Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged director

Rss Feed Group items tagged

Paul Merrell

Israel Joins Chinese Bank, Defies U.S.  « LobeLog - 0 views

  • Updating the post I wrote a couple of weeks ago on how the U.S. failed to persuade some of its closest allies not to join the new Chinese-backed Asian Infrastructure Investment Bank (AIIB), it’s worth noting that Israel has also abandoned Washington by signing up for membership. The Israeli foreign ministry announced on March 31–the deadline for applying to join the new bank–that Prime Minister Benjamin Netanyahu had signed “a letter of application to join the [AIIB], a result of the initiative of the President of China.”
  • The process of joining the bank was led by the Ministry of Foreign Affairs in recognition of the importance of joining major Asian organizations on the continent. Israel’s membership in the Bank will open opportunities for integration of Israeli companies in various infrastructure projects, which will be financed by the bank. …It should be noted that the establishment of the bank is a Chinese diplomatic achievement. China initially intended that 35 countries should join, and to date 50 countries have joined. The establishment of AIIB is one of the most important initiatives in terms of Chinese foreign policy and in particular for President Xi Jinping, as this is his personal initiative.
  • Needless to say, Israel’s decision, which is perfectly defensible on the grounds of national interest, constitutes another slap at the Obama administration, which in the view of many experts stupidly lobbied U.S. allies against membership. (Of Washington’s closest allies, only Canada and Japan did not apply.) Israel has substantial commercial interests in China, particularly in the hi-tech and defense sectors. In fact, the Pentagon has long complained about Israeli transfers of sensitive U.S. military technology to China. In 2004, the Bush administration even sent then-Undersecretary of Defense for Policy and Greater Israel advocate Douglas Feith to Jerusalem to demand the resignation of the director general of the Israeli Defense Ministry, Amos Yaron, for allegedly concealing details of the sale and upgrade of an Israel-made Harpy attack drone to China.
  • ...2 more annotations...
  • Of course, one of the reasons Obama lobbied allies against joining the bank is that he knew that a Republican Congress would itself reject Washington’s accession. The same Republican Congress has steadfastly refused to ratify a long-pending governance reform of the International Monetary Fund (IMF) and the World Bank that would give Beijing and some other middle-income countries a somewhat bigger voice in the two western-dominated Bretton-Woods institutions (even without diluting the U.S. voting power on their boards). And, yes, this is the same Republican Congress that invited Netanyahu to speak to it, that approves virtually any appropriation desired by Israel, and that is trying its utmost to derail a multilateral nuclear agreement with Iran largely at Bibi’s behest.
  • Like most small countries, Israel practices realpolitik. Despite claims by AIPAC, neoconservatives, and many Christian Zionists that Israel is our “closest ally” in the Middle East, if not the world, and that its “values” are identical to our own, in fact, it pursues its own interests abroad with little regard for Republican (or anyone else’s) sensibilities. As we have reported before, it is also providing support to al-Qaeda’s affiliate in Syria, but no Republican that I know of has raised the slightest objection. Indeed, in their devotion to Netanyahu and his Likud Party, no doubt well lubricated by the millions of dollars in campaign and other political contributions offered by Sheldon Adelson, Paul Singer, and other Republican Jewish Coalition donors, most Republican lawmakers appear perfectly comfortable with Israel’s Middle East policies, including continued settlement-building and expansion in the West Bank and East Jerusalem, the de facto blockade against Gaza, and demands that Israel be recognized as a Jewish State. These actions and others serve not only to radicalize the Palestinians and other Arabs but also make it more difficult for the United States and its military to gain goodwill and operate effectively throughout the region, as then-CentCom Commander Gen. David Petraeus told the Senate Armed Services Committee shortly after Netanyahu became prime minister. Indeed, no one has undermined U.S. credibility in the region and beyond over the past six years as much as Bibi himself.
Paul Merrell

As Colombian Oil Money Flowed To Clintons, State Department Took No Action To Prevent L... - 0 views

  • For union organizers in Colombia, the dangers of their trade were intensifying. When workers at the country’s largest independent oil company staged a strike in 2011, the Colombian military rounded them up at gunpoint and threatened violence if they failed to disband, according to human rights organizations. Similar intimidation tactics against the workers, say labor leaders, amounted to an everyday feature of life. For the United States, these were precisely the sorts of discomfiting accounts that were supposed to be prevented in Colombia under a labor agreement that accompanied a recently signed free trade pact liberalizing the exchange of goods between the countries. From Washington to Bogota, leaders had promoted the pact as a win for all -- a deal that would at once boost trade while strengthening the rights of embattled Colombian labor organizers. That formulation had previously drawn skepticism from many prominent Democrats, among them Hillary Clinton. Yet as union leaders and human rights activists conveyed these harrowing reports of violence to then-Secretary of State Clinton in late 2011, urging her to pressure the Colombian government to protect labor organizers, she responded first with silence, these organizers say. The State Department publicly praised Colombia’s progress on human rights, thereby permitting hundreds of millions of dollars in U.S. aid to flow to the same Colombian military that labor activists say helped intimidate workers.
  • At the same time that Clinton's State Department was lauding Colombia’s human rights record, her family was forging a financial relationship with Pacific Rubiales, the sprawling Canadian petroleum company at the center of Colombia’s labor strife. The Clintons were also developing commercial ties with the oil giant’s founder, Canadian financier Frank Giustra, who now occupies a seat on the board of the Clinton Foundation, the family’s global philanthropic empire. The details of these financial dealings remain murky, but this much is clear: After millions of dollars were pledged by the oil company to the Clinton Foundation -- supplemented by millions more from Giustra himself -- Secretary Clinton abruptly changed her position on the controversial U.S.-Colombia trade pact. Having opposed the deal as a bad one for labor rights back when she was a presidential candidate in 2008, she now promoted it, calling it “strongly in the interests of both Colombia and the United States.” The change of heart by Clinton and other Democratic leaders enabled congressional passage of a Colombia trade deal that experts say delivered big benefits to foreign investors like Giustra.
  • The Clinton Foundation, Giustra and the State Department did not respond to International Business Times' requests for comment. Pacific Rubiales has denied that it has engaged in any violence toward union organizers. As Hillary Clinton readies a national apparatus for her likely presidential campaign -- one that will surely depend upon the support of American labor unions -- her family’s relationship with Giustra and Pacific Rubiales, her reversal on the Colombia trade pact and her subsequent move to bless Colombia’s human rights record complicate her efforts to present herself as a champion of worker rights.  These issues were amplified this week when the AFL-CIO cited persistent violence against Colombian union organizers in its push to block a new 12-nation trade deal that Clinton has championed.
  •  
    Bribery? We ain't talking about campaign donations here.
Paul Merrell

