Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged drug-laws

Rss Feed Group items tagged

Paul Merrell

GCHQ taps fibre-optic cables for secret access to world's communications | UK news | gu... - 0 views

  • Britain's spy agency GCHQ has secretly gained access to the network of cables which carry the world's phone calls and internet traffic and has started to process vast streams of sensitive personal information which it is sharing with its American partner, the National Security Agency (NSA).The sheer scale of the agency's ambition is reflected in the titles of its two principal components: Mastering the Internet and Global Telecoms Exploitation, aimed at scooping up as much online and telephone traffic as possible. This is all being carried out without any form of public acknowledgement or debate.One key innovation has been GCHQ's ability to tap into and store huge volumes of data drawn from fibre-optic cables for up to 30 days so that it can be sifted and analysed. That operation, codenamed Tempora, has been running for some 18 months.
  • GCHQ and the NSA are consequently able to access and process vast quantities of communications between entirely innocent people, as well as targeted suspects.This includes recordings of phone calls, the content of email messages, entries on Facebook and the history of any internet user's access to websites – all of which is deemed legal, even though the warrant system was supposed to limit interception to a specified range of targets.The existence of the programme has been disclosed in documents shown to the Guardian by the NSA whistleblower Edward Snowden as part of his attempt to expose what he has called "the largest programme of suspicionless surveillance in human history"."It's not just a US problem. The UK has a huge dog in this fight," Snowden told the Guardian. "They [GCHQ] are worse than the US."
  • However, on Friday a source with knowledge of intelligence argued that the data was collected legally under a system of safeguards, and had provided material that had led to significant breakthroughs in detecting and preventing serious crime.Britain's technical capacity to tap into the cables that carry the world's communications – referred to in the documents as special source exploitation – has made GCHQ an intelligence superpower.By 2010, two years after the project was first trialled, it was able to boast it had the "biggest internet access" of any member of the Five Eyes electronic eavesdropping alliance, comprising the US, UK, Canada, Australia and New Zealand.UK officials could also claim GCHQ "produces larger amounts of metadata than NSA". (Metadata describes basic information on who has been contacting whom, without detailing the content.)By May last year 300 analysts from GCHQ, and 250 from the NSA, had been assigned to sift through the flood of data.The Americans were given guidelines for its use, but were told in legal briefings by GCHQ lawyers: "We have a light oversight regime compared with the US".
  • ...8 more annotations...
  • When it came to judging the necessity and proportionality of what they were allowed to look for, would-be American users were told it was "your call".The Guardian understands that a total of 850,000 NSA employees and US private contractors with top secret clearance had access to GCHQ databases.
  • For the 2 billion users of the world wide web, Tempora represents a window on to their everyday lives, sucking up every form of communication from the fibre-optic cables that ring the world.The NSA has meanwhile opened a second window, in the form of the Prism operation, revealed earlier this month by the Guardian, from which it secured access to the internal systems of global companies that service the internet.The GCHQ mass tapping operation has been built up over five years by attaching intercept probes to transatlantic fibre-optic cables where they land on British shores carrying data to western Europe from telephone exchanges and internet servers in north America.This was done under secret agreements with commercial companies, described in one document as "intercept partners".The papers seen by the Guardian suggest some companies have been paid for the cost of their co-operation and GCHQ went to great lengths to keep their names secret. They were assigned "sensitive relationship teams" and staff were urged in one internal guidance paper to disguise the origin of "special source" material in their reports for fear that the role of the companies as intercept partners would cause "high-level political fallout".
  • "The criteria are security, terror, organised crime. And economic well-being. There's an auditing process to go back through the logs and see if it was justified or not. The vast majority of the data is discarded without being looked at … we simply don't have the resources."However, the legitimacy of the operation is in doubt. According to GCHQ's legal advice, it was given the go-ahead by applying old law to new technology. The 2000 Regulation of Investigatory Powers Act (Ripa) requires the tapping of defined targets to be authorised by a warrant signed by the home secretary or foreign secretary.However, an obscure clause allows the foreign secretary to sign a certificate for the interception of broad categories of material, as long as one end of the monitored communications is abroad. But the nature of modern fibre-optic communications means that a proportion of internal UK traffic is relayed abroad and then returns through the cables.
  • The categories of material have included fraud, drug trafficking and terrorism, but the criteria at any one time are secret and are not subject to any public debate. GCHQ's compliance with the certificates is audited by the agency itself, but the results of those audits are also secret.An indication of how broad the dragnet can be was laid bare in advice from GCHQ's lawyers, who said it would be impossible to list the total number of people targeted because "this would be an infinite list which we couldn't manage".There is an investigatory powers tribunal to look into complaints that the data gathered by GCHQ has been improperly used, but the agency reassured NSA analysts in the early days of the programme, in 2009: "So far they have always found in our favour".
  • Historically, the spy agencies have intercepted international communications by focusing on microwave towers and satellites. The NSA's intercept station at Menwith Hill in North Yorkshire played a leading role in this. One internal document quotes the head of the NSA, Lieutenant General Keith Alexander, on a visit to Menwith Hill in June 2008, asking: "Why can't we collect all the signals all the time? Sounds like a good summer project for Menwith."By then, however, satellite interception accounted for only a small part of the network traffic. Most of it now travels on fibre-optic cables, and the UK's position on the western edge of Europe gave it natural access to cables emerging from the Atlantic.
  • The processing centres apply a series of sophisticated computer programmes in order to filter the material through what is known as MVR – massive volume reduction. The first filter immediately rejects high-volume, low-value traffic, such as peer-to-peer downloads, which reduces the volume by about 30%. Others pull out packets of information relating to "selectors" – search terms including subjects, phone numbers and email addresses of interest. Some 40,000 of these were chosen by GCHQ and 31,000 by the NSA. Most of the information extracted is "content", such as recordings of phone calls or the substance of email messages. The rest is metadata.
  • The GCHQ documents that the Guardian has seen illustrate a constant effort to build up storage capacity at the stations at Cheltenham, Bude and at one overseas location, as well a search for ways to maintain the agency's comparative advantage as the world's leading communications companies increasingly route their cables through Asia to cut costs. Meanwhile, technical work is ongoing to expand GCHQ's capacity to ingest data from new super cables carrying data at 100 gigabits a second. As one training slide told new users: "You are in an enviable position – have fun and make the most of it."
  • British spy agency collects and stores vast quantities of global email messages, Facebook posts, internet histories and calls, and shares them with NSA, latest documents from Edward Snowden reveal
  •  
    Note particularly that the Brit criteria adds economic data to the list of categories categories the NSA trawls for and shares its data with the U.S. NSA. Both agencies claim to be targeting foreigners, so now we're into the "we surveil your citizens; you surveil our citizens, then we'll share the results" scenario that leaves both sides of the pond with a superficial excuse to say "we don't surveil our own citizens, just foreigners." But it's just ring-around-the-rosy. 850,000 NSA employees and U.S. private contractors with access to GCHQ surveillance databases.  Lots more in the article that I didn't highlight.
Paul Merrell

First Unitarian Church of Los Angeles v. NSA | Electronic Frontier Foundation - 0 views

