Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged email-content

Rss Feed Group items tagged

Paul Merrell

NYPD Blows Whistle on New Hillary Emails: Money Laundering, Sex Crimes with Children, C... - 1 views

  • New York Police Department detectives and prosecutors working an alleged underage sexting case against former Congressman Anthony Weiner have turned over a newly-found laptop he shared with wife Huma Abedin to the FBI with enough evidence “to put Hillary (Clinton) and her crew away for life,” NYPD sources told True Pundit. NYPD sources said Clinton’s “crew” also included several unnamed yet implicated members of Congress in addition to her aides and insiders. The NYPD seized the computer from Weiner during a search warrant and detectives discovered a trove of over 500,000 emails to and from Hillary Clinton, Abedin and other insiders during her tenure as secretary of state. The content of those emails sparked the FBI to reopen its defunct email investigation into Clinton on Friday.
  • But new revelations on the contents of that laptop, according to law enforcement sources, implicate the Democratic presidential candidate, her subordinates, and even select elected officials in far more alleged serious crimes than mishandling classified and top secret emails, sources said. NYPD sources said these new emails include evidence linking Clinton herself and associates to: Money laundering Child exploitation Sex crimes with minors (children) Perjury Pay to play through Clinton Foundation Obstruction of justice Other felony crimes NYPD detectives and a NYPD Chief, the department’s highest rank under Commissioner, said openly that if the FBI and Justice Department fail to garner timely indictments against Clinton and co- conspirators, NYPD will go public with the damaging emails now in the hands of FBI Director James Comey and many FBI field offices. “What’s in the emails is staggering and as a father, it turned my stomach,” the NYPD Chief said. “There is not going to be any Houdini-like escape from what we found. We have copies of everything. We will ship them to Wikileaks or I will personally hold my own press conference if it comes to that.”
  • The NYPD Chief said once Comey saw the alarming contents of the emails he was forced to reopen a criminal probe against Clinton. “People are going to prison,” he said. Meanwhile, FBI sources said Abedin and Weiner were cooperating with federal agents, who have taken over the non-sexting portions the case from NYPD. The husband-and-wife Clinton insiders  are both shopping for separate immunity deals, sources said. “If they don’t cooperate they are going to see long sentences,” a federal law enforcement source said. NYPD sources said Weiner or Abedin stored all the emails in a massive Microsoft Outlook program on the laptop. The emails implicate other current and former members of Congress and one high-ranking Democratic Senator as having possibly engaged in criminal activity too, sources said. Prosecutors in the office of US Attorney Preet Bharara have issued a subpoena for Weiner’s cell phones and travel records, law enforcement sources confirmed. NYPD said it planned to order the same phone and travel records on Clinton and Abedin, however, the FBI said it was in the process of requesting the identical records. Law enforcement sources are particularly interested in cell phone activity and travel to the Bahamas, U.S. Virgin Islands and other locations that sources would not divulge.
  • ...4 more annotations...
  • The new emails contain travel documents and itineraries indicating Hillary Clinton, President Bill Clinton, Weiner and multiple members of Congress and other government officials accompanied convicted pedophile billionaire Jeffrey Epstein on his Boeing 727 on multiple occasions to his private island in the U.S Virgin Islands, sources said. Epstein’s island has also been dubbed Orgy Island or Sex Slave Island where Epstein allegedly pimps out underage girls and boys to international dignitaries. Both NYPD and FBI sources confirm based on the new emails they now believe Hillary Clinton traveled as Epstein’s guest on at least six occasions, probably more when all the evidence is combed, sources said. Bill Clinton, it has been confirmed in media reports spanning recent years, that he too traveled with Epstein over 20 times to the island.
  • According to other uncovered emails, Abedin and Clinton both sent and received thousands of classified and top secret documents to personal email accounts including Weiner’s unsecured campaign web site which is managed by Democratic political consultants in Washington D.C. Weiner maintained little known email accounts that the couple shared on the website anthonyweiner.com. Weiner, a former seven-term Democratic Congressman from New York, primarily used that domain to campaign for Congress and for his failed mayoral bid of New York City. At one point, FBI sources said, Abedin and Clinton’s classified and top secret State Department documents and emails were stored in Weiner’s email on a server shared with a dog grooming service and a western Canadian bicycle shop. However, Weiner and Abedin, who is Hillary Clinton’s closest personal aide, weren’t the only people with access to the Weiner’s email account. Potentially dozens of unknown individuals had access to Abedin’s sensitive State Department emails that were stored in Weiner’s email account, FBI sources confirmed. FEC records show Weiner paid more than $92,000 of congressional campaign funds to Anne Lewis Strategies LLC to manage his email and web site. According to FBI sources, the D.C.-based political consulting firm has served as the official administrator of the anthonyweiner.com domain since 2010, the same time Abedin was working at the State Department. This means technically Weiner and Abedin’s emails, including top secret State Department emails, could have been accessed, printed, discussed, leaked, or distributed by untold numbers of personnel at the Anne Lewis consulting firm because they can control where the website and it emails are pointed, FBI sources said.
