Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged downloads

Rss Feed Group items tagged

Paul Merrell

Canada Casts Global Surveillance Dragnet Over File Downloads - The Intercept - 0 views

  • Canada’s leading surveillance agency is monitoring millions of Internet users’ file downloads in a dragnet search to identify extremists, according to top-secret documents. The covert operation, revealed Wednesday by CBC News in collaboration with The Intercept, taps into Internet cables and analyzes records of up to 15 million downloads daily from popular websites commonly used to share videos, photographs, music, and other files. The revelations about the spying initiative, codenamed LEVITATION, are the first from the trove of files provided by National Security Agency whistleblower Edward Snowden to show that the Canadian government has launched its own globe-spanning Internet mass surveillance system. According to the documents, the LEVITATION program can monitor downloads in several countries across Europe, the Middle East, North Africa, and North America. It is led by the Communications Security Establishment, or CSE, Canada’s equivalent of the NSA. (The Canadian agency was formerly known as “CSEC” until a recent name change.)
  • The latest disclosure sheds light on Canada’s broad existing surveillance capabilities at a time when the country’s government is pushing for a further expansion of security powers following attacks in Ottawa and Quebec last year. Ron Deibert, director of University of Toronto-based Internet security think tank Citizen Lab, said LEVITATION illustrates the “giant X-ray machine over all our digital lives.” “Every single thing that you do – in this case uploading/downloading files to these sites – that act is being archived, collected and analyzed,” Deibert said, after reviewing documents about the online spying operation for CBC News. David Christopher, a spokesman for Vancouver-based open Internet advocacy group OpenMedia.ca, said the surveillance showed “robust action” was needed to rein in the Canadian agency’s operations.
  • In a top-secret PowerPoint presentation, dated from mid-2012, an analyst from the agency jokes about how, while hunting for extremists, the LEVITATION system gets clogged with information on innocuous downloads of the musical TV series Glee. CSE finds some 350 “interesting” downloads each month, the presentation notes, a number that amounts to less than 0.0001 per cent of the total collected data. The agency stores details about downloads and uploads to and from 102 different popular file-sharing websites, according to the 2012 document, which describes the collected records as “free file upload,” or FFU, “events.” Only three of the websites are named: RapidShare, SendSpace, and the now defunct MegaUpload.
  • ...3 more annotations...
  • “The specific uses that they talk about in this [counter-terrorism] context may not be the problem, but it’s what else they can do,” said Tamir Israel, a lawyer with the University of Ottawa’s Canadian Internet Policy and Public Interest Clinic. Picking which downloads to monitor is essentially “completely at the discretion of CSE,” Israel added. The file-sharing surveillance also raises questions about the number of Canadians whose downloading habits could have been swept up as part of LEVITATION’s dragnet. By law, CSE isn’t allowed to target Canadians. In the LEVITATION presentation, however, two Canadian IP addresses that trace back to a web server in Montreal appear on a list of suspicious downloads found across the world. The same list includes downloads that CSE monitored in closely allied countries, including the United Kingdom, United States, Spain, Brazil, Germany and Portugal. It is unclear from the document whether LEVITATION has ever prevented any terrorist attacks. The agency cites only two successes of the program in the 2012 presentation: the discovery of a hostage video through a previously unknown target, and an uploaded document that contained the hostage strategy of a terrorist organization. The hostage in the discovered video was ultimately killed, according to public reports.
  • LEVITATION does not rely on cooperation from any of the file-sharing companies. A separate secret CSE operation codenamed ATOMIC BANJO obtains the data directly from internet cables that it has tapped into, and the agency then sifts out the unique IP address of each computer that downloaded files from the targeted websites. The IP addresses are valuable pieces of information to CSE’s analysts, helping to identify people whose downloads have been flagged as suspicious. The analysts use the IP addresses as a kind of search term, entering them into other surveillance databases that they have access to, such as the vast repositories of intercepted Internet data shared with the Canadian agency by the NSA and its British counterpart Government Communications Headquarters. If successful, the searches will return a list of results showing other websites visited by the people downloading the files – in some cases revealing associations with Facebook or Google accounts. In turn, these accounts may reveal the names and the locations of individual downloaders, opening the door for further surveillance of their activities.
  • Canada’s leading surveillance agency is monitoring millions of Internet users’ file downloads in a dragnet search to identify extremists, according to top-secret documents. The covert operation, revealed Wednesday by CBC News in collaboration with The Intercept, taps into Internet cables and analyzes records of up to 15 million downloads daily from popular websites commonly used to share videos, photographs, music, and other files. The revelations about the spying initiative, codenamed LEVITATION, are the first from the trove of files provided by National Security Agency whistleblower Edward Snowden to show that the Canadian government has launched its own globe-spanning Internet mass surveillance system. According to the documents, the LEVITATION program can monitor downloads in several countries across Europe, the Middle East, North Africa, and North America. It is led by the Communications Security Establishment, or CSE, Canada’s equivalent of the NSA. (The Canadian agency was formerly known as “CSEC” until a recent name change.)
Paul Merrell

Google Chrome Listening In To Your Room Shows The Importance Of Privacy Defense In Depth - 0 views

