicken Hawk Party
Paul Merrell

Exclusive: 50 Spies Say ISIS Intelligence Was Cooked - The Daily Beast - 0 views

  • More than 50 intelligence analysts working out of the U.S. military's Central Command have formally complained that their reports on ISIS and al Qaeda’s branch in Syria were being inappropriately altered by senior officials, The Daily Beast has learned. The complaints spurred the Pentagon’s inspector general to open an investigation into the alleged manipulation of intelligence. The fact that so many people complained suggests there are deep-rooted, systemic problems in how the U.S. military command charged with the war against the self-proclaimed Islamic State assesses intelligence. “The cancer was within the senior level of the intelligence command,” one defense official said.
  • Two senior analysts at CENTCOM signed a written complaint sent to the Defense Department inspector general in July alleging that the reports, some of which were briefed to President Obama, portrayed the terror groups as weaker than the analysts believe they are. The reports were changed by CENTCOM higher-ups to adhere to the administration’s public line that the U.S. is winning the battle against ISIS and al Nusra, al Qaeda’s branch in Syria, the analysts claim.That complaint was supported by 50 other analysts, some of whom have complained about politicizing of intelligence reports for months. That’s according to 11 individuals who are knowledgeable about the details of the report and who spoke to The Daily Beast on condition of anonymity.
  • The accusations suggest that a large number of people tracking the inner workings of the terror groups think that their reports are being manipulated to fit a public narrative. The allegations echoed charges that political appointees and senior officials cherry-picked intelligence about Iraq’s supposed weapons program in 2002 and 2003.The two signatories to the complaint were described as the ones formally lodging it, and the additional analysts are willing and able to back up the substance of the allegations with concrete examples.
  • ...2 more annotations...
  • Some of those CENTCOM analysts described the sizeable cadre of protesting analysts as a “revolt” by intelligence professionals who are paid to give their honest assessment, based on facts, and not to be influenced by national-level policy. The analysts have accused senior-level leaders, including the director of intelligence and his deputy in CENTCOM, of changing their analyses to be more in line with the Obama administration’s public contention that the fight against ISIS and al Qaeda is making progress. The analysts take a more pessimistic view about how military efforts to destroy the groups are going.
  • In recent months, members of the Obama administration have sought to paint the fight against ISIS in rosy hues—despite the terror army’s seizure of major cities like Mosul and Fallujah.“ISIS is losing,” John Allen, the retired Marine general charged with coordinating the ISIS campaign, said in July.
Paul Merrell

US Primaries: Sanders Edges Ahead of Clinton in Key State | News | teleSUR English - 0 views

  • Left-wing labor rights advocate Bernie Sanders has overtaken Hillary Clinton in the key state of Iowa in the race for Democratic presidential candidate in the United States, more than four months before the state votes in the caucus, a new poll revealed Thursday. Some 41 percent of Iowa Democrat supporters favor the senator for Vermont, who is just inching ahead of the former secretary of state’s 40 percent, according to pollsters Quinnipiac. The statistics represent a blow to Clinton, who in early July was way out in front with 52 percent of votes.
  • Sanders, who is also ahead in New Hampshire, is seen as a rebel in the the U.S. political establishment and has garnered support in the polls over the summer from those disillusioned with the Democrats seeking radical change. “Sanders has seized the momentum by offering a message more in line with disproportionately liberal primary and caucus voters,” said Peter A. Brown, assistant director of the Quinnipiac University Poll. “He is the candidate of the Democratic left, against his own party’s bosses and their prized presidential candidate, Secretary Hillary Clinton.” Experts have pointed out however that surveys in early states tend to be poor predictors of the primary contests, and Sanders lead is too slim to afford him too much confidence.
  •  
    Odd that the article doesn't discuss Sanders' momentum. Hillary is fading while Sanders is still rising rapidly. The Democratic leadership will be looking for a candidate more controllable than Sanders to take Hillary's place if her bloom continues to fade, if they're not looking already. Either that or they'll put out a contract on Sanders. Or both.
Paul Merrell