Secret documents shine light on GCSB spying in Bangladesh - National - NZ Herald News - 0 views

  • Secret documents reveal New Zealand has shared intelligence collected through covert surveillance with Bangladesh despite that country's security forces being implicated in extrajudicial killings, torture and other human rights abuses. The documents shine light on the major role played by the Government Communications Security Bureau (GCSB) in electronic spying operations conducted in the small South Asian nation. The surveillance has been used to aid the United States as part of its global counter-terrorism campaign, launched after the September 11 attacks in 2001. The New Zealand Herald analysed the documents in collaboration with US news website The Intercept, which obtained them from the NSA whistle-blower Edward Snowden.
  • The Bangladesh spying is revealed in an April 2013 US National Security Agency (NSA) report about its relationship with New Zealand. In a section called "What Partner Provides to NSA", it says "GCSB has been the lead for the intelligence community on the Bangladesh CT [Counter-Terrorism] target since 2004." The GCSB provides "one of the key SIGINT [signals intelligence] sources of [Bangladesh counter-terrorism] reporting to the US intelligence community."
  • The intelligence gathered by the GCSB staff was also being forwarded to foreign intelligence agencies, including Bangladesh's state intelligence agency. In recent years, human rights groups have issued several reports documenting Bangladeshi intelligence and security agencies' disregard for international prohibitions on torture and alleged involvement in politically motivated killings. In 2014, a case was filed in the International Criminal Court accusing the Bangladesh Government of committing crimes against humanity. The GCSB's surveillance operations in Bangladesh are among the most surprising and obscure yet revealed. Bangladesh barely registers in New Zealand foreign policy. The Ministry of Foreign Affairs and Trade website says: "Relations between New Zealand and Bangladesh remain friendly, although interaction is limited." Nonetheless, a New Zealand government source told the Herald that Bangladesh is the main focus of one of the GCSB's four analysis sections, called ICT, and has been for over a decade. ICT, the Transnational Issues section, was set up in April 2002 in the wake of the September 11 attacks to focus on terrorism threats.
  • ...5 more annotations...
  • The 2009 document reveals that there is a special collection site in the Bangladesh capital, Dhaka, for eavesdropping on local communications. New Zealand does not have a high commission or any other official building in Bangladesh in which to hide a covert listening post. The Snowden documents suggest the Dhaka unit may be located inside a US-controlled building with operations overseen by the NSA and the Central Intelligence Agency (CIA).
  • Green Party co-leader Russel Norman said the spy agency was "dragging" New Zealand into human rights abuses, and the Government should stop providing intelligence assistance to Bangladesh. "All three key anti-terrorism government agencies in Bangladesh have been implicated in horrendous human rights abuses, so it is impossible to guarantee that the information passed on did not lead to innocent people being killed or tortured," Dr Norman said. "John Key has always justified the GCSB on the basis that it is there to protect the good guys, but these documents reveal that it is helping the bad guys.
  • The intelligence gathered by the GCSB staff was being forwarded to foreign intelligence agencies. The April 2013 NSA report said the "GCSB's Bangladesh CT [counter terrorism] reporting provided unique intelligence leads that have enabled successful CT operations by Bangladesh State Intelligence Service, CIA and India over the past year". The specific Bangladesh "State Intelligence Service" referred to is not named in the document. Bangladesh has several agencies that focus on gathering intelligence, primarily including the Directorate General of Forces Intelligence (DGFI), the National Security Intelligence agency (NSI), and the police Special Branch. The lead agency that executes the country's counter-terrorism operations is the Rapid Action Battalion, or RAB. Each of these agencies has been accused of involvement in severe human rights abuses over a sustained number of years. In 2008, for instance, Human Rights Watch alleged that the Special Branch headquarters in Dhaka's Maghbazar neighbourhood was used to torture detainees.
  • In 2010, a trade union activist accused the NSI of arresting, torturing, and threatening to kill him. The same activist was found dead in unexplained circumstances two years later, his toes and feet broken, legs and body battered and bruised, and his legs apparently pierced with a sharp object. Bangladesh's intelligence agencies and main police and security forces co-operate closely. Most notably, they work together as part of a notorious centre called the Taskforce for Interrogation Cell, located inside a compound in northern Dhaka that is controlled by the RAB unit. In 2011, Britain's Guardian newspaper reported the interrogation cell was used as a place to extract information and confessions from "enemies of the state". It was described as a "torture centre" used for "deliberate and systematic" mistreatment of detainees. One British man detained there in 2009 on terrorism-related charges was allegedly hooded and strapped to a chair while a drill was driven into his right shoulder and hip.
  • Other torture methods used by Bangladeshi authorities, according to Human Rights Watch, have included "burning with acid, hammering of nails into toes ... electric shocks, beatings on legs with iron rods, beating with batons on backs after sprinkling sand on them, ice torture, finger piercing, and mock executions". In February last year, the US Government suspended its own support for the RAB, citing "gross violation of human rights" committed by the force's members. The same month, a case against the Bangladesh Government was lodged in the International Criminal Court, accusing the country's officials of waging a brutal campaign of "widespread or systematic" torture, killings, and other human rights abuses that amounted to crimes against humanity.
Paul Merrell

How Israel Hid Its Secret Nuclear Weapons Program - Avner Cohen and William Burr - POLI... - 0 views

  • For decades, the world has known that the massive Israeli facility near Dimona, in the Negev Desert, was the key to its secret nuclear project. Yet, for decades, the world—and Israel—knew that Israel had once misleadingly referred to it as a “textile factory.” Until now, though, we’ve never known how that myth began—and how quickly the United States saw through it. The answers, as it turns out, are part of a fascinating tale that played out in the closing weeks of the Eisenhower administration—a story that begins with the father of Secretary of State John Kerry and a familiar charge that the U.S. intelligence community failed to “connect the dots.
  • In its final months, even as the Kennedy-Nixon presidential race captivated the country, the Eisenhower administration faced a series of crises involving Cuba and Laos. Yet, as the fall of 1960 progressed, President Dwight D. Eisenhower encountered a significant and unexpected problem of a new kind—U.S. diplomats learned and U.S. intelligence soon confirmed that Israel was building, with French aid, a secret nuclear reactor in the Negev Desert. Soon concluding that the Israelis were likely seeking an eventual nuclear weapons capability, the administration saw a threat to strategic stability in the Middle East and a nuclear proliferation threat. Adding fuel to the fire was the perception that Israel was deceitful, or had not “come clean,” as CIA director Allen Dulles put it. Once the Americans started asking questions about Dimona, the site of Israel’s nuclear complex, the Israelis gave evasive and implausible cover stories. 
  • This article, recounting the Dimona discovery and its implications, is based on a special collection of declassified documents published on Wednesday by the National Security Archive, the Nuclear Proliferation International History Project, and the Center for Nonproliferation Studies of the Middlebury Institute of International Studies at Monterey, California.
Paul Merrell

