Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged domestic-terrorism™

Rss Feed Group items tagged

Paul Merrell

Netanyahu and Trump: A Shared Focus on Terrorism « LobeLog - 0 views

  • Scholars of terrorism credit a specific 1979 symposium in Jerusalem as a turning point in the U.S. and international usage of “terrorism” as we understand it today. The Jonathan Institute, founded following the death of Benjamin Netanyahu’s brother Yonatan during a raid to rescue hostages from a PLO hijacking, hosted a 1979 conference in Jerusalem— and a follow up in 1984 in Washington—on “International Terrorism.” Directed by Benjamin Netanyahu, the Jonathan Institute maintained close ties to the Israeli government. Current and former Israeli officials across the political spectrum—including Golda Meir, Menachem Begin, Yitzhak Rabin, Ezer Weizman, Moshe Dayan, and Shimon Peres—dominated its administrative committee. Lisa Stampnitsky, in her 2013 book Disciplining Terror, discusses how the Jonathan Institute helped internationalize Israel’s use of the term to describe terrorist violence as both irrational and illegitimate in both means and ends, and as primarily targeting democracies and “the West.” Previously, she notes, terrorism referred largely to rational political violence, either state or individual, and was dealt with as an issue of criminality and law. The shift helped Israel delegitimize the political aims of certain groups, such as the Palestinian resistance to its colonization and territorial occupation. One cannot be a “freedom fighter” if one’s political aims are demonized as illegitimate or irrational. Stampnitsky argues that the shift to using terrorism to describe violence outside the law also set the stage for retaliatory strikes (such as the 1986 U.S. air strikes in Libya in response to a bombing at a Berlin disco that killed an American soldier) and eventually for the doctrine of preemptive force that has characterized the post-9/11 “War on Terror.”
  • Israel’s role in the development of a specifically anti-Muslim discourse of terrorism is deeply intertwined with the foreign policies of American politicians. As Deepa Kumar and others have pointed out, American neocons and Israel’s Likud party jointly developed a shared language around Islamic terrorism. The 1979 Jonathan Institute conference was attended by prominent American officials and political figures, including future President George H.W. Bush and representatives of the American Enterprise Institute, the Center for Strategic and International Studies, and Commentary magazine who brought the ideas, and later a follow-up conference, back to the U.S. Intended to serve as an intervention into the international discourse on terrorism, the explicit aim of the Jerusalem conference was to awaken the Western world to the problem of terrorism as defined by the conference organizers. It contributed to entrenching in the minds of American conservatives what was popularized a few years later as the “clash of civilizations,” firmly situating Israel in the category of Western democracies threatened by Soviets and Palestinians. The follow-up conference in the United States in 1984 went further by emphasizing the relationship between Islam and terror. As Netanyahu himself wrote in the book that came out of the conference: “the battle against terrorism was part of a much larger struggle, one between the forces of civilization and the forces of barbarism.” Then, as now, Netanyahu presented Israel as the bulwark against terrorism, a specific kind of illegitimate political violence that threatens not just Israel but all democracies and the Western world.
  • Echoes of this framing of the debate on terrorism can be found in how Western politicians, including Netanyahu and Trump, discuss the issue. Terrorism, which has no single agreed-upon definition in U.S. or international law, now serves as a moniker applied to all violence that established states deem illegitimate. Most often these days, Western democracies use “terrorism” to describe violence committed by Muslims. As journalist Glenn Greenwald writes, “In other words, any violence by Muslims against the West is inherently ‘terrorism,’ even if targeted only at soldiers at war and/or designed to resist invasion and occupation.” The term functions not as a descriptive tool but an ideological one. It doesn’t merely identify a particular kind of violence. It justifies and even requires a particular kind of forceful response by the state. Israel today presents itself as the world’s expert on counterterrorism. It maintains a profitable security industry predicated on selling expertise and technology tested in its interactions with Palestinians. American tax dollars have been funneled into this industry through U.S. military aid, over 25% of which Israel was allowed to spend domestically (the new military aid deal signed by the Obama White House will phase out this allowance over the next 10 years, sending the rest of the $3.8 billion per year to U.S. defense contractors). The United States and Israel collaborate on counterterrorism initiatives, including joint military exercises and police exchange programs. Here tactics and skills are developed and exchanged for surveillance and violent repression of protests that primarily impact Muslims and people of color in the U.S. and Palestinians and Black Jews in Israel.
  • ...1 more annotation...
  • In this context, Trump’s framing of his anti-Muslim immigration policies as a national security priority to keep out terrorists is nothing new. What is new in this political moment is the extent to which the U.S. public is seeing straight through this discourse and rallying against discrimination and bigotry. Ahead of Trump and Netanyahu’s meeting this week, there’s an opportunity to pay attention to how these discourses have enabled Israel to justify decades of military occupation and human rights abuses with the discourse of national security and counterterrorism. As the Trump administration goes back to the drawing board to devise restrictive immigration policies that will hold up in court, Netanyahu and Israel’s example shouldn’t be far from mind.
Paul Merrell

Latest FBI Claim of Disrupted Terror Plot Deserves Much Scrutiny and Skepticism - The I... - 0 views

  • The Justice Department on Wednesday issued a press release trumpeting its latest success in disrupting a domestic terrorism plot, announcing that “the Joint Terrorism Task Force has arrested a Cincinnati-area man for a plot to attack the U.S. Capitol and kill government officials.” The alleged would-be terrorist is 20-year-old Christopher Cornell (above), who is unemployed, lives at home, spends most of his time playing video games in his bedroom, still addresses his mother as “Mommy” and regards his cat as his best friend; he was described as “a typical student” and “quiet but not overly reserved” by the principal of the local high school he graduated in 2012.
  • The DOJ’s press release predictably generated an avalanche of scary media headlines hailing the FBI. CNN: “FBI says plot to attack U.S. Capitol was ready to go.” MSNBC: “US terror plot foiled by FBI arrest of Ohio man.” Wall St. Journal: “Ohio Man Charged With Plotting ISIS-Inspired Attack on U.S. Capitol.”
  • Just as predictably, political officials instantly exploited the news to justify their powers of domestic surveillance. House Speaker John Boehner claimed yesterday that “the National Security Agency’s snooping powers helped stop a plot to attack the Capitol and that his colleagues need to keep that in mind as they debate whether to renew the law that allows the government to collect bulk information from its citizens.” He warned: “We live in a dangerous country, and we get reminded every week of the dangers that are out there.”  The known facts from this latest case seem to fit well within a now-familiar FBI pattern whereby the agency does not disrupt planned domestic terror attacks but rather creates them, then publicly praises itself for stopping its own plots.
  • ...2 more annotations...
  • First, they target a Muslim: not due to any evidence of intent or capability to engage in terrorism, but rather for the “radical” political views he expresses. In most cases, the Muslim targeted by the FBI is a very young (late teens, early 20s), adrift, unemployed loner who has shown no signs of mastering basic life functions, let alone carrying out a serious terror attack, and has no known involvement with actual terrorist groups. They then find another Muslim who is highly motivated to help disrupt a “terror plot”: either because they’re being paid substantial sums of money by the FBI or because (as appears to be the case here) they are charged with some unrelated crime and are desperate to please the FBI in exchange for leniency (or both). The FBI then gives the informant a detailed attack plan, and sometimes even the money and other instruments to carry it out, and the informant then shares all of that with the target. Typically, the informant also induces, lures, cajoles, and persuades the target to agree to carry out the FBI-designed plot. In some instances where the target refuses to go along, they have their informant offer huge cash inducements to the impoverished target. Once they finally get the target to agree, the FBI swoops in at the last minute, arrests the target, issues a press release praising themselves for disrupting a dangerous attack (which it conceived of, funded, and recruited the operatives for), and the DOJ and federal judges send their target to prison for years or even decades (where they are kept in special GITMO-like units). Subservient U.S. courts uphold the charges by applying such a broad and permissive interpretation of “entrapment” that it could almost never be successfully invoked. As AP noted last night, “defense arguments have repeatedly failed with judges, and the stings have led to many convictions.”
  • There are countless similar cases where the FBI triumphantly disrupts its own plots, causing people to be imprisoned as terrorists who would not and could not have acted on their own. Trevor Aaronson has comprehensively covered what amounts to the FBI’s own domestic terror network, and has reported that “nearly half [of all DOJ terrorism] prosecutions involved the use of informants, many of them incentivized by money (operatives can be paid as much as $100,000 per assignment) or the need to work off criminal or immigration violation.” He documents “49 [terrorism] defendants [who] participated in plots led by an agent provocateur—an FBI operative instigating terrorist action.” In 2012, Petra Bartosiewicz in The Nation reviewed the post-9/11 body of terrorism cases and concluded: Nearly every major post-9/11 terrorism-related prosecution has involved a sting operation, at the center of which is a government informant. In these cases, the informants — who work for money or are seeking leniency on criminal charges of their own — have crossed the line from merely observing potential criminal behavior to encouraging and assisting people to participate in plots that are largely scripted by the FBI itself. Under the FBI’s guiding hand, the informants provide the weapons, suggest the targets and even initiate the inflammatory political rhetoric that later elevates the charges to the level of terrorism.
Paul Merrell

The Stunning Hypocrisy of the U.S. Government | Washington's Blog - 0 views

  • Congress has exempted itself from the prohibition against trading on inside information … the law that got Martha Stewart and many other people thrown in jail. There are many other ways in which the hypocrisy of the politicians in D.C. is hurting our country. Washington politicians say we have to slash basic services, and yet waste hundreds of billions of dollars on counter-productive boondoggles. If the politicos just stopped throwing money at corporate welfare queens, military and security boondoggles and pork, harmful quantitative easing, unnecessary nuclear subsidies, the failed war on drugs, and other wasted and counter-productive expenses, we wouldn’t need to impose austerity on the people. The D.C. politicians said that the giant failed banks couldn’t be nationalized, because that would be socialism. Instead of temporarily nationalizing them and then spinning them off to the private sector – or breaking them up – the politicians have bailed them out to the tune of many tens of billions of dollars each year, and created a system where all of the profits are privatized, and all of the losses socialized. Obama and Congress promised help for struggling homeowners, and passed numerous bills that they claimed would rescue the little guy. But every single one of these bills actually bails out the banks … and doesn’t really help the homeowner.
  • The Federal Reserve promises to do everything possible to reduce unemployment. But its policies are actually destroying jobs. Many D.C. politicians pay lip service to helping the little guy … while pushing policies which have driven inequality to levels surpassing slave-owning societies. The D.C. regulators pretend that they are being tough on the big banks, but are actually doing everything they can to help cover up their sins. Many have pointed out Obama’s hypocrisy in slamming Bush’s spying programs … and then expanding them (millions more). And in slamming China’s cyber-warfare … while doing the same thing. And – while the Obama administration is spying on everyone in the country – it is at the same time the most secretive administration ever (background). That’s despite Obama saying he’s running the most transparent administration ever.
  • Glenn Greenwald – the Guardian reporter who broke the NSA spying revelations – has documented for many years the hypocritical use of leaks by the government to make itself look good … while throwing the book at anyone who leaks information embarrassing to the government. Greenwald notes today: Prior to Barack Obama’s inauguration, there were a grand total of three prosecutions of leakers under the Espionage Act (including the prosecution of Dan Ellsberg by the Nixon DOJ). That’s because the statute is so broad that even the US government has largely refrained from using it. But during the Obama presidency, there are now seven such prosecutions: more than double the number under all prior US presidents combined.
  • ...3 more annotations...
  • The irony is obvious: the same people who are building a ubiquitous surveillance system to spy on everyone in the world, including their own citizens, are now accusing the person who exposed it of “espionage”. It seems clear that the people who are actually bringing “injury to the United States” are those who are waging war on basic tenets of transparency and secretly constructing a mass and often illegal and unconstitutional surveillance apparatus aimed at American citizens – and those who are lying to the American people and its Congress about what they’re doing – rather than those who are devoted to informing the American people that this is being done.
  • Similarly, journalists who act as mere stenographers for the government who never criticize in more than a superficial fashion are protected and rewarded … but reporters who actually report on government misdeeds are prosecuted and harassed. Further, the biggest terrorism fearmongers themselves actually support terrorism. And see this. In the name of fighting terrorism, the U.S. has been directly supporting Al Qaeda and other terrorists and providing them arms, money and logistical support in Syria, Libya, Mali, Bosnia, Chechnya, Iran, and many other countries … both before and after 9/11. And see this. The American government has long labeled foreigners as terrorists for doing what America does. Moreover, government officials may brand Americans as potential terrorists if they peacefully protest, complain about the taste of their water, or do any number of other normal, all-American things.
  • This is especially hypocritical given that liberals like Noam Chomsky and conservatives like the director of the National Security Agency under Ronald Reagan (Lt. General William Odom) all say that the American government is the world’s largest purveyor of terrorism. As General Odom noted: Because the United States itself has a long record of supporting terrorists and using terrorist tactics, the slogans of today’s war on terrorism merely makes the United States look hypocritical to the rest of the world. These are just a couple of ways in which the D.C. politicians are hypocrites.
Paul Merrell