  • According to FBI sources, the bureau’s newly-minted probe into Clinton’s use and handling of emails while she served as secretary of state, has also been broadened to include investigating new email-related revelations, including: Abedin forwarded classified and top secret State Department emails to Weiner’s email Abedin stored emails, containing government secrets, in a special folder shared with Weiner warehousing over 500,000 archived State Department emails. Weiner had access to these classified and top secret documents without proper security clearance to view the records Abedin also used a personal yahoo address and her Clintonemail.com address to send/receive/store classified and top secret documents A private consultant managed Weiner’s site for the last six years, including three years when Clinton was secretary of state, and therefore, had full access to all emails as the domain’s listed registrant and administrator via Whois email contacts. Because Weiner’s campaign website is managed by the third-party consultant and political email guru, FBI agents are burdened with the task of trying to decipher just how many people had access to Weiner’s server and emails and who were these people. Or if the server was ever compromised by hackers, or other actors.
  • Abedin told FBI agents in an April interview that she didn’t know how to consistently print documents or emails from her secure Dept. of State system. Instead, she would forward the sensitive emails to her yahoo, Clintonemail.com and her email linked to Weiner. Abedin said, according to FBI documents, she would then access those email accounts via webmail from an unclassified computer system at the State Dept. and print the documents, many of which were classified and top secret, from the largely unprotected webmail portals. Clinton did not have a computer in her office on Mahogany Row at the State Dept. so she was not able to read timely intelligence unless it was printed out for her, Abedin said. Abedin also said Clinton could not operate the secure State Dept. fax machine installed in her Chappaqua, NY home without assistance. Perhaps more alarming, according to the FBI’s 302 Report detailing its interview with Abedin, none of the multiple FBI agents and Justice Department officials who conducted the interview pressed Abedin to further detail the email address linked to Weiner. There was never a follow up, according to the 302 report. But now, all that has changed, with the FBI’s decision to reopen the Clinton email investigation and the husband and wife seeking immunity deals to testify against Clinton and other associates about the contents of the laptop’s emails.
  •  
    "New York Police Department detectives and prosecutors working an alleged underage sexting case against former Congressman Anthony Weiner have turned over a newly-found laptop he shared with wife Huma Abedin to the FBI with enough evidence "to put Hillary (Clinton) and her crew away for life," NYPD sources told True Pundit. NYPD sources said Clinton's "crew" also included several unnamed yet implicated members of Congress in addition to her aides and insiders. The NYPD seized the computer from Weiner during a search warrant and detectives discovered a trove of over 500,000 emails to and from Hillary Clinton, Abedin and other insiders during her tenure as secretary of state. The content of those emails sparked the FBI to reopen its defunct email investigation into Clinton on Friday. But new revelations on the contents of that laptop, according to law enforcement sources, implicate the Democratic presidential candidate, her subordinates, and even select elected officials in far more alleged serious crimes than mishandling classified and top secret emails, sources said. NYPD sources said these new emails include evidence linking Clinton herself and associates to: Money laundering Child exploitation Sex crimes with minors (children) Perjury Pay to play through Clinton Foundation Obstruction of justice Other felony crimes NYPD detectives and a NYPD Chief, the department's highest rank under Commissioner, said openly that if the FBI and Justice Department fail to garner timely indictments against Clinton and co- conspirators, NYPD will go public with the damaging emails now in the hands of FBI Director James Comey and many FBI field offices. "What's in the emails is staggering and as a father, it turned my stomach," the NYPD Chief said. "There is not going to be any Houdini-like escape from what we found. We have copies of everything. We will ship them to Wikileaks or I will personally hold my own press conference if it comes to that." The NYPD
Paul Merrell