  • Twenty-two organizations including Unitarian church groups, gun ownership advocates, and a broad coalition of membership and political advocacy organizations filed suit against the National Security Agency for violating their First Amendment right of association by illegally collecting their call records. The coalition is represented by EFF. At the heart of First Unitarian Church of Los Angeles v. NSA is the bulk telephone records collection program that was confirmed by the publication of an order from the Foreign Intelligence Surveillance Court (FISC) in June of 2013. The Director of National Intelligence (DNI) further confirmed that this formerly secret document was authentic, and part of a broader program to collect all major telecommunications customers’ call history. The order demands wholesale collection of every call made, the location of the phone, the time of the call, the duration of the call, and other “identifying information” for every phone and call for all customers of Verizon for a period of three months. Government officials further confirmed that this was just one of series of orders issued on a rolling basis since at least 2006. First Unitarian v. NSA argues that this spying violates the First Amendment, which protects the freedom to associate and express political views as a group.
  • Twenty-two organizations including Unitarian church groups, gun ownership advocates, and a broad coalition of membership and political advocacy organizations filed suit against the National Security Agency for violating their First Amendment right of association by illegally collecting their call records. The coalition is represented by EFF. At the heart of First Unitarian Church of Los Angeles v. NSA is the bulk telephone records collection program that was confirmed by the publication of an order from the Foreign Intelligence Surveillance Court (FISC) in June of 2013. The Director of National Intelligence (DNI) further confirmed that this formerly secret document was authentic, and part of a broader program to collect all major telecommunications customers’ call history. The order demands wholesale collection of every call made, the location of the phone, the time of the call, the duration of the call, and other “identifying information” for every phone and call for all customers of Verizon for a period of three months. Government officials further confirmed that this was just one of series of orders issued on a rolling basis since at least 2006. First Unitarian v. NSA argues that this spying violates the First Amendment, which protects the freedom to associate and express political views as a group.
  • Twenty-two organizations including Unitarian church groups, gun ownership advocates, and a broad coalition of membership and political advocacy organizations filed suit against the National Security Agency for violating their First Amendment right of association by illegally collecting their call records. The coalition is represented by EFF. At the heart of First Unitarian Church of Los Angeles v. NSA is the bulk telephone records collection program that was confirmed by the publication of an order from the Foreign Intelligence Surveillance Court (FISC) in June of 2013. The Director of National Intelligence (DNI) further confirmed that this formerly secret document was authentic, and part of a broader program to collect all major telecommunications customers’ call history. The order demands wholesale collection of every call made, the location of the phone, the time of the call, the duration of the call, and other “identifying information” for every phone and call for all customers of Verizon for a period of three months. Government officials further confirmed that this was just one of series of orders issued on a rolling basis since at least 2006. First Unitarian v. NSA argues that this spying violates the First Amendment, which protects the freedom to associate and express political views as a group.
  • ...5 more annotations...
  • Our goal is to highlight one of the most important ways that the government collection of telephone records is unconstitutional: it violates the First Amendment right of association. When the government gets access to the phone records of political and activist organizations and their members, it knows who is talking to whom, when, and for how long. This so-called “metadata,” especially when collected in bulk and aggregated, tracks the associations of these organizations. After all, if the government knows that you call the Unitarian Church or Calguns or People for the American Way or Students for Sensible Drug Policy regularly, it has a very good indication that you are a member and it certainly knows that you associate regularly. The law has long recognized that government access to associations can create a chilling effect—people are less likely to associate with organizations when they know the government is watching and when the government can track their associations. 
  • The case challenges the mass telephone records collection that was confirmed by the FISA Order that was published on June 5, 2013 and confirmed by the Director of National Intelligence (DNI) on June 6, 2013. The DNI confirmed that the collection was “broad in scope” and conducted under the “business records” provision of the Foreign Intelligence Surveillance Act, also known as section 215 of the Patriot Act and 50 U.S.C. section 1861. The facts have long been part of EFF’s Jewel v. NSA case. The case does not include section 702 programs, which includes the recently made public and called the PRISM program or the fiber optic splitter program that is included (along with the telephone records program) in the Jewel v. NSA case. 
  • The First Amendment right of association is a well established doctrine that prevents the government “interfering with the right to peaceably assemble or prohibit the petition for a governmental redress of grievances.” The most famous case embracing it is a 1958 Supreme Court Case from the Civil Rights era called  NAACP v. Alabama. In that case the Supreme Court held that it would violate the First Amendment for the NAACP to have to turn over its membership lists in litigation. The right stems from the simple fact that the First Amendment protects the freedom to associate and express political views as a group. This constitutional protection is critical because, as the court noted “[e]ffective advocacy of both public and private points of view, particularly controversial ones, is undeniably enhanced by group association[.]” NAACP v. Alabama, 357 U.S. at 460. As another court noted: the Constitution protects freedom of association to encourage the “advancing ideas and airing grievances” Bates v. City of Little Rock, 361 U.S. 516, 522-23 (1960).
  • The collection and analysis of telephone records give the government a broad window into our associations. The First Amendment protects against this because, as the Supreme Court has recognized, “it may induce members to withdraw from the association and dissuade others from joining it because of fear of exposure of their beliefs shown through their associations and of the consequences of their exposure.” NAACP v. Alabama, 357 U.S. at 462-63. See also Bates, 361 U.S. at 523; Gibson v. Florida Legislative Investigation Comm., 372 U.S. 539 (1963).  Privacy in one’s associational ties is also closely linked to freedom of association: “Inviolability of privacy in group association may in many circumstances be indispensable to preservation of freedom of association, particularly where a group espouses dissident beliefs.” NAACP v. Alabama, 357 U.S. at 462. 
  • The Supreme Court has made clear that infringements on freedom of association may survive constitutional scrutiny only when they “serve compelling state interests, unrelated to the suppression of ideas, that cannot be achieved through means significantly less restrictive of associational freedoms.” Roberts v. United States Jaycees, 468 U.S. 609, 623 (1984); see also NAACP v. Button, 371 U.S. at 341; Knox v. SEIU, Local 1000, 132 S. Ct. 2277, 2291 (2012)  Here, the wholesale collection of telephone records of millions of innocent Americans’ communications records, and thereby collection of their associations, is massively overbroad, regardless of the government’s interest. Thus, the NSA spying program fails under the basic First Amendment tests that have been in place for over fifty years.
  •  
    This case is related to EFF's earlier pending case, Jewel v. NSA and has been assigned to Judge Whyte, the same judge who ruled earlier in Jewel that the State Secrets Privilege does not apply to NSA's call metadata "haystack." The plaintiffs are 22 different groups who would make strange bedfellows indeed, except in opposition to government surveillance and repression. 
Paul Merrell

Tomgram: Alfred McCoy, It's About Blackmail, Not National Security | TomDispatch - 0 views