Top Stories - If Terrorist Attacks are on the Rise, What Does that Say about the 13-Yea... - 0 views

  • The phrase “war on terror” was first used shortly after the September 11, 2001, attacks by then-President George W. Bush. More recently, President Barack Obama declared in 2013 that he’s no longer pursuing the war on terror in favor of “a series of persistent, targeted efforts to dismantle specific networks of violent extremists that threaten America.” But regardless of whether the United States claims to be in such a war, terror attacks continue to increase. The most recent figures from the State Department show that there was a sharp increase in terror attacks worldwide in 2014 over the numbers from the previous year. According to its figures, attacks increased 35% and fatalities jumped 81% over 2013’s numbers, with the increase coming mainly in Iraq, Afghanistan and Nigeria. Part of the reason for the huge increase in fatalities was the jump in large-scale attacks, those killing more than 100 people. There were 20 such attacks in 2014, compared to two in 2013. There were a total of 13,463 terrorist attacks last year. The month of May, when fighting in Afghanistan heats up with the weather, had the most with 1,338.
  • Those aren’t the only metrics available on the war on terror, of course. Another is how much money has been spent. A report (pdf) from the Congressional Research Service (CRS) says that $1.6 trillion has gone into U.S. war efforts since 9/11. That includes “military operations, base support, weapons maintenance, training of Afghan and Iraq security forces, reconstruction, foreign aid, embassy costs, and veterans’ health care for the war operations initiated since the 9/11 attacks,” according to the report. That spending continues to grow. Those numbers don’t include money appropriated since the Consolidated Appropriations Act for fiscal year 2014. CRS’s dollar figure is stunning on its own. But the Costs of War project, a nonpartisan, nonprofit, scholarly initiative based at Brown University’s Watson Institute for International and Public Affairs, came up with even more eye-popping numbers. They put the cost of the post-9/11 fighting at $4.4 trillion. In addition to the costs of bullets and bandages, they included the interest on the money borrowed to fight the war (remember—Bush sought no tax increases to fund the fighting); the money it took out of the economy and cost Americans in increased interest; the future cost of treating and healing wounded veterans (expected to peak in 30 or 40 years at more than $1 trillion); and increased homeland security spending.
  • Interest payments on the money borrowed to pay for the war on terror will continue far into the future and are expected to be astronomical as well: $1 trillion by 2023, or more than $7 trillion by 2053. The Costs of War also looked at what the war on terror cost in terms of lost opportunities; that is, what the money could have been spent on instead of the military, such as domestic infrastructure and non-military job creation.
  • ...1 more annotation...
  • The phrase “war on terror” was first used shortly after the September 11, 2001, attacks by then-President George W. Bush. More recently, President Barack Obama declared in 2013 that he’s no longer pursuing the war on terror in favor of “a series of persistent, targeted efforts to dismantle specific networks of violent extremists that threaten America.” But regardless of whether the United States claims to be in such a war, terror attacks continue to increase.
  •  
    Yes, Virginia. We have lost the War on Terror and the piper must be paid. 
Paul Merrell

FBI Celebrates Duping Another Mentally Ill Man Into Fake Terror Plot - 0 views

  • Following a series of similar widely ridiculed so-called “sting” operations, the Federal Bureau of Investigation announced last week that it had foiled yet another “terror plot” that, like virtually every supposed “terrorist” case in recent years, was created and managed from start to finish by the FBI itself. This time, the dupe was a 28-year-old California man, Matthew Aaron Llaneza, with a documented history of mental illness, who apparently believed his government handlers were helping him wage “jihad.” Critics, however, say the whole scheme smacks of entrapment and a waste of taxpayer money. Llaneza was arrested by federal agents on February 7 in Oakland after he supposedly tried to blow up a bogus bomb the FBI helped him create. According to authorities, the mentally ill San Jose suspect planned to detonate the fake explosives outside a Bank of America branch. The alleged plan, officials said, was to start a “civil war” by making it appear as if the attack had been carried out by “anti-government militias,” sparking a crackdown by the government on right-of-center dissidents.       “Unbeknownst to Llaneza, the explosive device that he allegedly attempted to use had been rendered inoperable by law enforcement and posed no threat to the public,” the FBI admitted in a press release celebrating the arrest of its mentally unstable stooge. The man was charged in a criminal complaint with “attempted use of a weapon of mass destruction against property used in an activity that affects interstate or foreign commerce.” If convicted, he could face life in prison.
  • According to the government’s court filings, the mentally ill man met with an undercover FBI agent late last year under mysterious circumstances. The federal official somehow managed to convince the naïve dupe that he was connected to the “Taliban and the mujahidin in Afghanistan” — Islamist forces that were originally armed and trained by the U.S. government before becoming official enemies. From there, federal handlers worked with the man to develop the half-baked plot and the fake bomb to blow something up.  
  •  
    The trend continues. Still no Terrorist™ criminal charges brought against anyone by the FBI other than alleged 9/11 participants that the FBI did not incite to commit an act of Terrorism™; i.e., no real Terrorist™ threat resulting in criminal charges. Hard to justify continuation of all that funding the FBI gets for chasing domestic Terrorists™ if there aren't any, so the FBI continues to manufacture them in sting operations. Not to mention that the whole War on Terror™ government propaganda campaign would fall apart and the TSA would have to stop forcing air passengers to choose between being groped or viewed naked in those nifty body scanners. Heaven forbid that we might begin restoring civil rights and spending those trillions of dollars on the War on Terror™. No! No! We must maintain Cold War military spending as a percentage of GDP or we'd be flooded with unemployed military veterans and former government contractor workers. We only start wars to defend the U.S., not to enrich military contractors, seize natural resources from those that own or control them, enable the banksters to siphon more from a bigger bucket, or  expand the Globalist Empire. We are America! We are the good guys. Our motives for waging the War on Terror™ are entirely altruistic. Ditto for our professional politicians.   Not.     
Paul Merrell

Defending Dissent » New Docs Show Army Coordinated Spy Ring - 1 views

  • Army illegally supplied  intelligence on nonviolent antiwar protesters to FBI and police in multiple states Tacoma, WA – Recently obtained public records confirm an Army-led, multi-agency spy network that targeted “leftists/anarchists” as domestic terrorists. The Army used illegal infiltration to gather information on nonviolent antiwar protesters, disseminate it to the FBI and police departments in multiple states, and in some cases used it to disrupt planned protests by preemptively and falsely arresting activists. Public records obtained last month by Olympia activist Paul French reveal new evidence in the widely-watched Army spying case Panagacos v. Towery. An email from November 2007, in particular, shows that intelligence analyst John J. Towery was paid by the Army to infiltrate political groups and share unlawfully obtained intelligence with a growing network of law enforcement agencies, including the FBI, and police departments in Los Angeles, Portland, Eugene, Everett, and Spokane. The Towery email not only represents a broader spying program than previously thought, it also confirms the program was led by the Army, a fact contradicted by Towery’s 2009 sworn statements.
  • “The latest revelations show how the Army not only engaged in illegal spying on political dissidents, it led the charge and tried to expand the counterintelligence network targeting leftists and anarchists,” said Larry Hildes, a National Lawyers Guild attorney who filed the Panagacos lawsuit in 2010. “By targeting activists without probable cause, based on their ideology and the perceived political threat they represent, the Army clearly broke the law and must be held accountable.” Previously obtained public records indicate that absent such accountability, the Army will continue to spy on and target protesters, which it did until at least 2010, long after Towery’s identity was exposed. Public records previously obtained in 2009 already established that over a two-year period beginning in 2006, Towery (under the alias “John Jacob”) spied on the Olympia antiwar group Port Militarization Resistance (PMR) as well as several other organizations, including Students for a Democratic Society, the Industrial Workers of the World, and Iraq Veterans Against the War. It has also already been established that Towery’s intelligence was passed on to the Washington State Fusion Center, a communications hub of  local, state and federal law enforcement, and then used by local police to target activists for repeated harassment, preemptive and false arrest, excessive use of force, and malicious prosecution
  • The recently disclosed Towery email was a follow-up to a 2007 Domestic Terrorism Conference he attended in Spokane, during which “domestic terrorist” dossiers on some of the Panagacos plaintiffs were distributed. The Towery email shows the development of a multi-agency spying apparatus in intimate detail. “I thought it would be a good idea to develop a leftist/anarchist mini-group for intel sharing and distro,” wrote the Army analyst to several law enforcement officials. Towery references books, “zines and pamphlets,” and a “comprehensive web list” as source material, but cautions the officials on file sharing “because it might tip off groups that we are studying their techniques, tactics and procedures.” Towery, who worked at Joint Base Lewis-McChord, not only coordinated his actions with local, state and federal law enforcement agencies, many of whom are named defendants in the Panagacos case, he also admitted to eavesdropping on a confidential, privileged attorney-client email listserv of criminal defendants and their legal counsel. Such conduct is considered a constitutional violation, but Towery also took sensitive information from the listserv vital to a pending criminal trial in 2007 and passed it on to fusion center officials who then transmitted it to prosecutors, forcing a mistrial in a case the defense was winning handily. The case was later dismissed for prosecutorial misconduct.
  • ...2 more annotations...
  • The public records disclosure comes as government spying and criticism of the National Security Agency’s surveillance program has reached a fever pitch. However, a little-known and rarely, if ever, enforced law from 1878 distinguishes the spying under Panagacos from that of the NSA. The Posse Comitatus Act prohibits the military from enforcing domestic laws on U.S. soil by making such actions a Gross Misdemeanor, yet to-date no official has been prosecuted under the Act. Instead of conceding to the violations, the Army is currently using the Panagacos case to try to seal nearly 10,000 pages of documents, many of which are incriminating and embarrassing to the government. The legal effort to unseal those documents will play out over the next few weeks. The Obama Administration tried to dismiss the Panagacos lawsuit, but in a Ninth Circuit decision from December 2012 the court rejected the government’s arguments, ruling that allegations of First and Fourth Amendment violations were “plausible,” and ordered the case to proceed to trial. The lawsuit was filed on behalf of seven PMR members who sought to oppose the wars in Iraq and Afghanistan through nonviolent civil disobedience and is being heard by U.S. District Court Judge Ronald B. Leighton. In addition to Towery, named defendants in Panagacos include Thomas Rudd, one of Towery’s superiors at Joint Base Lewis-McChord, the U.S. Army, Navy, and Coast Guard, as well as certain officials within its ranks, the City of Olympia and its police department, the City of Tacoma and its police department, Pierce County, and various personnel from those jurisdictions.
  • Panagacos v. Towery is currently in the discovery stage and is scheduled to go to trial in June 2014. Further information: Recently disclosed Towery email Panagacos lawsuit complaint Domestic terrorism dossiers on plaintiffs
  •  
    One I had missed from February, 2014. I believe I had bookmarked something about this before the lawsuit was filed. Now not only has the case been filed but the alleged grounds for the lawsuit have been greenlighted by the 9th U.S. Circuit Court of Appeals. If you click through the link to the court's opinion, you'll find one of the Ninth Circuit's shorter opinions, less than five pages, which does not even mention that the defendants were employed by the U.S. Army or any branch of government, while still rejecting their claim of government officials' qualified immunity from suit for the alleged First and Fourth Amendment violations. The third amended complaint sufficiently alleged facts to support claims that had been clearly established as violative of the First and Fourth Amendments.   It's clear that the plaintiffs have smoking gun evidence and that the National Lawyers' Guild is all over this one. Trial is scheduled next month, according to the article. It's just under 300 miles from here to Seattle, but I just might make the trip to watch a few days of this trial. Strong First Amendment cases for damages that survive appellate review of the qualified immunity nearly always settle before trial. But this one smells like it is going to trial for publicity purposes even if not for the vindication of rights, considering the nature of the organizations involved both as targets of the surveillance and their lawyers. It's great entertainment watching government guys and gals squirm on the witness stand when they've been caught violating civil rights. In criminal cases, invoking the Fifth Amendment right against self-incrimination cannot be taken as evidence of guilt. But in a federal civil rights case, that entitles the plaintiffs to have the jury instructed that it can infer liability from the resort to the Fifth Amendment to refuse answering questions.  Better back in the day when I was the lawyer asking the questions. But it's still great fun just to watch
Paul Merrell