Canadian Spies Collect Domestic Emails in Secret Security Sweep - The Intercept - 0 views

  • Canada’s electronic surveillance agency is covertly monitoring vast amounts of Canadians’ emails as part of a sweeping domestic cybersecurity operation, according to top-secret documents. The surveillance initiative, revealed Wednesday by CBC News in collaboration with The Intercept, is sifting through millions of emails sent to Canadian government agencies and departments, archiving details about them on a database for months or even years. The data mining operation is carried out by the Communications Security Establishment, or CSE, Canada’s equivalent of the National Security Agency. Its existence is disclosed in documents obtained by The Intercept from NSA whistleblower Edward Snowden. The emails are vacuumed up by the Canadian agency as part of its mandate to defend against hacking attacks and malware targeting government computers. It relies on a system codenamed PONY EXPRESS to analyze the messages in a bid to detect potential cyber threats.
  • Last year, CSE acknowledged it collected some private communications as part of cybersecurity efforts. But it refused to divulge the number of communications being stored or to explain for how long any intercepted messages would be retained. Now, the Snowden documents shine a light for the first time on the huge scope of the operation — exposing the controversial details the government withheld from the public. Under Canada’s criminal code, CSE is not allowed to eavesdrop on Canadians’ communications. But the agency can be granted special ministerial exemptions if its efforts are linked to protecting government infrastructure — a loophole that the Snowden documents show is being used to monitor the emails. The latest revelations will trigger concerns about how Canadians’ private correspondence with government employees are being archived by the spy agency and potentially shared with police or allied surveillance agencies overseas, such as the NSA. Members of the public routinely communicate with government employees when, for instance, filing tax returns, writing a letter to a member of parliament, applying for employment insurance benefits or submitting a passport application.
  • Chris Parsons, an internet security expert with the Toronto-based internet think tank Citizen Lab, told CBC News that “you should be able to communicate with your government without the fear that what you say … could come back to haunt you in unexpected ways.” Parsons said that there are legitimate cybersecurity purposes for the agency to keep tabs on communications with the government, but he added: “When we collect huge volumes, it’s not just used to track bad guys. It goes into data stores for years or months at a time and then it can be used at any point in the future.” In a top-secret CSE document on the security operation, dated from 2010, the agency says it “processes 400,000 emails per day” and admits that it is suffering from “information overload” because it is scooping up “too much data.” The document outlines how CSE built a system to handle a massive 400 terabytes of data from Internet networks each month — including Canadians’ emails — as part of the cyber operation. (A single terabyte of data can hold about a billion pages of text, or about 250,000 average-sized mp3 files.)
  • ...1 more annotation...
  • The agency notes in the document that it is storing large amounts of “passively tapped network traffic” for “days to months,” encompassing the contents of emails, attachments and other online activity. It adds that it stores some kinds of metadata — data showing who has contacted whom and when, but not the content of the message — for “months to years.” The document says that CSE has “excellent access to full take data” as part of its cyber operations and is receiving policy support on “use of intercepted private communications.” The term “full take” is surveillance-agency jargon that refers to the bulk collection of both content and metadata from Internet traffic. Another top-secret document on the surveillance dated from 2010 suggests the agency may be obtaining at least some of the data by covertly mining it directly from Canadian Internet cables. CSE notes in the document that it is “processing emails off the wire.”
  •  
    " CANADIAN SPIES COLLECT DOMESTIC EMAILS IN SECRET SECURITY SWEEP BY RYAN GALLAGHER AND GLENN GREENWALD @rj_gallagher@ggreenwald YESTERDAY AT 2:02 AM SHARE TWITTER FACEBOOK GOOGLE EMAIL PRINT POPULAR EXCLUSIVE: TSA ISSUES SECRET WARNING ON 'CATASTROPHIC' THREAT TO AVIATION CHICAGO'S "BLACK SITE" DETAINEES SPEAK OUT WHY DOES THE FBI HAVE TO MANUFACTURE ITS OWN PLOTS IF TERRORISM AND ISIS ARE SUCH GRAVE THREATS? NET NEUTRALITY IS HERE - THANKS TO AN UNPRECEDENTED GUERRILLA ACTIVISM CAMPAIGN HOW SPIES STOLE THE KEYS TO THE ENCRYPTION CASTLE Canada's electronic surveillance agency is covertly monitoring vast amounts of Canadians' emails as part of a sweeping domestic cybersecurity operation, according to top-secret documents. The surveillance initiative, revealed Wednesday by CBC News in collaboration with The Intercept, is sifting through millions of emails sent to Canadian government agencies and departments, archiving details about them on a database for months or even years. The data mining operation is carried out by the Communications Security Establishment, or CSE, Canada's equivalent of the National Security Agency. Its existence is disclosed in documents obtained by The Intercept from NSA whistleblower Edward Snowden. The emails are vacuumed up by the Canadian agency as part of its mandate to defend against hacking attacks and malware targeting government computers. It relies on a system codenamed PONY EXPRESS to analyze the messages in a bid to detect potential cyber threats. Last year, CSE acknowledged it collected some private communications as part of cybersecurity efforts. But it refused to divulge the number of communications being stored or to explain for how long any intercepted messages would be retained. Now, the Snowden documents shine a light for the first time on the huge scope of the operation - exposing the controversial details the government withheld from the public. Under Canada's criminal code, CSE is no
Paul Merrell

Indictment Looms For Hillary As FBI Declares 22 Home-Server Emails "Top Secret" - 0 views

  • Indictment Looms For Hillary As FBI Declares 22 Home-Server Emails “Top Secret” The leaking of the Clinton emails has been compared to as the next “Watergate”. By ZeroHedge.com | January 30, 2016 Share this article! targ
  • The State Department will release more emails from Clinton’s time as secretary of state later Friday. But The Associated Press has learned that 7 email chains are being withheld in full for containing “top secret” material. The 37 pages include messages recently described by a key intelligence official as concerning so-called “special access programs” — a highly restricted subset of classified material that could point to confidential sources or clandestine programs like drone strikes or government eavesdropping. Department officials wouldn’t describe the substance of the emails, or say if Clinton had sent any herself. Spokesman John Kirby tells the AP that no judgment on past classification was made. But the department is looking into that, too.
  • For those that Clinton only read, and didn’t write or forward, she still would have been required to report classification slippages that she recognized. Possible responses for classification infractions include counseling, warnings or other action, State Department officials said, though they declined to say if these applied to Clinton or senior aides who’ve since left the department. The officials weren’t authorized to speak on the matter and spoke on condition of anonymity. However, as we previously noted, the implications are tough for The DoJ – if they indict they crush their own candidate’s chances of the Presidency, if they do not – someone will leak the details and the FBI will revolt… The leaking of the Clinton emails has been compared to as the next “Watergate” by former U.S. Attorney Joe DiGenova this week, if current FBI investigations don’t proceed in an appropriate manner. The revelation comes after more emails from Hilary Clinton’s personal email have come to light. “[The investigation has reached] a critical mass,” DiGenova told radio host Laura Ingraham when discussing the FBI’s still pending investigation. Though Clinton is still yet to be charged with any crime, DiGenova advised on Tuesday that changes may be on the horizon. The mishandling over the classified intelligence may lead to an imminent indictment, with DiGenova suggesting it may come to a head within 60 days.
  • ...1 more annotation...
  • I believe that the evidence that the FBI is compiling will be so compelling that, unless [Lynch] agrees to the charges, there will be a massive revolt inside the FBI, which she will not be able to survive as an attorney general,” he said. “The intelligence community will not stand for that. They will fight for indictment and they are already in the process of gearing themselves to basically revolt if she refuses to bring charges.” The FBI also is looking into Clinton’s email setup, but has said nothing about the nature of its probe. Independent experts say it is highly unlikely that Clinton will be charged with wrongdoing, based on the limited details that have surfaced up to now and the lack of indications that she intended to break any laws. “What I would hope comes out of all of this is a bit of humility” and an acknowledgement from Clinton that “I made some serious mistakes,” said Bradley Moss, a Washington lawyer who regularly handles security clearance matters. Legal questions aside, it’s the potential political costs that are probably of more immediate concern for Clinton. She has struggled in surveys measuring her perceived trustworthiness and an active federal investigation, especially one buoyed by evidence that top secret material coursed through her account, could negate one of her main selling points for becoming commander in chief: Her national security resume.
Paul Merrell