United Nations News Centre - Security Council approves probe into those responsible for... - 0 views

  • The United Nations Security Council today gave the greenlight for the establishment of a Joint Investigative Mechanism to identify those responsible for the use of chemical weapons in Syria. In a unanimously adopted resolution, the 15-member body requested the UN Secretary-General, in coordination with the Director-General of the Organization for the Prohibition of Chemical Weapons (OPCW), to submit recommendations for the establishment of the Mechanism within 20 days. The Council will then respond to the recommendations within five days of receipt. The Mechanism, established for a period of one year with a possibility of future extension, will be tasked with identifying “individuals, entities, groups, or governments involved in the use of chemicals as weapons, including chlorine or any other toxic chemical,” in Syria, according to the Council, which reiterated that those responsible must be held accountable.
  • he resolution stresses the obligation of the Syrian Government and all parties in the country to “cooperate fully” with the OPCW and the UN, including providing full access to all locations, individuals and materials in Syria relevant for the Joint Investigative Mechanism. It also calls on all other States to cooperate fully, including providing any relevant information they may possess pertaining to those involved in use of chemicals as weapons in Syria. In March 2015, the Council expressed deep concern that toxic chemicals, such as chlorine, had been used as a weapon in Syria – which was the conclusion with a “high degree of confidence” by the OPCW Fact-Finding Mission – stressing that those who use such weapons must be held accountable. The UN and the OPCW previously worked together to oversee the destruction of Syria’s chemical weapons stockpiles and production facilities, a task they completed in October 2014.
Paul Merrell

'Top Secret' emails found as Clinton probe expands to key aides | McClatchy DC - 0 views

  • As pressure builds on Hillary Clinton to explain her official use of personal email while serving as secretary of state, she faced new complications Tuesday. It was disclosed her top aides are being drawn into a burgeoning federal inquiry and that two emails on her private account have been classified as “Top Secret.”The inspector general for the Intelligence Community notified senior members of Congress that two of four classified emails discovered on the server Clinton maintained at her New York home contained material deemed to be in one of the highest security classifications - more sensitive than previously known. The notice came as the State Department inspector general’s office acknowledged that it is reviewing the use of “personal communications hardware and software” by Clinton’s former top aides after requests from Congress.
  • The expanding inquiry threatens to further erode Clinton’s standing as the front-runner for the Democratic presidential nomination. Since her reliance on private email was revealed in March, polls in crucial swing states show that increasing numbers of voters say Clinton is not honest and trustworthy, in part, because of her use of private emails.
  • Sen. Chuck Grassley, the Republican chairman of the Judiciary Committee, wants Clinton and her aides to “come clean and cough up” information about their personal email use. “Both the State Department and Intelligence Community inspectors general should be looking into the staff use of the Clinton private server for official State Department business. This means giving both inspectors general access and custody of all emails that haven’t already been deleted,” said Grassley of Iowa. “From what is publicly known, it appears that the investigation thus far has focused so much on the former secretary of state, that it’s gotten lost that high-level staff apparently also used this server too.” State Department spokesman John Kirby referred to the Intelligence Community’s disclosure as a recommendation to “upgrade” the two emails’ classification to “Top Secret.” In a statement, he said that “while we work with the Director of National Intelligence to resolve whether, in fact, this material is actually classified, we are taking steps to ensure the information is protected and stored appropriately.”
  • ...1 more annotation...
  • At least four top aides have turned over records, including copies of work emails on personal accounts, to the State Department, which is collecting them in response to a subpoena from Capitol Hill, according to the department. Lawmakers have demanded records, including personal emails, from six other aides, but it’s unknown whether they used personal email for work.
Gary Edwards

Why Are We So Afraid To Fix Banks The Right Way?* | Clusterstock Henry Blodgett - 0 views

  • a debt-equity swap
  • LIF said: Jan. 19, 3:17 PM MY PLAN 1. Mandate a 12-1 leverage cap for all financial institutions to take effect within 180 days. This 12-1 leverage cap has to be calculated using real market prices, not mark-to-model prices. 2. Temporary ban on capital raising by banks – water can’t dilute poison. You eliminate the poison first then add more water. 3. Force banks, etc to reach this 12-1 leverage cap by selling their toxic assets within 180 days via a US Govt Auction. The US Govt will be the Auctioneer but will NOT bid for assets 4. Any bank that is unable to sell sufficient assets to bring it under the 12-1 leverage cap will automatically nationalized by the US Govt at a price of $1. All shareholdrers and bond holders forfeit their assets. This will provide an incentive to the banks/financial institutions to sell these assets. 5. The US Govt will now hold all the toxic assets to maturity - this will prevent private market bidders from low-bidding in (3) above. Private market bidders in essence are being told, you buy the assets during the auction or you will not have another opportunity to buy the assets, as the US Govt will sieze them at an effective rate of ZERO and then hold them to maturity. 6. Any bank that falls under nationalization will also have its CEO, Board of Directors and members of the Management committee for the past 5-10 years disgorge all compensation earned during the past 5-10 years. 7. Create standardized CDS products that traded on an electronic exchange. All non-standard CDS products should be liquidated in the OTC market or swapped into standardized CDS products prior to the commencement of the new CDS exchange. The exchange will commence within180 days. 8. New Mortgage Financing Rules: 20-30% minimum govt mandated down payments. Strict Debt to Income limits, etc. These rules must be codified into federal law. 9. New Credit Card/Auto Finance rules: strict rules on the amount of credit card/Auto finance debt available to consumers.
  •  
    You don't have to subsidize banks and their stakeholders at taxpayer expense to avoid another Lehman.  You just have to fix the banks the right way. What's the right way? * Temporarily seize the banks * Write their assets down to nuclear-winter levels (or, if desired, put them in a big bad bank, as Sheila Bair wants to do.) * Convert enough of their debt to equity to put them in a strong capital position. That's it.  No taxpayer money.  No citizen outrage.  No comical "Yes, we're lending" assurances when what the banks are really doing is, sensibly, hoarding everything. We could do this to Citigroup and Bank of America tomorrow afternoon, and on Wednesday morning, two of our biggest banks would be rock solid (they could also still be publicly traded, under the same ticker symbols, with different shareholders). 
Gary Edwards

SNL Bank Bailout Sketch: People Who Should Be Shot - 0 views

  •  
    Remember that controversial SNL sketch where Golden West's Herb and Marion Sandler were described as People Who Should Be Shot? NBC actually took it off the internet, prompting howls from Republicans who saw the media gagging a sketch that succesfully tied Democrats to Big Mortgage. Anyway, an edited version has back up on Hulu for awhile, but our friends at Guest of a Guest have obtained an edited version, replete with the People Who Should Be Shot descriptor. Oh if only this unedited version had become re-available before the election! November 6th, 2008
Joseph Skues