Tomgram: Shamsi and Harwood, An Electronic Archipelago of Domestic Surveillance | TomDi... - 0 views

  • Uncle Sam’s Databases of Suspicion A Shadow Form of National ID
  • We do know that the nation’s domestic-intelligence network is massive, including at least 59 federal agencies, over 300 Defense Department units, and approximately 78 state-based fusion centers, as well as the multitude of law enforcement agencies they serve. We also know that local law enforcement agencies have themselves raised concerns about the system’s lack of privacy protections.
  • The SAR database is part of an ever-expanding domestic surveillance system established after 9/11 to gather intelligence on potential terrorism threats. At an abstract level, such a system may seem sensible: far better to prevent terrorism before it happens than to investigate and prosecute after a tragedy. Based on that reasoning, the government exhorts Americans to “see something, say something” -- the SAR program’s slogan. Indeed, just this week at a conference in New York City, FBI Director James Comey asked the public to report any suspicions they have to authorities. “When the hair on the back of your neck stands, listen to that instinct and just tell somebody,” said Comey. And seeking to reassure those who do not want to get their fellow Americans in trouble based on instinct alone, the FBI director added, “We investigate in secret for a very good reason, we don't want to smear innocent people.”
  • ...15 more annotations...
  • At a fundamental level, suspicious activity reporting, as well as the digital and physical infrastructure of networked computer servers and fusion centers built around it, depends on what the government defines as suspicious.  As it happens, this turns out to include innocuous, First Amendment-protected behavior. As a start, a little history: the Nationwide Suspicious Activity Reporting Initiative was established in 2008 as a way for federal agencies, law enforcement, and the public to report and share potential terrorism-related information. The federal government then developed a list of 16 behaviors that it considered “reasonably indicative of criminal activity associated with terrorism.” Nine of those 16 behaviors, as the government acknowledges, could have nothing to do with criminal activity and are constitutionally protected, including snapping photographs, taking notes, and “observation through binoculars.”
  • There are any number of problems with this approach, starting with its premise.  Predicting who exactly is a future threat before a person has done anything wrong is a perilous undertaking. That’s especially the case if the public is encouraged to report suspicions of neighbors, colleagues, and community members based on a “hair-on-the-back-of-your-neck” threshold. Nor is it any comfort that the FBI promises to protect the innocent by investigating “suspicious” people in secret. The civil liberties and privacy implications are, in fact, truly hair-raising, particularly when the Bureau engages in abusive and discriminatory sting operations and other rights violations.
  • A few months later, a scathing report from the Senate subcommittee on homeland security described similar intelligence problems in state-based fusion centers. It found that Department of Homeland Security (DHS) personnel assigned to the centers “forwarded ‘intelligence’ of uneven quality -- oftentimes shoddy, rarely timely, sometimes endangering citizens’ civil liberties and Privacy Act protections... and more often than not unrelated to terrorism.”
  • Law enforcement officials, including the Los Angeles Police Department’s top counterterrorism officer, have themselves exhibited skepticism about suspicious activity reporting (out of concern with the possibility of overloading the system). In 2012, George Washington University’s Homeland Security Policy Institute surveyed counterterrorism personnel working in fusion centers and in a report generally accepting of SARs noted that the program had “flooded fusion centers, law enforcement, and other security outfits with white noise,” complicating “the intelligence process” and distorting “resource allocation and deployment decisions.” In other words, it was wasting time and sending personnel off on wild goose chases.
  • Under federal regulations, the government can only collect and maintain criminal intelligence information on an individual if there is a “reasonable suspicion” that he or she is “involved in criminal conduct or activity and the information is relevant to that criminal conduct or activity.” The SAR program officially lowered that bar significantly, violating the federal government’s own guidelines for maintaining a “criminal intelligence system.” There’s good reason for, at a minimum, using a reasonable suspicion standard. Anything less and it’s garbage in, garbage out, meaning counterterrorism “intelligence” databases become anything but intelligent.
  • yet another burgeoning secret database that the federal government calls its “consolidated terrorism watchlist.” Inclusion in this database -- and on government blacklists that are generated from it -- can bring more severe repercussions than unwarranted law enforcement attention. It can devastate lives.
  • There is hope, however. In August, four years after the ACLU filed a lawsuit on behalf of 13 people on the no-fly list, a judge ruled that the government’s redress system is unconstitutional. In early October, the government notified Mashal and six others that they were no longer on the list. Six of the ACLU’s clients remain unable to fly, but at least the government now has to disclose just why they have been put in that category, so that they can contest their blacklisting. Soon, others should have the same opportunity.
  • As of August 2013, there were approximately 47,000 people, including 800 U.S. citizens and legal permanent residents like Mashal, on that secretive no-fly list, all branded as “known or suspected terrorists.” All were barred from flying to, from, or over the United States without ever being given a reason why. On 9/11, just 16 names had been on the predecessor “no transport” list. The resulting increase of 293,650% -- perhaps more since 2013 -- isn’t an accurate gauge of danger, especially given that names are added to the list based on vague, broad, and error-prone standards.
  • The No Fly List is only the best known of the government’s web of terrorism watchlists. Many more exist, derived from the same master list.  Currently, there are more than one million names in the Terrorist Identities Datamart Environment, a database maintained by the National Counterterrorism Center. This classified source feeds the Terrorist Screening Database (TSDB), operated by the FBI’s Terrorist Screening Center. The TSDB is an unclassified but still secret list known as the “master watchlist.” containing what the government describes as “known or suspected terrorists,” or KSTs.
  • Nothing encapsulates the post-9/11, Alice-in-Wonderland inversion of American notions of due process more strikingly than this “blacklist first, innocence later... maybe” mindset. The Terrorist Screening Database is then used to fill other lists. In the context of aviation, this means the no-fly list, as well as the selectee and expanded selectee lists. Transportation security agents subject travelers on the latter two lists to extra screenings, which can include prolonged and invasive interrogation and searches of laptops, phones, and other electronic devices. Around the border, there’s the State Department’s Consular Lookout and Support System, which it uses to flag people it thinks shouldn’t get a visa, and the TECS System, which Customs and Border Protection uses to determine whether someone can enter the country.
  • According to documents recently leaked to the Intercept, as of August 2013 that master watchlist contained 680,000 people, including 5,000 U.S. citizens and legal permanent residents. The government can add people’s names to it according to a shaky “reasonable suspicion” standard. There is, however, growing evidence that what’s “reasonable” to the government may only remotely resemble what that word means in everyday usage. Information from a single source, even an uncorroborated Facebook post, can allow a government agent to watchlist an individual with virtually no outside scrutiny. Perhaps that’s why 40% of those on the master watchlist have “no recognized terrorist group affiliation,” according to the government’s own records.
  • This opens up the possibility of increased surveillance and tense encounters with the police, not to speak of outright harassment, for a large but undivulged number of people. When a police officer stops a person for a driving infraction, for instance, information about his or her KST status will pop up as soon a driver’s license is checked.  According to FBI documents, police officers who get a KST hit are warned to “approach with caution” and “ask probing questions.” When officers believe they’re about to go face to face with a terrorist, bad things can happen. It’s hardly a stretch of the imagination, particularly after a summer of police shootings of unarmed men, to suspect that an officer approaching a driver whom he believes to be a terrorist will be quicker to go for his gun. Meanwhile, the watchlisted person may never even know why his encounters with police have taken such a peculiar and menacing turn. According to the FBI's instructions, under no circumstances is a cop to tell a suspect that he or she is on a watchlist.
  • Inside the United States, no watchlist may be as consequential as the one that goes by the moniker of the Known or Appropriately Suspected Terrorist File. The names on this blacklist are shared with more than 17,000 state, local, and tribal police departments nationwide through the FBI’s National Crime Information Center (NCIC). Unlike any other information disseminated through the NCIC, the KST File reflects mere suspicion of involvement with criminal activity, so law enforcement personnel across the country are given access to a database of people who have secretly been labeled terrorism suspects with little or no actual evidence, based on virtually meaningless criteria.
  • And once someone is on this watchlist, good luck getting off it. According to the government’s watchlist rulebook, even a jury can’t help you. “An individual who is acquitted or against whom charges are dismissed for a crime related to terrorism,” it reads, “may nevertheless meet the reasonable standard and appropriately remain on, or be nominated to, the Terrorist Watchlist.” No matter the verdict, suspicion lasts forever.
  • The SARs program and the consolidated terrorism watchlist are just two domestic government databases of suspicion. Many more exist. Taken together, they should be seen as a new form of national ID for a growing group of people accused of no crime, who may have done nothing wrong, but are nevertheless secretly labeled by the government as suspicious or worse. Innocent until proven guilty has been replaced with suspicious until determined otherwise. Think of it as a new shadow system of national identification for a shadow government that is increasingly averse to operating in the light. It’s an ID its “owners” don’t carry around with them, yet it’s imposed on them whenever they interact with government agents or agencies. It can alter their lives in disastrous ways, often without their knowledge. And they could be you. If this sounds dystopian, that’s because it is.
Paul Merrell

Why Does the FBI Have to Manufacture its Own Plots if Terrorism and ISIS Are Such Grave... - 0 views