Eric Holder: The Justice Department could strike deal with Edward Snowden - 0 views

  • Eric Holder: The Justice Department could strike deal with Edward SnowdenMichael IsikoffChief Investigative CorrespondentJuly 6, 2015Former U.S. Attorney General Eric Holder. (Photo: Olivier Douliery-Pool/Getty) Former Attorney General Eric Holder said today that a “possibility exists” for the Justice Department to cut a deal with former NSA contractor Edward Snowden that would allow him to return to the United States from Moscow. In an interview with Yahoo News, Holder said “we are in a different place as a result of the Snowden disclosures” and that “his actions spurred a necessary debate” that prompted President Obama and Congress to change policies on the bulk collection of phone records of American citizens. Asked if that meant the Justice Department might now be open to a plea bargain that allows Snowden to return from his self-imposed exile in Moscow, Holder replied: “I certainly think there could be a basis for a resolution that everybody could ultimately be satisfied with. I think the possibility exists.”
  • But his remarks to Yahoo News go further than any current or former Obama administration official in suggesting that Snowden’s disclosures had a positive impact and that the administration might be open to a negotiated plea that the self-described whistleblower could accept, according to his lawyer Ben Wizner.
  • It’s also not clear whether Holder’s comments signal a shift in Obama administration attitudes that could result in a resolution of the charges against Snowden. Melanie Newman, chief spokeswoman for Attorney General Loretta Lynch, Holder’s successor, immediately shot down the idea that the Justice Department was softening its stance on Snowden. “This is an ongoing case so I am not going to get into specific details but I can say our position regarding bringing Edward Snowden back to the United States to face charges has not changed,” she said in an email.
  • ...1 more annotation...
  • Three sources familiar with informal discussions of Snowden’s case told Yahoo News that one top U.S. intelligence official, Robert Litt, the chief counsel to Director of National Intelligence James Clapper, recently privately floated the idea that the government might be open to a plea bargain in which Snowden returns to the United States, pleads guilty to one felony count and receives a prison sentence of three to five years in exchange for full cooperation with the government.
Gary Edwards

XKeyscore: NSA tool collects 'nearly everything a user does on the internet' | World ne... - 1 views