  • Yesterday, news broke that Google has been stealth downloading audio listeners onto every computer that runs Chrome, and transmits audio data back to Google. Effectively, this means that Google had taken itself the right to listen to every conversation in every room that runs Chrome somewhere, without any kind of consent from the people eavesdropped on. In official statements, Google shrugged off the practice with what amounts to “we can do that”.It looked like just another bug report. "When I start Chromium, it downloads something." Followed by strange status information that notably included the lines "Microphone: Yes" and "Audio Capture Allowed: Yes".
  • Without consent, Google’s code had downloaded a black box of code that – according to itself – had turned on the microphone and was actively listening to your room.A brief explanation of the Open-source / Free-software philosophy is needed here. When you’re installing a version of GNU/Linux like Debian or Ubuntu onto a fresh computer, thousands of really smart people have analyzed every line of human-readable source code before that operating system was built into computer-executable binary code, to make it common and open knowledge what the machine actually does instead of trusting corporate statements on what it’s supposed to be doing. Therefore, you don’t install black boxes onto a Debian or Ubuntu system; you use software repositories that have gone through this source-code audit-then-build process. Maintainers of operating systems like Debian and Ubuntu use many so-called “upstreams” of source code to build the final product.Chromium, the open-source version of Google Chrome, had abused its position as trusted upstream to insert lines of source code that bypassed this audit-then-build process, and which downloaded and installed a black box of unverifiable executable code directly onto computers, essentially rendering them compromised. We don’t know and can’t know what this black box does. But we see reports that the microphone has been activated, and that Chromium considers audio capture permitted.
  • This was supposedly to enable the “Ok, Google” behavior – that when you say certain words, a search function is activated. Certainly a useful feature. Certainly something that enables eavesdropping of every conversation in the entire room, too.Obviously, your own computer isn’t the one to analyze the actual search command. Google’s servers do. Which means that your computer had been stealth configured to send what was being said in your room to somebody else, to a private company in another country, without your consent or knowledge, an audio transmission triggered by… an unknown and unverifiable set of conditions.Google had two responses to this. The first was to introduce a practically-undocumented switch to opt out of this behavior, which is not a fix: the default install will still wiretap your room without your consent, unless you opt out, and more importantly, know that you need to opt out, which is nowhere a reasonable requirement. But the second was more of an official statement following technical discussions on Hacker News and other places. That official statement amounted to three parts (paraphrased, of course):
  • ...4 more annotations...
  • 1) Yes, we’re downloading and installing a wiretapping black-box to your computer. But we’re not actually activating it. We did take advantage of our position as trusted upstream to stealth-insert code into open-source software that installed this black box onto millions of computers, but we would never abuse the same trust in the same way to insert code that activates the eavesdropping-blackbox we already downloaded and installed onto your computer without your consent or knowledge. You can look at the code as it looks right now to see that the code doesn’t do this right now.2) Yes, Chromium is bypassing the entire source code auditing process by downloading a pre-built black box onto people’s computers. But that’s not something we care about, really. We’re concerned with building Google Chrome, the product from Google. As part of that, we provide the source code for others to package if they like. Anybody who uses our code for their own purpose takes responsibility for it. When this happens in a Debian installation, it is not Google Chrome’s behavior, this is Debian Chromium’s behavior. It’s Debian’s responsibility entirely.3) Yes, we deliberately hid this listening module from the users, but that’s because we consider this behavior to be part of the basic Google Chrome experience. We don’t want to show all modules that we install ourselves.
  • If you think this is an excusable and responsible statement, raise your hand now.Now, it should be noted that this was Chromium, the open-source version of Chrome. If somebody downloads the Google product Google Chrome, as in the prepackaged binary, you don’t even get a theoretical choice. You’re already downloading a black box from a vendor. In Google Chrome, this is all included from the start.This episode highlights the need for hard, not soft, switches to all devices – webcams, microphones – that can be used for surveillance. A software on/off switch for a webcam is no longer enough, a hard shield in front of the lens is required. A software on/off switch for a microphone is no longer enough, a physical switch that breaks its electrical connection is required. That’s how you defend against this in depth.
  • Of course, people were quick to downplay the alarm. “It only listens when you say ‘Ok, Google’.” (Ok, so how does it know to start listening just before I’m about to say ‘Ok, Google?’) “It’s no big deal.” (A company stealth installs an audio listener that listens to every room in the world it can, and transmits audio data to the mothership when it encounters an unknown, possibly individually tailored, list of keywords – and it’s no big deal!?) “You can opt out. It’s in the Terms of Service.” (No. Just no. This is not something that is the slightest amount of permissible just because it’s hidden in legalese.) “It’s opt-in. It won’t really listen unless you check that box.” (Perhaps. We don’t know, Google just downloaded a black box onto my computer. And it may not be the same black box as was downloaded onto yours. )Early last decade, privacy activists practically yelled and screamed that the NSA’s taps of various points of the Internet and telecom networks had the technical potential for enormous abuse against privacy. Everybody else dismissed those points as basically tinfoilhattery – until the Snowden files came out, and it was revealed that precisely everybody involved had abused their technical capability for invasion of privacy as far as was possible.Perhaps it would be wise to not repeat that exact mistake. Nobody, and I really mean nobody, is to be trusted with a technical capability to listen to every room in the world, with listening profiles customizable at the identified-individual level, on the mere basis of “trust us”.
  • Privacy remains your own responsibility.
  •  
    And of course, Google would never succumb to a subpoena requiring it to turn over the audio stream to the NSA. The Tor Browser just keeps looking better and better. https://www.torproject.org/projects/torbrowser.html.en
Paul Merrell

Defending Dissent » New Docs Show Army Coordinated Spy Ring - 1 views

  • Army illegally supplied  intelligence on nonviolent antiwar protesters to FBI and police in multiple states Tacoma, WA – Recently obtained public records confirm an Army-led, multi-agency spy network that targeted “leftists/anarchists” as domestic terrorists. The Army used illegal infiltration to gather information on nonviolent antiwar protesters, disseminate it to the FBI and police departments in multiple states, and in some cases used it to disrupt planned protests by preemptively and falsely arresting activists. Public records obtained last month by Olympia activist Paul French reveal new evidence in the widely-watched Army spying case Panagacos v. Towery. An email from November 2007, in particular, shows that intelligence analyst John J. Towery was paid by the Army to infiltrate political groups and share unlawfully obtained intelligence with a growing network of law enforcement agencies, including the FBI, and police departments in Los Angeles, Portland, Eugene, Everett, and Spokane. The Towery email not only represents a broader spying program than previously thought, it also confirms the program was led by the Army, a fact contradicted by Towery’s 2009 sworn statements.
  • “The latest revelations show how the Army not only engaged in illegal spying on political dissidents, it led the charge and tried to expand the counterintelligence network targeting leftists and anarchists,” said Larry Hildes, a National Lawyers Guild attorney who filed the Panagacos lawsuit in 2010. “By targeting activists without probable cause, based on their ideology and the perceived political threat they represent, the Army clearly broke the law and must be held accountable.” Previously obtained public records indicate that absent such accountability, the Army will continue to spy on and target protesters, which it did until at least 2010, long after Towery’s identity was exposed. Public records previously obtained in 2009 already established that over a two-year period beginning in 2006, Towery (under the alias “John Jacob”) spied on the Olympia antiwar group Port Militarization Resistance (PMR) as well as several other organizations, including Students for a Democratic Society, the Industrial Workers of the World, and Iraq Veterans Against the War. It has also already been established that Towery’s intelligence was passed on to the Washington State Fusion Center, a communications hub of  local, state and federal law enforcement, and then used by local police to target activists for repeated harassment, preemptive and false arrest, excessive use of force, and malicious prosecution
  • The recently disclosed Towery email was a follow-up to a 2007 Domestic Terrorism Conference he attended in Spokane, during which “domestic terrorist” dossiers on some of the Panagacos plaintiffs were distributed. The Towery email shows the development of a multi-agency spying apparatus in intimate detail. “I thought it would be a good idea to develop a leftist/anarchist mini-group for intel sharing and distro,” wrote the Army analyst to several law enforcement officials. Towery references books, “zines and pamphlets,” and a “comprehensive web list” as source material, but cautions the officials on file sharing “because it might tip off groups that we are studying their techniques, tactics and procedures.” Towery, who worked at Joint Base Lewis-McChord, not only coordinated his actions with local, state and federal law enforcement agencies, many of whom are named defendants in the Panagacos case, he also admitted to eavesdropping on a confidential, privileged attorney-client email listserv of criminal defendants and their legal counsel. Such conduct is considered a constitutional violation, but Towery also took sensitive information from the listserv vital to a pending criminal trial in 2007 and passed it on to fusion center officials who then transmitted it to prosecutors, forcing a mistrial in a case the defense was winning handily. The case was later dismissed for prosecutorial misconduct.
  • ...2 more annotations...
  • The public records disclosure comes as government spying and criticism of the National Security Agency’s surveillance program has reached a fever pitch. However, a little-known and rarely, if ever, enforced law from 1878 distinguishes the spying under Panagacos from that of the NSA. The Posse Comitatus Act prohibits the military from enforcing domestic laws on U.S. soil by making such actions a Gross Misdemeanor, yet to-date no official has been prosecuted under the Act. Instead of conceding to the violations, the Army is currently using the Panagacos case to try to seal nearly 10,000 pages of documents, many of which are incriminating and embarrassing to the government. The legal effort to unseal those documents will play out over the next few weeks. The Obama Administration tried to dismiss the Panagacos lawsuit, but in a Ninth Circuit decision from December 2012 the court rejected the government’s arguments, ruling that allegations of First and Fourth Amendment violations were “plausible,” and ordered the case to proceed to trial. The lawsuit was filed on behalf of seven PMR members who sought to oppose the wars in Iraq and Afghanistan through nonviolent civil disobedience and is being heard by U.S. District Court Judge Ronald B. Leighton. In addition to Towery, named defendants in Panagacos include Thomas Rudd, one of Towery’s superiors at Joint Base Lewis-McChord, the U.S. Army, Navy, and Coast Guard, as well as certain officials within its ranks, the City of Olympia and its police department, the City of Tacoma and its police department, Pierce County, and various personnel from those jurisdictions.
  • Panagacos v. Towery is currently in the discovery stage and is scheduled to go to trial in June 2014. Further information: Recently disclosed Towery email Panagacos lawsuit complaint Domestic terrorism dossiers on plaintiffs
  •  
    One I had missed from February, 2014. I believe I had bookmarked something about this before the lawsuit was filed. Now not only has the case been filed but the alleged grounds for the lawsuit have been greenlighted by the 9th U.S. Circuit Court of Appeals. If you click through the link to the court's opinion, you'll find one of the Ninth Circuit's shorter opinions, less than five pages, which does not even mention that the defendants were employed by the U.S. Army or any branch of government, while still rejecting their claim of government officials' qualified immunity from suit for the alleged First and Fourth Amendment violations. The third amended complaint sufficiently alleged facts to support claims that had been clearly established as violative of the First and Fourth Amendments.   It's clear that the plaintiffs have smoking gun evidence and that the National Lawyers' Guild is all over this one. Trial is scheduled next month, according to the article. It's just under 300 miles from here to Seattle, but I just might make the trip to watch a few days of this trial. Strong First Amendment cases for damages that survive appellate review of the qualified immunity nearly always settle before trial. But this one smells like it is going to trial for publicity purposes even if not for the vindication of rights, considering the nature of the organizations involved both as targets of the surveillance and their lawyers. It's great entertainment watching government guys and gals squirm on the witness stand when they've been caught violating civil rights. In criminal cases, invoking the Fifth Amendment right against self-incrimination cannot be taken as evidence of guilt. But in a federal civil rights case, that entitles the plaintiffs to have the jury instructed that it can infer liability from the resort to the Fifth Amendment to refuse answering questions.  Better back in the day when I was the lawyer asking the questions. But it's still great fun just to watch
Paul Merrell