Intelligence chief: Iraq and Syria may not survive as states | WLNS - 0 views

  • Iraq and Syria may have been permanently torn asunder by war and sectarian tensions, the head of the Defense Intelligence Agency said Thursday in a frank assessment that is at odds with Obama administration policy. “I’m having a tough time seeing it come back together,” Lt. Gen. Vincent Stewart told an industry conference, speaking of Iraq and Syria, both of which have seen large chunks territory seized by the Islamic State. On Iraq, Stewart said he is “wrestling with the idea that the Kurds will come back to a central government of Iraq,” suggesting he believed it was unlikely. On Syria, he added: “I can see a time in the future where Syria is fractured into two or three parts.” That is not the U.S. goal, he said, but it’s looking increasingly likely.
  • CIA Director John Brennan, speaking on the same panel at an industry conference, noted that the countries’ borders remain in place, but the governments have lost control of them. A self-declared caliphate by the Islamic State straddles the border between both countries. Iraqis and Syrians now more often identify themselves by tribe or religious sect, rather than by their nationality, he said. “I think the Middle East is going to be seeing change over the coming decade or two that is going to make it look unlike it did,” Brennan said.
  • The Obama administration’s official policy is that Iraq and Syria remain internationally recognized nation states. Administration officials, for example, have resisted calls to send arms directly to the Kurds, who have carved out a measure of autonomy in northern Iraq and have been America’s most loyal ally in the region. The administration has insisted that arms for the Kurds be routed through the government in Baghdad. In 2006, then-Sen. Joe Biden argued for splitting Iraq into three autonomous ethnic zones with a limited role for a central government. The George W. Bush administration sought to keep Iraq unified, but Sunnis eventually became disaffected with a Shiite government in Baghdad that excluded them. Kurds have been in continual disputes over budgets and oil with Bagdad, and they have seized control of the strategic northern city of Kirkuk.
Paul Merrell