  • The latest revelations will add to the intense public and congressional debate around the extent of NSA surveillance programs. They come as senior intelligence officials testify to the Senate judiciary committee on Wednesday, releasing classified documents in response to the Guardian's earlier stories on bulk collection of phone records and Fisa surveillance court oversight.
  • The files shed light on one of Snowden's most controversial statements, made in his first video interview published by the Guardian on June 10
  • "I, sitting at my desk," said Snowden, could "wiretap anyone, from you or your accountant, to a federal judge or even the president, if I had a personal email".
  • ...23 more annotations...
  • US officials vehemently denied this specific claim. Mike Rogers, the Republican chairman of the House intelligence committee, said of Snowden's assertion: "He's lying. It's impossible for him to do what he was saying he could do."
  • But training materials for XKeyscore detail how analysts can use it and other systems to mine enormous agency databases by filling in a simple on-screen form giving only a broad justification for the search. The request is not reviewed by a court or any NSA personnel before it is processed.
  • XKeyscore, the documents boast, is the NSA's "widest reaching" system developing intelligence from computer networks – what the agency calls Digital Network Intelligence (DNI). One presentation claims the program covers "nearly everything a typical user does on the internet", including the content of emails, websites visited and searches, as well as their metadata.
  • Analysts can also use XKeyscore and other NSA systems to obtain ongoing "real-time" interception of an individual's internet activity.
  • Under US law, the NSA is required to obtain an individualized Fisa warrant only if the target of their surveillance is a 'US person', though no such warrant is required for intercepting the communications of Americans with foreign targets.
  • But XKeyscore provides the technological capability, if not the legal authority, to target even US persons for extensive electronic surveillance without a warrant provided that some identifying information, such as their email or IP address, is known to the analyst.
  • One training slide illustrates the digital activity constantly being collected by XKeyscore and the analyst's ability to query the databases at any time.
  • The purpose of XKeyscore is to allow analysts to search the metadata as well as the content of emails and other internet activity, such as browser history, even when there is no known email account (a "selector" in NSA parlance) associated with the individual being targeted.
  • Analysts can also search by name, telephone number, IP address, keywords, the language in which the internet activity was conducted or the type of browser used.
  • One document notes that this is because "strong selection [search by email address] itself gives us only a very limited capability" because "a large amount of time spent on the web is performing actions that are anonymous."
  • Email monitoring
  • One top-secret document describes how the program "searches within bodies of emails, webpages and documents", including the "To, From, CC, BCC lines" and the 'Contact Us' pages on websites".
  • To search for emails, an analyst using XKS enters the individual's email address into a simple online search form, along with the "justification" for the search and the time period for which the emails are sought.
  • One document, a top secret 2010 guide describing the training received by NSA analysts for general surveillance under the Fisa Amendments Act of 2008, explains that analysts can begin surveillance on anyone by clicking a few simple pull-down menus designed to provide both legal and targeting justifications.
  • Once options on the pull-down menus are selected, their target is marked for electronic surveillance and the analyst is able to review the content of their communications:
  • Chats, browsing history and other internet activity
  • Beyond emails, the XKeyscore system allows analysts to monitor a virtually unlimited array of other internet activities, including those within social media.
  • An NSA tool called DNI Presenter, used to read the content of stored emails, also enables an analyst using XKeyscore to read the content of Facebook chats or private messages.
  • The XKeyscore program also allows an analyst to learn the IP addresses of every person who visits any website the analyst specifies.
  • The quantity of communications accessible through programs such as XKeyscore is staggeringly large. One NSA report from 2007 estimated that there were 850bn "call events" collected and stored in the NSA databases, and close to 150bn internet records. Each day, the document says, 1-2bn records were added.
  • William Binney, a former NSA mathematician, said last year that the agency had "assembled on the order of 20tn transactions about US citizens with other US citizens", an estimate, he said, that "only was involving phone calls and emails". A 2010 Washington Post article reported that "every day, collection systems at the [NSA] intercept and store 1.7bn emails, phone calls and other type of communications."
  • The ACLU's deputy legal director, Jameel Jaffer, told the Guardian last month that national security officials expressly said that a primary purpose of the new law was to enable them to collect large amounts of Americans' communications without individualized warrants.
  • "The government doesn't need to 'target' Americans in order to collect huge volumes of their communications," said Jaffer. "The government inevitably sweeps up the communications of many Americans" when targeting foreign nationals for surveillance.
  •  
    "One presentation claims the XKeyscore program covers 'nearly everything a typical user does on the internet' ................................................................. A top secret National Security Agency program allows analysts to search with no prior authorization through vast databases containing emails, online chats and the browsing histories of millions of individuals, according to documents provided by whistleblower Edward Snowden. The NSA boasts in training materials that the program, called XKeyscore, is its "widest-reaching" system for developing intelligence from the internet. The latest revelations will add to the intense public and congressional debate around the extent of NSA surveillance programs. They come as senior intelligence officials testify to the Senate judiciary committee on Wednesday, releasing classified documents in response to the Guardian's earlier stories on bulk collection of phone records and Fisa surveillance court oversight. The files shed light on one of Snowden's most controversial statements, made in his first video interview published by the Guardian on June 10. "I, sitting at my desk," said Snowden, could "wiretap anyone, from you or your accountant, to a federal judge or even the president, if I had a personal email". US officials vehemently denied this specific claim. Mike Rogers, the Republican chairman of the House intelligence committee, said of Snowden's assertion: "He's lying. It's impossible for him to do what he was saying he could do." But training materials for XKeyscore detail how analysts can use it and other systems to mine enormous agency databases by filling in a simple on-screen form giving only a broad justification for the search. The request is not reviewed by a court or any NSA personnel before it is processed. XKeyscore, the documents boast, is the NSA's "widest reaching" system developing intelligence from computer networks - what the agency calls Digital Network Intelligence (DNI). One
  •  
    "But training materials for XKeyscore detail how analysts can use it and other systems to mine enormous agency databases by filling in a simple on-screen form giving only a broad justification for the search. The request is not reviewed by a court or any NSA personnel before it is processed. " Note in that regard that Snowden said in an earlier interview that use of this system rarely was audited and that when audited, the most common request if changes were requested was to beef up the justification for the search. The XScore system puts the lie to just about everything the Administration has claimed about intense oversight by all three branches of federal government and about not reading emails or listening to (Skype) phone calls. The lies keep stacking up in an ever-deepening pile.
Paul Merrell

Leaked Emails ot Save the Children confirms Pakistan full of CIA agents!! - 0 views