Jim Hightower | Republicans Give Government Back to Their Corporate Paymasters - 0 views

  • You see, the people he's giving the government back to are not tea partiers, but the rapacious corporate lobbyists who ran the Congress during the years when former Majority Leader Tom DeLay ran the show.
  • In recent years, he has formed unusually tight legislative, political and even social ties with a group of lobbyists for such giants as Citigroup, Coors, Goldman Sachs, Google and R.J. Reynolds.
  • Boehner had a private meeting with a flock of top corporate lobbyists to help shape "a new GOP agenda
  • ...8 more annotations...
  • orget the tea party. No tea party operative is a Boehner insider
  • It's the corporate agenda that Republican leaders will be pushing, and to make sure that it stays on track, Boehner has hired a top corporate lobbyist to be his policy director
  • Also entering the Capitol for the swearing-in ceremonies was David Koch, the multibillionaire industrialist and laissez-faire extremist who bankrolled much of the tea party/GOP victory last fall. What symbolism! The members were taking office, but Koch and his corporate agenda were taking power.
  • Rep. Spencer Bachus of Alabama, the new chairman of the Wall Street oversight committee, declared that his role is to "serve the banks."
  • He sent letters to 150 corporate interests, asking them to tell him if Obama and his Democratic meanies have imposed any consumer, worker or environmental protections that should be undone.
  • big banks, for example, wailed that their ability to gouge customers with rip-off debit-card fees had been curtailed. There, there, Issa said soothingly, I'm here now. I'll make it all better for you.
  • The letters unleashed an outpouring of corporate whining
  • This is not just business as usual, it's business way more than usual.
Paul Merrell

EFF Fights Destruction of Spying Evidence in Court Wednesday | Electronic Frontier Foun... - 0 views

  • Government Claims EFF's Lawsuits Don't Cover Ongoing Surveillance – Raising Fears Key Documents May Have Been DestroyedUPDATE: Judge White today continued his temporary restraining order in these two cases until a more permanent order could be put in place. The question of whether the government improperly destroyed evidence so far will be briefed over the next several weeks.
  • San Francisco - The Electronic Frontier Foundation (EFF) will fight disturbing new government claims in an emergency court hearing Wednesday – claims that may imply records documenting ongoing government surveillance have been destroyed despite a judge's order. Over the last several weeks, EFF has been battling to ensure that evidence of the NSA surveillance program will be preserved as part of its two cases challenging the illegal government spying: Jewel v. NSA and First Unitarian Church of Los Angeles v. NSA. But in a court filing late Monday, the government made shocking new assertions, arguing that its obligation to preserve evidence was limited to aspects of the original Bush-era spying program, which the government contends ended eight years ago with a transition to FISA court orders.
  • Government Claims EFF's Lawsuits Don't Cover Ongoing Surveillance – Raising Fears Key Documents May Have Been DestroyedUPDATE: Judge White today continued his temporary restraining order in these two cases until a more permanent order could be put in place. The question of whether the government improperly destroyed evidence so far will be briefed over the next several weeks.
  • ...1 more annotation...
  • This argument simply does not make sense. EFF has been demanding an injunction to stop this illegal spying program, regardless of the government's shifting justifications," said EFF Legal Director Cindy Cohn, who will argue in front of U.S. District Court Judge Jeffrey S. White at the hearing Wednesday. "But these government claims aren't just nonsensical – they are extremely worrisome and dangerous. The government is suggesting it may have destroyed years' worth of evidence about its illegal spying, justified by its own secret interpretation of our case. This is about more than just phone records; it's about evidence concerning all of the government's spying. EFF is asking the court for a full accounting of just what is going on here, and it's time for the government to come clean." EFF has been litigating against illegal NSA surveillance for more than eight years. Jewel v. NSA is a case brought on behalf of AT&T customers who were subject to unconstitutional NSA spying. In First Unitarian Church of Los Angeles v. NSA, EFF represents 22 groups whose First Amendment rights to association are violated by the NSA program.
Paul Merrell

Obama to Call for End to N.S.A.'s Bulk Data Collection - NYTimes.com - 0 views

  • The Obama administration is preparing to unveil a legislative proposal for a far-reaching overhaul of the National Security Agency’s once-secret bulk phone records program in a way that — if approved by Congress — would end the aspect that has most alarmed privacy advocates since its existence was leaked last year, according to senior administration officials.Under the proposal, they said, the N.S.A. would end its systematic collection of data about Americans’ calling habits. The bulk records would stay in the hands of phone companies, which would not be required to retain the data for any longer than they normally would. And the N.S.A. could obtain specific records only with permission from a judge, using a new kind of court order. In a speech in January, President Obama said he wanted to get the N.S.A. out of the business of collecting call records in bulk while preserving the program’s abilities. He acknowledged, however, that there was no easy way to do so, and had instructed Justice Department and intelligence officials to come up with a plan by March 28 — Friday — when the current court order authorizing the program expires.
  • As part of the proposal, the administration has decided to ask the Foreign Intelligence Surveillance Court to renew the program as it exists for at least one more 90-day cycle, senior administration officials said. But under the plan the administration has developed and now advocates, the officials said, it would later undergo major changes. The new type of surveillance court orders envisioned by the administration would require phone companies to swiftly provide records in a technologically compatible data format, including making available, on a continuing basis, data about any new calls placed or received after the order is received, the officials said. They would also allow the government to swiftly seek related records for callers up to two phone calls, or “hops,” removed from the number that has come under suspicion, even if those callers are customers of other companies.
  • The N.S.A. now retains the phone data for five years. But the administration considered and rejected imposing a mandate on phone companies that they hold on to their customers’ calling records for a period longer than the 18 months that federal regulations already generally require — a burden that the companies had resisted shouldering and that was seen as a major obstacle to keeping the data in their hands. A senior administration official said that intelligence agencies had concluded that the operational impact of that change would be small because older data is less important.The N.S.A. uses the once-secret call records program — sometimes known as the 215 program, after Section 215 of the Patriot Act — to analyze links between callers in an effort to identify hidden terrorist associates, if they exist. It was part of the secret surveillance program that President George W. Bush unilaterally put in place after the terrorist attacks of Sept. 11, 2001, outside of any legal framework or court oversight.
  • ...4 more annotations...
  • Marc Rotenberg, the executive director of the Electronic Privacy Information Center, called the administration’s proposal a “sensible outcome, given that the 215 program likely exceeded current legal authority and has not proved to be effective.” While he said that he would like to see more overhauls to other surveillance authorities, he said the proposal was “significant” and addressed the major concerns with the N.S.A.’s bulk records program. Jameel Jaffer of the American Civil Liberties Union said, “We have many questions about the details, but we agree with the administration that the N.S.A.’s bulk collection of call records should end.” He added, “As we’ve argued since the program was disclosed, the government can track suspected terrorists without placing millions of people under permanent surveillance.”
  • In recent days, attention in Congress has shifted to legislation developed by leaders of the House Intelligence Committee. That bill, according to people familiar with a draft proposal, would have the court issue an overarching order authorizing the program, but allow the N.S.A. to issue subpoenas for specific phone records without prior judicial approval.
  • The Obama administration proposal, by contrast, would retain a judicial role in determining whether the standard of suspicion was met for a particular phone number before the N.S.A. could obtain associated records.The administration’s proposal would also include a provision clarifying whether Section 215 of the Patriot Act, due to expire next year unless Congress reauthorizes it, may in the future be legitimately interpreted as allowing bulk data collection of telephone data.The proposal would not, however, affect other forms of bulk collection under the same provision. The C.I.A., for example, has obtained orders for bulk collection of records about international money transfers handled by companies like Western Union.
  • The government has been unable to point to any thwarted terrorist attacks that would have been carried out if the program had not existed, but has argued that it is a useful tool.
  •  
    "The N.S.A. uses the once-secret call records program ... to analyze links between callers in an effort to identify hidden terrorist associates, if they exist." Correction: "The N.S.A. *claims* to use the ..." 
Paul Merrell