  • For more than six months, Edward Snowden’s revelations about the National Security Agency (NSA) have been pouring out from the Washington Post, the New York Times, the Guardian, Germany’s Der Spiegel, and Brazil’s O Globo, among other places.  Yet no one has pointed out the combination of factors that made the NSA’s expanding programs to monitor the world seem like such a slam-dunk development in Washington.  The answer is remarkably simple.  For an imperial power losing its economic grip on the planet and heading into more austere times, the NSA’s latest technological breakthroughs look like a bargain basement deal when it comes to projecting power and keeping subordinate allies in line -- like, in fact, the steal of the century.  Even when disaster turned out to be attached to them, the NSA’s surveillance programs have come with such a discounted price tag that no Washington elite was going to reject them.
  • What exactly was the aim of such an unprecedented program of massive domestic and planetary spying, which clearly carried the risk of controversy at home and abroad? Here, an awareness of the more than century-long history of U.S. surveillance can guide us through the billions of bytes swept up by the NSA to the strategic significance of such a program for the planet’s last superpower. What the past reveals is a long-term relationship between American state surveillance and political scandal that helps illuminate the unacknowledged reason why the NSA monitors America’s closest allies. Not only does such surveillance help gain intelligence advantageous to U.S. diplomacy, trade relations, and war-making, but it also scoops up intimate information that can provide leverage -- akin to blackmail -- in sensitive global dealings and negotiations of every sort. The NSA’s global panopticon thus fulfills an ancient dream of empire. With a few computer key strokes, the agency has solved the problem that has bedeviled world powers since at least the time of Caesar Augustus: how to control unruly local leaders, who are the foundation for imperial rule, by ferreting out crucial, often scurrilous, information to make them more malleable.
  • Once upon a time, such surveillance was both expensive and labor intensive. Today, however, unlike the U.S. Army’s shoe-leather surveillance during World War I or the FBI’s break-ins and phone bugs in the Cold War years, the NSA can monitor the entire world and its leaders with only 100-plus probes into the Internet’s fiber optic cables. This new technology is both omniscient and omnipresent beyond anything those lacking top-secret clearance could have imagined before the Edward Snowden revelations began.  Not only is it unimaginably pervasive, but NSA surveillance is also a particularly cost-effective strategy compared to just about any other form of global power projection. And better yet, it fulfills the greatest imperial dream of all: to be omniscient not just for a few islands, as in the Philippines a century ago, or a couple of countries, as in the Cold War era, but on a truly global scale. In a time of increasing imperial austerity and exceptional technological capability, everything about the NSA’s surveillance told Washington to just “go for it.”  This cut-rate mechanism for both projecting force and preserving U.S. global power surely looked like a no-brainer, a must-have bargain for any American president in the twenty-first century -- before new NSA documents started hitting front pages weekly, thanks to Snowden, and the whole world began returning the favor.
  • ...12 more annotations...
  • As the gap has grown between Washington’s global reach and its shrinking mailed fist, as it struggles to maintain 40% of world armaments (the 2012 figure) with only 23% of global gross economic output, the U.S. will need to find new ways to exercise its power far more economically. As the Cold War took off, a heavy-metal U.S. military -- with 500 bases worldwide circa 1950 -- was sustainable because the country controlled some 50% of the global gross product. But as its share of world output falls -- to an estimated 17% by 2016 -- and its social welfare costs climb relentlessly from 4% of gross domestic product in 2010 to a projected 18% by 2050, cost-cutting becomes imperative if Washington is to survive as anything like the planet’s “sole superpower.” Compared to the $3 trillion cost of the U.S. invasion and occupation of Iraq, the NSA’s 2012 budget of just $11 billion for worldwide surveillance and cyberwarfare looks like cost saving the Pentagon can ill-afford to forego. Yet this seeming “bargain” comes at what turns out to be an almost incalculable cost. The sheer scale of such surveillance leaves it open to countless points of penetration, whether by a handful of anti-war activists breaking into an FBI field office in Media, Pennsylvania, back in 1971 or Edward Snowden downloading NSA documents at a Hawaiian outpost in 2012.
  • In October 2001, not satisfied with the sweeping and extraordinary powers of the newly passed Patriot Act, President Bush ordered the National Security Agency to commence covert monitoring of private communications through the nation's telephone companies without the requisite FISA warrants. Somewhat later, the agency began sweeping the Internet for emails, financial data, and voice messaging on the tenuous theory that such “metadata” was “not constitutionally protected.” In effect, by penetrating the Internet for text and the parallel Public Switched Telephone Network (PSTN) for voice, the NSA had gained access to much of the world’s telecommunications. By the end of Bush’s term in 2008, Congress had enacted laws that not only retrospectively legalized these illegal programs, but also prepared the way for NSA surveillance to grow unchecked. Rather than restrain the agency, President Obama oversaw the expansion of its operations in ways remarkable for both the sheer scale of the billions of messages collected globally and for the selective monitoring of world leaders.
  • By 2012, the centralization via digitization of all voice, video, textual, and financial communications into a worldwide network of fiber optic cables allowed the NSA to monitor the globe by penetrating just 190 data hubs -- an extraordinary economy of force for both political surveillance and cyberwarfare.
  • With a few hundred cable probes and computerized decryption, the NSA can now capture the kind of gritty details of private life that J. Edgar Hoover so treasured and provide the sort of comprehensive coverage of populations once epitomized by secret police like East Germany’s Stasi. And yet, such comparisons only go so far. After all, once FBI agents had tapped thousands of phones, stenographers had typed up countless transcripts, and clerks had stored this salacious paper harvest in floor-to-ceiling filing cabinets, J. Edgar Hoover still only knew about the inner-workings of the elite in one city: Washington, D.C.  To gain the same intimate detail for an entire country, the Stasi had to employ one police informer for every six East Germans -- an unsustainable allocation of human resources. By contrast, the marriage of the NSA’s technology to the Internet’s data hubs now allows the agency’s 37,000 employees a similarly close coverage of the entire globe with just one operative for every 200,000 people on the planet
  • Through the expenditure of $250 million annually under its Sigint Enabling Project, the NSA has stealthily penetrated all encryption designed to protect privacy. “In the future, superpowers will be made or broken based on the strength of their cryptanalytic programs,” reads a 2007 NSA document. “It is the price of admission for the U.S. to maintain unrestricted access to and use of cyberspace.” By collecting knowledge -- routine, intimate, or scandalous -- about foreign leaders, imperial proconsuls from ancient Rome to modern America have gained both the intelligence and aura of authority necessary for dominion over alien societies. The importance, and challenge, of controlling these local elites cannot be overstated. During its pacification of the Philippines after 1898, for instance, the U.S. colonial regime subdued contentious Filipino leaders via pervasive policing that swept up both political intelligence and personal scandal. And that, of course, was just what J. Edgar Hoover was doing in Washington during the 1950s and 1960s.
  • Indeed, the mighty British Empire, like all empires, was a global tapestry woven out of political ties to local leaders or “subordinate elites” -- from Malay sultans and Indian maharajas to Gulf sheiks and West African tribal chiefs. As historian Ronald Robinson once observed, the British Empire spread around the globe for two centuries through the collaboration of these local leaders and then unraveled, in just two decades, when that collaboration turned to “non-cooperation.” After rapid decolonization during the 1960s transformed half-a-dozen European empires into 100 new nations, their national leaders soon found themselves the subordinate elites of a spreading American global imperium. Washington suddenly needed the sort of private information that could keep such figures in line. Surveillance of foreign leaders provides world powers -- Britain then, America now -- with critical information for the exercise of global hegemony. Such spying gave special penetrating power to the imperial gaze, to that sense of superiority necessary for dominion over others.  It also provided operational information on dissidents who might need to be countered with covert action or military force; political and economic intelligence so useful for getting the jump on allies in negotiations of all sorts; and, perhaps most important of all, scurrilous information about the derelictions of leaders useful in coercing their compliance.
  • In late 2013, the New York Times reported that, when it came to spying on global elites, there were “more than 1,000 targets of American and British surveillance in recent years,” reaching down to mid-level political actors in the international arena. Revelations from Edward Snowden’s cache of leaked documents indicate that the NSA has monitored leaders in some 35 nations worldwide -- including Brazilian president Dilma Rousseff, Mexican presidents Felipe Calderón and Enrique Peña Nieto, German Chancellor Angela Merkel, and Indonesia’s president Susilo Bambang Yudhoyono.  Count in as well, among so many other operations, the monitoring of “French diplomatic interests” during the June 2010 U.N. vote on Iran sanctions and “widespread surveillance” of world leaders during the Group 20 summit meeting at Ottawa in June 2010. Apparently, only members of the historic “Five Eyes” signals-intelligence alliance (Australia, Canada, New Zealand, and Great Britain) remain exempt -- at least theoretically -- from NSA surveillance. Such secret intelligence about allies can obviously give Washington a significant diplomatic advantage. During U.N. wrangling over the U.S. invasion of Iraq in 2002-2003, for example, the NSA intercepted Secretary-General Kofi Anan’s conversations and monitored the “Middle Six” -- Third World nations on the Security Council -- offering what were, in essence, well-timed bribes to win votes. The NSA’s deputy chief for regional targets sent a memo to the agency’s Five Eyes allies asking “for insights as to how membership is reacting to on-going debate regarding Iraq, plans to vote on any related resolutions [..., and] the whole gamut of information that could give U.S. policymakers an edge in obtaining results favorable to U.S. goals.”
  • Indicating Washington’s need for incriminating information in bilateral negotiations, the State Department pressed its Bahrain embassy in 2009 for details, damaging in an Islamic society, on the crown princes, asking: “Is there any derogatory information on either prince? Does either prince drink alcohol? Does either one use drugs?” Indeed, in October 2012, an NSA official identified as “DIRNSA,” or Director General Keith Alexander, proposed the following for countering Muslim radicals: “[Their] vulnerabilities, if exposed, would likely call into question a radicalizer’s devotion to the jihadist cause, leading to the degradation or loss of his authority.” The agency suggested that such vulnerabilities could include “viewing sexually explicit material online” or “using a portion of the donations they are receiving… to defray personal expenses.” The NSA document identified one potential target as a “respected academic” whose “vulnerabilities” are “online promiscuity.”
  • Just as the Internet has centralized communications, so it has moved most commercial sex into cyberspace. With an estimated 25 million salacious sites worldwide and a combined 10.6 billion page views per month in 2013 at the five top sex sites, online pornography has become a global business; by 2006, in fact, it generated $97 billion in revenue. With countless Internet viewers visiting porn sites and almost nobody admitting it, the NSA has easy access to the embarrassing habits of targets worldwide, whether Muslim militants or European leaders. According to James Bamford, author of two authoritative books on the agency, “The NSA's operation is eerily similar to the FBI's operations under J. Edgar Hoover in the 1960s where the bureau used wiretapping to discover vulnerabilities, such as sexual activity, to ‘neutralize’ their targets.”
  • Indeed, whistleblower Edward Snowden has accused the NSA of actually conducting such surveillance.  In a December 2013 letter to the Brazilian people, he wrote, “They even keep track of who is having an affair or looking at pornography, in case they need to damage their target's reputation.” If Snowden is right, then one key goal of NSA surveillance of world leaders is not U.S. national security but political blackmail -- as it has been since 1898. Such digital surveillance has tremendous potential for scandal, as anyone who remembers New York Governor Eliot Spitzer’s forced resignation in 2008 after routine phone taps revealed his use of escort services; or, to take another obvious example, the ouster of France’s budget minister Jérôme Cahuzac in 2013 following wire taps that exposed his secret Swiss bank account. As always, the source of political scandal remains sex or money, both of which the NSA can track with remarkable ease.
  • By starting a swelling river of NSA documents flowing into public view, Edward Snowden has given us a glimpse of the changing architecture of U.S. global power. At the broadest level, Obama’s digital “pivot” complements his overall defense strategy, announced in 2012, of reducing conventional forces while expanding into the new, cost-effective domains of space and cyberspace. While cutting back modestly on costly armaments and the size of the military, President Obama has invested billions in the building of a new architecture for global information control. If we add the $791 billion expended to build the Department of Homeland Security bureaucracy to the $500 billion spent on an increasingly para-militarized version of global intelligence in the dozen years since 9/11, then Washington has made a $1.2 trillion investment in a new apparatus of world power.
  • So formidable is this security bureaucracy that Obama’s recent executive review recommended the regularization, not reform, of current NSA practices, allowing the agency to continue collecting American phone calls and monitoring foreign leaders into the foreseeable future. Cyberspace offers Washington an austerity-linked arena for the exercise of global power, albeit at the cost of trust by its closest allies -- a contradiction that will bedevil America’s global leadership for years to come. To update Henry Stimson: in the age of the Internet, gentlemen don't just read each other’s mail, they watch each other’s porn. Even if we think we have nothing to hide, all of us, whether world leaders or ordinary citizens, have good reason to be concerned.
Paul Merrell