NSA targets the privacy-conscious (Seite 1)| Das Erste - Panorama - Meldungen - 0 views

  • The investigation discloses the following: Two servers in Germany - in Berlin and Nuremberg - are under surveillance by the NSA. Merely searching the web for the privacy-enhancing software tools outlined in the XKeyscore rules causes the NSA to mark and track the IP address of the person doing the search. Not only are German privacy software users tracked, but the source code shows that privacy software users worldwide are tracked by the NSA.Among the NSA's targets is the Tor network funded primarily by the US government to aid democracy advocates in authoritarian states.  The XKeyscore rules reveal that the NSA tracks all connections to a server that hosts part of an anonymous email service at the MIT Computer Science and Artificial Intelligence Laboratory (CSAIL) in Cambridge, Massachusetts. It also records details about visits to a popular internet journal for Linux operating system users called "the Linux Journal - the Original Magazine of the Linux Community", and calls it an "extremist forum".
  • Three authors of this investigation have personal and professional ties to the Tor Project, an American company mentioned within the following investigation.
  • Teil 1: NSA targets the privacy-conscious Teil 2: The Tor Project - anathema to the NSA Teil 3: Servers in Germany targeted Teil 4: Simple web searches are suspicious Teil 5: NSA: In strict accordance with the rule of law
  • ...3 more annotations...
  • von J. Appelbaum, A. Gibson, J. Goetz, V. Kabisch, L. Kampf, L. Ryge The investigation discloses the following: Two servers in Germany - in Berlin and Nuremberg - are under surveillance by the NSA. Merely searching the web for the privacy-enhancing software tools outlined in the XKeyscore rules causes the NSA to mark and track the IP address of the person doing the search. Not only are German privacy software users tracked, but the source code shows that privacy software users worldwide are tracked by the NSA.Among the NSA's targets is the Tor network funded primarily by the US government to aid democracy advocates in authoritarian states.  The XKeyscore rules reveal that the NSA tracks all connections to a server that hosts part of an anonymous email service at the MIT Computer Science and Artificial Intelligence Laboratory (CSAIL) in Cambridge, Massachusetts. It also records details about visits to a popular internet journal for Linux operating system users called "the Linux Journal - the Original Magazine of the Linux Community", and calls it an "extremist forum".
  • Downloads XKeyscore rules Read/download the XKeyscore rules here  | download
  • Yet despite these efforts, one of the servers is targeted by the NSA. The IP address 212.212.245.170 is explicitly specified in the rules of the powerful and invasive spy software program XKeyscore. The code is published here exclusively for the first time. After a year of NSA revelations based on documents that focus on program names and high-level Powerpoint presentations, NDR and WDR are revealing NSA source code that shows how these programs function and how they are implemented in Germany and around the world. Months of investigation by the German public television broadcasters NDR and WDR, drawing on exclusive access to top secret NSA source code, interviews with former NSA employees, and the review of secret documents of the German government reveal that not only is the server in Nuremberg under observation by the NSA, but so is virtually anyone who has taken an interest in several well-known privacy software systems.
Paul Merrell

Spies worry over doomsday cache stashed by ex-NSA contractor Snowden | Reuters - 0 views

  • (Reuters) - British and U.S. intelligence officials say they are worried about a "doomsday" cache of highly classified, heavily encrypted material they believe former National Security Agency contractor Edward Snowden has stored on a data cloud. The cache contains documents generated by the NSA and other agencies and includes names of U.S. and allied intelligence personnel, seven current and former U.S. officials and other sources briefed on the matter said.The data is protected with sophisticated encryption, and multiple passwords are needed to open it, said two of the sources, who like the others spoke on condition of anonymity to discuss intelligence matters.The passwords are in the possession of at least three different people and are valid for only a brief time window each day, they said. The identities of persons who might have the passwords are unknown.
  • One source described the cache of still unpublished material as Snowden's "insurance policy" against arrest or physical harm.U.S. officials and other sources said only a small proportion of the classified material Snowden downloaded during stints as a contract systems administrator for NSA has been made public. Some Obama Administration officials have said privately that Snowden downloaded enough material to fuel two more years of news stories."The worst is yet to come," said one former U.S. official who follows the investigation closely.Snowden, who is believed to have downloaded between 50,000 and 200,000 classified NSA and British government documents, is living in Russia under temporary asylum, where he fled after traveling to Hong Kong. He has been charged in the United States under the Espionage Act.Cryptome, a website which started publishing leaked secret documents years before the group WikiLeaks or Snowden surfaced, estimated that the total number of Snowden documents made public so far is over 500.
  • Snowden's revelations of government secrets have brought to light extensive and previously unknown surveillance of phone, email and social media communications by the NSA and allied agencies. That has sparked several diplomatic rows between Washington and its allies, along with civil liberties debates in Europe, the United States and elsewhere.Among the material which Snowden acquired from classified government computer servers, but which has not been published by media outlets known to have had access to it, are documents containing names and resumes of employees working for NSA's British counterpart, the Government Communications Headquarters (GCHQ), sources familiar with the matter said.The sources said Snowden started downloading some of it from a classified GCHQ website, known as GC-Wiki, when he was employed by Dell and assigned to NSA in 2012.
  • ...2 more annotations...
  • Glenn Greenwald, who met with Snowden in Hong Kong and was among the first to report on the leaked documents for the Guardian newspaper, said the former NSA contractor had "taken extreme precautions to make sure many different people around the world have these archives to insure the stories will inevitably be published.""If anything happens at all to Edward Snowden, he has arranged for them to get access to the full archives," Greenwald said in a June interview with the Daily Beast website. He added: "I don't know for sure whether has more documents than the ones he has given me... I believe he does."In an email exchange with Reuters, Greenwald, who has said he remains in contact with Snowden, affirmed his statements about Snowden's "precautions" but said he had nothing to add.Officials believe that the "doomsday" cache is stored and encrypted separately from any material that Snowden has provided to media outlets.
  • Sources familiar with unpublished material Snowden downloaded said it also contains information about the CIA - possibly including personnel names - as well as other U.S. spy agencies such as the National Reconnaissance Office and National Geospatial-Intelligence Agency, which operate U.S. image-producing satellites and analyze their data.U.S. security officials have indicated in briefings they do not know what, if any, of the material is still in Snowden's personal possession. Snowden himself has been quoted as saying he took no such materials with him to Russia.
Gary Edwards