  • The FBI and major media outlets yesterday trumpeted the agency’s latest counterterrorism triumph: the arrest of three Brooklyn men, ages 19 to 30, on charges of conspiring to travel to Syria to fight for ISIS (photo of joint FBI/NYPD press conference, above). As my colleague Murtaza Hussain ably documents, “it appears that none of the three men was in any condition to travel or support the Islamic State, without help from the FBI informant.” One of the frightening terrorist villains told the FBI informant that, beyond having no money, he had encountered a significant problem in following through on the FBI’s plot: his mom had taken away his passport. Noting the bizarre and unhinged ranting of one of the suspects, Hussain noted on Twitter that this case “sounds like another victory for the FBI over the mentally ill.” In this regard, this latest arrest appears to be quite similar to the overwhelming majority of terrorism arrests the FBI has proudly touted over the last decade. As my colleague Andrew Fishman and I wrote last month — after the FBI manipulated a 20-year-old loner who lived with his parents into allegedly agreeing to join an FBI-created plot to attack the Capitol — these cases follow a very clear pattern
  • Once again, we should all pause for a moment to thank the brave men and women of the FBI for saving us from their own terror plots.
  • We’re constantly bombarded with dire warnings about the grave threat of home-grown terrorists, “lone wolf” extremists and ISIS. So intensified are these official warnings that The New York Times earlier this month cited anonymous U.S. intelligence officials to warn of the growing ISIS threat and announce “the prospect of a new global war on terror.” But how serious of a threat can all of this be, at least domestically, if the FBI continually has to resort to manufacturing its own plots by trolling the Internet in search of young drifters and/or the mentally ill whom they target, recruit and then manipulate into joining? Does that not, by itself, demonstrate how over-hyped and insubstantial this “threat” actually is? Shouldn’t there be actual plots, ones that are created and fueled without the help of the FBI, that the agency should devote its massive resources to stopping? This FBI tactic would be akin to having the Drug Enforcement Agency (DEA) constantly warn of the severe threat posed by drug addiction while it simultaneously uses pushers on its payroll to deliberately get people hooked on drugs so that they can arrest the addicts they’ve created and thus justify their own warnings and budgets (and that kind of threat-creation, just by the way, is not all that far off from what the other federal law enforcement agencies, like the FBI, are actually doing). As we noted the last time we wrote about this, the Justice Department is aggressively pressuring U.S. allies to employ these same entrapment tactics in order to create their own terrorists, who can then be paraded around as proof of the grave threat.
  • ...1 more annotation...
  • UPDATE: The ACLU of Massachusetts’s Kade Crockford notes this extraordinarily revealing quote from former FBI assistant director Thomas Fuentes, as he defends one of the worst FBI terror “sting” operations of all (the Cromitie prosecution we describe at length here): If you’re submitting budget proposals for a law enforcement agency, for an intelligence agency, you’re not going to submit the proposal that “We won the war on terror and everything’s great,” cuz the first thing that’s gonna happen is your budget’s gonna be cut in half. You know, it’s my opposite of Jesse Jackson’s ‘Keep Hope Alive’—it’s ‘Keep Fear Alive.’ Keep it alive. That is the FBI’s terrorism strategy — keep fear alive — and it drives everything they do.
Paul Merrell

The Legend of the Phoenix - 0 views

  • It would seem the CIA has gone back into their archives, blown the dust off the Phoenix Program, and put it into play again as the “Drone War.” The similarities with the Drone War are readily evident to anyone old enough to know of the Phoenix Program. For those who aren’t old enough or who have forgotten, the Phoenix Program is usually referred to as an assassination program and was the subject of investigation by the Senate’s “Church Committee.” Indisputably, thousands of South Vietnamese civilians were killed under this CIA directed program.
  • Phoenix was far more than a mere assassination program , however. It was a Counter-Insurgency, COIN, program, using the tactic of counter-terrorism, including assassination, against the insurgent’s so-called infrastructure. This was the Vietnamese civilian population in which the insurgent, the Viet Cong guerilla, operated and from some of whom they drew their support. To the U.S., these civilians were the Viet Cong Infrastructure, the VCI. And the VCI was the target to be terrorized by any means necessary in the hope that they would turn against the Viet Cong. The VCI would have included the families, close and extended kinship groups, of alleged active Viet Cong combatants, fellow villagers, and other Vietnamese civilians who were not actively opposed to the Viet Cong. Some of this “support” was voluntary and some coerced. As the Phoenix Program went on, with its assassinations, torture practices, and “disappearances,” more support became voluntary as Vietnamese peasants turned against the U.S. and the South Vietnamese government as a result of the program. An error in identification of a victim was irrelevant to those in control of the program, the CIA, as it still served the purpose of terrorizing the civilian population, which was the true purpose of the program.
  • For the Viet Cong, this was a classic example of achieving the guerilla’s goal of having a civilian population turn against a government by a government’s own harsh over-reaction to the guerilla threat. Today, a guerilla and the people whom they are amongst are deemed “terrorists” if they find themselves on the wrong side of a domestic conflict that the U.S. has taken a side in, such as Yemen. As we saw in Libya, and see in Syria, these guerillas can become instant U.S. allies who must be supported, if, or when, the U.S. makes policy changes. But unless those U.S. policy changes occur, these groups remain part of the global terrorist network of “associated forces” with al Qaeda, in the eyes of CIA and military officials, and targeted with drones. From the relatively large number of civilian victims of drone attacks as claimed by residents of Pakistan’s Federally Administered Tribal Areas (FATA) and the political party, Pakistan Tehreek Insaf (PTI), this Drone Program has all the hallmarks of the Phoenix Program.
  • ...1 more annotation...
  • Without more transparency by the government, no other conclusion can be drawn that the reason we see so many civilians killed by drones, while denying it as John Brennan did, is because we are targeting civilians as the “infrastructure.” While Anwar al-Awlaki was declared to be an “operational leader,” with the extremely elastic category of “infrastructure” as used in Vietnam, his “operational” activity may have only been “spreading antigovernment propaganda and rumors,” as the Rand Corporation put it, which led to his extrajudicial execution. How many other American citizens might that reach?
  •  
    Spot on analysis by a retired Navy lawyer who knows his U.S. military history.The striking parallels he points to between contemporary U.S. drone terrorism and the notorious Viet Nam War Phoenix Program terrorism are no accident. Among the super-hawks of the War Party, there has been a persistent meme that the U.S. military suffered no defeat in Viet Nam, that the vaunted "counter-insurgency" strategy and tactics were working, and that the war was lost by politicians and the American public who lost the nerve to continue the war.  If you put your blinders on firmly enough to pretend that the North and South Vietnamese were separate people, there's an element of truth to that myth. The South Vietnamese Viet Cong guerrillas were decimated by 1970. But the North and South Vietnamese were in fact one people of a single nation, who had united to defeat and evict the French military force. The division into two nations was to have been only a one-year thing, prelude to national election of a government for a reunited Viet Nam. It was the U.S. puppet government of the South that, realizing they could not win the election, reneged on allowing it in the South.  Long before the Viet Cong became a shadow of its former force, the Vietnamese from the North had responded to the betrayal of the treaty by sending North Vietnamese regular army troops ("NVA") to the South, spearheaded by the same battle-hardened men who had defeated the French. And the U.S. military was well and truly overwhelmed by the NVA's strategy and tactics, forced to retreat into strongholds from which they ventured only in force. The NVA's Tet Offensive in 1968 failed to succeed in the effort to capture multiple Vietnamese cities concurrently. But the number, weaponry, and power of their force caused Lyndon Johnson to realize that the U.S. generals had been lying to him, that the U.S. was not on the brink of victory, and that there was a very long slog ahead with an unknown outcome if the U.S. continu
Paul Merrell

Turkish-Uyghur Terror Inc. - America's Other Al Qaeda | nsnbc international - 0 views

  • Because it relatively poorly understood and under-reported in comparison to other more notorious terrorist groups, the Turkish-Uyghur terror network is perhaps more dangerous and of greater utility to the United States and its allies presently versus their increasingly exposed Al Qaeda legions. The genesis of modern Turkish-sponsored terrorism, like Al Qaeda, also originates from the Cold War. Part of the wider stay-behind networks known as “Gladios” created by NATO to allegedly fight Soviet forces in the event of a Soviet invasion and occupation of Western Europe, these terrorist groups were instead turned against the population of NATO member states and engaged in violence, terrorism, mass murder, and assassinations. A group of ultra-nationalists known as the “Grey Wolves” would be cultivated for this task within Turkey. In a 1998 LA Times article titled, “Turkish Dirty War Revealed, but Papal Shooting Still Obscured,” it would be reported that (emphasis added):
  • In the late 1970s, armed bands of Gray Wolves launched a wave of bomb attacks and shootings that killed hundreds of people, including public officials, journalists, students, lawyers, labor organizers, left-wing activists and ethnic Kurds. During this period, the Gray Wolves operated with encouragement and protection of the Counter-Guerrilla Organization, a section of the Turkish Army’s Special Warfare Department. Working out of the U.S. Military Aid Mission building in Ankara, the Special Warfare Department received funds and training from U.S. advisors to establish “stay behind” squads of civilian irregulars who were set up to engage in acts of sabotage and resistance in the event of a Soviet invasion. Similar Cold War counter-guerrilla units were created in every member state of the North Atlantic Treaty Organization. But instead of preparing for foreign enemies, these operatives often set their sights on domestic targets. Another LA Times piece titled, “Turkey’s Gray Wolves Nip at Heels of Power,” would reveal the extent of the Grey Wolves reign of terror (emphasis added): At the height of the Cold War, the army used the Gray Wolves as a violent counterweight to Turkish Communists. The party’s coffers swelled with secret contributions from the government.  By the late 1970s, the Gray Wolves had spun out of state control. Their paramilitary wing fought a campaign against leftist rivals that killed nearly 6,000 people. Ali Agca, who shot Pope John Paul II in a 1981 assassination attempt, is alleged to have been affiliated with the party.
  • The article would also reveal that despite this horrific past, the Grey Wolves and their political allies were still a very potent political force in Turkey. Today, the Grey Wolves function as a paramilitary wing of the Nationalist Movement Party (MHP), which holds the third largest number of seats in Turkey’s parliament. As troubling as this should be to Turks who may find themselves on the receiving end of a politically powerful terrorist organization apparently tolerated, even sponsored by NATO for decades and in particular, supported by the United States, the Grey Wolves’ terrorism has branched out far beyond Turkey’s borders. NATO Gladio Goes Global  According to a 2009 New American Media report titled, “Behind the China Riots — Oil, Terrorism & ‘Grey Wolves’,” Turkey’s Grey Wolves have established militant training camps as far as China’s western Xinjiang region, helping produce violent terrorists who have carried out a series of deadly attacks across China. The report would state (emphasis added):
  • ...4 more annotations...
  • Enter the Grey Wolves, one of the world’s most notorious terrorist organizations. Founded in the 1960s, the Wolves are a pan-Turkic paramilitary group with 1 million followers across the Near East, Central Asia and inside Xinjiang. During the decade of political violence in Turkey in the 1980s, the military-backed activists launched a wave of assassinations, massacres of ethnic minorities, and extortions of businesses. By official count, the Turkish government holds the Wolves responsible for more than 600 murders, while leftists estimate the victims numbered in the many thousands.  Following the collapse of the Soviet Union, the Grey Wolves set up training camps in Central Asia for youths from Turkic language groups, including Uighur. Their indoctrination program embraces the goal of establishing Turan, a Turkish empire across Euro-Asia, subjugating non-Turkish races and unleashing violence to achieve their ends. Out of the limelight, the Wolves provided commando training and material support for the East Turkestan Independence Movement. In essence, NATO’s stay-behind networks had become NATO’s “go-abroad” networks, projecting the same sort of violence, terrorism, and political coercion abroad after the Cold War that these networks carried out domestically during the Cold War.
  • The alleged “struggle” by the Uyghur people in Xinjiang, referred to by the terrorists and their foreign sponsors as “East Turkistan,” consists of two essential components – a foreign harbored political front including the Washington D.C. and Munich-based World Uyghur Congress (WUC) and a militant front clearly backed by the US and NATO through intermediary groups like Turkey’s Grey Wolves. Like the Grey Wolves, the World Uyghur Congress is a creation and perpetuation of Western special interests. WUC is directly funded by the US State Department via the National Endowment for Democracy (NED) over a quarter of a million dollars (on record) a year. The NED admittedly organizes and underwrites all of WUC’s events, and their annual meetings usually feature almost exclusively US representatives reaffirming their commitment to support WUC’s objectives
  • Looking at a map of China it is clear that this campaign of separatism directly serves the long-standing plans of the United States to encircle and contain China’s rise – a campaign that has been openly and repeated outlined in US policy papers for decades – the most recent of which was published by the Council on Foreign Relations (CFR) and was titled, “Revising U.S. Grand Strategy Toward China.” It states in no uncertain terms: Because the American effort to ‘integrate’ China into the liberal international order has now generated new threats to U.S. primacy in Asia—and could result in a consequential challenge to American power globally—Washington needs a new grand strategy toward China that centers on balancing the rise of Chinese power rather than continuing to assist its ascendancy. Encouraging separatism in China’s western Xinjiang region, if successful, would carve off a substantial amount of territory. In conjunction with US-backed separatism in China’s Tibet region, an immense buffer region stands to be created that would virtually isolate China from Central Asia. And while the Grey Wolves and their Uyghur proxies are working hard to create this barrier to China’s west, with their involvement in a recent bombing in Bangkok, it appears the US is now using them to augment efforts to create a similar encirclement across Southeast Asia.
  • The Turkish-Uyghur terror network, in addition to fomenting violence across China, has more recently been trafficking terrorists from Xinjiang, through Southeast Asia, and onward to Turkey where they are staged, armed, trained, and then sent to fight NATO’s proxy war in Syria. This trafficking network apparently snaked its way through Thailand – exposed when Thailand detained over 100 Uyghurs which it then deported upon Beijing’s request back to China in July. On the same day the deportations occurred WUC and NATO’s Grey Wolves organized violent protests in Turkey both in Ankara and at the Thai consulate in Istanbul during which the consulate was invaded and destroyed. A month later, a devastating bomb would detonate in the heart of Bangkok, killing 20 mostly Chinese tourists and injuring over 100 more. In addition to the BBC already being on site before the blast, the British network would conclude even before bodies were cleared from the site that Uyghurs were likely behind the blast. This was done specifically to deflect blame from another US proxy, Thaksin Shinawatra, who has been attempting for years to regain power in Thailand. In reality, Shinawatra and the Uyghur terrorists are both functions of the same Westesrn agenda to encircle and contain China by building up a “wall” of proxy states around Beijing, and if nothing else, to create chaos in which Beijing finds it nearly impossible to prosper.
Paul Merrell