From Radio to Porn, British Spies Track Web Users' Online Identities - 0 views

  • HERE WAS A SIMPLE AIM at the heart of the top-secret program: Record the website browsing habits of “every visible user on the Internet.” Before long, billions of digital records about ordinary people’s online activities were being stored every day. Among them were details cataloging visits to porn, social media and news websites, search engines, chat forums, and blogs. The mass surveillance operation — code-named KARMA POLICE — was launched by British spies about seven years ago without any public debate or scrutiny. It was just one part of a giant global Internet spying apparatus built by the United Kingdom’s electronic eavesdropping agency, Government Communications Headquarters, or GCHQ. The revelations about the scope of the British agency’s surveillance are contained in documents obtained by The Intercept from National Security Agency whistleblower Edward Snowden. Previous reports based on the leaked files have exposed how GCHQ taps into Internet cables to monitor communications on a vast scale, but many details about what happens to the data after it has been vacuumed up have remained unclear.
  • Amid a renewed push from the U.K. government for more surveillance powers, more than two dozen documents being disclosed today by The Intercept reveal for the first time several major strands of GCHQ’s existing electronic eavesdropping capabilities.
  • The surveillance is underpinned by an opaque legal regime that has authorized GCHQ to sift through huge archives of metadata about the private phone calls, emails and Internet browsing logs of Brits, Americans, and any other citizens — all without a court order or judicial warrant
  • ...17 more annotations...
  • A huge volume of the Internet data GCHQ collects flows directly into a massive repository named Black Hole, which is at the core of the agency’s online spying operations, storing raw logs of intercepted material before it has been subject to analysis. Black Hole contains data collected by GCHQ as part of bulk “unselected” surveillance, meaning it is not focused on particular “selected” targets and instead includes troves of data indiscriminately swept up about ordinary people’s online activities. Between August 2007 and March 2009, GCHQ documents say that Black Hole was used to store more than 1.1 trillion “events” — a term the agency uses to refer to metadata records — with about 10 billion new entries added every day. As of March 2009, the largest slice of data Black Hole held — 41 percent — was about people’s Internet browsing histories. The rest included a combination of email and instant messenger records, details about search engine queries, information about social media activity, logs related to hacking operations, and data on people’s use of tools to browse the Internet anonymously.
  • Throughout this period, as smartphone sales started to boom, the frequency of people’s Internet use was steadily increasing. In tandem, British spies were working frantically to bolster their spying capabilities, with plans afoot to expand the size of Black Hole and other repositories to handle an avalanche of new data. By 2010, according to the documents, GCHQ was logging 30 billion metadata records per day. By 2012, collection had increased to 50 billion per day, and work was underway to double capacity to 100 billion. The agency was developing “unprecedented” techniques to perform what it called “population-scale” data mining, monitoring all communications across entire countries in an effort to detect patterns or behaviors deemed suspicious. It was creating what it said would be, by 2013, “the world’s biggest” surveillance engine “to run cyber operations and to access better, more valued data for customers to make a real world difference.”
  • A document from the GCHQ target analysis center (GTAC) shows the Black Hole repository’s structure.
  • The data is searched by GCHQ analysts in a hunt for behavior online that could be connected to terrorism or other criminal activity. But it has also served a broader and more controversial purpose — helping the agency hack into European companies’ computer networks. In the lead up to its secret mission targeting Netherlands-based Gemalto, the largest SIM card manufacturer in the world, GCHQ used MUTANT BROTH in an effort to identify the company’s employees so it could hack into their computers. The system helped the agency analyze intercepted Facebook cookies it believed were associated with Gemalto staff located at offices in France and Poland. GCHQ later successfully infiltrated Gemalto’s internal networks, stealing encryption keys produced by the company that protect the privacy of cell phone communications.
  • Similarly, MUTANT BROTH proved integral to GCHQ’s hack of Belgian telecommunications provider Belgacom. The agency entered IP addresses associated with Belgacom into MUTANT BROTH to uncover information about the company’s employees. Cookies associated with the IPs revealed the Google, Yahoo, and LinkedIn accounts of three Belgacom engineers, whose computers were then targeted by the agency and infected with malware. The hacking operation resulted in GCHQ gaining deep access into the most sensitive parts of Belgacom’s internal systems, granting British spies the ability to intercept communications passing through the company’s networks.