WASHINGTON: Americans' personal data shared with CIA, IRS, others in security probe | N... - 0 views

  • WASHINGTON — U.S. agencies collected and shared the personal information of thousands of Americans in an attempt to root out untrustworthy federal workers that ended up scrutinizing people who had no direct ties to the U.S. government and simply had purchased certain books.Federal officials gathered the information from the customer records of two men who were under criminal investigation for purportedly teaching people how to pass lie detector tests. The officials then distributed a list of 4,904 people – along with many of their Social Security numbers, addresses and professions – to nearly 30 federal agencies, including the Internal Revenue Service, the CIA, the National Security Agency and the Food and Drug Administration.
  • The unprecedented creation of such a list and decision to disseminate it widely demonstrate the ease with which the federal government can collect and share Americans’ personal information, even when there’s no clear reason for doing so. The case comes to light amid revelations that the NSA, in an effort to track foreign terrorists, has for years been stockpiling the data of the daily telephone and Internet communications of tens of millions of ordinary Americans. Though nowhere near as massive as the NSA programs, the polygraph inquiry is another example of the federal government’s vast appetite for Americans’ personal information and the sweeping legal authority it wields in the name of national security. “This is increasingly happening – data is being collected by the federal government for one use and then being entirely repurposed for other uses and shared,” said Fred Cate, an Indiana University-Bloomington law professor who specializes in information privacy and national security. “Yet there is no constitutional protection for sharing data within the government.”
  • While the collection of the information likely passes constitutional muster, the federal agencies involved may have violated their own privacy policies by sharing the personal information of people who aren’t government employees, several legal experts agreed.
  •  
    The inter-agency sharing of information described in this article sounds like a straightforward violation of several different sections of the federal Privacy Act. That Act places severe restrictions on inter-agency sharing of information that includes personal identifiers of members of the public, including the requirement of notifying the victims when a violation is discovered. The Act also provides a private right of action for anyone whose rights under the Act are violated with a statutory minimum damages award of $1,500 plus attorney fees and expenses of litigation.   
Paul Merrell

Cannonfire - 0 views

  • The ISIS phenomenon is as bizarre as it is horrifying. These jihadists (led by a mystery man named Abu Bakr al-Baghdadi, a.k.a. Abu Dua, a.k.a. "The Ghost" -- about whom, much more below) have achieved sudden, dramatic success. Yet nearly everyone in the Islamic world detests them. Although ISIS is often described as an offshoot of Al Qaeda, ISIS managed to alienate even Ayman al-Zawahiri, the man who assumed Bin Laden's "throne." Even fighters for the rival Nusra front -- the Syrian rebels who eat hearts and desecrate churches -- temporarily broke with ISIS, on the grounds that ISIS is too extreme. If you've been paying any attention to the news, you already know that ISIS took over Mosul, the second largest city in Iraq, which thousands of people have fled. They have also reportedly taken Tikrit, the birthplace of Saddam Hussein, although some accounts hold that government forces have retaken the city. The situation is so dire that even Iran has offered to help their one-time foes in Iraq. Of course, Shi'ite Iran does not want to see a powerful neighbor ruled by ultra-radical Sunnis.
  • From the Washington Post: Meanwhile in Mosul, one of Iraq’s most important cities, ISIS set about asserting its control, issuing an 11-point charter spelling out the creation of an Islamic state along with new laws, punishments and incentives. Alcohol, cigarettes and drugs are outlawed, citizens will henceforth be required to pray five times a day, thieves will have their hands amputated and women must stay indoors except in cases of emergency, the charter said. “To those of you who ask, who are you? The answer: We are the soldiers of the Islamic State of Iraq and Syria . . . who took it upon ourselves to bring back the glory of the Islamic Caliphate and turn back injustice and indignity,” the charter announced. Never forget who is responsible for this disaster: The neoconservatives.
  • As noted above, and as we have seen in earlier posts, the United States insured that weaponry from Libya went to anti-Assad jihadists. Before that, we supported jihadis fighting against Gaddafy of Libya:
  • ...1 more annotation...
  • Who is Abu Bakr al-Baghdadi? Born Awwad Ibrahim Ali al-Badri al-Samarrai, he received a doctorate from the Islamic University in Baghdad. In 2003, he is said to have formed a short-lived militant group in response to the American invasion.
Paul Merrell

War Gear Flows to Police Departments - NYTimes.com - 0 views

  • During the Obama administration, according to Pentagon data, police departments have received tens of thousands of machine guns; nearly 200,000 ammunition magazines; thousands of pieces of camouflage and night-vision equipment; and hundreds of silencers, armored cars and aircraft. The equipment has been added to the armories of police departments that already look and act like military units. Police SWAT teams are now deployed tens of thousands of times each year, increasingly for routine jobs.
  • As the nation’s wars abroad wind down, many of the military’s surplus tools of combat have ended up in the hands of state and local law enforcement. Totals below are the minimum number of pieces acquired since 2006 in a selection of categories.
  • Congress created the military-transfer program in the early 1990s, when violent crime plagued America’s cities and the police felt outgunned by drug gangs. Today, crime has fallen to its lowest levels in a generation, the wars have wound down, and despite current fears, the number of domestic terrorist attacks has declined sharply from the 1960s and 1970s.Continue reading the main story Police departments, though, are adding more firepower and military gear than ever. Some, especially in larger cities, have used federal grant money to buy armored cars and other tactical gear. And the free surplus program remains a favorite of many police chiefs who say they could otherwise not afford such equipment.
  • ...4 more annotations...
  • The number of SWAT teams has skyrocketed since the 1980s, according to studies by Peter B. Kraska, an Eastern Kentucky University professor who has been researching the issue for decades.The ubiquity of SWAT teams has changed not only the way officers look, but also the way departments view themselves. Recruiting videos feature clips of officers storming into homes with smoke grenades and firing automatic weapons.
  • The Pentagon program does not push equipment onto local departments. The pace of transfers depends on how much unneeded equipment the military has, and how much the police request. Equipment that goes unclaimed typically is destroyed. So police chiefs say their choice is often easy: Ask for free equipment that would otherwise be scrapped, or look for money in their budgets to prepare for an unlikely scenario.
  • Pentagon data suggest how the police are arming themselves for such worst-case scenarios. Since 2006, the police in six states have received magazines that carry 100 rounds of M-16 ammunition, allowing officers to fire continuously for three times longer than normal. Twenty-two states obtained equipment to detect buried land mines.Continue reading the main story Continue reading the main story AdvertisementIn the Indianapolis suburbs, officers said they needed a mine-resistant vehicle to protect against a possible attack by veterans returning from war.
  • The police in 38 states have received silencers, which soldiers use to muffle gunfire during raids and sniper attacks.
Paul Merrell