  • Here are the emails. An article written by Umar Cheema is also on the Web, will post link once I am on my laptop. http://cirp.pk/e-mail.htm (edit: although some names have been blacked out, you can still view them by taking mouse over the links! e.g. First email is by Hassan Noor.. to Mike Novell, tkrift (??), Amanullah Khan.. CC is Afnan Aleem) These basically proves that everyone in the Abbotabad commission (except Mr Ashraf Qazi), including a very senior judge and general, were working under the influence of Save The Children NGO Retired General Nadeem was directly working under them! Afridi was NOT tortured by ISI. He did give ISI some false statements which the ISI didn't dig deeper because it suited them! (Example he was working for CIA since 2008, not 2009 as ISI was led to believe) Edit: Here is the article: http://www.thenews.com.pk/Todays-Ne...s-Abbottabad-Commission-was-penetrated-by-CIA -- All these NGOs should be banned and thrashed! ISI should publically hang foreign agents! (Even if they are Generals)
  • The NGO has neither denied the email record and the contents it carried (when shown by The News for seeking version) nor offered specific comments but that: “Our assistance to the Abbottabad Commission and its members including Gen Nadeem was within the legal parameters and Abbottabad Commission mandate to find facts.” Nadeem was not available for comments, however, his close aide termed the allegations as utterly “rubbish and non-sense” when comments were sought after showing the email record A transcript of internal wrangling: Muhammad Hassan Noor Saadi, deputy country director of Save the Children, met Gen (R) Nadeem on November 20, 2012 that followed his email to four senior colleagues. The report was primarily compiled by ‘our friend’, his email reads, and was endorsed by the Chairman but one of the members, Ashraf Qazi, was not in agreement with them. He wrote a dissenting note criticising Chairman Justice (R) Javed Iqbal and Gen (R) Nadeem ‘for being soft on certain institutions (including Save the Children).’
  • Another member, Abbas Khan, was neither willing to sign the report in its current shape, discloses email record, nor wanted to put a dissenting note hence decided to prolong his stay in the US where he went on the ‘pretext of medical ground’. More alarmingly, the NGO was granted access to the Commission’s report well before it was sent to the prime minister. Save the Children had uninterrupted access to the four drafts prepared in June 2012 by the members including the chairman, email record available with The News indicates. All favours granted to Save the Children on behalf of the Commission were in clear breach of public trust raising question marks about the integrity of the members. The chairman of the NGO, Save the Children, was contacted by The News. He initially agreed to meet but later stopped taking calls and did not respond to messages sent to him.Nadeem also felt confident, the email record shows, that he would be able to convince the panel with the answers given by the NGO and urge his colleagues to go by the facts presented by Save the Children instead of believing on the contents of Afridi’s statement. Gen (R) Nadeem also advised the NGO, an email of the country director reads, to fight the expulsion of our expatriate as otherwise the ISI would move quickly to close down the country programme before the Commission report comes out.
  • ...3 more annotations...
  • Record shows Abbottabad Commission was penetrated by CIA​ Umar Cheema Friday, August 02, 2013 From Print Edition ISLAMABAD: A mind-blowing detail has emerged from the internal correspondence of NGO Save the Children disclosing its infiltration into the Abbottabad Commission to save its skin following allegations of the CIA’s penetration into the NGO in a hunt for Osama bin Laden through Dr Shakil Afridi, now under arrest in Peshawar. “Some of us suspected that the khakis had access to the record and receive daily updates but never realised an NGO had infiltrated too,” said an official privy to the Commission’s working. The leaked communication indicates that Lt Gen (retd) Nadeem Ahmed, an unofficial representative of the Army and ISI in the Commission, was allegedly cultivated by Save the Children who would offer him ‘how-to-do’ bailout advice, even sharing details about the internal politics of the Commission and classified record, something in radical contradiction to his reputation as a thorough professional and a man of integrity. He briefed the deputy country director of Save the Children, according to the email, about the views of different members, staunch opposition from a panel colleague, Ashraf Jehangir Qazi, resulting in his dissenting note on the NGO and other institutions, and Gen (retd) Nadeem’s plan to effectively counter this note in collaboration with Justice (R) Javed Iqbal, the Chairman.
  • The Commission could not issue the report with that note and therefore now they are working on developing counter arguments on the note, read the email. The Commission needs to have a lot of comments removed from the note before it is in a shape that allows the report to be shared, the email continues, otherwise it can jeopardize the integrity of the members of the Commission. Justice (R) Javed Iqbal and Gen (R) Nadeem ‘have to work extra hard to factually prove a lot of things wrong that this third member is referring to,’ read the email of deputy country director. The email then explained the position of the fourth member, Abbas Ali Khan, absent from discussion. He is not willing to sign the report in the current shape, reads Hassan’s email, but also does not want to put in a note of dissent and therefore continues to prolong his stay in the US where he went on the pretext of treatment. As a way forward, the email continues, the two members will work with the third member (Ashraf Qazi) and try to come to a point where the note is significantly reduced and numbers of comments are taken out of the report. Gen (R) Nadeem’s advisory role of the NGO: The email also brings to light his role as adviser to the NGO. To a question that what Save the Children should do, Nadeem advised the deputy country director to build relationship and confidence with the Ministry of Interior and Economic Affairs Division. “It would take few months for you to be back to complete normalcy,” Gen (R) Nadeem advised.
  • In another email generated on August 29, 2012, David Wright, the country director, wrote that ‘on my instructions Hassan asked Gen (R) Nadeem to give an honest assessment as to what he thinks our chances are of surviving this.’ Gen (R) Nadeem replied that he felt confident regarding the answers we (NGO) will give to the questions proposed, ‘he could convince the other commission members to go with the fact rather than the content of Afridi’s statement.’ Gen (R) Nadeem also advised to fight the expulsion of our expatriates, Wrights email continued. “He felt if we did not do this and the expats left, the ISI would then move quickly to close down the country programme before the Commission report comes out.” Report draft shared with the NGO: Wright’s another email indicates that the draft was shared more than once with the NGO. Referring to a meeting of two senior officers of Save the Children with Gen (R) Nadeem, the country director said they were shown the report written by the Chairman of the Commission. The email said there were four versions of the report in June 2012 and these were reduced to two in August that year. However, they have reservations about the latest version shared in August as ‘the report which was originally thought to be our saviour, will be the tool for this expulsion.’ We will do our best, the email reads, to work ‘with our friends and try and get our responses in before the report is finalised.’ SOURCE: THE NEWS Record shows Abbottabad Commission was penetrated by CIA - thenews.com.pk
Paul Merrell