DoJ Creates Special Dept to Deal with Growing Domestic Extremism Threat | nsnbc interna... - 0 views

  • John Carlin, Department of Justice assistant attorney general and head of the national security division, spoke at George Washington University (GWU) about concerns over mounting threats posed by violent extremists within the US which has prompted the creation of a special counsel position to deal with these issues.
  • Carlin told the audience that “the domestic terrorism counsel would not only help oversee the prosecution of cases but also would develop plans to intervene when the threat of violence is imminent.” The DoJ expressed concern over the “staggeringly broad” threat to national security posed by domestic extremists “motivated by anti-government animus, eco-radicalism and racism have created a new urgency for federal and local law enforcement authorities.” Carlin said: “No single ideology governs hate and extremism. Nevertheless, we see commonalities among those who wish to do us harm. This gives us important information as we shape our deterrence and disruption strategies. Across the spectrum of extremist ideologies, two related traits emerge: first, the prevalence of lone offender attacks that do not require a terrorist network; and second, the increasing number of disaffected people inspired to violence who communicate their hate-filled views over the Internet and through social media.’’
  • The deputy attorney general said: “White supremacists represent the most violent. The Charleston shooter, who had a manifesto laying out a racist worldview, is just one example. His actions followed earlier deadly shooting sprees by white supremacists in Kansas, Wisconsin and elsewhere.’’ Along with white supremacists, Carlin said: “Adherents to the sovereign citizen ideology believe they don’t have to answer to any government authority, including courts, taxing entities or law enforcement. And although most sovereign citizens peacefully espouse these views, some sovereign citizen extremists resort to violence.’’ Foundational concerns about domestic terrorism can be found in the 2010 report Rightwing Extremism, wherein domestic extremists, particularly white supremacists, were proposed to be the newest and most dangerous threat to the US since al-Qaeda.
  •  
    To get a glimmer of just how ridiculous this DoJ initiative is, skim http://www.washingtonsblog.com/2014/08/youre-nine-times-likely-killed-police-officer-terrorist.html Talk about misplaced priorities. 
Paul Merrell

Paris Shooters Just Returned from NATO's Proxy War in Syria | nsnbc international - 0 views

  • In an all too familiar pattern and as predicted, the shooters involved in the attack in Paris Wednesday, January 7, 2015, were French citizens, radicalized in Europe and exported to Syria to fight in NATO’s proxy war against the government in Damascus, then brought back where they have now carried out a domestic attack. Additionally, as have been many other domestic attacks, the suspects were long under the watch of Western intelligence services, with at least one suspect having already been arrested on terrorism charges.
  • USA Today would report in an article titled, “Manhunt continues for two French terror suspects,” that: The suspects are two brothers — Said, 34, and Cherif Kouachi, 32, both French nationals — and Hamyd Mourad, 18, whose nationality wasn’t known, a Paris police official told the Associated Press. He spoke on condition of anonymity because he was not authorized to speak publicly. USA Today would also report (emphasis added): The brothers were born in Paris of Algerian descent. Cherif was sentenced to three years in prison on terrorism charges in May 2008. Both brothers returned from Syria this summer.
  • As with any false flag attack engineered by a government for the purpose of manipulating public perception and pushing through otherwise unjustifiable policy both foreign and domestic, a series of canards are erected to distract the public from the true nature of the attack. In the recent attack in Paris, France, the canards of “free speech,” “condemning radical Islam,” “tolerance,” and “extremism” have all taken center stage, displacing the fact that the terrorists who carried out the attack were long on the leash not of “Islamic extremists” but Western intelligence agencies, fighting in a Western proxy war, as a member of a well-funded, armed, and trained mercenary force that has, on record since as early as 2007, been an essential component of Western foreign policy. Indeed, Al Qaeda and its various rebrandings are not the creation of “Islamic extremism,” but rather Western foreign policy using “extremism” as part of indoctrinating the rank and file, but directed by and solely for the purpose of serving an entirely Western agenda.
  • ...3 more annotations...
  • The implications of yet another case of Western-radicalized terrorists, first exported to fight NATO’s proxy war in Syria, then imported and well-known to Western intelligence agencies, being able to carry out a highly organized, well-executed attack, is that the attack itself was sanctioned and engineered by Western intelligence agencies themselves,. This mirrors almost verbatim the type of operations NATO intelligence carried out during the Cold War with similar networks of radicalized militants used both as foreign mercenaries and domestic provocateurs. Toward the end of the Cold War, one of these militant groups was literally Al Qaeda – a proxy mercenary front armed, funded, and employed by the West to this very day. Additionally, in all likelihood, the brothers who took part in the attack in Paris may have been fighting in Syria with weapons provided to them by the French government itself.  France 24 would report last year in an article titled, “France delivered arms to Syrian rebels, Hollande confirms,” that: President Francois Hollande said on Thursday that France had delivered weapons to rebels battling the Syrian regime of Bashar al-Assad “a few months ago.” Deflecting blame for the current attack on “radical Islam” is but a canard obscuring the truth that these terrorists were created intentionally by the West, to fight the West’s enemies abroad, and to intimidate and terrorize their populations at home.
  • As exposed by Pulitzer Prize-winning journalist Seymour Hersh in his 2007 article,  “The Redirection: Is the Administration’s new policy benefiting our enemies in the war on terrorism?” it was stated explicitly that (emphasis added): To undermine Iran, which is predominantly Shiite, the Bush Administration has decided, in effect, to reconfigure its priorities in the Middle East. In Lebanon, the Administration has coöperated with Saudi Arabia’s government, which is Sunni, in clandestine operations that are intended to weaken Hezbollah, the Shiite organization that is backed by Iran. The U.S. has also taken part in clandestine operations aimed at Iran and its ally Syria. A by-product of these activities has been the bolstering of Sunni extremist groups that espouse a militant vision of Islam and are hostile to America and sympathetic to Al Qaeda.  To this day, the US, its NATO partners including Turkey, and regional partners including Israel, Saudi Arabia, and Qatar are arming, funding, harboring, training, and otherwise perpetuating these “Islamic extremists” within and along both Syria and now Iraq’s borders.
  • In reality, without Western backing, “laundered” through the Persian Gulf autocracies and manifesting themselves in a global network of mosques jointly run by Persian Gulf and Western intelligence agencies, there would be no “Islamic extremism” to speak of. To focus on “extremism” as a cause, rather than as a means used by the true perpetrators of this global-spanning campaign of Western-sanctioned terrorism, is not only to perpetuate such canards, but to invite the perpetuation of this very terrorism we are shocked and horrified by.
  •  
    Cartalucci appears to be stretching the evidence a bit here. The possibility remains that the Paris attack was "blowback" not approved by western covert action agency. But in that event, the involved agency's monitoring of the monsters it creates was certainly deficient. 
Paul Merrell

Canadian Spies Collect Domestic Emails in Secret Security Sweep - The Intercept - 0 views

  • Canada’s electronic surveillance agency is covertly monitoring vast amounts of Canadians’ emails as part of a sweeping domestic cybersecurity operation, according to top-secret documents. The surveillance initiative, revealed Wednesday by CBC News in collaboration with The Intercept, is sifting through millions of emails sent to Canadian government agencies and departments, archiving details about them on a database for months or even years. The data mining operation is carried out by the Communications Security Establishment, or CSE, Canada’s equivalent of the National Security Agency. Its existence is disclosed in documents obtained by The Intercept from NSA whistleblower Edward Snowden. The emails are vacuumed up by the Canadian agency as part of its mandate to defend against hacking attacks and malware targeting government computers. It relies on a system codenamed PONY EXPRESS to analyze the messages in a bid to detect potential cyber threats.
  • Last year, CSE acknowledged it collected some private communications as part of cybersecurity efforts. But it refused to divulge the number of communications being stored or to explain for how long any intercepted messages would be retained. Now, the Snowden documents shine a light for the first time on the huge scope of the operation — exposing the controversial details the government withheld from the public. Under Canada’s criminal code, CSE is not allowed to eavesdrop on Canadians’ communications. But the agency can be granted special ministerial exemptions if its efforts are linked to protecting government infrastructure — a loophole that the Snowden documents show is being used to monitor the emails. The latest revelations will trigger concerns about how Canadians’ private correspondence with government employees are being archived by the spy agency and potentially shared with police or allied surveillance agencies overseas, such as the NSA. Members of the public routinely communicate with government employees when, for instance, filing tax returns, writing a letter to a member of parliament, applying for employment insurance benefits or submitting a passport application.
  • Chris Parsons, an internet security expert with the Toronto-based internet think tank Citizen Lab, told CBC News that “you should be able to communicate with your government without the fear that what you say … could come back to haunt you in unexpected ways.” Parsons said that there are legitimate cybersecurity purposes for the agency to keep tabs on communications with the government, but he added: “When we collect huge volumes, it’s not just used to track bad guys. It goes into data stores for years or months at a time and then it can be used at any point in the future.” In a top-secret CSE document on the security operation, dated from 2010, the agency says it “processes 400,000 emails per day” and admits that it is suffering from “information overload” because it is scooping up “too much data.” The document outlines how CSE built a system to handle a massive 400 terabytes of data from Internet networks each month — including Canadians’ emails — as part of the cyber operation. (A single terabyte of data can hold about a billion pages of text, or about 250,000 average-sized mp3 files.)
  • ...1 more annotation...
  • The agency notes in the document that it is storing large amounts of “passively tapped network traffic” for “days to months,” encompassing the contents of emails, attachments and other online activity. It adds that it stores some kinds of metadata — data showing who has contacted whom and when, but not the content of the message — for “months to years.” The document says that CSE has “excellent access to full take data” as part of its cyber operations and is receiving policy support on “use of intercepted private communications.” The term “full take” is surveillance-agency jargon that refers to the bulk collection of both content and metadata from Internet traffic. Another top-secret document on the surveillance dated from 2010 suggests the agency may be obtaining at least some of the data by covertly mining it directly from Canadian Internet cables. CSE notes in the document that it is “processing emails off the wire.”
  •  
    " CANADIAN SPIES COLLECT DOMESTIC EMAILS IN SECRET SECURITY SWEEP BY RYAN GALLAGHER AND GLENN GREENWALD @rj_gallagher@ggreenwald YESTERDAY AT 2:02 AM SHARE TWITTER FACEBOOK GOOGLE EMAIL PRINT POPULAR EXCLUSIVE: TSA ISSUES SECRET WARNING ON 'CATASTROPHIC' THREAT TO AVIATION CHICAGO'S "BLACK SITE" DETAINEES SPEAK OUT WHY DOES THE FBI HAVE TO MANUFACTURE ITS OWN PLOTS IF TERRORISM AND ISIS ARE SUCH GRAVE THREATS? NET NEUTRALITY IS HERE - THANKS TO AN UNPRECEDENTED GUERRILLA ACTIVISM CAMPAIGN HOW SPIES STOLE THE KEYS TO THE ENCRYPTION CASTLE Canada's electronic surveillance agency is covertly monitoring vast amounts of Canadians' emails as part of a sweeping domestic cybersecurity operation, according to top-secret documents. The surveillance initiative, revealed Wednesday by CBC News in collaboration with The Intercept, is sifting through millions of emails sent to Canadian government agencies and departments, archiving details about them on a database for months or even years. The data mining operation is carried out by the Communications Security Establishment, or CSE, Canada's equivalent of the National Security Agency. Its existence is disclosed in documents obtained by The Intercept from NSA whistleblower Edward Snowden. The emails are vacuumed up by the Canadian agency as part of its mandate to defend against hacking attacks and malware targeting government computers. It relies on a system codenamed PONY EXPRESS to analyze the messages in a bid to detect potential cyber threats. Last year, CSE acknowledged it collected some private communications as part of cybersecurity efforts. But it refused to divulge the number of communications being stored or to explain for how long any intercepted messages would be retained. Now, the Snowden documents shine a light for the first time on the huge scope of the operation - exposing the controversial details the government withheld from the public. Under Canada's criminal code, CSE is no
Paul Merrell