Data Shows Little Evidence for FBI's Concerns About Criminals 'Going Dark' | Motherboard - 0 views

  • In the last few months, several government officials, led by the FBI’s Director James Comey, have been complaining that the rise of encryption technologies would lead to a “very dark place” where cops and feds can’t fight and stop criminals. But new numbers released by the US government seem to contradict this doomsday scenario. In 2014, encryption thwarted four wiretaps out of 3,554, according to an annual report published on Wednesday by the US agency that oversees federal courts. The report reveals that state law enforcement agencies encountered encryption in 22 wiretaps last year. Out of those, cops were foiled on only two occasions. As for the feds, they encountered encryption in just three wiretaps, and could not decipher the intercepted communications in two of them.
  • In fact, cops found less encryption last year than in the year prior. In 2013, state authorities encountered encryption in 41 cases, versus 22 in 2014. At the federal level, there were three cases of encryption in 2014, against none in 2013. (The report also refers to five federal wiretaps conducted in “previous years” but only reported in 2014. Of those, the feds were able to crack the communications in four of the five.)
  • So far, the FBI has yet to put forth a valid example where encryption really thwarted an investigation. In fact, some of the examples cited by Comey have been debunked in media reports.
  • ...1 more annotation...
  • he Wiretap Report contains other interesting information that shed a light on government surveillance practices. Out of the more than 3,554 wiretaps authorized by judges, the vast majority of them (3,409 or 89 percent) were for drug related offenses. Homicide, in turn, was the reason behind only 4 percent of the the wiretaps. And virtually all of them (96%) were for “portable devices,” such as cellphones.Even if the Wiretap Report is just small a peek behind the scenes of government surveillance, it shows that for now, at least when it comes to wiretapping, the FBI’s isn’t really going dark.
Paul Merrell

Spy Tech Company 'Hacking Team' Gets Hacked | Motherboard - 0 views

  • Sometimes even the cops get robbed. The controversial Italian surveillance company Hacking Team, which sells spyware to governments all around the world, including agencies in Ethiopia, Morocco, the United Arab Emirates, as well as the US Drug Enforcement Administration, appears to have been seriously hacked. Hackers have made 500 GB of client files, contracts, financial documents, and internal emails, some as recent as 2015, publicly available for download. Hacking Team’s spokesperson Eric Rabe did not immediately respond to Motherboard’s calls and email asking for verification that the hacked information is legitimate. Without confirmation from the company itself, it’s difficult to know what percentage of the files are real—however, based on the sheer size of the breach and the information in the files, the hack appears to be authentic. What’s more, the unknown hackers announced their feat through Hacking Team’s own Twitter account.
  • he hackers composed the tweets as if they were written by Hacking Team. “Since we have nothing to hide, we're publishing all our e-mails, files, and source code,” the hackers wrote in a tweet, which included the link to around 500 Gb of files. The hackers also started tweeting a few samples of internal emails from the company. One of the screenshots shows an email dated 2014 from Hacking Team’s founder and CEO David Vincenzetti to another employee. In the email, titled “Yet another Citizen Lab attack,” Vincenzetti links to a report from the online digital rights research center Citizen Lab, at the University of Toronto’s Munk School of Global Affairs, which has exposed numerous cases of abuse from Hacking Team’s clients. Hacking Team has never revealed a list of its clients, and has always and repeatedly denied selling to sketchy governments, arguing that it has an internal procedure to address human rights concerns about prospective customers.
  • It’s unclear exactly how much the hackers got their hands on, but judging from the size of the files, it’s certainly a large collection of internal files. A source who asked to speak anonymously due to the sensitivity of the issue, told me that based on the file names and folders in the leak, the hackers who hit Hacking Team "got everything." A few hours after the initial hack, a list of alleged Hacking Team customers was posted on Pastebin. The list includes past and current customers. Among the most notable, there are a few that were previously unknown, such as the FBI, Chile, Australia, Spain, and Iraq, among others.
  • ...1 more annotation...
  • The breach on Hacking Team comes almost a year after another surveillance tech company, the competing FinFisher, was hacked in a similar way, with a hacker leaking 40 Gb of internal files. FinFisher, like Hacking Team, sells surveillance software to law enforcement agencies across the world. Their software, once surreptitiously installed on a target’s cell phone or computer, can be used to monitor the target’s communications, such as phone calls, text messages, Skype calls, or emails. Operators can also turn on the target’s webcam and exfiltrate files from the infected device.
Paul Merrell

California Assembly approves right-to-die legislation - LA Times - 0 views

  • After nearly a quarter-century of efforts in California to afford terminally ill patients the right to end their lives with a doctor’s help, state lawmakers and the governor may be on the verge of granting the dying that authority.The state Assembly on Wednesday passed a bill that would allow physicians to prescribe life-ending drugs to the terminally sick. The End of Life Option Act, which the Catholic Church and others oppose, awaits final approval by the Senate -- three months after that chamber passed a similar bill by a thin margin.The fate of the legislation is likely to rest with Gov. Jerry Brown, a former Jesuit seminary student who has yet to articulate his position on the measure. Brown has expressed concern about it, based more on legislative procedure than his own beliefs.
  • Modeled after an Oregon law enacted in 1997, California’s aid-in-dying proposal generated passionate, often deeply personal, debate among lawmakers that cut across party lines. Their discussions touched on questions of morality and mortality; trust in doctors and God’s grace; and the right of the dying to determine their own fate versus protection for the elderly and vulnerable.Assemblywoman Susan Eggman (D-Stockton), a former hospice worker and the author of the legislation, accepted hugs from many of her colleagues after the 43-34 vote that ended a two-hour debate on Wednesday.
Paul Merrell

ICREACH: How the NSA Built Its Own Secret Google -The Intercept - 0 views

  • The National Security Agency is secretly providing data to nearly two dozen U.S. government agencies with a “Google-like” search engine built to share more than 850 billion records about phone calls, emails, cellphone locations, and internet chats, according to classified documents obtained by The Intercept. The documents provide the first definitive evidence that the NSA has for years made massive amounts of surveillance data directly accessible to domestic law enforcement agencies. Planning documents for ICREACH, as the search engine is called, cite the Federal Bureau of Investigation and the Drug Enforcement Administration as key participants. ICREACH contains information on the private communications of foreigners and, it appears, millions of records on American citizens who have not been accused of any wrongdoing. Details about its existence are contained in the archive of materials provided to The Intercept by NSA whistleblower Edward Snowden. Earlier revelations sourced to the Snowden documents have exposed a multitude of NSA programs for collecting large volumes of communications. The NSA has acknowledged that it shares some of its collected data with domestic agencies like the FBI, but details about the method and scope of its sharing have remained shrouded in secrecy.
  • ICREACH has been accessible to more than 1,000 analysts at 23 U.S. government agencies that perform intelligence work, according to a 2010 memo. A planning document from 2007 lists the DEA, FBI, Central Intelligence Agency, and the Defense Intelligence Agency as core members. Information shared through ICREACH can be used to track people’s movements, map out their networks of associates, help predict future actions, and potentially reveal religious affiliations or political beliefs. The creation of ICREACH represented a landmark moment in the history of classified U.S. government surveillance, according to the NSA documents.
  • Documents published with this article: CIA Colleagues Enthusiastically Welcome NSA Training Sharing Communications Metadata Across the U.S. Intelligence Community CRISSCROSS/PROTON Point Paper Decision Memorandum for the DNI on ICREACH Metadata Sharing Memorandum Sharing SIGINT metadata on ICREACH Metadata Policy Conference ICREACH Wholesale Sharing Black Budget Extracts
  •  
     The most important Snowden disclosure yet. It's a long, detailed article, but it's a must read. I couldn't highlight any more without highlighting the entire article. Read the whole thing soon or you're going to be late for the mob with pitchforks.  This is beyond outrageous. The integrity of our entire system of government is now at issue. 
Paul Merrell