George Soros Hacked, Connections To Global 'Dissident Groups' Revealed - 1 views

  • The documents are from multiple departments of Soros’ organizations. Soros’ the Open Society Foundations seems to be the group with the most documents in the leak. Files come from sections representing almost all geographical regions in the world, from the USA, to Europe, Eurasia, Asia, Latin, America, Africa, the World Bank “the President’s Office”, as well as an unknown entity named SOUK. As the Daily Caller notes, there are documents dating from at least 2008 to 2016. Documents in the leak range from research papers such as “EUROPEAN CRISIS: Key Developments of the Past 48 Hours” focusing on the impact of the refugee crisis, to a document titled “The Ukraine debate in Germany“, to an update specific financials of grants. They reveal work plans, strategies, priorities and other activities by Soros, and include reports on European elections, migration and asylum in Europe.
  •  
    "Last Thursday, as Bloomberg was gingerly setting the stage, and the preemptive damage control for what was about to be a historic leak, it did everything in its power to deflect attention from the key topic, namely that prominent liberal billionaire and Hillary supporter, George Soros had been hacked and countless documents were about to be leaked, and instead focus on the alleged identity of the hackers, the so-called DCLeaks, which - like all other "experts" - it positioned as yet another Russian government-sponsored operation. To this we had one retort: "Far more important than the inane speculation on the hackers' identity, is the now official disclosure - and warning - that Soros himself was hacked. Bloomberg writes that Open Society Foundations, the Soros group, reported the breach to the Federal Bureau of Investigation in June, according to spokeswoman Laura Silber, who added that an investigation by a security firm found the intrusion was limited to an intranet system used by board members, staff and foundation partners." And, sure enough, over the weekend that is precisely what DCLeaks revealed as it disclosed over two thousand internal documents from groups run by George Soros were leaked online Saturday after hackers infiltrated the groups. The 2,576 files were released by DCLeaks, a website which claims to be "launched by the American hacktivists who respect and appreciate freedom of speech, human rights and government of the people.""
  •  
    The leaked documents are here. http://soros.dcleaks.com/
Paul Merrell

Shaking My Head - Medium - 0 views

  • Last month, at the request of the Department of Justice, the Courts approved changes to the obscure Rule 41 of the Federal Rules of Criminal Procedure, which governs search and seizure. By the nature of this obscure bureaucratic process, these rules become law unless Congress rejects the changes before December 1, 2016.Today I, along with my colleagues Senators Paul from Kentucky, Baldwin from Wisconsin, and Daines and Tester from Montana, am introducing the Stopping Mass Hacking (SMH) Act (bill, summary), a bill to protect millions of law-abiding Americans from a massive expansion of government hacking and surveillance. Join the conversation with #SMHact.
  • For law enforcement to conduct a remote electronic search, they generally need to plant malware in — i.e. hack — a device. These rule changes will allow the government to search millions of computers with the warrant of a single judge. To me, that’s clearly a policy change that’s outside the scope of an “administrative change,” and it is something that Congress should consider. An agency with the record of the Justice Department shouldn’t be able to wave its arms and grant itself entirely new powers.
  • These changes say that if law enforcement doesn’t know where an electronic device is located, a magistrate judge will now have the the authority to issue a warrant to remotely search the device, anywhere in the world. While it may be appropriate to address the issue of allowing a remote electronic search for a device at an unknown location, Congress needs to consider what protections must be in place to protect Americans’ digital security and privacy. This is a new and uncertain area of law, so there needs to be full and careful debate. The ACLU has a thorough discussion of the Fourth Amendment ramifications and the technological questions at issue with these kinds of searches.The second part of the change to Rule 41 would give a magistrate judge the authority to issue a single warrant that would authorize the search of an unlimited number — potentially thousands or millions — of devices, located anywhere in the world. These changes would dramatically expand the government’s hacking and surveillance authority. The American public should understand that these changes won’t just affect criminals: computer security experts and civil liberties advocates say the amendments would also dramatically expand the government’s ability to hack the electronic devices of law-abiding Americans if their devices were affected by a computer attack. Devices will be subject to search if their owners were victims of a botnet attack — so the government will be treating victims of hacking the same way they treat the perpetrators.
  • ...1 more annotation...
  • As the Center on Democracy and Technology has noted, there are approximately 500 million computers that fall under this rule. The public doesn’t know nearly enough about how law enforcement executes these hacks, and what risks these types of searches will pose. By compromising the computer’s system, the search might leave it open to other attackers or damage the computer they are searching.Don’t take it from me that this will impact your security, read more from security researchers Steven Bellovin, Matt Blaze and Susan Landau.Finally, these changes to Rule 41 would also give some types of electronic searches different, weaker notification requirements than physical searches. Under this new Rule, they are only required to make “reasonable efforts” to notify people that their computers were searched. This raises the possibility of the FBI hacking into a cyber attack victim’s computer and not telling them about it until afterward, if at all.
Paul Merrell

The best way to read Glenn Greenwald's 'No Place to Hide' - 0 views

  • Journalist Glenn Greenwald just dropped a pile of new secret National Security Agency documents onto the Internet. But this isn’t just some haphazard WikiLeaks-style dump. These documents, leaked to Greenwald last year by former NSA contractor Edward Snowden, are key supplemental reading material for his new book, No Place to Hide, which went on sale Tuesday. Now, you could just go buy the book in hardcover and read it like you would any other nonfiction tome. Thanks to all the additional source material, however, if any work should be read on an e-reader or computer, this is it. Here are all the links and instructions for getting the most out of No Place to Hide.
  • Greenwald has released two versions of the accompanying NSA docs: a compressed version and an uncompressed version. The only difference between these two is the quality of the PDFs. The uncompressed version clocks in at over 91MB, while the compressed version is just under 13MB. For simple reading purposes, just go with the compressed version and save yourself some storage space. Greenwald also released additional “notes” for the book, which are just citations. Unless you’re doing some scholarly research, you can skip this download.
  • No Place to Hide is, of course, available on a wide variety of ebook formats—all of which are a few dollars cheaper than the hardcover version, I might add. Pick your e-poison: Amazon, Nook, Kobo, iBooks. Flipping back and forth Each page of the documents includes a corresponding page number for the book, to allow readers to easily flip between the book text and the supporting documents. If you use the Amazon Kindle version, you also have the option of reading Greenwald’s book directly on your computer using the Kindle for PC app or directly in your browser. Yes, that may be the worst way to read a book. In this case, however, it may be the easiest way to flip back and forth between the book text and the notes and supporting documents. Of course, you can do the same on your e-reader—though it can be a bit of a pain. Those of you who own a tablet are in luck, as they provide the best way to read both ebooks and PDF files. Simply download the book using the e-reader app of your choice, download the PDFs from Greenwald’s website, and dig in. If you own a Kindle, Nook, or other ereader, you may have to convert the PDFs into a format that works well with your device. The Internet is full of tools and how-to guides for how to do this. Here’s one:
  • ...1 more annotation...
  • Kindle users also have the option of using Amazon’s Whispernet service, which converts PDFs into a format that functions best on the company’s e-reader. That will cost you a small fee, however—$0.15 per megabyte, which means the compressed Greenwald docs will cost you a whopping $1.95.
Paul Merrell