  • In March, a U.K. parliamentary committee published the findings of an 18-month review of GCHQ’s operations and called for an overhaul of the laws that regulate the spying. The committee raised concerns about the agency gathering what it described as “bulk personal datasets” being held about “a wide range of people.” However, it censored the section of the report describing what these “datasets” contained, despite acknowledging that they “may be highly intrusive.” The Snowden documents shine light on some of the core GCHQ bulk data-gathering programs that the committee was likely referring to — pulling back the veil of secrecy that has shielded some of the agency’s most controversial surveillance operations from public scrutiny. KARMA POLICE and MUTANT BROTH are among the key bulk collection systems. But they do not operate in isolation — and the scope of GCHQ’s spying extends far beyond them.
  • The agency operates a bewildering array of other eavesdropping systems, each serving its own specific purpose and designated a unique code name, such as: SOCIAL ANTHROPOID, which is used to analyze metadata on emails, instant messenger chats, social media connections and conversations, plus “telephony” metadata about phone calls, cell phone locations, text and multimedia messages; MEMORY HOLE, which logs queries entered into search engines and associates each search with an IP address; MARBLED GECKO, which sifts through details about searches people have entered into Google Maps and Google Earth; and INFINITE MONKEYS, which analyzes data about the usage of online bulletin boards and forums. GCHQ has other programs that it uses to analyze the content of intercepted communications, such as the full written body of emails and the audio of phone calls. One of the most important content collection capabilities is TEMPORA, which mines vast amounts of emails, instant messages, voice calls and other communications and makes them accessible through a Google-style search tool named XKEYSCORE.
  • As of September 2012, TEMPORA was collecting “more than 40 billion pieces of content a day” and it was being used to spy on people across Europe, the Middle East, and North Africa, according to a top-secret memo outlining the scope of the program. The existence of TEMPORA was first revealed by The Guardian in June 2013. To analyze all of the communications it intercepts and to build a profile of the individuals it is monitoring, GCHQ uses a variety of different tools that can pull together all of the relevant information and make it accessible through a single interface. SAMUEL PEPYS is one such tool, built by the British spies to analyze both the content and metadata of emails, browsing sessions, and instant messages as they are being intercepted in real time. One screenshot of SAMUEL PEPYS in action shows the agency using it to monitor an individual in Sweden who visited a page about GCHQ on the U.S.-based anti-secrecy website Cryptome.
  • Partly due to the U.K.’s geographic location — situated between the United States and the western edge of continental Europe — a large amount of the world’s Internet traffic passes through its territory across international data cables. In 2010, GCHQ noted that what amounted to “25 percent of all Internet traffic” was transiting the U.K. through some 1,600 different cables. The agency said that it could “survey the majority of the 1,600” and “select the most valuable to switch into our processing systems.”
  • According to Joss Wright, a research fellow at the University of Oxford’s Internet Institute, tapping into the cables allows GCHQ to monitor a large portion of foreign communications. But the cables also transport masses of wholly domestic British emails and online chats, because when anyone in the U.K. sends an email or visits a website, their computer will routinely send and receive data from servers that are located overseas. “I could send a message from my computer here [in England] to my wife’s computer in the next room and on its way it could go through the U.S., France, and other countries,” Wright says. “That’s just the way the Internet is designed.” In other words, Wright adds, that means “a lot” of British data and communications transit across international cables daily, and are liable to be swept into GCHQ’s databases.
  • A map from a classified GCHQ presentation about intercepting communications from undersea cables. GCHQ is authorized to conduct dragnet surveillance of the international data cables through so-called external warrants that are signed off by a government minister. The external warrants permit the agency to monitor communications in foreign countries as well as British citizens’ international calls and emails — for example, a call from Islamabad to London. They prohibit GCHQ from reading or listening to the content of “internal” U.K. to U.K. emails and phone calls, which are supposed to be filtered out from GCHQ’s systems if they are inadvertently intercepted unless additional authorization is granted to scrutinize them. However, the same rules do not apply to metadata. A little-known loophole in the law allows GCHQ to use external warrants to collect and analyze bulk metadata about the emails, phone calls, and Internet browsing activities of British people, citizens of closely allied countries, and others, regardless of whether the data is derived from domestic U.K. to U.K. communications and browsing sessions or otherwise. In March, the existence of this loophole was quietly acknowledged by the U.K. parliamentary committee’s surveillance review, which stated in a section of its report that “special protection and additional safeguards” did not apply to metadata swept up using external warrants and that domestic British metadata could therefore be lawfully “returned as a result of searches” conducted by GCHQ.