NARA Backs Away from CIA Email Destruction Proposal - 0 views

  • The National Archives and Records Administration told the Central Intelligence Agency last week that it was withholding approval of a CIA proposal to allow the destruction of the email records of all but 22 senior Agency officials. “NARA intends to reassess the Central Intelligence Agency (CIA) proposal for the disposition of non-senior email accounts,” wrote Paul M. Wester, Jr., Chief Records Officer at NARA in a November 20 letter to Joseph Lambert, Director of Information Management Services at CIA. “Based on comments from Members of the U.S. Senate Select Committee on Intelligence and a number of public interest groups, we are concerned about the scope of the proposed schedule and the proposed retention periods,” Mr. Wester wrote. Based on a preliminary review of the CIA proposal, NARA had initially recommended approval of the plan, Secrecy News reported last month. (“CIA Asks to Destroy Email of Non-Senior Officials,” October 1.)
  • But critical comments that were submitted to NARA — from the Federation of American Scientists, Openthegovernment.org and other public interest groups and individuals, the Department of Defense Chief Defense Counsel, and especially from Senators Feinstein and Chambliss, the leaders of the Senate Intelligence Committee, and Senators Wyden, Udall and Heinrich, Members of the Committee — turned the tide and blocked the proposal in its current form. “We will hold a public meeting on this schedule in the coming months to address the comments raise by you and others and to share how NARA is moving forward,” wrote Margaret Hawkins of NARA Records Management Services in an email message today. “This meeting will be announced in the Federal Register and will be open to all commenters and the public.” For related coverage, see: “The CIA Wants To Delete Old Email; Critics Say ‘Not So Fast'” by David Welna, NPR All Things Considered, November 20; “Top Senators Oppose CIA Move to Destroy Email” by Siobhan Gorman, Wall Street Journal, November 19; “National Archives: Ok, So Maybe Letting The CIA Destroy Emails Wasn’t A Great Idea” by Ali Watkins, Huffington Post, November 21; and “Furor Over CIA Shake-Up of Email System” by Adam Klasfeld, Courthouse News Service, November 7.
  •  
    The CIA's request for permission to destroy the emails was based on the bald assertion that all information contained in the emails of historical significance had already been incorporated in more formal reports, without any actual study of the email contents. The very notion is preposterous.
Paul Merrell

US v. Warshak, 631 F. 3d 266 - Court of Appeals, 6th Circuit 2010 - Google Scholar - 0 views

  • While a letter is in the mail, the police may not intercept it and examine its contents unless they first obtain a warrant based on probable cause. Ibid. This is true despite the fact that sealed letters are handed over to perhaps dozens of mail carriers, any one of whom could tear open the thin paper envelopes that separate the private words from the world outside. Put another way, trusting a letter to an intermediary does not necessarily defeat a reasonable expectation that the letter will remain private. See Katz, 389 U.S. at 351, 88 S.Ct. 507 ("[W]hat [a person] seeks to preserve as private, even in an area accessible to the public, may be constitutionally protected."). Given the fundamental similarities between email and traditional forms of communication, it would defy common sense 286*286 to afford emails lesser Fourth Amendment protection. See Patricia L. Bellia & Susan Freiwald, Fourth Amendment Protection for Stored E-Mail, 2008 U. Chi. Legal F. 121, 135 (2008) (recognizing the need to "eliminate the strangely disparate treatment of mailed and telephonic communications on the one hand and electronic communications on the other"); City of Ontario v. Quon, ___ U.S. ___, 130 S.Ct. 2619, 2631, 177 L.Ed.2d 216 (2010) (implying that "a search of [an individual's] personal e-mail account" would be just as intrusive as "a wiretap on his home phone line"); United States v. Forrester, 512 F.3d 500, 511 (9th Cir.2008) (holding that "[t]he privacy interests in [mail and email] are identical"). Email is the technological scion of tangible mail, and it plays an indispensable part in the Information Age.
  • Over the last decade, email has become "so pervasive that some persons may consider [it] to be [an] essential means or necessary instrument[] for self-expression, even self-identification." Quon, 130 S.Ct. at 2630. It follows that email requires strong protection under the Fourth Amendment; otherwise, the Fourth Amendment would prove an ineffective guardian of private communication, an essential purpose it has long been recognized to serve. See U.S. Dist. Court, 407 U.S. at 313, 92 S.Ct. 2125; United States v. Waller, 581 F.2d 585, 587 (6th Cir.1978) (noting the Fourth Amendment's role in protecting "private communications"). As some forms of communication begin to diminish, the Fourth Amendment must recognize and protect nascent ones that arise. See Warshak I, 490 F.3d at 473 ("It goes without saying that like the telephone earlier in our history, e-mail is an ever-increasing mode of private communication, and protecting shared communications through this medium is as important to Fourth Amendment principles today as protecting telephone conversations has been in the past.").
  • If we accept that an email is analogous to a letter or a phone call, it is manifest that agents of the government cannot compel a commercial ISP to turn over the contents of an email without triggering the Fourth Amendment. An ISP is the intermediary that makes email communication possible. Emails must pass through an ISP's servers to reach their intended recipient. Thus, the ISP is the functional equivalent of a post office or a telephone company. As we have discussed above, the police may not storm the post office and intercept a letter, and they are likewise forbidden from using the phone system to make a clandestine recording of a telephone call—unless they get a warrant, that is. See Jacobsen, 466 U.S. at 114, 104 S.Ct. 1652; Katz, 389 U.S. at 353, 88 S.Ct. 507. It only stands to reason that, if government agents compel an ISP to surrender the contents of a subscriber's emails, those agents have thereby conducted a Fourth Amendment search, which necessitates compliance with the warrant requirement absent some exception. In Warshak I, the government argued that this conclusion was improper, pointing to the fact that NuVox contractually reserved the right to access Warshak's emails for certain purposes. While we acknowledge that a subscriber agreement might, in some cases, be sweeping enough to defeat a reasonable expectation of privacy in the contents of an email account, see Warshak I, 490 F.3d at 473; Warshak II, 532 F.3d at 526-27, we doubt that will be the case in most situations, and it is certainly not the case here.
  • ...1 more annotation...
  • Accordingly, we hold that a subscriber enjoys a reasonable expectation of privacy in the contents of emails "that are stored with, or sent or received through, a commercial ISP." Warshak I, 490 F.3d at 473; see Forrester, 512 F.3d at 511 (suggesting that "[t]he contents [of email messages] may deserve Fourth Amendment protection"). The government may not compel a commercial ISP to turn over the contents of a subscriber's emails without first obtaining a warrant based on probable cause. Therefore, because they did not obtain a warrant, the government agents violated the Fourth Amendment when they obtained the contents of Warshak's emails. Moreover, to the extent that the SCA purports to permit the government to obtain such emails warrantlessly, the SCA is unconstitutional.
  •  
    A 2010 decision by the U.S. 6th Circuit Court of Appeals that I had missed up to now. It finds the Stored Communications Act's section that excuses email in the possession of an ISP for more than 180 days from the 4th Amendment's judicial warrant clause. There may yet be hope for cloud computing in the U.S. 
Paul Merrell