Big Pharma Accused Of Illegal Price-Fixing, What You're Not Being Told - 0 views

  • A lawsuit filed Thursday in the U.S. District Court for the District of Connecticut alleges Heritage Pharmaceuticals, EpiPen-maker Mylan NV, and others conspired to manipulate U.S. drug prices. The suit was filed on behalf of the states of Connecticut, Delaware, Florida, Hawaii, Idaho, Iowa, Kansas, and at least 12 others. Naming Heritage Pharmaceuticals Inc. as the “ringleader” of the alleged conspiracy, the suit claims the prices of doxycycline hyclate, an antibiotic, and glyburide, a treatment drug for diabetics, were kept artificially high due to a scheme involving Mylan, Mayne Pharma, Aurobindo Pharma, Teva Pharmaceuticals, and Citron Pharma LLC. Federal prosecutors claim the price-fixing scheme was orchestrated by executives who have left Heritage. The suit is part of an ongoing, two-year long antitrust investigation conducted by the U.S. Department of Justice. According to the New York Attorney General’s Office, former Heritage executives Jeffrey Glazer and Jason Malek conspired with others to avoid competition by “[entering] into numerous illegal conspiracies in order to unreasonably restrain trade, artificially inflate and manipulate prices and reduce competition.” By resorting to price-fixing, companies involved may have believed they would secure their market shares without presenting a major risk to one another. This alleged scheme, the suit argues, has caused “significant, lasting and ultimately harmful rippling effect in the United States healthcare system.” The 20 states named as plaintiffs in the suit claim the companies were aware of the legal ramifications of their actions and took steps to hide their intent and actions as soon as the investigation was launched.
  • Recently, Mylan was chastised for inflating the price of the EpiPen, a device used to combat life-threatening allergic reactions. As Anti-Media reported in August, news organizations “had a field day” when reports showed the price of the autoinjector had gone from $57 each in 2007 to $600 for a double package in 2016. During a hearing before Congress over the EpiPen scandal, Mylan CEO Heather Bresch called the outraged reactions to the price hike “overblown.” Adding that the price of the autoinjectors wouldn’t change anytime soon, Bresch defended the company’s decision, claiming “[Mylan]’s profit on its $609 EpiPen two-packs is about $50 per pen.” When examining Mylan’s involvement in politics since Bresch was named the company’s executive, it becomes apparent that Mylan may have had the opportunity to approach regulators from a privileged position due to the fact Sen. Joe Manchin (D-WV) is the CEO’s father. By 2010, the Food and Drug Administration (FDA) had changed federal guidelines associated with epinephrine prescriptions, allowing Mylan to change its EpiPen labels. By shifting packaging and selling twin-packs instead of single pens while marketing the devices to “anyone at risk,” Mylan widened the EpiPen market. In 2013, a congressional bill pressuring states to have stocks of EpiPens on hand was signed into law. It was conceived after a local seven-year-old died due to an allergic reaction to peanuts.
  • Mylan lobbied heavily for this bill and spent over $1 million that year alone in lobbying efforts. Due to this legislative success, up to 47 states now “require or encourage schools to stock the devices.” But as the company led the fight to introduce the EpiPen to a larger audience, it also led a legal battle to bring its competitors to their knees by influencing regulation that artificially raises costs of doing business for other companies. From our August report: “In 2009, Pfizer Inc., the world’s biggest drugmaker, and Mylan sued Teva Pharmaceutical Industries Ltd. over a patent infringement. At the time, the Israeli company was accused of using Mylan’s design without permission. But in 2012, both parties reached an agreement, and Teva was allowed to seek approval from the FDA for its epinephrine injecting device. “According to Gizmodo, Teva has failed to obtain approval from the FDA to develop affordable generic versions of the EpiPen. The company says it won’t try to go through the same process again until 2017. “The only other device that was closer to competing with Mylan’s EpiPen was Auvi-Q, and it was also driven out of the market. In 2015, the company launched a recall campaign claiming the devices could be delivering faulty dosages.”
  • ...1 more annotation...
  • What this story shows us is that if companies conspire among themselves to keep competitors at bay, the federal government will accuse them of breaking antitrust laws. But when Congress approves increased regulation, effectively barring smaller companies from competing while creating monopolies, price-fixing is perfectly acceptable. Instead of a lawsuit against Heritage and Mylan, how about the People v. United States Congress? After all, if it weren’t for their relentless pursuit of special interest protections, companies wouldn’t have turned into the conglomerates they have become.
Paul Merrell

U.S. Military and Intelligence Officials to Obama: "Assad NOT Responsible for Chemical ... - 1 views

  • MEMORANDUM FOR: The President FROM: Veteran Intelligence Professionals for Sanity (VIPS) SUBJECT: Is Syria a Trap? Precedence: IMMEDIATE We regret to inform you that some of our former co-workers are telling us, categorically, that contrary to the claims of your administration, the most reliable intelligence shows that Bashar al-Assad was NOT responsible for the chemical incident that killed and injured Syrian civilians on August 21, and that British intelligence officials also know this. In writing this brief report, we choose to assume that you have not been fully informed because your advisers decided to afford you the opportunity for what is commonly known as “plausible denial.” We have been down this road before – with President George W. Bush, to whom we addressed our first VIPS memorandumimmediately after Colin Powell’s Feb. 5, 2003 U.N. speech, in which he peddled fraudulent “intelligence” to support attacking Iraq. Then, also, we chose to give President Bush the benefit of the doubt, thinking he was being misled – or, at the least, very poorly advised.
  • The fraudulent nature of Powell’s speech was a no-brainer. And so, that very afternoon we strongly urged your predecessor to “widen the discussion beyond …  the circle of those advisers clearly bent on a war for which we see no compelling reason and from which we believe the unintended consequences are likely to be catastrophic.” We offer you the same advice today. Our sources confirm that a chemical incident of some sort did cause fatalities and injuries on August 21 in a suburb of Damascus. They insist, however, that the incident was not the result of an attack by the Syrian Army using military-grade chemical weapons from its arsenal. That is the most salient fact, according to CIA officers working on the Syria issue. They tell us that CIA Director John Brennan is perpetrating a pre-Iraq-War-type fraud on members of Congress, the media, the public – and perhaps even you. We have observed John Brennan closely over recent years and, sadly, we find what our former colleagues are now telling us easy to believe. Sadder still, this goes in spades for those of us who have worked with him personally; we give him zero credence. And that goes, as well, for his titular boss, Director of National Intelligence James Clapper, who has admitted he gave “clearly erroneous” sworn testimony to Congress denying NSA eavesdropping on Americans.
  • That Secretary of State John Kerry would invoke Clapper’s name this week in Congressional testimony, in an apparent attempt to enhance the credibility of the four-page “Government Assessment” strikes us as odd. The more so, since it was, for some unexplained reason, not Clapper but the White House that released the “assessment.” This is not a fine point. We know how these things are done. Although the “Government Assessment” is being sold to the media as an “intelligence summary,” it is a political, not an intelligence document. The drafters, massagers, and fixers avoided presenting essential detail. Moreover, they conceded upfront that, though they pinned “high confidence” on the assessment, it still fell “short of confirmation.”
  • ...3 more annotations...
  • There is a growing body of evidence from numerous sources in the Middle East — mostly affiliated with the Syrian opposition and its supporters — providing a strong circumstantial case that the August 21 chemical incident was a pre-planned provocation by the Syrian opposition and its Saudi and Turkish supporters. The aim is reported to have been to create the kind of incident that would bring the United States into the war. According to some reports, canisters containing chemical agent were brought into a suburb of Damascus, where they were then opened. Some people in the immediate vicinity died; others were injured. We are unaware of any reliable evidence that a Syrian military rocket capable of carrying a chemical agent was fired into the area. In fact, we are aware of no reliable physical evidence to support the claim that this was a result of a strike by a Syrian military unit with expertise in chemical weapons. In addition, we have learned that on August 13-14, 2013, Western-sponsored opposition forces in Turkey started advance preparations for a major, irregular military surge. Initial meetings between senior opposition military commanders and Qatari, Turkish and U.S. intelligence officials took place at the converted Turkish military garrison in Antakya, Hatay Province, now used as the command center and headquarters of the Free Syrian Army (FSA) and their foreign sponsors.
  • Senior opposition commanders who came from Istanbul pre-briefed the regional commanders on an imminent escalation in the fighting due to “a war-changing development,” which, in turn, would lead to a U.S.-led bombing of Syria. At operations coordinating meetings at Antakya, attended by senior Turkish, Qatari and U.S. intelligence officials as well as senior commanders of the Syrian opposition, the Syrians were told that the bombing would start in a few days. Opposition leaders were ordered to prepare their forces quickly to exploit the U.S. bombing, march into Damascus, and remove the Bashar al-Assad government The Qatari and Turkish intelligence officials assured the Syrian regional commanders that they would be provided with plenty of weapons for the coming offensive. And they were. A weapons distribution operation unprecedented in scope began in all opposition camps on August 21-23. The weapons were distributed from storehouses controlled by Qatari and Turkish intelligence under the tight supervision of U.S. intelligence officers.
  • We hope your advisers have warned you that retaliation for attacks on Syrian are not a matter of IF, but rather WHERE and WHEN. Retaliation is inevitable. For example, terrorist strikes on U.S. embassies and other installations are likely to make what happened to the U.S. “Mission” in Benghazi on Sept. 11, 2012, look like a minor dust-up by comparison. One of us addressed this key consideration directly a week ago in an article titled “Possible Consequences of a U.S. Military Attack on Syria – Remembering the U.S. Marine Barracks Destruction in Beirut, 1983.”
  •  
    This report by Veteran Intelligence Professionals for Sanity is almost certainly the most credible report contradicting the White House's "intelligence summary" that included zero evidence supporting the claim that Syrian government forces had unleashed the August 21, 2013 chemical attack in Ghoutu, near Damascus and less than five miles away from the just-arrived UN investigative team.  Spread it far and wide. 
  •  
    Wow!! The cover-up of this false flag operation designed to get us into another civil war is incredible. Yet the truth continues to leak out. The ruling elites must be so pissed right now. The Internet is changing the world balance of power - in real time no less. And we are witness. Awesome stuff Paul.
Paul Merrell