NSA statement does not deny 'spying' on members of Congress | World news | theguardian.com - 0 views

  • The National Security Agency on Saturday released a statement in answer to questions from a senator about whether it “has spied, or is … currently spying, on members of Congress or other American elected officials”, in which it did not deny collecting communications from legislators of the US Congress to whom it says it is accountable. In a letter dated 3 January, Senator Bernie Sanders of Vermont defined “spying” as “gathering metadata on calls made from official or personal phones, content from websites visited or emails sent, or collecting any other data from a third party not made available to the general public in the regular course of business”. The agency has been at the centre of political controversy since a former contractor, Edward Snowden, released thousands of documents on its activities to media outlets including the Guardian. In its statement, which comes as the NSA gears up for a make-or-break legislative battle over the scope of its surveillance powers, the agency pointed to “privacy protections” which it says it keeps on all Americans' phone records.
  • The statement read: “NSA’s authorities to collect signals intelligence data include procedures that protect the privacy of US persons. Such protections are built into and cut across the entire process. Members of Congress have the same privacy protections as all US persons. NSA is fully committed to transparency with Congress. Our interaction with Congress has been extensive both before and since the media disclosures began last June. “We are reviewing Senator Sanders’s letter now, and we will continue to work to ensure that all members of Congress, including Senator Sanders, have information about NSA’s mission, authorities, and programs to fully inform the discharge of their duties.” Soon after Sanders' letter was published, the director of national intelligence, James Clapper, announced that the Foreign Intelligence Surveillance (Fisa) Court, the body which exists to provide government oversight of NSA surveillance activities, had renewed the domestic phone records collection order for another 90 days.
  •  
    Evasive answer. "Members of Congress have the same privacy protections as all U.S. persons." That is so evasive and conveys such little information that it cannot qualify as anything but a lie.
Paul Merrell

We made Ron Wyden a better graph of the year - 0 views

  • Over on Wonkblog, Sen. Ron Wyden (D, Ore.) wrote up his graph of the year -- a lively piece on U.S. natural gas prices. But we couldn't help but think that the vocal NSA critic missed an opportunity to highlight his involvement in one of the biggest stories of the year. So we made him this graph based on his infamous exchange with Director of National Intelligence James Clapper:
  • In a Senate Intelligence Committee meeting hearing in March, Wyden asked "Does the NSA collect any type of data at all on millions or hundreds of millions of Americans?" Clapper replied "No, sir." When pressed by Wyden, Clapper elaborated that the NSA does "not wittingly" collect data about Americans, with the caveat that "there are cases where they could inadvertently perhaps collect" such information. Of course, since then the Snowden revelations have shown that the NSA does, in fact, collect data on millions or hundreds of millions of Americans. At a minimum, we know that the NSA is collecting information about the phone calls of all Verizon customers, and it's a safe bet that the agency has similar arrangements with other major phone companies. That suggests the NSA likely collects information about everyone with a telephone, which is to say almost all of the approximately 300 million people in the United States.
  • Clapper denied that the NSA had collected information on "millions" of Americans, but he didn't actually say the number was zero. So we've given Clapper the benefit of the doubt, showing him as allowing for as many as 1,900,000 Americans being the subject of NSA data collection. Clapper later apologized, calling his statements "clearly erroneous."
  •  
    Nice graph.
Paul Merrell

Rand Paul backs Snowden, bashes Clapper - POLITICO.com - 0 views

  • Kentucky Sen. Rand Paul on Sunday went to bat for NSA leaker Edward Snowden — and took a swing at Director of National Intelligence James Clapper, while Sen. Chuck Schumer advocated a tougher line on Snowden. "I don't think Edward Snowden deserves the death penalty or life in prison; I think that's inappropriate, I think that's why he fled, is that's what he faced," Paul, a possible 2016 contender for the Republican presidential nomination, said on ABC's "This Week." "Do I think it's OK to leak secrets and give up national security [information] that endangers lives? I don't think that's OK, either. But I think the courts are now saying he revealed something the government was doing that was illegal." Paul, who's pushing a class-action suit against the National Security Agency over its data collection tactics, has said that Snowden and Clapper should "share a prison cell," charging that Clapper lied to Congress. "Maybe if they served in a prison cell together, we'd be further enlightened as a country over what we should and shouldn't do," Paul said.
Paul Merrell

U.S. to China: We Hacked Your Internet Gear We Told You Not to Hack | Wired Enterprise ... - 0 views