UN Report Finds Mass Surveillance Violates International Treaties and Privacy Rights - ... - 0 views

  • The United Nations’ top official for counter-terrorism and human rights (known as the “Special Rapporteur”) issued a formal report to the U.N. General Assembly today that condemns mass electronic surveillance as a clear violation of core privacy rights guaranteed by multiple treaties and conventions. “The hard truth is that the use of mass surveillance technology effectively does away with the right to privacy of communications on the Internet altogether,” the report concluded. Central to the Rapporteur’s findings is the distinction between “targeted surveillance” — which “depend[s] upon the existence of prior suspicion of the targeted individual or organization” — and “mass surveillance,” whereby “states with high levels of Internet penetration can [] gain access to the telephone and e-mail content of an effectively unlimited number of users and maintain an overview of Internet activity associated with particular websites.” In a system of “mass surveillance,” the report explained, “all of this is possible without any prior suspicion related to a specific individual or organization. The communications of literally every Internet user are potentially open for inspection by intelligence and law enforcement agencies in the States concerned.”
  • Mass surveillance thus “amounts to a systematic interference with the right to respect for the privacy of communications,” it declared. As a result, “it is incompatible with existing concepts of privacy for States to collect all communications or metadata all the time indiscriminately.” In concluding that mass surveillance impinges core privacy rights, the report was primarily focused on the International Covenant on Civil and Political Rights, a treaty enacted by the General Assembly in 1966, to which all of the members of the “Five Eyes” alliance are signatories. The U.S. ratified the treaty in 1992, albeit with various reservations that allowed for the continuation of the death penalty and which rendered its domestic law supreme. With the exception of the U.S.’s Persian Gulf allies (Saudi Arabia, UAE and Qatar), virtually every major country has signed the treaty. Article 17 of the Covenant guarantees the right of privacy, the defining protection of which, the report explained, is “that individuals have the right to share information and ideas with one another without interference by the State, secure in the knowledge that their communication will reach and be read by the intended recipients alone.”
  • The report’s key conclusion is that this core right is impinged by mass surveillance programs: “Bulk access technology is indiscriminately corrosive of online privacy and impinges on the very essence of the right guaranteed by article 17. In the absence of a formal derogation from States’ obligations under the Covenant, these programs pose a direct and ongoing challenge to an established norm of international law.” The report recognized that protecting citizens from terrorism attacks is a vital duty of every state, and that the right of privacy is not absolute, as it can be compromised when doing so is “necessary” to serve “compelling” purposes. It noted: “There may be a compelling counter-terrorism justification for the radical re-evaluation of Internet privacy rights that these practices necessitate. ” But the report was adamant that no such justifications have ever been demonstrated by any member state using mass surveillance: “The States engaging in mass surveillance have so far failed to provide a detailed and evidence-based public justification for its necessity, and almost no States have enacted explicit domestic legislation to authorize its use.”
  • ...5 more annotations...
  • Instead, explained the Rapporteur, states have relied on vague claims whose validity cannot be assessed because of the secrecy behind which these programs are hidden: “The arguments in favor of a complete abrogation of the right to privacy on the Internet have not been made publicly by the States concerned or subjected to informed scrutiny and debate.” About the ongoing secrecy surrounding the programs, the report explained that “states deploying this technology retain a monopoly of information about its impact,” which is “a form of conceptual censorship … that precludes informed debate.” A June report from the High Commissioner for Human Rights similarly noted “the disturbing lack of governmental transparency associated with surveillance policies, laws and practices, which hinders any effort to assess their coherence with international human rights law and to ensure accountability.” The rejection of the “terrorism” justification for mass surveillance as devoid of evidence echoes virtually every other formal investigation into these programs. A federal judge last December found that the U.S. Government was unable to “cite a single case in which analysis of the NSA’s bulk metadata collection actually stopped an imminent terrorist attack.” Later that month, President Obama’s own Review Group on Intelligence and Communications Technologies concluded that mass surveillance “was not essential to preventing attacks” and information used to detect plots “could readily have been obtained in a timely manner using conventional [court] orders.”
  • Three Democratic Senators on the Senate Intelligence Committee wrote in The New York Times that “the usefulness of the bulk collection program has been greatly exaggerated” and “we have yet to see any proof that it provides real, unique value in protecting national security.” A study by the centrist New America Foundation found that mass metadata collection “has had no discernible impact on preventing acts of terrorism” and, where plots were disrupted, “traditional law enforcement and investigative methods provided the tip or evidence to initiate the case.” It labeled the NSA’s claims to the contrary as “overblown and even misleading.” While worthless in counter-terrorism policies, the UN report warned that allowing mass surveillance to persist with no transparency creates “an ever present danger of ‘purpose creep,’ by which measures justified on counter-terrorism grounds are made available for use by public authorities for much less weighty public interest purposes.” Citing the UK as one example, the report warned that, already, “a wide range of public bodies have access to communications data, for a wide variety of purposes, often without judicial authorization or meaningful independent oversight.”
  • The report was most scathing in its rejection of a key argument often made by American defenders of the NSA: that mass surveillance is justified because Americans are given special protections (the requirement of a FISA court order for targeted surveillance) which non-Americans (95% of the world) do not enjoy. Not only does this scheme fail to render mass surveillance legal, but it itself constitutes a separate violation of international treaties (emphasis added): The Special Rapporteur concurs with the High Commissioner for Human Rights that where States penetrate infrastructure located outside their territorial jurisdiction, they remain bound by their obligations under the Covenant. Moreover, article 26 of the Covenant prohibits discrimination on grounds of, inter alia, nationality and citizenship. The Special Rapporteur thus considers that States are legally obliged to afford the same privacy protection for nationals and non-nationals and for those within and outside their jurisdiction. Asymmetrical privacy protection regimes are a clear violation of the requirements of the Covenant.
  • That principle — that the right of internet privacy belongs to all individuals, not just Americans — was invoked by NSA whistleblower Edward Snowden when he explained in a June, 2013 interview at The Guardian why he disclosed documents showing global surveillance rather than just the surveillance of Americans: “More fundamentally, the ‘US Persons’ protection in general is a distraction from the power and danger of this system. Suspicionless surveillance does not become okay simply because it’s only victimizing 95% of the world instead of 100%.” The U.N. Rapporteur was clear that these systematic privacy violations are the result of a union between governments and tech corporations: “States increasingly rely on the private sector to facilitate digital surveillance. This is not confined to the enactment of mandatory data retention legislation. Corporates [sic] have also been directly complicit in operationalizing bulk access technology through the design of communications infrastructure that facilitates mass surveillance. ”
  • The latest finding adds to the growing number of international formal rulings that the mass surveillance programs of the U.S. and its partners are illegal. In January, the European parliament’s civil liberties committee condemned such programs in “the strongest possible terms.” In April, the European Court of Justice ruled that European legislation on data retention contravened EU privacy rights. A top secret memo from the GCHQ, published last year by The Guardian, explicitly stated that one key reason for concealing these programs was fear of a “damaging public debate” and specifically “legal challenges against the current regime.” The report ended with a call for far greater transparency along with new protections for privacy in the digital age. Continuation of the status quo, it warned, imposes “a risk that systematic interference with the security of digital communications will continue to proliferate without any serious consideration being given to the implications of the wholesale abandonment of the right to online privacy.” The urgency of these reforms is underscored, explained the Rapporteur, by a conclusion of the United States Privacy and Civil Liberties Oversight Board that “permitting the government to routinely collect the calling records of the entire nation fundamentally shifts the balance of power between the state and its citizens.”
Paul Merrell

Poll Result: 9/11 and the War on Terror - 0 views

  • These are the topline results of a YouGov/Economist survey of 1000 US adults interviewed September 7 - 9, 2013 on 9/11 and the war on terror. The results show that Americans are beginning to oppose confrontating enemies abroad and would rather focus on domestic affairs. The margin of error is 4%.
  • Which comes closer to your view?In the long run, the United States will be safer from terrorism if it confronts thecountries and groups that promote terrorism. . . . . . . . . . . . . . . . . . . . . . . . . . . . .39%In the long run, the United States will be safer from terrorism if it stays out ofother countries’ affairs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .61%
  •  
    Not just weary of of foreign wars, the U.S. public is also weary of the War on Terror™. 
Paul Merrell