  • Perhaps unsurprisingly, GCHQ appears to have readily exploited this obscure legal technicality. Secret policy guidance papers issued to the agency’s analysts instruct them that they can sift through huge troves of indiscriminately collected metadata records to spy on anyone regardless of their nationality. The guidance makes clear that there is no exemption or extra privacy protection for British people or citizens from countries that are members of the Five Eyes, a surveillance alliance that the U.K. is part of alongside the U.S., Canada, Australia, and New Zealand. “If you are searching a purely Events only database such as MUTANT BROTH, the issue of location does not occur,” states one internal GCHQ policy document, which is marked with a “last modified” date of July 2012. The document adds that analysts are free to search the databases for British metadata “without further authorization” by inputing a U.K. “selector,” meaning a unique identifier such as a person’s email or IP address, username, or phone number. Authorization is “not needed for individuals in the U.K.,” another GCHQ document explains, because metadata has been judged “less intrusive than communications content.” All the spies are required to do to mine the metadata troves is write a short “justification” or “reason” for each search they conduct and then click a button on their computer screen.
  • Intelligence GCHQ collects on British persons of interest is shared with domestic security agency MI5, which usually takes the lead on spying operations within the U.K. MI5 conducts its own extensive domestic surveillance as part of a program called DIGINT (digital intelligence).
  • GCHQ’s documents suggest that it typically retains metadata for periods of between 30 days to six months. It stores the content of communications for a shorter period of time, varying between three to 30 days. The retention periods can be extended if deemed necessary for “cyber defense.” One secret policy paper dated from January 2010 lists the wide range of information the agency classes as metadata — including location data that could be used to track your movements, your email, instant messenger, and social networking “buddy lists,” logs showing who you have communicated with by phone or email, the passwords you use to access “communications services” (such as an email account), and information about websites you have viewed.
  • Records showing the full website addresses you have visited — for instance, www.gchq.gov.uk/what_we_do — are treated as content. But the first part of an address you have visited — for instance, www.gchq.gov.uk — is treated as metadata. In isolation, a single metadata record of a phone call, email, or website visit may not reveal much about a person’s private life, according to Ethan Zuckerman, director of Massachusetts Institute of Technology’s Center for Civic Media. But if accumulated and analyzed over a period of weeks or months, these details would be “extremely personal,” he told The Intercept, because they could reveal a person’s movements, habits, religious beliefs, political views, relationships, and even sexual preferences. For Zuckerman, who has studied the social and political ramifications of surveillance, the most concerning aspect of large-scale government data collection is that it can be “corrosive towards democracy” — leading to a chilling effect on freedom of expression and communication. “Once we know there’s a reasonable chance that we are being watched in one fashion or another it’s hard for that not to have a ‘panopticon effect,’” he said, “where we think and behave differently based on the assumption that people may be watching and paying attention to what we are doing.”
  • When compared to surveillance rules in place in the U.S., GCHQ notes in one document that the U.K. has “a light oversight regime.” The more lax British spying regulations are reflected in secret internal rules that highlight greater restrictions on how NSA databases can be accessed. The NSA’s troves can be searched for data on British citizens, one document states, but they cannot be mined for information about Americans or other citizens from countries in the Five Eyes alliance. No such constraints are placed on GCHQ’s own databases, which can be sifted for records on the phone calls, emails, and Internet usage of Brits, Americans, and citizens from any other country. The scope of GCHQ’s surveillance powers explain in part why Snowden told The Guardian in June 2013 that U.K. surveillance is “worse than the U.S.” In an interview with Der Spiegel in July 2013, Snowden added that British Internet cables were “radioactive” and joked: “Even the Queen’s selfies to the pool boy get logged.”
  • In recent years, the biggest barrier to GCHQ’s mass collection of data does not appear to have come in the form of legal or policy restrictions. Rather, it is the increased use of encryption technology that protects the privacy of communications that has posed the biggest potential hindrance to the agency’s activities. “The spread of encryption … threatens our ability to do effective target discovery/development,” says a top-secret report co-authored by an official from the British agency and an NSA employee in 2011. “Pertinent metadata events will be locked within the encrypted channels and difficult, if not impossible, to prise out,” the report says, adding that the agencies were working on a plan that would “(hopefully) allow our Internet Exploitation strategy to prevail.”
Paul Merrell