Hillary Clinton's Real Scandal Is Honduras, Not Benghazi - 0 views

  • What beats me is why more Democrats aren’t deeply troubled by the legacy of Clinton’s foreign policy blunder in Honduras. Maybe you’ve forgotten what happened in that small country in the first year of the Obama administration — more on that in a moment. But surely you’ve noticed the ugly wave of xenophobia greeting a growing number of Central American child refugees arriving on our southern border. Some of President Barack Obama’s supporters are trying to blame this immigration crisis on the Bush administration because of an anti-trafficking law George W. signed in 2008 specifically written to protect Central American children that preceded an uptick in their arrivals. But which country is the top source of kids crossing the border? Honduras, home to the world’s highest murder rate, Latin America’s worst economic inequality, and a repressive U.S.-backed government. When Honduran military forces allied with rightist lawmakers ousted democratically elected President Manuel Zelaya in 2009, then-Secretary of State Clinton sided with the armed forces and fought global pressure to reinstate him.
  • Washington wields great influence over Honduras, thanks to the numerous military bases built with U.S. funds where training and joint military and anti-drug operations take place. Since the coup, nearly $350 million in U.S. assistance, including more than $50 million in military aid has poured into the country. That’s a lot of investment in a nation where the police, the military, and private security forces are killing people with alarming frequency and impunity, according to Human Rights Watch. In short, desperate Honduran children are seeking refuge from a human rights nightmare that would cast a dark cloud over Clinton’s presidential bid right now if the media were paying any attention. That wouldn’t give Republicans a big advantage, of course. Until they stop alienating a majority of female voters and communities of color, I find it hard to see the party of Mitt Romney and John McCain winning the White House.
  • Given the Democratic Party’s demographic edge, progressives have nothing to lose by seizing on the GOP field’s weakness and pressing for a viable alternative to another Clinton administration. Senator Elizabeth Warren could prove a contender. Unfortunately, the consumer-rights firebrand and Massachusetts Democrat lacks any foreign policy experience. And foreign policy is no afterthought these days. Israel — the recipient of $3.1 billion a year in U.S. military aid — is waging a ground war in Gaza, and the stakes in the Russia-Ukraine conflict just grew following the downing of that Malaysia Airlines jet. Plus, Iraq is growing more violent and unstable once more. On all these issues, Clinton is more hawkish than most of the Democratic base. But other Democrats with a wide range of liberal credentials and foreign policy expertise are signaling some interest in running, especially if Clinton ultimately sits out the race. Even if Clinton does win in 2016, a serious progressive primary challenge could help shape her presidency. As more and more Honduran kids cross our border in search of a safe haven, voters should take a good look at her track record at the State Department and reconsider the inevitability of another Clinton administration.
Paul Merrell

SANTIAGO, Chile: Chilean accused of murder, torture taught 13 years for Pentagon | Nati... - 0 views

  • A member of the late Chilean dictator Augusto Pinochet’s brutal secret police who’s been accused of murder taught for more than a decade at the Pentagon’s premier university, despite repeated complaints by his colleagues about his past. Jaime Garcia Covarrubias is charged in criminal court in Santiago with being the mastermind in the execution-style slayings of seven people in 1973, according to court documents. McClatchy also interviewed an accuser who identified Garcia Covarrubias as the person who sexually tortured him.Despite knowing of the allegations, State and Defense department officials allowed Garcia Covarrubias to retain his visa and continue working at a school affiliated with the National Defense University until last year .Human rights groups also question the school’s selection of a second professor, Colombia’s former top military commander.
  • Some Latin America experts said the hirings by the William J. Perry Center for Hemispheric Defense Studies reflected a continuing inclination by the U.S government to overlook human rights violations in Latin America, especially in countries where it funded efforts to quash leftists. But those experts were especially troubled by Garcia Covarrubias’ long tenure at one of the nation’s most renowned defense institutions. “His hiring undermines our moral authority on both human rights and in the war on terror,” said Chris Simmons, a former Defense Intelligence Agency and Army intelligence officer from 1982 to 2010 who specializes in Latin America. “If he is in fact guilty of what he is accused of, he is a terrorist. Then who are we to tell other countries how they should be fighting terrorism?” To his supporters, Garcia Covarrubias is a brilliant thinker with a Ph.D. and purveyor of leadership skills. To his alleged victims, he’s a sadistic torturer with a penchant for horsewhips and perversity.
  • A 2008 Chilean military document reviewed by McClatchy identified Garcia Covarrubias as a member of the Dirección de Inteligencia Nacional, the feared spy agency known by its acronym DINA.“DINA was simply the most sinister agency in Latin America,” said Peter Kornbluh, a senior analyst with the National Security Archive, which secured the release of U.S. government classified documents underscoring the complicit relationship between the U.S. and Pinochet. “Anyone associated with that agency should never have been allowed into this country, let alone given this job.”Officials with the Pentagon, the State Department and the school refused to comment. Garcia Covarrubias is now back in Chile, ordered by an investigative judge in January 2014 to remain in the country while an inquiry continues into his alleged role in the deaths of seven people in Temuco weeks after the U.S.-backed Pinochet coup on Sept. 11, 1973. His case is one of 108 involving tortured, disappeared or murdered supporters of the deposed elected president, Salvador Allende. More than 3,000 people died at the hands of the regime, and in 2003, then-Secretary of State Colin Powell offered regrets for U.S. involvement in the coup, calling it “not a part of American history that we're proud of.”
  • ...4 more annotations...
  • The center’s officials who hired and renewed Garcia Covarrubias’ contracts say he was a highly qualified professor and minimize the allegations against him. “We made inquiries with people in the region, in Chile and so forth, and were never given anything negative about Jaime,” said Margaret Daly Hayes, the center’s first director. “He was vetted by the U.S. government, by the (U.S.) Embassy. They obviously didn’t have anything either or he wouldn’t have been hired.”McClatchy, however, located one of his alleged victims, who described being brutalized by him. “They submitted us to torture, twice a day. We were submerged in feces,” Herman Carrasco, who’s now a real estate agent, told McClatchy in Chile. “They stuck rifle barrels in our anuses.”According to Carrasco, the torture unfolded in October and November 1973 – lorded over by the horsewhip-wielding Garcia Covarrubias – and included electric shock administered to eyelids, genitals and other sensitive areas of the body.“He was the person who tortured us, with his face shown,” said Carrasco, who added that he’d known Garcia Covarrubias from social events before the coup. “He forced us into sexual acts, which shows that besides ferocious cruelty there was a level of psychopathic behavior.”
  • Despite very graphic torture accusations against Garcia Covarrubias, U.S. officials are rallying behind him.
  • As the center supported Garcia Covarrubias, it pushed out Andersen in retaliation, the former communications chief said.Last September, Andersen filed a complaint with the Pentagon’s inspector general, with the support of then-Sen. Carl Levin. D-Mich. An inspector general spokeswoman declined to comment. “It’s shameful that at a time the U.S. prestige as a democracy is under attack, that the National Defense University could be playing footsie with a former state terrorism agent,” Andersen said. The details uncovered about Garcia Covarrubias have prompted demands from several members of Congress for a Pentagon accounting of how he was hired and retained his job.“The American people deserve to know that adequate vetting of such individuals would be routine,” said Sen. Patrick Leahy, D-Vt., author of the “ Leahy Law,” which restricts U.S. assistance to foreign security forces that violate human rights.
  • While most of the concerns focused on Garcia Covarrubias, the center also took heat in 2006 for hiring Colombian Gen. Carlos Ospina Ovalle. As army commander, he turned the tables in a decades-old guerrilla war while simultaneously crushing drug cartels. Ospina Ovalle left the center last year and took a post at another National Defense University school.He was hired at the request of the Colombian government and was popular with U.S. military leaders, recalls Downie, the center’s director at the time. “The Colombians wanted, for his own safety, to get him out of Colombia,” said Downie. “This is a guy we certainly wanted to have as a professor.”Human rights groups, however, criticized the general’s hiring and continued employment at the National Defense University. They point to his earlier command in Antioquia province, where right-wing paramilitaries ran roughshod and were linked to the military.“Antioquia in the late 1990s . . . is less than one degree of separation from working with the paramilitaries,” said Adam Isacson, a senior associate specializing in military matters for the Washington Office on Latin America. “If he has not, it’s some miracle that he managed to be the one clean officer.”“Having officers like that, the implicit message is that human rights takes a backseat,” said Isacson.
Paul Merrell