  • The headline news is that the NSA has surreptitiously “burrowed its way into nearly all the security architecture” sold by the world’s largest computer networking companies, including everyone from U.S. mainstays Cisco and Juniper to Chinese giant Huawei. But beneath this bombshell of a story from Der Spiegel, you’ll find a rather healthy bit of irony. After all, the United States government has spent years complaining that Chinese intelligence operations could find ways of poking holes in Huawei networking gear, urging both American businesses and foreign allies to sidestep the company’s hardware. The complaints grew so loud that, at one point, Huawei indicated it may abandon the U.S. networking market all together. And, yet, Der Speigel now tells us that U.S. intelligence operations have been poking holes in Huawei networking gear — not to mention hardware sold by countless other vendors in both the States and abroad. “We read the media reports, and we’ve noted the references to Huawei and our peers,” says William Plummer, a Huawei vice president and the company’s point person in Washington, D.C. “As we have said, over and over again — and as now seems to be validated — threats to networks and data integrity can come from any and many sources.”
  • Plummer and Huawei have long complained that when the U.S. House Intelligence Committee released a report in October 2012 condemning the use of Huawei gear in telephone and data networks, it failed to provide any evidence that the Chinese government had compromised the company’s hardware. Adam Segal, a senior fellow for China Studies at the Center for Foreign Relations, makes the same point. And now we have evidence — Der Spiegel cites leaked NSA documents — that the U.S. government has compromised gear on a massive scale. “Do I see the irony? Certainly the Chinese will,” Segal says, noting that the Chinese government and the Chinese press have complained of U.S hypocrisy ever since former government contractor Edward Snowden first started to reveal NSA surveillance practices last summer. “The Chinese government has been hammering home what they call the U.S.’s ulterior motives for criticizing China, and there’s been a steady drumbeat of stories in the Chinese press about backdoors in the products of U.S. companies. They’ve been going after Cisco in particular.”
  • To be sure, the exploits discussed by Der Spiegel are a little different from the sort of attacks Congress envisioned during its long campaign against Huawei and ZTE, another Chinese manufacturer. As Segal and others note, Congress mostly complained that the Chinese government could collaborate with people inside the two companies to plant backdoors in their gear, with lawmakers pointing out that Huawei’s CEO was once an officer in China’s People’s Liberation Army, or PLA, the military arm of the country’s Communist party. Der Spiegel, by contrast, says the NSA is exploiting hardware without help from anyone inside the Ciscos and the Huaweis, focusing instead on compromising network gear with clever hacks or intercepting the hardware as it’s shipped to customers. “For the most part, the article discusses typical malware exploits used by hackers everywhere,” says JR Rivers, an engineer who has built networking hardware for Cisco as well as Google and now runs the networking startup Cumulus Networks. “It’s just pointing out that the NSA is engaged in the practice and has resources that are not available to most people.” But in the end, the two types of attack have the same result: Networking gear controlled by government spies. And over the last six months, Snowden’s revelations have indicated that the NSA is not only hacking into networks but also collaborating with large American companies in its hunt for data.
  • ...2 more annotations...
  • Jim Lewis, a director and senior fellow with the Center for Strategic and International Studies, adds that the Chinese view state-sponsored espionage a little differently than the U.S. does. Both countries believe in espionage for national security purposes, but the Chinese argue that such spying might include the theft of commercial secrets. “The Chinese will tell you that stealing technology and business secrets is a way of building their economy, and that this is important for national security,” says Lewis, who has helped oversee meetings between the U.S. and the Chinese, including officers in the PLA. “I’ve been in the room when they’ve said that. The last time was when a PLA colonel said: ‘In the U.S., military espionage is heroic and economic espionage is a crime. In China, the line is not that clear.’” But here in the United States, we now know, the NSA may blur other lines in the name of national security. Segal says that although he, as an American, believes the U.S. government is on stronger ethical ground than the Chinese, other nations are beginning to question its motives. “The U.S has to convince other countries that our type of intelligence gathering is different,” he says. “I don’t think that the Brazils and the Indias and the Indonesias and the South Africas are convinced. That’s a big problem for us.”
  • The thing to realize, as the revelations of NSA snooping continue to pour out, is that everyone deserves scrutiny — the U.S government and its allies, as well as the Chinese and others you may be more likely to view with skepticism. “All big countries,” Lewis says, “are going to try and do this.”
  •  
    Of course, we now know that the U.S. conducts electronic surveillance for a multitude of purposes, including economic. Check this group's notes tagged "NSA-targets" and/or "NSA-goals".
Paul Merrell

President Obama claims the NSA has never abused its authority. That's false | Trevor Ti... - 0 views

  • Time and again since the world learned the extent of what the NSA was doing, government officials have defended the controversial mass surveillance programs by falling back on one talking point: the NSA programs may be all-powerful, but they have never been abused. President Obama continually evokes the phase when defending the NSA in public. In his end-of-year press conference, he reiterated, "There continues not to be evidence that the [metadata surveillance] program had been abused". Former NSA chief Michael Hayden says this almost weekly, and former CIA deputy director and NSA review panel member Mike Morrell said it again just before Christmas. This mantra is likely to be repeated often in 2014 as Obama is set to address the nation on government surveillance, and Congress and the president debate whether any reforms are necessary.There's only one problem: it's not true.
  •  
    The Guardian proves overwhelmingly that Obama lied about NSA abuse during his end-of-year press conference.-
Paul Merrell

Ex-NSA chief jokes about putting Edward Snowden on kill list | TheHill - 0 views

  • Former National Security Agency Director Michael Hayden joked Thursday about putting Edward Snowden on a kill list.Hayden noted that Snowden has been nominated for a European human rights award.ADVERTISEMENT"I must admit, in my darker moments over the past several months, I'd also thought of nominating Mr. Snowden, but it was for a different list," Hayden said during a panel discussion on cybersecurity hosted by The Washington Post. The audience laughed, and Rep. Mike Rogers (R-Mich.), chairman of the House Intelligence Committee who was also on the panel, responded, "I can help you with that."Both officials argued that Snowden's leaks about the scope of the NSA's surveillance programs have done serious damage to U.S. national security.
  •  
    Two psychopaths in desperate need of heavy medication in the confinement to a locked mental ward.  Real sickos. 
Paul Merrell

U.S. may act to keep Chinese hackers out of Def Con hacker event | Reuters - 0 views

  • (Reuters) - Washington is considering using visa restrictions to prevent Chinese nationals from attending popular summer hacking conferences in Las Vegas as part of a broader effort to curb Chinese cyber espionage, a senior administration official said Saturday. The official said that Washington could use such visa restrictions and other measures to keep Chinese from attending the August Def Con and Black Hat events to maintain pressure on China after the United States this week charged five Chinese military officers with hacking into U.S. companies to steal trade secrets.China has denied the charges, saying they were "made up."Organizers of the two conferences said they knew nothing about any efforts under consideration by Washington, but that they believed limiting participation from China was a bad idea.
  • Ten to 12 Chinese citizens were unexpectedly denied visas last week to attend a space and cyber conference hosted by the Space Foundation in Colorado this week, the organizers said.Speakers included Director of National Intelligence James Clapper and other high-ranking U.S. intelligence and military officials.State Department spokeswoman Jen Psaki said visa applications were confidential, but cautioned against drawing a connection between the denials and indictments of the hackers.
Paul Merrell

Data Pirates of the Caribbean: The NSA Is Recording Every Cell Phone Call in the Bahama... - 0 views