Russian Offer to Share ISIL Targets With US-Led Coalition Gets No Response - 0 views

  • Russia has proposed sharing the coordinates of possible ISIL targets with the US-led anti-ISIL coalition, but has not received a response, Colonel-General Andrei Kartapolov, head of the Main Operations Directorate of the Russian General Staff, told media at a press briefing on Wednesday."This means that either our partners do not have such coordinates, or that they for some reason do not want us to hit these targets. The reason for this remains unclear to us," Kartapolov said, cited by RIA Novosti.
Paul Merrell

Obama administration opts not to force firms to decrypt data - for now - The Washington... - 0 views

  • After months of deliberation, the Obama administration has made a long-awaited decision on the thorny issue of how to deal with encrypted communications: It will not — for now — call for legislation requiring companies to decode messages for law enforcement. Rather, the administration will continue trying to persuade companies that have moved to encrypt their customers’ data to create a way for the government to still peer into people’s data when needed for criminal or terrorism investigations. “The administration has decided not to seek a legislative remedy now, but it makes sense to continue the conversations with industry,” FBI Director James B. Comey said at a Senate hearing Thursday of the Homeland Security and Governmental Affairs Committee.
  • The decision, which essentially maintains the status quo, underscores the bind the administration is in — balancing competing pressures to help law enforcement and protect consumer privacy. The FBI says it is facing an increasing challenge posed by the encryption of communications of criminals, terrorists and spies. A growing number of companies have begun to offer encryption in which the only people who can read a message, for instance, are the person who sent it and the person who received it. Or, in the case of a device, only the device owner has access to the data. In such cases, the companies themselves lack “backdoors” or keys to decrypt the data for government investigators, even when served with search warrants or intercept orders.
  • The decision was made at a Cabinet meeting Oct. 1. “As the president has said, the United States will work to ensure that malicious actors can be held to account — without weakening our commitment to strong encryption,” National Security Council spokesman Mark Stroh said. “As part of those efforts, we are actively engaged with private companies to ensure they understand the public safety and national security risks that result from malicious actors’ use of their encrypted products and services.” But privacy advocates are concerned that the administration’s definition of strong encryption also could include a system in which a company holds a decryption key or can retrieve unencrypted communications from its servers for law enforcement. “The government should not erode the security of our devices or applications, pressure companies to keep and allow government access to our data, mandate implementation of vulnerabilities or backdoors into products, or have disproportionate access to the keys to private data,” said Savecrypto.org, a coalition of industry and privacy groups that has launched a campaign to petition the Obama administration.
  • ...3 more annotations...
  • To Amie Stepanovich, the U.S. policy manager for Access, one of the groups signing the petition, the status quo isn’t good enough. “It’s really crucial that even if the government is not pursuing legislation, it’s also not pursuing policies that will weaken security through other methods,” she said. The FBI and Justice Department have been talking with tech companies for months. On Thursday, Comey said the conversations have been “increasingly productive.” He added: “People have stripped out a lot of the venom.” He said the tech executives “are all people who care about the safety of America and also care about privacy and civil liberties.” Comey said the issue afflicts not just federal law enforcement but also state and local agencies investigating child kidnappings and car crashes — “cops and sheriffs . . . [who are] increasingly encountering devices they can’t open with a search warrant.”
  • One senior administration official said the administration thinks it’s making enough progress with companies that seeking legislation now is unnecessary. “We feel optimistic,” said the official, who spoke on the condition of anonymity to describe internal discussions. “We don’t think it’s a lost cause at this point.” Legislation, said Rep. Adam Schiff (D-Calif.), is not a realistic option given the current political climate. He said he made a recent trip to Silicon Valley to talk to Twitter, Facebook and Google. “They quite uniformly are opposed to any mandate or pressure — and more than that, they don’t want to be asked to come up with a solution,” Schiff said. Law enforcement officials know that legislation is a tough sell now. But, one senior official stressed, “it’s still going to be in the mix.” On the other side of the debate, technology, diplomatic and commerce agencies were pressing for an outright statement by Obama to disavow a legislative mandate on companies. But their position did not prevail.
  • Daniel Castro, vice president of the Information Technology & Innovation Foundation, said absent any new laws, either in the United States or abroad, “companies are in the driver’s seat.” He said that if another country tried to require companies to retain an ability to decrypt communications, “I suspect many tech companies would try to pull out.”
Paul Merrell

Shell stops Arctic activity after 'disappointing' tests - BBC News - 0 views

  • Royal Dutch Shell has stopped Arctic oil and gas exploration off the coast of Alaska after "disappointing" results from a key well in the Chukchi Sea.In a surprise announcement, the company said it would end exploration off Alaska "for the foreseeable future".Shell said it did not find sufficient amounts of oil and gas in the Burger J well to warrant further exploration.The company has spent about $7bn (£4.5bn) on Arctic offshore development in the Chukchi and Beaufort seas."Shell continues to see important exploration potential in the basin, and the area is likely to ultimately be of strategic importance to Alaska and the US," said Marvin Odum, president of Shell USA. "However, this is a clearly disappointing exploration outcome for this part of the basin."
  • Indeed some analysts suggested Shell might give up on the Arctic completely. "It is possible that Shell might almost be relieved as they can stop exploration for a legitimate operational reason, rather than being seen to bow to environmental pressure," Stuart Elliott from energy information group Platts told the BBC."With the oil price around $50 a barrel, it was a risky endeavour with no guarantee of success. "You could argue that this has been bad for Shell's reputation and it wouldn't be a big surprise if they abandoned Arctic drilling altogether."
  • So, what changed?Certainly, the first findings from the Burger J exploration well 150 miles off the Alaskan coast were not promising.Second, although President Barack Obama had given the necessary permissions for drilling to start again following the problems of rig fires in 2012, Mrs Clinton's tweet revealed that political risks were still substantial.
  • ...3 more annotations...
  • The US Geological Survey estimates that the Arctic holds about 30% of the world's undiscovered natural gas, as well as 13% of its oil.According to Shell, this amounts to around 400 billion barrels of oil equivalent, 10 times the total oil and gas produced in the North Sea to date.
  • However, environmental groups oppose Arctic offshore drilling, saying it will pollute and damage a natural wilderness largely untouched by human activity. They also argue that fossil fuels such as oil and gas must be left in the ground if the world is to avoid dangerous climate change.Over the summer, protesters in kayaks unsuccessfully tried to block Arctic-bound Shell vessels in Seattle and Portland, Oregon. "Big oil has sustained an unmitigated defeat," said Greenpeace UK executive director John Sauven."The Save the Arctic movement has exacted a huge reputational price from Shell for its Arctic drilling programme, and as the company went another year without striking oil, that price finally became too high."Shell had continued to explore for oil despite the slump in the price of oil. Other oil and gas majors have shelved expensive exploration projects but, having invested billions of dollars in its Arctic project, Shell persisted, believing that Arctic oil would be competitive in the longer term.This is why the announcement came as such a surprise.
  • More on this story Video Shell calls end to Alaska oil search 52 minutes ago Shell has made a costly call to abandon Alaska 28 September 2015 'Volatile' oil price hard to predict, says Shell boss 17 September 2015 Why mega-merger is so important for Shell 8 April 2015 BP profits fall on low oil price 28 July 2015
  •  
    Not mentioned in the article, but environmental groups recently announced that they would begin a consumer boycott of Shell fuels because of its Artic drilling.  
Paul Merrell