The Conscience of a Benghazi Whistleblower | The American Conservative - 0 views

  • Raymond Maxwell claims he witnessed top Hillary Clinton aides purge State Department files. Here's why you should believe him.
  • Ray Maxwell has a helluva story: Hillary Clinton’s most senior aides participated in a Benghazi cover-up. Maxwell says he knows because he was there. Proving or disproving his allegations will be an uncertain task. People will claim he is nothing more than a disgruntled employee with an agenda. I don’t think that’s true. Because I was once in his place. Raymond Maxwell was Deputy Assistant Secretary of State for Near Eastern Affairs, covering Libya. Soon after Ambassador Chris Stevens and others were killed in Benghazi, Maxwell participated in a secret Sunday session, he says, where Clinton aides Cheryl Mills and Jake Sullivan oversaw a document review with the aim to “pull out anything that might put anybody in the front office or the seventh floor in a bad light.” (“Seventh floor” is slang for the Secretary of State.)
  • As the House Select Committee on Benghazi held its first hearing Wednesday, the focus was on the Secretary of State’s role in securing American embassies and consulates abroad. Maxwell did not testify, and may or may not be eventually called to speak publicly to the Committee, but his allegations loom in the background. I’ve met Maxwell and talked with him, though he did not confide in me. When you join State, you serve whomever is in the White House, and like myself Maxwell worked from Reagan through Obama. “For any Foreign Service Officer, being at work is the essence of everything,” Maxwell told a reporter after he was ultimately pushed into an early retirement following State’s internal review of the Benghazi debacle. In 2013, Maxwell spoke to the House Foreign Affairs Committee and the House Oversight Committee yet kept quiet about the bombshell information. Maxwell impresses as a State Department archetype, dedicated to the insular institution, apolitical to the point of frustration to an outsider, but shocked when he found his loyalty was not returned.
  • ...1 more annotation...
  • He has revealed what he knows only two years after the fact. People will say he is out for revenge. But I don’t think that’s the case. As a State Department whistleblower who experienced how the Department treats such people, I know it’s not a position anyone wants to be in.
  •  
    This might prove troublesome for Hillary. Spoliation of evidence is usually fairly easy to prove because of references to shredded documents in other documents that were retained, breaks in the sequence of document numbering, etc. 
Paul Merrell

Family Affair Report Details Nepotism in Congress | CREW | Citizens for Responsibility ... - 0 views

  • This report marks the first-ever complete study of how members of the House of Representatives use their positions to benefit themselves and their families. Citizens for Responsibility and Ethics in Washington (CREW) undertook a similar study in 2007, but it was not all-inclusive. Expanding on our earlier work, for this 2012 edition we reviewed every sitting member of the House.  Download the full report. CREW’s investigation uncovered 248 members meriting inclusion in this in-depth compilation, which covers the 2008 and 2010 election cycles.
  • CREW’s key findings: 82 members (40 Democrats and 42 Republicans) paid family members through their congressional offices, campaign committees and political action committees (PACs); 44 members (20 Democrats and 24 Republicans) have family members who lobby or are employed in government affairs; 90 members (42 Democrats and 48 Republicans) have paid a family business, employer, or associated nonprofit; 20 members (13 Democrats and 7 Republicans) used their campaign money to contribute to a family member’s political campaign; 14 members (6 Democrats and 8 Republicans) charged interest on personal loans they made to their own campaigns; 38 members (24 Democrats and 14 Republicans) earmarked to a family business, employer, or associated nonprofit. Partnership With Legistorm CREW is partnering with LegiStorm to make the data in this report more widely available in a searchable form. Much of CREW’s research on members’ family relationships and the ways members of Congress use their positions to benefit their families has been incorporated into LegiStorm’s database at www.legistorm.com. Download the full report
Paul Merrell