Why the United States Always Loses Its Wars | Global Research - 0 views

  • America loses all its wars because it seems we’ve always been on the wrong side of history. Morally nor legally should any nation have the right to invade and occupy another sovereign nation, much less believe it can achieve victory in long, protracted wars. Yet in violation of all ethical precepts and all international laws, the sole global superpower citing its impunity through exceptionalism hypocritically insists it can maintain its moral high ground in its relentless pursuit of regime changes anywhere it so chooses on earth. We are the global village bully that’s hated by much of the world. And it’s pure self-aggrandizing bullshit to perpetrate the myth that America is hated because of our “freedom,” another rhetorical brainwashing lie. We now live in a fascist totalitarian police state run by a globalized crime syndicate of the central banking cabal. As of last April per a Princeton-Northwestern study the US has officially been designated an oligarchy. Last year after a group of ethnic Russians living in Crimea voted to become part of Russia, the Russian military claimed control over its own naval base there that the US-NATO had been lusting to steal after the unlawful overthrow of Ukraine’s democratically elected sovereign government. Ever since it’s been nonstop lies and propaganda propagated to demonize Putin as the aggressor when in fact all along it’s the American Empire that’s been recklessly pushing what could end up World War III against nuclear powered Russia. With US-NATO missiles installed on Russia’s doorstep in virtually every former Soviet eastern bloc nation, hemming Russia in, who’s really the aggressor here?
  • Meanwhile, despite costing US taxpayers up to six trillion dollars and counting in Iraq alone and another trillion so far in Afghanistan in this age of increasing austerity, the albeit detached reverence for the US military and its abysmal losing war record fail to draw much notice or reflection, much less any real criticism or troubleshooting that might correct the same pattern of mistakes being repeated indefinitely. Another article in the same issue calls for resurrecting the draft as the feeble answer, something my ex-West Point roommate-former Afghan Ambassador-retired general and current Council on Foreign Relations (CFR) member Karl Eikenberry has also publicly advocated. They are all missing the point, unwilling or unable to address the pink elephant in the global room. Respected author-activist David Swanson wrote an incisive rebuttal also confronting the Atlantic article for not answering the obvious question of why America loses at war. He makes the excellent point: The U.S. has killed huge numbers of men, women, and children, made itself hated, made the world more dangerous, destroyed the environment, discarded civil liberties, and wasted trillions of dollars that could have done a world of good spent otherwise. A draft would do nothing to make people aware of that situation. But Swanson merely glides over as a passing fact that the ruling elite is the only entity that stands to gain from war. He fails to emphasize that it is the elite’s power, money and influence that both initiates, but then by calculated design, willfully sabotages the chance of any US military victory after World War II. The reason is simple. If the US triumphed in war it would only delay the totalitarian New World Order from materialization. Only a weakened United States would expeditiously promote a one world government.
  • As a brief historical review tracing events from the dawn of the twentieth century, media mogul Randolph Hearst used the false flag of the Spanish American War to “remember the USS Maine” sinking in the 1898 Havana harbor as its deceitful justification to ruthlessly, violently colonize Cuba and the Philippines, committing ethnic cleansing with estimates as high as near a half million dead Filipinos in that bloodbath. Then it was the “great” English statesman Winston Churchill who plotted the sinking of the Lusitania killing nearly 1200 of his own British citizens (along with 128 Americans) as the baited sacrifice secretly carrying arms to ignite the First World War that was supposed to end all wars.
  • ...6 more annotations...
  • Then several years later the US encouraged South Korean incursions into Communist North Korea in order to manipulate North Korea into responding in kind. Guaranteeing South Korea full UN support, when the baited North Koreans retaliated by moving two miles inside the South Korean border, that June 1950 “transgression” immediately became the false pretense used to initiate the Korean War.
  • in August 1964 President Johnson lied to the American people with the bogus claim that a US Navy ship was attacked by North Vietnamese gunboats in the Gulf of Tonkin to launch America’s longest running war in history (that is until this century’s everlasting war of terror). That false flag cost near 60,000 American lives and over 3 million dead Southeast Asians, in addition to being the first US humiliating war defeat in its history, marking the first of many consecutive losses.
  • The smaller, less intensive military campaigns of Grenada, Panama, Nicaragua and El Salvador, the First Gulf War, Haiti, Bosnia and Kosovo were all jingoistic saber rattling manipulations of imperialistic Empire overpowering far weaker opponents to take down former US allied dictators (or in the case of Saddam Hussein a preliminary step to the father-son neocon tag team), balkanizing a divide and conquer strategy for global hegemony and imperial war profiteering from the always lucrative drug trafficking trade.
  • Meanwhile, the only true winners of all wars is the oligarch owned and controlled central banking cabal and its Wall Street 500. Once American Empire wreaks military havoc to achieve another ravaged failed state, be it Afghanistan, Iraq, Libya, Somalia, Yemen, a second invasion that becomes the permanent occupation arrives in the form of IMF and World Bank loans. When the war destroyed nation cannot pay the bankster cabal’s loan shark extortion, privatization through transnational corporations rapidly descends as economic hit men-vultures move in for the final kill. The game’s been rigged, set up so no one but the filthy, gluttonous, bloodthirsty, psychopathic vampires comprising the ruling elite can possibly win from all this rigged warring death and destruction.
  • The Zionist neocon creation with a little help from their Saudi-Israeli evil axis friends pulled off the coup of the century on 9/11, massacring 3,000 Americans as their sacrificial lambs, setting into motion the fabricated war on terror masking their actual war on Islam to ensure that a constant fresh supply of made-by-the-USA enemy materializes to justify permanent global violence. During the near ten years that Americans fought in Iraq near a half million Iraqis lost their life, mostly innocent civilians. That toll has only since risen with war still raging. The Islamic State jihadists that the US-Saudi-Israeli unholy alliance secretly created, trained, armed and has funded (just as it did al Qaeda for decades) invaded Iraq last June and is currently in control of more area in Iraq than the weak US puppet government in Baghdad with no end of sectarian violence in sight. Afghanistan looks no better with the puppet Kabul government holding less territory than the surging Taliban that has been waiting for the US military exodus by December 2014 leaving 10,800 US military advisors still remaining behind.
  • The proxy wars leaving Libya as a corrupt and lawlessly violent failed state and Syria a stalemated quagmire with Islamic State mercenaries our not-so-secret friendly boots on the ground still unable to topple and remove Assad from power. Meanwhile, near a quarter of a million people have died in the war in Syria and an astounding 6.5 million have been displaced in that colossal human tragedy supported and caused by the United States.
Paul Merrell