Washington's Civil War Over Russia Intel - The Daily Beast - 0 views

  • As Russia continues airstrikes in Syria, a fight is brewing between members of Congress and U.S. intelligence agencies over what lawmakers were told about the Russian military operations, and when.The House Intelligence Committee, which oversees the CIA and other spy agencies responsible for tracking the Russian military buildup in Syria, is “looking at possible problems in the timely provision of information to Congress,” a congressional staff member told The Daily Beast. Three other officials confirmed that the inquiry—which is not a formal investigation—is underway and that lawmakers have been talking to intelligence officials about whether their reports to Congress accurately predicted when the Russian air strikes would begin and that they would target rebel groups fighting the regime of Bashar al-Assad.
  • U.S. intelligence officials fired back that they had provided lawmakers with warnings about Russia’s intentions to begin military operations in Syria, including in the weeks before airstrikes began in late September. “Any suggestion that the intelligence community was surprised by Russia’s military support to the Assad regime is misleading,” a senior intelligence official told The Daily Beast. Members of Congress had access to intelligence reports on the movements of Russian aircraft into Syria as well as the buildup of ground troops and could read them anytime they chose, another official said.
  • “For several years, the Intelligence Community has provided regular assessments of Russia’s military, political, and financial support to the [Assad] regime,” Brian Hale, a spokesperson for the Director of National Intelligence, said in a statement. “In recent months, the Intelligence Community tracked and reported Moscow’s determination to play a more direct role in propping up Assad’s grip on power, including its deployment of offensive military assets to Syria. While these events unfolded quickly, the IC carried out its responsibilities with equal agility.”The pushback from officials underscored how sensitive the agencies are to allegations of “intelligence failures” and in particular being behind the curve about Russia’s international ambitions and the rise of extremists groups in the Middle East. The Defense Department is also investigating allegations that senior intelligence officials at the military’s Central Command manipulated intelligence reports to paint a rosy picture about the U.S.-led air campaign against the so-called Islamic State, widely known as ISIS, in Iraq and Syria.
Paul Merrell

Court rules Bush officials can be sued for post-9/11 detentions | TheHill - 0 views

  • A top federal court on Wednesday ruled that people held for months on end for immigration violations following Sept. 11, 2001, can sue top government officials for racial profiling and other abuses.The split decision from a three-judge panel on the Second Circuit Court of Appeals comes after more than a decade of litigation, and could lead to increased scrutiny on the government’s behavior following the 2001 terror attack.  ADVERTISEMENT“We simply cannot conclude at this stage that concern for the safety of our nation justified the violation of the constitutional rights on which this nation was built,” Judges Rosemary Pooler and Richard Wesley wrote in their 109-page decision.“The question at this stage of the litigation is whether the [eight foreigners arrested on immigration charges] have plausibly pleaded that the [government officials] exceeded the bounds of the Constitution in the wake of 9/11,” they wrote. “We believe that they have.”
  • After being arrested for immigration charges such as overstaying a visa or working without legal authorization after 9/11, the men were held from between three to eight months in New York or New Jersey. The men, who are all Arab or South Asian, were detained for being “suspected terrorists” and claim that they were abused by prison guards and subjected to extended solitary confinement.In 2002, they filed a class action lawsuit againt then-Attorney General John Ashcroft, then-FBI Director Robert Mueller and other federal and local law enforcement officials.Wednesday’s decision allows that suit to go forward.“The Constitution defines the limits of the Defendants’ authority,” the two judges wrote, “detaining individuals as if they were terrorists, in the most restrictive conditions of confinement available, simply because these individuals were, or appeared to be, Arab or Muslim exceeds those limits.”
  • The lawsuit is Turkmen v. Ashcroft.
Paul Merrell