  • The National Security Agency is secretly intercepting, recording, and archiving the audio of virtually every cell phone conversation on the island nation of the Bahamas. According to documents provided by NSA whistleblower Edward Snowden, the surveillance is part of a top-secret system – code-named SOMALGET – that was implemented without the knowledge or consent of the Bahamian government. Instead, the agency appears to have used access legally obtained in cooperation with the U.S. Drug Enforcement Administration to open a backdoor to the country’s cellular telephone network, enabling it to covertly record and store the “full-take audio” of every mobile call made to, from and within the Bahamas – and to replay those calls for up to a month. SOMALGET is part of a broader NSA program called MYSTIC, which The Intercept has learned is being used to secretly monitor the telecommunications systems of the Bahamas and several other countries, including Mexico, the Philippines, and Kenya. But while MYSTIC scrapes mobile networks for so-called “metadata” – information that reveals the time, source, and destination of calls – SOMALGET is a cutting-edge tool that enables the NSA to vacuum up and store the actual content of every conversation in an entire country.
  • All told, the NSA is using MYSTIC to gather personal data on mobile calls placed in countries with a combined population of more than 250 million people. And according to classified documents, the agency is seeking funding to export the sweeping surveillance capability elsewhere. The program raises profound questions about the nature and extent of American surveillance abroad. The U.S. intelligence community routinely justifies its massive spying efforts by citing the threats to national security posed by global terrorism and unpredictable rival nations like Russia and Iran. But the NSA documents indicate that SOMALGET has been deployed in the Bahamas to locate “international narcotics traffickers and special-interest alien smugglers” – traditional law-enforcement concerns, but a far cry from derailing terror plots or intercepting weapons of mass destruction.
  • By targeting the Bahamas’ entire mobile network, the NSA is intentionally collecting and retaining intelligence on millions of people who have not been accused of any crime or terrorist activity. Nearly five million Americans visit the country each year, and many prominent U.S. citizens keep homes there, including Sen. Tom Harkin (D-Iowa), Bill Gates, and Oprah Winfrey.
  • ...12 more annotations...
  • The Intercept has confirmed that as of 2013, the NSA was actively using MYSTIC to gather cell-phone metadata in five countries, and was intercepting voice data in two of them. Documents show that the NSA has been generating intelligence reports from MYSTIC surveillance in the Bahamas, Mexico, Kenya, the Philippines, and one other country, which The Intercept is not naming in response to specific, credible concerns that doing so could lead to increased violence. The more expansive full-take recording capability has been deployed in both the Bahamas and the unnamed country. MYSTIC was established in 2009 by the NSA’s Special Source Operations division, which works with corporate partners to conduct surveillance. Documents in the Snowden archive describe it as a “program for embedded collection systems overtly installed on target networks, predominantly for the collection and processing of wireless/mobile communications networks.”
  • If an entire nation’s cell-phone calls were a menu of TV shows, MYSTIC would be a cable programming guide showing which channels offer which shows, and when. SOMALGET would be the DVR that automatically records every show on every channel and stores them for a month. MYSTIC provides the access; SOMALGET provides the massive amounts of storage needed to archive all those calls so that analysts can listen to them at will after the fact. According to one NSA document, SOMALGET is “deployed against entire networks” in the Bahamas and the second country, and processes “over 100 million call events per day.”
  • When U.S. drug agents need to tap a phone of a suspected drug kingpin in another country, they call up their counterparts and ask them set up an intercept. To facilitate those taps, many nations – including the Bahamas – have hired contractors who install and maintain so-called lawful intercept equipment on their telecommunications. With SOMALGET, it appears that the NSA has used the access those contractors developed to secretly mine the country’s entire phone system for “signals intelligence” –recording every mobile call in the country. “Host countries,” the document notes, “are not aware of NSA’s SIGINT collection.” “Lawful intercept systems engineer communications vulnerabilities into networks, forcing the carriers to weaken,” says Christopher Soghoian, the principal technologist for the American Civil Liberties Union. “Host governments really should be thinking twice before they accept one of these Trojan horses.”
  • The DEA has long been in a unique position to help the NSA gain backdoor access to foreign phone networks. “DEA has close relationships with foreign government counterparts and vetted foreign partners,” the manager of the NSA’s drug-war efforts reported in a 2004 memo. Indeed, with more than 80 international offices, the DEA is one of the most widely deployed U.S. agencies around the globe. But what many foreign governments fail to realize is that U.S. drug agents don’t confine themselves to simply fighting narcotics traffickers. “DEA is actually one of the biggest spy operations there is,” says Finn Selander, a former DEA special agent who works with the drug-reform advocacy group Law Enforcement Against Prohibition. “Our mandate is not just drugs. We collect intelligence.” What’s more, Selander adds, the NSA has aided the DEA for years on surveillance operations. “On our reports, there’s drug information and then there’s non-drug information,” he says. “So countries let us in because they don’t view us, really, as a spy organization.”
  • “I seriously don’t think that would be your run-of-the-mill legal interception equipment,” says the former engineer, who worked with hardware and software that typically maxed out at 1,000 intercepts. The NSA, by contrast, is recording and storing tens of millions of calls – “mass surveillance,” he observes, that goes far beyond the standard practices for lawful interception recognized around the world. The Bahamas Telecommunications Company did not respond to repeated phone calls and emails.
  • The proliferation of private contractors has apparently provided the NSA with direct access to foreign phone networks. According to the documents, MYSTIC draws its data from “collection systems” that were overtly installed on the telecommunications systems of targeted countries, apparently by corporate “partners” cooperating with the NSA. One NSA document spells out that “the overt purpose” given for accessing foreign telecommunications systems is “for legitimate commercial service for the Telco’s themselves.” But the same document adds: “Our covert mission is the provision of SIGINT,” or signals intelligence.
  • According to the NSA documents, MYSTIC targets calls and other data transmitted on  Global System for Mobile Communications networks – the primary framework used for cell phone calls worldwide. In the Philippines, MYSTIC collects “GSM, Short Message Service (SMS) and Call Detail Records” via access provided by a “DSD asset in a Philippine provider site.” (The DSD refers to the Defence Signals Directorate, an arm of Australian intelligence. The Australian consulate in New York declined to comment.) The operation in Kenya is “sponsored” by the CIA, according to the documents, and collects “GSM metadata with the potential for content at a later date.” The Mexican operation is likewise sponsored by the CIA. The documents don’t say how or under what pretenses the agency is gathering call data in those countries. In the Bahamas, the documents say, the NSA intercepts GSM data that is transmitted over what is known as the “A link”–or “A interface”–a core component of many mobile networks. The A link transfers data between two crucial parts of GSM networks – the base station subsystem, where phones in the field communicate with cell towers, and the network subsystem, which routes calls and text messages to the appropriate destination. “It’s where all of the telephone traffic goes,” says the former engineer.
  • When U.S. drug agents wiretap a country’s phone networks, they must comply with the host country’s laws and work alongside their law enforcement counterparts. “The way DEA works with our allies – it could be Bahamas or Jamaica or anywhere – the host country has to invite us,” says Margolis. “We come in and provide the support, but they do the intercept themselves.” The Bahamas’ Listening Devices Act requires all wiretaps to be authorized in writing either by the minister of national security or the police commissioner in consultation with the attorney general. The individuals to be targeted must be named. Under the nation’s Data Protection Act, personal data may only be “collected by means which are both lawful and fair in the circumstances of the case.” The office of the Bahamian data protection commissioner, which administers the act, said in a statement that it “was not aware of the matter you raise.” Countries like the Bahamas don’t install lawful intercepts on their own. With the adoption of international standards, a thriving market has emerged for private firms that are contracted by foreign governments to install and maintain lawful intercept equipment. Currently valued at more than $128 million, the global market for private interception services is expected to skyrocket to more than $970 million within the next four years, according to a 2013 report from the research firm Markets and Markets.
  • If the U.S. government wanted to make a case for surveillance in the Bahamas, it could point to the country’s status as a leading haven for tax cheats, corporate shell games, and a wide array of black-market traffickers. The State Department considers the Bahamas both a “major drug-transit country” and a “major money laundering country” (a designation it shares with more than 60 other nations, including the U.S.). According to the International Monetary Fund, as of 2011 the Bahamas was home to 271 banks and trust companies with active licenses. At the time, the Bahamian banks held $595 billion in U.S. assets. But the NSA documents don’t reflect a concerted focus on the money launderers and powerful financial institutions – including numerous Western banks – that underpin the black market for narcotics in the Bahamas. Instead, an internal NSA presentation from 2013 recounts with pride how analysts used SOMALGET to locate an individual who “arranged Mexico-to-United States marijuana shipments” through the U.S. Postal Service.
  • The presentation doesn’t say whether the NSA shared the information with the DEA. But the drug agency’s Special Operations Divison has come under fire for improperly using classified information obtained by the NSA to launch criminal investigations – and then creating false narratives to mislead courts about how the investigations began. The tactic – known as parallel construction – was first reported by Reuters last year, and is now under investigation by the Justice Department’s inspector general. So: Beyond a desire to bust island pot dealers, why would the NSA choose to apply a powerful collection tool such as SOMALGET against the Bahamas, which poses virtually no threat to the United States? The answer may lie in a document that characterizes the Bahamas operation as a “test bed for system deployments, capabilities, and improvements” to SOMALGET. The country’s small population – fewer than 400,000 residents – provides a manageable sample to try out the surveillance system’s features. Since SOMALGET is also operational in one other country, the Bahamas may be used as a sort of guinea pig to beta-test improvements and alterations without impacting the system’s operations elsewhere. “From an engineering point of view it makes perfect sense,” says the former engineer. “Absolutely.”
  • SOMALGET operates under Executive Order 12333, a Reagan-era rule establishing wide latitude for the NSA and other intelligence agencies to spy on other countries, as long as the attorney general is convinced the efforts are aimed at gathering foreign intelligence. In 2000, the NSA assured Congress that all electronic surveillance performed under 12333 “must be conducted in a manner that minimizes the acquisition, retention, and dissemination of information about unconsenting U.S. persons.” In reality, many legal experts point out, the lack of judicial oversight or criminal penalties for violating the order render the guidelines meaningless. “I think it would be open, whether it was legal or not,” says German, the former FBI agent. “Because we don’t have all the facts about how they’re doing it. For a long time, the NSA has been interpreting their authority in the broadest possible way, even beyond what an objective observer would say was reasonable.” “An American citizen has Fourth Amendment rights wherever they are,” adds Kurt Opsahl, an attorney with the Electronic Frontier Foundation. “Nevertheless, there have certainly been a number of things published over the last year which suggest that there are broad, sweeping programs that the NSA and other government agencies are doing abroad that sweep up the communications of Americans.”
  • Legal or not, the NSA’s covert surveillance of an entire nation suggests that it will take more than the president’s tepid “limits” to rein in the ambitions of the intelligence community. “It’s almost like they have this mentality – if we can, we will,” says German. “There’s no analysis of the long-term risks of doing it, no analysis of whether it’s actually worth the effort, no analysis of whether we couldn’t take those resources and actually put them on real threats and do more good.” It’s not surprising, German adds, that the government’s covert program in the Bahamas didn’t remain covert. “The undermining of international law and international cooperation is such a long-term negative result of these programs that they had to know would eventually be exposed, whether through a leak, whether through a spy, whether through an accident,” he says. “Nothing stays secret forever. It really shows the arrogance of these agencies – they were just going to do what they were going to do, and they weren’t really going to consider any other important aspects of how our long-term security needs to be addressed.”
  •  
    Words fail me.
Paul Merrell