NSA Data Will Soon Be Used By Domestic Law Enforcement - 0 views

  • If you’re reading this, then I’m willing to bet that you’ve been called many different names throughout your life. If I were to hazard a guess, I would say they were names like kook, paranoid, conspiracy theorist, alarmist, insane, or gullible. And after this week, you can go by a new name: Vindicated. I’m of course talking about recent revelations from the NSA. Long before Edward Snowden came along, it was no secret that the NSA was spying on everyone without good cause. Anyone who believed that fact was called a conspiracy theorist, but their fears were eventually validated. These same people also understood that the NSA’s surveillance powers would never be used exclusively against terrorists and hostile governments. The power they have is just too tempting for any government. If various government agencies weren’t using the NSA’s surveillance apparatus to solve domestic crimes, it was only a matter of time before it was used for just that.
  • And again, they called us conspiracy theorists for believing that. And again, we were right all long. A while back, we noted a report showing that the “sneak-and-peek” provision of the Patriot Act that was alleged to be used only in national security and terrorism investigations has overwhelmingly been used in narcotics cases. Now the New York Times reports that National Security Agency data will be shared with other intelligence agencies like the FBI without first applying any screens for privacy. The ACLU of Massachusetts blog Privacy SOS explains why this is important: What does this rule change mean for you? In short, domestic law enforcement officials now have access to huge troves of American communications, obtained without warrants, that they can use to put people in cages. FBI agents don’t need to have any “national security” related reason to plug your name, email address, phone number, or other “selector” into the NSA’s gargantuan data trove. They can simply poke around in your private information in the course of totally routine investigations. And if they find something that suggests, say, involvement in illegal drug activity, they can send that information to local or state police. That means information the NSA collects for purposes of so-called “national security” will be used by police to lock up ordinary Americans for routine crimes.
  • Anybody who knows anything about how governments work, should not surprised. You can’t give them any kind of power, and expect them to use it responsibly. You can’t give them any stipulations. Eventually they’ll find a legal loophole to work around any limitations that have been placed on them. In other news, the Pentagon admitted this week that they’ve been deploying military drones over the United States for domestic surveillance purposes. Much like the NSA’s surveillance apparatus, we were assured that drones were for terrorists in faraway lands. Nothing so Orwellian would ever be used against ordinary American citizens at home. Yet here we are, with more to come.
  •  
    The Privacy Act, 5 U.S.C. 552a, provides in relevant part: "(a)(4) the term "record" means any item, collection, or grouping of information about an individual that is maintained by an agency, including, but not limited to, his education, financial transactions, medical history, and criminal or employment history and that contains his name, or the identifying number, symbol, or other identifying particular assigned to the individual, such as a finger or voice print or a photograph[.] ... "(b) Conditions of Disclosure.-No agency shall disclose any record which is contained in a system of records by any means of communication to any person, or to another agency, except pursuant to a written request by, or with the prior written consent of, the individual to whom the record pertains, unless disclosure of the record would be- ... "(7) to another agency or to an instrumentality of any governmental jurisdiction within or under the control of the United States for a civil or criminal law enforcement activity if the activity is authorized by law, and if the head of the agency or instrumentality has made a written request to the agency which maintains the record specifying the particular portion desired and the law enforcement activity for which the record is sought[.]" So a separate written request for each "portion" of any individual record that describes the "law enforcement activity for which the record is sought[.]" That doesn't sound like the contemplated unfettered access to bulk raw data. And it gets even better, with a right to sue for any violation, attorney fees and expenses, and a statutory minimum of $1,000 damages per violation just for winning the case.  
Paul Merrell

ECHELON: NSA's Global Electronic Interception - 0 views

  • 12 August 1988  Cover, pages 10-12   Somebody's  listening  . . . and they don't give a damn about personal privacy or commercial confidence. Project 415 is a top-secret new global surveillance system. It can tap into a billion calls a year in the UK alone. Inside Duncan Campbell on how spying entered the 21st century . . .  They've got it taped In the booming surveillance industry they spy on whom they wish, when they wish, protected by barriers of secrecy, fortified by billions of pounds worth of high, high technology. Duncan Campbell reports from the United States on the secret Anglo-American plan for a global electronic spy system for the 21st century capable of listening in to most of us most of the time   American, British and Allied intelligence agencies are soon to embark on a massive, billion-dollar expansion of their global electronic surveillance system. According to information given recently in secret to the US Congress, the surveillance system will enable the agencies to monitor and analyse civilian communications into the 21st century. Identified for the moment as Project P415, the system will be run by the US National Security Agency (NSA). But the intelligence agencies of many other countries will be closely involved with the new network, including those from Britain, Australia, Germany and Japan--and, surprisingly, the People's Republic of China. New satellite stations and monitoring centres are to be built around the world, and a chain of new satellites launched, so that NSA and its British counterpart, the Government Communications Headquarters (GCHQ) at Cheltenham, may keep abreast of the burgeoning international telecommunications traffic.
  • Both the new and existing surveillance systems are highly computerised. They rely on near total interception of international commercial and satellite communications in order to locate the telephone or other messages of target individuals. Last month, a US newspaper, the Cleveland Plain Dealer, revealed that the system had been used to target the telephone calls of a US Senator, Strom Thurmond. The fact that Thurmond, a southern Republican and usually a staunch supporter of the Reagan administration, is said to have been a target has raised fears that the NSA has restored domestic, electronic, surveillance programmes. These were originally exposed and criticised during the Watergate investigations, and their closure ordered by President Carter. After talking to the NSA, Thurmond later told the Plain Dealer that he did not believe the allegation. But Thurmond, a right-wing Republican, may have been unwilling to rock the boat. Staff members of the Permanent Select Committee on Intelligence said that staff were "digging into it" despite the "stratospheric security classification" of all the systems involved. The Congressional officials were first told of the Thurmond interception by a former employee of the Lockheed Space and Missiles Corporation, Margaret Newsham, who now lives in Sunnyvale, California. Newsham had originally given separate testimony and filed a lawsuit concerning corruption and mis-spending on other US government "black" projects. She has worked in the US and Britain for two corporations which manufacture signal intelligence computers, satellites and interception equipment for NSA, Ford Aerospace and Lockheed. Citing a special Executive Order signed by President Reagan. she told me last month that she could not and would not discuss classified information with journalists. But according to Washington sources (and the report in the Plain Dealer, she informed a US Congressman that the Thurmond interception took place at Menwith Hill, and that she p
  • A secret listening agreement, called UKUSA (UK-USA), assigns parts of the globe to each participating agency. GCHQ at Cheltenham is the co-ordinating centre for Europe, Africa and the Soviet Union (west of the Ural Mountains). The NSA covers the rest of the Soviet Union and most of the Americas. Australia--where another station in the NSA listening network is located in the outback--co-ordinates the electronic monitoring of the South Pacific, and South East Asia.
  • ...6 more annotations...
  • During the Watergate affair. it was revealed that NSA, in collaboration with GCHQ, had routinely intercepted the international communications of prominent anti-Vietnam war leaders such as Jane Fonda and Dr Benjamin Spock. Another target was former Black Panther leader Eldridge Cleaver. Then in the late 1970s, it was revealed that President Carter had ordered NSA to stop obtaining "back door" intelligence about US political figures through swapping intelligence data with GCHQ Cheltenham.
  • ince then, investigators have subpoenaed other witnesses and asked them to provide the complete plans and manuals of the ECHELON system and related projects. The plans and blueprints are said to show that targeting of US political figures would not occur by accident. but was designed into the system from the start. While working at Menwith Hill, Newsham is reported to have said that she was able to listen through earphones to telephone calls being monitored at the base. Other conversations that she heard were in Russian. After leaving Menwith Hill, she continued to have access to full details of Menwith Hill operations from a position as software manager for more than a dozen VAX computers at Menwith which operate the ECHELON system. Newsham refused last month to discuss classified details of her career, except with cleared Congressional officials. But it has been publicly acknowledged that she worked on a large range of so-called "black" US intelligence programmes, whose funds are concealed inside the costs of other defence projects. She was fired from Lockheed four years ago after complaining about the corruption, and sexual harassment.
  • he largest overseas station in the Project P415 network is the US satellite and communications base at Menwith Hill. near Harrogate in Yorkshire. It is run undercover by the NSA and taps into all Britain's main national and international communications networks (New Statesman, 7 August 1980). Although high technology stations such as Menwith Hill are primarily intended to monitor international communications, according to US experts their capability can be, and has been, turned inwards on domestic traffic. Menwith Hill, in particular, has been accused by a former employee of gross corruption and the monitoring of domestic calls. The vast international global eavesdropping network has existed since shortly after the second world war, when the US, Britain, Canada, Australia and New Zealand signed a secret agreement on signals intelligence, or "sigint". It was anticipated, correctly, that electronic monitoring of communications signals would continue to be the largest and most important form of post-war secret intelligence, as it had been through the war. Although it is impossible for analysts to listen to all but a small fraction of the billions of telephone calls, and other signals which might contain "significant" information, a network of monitoring stations in Britain and elsewhere is able to tap all international and some domestic communications circuits, and sift out messages which sound interesting. Computers automatically analyse every telex message or data signal, and can also identify calls to, say, a target telephone number in London, no matter from which country they originate.
  • If Margaret Newsham's testimony is confirmed by the ongoing Congressional investigation, then the NSA has been behaving illegally under US law--unless it can prove either that Thurmond's call was intercepted completely accidentally, or that the highly patriotic Senator is actually a foreign spy or terrorist. Moreover NSA's international phone tapping operations from Menwith Hill and at Morwenstow, Cornwall, can only be legal in Britain if special warrants have been issued by the Secretary of State to specify that American intelligence agents are persons to whom information from intercepts must or should be given. This can not be established, since the government has always refused to publish any details of the targets or recipients of specific interception warrants.
  • Both British and American domestic communications are also being targeted and intercepted by the ECHELON network, the US investigators have been told. The agencies are alleged to have collaborated not only on targeting and interception, but also on the monitoring of domestic UK communications. Special teams from GCHQ Cheltenham have been flown in secretly in the last few years to a computer centre in Silicon Valley near San Francisco for training on the special computer systems that carry out both domestic and international interception.
  • The centre near San Francisco has also been used to train staff from the "Technical Department" of the People's Liberation Army General Staff, which is the Chinese version of GCHQ. The Department operates two ultra-secret joint US-Chinese listening stations in the Xinjiang Uighur Autonomous Region, close to the Soviet Siberian border. Allegedly, such surveillance systems are only used to target Soviet or Warsaw Pact communications signals, and those suspected of involvement in espionage and terrorism. But those involved in ECHELON have stressed to Congress that there are no formal controls over who may be targeted. And I have been told that junior intelligence staff can feed target names into the system at all levels, without any check on their authority to do so. Witnesses giving evidence to the Congressional inquiry have discussed whether the Democratic presidential contender Jesse Jackson was targeted; one source implied that he had been. Even test engineers from manufacturing companies are able to listen in on private citizens' communications, the inquiry was told. But because of the special Executive Order signed by President Reagan, US intelligence operatives who know about such politically sensitive operations face jail sentences if they speak out--despite the constitutional American protection of freedom of speech and of the press. And in Britain, as we know, the government is in the process of tightening the Official Secrets Act to make the publication of any information from intelligence officials automatically a crime, even if the information had already been published, or had appeared overseas first.
  •  
    From the original series of ariticles * in 1988 * that first brought the Five Eyes' nation's ECHELON surveillance project to light. But note the paragarph about the disclosure during the Watergate scandal (early 1970s) about domestic digital surveillance of antiwar leaders and Black Panther leader Eldridge Cleaver.    
Paul Merrell

Data-sharing among US law agencies amounts to 'organised chaos' - report | World news |... - 0 views

  • The sharing of crucial intelligence about counter-terrorism between the FBI, the Department of Homeland Security and local police departments takes place through a patchwork process that amounts to “organized chaos”, according to a new report. The report, released Tuesday by the Brennan Center for Justice, a public-policy institute at New York University law school that has a track record of being skeptical of government surveillance, found inconsistent rules, inadequate oversight, apparent wastefulness and insufficient regard for civil liberties nationwide. “This poorly organized system not only wastes time and resources; it also risks masking reliable intelligence that could be crucial to an investigation,” the report says, warning that a “din of data” is overwhelming law enforcement.
  • The Brennan Center report examined 16 major police departments across the US, along with 19 affiliated “fusion centers” – controversial data-sharing pools between federal, state and local agencies – and 14 of the FBI’s joint terrorism task force partnerships with police.
  • Despite efforts by the Department of Homeland Security, most of the fusion centers operate with “minimal oversight, or no oversight whatsoever”, the report found. Out of 19 centers reviewed, only five require independent audits of retained data.
  • ...3 more annotations...
  • Fusion centers have been the subject of criticism from both civil libertarians and powerful elected officials. A 2012 investigation by the bipartisan Senate permanent subcommittee on investigations of more than 80,000 fusion center documents could not find any contribution the centers had made to “disrupt[ing] an active terrorist plot”. DHS disputes the results of that investigation, as do several legislators on committees overseeing the department. Senator Tom Coburn, an Oklahoman who serves as the top Republican on the Senate government reform and homeland security committee, has emerged as a leading legislative critic of fusion centers and joint terrorism task forces, for many of the same reasons detailed in the Brennan Center report. After a government inquiry indicated many federal data-sharing efforts were duplicative, Coburn issued a statement in April calling them “a vital component of national security”, but adding, “that is not an excuse to waste taxpayer funds”.
  • And all that information is on top of the fruits of the NSA’s vast data collection efforts, which are not entirely off limits to federal law enforcement. The controversial bulk collection of Americans’ phone data has been repeatedly described by the NSA as a tool to aid the FBI in detecting domestic terrorism activity. NSA deputy director John C Inglis recently stated that the FBI cannot search directly through the NSA’s data troves, but the agency shares telephone metadata with the bureau following searches through its databases based on “reasonable articulable suspicion” of connections to specific terrorist organizations.
  • The Brennan Center report did not specifically analyze law enforcement tower dumps, but Price called the reports of them alarming. “This is another indication of the vast trove of information that state and local police are collecting about law abiding Americans,” Price said. “To date, that information does not appear to be particularly useful in preventing terror attacks.”
  •  
    The ongoing federalization of state and local law enforcement continues unabated. Today's "fusion centers" have antecedents in the regional "intelligence centers" begun under the guise of Reagan's War on Drugs™, but shifted into a much higher gear under the guise of Bush II's War on Terror™.
Paul Merrell