The Still-Missing Evidence of Russia-gate - Consortiumnews - 0 views

  • A changing-places moment brought about by Russia-gate is that liberals who are usually more skeptical of U.S. intelligence agencies, especially their evidence-free claims, now question the patriotism of Americans who insist that the intelligence community supply proof to support the dangerous claims about Russian ‘hacking” of Democratic emails especially when some  veteran U.S. government experts say the data would be easily available if the Russians indeed were guilty. One of those experts is William Binney, a former high-level National Security Agency intelligence official who, after his 2001 retirement, blew the whistle on the extraordinary breadth of NSA surveillance programs. His outspoken criticism of the NSA during the George W. Bush administration made him the subject of FBI investigations that included a raid on his home in 2007. Even before Edward Snowden’s NSA whistleblowing, Binney publicly revealed that NSA had access to telecommunications companies’ domestic and international billing records, and that since 9/11 the agency has intercepted some 15 trillion to 20 trillion communications. Snowden has said: “I have tremendous respect for Binney, who did everything he could according to the rules.”
  • I spoke to Binney on Dec. 28 about Russia-gate and a host of topics having to do with spying and America’s expanding national security state.
  • Bernstein: Your expertise was in the Soviet Union and so you must know a lot about bugging.  Do you believe that Russia hacked and undermined our last election?  Can Trump thank Russia for the result? Binney:  We at Veteran Intelligence Professionals for Sanity (VIPS) published an article on this in July.  First of all, if any of the data went anywhere across the fiber optic world, the NSA would know.  Just inside the United States, the NSA has over a hundred tap points on the fiber lines, taking in everything.    Mark Klein exposed some of this at the AT&T facility in San Francisco. This is not for foreigners, by the way, this is for targeting US citizens.  If they wanted only foreigners, all they would have to do was look at the transatlantic cables where they surface on the coast of the United States.  But they are not there, they are distributed among the US population. Bernstein: So if, in fact, the Russians were tapping into DNC headquarters, the NSA would absolutely know about it. Binney: Yes, and they would also have trace routes on where they went specifically, in Russia or anywhere else.  If you remember, about three or four years ago, the Chinese hacked into somewhere in the United States and our government came out and confirmed that it was the Chinese who did it, and it came from a specific military facility in Shanghai.  The NSA had these trace route programs embedded by the hundreds across the US and all around the world.
  • ...3 more annotations...
  • The other data that came out from Guccifer 2.0, a download from the DNC, has been a charade.  It was a download and not a transfer across the Web.  The Web won’t manage such a high speed.  It could not have gotten across the Atlantic at that high speed.  You would have to have high capacity lines dedicated to that in order to do it. They have been playing games with us.  There is no factual evidence to back up any charge of hacking here. Bernstein: So was this a leak by somebody at Democratic headquarters? Binney: We don’t know that for sure, either.  All we know was that it was a local download.  We can likely attribute it to a USB device that was physically passed along.
  • Right now, our government is violating the first, fourth and fifth amendments in various ways.  Mueller did it, Comey did it, they were all involved in violating the Constitution.
  • Bernstein:  There seems to be a new McCarthyite operation around the Russia-gate investigation.  It appears that it is an attempt to justify the idea that Clinton lost because the Russians undermined the election. Binney: I have seen no evidence at all from anybody, including the intelligence community.  If you look at the Intelligence Community Assessment (ICA) report, they state on the first page that “We have high confidence that the Russians did this.”  But when you get toward the end of the report, they basically confess that “our judgment does not imply that we have evidence to back it up.” Bernstein:  It was initially put out that seventeen intelligence agencies found compelling evidence that the Russians hacked into our election.  You’re saying it was actually selected individuals from just three agencies.  Is there anything to the revelations that FBI agents talked about taking action to prevent Trump from becoming president? Binney: It certainly does seem that it is leaning that way, that is was all a frame-up.  It is a sad time in our history, to see the government working against itself internally. Bernstein:  I take it you are not a big supporter of Trump. Binney:  Well, I voted for him.  I couldn’t vote for a warmonger like Clinton.  She wanted to see our planes shooting down Russian planes in Syria.  She advocated for destabilizing Libya, for getting rid of Assad in Syria, she was a strong backer of the war in Iraq.
Gary Edwards

Leaked Document: Military Internment Camps in U.S to be Used for Political Dissidents -... - 0 views

  •  
    "Published on Mar 4, 2013 Internment camps for political dissidents in the U.S. aren't a conspiracy theory. The Department of Defense document entitled "INTERNMENT AND RESETTLEMENT OPERATIONS" or FM 3-39.40 proves this beyond a shadow of a doubt. Visit our website: http://StormCloudsGathering.com Download link for FM 3-39.40: http://info.publicintelligence.net/USArmy-InternmentResettlement.pdf Army hiring for these internment camps: http://www.goarmy.com/careers-and-jobs/browse-career-and-job-categories/legal-and-law-enforcement/internment-resettlement-specialist.html
Gary Edwards

iTunes - Podcasts - Stansberry Radio by Stansberry and Associates - 0 views

  •  
    Download the Alex Jones podcast interview with Porter.
Paul Merrell

Snowden obtained nearly 2 million classified files in NSA leak - Pentagon report - RT USA - 0 views

  • Edward Snowden downloaded 1.7 million intelligence files from US agencies, the most secrets ever to be stolen from the US government in a single instance in the nation’s history, according to lawmakers who have viewed a classified Pentagon report.
  • “This is straight from the government’s playbook,” Wizner said. “Remember, the government told the Supreme Court that publication of the Pentagon Papers would cause grave danger to national security. That was not true then, and this report is not true now. Overblown claims of national security rarely stand the test of time.” Sources came forward in August, two months after the press began reporting Snowden’s leaks, to admit that authorities were unsure exactly how many documents Snowden obtained. Two anonymous officials told NBC News at the time that the NSA was using poor compartmentalization techniques - meaning that Snowden, an IT systems administrator, was able to freely comb through agency networks containing a wide range of data. NSA Director Keith Alexander said in August that the government knew what Snowden had taken, while the NBC sources in fact said the NSA was “overwhelmed” with trying to find out the details. Alexander said in an October speech that the documents were “being put out in a way that does the maximum damage to NSA and our nation.” He also told the audience that Snowden had far fewer documents to reporters than this week’s Pentagon report described. “I wish there was a way to prevent it,” he told a Baltimore, Maryland crowd. “Snowden has shared somewhere between 50,000 and 200,000 documents with reporters. These will continue to come out.”
  •  
    The seizure of all devices containing data by UK officials from David Miranda, Glenn Greenwald's partner, under dubious authority of an anti-terrorism statute, tends to show that NSA and GCHA in fact do not know how many -- or which -- documents Snowden acquired. I am extremely dubious of this 1.7 million documents claim. IIRC, Greenwald said at some point that he had been given about 50K documents.  
Gary Edwards

Election Fraud & Financial Corruption - Shows - Coast to Coast AM - 0 views

  • Date: 03-15-14 Host: Richard Syrett Guests: Greg Palast, Douglas Hagmann Guest host Richard Syrett welcomed New York Times bestselling author Greg Palast for a discussion on his investigation into election fraud and corruption in the financial world. First hour guest, investigative author Douglas Hagmann of the Northeast Intelligence Network, commented on the recent spate of mysterious banker deaths. Website(s): gregpalast.com homelandsecurityus.com Book(s): Vultures' Picnic
  •  
    Incredible investigative journalism uncovers the Bankster plot to destroy the USA Dollar as a currency, and replace it with a World Currency. Extensive discussion about how the Bankster Billionaires control elections, playing both sides against the middle, and always getting their way. Contact me if you need download access.
Gary Edwards

Transnationalism vs. American Sovereignty « Tammy Bruce - 0 views

  •  
    excerpt: "….Transnationalists want to rewrite the laws of war, do away with the death penalty, restrict gun rights and much more-all without having to win popular majorities or heed American constitutional limits. And these advocates are making major strides under an Obama administration that is itself a hotbed of transnational legal thinking…. To be clear, transnationalism isn't a conspiratorial enterprise. In the legal academy, its advocates have openly stated their aims and means. "International law now seeks to influence political outcomes within sovereign States," Anne-Marie Slaughter, then dean of Princeton's public-affairs school, wrote in an influential 2007 essay. International law, she went on, must expand to include "domestic choices previously left to the determination of national political processes" and be able to "alter domestic politics." The preferred entry point for importing foreign norms into American law is the U.S. court system. The Yale Law School scholar Howard Koh, a transnationalist advocate, has written that "domestic courts must play a key role in coordinating U.S. domestic constitutional rules with rules of foreign and international law." Over the past two decades, activist judges have increasingly cited "evolving" international standards to overturn state laws, and Mr. Koh has suggested that foreign norms can be "downloaded" into American law in this manner…. Ms. Slaughter and Mr. Koh held top posts at the State Department during Mr. Obama's first term, and their tenures coincided with an aggressive push to ratify or recognize as customary law… a host of … progressive causes. For proof that the transnationalist threat isn't merely theoretical, look no further than the European Union…. Today over half of the regulations that affect Europeans' lives are made by administrators in Brussels, not by national legislatures. These regulations include the EU's ban, announced in May, on restau
Paul Merrell