POGO Provides Statement for House Hearing on VA Whistleblowers - 0 views

  • In the spring of 2014, the Project On Government Oversight (POGO) put out the call to whistleblowers within the Department of Veterans Affairs (VA) to provide an inside perspective on the issues the Department was facing. In our 34-year history, POGO has never received as many submissions on a single issue. Nearly 800 current and former VA employees and veterans from 35 states and the District of Columbia contacted us. POGO reviewed each of the submissions, and found that concerns about the VA go far beyond long or falsified wait times for medical appointments; they extend to the quality of health care services veterans receive. A recurring and fundamental theme became clear: VA employees across the country fear they will face repercussions if they dare to raise a dissenting voice. POGO wrote a letter to Acting VA Secretary Sloan Gibson in July last year, highlighting three specific cases of current or former employees who agreed to share details about their personal experiences of retaliation.[1] In California, a VA inpatient pharmacy supervisor was placed on administrative leave and ordered not to speak out after protesting “inordinate delays” in delivering medication to patients and “refusal to comply with VHA regulations.” In one case, he said, a veteran’s epidural drip of pain control medication ran dry, and another veteran developed a high fever after he was administered a chemotherapy drug after its expiration point.
  • In Pennsylvania, a former VA doctor told POGO that he had been removed from clinical work and forced to spend his days in an office with nothing to do. This action occurred after he complained that, in medical emergencies, physicians who were supposed to be on call were failing or refusing to report to the hospital. The Office of Special Counsel (OSC) shared his concerns, writing “[w]e have concluded that there is a substantial likelihood that the information that you provided to OSC discloses a substantial and specific danger to public health and safety.”[2] In Appalachia, a former VA nurse told POGO she was intimidated by management and forced out of her job after she raised concerns that patients with serious injuries were being neglected. In one case she was reprimanded for referring a patient to the VA’s patient advocate after weeks of being unable to arrange transportation for a medical test to determine if he was in danger of sudden death. “Such an upsetting thing for a nurse just to see this blatant neglect occur almost on a daily basis. It was not only overlooked but appeared to be embraced,” she said. She also pointed out that there is “a culture of bullying employees….It’s just a culture of harassment that goes on if you report wrongdoing,” she said.
  • That culture doesn’t appear to be limited to just one or two VA clinics. Some people, including former employees who are now beyond the reach of VA management, were willing to be interviewed by POGO and to be quoted by name, but others said they contacted us anonymously because they are still employed at the VA and are worried about retaliation. One put it this way: “Management is extremely good at keeping things quiet and employees are very afraid to come forward.” This kind of fear and suppression of whistleblowers who report wrongdoing often culminates in the larger problems, as the VA is currently experiencing. By now it is well known that employees who recently raised concerns about veteran wait times faced reprisal. But whistleblower retaliation in the VA is nothing new. In 1992 a congressional report detailed the experiences of VA employees who were harassed or fired after reporting problems.[3] Throughout the 1990s there were several congressional hearings conducted on the quality of care at VA hospitals and on reprisal against VA employees who exposed inadequate care.[4] Despite then-Secretary Togo D. West’s declaration that such reprisals would not be tolerated, a House hearing in 1999 found that the reprisal problems still existed.[5] A Government Accountability Report from 2000 found that many VA employees were unaware of their rights to protections against retaliation for blowing the whistle on wrongdoing.[6] The report also found that the majority of employees feared retaliation and were therefore unwilling to report misconduct.
  • ...6 more annotations...
  • The Office of Special Counsel (OSC) has been working to investigate claims of retaliation and get favorable actions for many of the VA whistleblowers who have come forward. Since April 2014, the OSC has successfully obtained corrective actions for over 25 whistleblowers.[7] But the OSC still has over 100 pending VA reprisal cases to investigate, among the highest of any government agency, according to Special Counsel Carolyn Lerner.[8] Although the VA has been cooperative with the OSC and their recommendations, merely addressing isolated incidents is not enough.[9] The VA has been struggling with a culture problem for decades and something more must be done.
  • VA employees who have concerns about management or fear retaliation are supposed to be able to turn to the VA’s Office of Inspector General (OIG). But whistleblowers have come to doubt the VA IG’s willingness to hold wrongdoers accountable. Since 2014, the IG Office has not yet publically released any investigation into employee retaliation, making it difficult to assess how seriously the IG’s office is taking this issue. Furthermore, the VA IG’s office issued an administrative subpoena to POGO in May 2014 that was little more than an invasive fishing expedition for whistleblowers. The IG demanded “All records that POGO has received from current or former employees of the Department of Veterans Affairs, and other individuals or entities.”[10] Though POGO did not comply with the subpoena, such an action was cause for concern for many of the whistleblowers who had shared information with us. POGO remains concerned that there is not a permanent VA IG in place and that the position has been vacant for over a year.[11] Our own investigations have found that the absence of permanent leadership can have a serious impact on the effectiveness of an IG office.[12] Acting IGs do not undergo the same kind of extensive vetting process required of permanent IGs, and as a consequence usually lack the credibility of a permanent IG. Acting IGs also often seek appointment to the permanent position, which can compromise their independence by giving them an incentive to curry favor with the White House and the leadership of their agency.[13] Perhaps most worrisome, given the significant challenges facing the VA IG, a 2009 study found that vacancies in top agency positions promote agency inaction, create confusion among career employees, make an agency less likely to handle controversial issues, result in fewer enforcement actions by regulatory agencies and decrease public trust in government.[14]
  • It appears the VA IG may be subject to this dangerous lack of independence. For example, the VA OIG has failed to release the results of 140 health care investigations since 2006.[15] Furthermore, the Department of Treasury IG sent a letter to this Committee just last month raising concerns about another VA IG investigation. After speaking to witnesses familiar with the situation, the Treasury IG concluded that their testimony, “calls into question the integrity of the VA OIG’s actions in this particular manner.” The Treasury IG’s investigation also found that multiple witnesses stated a VA employee boasted about his ability to influence the VA OIG’s investigations.[16]
  • In POGO’s 2014 letter, we recommended concrete steps for incoming VA Secretary McDonald to take in order to demonstrate an agency-wide commitment to changing the VA’s culture of fear, bullying, and retaliation. Neither Acting Secretary Sloan Gibson nor Secretary McDonald have responded to our multiple requests for a meeting. Clearly, an important first step will be for the President to nominate a permanent IG for the VA. Hopefully strong and committed leadership in that office will correct its current course. POGO recommended that Secretary McDonald make a tangible and meaningful gesture to support those whistleblowers who have been trying to fix the VA from the inside. Once the OSC has identified meritorious cases, Secretary McDonald should personally meet with those whistleblowers and elevate their status from villain to hero. These employees should be publicly celebrated for their courage, and should receive positive recognition in their personnel files, including possibly receiving the types of bonuses that have been provided to wrongdoers in the past. Retaliation against whistleblowers is already a prohibited personnel practice, but it will be up to the senior-most VA leadership to ensure that this rule is enforced by the agency. This should not be an isolated event done in response to recent criticisms but an ongoing effort. Whistleblowing must be encouraged and celebrated or wrongdoing will continue.
  • But it’s not just the VA Secretary who can work to fix this problem. Congress should enact legislation that codifies accountability for those who retaliate against whistleblowers. The definition of “wrongdoing” must include retaliation. The cultural shift that is required inside the Department of Veterans Affairs must be accompanied by statutory mandates that protect whistleblowers and witnesses inside the agency from retaliation. Legislation should ensure that whistleblowers are able to be confident that stepping forward to expose wrongdoing will not result in retaliation, and should provide a system to hold retaliators within the VA accountable. Congress should also extend whistleblower protections to contractors and veterans who raise concerns about medical care provided by the VA. POGO’s investigation found that both of these groups also fear retaliation that prevents them from coming forward. While federal employees working at the VA enjoy whistleblower protections, contractors do not. Congress should extend the same protections to contractors in order to promote internal oversight in an increasingly contractor-heavy landscape.
  • In addition, a veteran who is receiving poor care should be able to speak to his or her patient advocate without fear of retaliation, including a reduction in the quality of health care. Without this reassurance, there is a disincentive to report poor care, allowing it to continue uncorrected. Congress should extend whistleblower protections to veteran whistleblowers. The VA and Congress must work together to end this culture of fear and retaliation. Whistleblowers who report concerns that affect veteran health must be lauded, not shunned. And the law must protect them.
Paul Merrell

Apple could use Brooklyn case to pursue details about FBI iPhone hack: source | Reuters - 0 views

  • If the U.S. Department of Justice asks a New York court to force Apple Inc to unlock an iPhone, the technology company could push the government to reveal how it accessed the phone which belonged to a shooter in San Bernardino, a source familiar with the situation said.The Justice Department will disclose over the next two weeks whether it will continue with its bid to compel Apple to help access an iPhone in a Brooklyn drug case, according to a court filing on Tuesday.The Justice Department this week withdrew a similar request in California, saying it had succeeded in unlocking an iPhone used by one of the shooters involved in a rampage in San Bernardino in December without Apple's help.The legal dispute between the U.S. government and Apple has been a high-profile test of whether law enforcement should have access to encrypted phone data.
  • Apple, supported by most of the technology industry, says anything that helps authorities bypass security features will undermine security for all users. Government officials say that all kinds of criminal investigations will be crippled without access to phone data.Prosecutors have not said whether the San Bernardino technique would work for other seized iPhones, including the one at issue in Brooklyn. Should the Brooklyn case continue, Apple could pursue legal discovery that would potentially force the FBI to reveal what technique it used on the San Bernardino phone, the source said. A Justice Department representative did not have immediate comment.
« First ‹ Previous 81 - 95 of 95
Showing 20 items per page