Top-Secret Document Reveals NSA Spied On Porn Habits As Part Of Plan To Discredit 'Radi... - 0 views

  • WASHINGTON -- The National Security Agency has been gathering records of online sexual activity and evidence of visits to pornographic websites as part of a proposed plan to harm the reputations of those whom the agency believes are radicalizing others through incendiary speeches, according to a top-secret NSA document. The document, provided by NSA whistleblower Edward Snowden, identifies six targets, all Muslims, as “exemplars” of how “personal vulnerabilities” can be learned through electronic surveillance, and then exploited to undermine a target's credibility, reputation and authority. The NSA document, dated Oct. 3, 2012, repeatedly refers to the power of charges of hypocrisy to undermine such a messenger. “A previous SIGINT" -- or signals intelligence, the interception of communications -- "assessment report on radicalization indicated that radicalizers appear to be particularly vulnerable in the area of authority when their private and public behaviors are not consistent,” the document argues. Among the vulnerabilities listed by the NSA that can be effectively exploited are “viewing sexually explicit material online” and “using sexually explicit persuasive language when communicating with inexperienced young girls.”
  • The Director of the National Security Agency -- described as "DIRNSA" -- is listed as the "originator" of the document. Beyond the NSA itself, the listed recipients include officials with the Departments of Justice and Commerce and the Drug Enforcement Administration. "Without discussing specific individuals, it should not be surprising that the US Government uses all of the lawful tools at our disposal to impede the efforts of valid terrorist targets who seek to harm the nation and radicalize others to violence," Shawn Turner, director of public affairs for National Intelligence, told The Huffington Post in an email Tuesday. Yet Jameel Jaffer, deputy legal director of the American Civil Liberties Union, said these revelations give rise to serious concerns about abuse. "It's important to remember that the NSA’s surveillance activities are anything but narrowly focused -- the agency is collecting massive amounts of sensitive information about virtually everyone," he said. "Wherever you are, the NSA's databases store information about your political views, your medical history, your intimate relationships and your activities online," he added. "The NSA says this personal information won't be abused, but these documents show that the NSA probably defines 'abuse' very narrowly."
  • None of the six individuals targeted by the NSA is accused in the document of being involved in terror plots. The agency believes they all currently reside outside the United States. It identifies one of them, however, as a "U.S. person," which means he is either a U.S. citizen or a permanent resident. A U.S. person is entitled to greater legal protections against NSA surveillance than foreigners are. Stewart Baker, a one-time general counsel for the NSA and a top Homeland Security official in the Bush administration, said that the idea of using potentially embarrassing information to undermine targets is a sound one. "If people are engaged in trying to recruit folks to kill Americans and we can discredit them, we ought to," said Baker. "On the whole, it's fairer and maybe more humane" than bombing a target, he said, describing the tactic as "dropping the truth on them." Any system can be abused, Baker allowed, but he said fears of the policy drifting to domestic political opponents don't justify rejecting it. "On that ground you could question almost any tactic we use in a war, and at some point you have to say we're counting on our officials to know the difference," he said.
  • ...6 more annotations...
  • In addition to analyzing the content of their internet activities, the NSA also examined the targets' contact lists. The NSA accuses two of the targets of promoting al Qaeda propaganda, but states that surveillance of the three English-speakers’ communications revealed that they have "minimal terrorist contacts." In particular, “only seven (1 percent) of the contacts in the study of the three English-speaking radicalizers were characterized in SIGINT as affiliated with an extremist group or a Pakistani militant group. An earlier communications profile of [one of the targets] reveals that 3 of the 213 distinct individuals he was in contact with between 4 August and 2 November 2010 were known or suspected of being associated with terrorism," the document reads. The document contends that the three Arabic-speaking targets have more contacts with affiliates of extremist groups, but does not suggest they themselves are involved in any terror plots. Instead, the NSA believes the targeted individuals radicalize people through the expression of controversial ideas via YouTube, Facebook and other social media websites. Their audience, both English and Arabic speakers, "includes individuals who do not yet hold extremist views but who are susceptible to the extremist message,” the document states. The NSA says the speeches and writings of the six individuals resonate most in countries including the United Kingdom, Germany, Sweden, Kenya, Pakistan, India and Saudi Arabia.
  • The NSA possesses embarrassing sexually explicit information about at least two of the targets by virtue of electronic surveillance of their online activity. The report states that some of the data was gleaned through FBI surveillance programs carried out under the Foreign Intelligence and Surveillance Act. The document adds, "Information herein is based largely on Sunni extremist communications." It further states that "the SIGINT information is from primary sources with direct access and is generally considered reliable." According to the document, the NSA believes that exploiting electronic surveillance to publicly reveal online sexual activities can make it harder for these “radicalizers” to maintain their credibility. "Focusing on access reveals potential vulnerabilities that could be even more effectively exploited when used in combination with vulnerabilities of character or credibility, or both, of the message in order to shape the perception of the messenger as well as that of his followers," the document argues. An attached appendix lists the "argument" each surveillance target has made that the NSA says constitutes radicalism, as well the personal "vulnerabilities" the agency believes would leave the targets "open to credibility challenges" if exposed.
  • One target's offending argument is that "Non-Muslims are a threat to Islam," and a vulnerability listed against him is "online promiscuity." Another target, a foreign citizen the NSA describes as a "respected academic," holds the offending view that "offensive jihad is justified," and his vulnerabilities are listed as "online promiscuity" and "publishes articles without checking facts." A third targeted radical is described as a "well-known media celebrity" based in the Middle East who argues that "the U.S perpetrated the 9/11 attack." Under vulnerabilities, he is said to lead "a glamorous lifestyle." A fourth target, who argues that "the U.S. brought the 9/11 attacks on itself" is said to be vulnerable to accusations of “deceitful use of funds." The document expresses the hope that revealing damaging information about the individuals could undermine their perceived "devotion to the jihadist cause." The Huffington Post is withholding the names and locations of the six targeted individuals; the allegations made by the NSA about their online activities in this document cannot be verified. The document does not indicate whether the NSA carried out its plan to discredit these six individuals, either by communicating with them privately about the acquired information or leaking it publicly. There is also no discussion in the document of any legal or ethical constraints on exploiting electronic surveillance in this manner.
  • While Baker and others support using surveillance to tarnish the reputation of people the NSA considers "radicalizers," U.S. officials have in the past used similar tactics against civil rights leaders, labor movement activists and others. Under J. Edgar Hoover, the FBI harassed activists and compiled secret files on political leaders, most notably Martin Luther King, Jr. The extent of the FBI's surveillance of political figures is still being revealed to this day, as the bureau releases the long dossiers it compiled on certain people in response to Freedom of Information Act requests following their deaths. The information collected by the FBI often centered on sex -- homosexuality was an ongoing obsession on Hoover's watch -- and information about extramarital affairs was reportedly used to blackmail politicians into fulfilling the bureau's needs. Current FBI Director James Comey recently ordered new FBI agents to visit the Martin Luther King, Jr. Memorial in Washington to understand "the dangers in becoming untethered to oversight and accountability."
  • James Bamford, a journalist who has been covering the NSA since the early 1980s, said the use of surveillance to exploit embarrassing private behavior is precisely what led to past U.S. surveillance scandals. "The NSA's operation is eerily similar to the FBI's operations under J. Edgar Hoover in the 1960s where the bureau used wiretapping to discover vulnerabilities, such as sexual activity, to 'neutralize' their targets," he said. "Back then, the idea was developed by the longest serving FBI chief in U.S. history, today it was suggested by the longest serving NSA chief in U.S. history." That controversy, Bamford said, also involved the NSA. "And back then, the NSA was also used to do the eavesdropping on King and others through its Operation Minaret. A later review declared the NSA’s program 'disreputable if not outright illegal,'" he said. Baker said that until there is evidence the tactic is being abused, the NSA should be trusted to use its discretion. "The abuses that involved Martin Luther King occurred before Edward Snowden was born," he said. "I think we can describe them as historical rather than current scandals. Before I say, 'Yeah, we've gotta worry about that,' I'd like to see evidence of that happening, or is even contemplated today, and I don't see it."
  • Jaffer, however, warned that the lessons of history ought to compel serious concern that a "president will ask the NSA to use the fruits of surveillance to discredit a political opponent, journalist or human rights activist." "The NSA has used its power that way in the past and it would be naïve to think it couldn't use its power that way in the future," he said.
  •  
    By Glenn Greenwald, Ryan Gallagher, and Ryan Grim, 26 November 2013. I will annotate later. But this is by far the most important NSA disclosure from Edward Snowden's leaked documents thus far. A report originated by Gen. Alexander himself revealing COINTELPRO like activities aimed at destroying the reputations of non-terrorist "radicalizers," including one "U.S. person." This is exactly the kind of repressive activity that the civil libertarians among us warn about. 
  •  
    By Glenn Greenwald, Ryan Gallagher, and Ryan Grim, 26 November 2013. I will annotate later. But this is by far the most important NSA disclosure from Edward Snowden's leaked documents thus far. A report originated by Gen. Alexander himself revealing COINTELPRO like activities aimed at destroying the reputations of non-terrorist "radicalizers," including one "U.S. person." This is exactly the kind of repressive activity that the civil libertarians among us warn about. 
Gary Edwards

We Call a Top NSA Whistleblower … And Get the REAL SCOOP on Spying | Washingt... - 0 views

  •  
    "NSA whistleblower Thomas Drake corroborated Klein's assertions, testifying that while the NSA is using Israeli-made NARUS hardware to "seize and save all personal electronic communications." ..................... I then asked the NSA veteran Binney if the government's claim that it is only spying on metadata - and not content - was correct. We have extensively documented that the government is likely recording content as well. (And the government has previously admitted to "accidentally" collecting more information on Americans than was legal, and then gagged the judges so they couldn't disclose the nature or extent of the violations.) Binney said that was not true; the government is gathering everything, including content. Binney explained - as he has many times before - that the government is storing everything, and creating a searchable database … to be used whenever it wants, for any purpose it wants (even just going after someone it doesn't like). ..................... Binney said that former FBI counter-terrorism agent Tim Clemente is correct when he says that no digital data is safe (Clemente says that all digital communications are being recorded). Both Verint and Narus were founded in Israel in the 1990s. *** Binney next confirmed the statement of the author of the Patriot Act - Congressman Jim Sensenbrenner - that the NSA spying programs violate the Patriot Act. After all, the Patriot Act is focused on spying on external threats … not on Americans. Binney asked rhetorically: "How can an American court [FISA or otherwise] tell telecoms to cough up all domestic data?!" Update: Binney sent the following clarifying email about content collection: It's clear to me that they are collecting most e-mail in full plus other text type data on the web. As for phone calls, I don't think they would record/transcribe the approximately 3 billion US-to-US calls every day. It's more likely that they are reco
1 - 20 of 100 Next › Last »
Showing 20 items per page