Major Second Circuit Ruling Sides With Immigrants Subjected to Post-9/11 Roundup | Just... - 0 views

  • I’ve written at some length in the past about judicial hostility to damages suits brought by victims of allegedly unlawful post-9/11 counterterrorism policies. I may have to rethink some of that analysis in light of this morning’s landmark ruling by the Second Circuit in Turkmen v. Hasty, the class action arising out of the post-September 11 roundup and detention of certain groups of immigrants in and around New York. In a nutshell (given that the majority opinion runs to 109 pages), Judges Rosemary Pooler and Ronald Wesley (Clinton and George W. Bush appointees, respectively) hold that (1) Bivens provides a cause of action for damages for the plaintiffs’ Fourth Amendment strip-search, Fifth Amendment substantive due process, and Fifth Amendment equal protection claims (albeit not their free exercise claim); (2) the facts alleged in the complaint are sufficient to overcome Iqbal; and (3) five former federal officials, including Attorney General John Ashcroft, FBI Director Robert Mueller, INS Commissioner James Ziglar, MDC Warden Dennis Hasty, and Associate Warden James Sherman, are not entitled to qualified immunity on the plaintiffs’ policy-challenging allegations of punitive and discriminatory confinement and unreasonable strip searches.
  • As Judge Raggi describes in her 91-page dissent, the majority nevertheless narrows the class of plaintiffs to only (1) those non-citizens confined in the MDC’s most restrictive housing unit; and (2) for restrictive confinement after the defendants allegedly learned that the plaintiffs were being detained without individualized suspicion of their connection to terrorism. But it’s still by far the most plaintiff-friendly circuit ruling in a post-9/11 damages suit. In her words, “Today, our court becomes the first to hold that a Bivens action can be maintained against the nation’s two highest ranking law enforcement officials . . . for policies propounded to safeguard the nation in the immediate aftermath of the infamous al Qaeda terrorist attacks of September 11, 2001.” There’s surely a lot more to say about the 200 pages of opinions in this case–and the analyses of Bivens and qualified immunity, in particular. For that reason, among others, I suspect this is not the last we’ll hear of it…
Paul Merrell

Senior US official in Venezuela for meetings with Maduro - The Washington Post - 0 views

  • A senior U.S. diplomat was in Venezuela on Wednesday for talks with President Nicolas Maduro ahead of a regional summit in which tensions between Caracas and Washington threatened to overshadow a thaw in U.S.-Cuba relations. News of the visit by State Department counselor Thomas Shannon came after Maduro announced promotions for two of the seven officials the United States sanctioned in March for alleged human rights violations and corruption. Caracas responded at the time by ordering most U.S. diplomats posted in the Venezuela capital to leave. Shannon flew to Venezuela on Tuesday after its leaders invited the Obama administration to send a senior official to Caracas in advance of the three-day Summit of the Americas, which begins Friday in Panama.
  • Shannon was expected to meet with Venezuela’s opposition coalition Thursday. There was no immediate word on the content of the talks. Maduro made his announcement about the promotions of two officials on Tuesday evening. One of the promoted officials is Katherine Harrington, who will oversee criminal investigations. As a prosecutor, she has charged several opposition members with attempting to overthrow the government. The other is Manuel Perez Urdaneta, who will oversee citizen safety. He was previously national police director. Maduro has called the sanctions an act of war and hails as national heroes those who have had their U.S. assets frozen and visas revoked.
  • Also on Wednesday, Brazilian President Dilma Rousseff spoke to Maduro and Vice President Joe Biden on the phone Tuesday, according to a statement released by her administration. She found that Maduro is willing to smooth relations with the U.S., and offered her help in fostering dialogue, according to the statement.
  •  
    More efforts to get Obama thriough the Summit of the Americas conference that begins today with the least embarrassment stemming from the failed U.S. attempt to overthrow Venezuela's government earlier this year. The most detailed account of the coup attempt and its defeat is at http://www.voltairenet.org/article186879.html
« First ‹ Previous 501 - 520 of 688 Next › Last »
Showing 20 items per page