U.S. Intel Chief Says Iran Isn't Building Nukes. - 0 views

  • In testimony before the Senate Intelligence Committee on Tuesday March 12, 2013, Director of National Intelligence James Clapper reaffirmed what the U.S. intelligence community has been saying for years: Iran has no nuclear weapons program, is not building a nuclear weapon and has not even made a decision to do so. The annual “Worldwide Threat Assessment,” which compiles the collective conclusions of all American intelligence agencies, has long held that Iran maintains defensive capabilities and has a military doctrine of deterrence and retaliation, but is not an aggressive state actor and has no intention of beginning a conflict, let alone triggering a nuclear apocalypse. While the U.S. intelligence community assumes that Iran already has the technical capability to produce nuclear weapons, “should a decision be made to do so,” Clapper’s report states (as it has for years now), “We do not know if Iran will eventually decide to build nuclear weapons.” Were this decision ever to be made, Iran wouldn’t even be able to secretly start building a nuclear bomb. “[W]e assess Iran could not divert safeguarded material and produce a weapon-worth of WGU [weapons-grade uranium] before this activity is discovered,” Clapper told Congress.
  • Even Clapper, who is no stranger to alarmism, acknowledges that “Iran prefers to avoid direct confrontation with the United States” and would only act defensively “in response to perceived offenses.”  Iran’s “decision making is guided by a cost-benefit approach” based on considerations of “security, prestige and influence, as well as the international political and security environment,” Clapper said, thereby dismissing allegations that the Islamic Republic is an irrational martyr state. Speaking at a national security conference in Herzliya on Thursday, Israel’s own military intelligence chief concurred with Clapper’s assessment. While sure to continue advancing its nuclear program in the coming year, he said, Iran had not actually decided to build a bomb. Such findings are wholly consistent with past assessments.
« First ‹ Previous 521 - 540 of 688 Next › Last »
Showing 20 items per page