FBI Admits It Controlled Tor Servers Behind Mass Malware Attack | Threat Level | Wired.com - 0 views

  • It wasn’t ever seriously in doubt, but the FBI yesterday acknowledged that it secretly took control of Freedom Hosting last July, days before the servers of the largest provider of ultra-anonymous hosting were found to be serving custom malware designed to identify visitors. Freedom Hosting’s operator, Eric Eoin Marques, had rented the servers from an unnamed commercial hosting provider in France, and paid for them from a bank account in Las Vegas. It’s not clear how the FBI took over the servers in late July, but the bureau was temporarily thwarted when Marques somehow regained access and changed the passwords, briefly locking out the FBI until it gained back control. The new details emerged in local press reports from a Thursday bail hearing in Dublin, Ireland, where Marques, 28, is fighting extradition to America on charges that Freedom Hosting facilitated child pornography on a massive scale. He was denied bail today for the second time since his arrest in July. Freedom Hosting was a provider of turnkey “Tor hidden service” sites — special sites, with addresses ending in .onion, that hide their geographic location behind layers of routing, and can be reached only over the Tor anonymity network. Tor hidden services are used by sites that need to evade surveillance or protect users’ privacy to an extraordinary degree – including human rights groups and journalists. But they also appeal to serious criminal elements, child-pornography traders among them.
  • On August 4, all the sites hosted by Freedom Hosting — some with no connection to child porn — began serving an error message with hidden code embedded in the page. Security researchers dissected the code and found it exploited a security hole in Firefox to identify users of the Tor Browser Bundle, reporting back to a mysterious server in Northern Virginia. The FBI was the obvious suspect, but declined to comment on the incident. The FBI also didn’t respond to inquiries from WIRED today. But FBI Supervisory Special Agent J. Brooke Donahue was more forthcoming when he appeared in the Irish court yesterday to bolster the case for keeping Marques behind bars, according to local press reports. Among the many arguments Donahue and an Irish police inspector offered was that Marques might reestablish contact with co-conspirators, and further complicate the FBI probe. In addition to the wrestling match over Freedom Hosting’s servers, Marques allegedly dove for his laptop when the police raided him, in an effort to shut it down.
  • The apparent FBI-malware attack was first noticed on August 4, when all of the hidden service sites hosted by Freedom Hosting began displaying a “Down for Maintenance” message. That included at least some lawful websites, such as the secure email provider TorMail. Some visitors looking at the source code of the maintenance page realized that it included a hidden iframe tag that loaded a mysterious clump of Javascript code from a Verizon Business internet address. By midday, the code was being circulated and dissected all over the net. Mozilla confirmed the code exploited a critical memory management vulnerability in Firefox that was publicly reported on June 25, and is fixed in the latest version of the browser. Though many older revisions of Firefox were vulnerable to that bug, the malware only targeted Firefox 17 ESR, the version of Firefox that forms the basis of the Tor Browser Bundle – the easiest, most user-friendly package for using the Tor anonymity network. That made it clear early on that the attack was focused specifically on de-anonymizing Tor users. Tor Browser Bundle users who installed or manually updated after June 26 were safe from the exploit, according to the Tor Project’s security advisory on the hack.
  • ...2 more annotations...
  • Perhaps the strongest evidence that the attack was a law enforcement or intelligence operation was the limited functionality of the malware. The heart of the malicious Javascript was a tiny Windows executable hidden in a variable named “Magneto.” A traditional virus would use that executable to download and install a full-featured backdoor, so the hacker could come in later and steal passwords, enlist the computer in a DDoS botnet, and generally do all the other nasty things that happen to a hacked Windows box. But the Magneto code didn’t download anything. It looked up the victim’s MAC address — a unique hardware identifier for the computer’s network or Wi-Fi card — and the victim’s Windows hostname. Then it sent it to a server in Northern Virginia server, bypassing Tor, to expose the user’s real IP address, coding the transmission as a standard HTTP web request.
  • The official IP allocation records maintained by the American Registry for Internet Numbers show the two Magneto-related IP addresses were part of a ghost block of eight addresses that have no organization listed. Those addresses trace no further than the Verizon Business data center in Ashburn, Virginia, 20 miles northwest of the Capital Beltway. The code’s behavior, and the command-and-control server’s Virginia placement, is also consistent with what’s known about the FBI’s “computer and internet protocol address verifier,” or CIPAV, the law enforcement spyware first reported by WIRED in 2007. Court documents and FBI files released under the FOIA have described the CIPAV as software the FBI can deliver through a browser exploit to gather information from the target’s machine and send it to an FBI server in Virginia. The FBI has been using the CIPAV since 2002 against hackers, online sexual predators, extortionists, and others, primarily to identify suspects who are disguising their location using proxy servers or anonymity services, like Tor. Prior to the Freedom Hosting attack, the code had been used sparingly, which kept it from leaking out and being analyzed.
  •  
    Taking down the entire Freedom Hosting service because some content was kiddie porn is reminiscent of the U.S. government's proxy take-down of Mega-Upload in New Zealand. Such actions that disable legitimate users or deny access to their data are in my opinion violative of the 1st and 4th Amendments.  It suppresses the Freedom of Speech and seizes more than the 4th Amendment allows.  That our own government would use malware for surveillance purposes under any circumstance is just plain chilling.
Paul Merrell

2013 mass surveillance disclosures - Wikipedia, the free encyclopedia - 0 views

  • 1 Historical context 1.1 Origins of clandestine surveillance in the United States (1919–78) 1.2 Mass surveillance in a global context (1988-2000) 1.3 9/11 and its implications on mass surveillance (2001–2009) 1.4 Acceleration of media leaks (2010–present) 2 Summary of NSA surveillance 2.1 Purposes 2.2 Targets 2.3 International cooperation 3 2013 Disclosures by category 3.1 Court Orders, Memos and Policy Documents 3.2 Reports 3.3 Collection and Analysis Programs or Hardware 3.4 Relationships with Corporate Partners 3.5 NSA Databases 3.6 Signals Intelligence Directorates (SIDs) 3.7 Technical Directorates 3.8 Names associated with specific targets 3.9 Uncategorized or insufficiently described codenames. 3.10 GCHQ Operations 3.11 NSA Operations 3.12 NSA Relationships with Foreign Intelligence services 3.13 Unrelated to Edward Snowden 4 Media reports 4.1 Chronology 4.2 Disclosures 4.3 Violation of civil liberties and international law 5 Fallout 5.1 Counter-terrorism and national security 5.2 Impact on foreign relations 5.3 Amash/Conyers Amendment 5.4 Public reaction 5.4.1 Petitions 5.4.2 Protests 6 Media related to the disclosures 7 See also 8 References 9 Further reading
  •  
    Wikipedia begins pulling its act together on coverage of the NSA scandal. This article is, at least for the time being, a major NSA scandal research resource. But wait to see how soon NSA sock puppets bowdlerize it. The occasional snapshot downloaded or stored in e.g., Zotero, is advisable.   
  •  
    Wow. Diigo handled the markup just fine in My Library but decided to display the raw HTML here. That's got to be a bug. Click through to Wikipedia and look at the table of contents. That's what buried in the markup above.
1 - 20 of 120 Next › Last »
Showing 20 items per page