From Radio to Porn, British Spies Track Web Users' Online Identities - 0 views

  • HERE WAS A SIMPLE AIM at the heart of the top-secret program: Record the website browsing habits of “every visible user on the Internet.” Before long, billions of digital records about ordinary people’s online activities were being stored every day. Among them were details cataloging visits to porn, social media and news websites, search engines, chat forums, and blogs. The mass surveillance operation — code-named KARMA POLICE — was launched by British spies about seven years ago without any public debate or scrutiny. It was just one part of a giant global Internet spying apparatus built by the United Kingdom’s electronic eavesdropping agency, Government Communications Headquarters, or GCHQ. The revelations about the scope of the British agency’s surveillance are contained in documents obtained by The Intercept from National Security Agency whistleblower Edward Snowden. Previous reports based on the leaked files have exposed how GCHQ taps into Internet cables to monitor communications on a vast scale, but many details about what happens to the data after it has been vacuumed up have remained unclear.
  • Amid a renewed push from the U.K. government for more surveillance powers, more than two dozen documents being disclosed today by The Intercept reveal for the first time several major strands of GCHQ’s existing electronic eavesdropping capabilities.
  • The surveillance is underpinned by an opaque legal regime that has authorized GCHQ to sift through huge archives of metadata about the private phone calls, emails and Internet browsing logs of Brits, Americans, and any other citizens — all without a court order or judicial warrant
  • ...17 more annotations...
  • A huge volume of the Internet data GCHQ collects flows directly into a massive repository named Black Hole, which is at the core of the agency’s online spying operations, storing raw logs of intercepted material before it has been subject to analysis. Black Hole contains data collected by GCHQ as part of bulk “unselected” surveillance, meaning it is not focused on particular “selected” targets and instead includes troves of data indiscriminately swept up about ordinary people’s online activities. Between August 2007 and March 2009, GCHQ documents say that Black Hole was used to store more than 1.1 trillion “events” — a term the agency uses to refer to metadata records — with about 10 billion new entries added every day. As of March 2009, the largest slice of data Black Hole held — 41 percent — was about people’s Internet browsing histories. The rest included a combination of email and instant messenger records, details about search engine queries, information about social media activity, logs related to hacking operations, and data on people’s use of tools to browse the Internet anonymously.
  • Throughout this period, as smartphone sales started to boom, the frequency of people’s Internet use was steadily increasing. In tandem, British spies were working frantically to bolster their spying capabilities, with plans afoot to expand the size of Black Hole and other repositories to handle an avalanche of new data. By 2010, according to the documents, GCHQ was logging 30 billion metadata records per day. By 2012, collection had increased to 50 billion per day, and work was underway to double capacity to 100 billion. The agency was developing “unprecedented” techniques to perform what it called “population-scale” data mining, monitoring all communications across entire countries in an effort to detect patterns or behaviors deemed suspicious. It was creating what it said would be, by 2013, “the world’s biggest” surveillance engine “to run cyber operations and to access better, more valued data for customers to make a real world difference.”
  • A document from the GCHQ target analysis center (GTAC) shows the Black Hole repository’s structure.
  • The data is searched by GCHQ analysts in a hunt for behavior online that could be connected to terrorism or other criminal activity. But it has also served a broader and more controversial purpose — helping the agency hack into European companies’ computer networks. In the lead up to its secret mission targeting Netherlands-based Gemalto, the largest SIM card manufacturer in the world, GCHQ used MUTANT BROTH in an effort to identify the company’s employees so it could hack into their computers. The system helped the agency analyze intercepted Facebook cookies it believed were associated with Gemalto staff located at offices in France and Poland. GCHQ later successfully infiltrated Gemalto’s internal networks, stealing encryption keys produced by the company that protect the privacy of cell phone communications.
  • Similarly, MUTANT BROTH proved integral to GCHQ’s hack of Belgian telecommunications provider Belgacom. The agency entered IP addresses associated with Belgacom into MUTANT BROTH to uncover information about the company’s employees. Cookies associated with the IPs revealed the Google, Yahoo, and LinkedIn accounts of three Belgacom engineers, whose computers were then targeted by the agency and infected with malware. The hacking operation resulted in GCHQ gaining deep access into the most sensitive parts of Belgacom’s internal systems, granting British spies the ability to intercept communications passing through the company’s networks.
  • In March, a U.K. parliamentary committee published the findings of an 18-month review of GCHQ’s operations and called for an overhaul of the laws that regulate the spying. The committee raised concerns about the agency gathering what it described as “bulk personal datasets” being held about “a wide range of people.” However, it censored the section of the report describing what these “datasets” contained, despite acknowledging that they “may be highly intrusive.” The Snowden documents shine light on some of the core GCHQ bulk data-gathering programs that the committee was likely referring to — pulling back the veil of secrecy that has shielded some of the agency’s most controversial surveillance operations from public scrutiny. KARMA POLICE and MUTANT BROTH are among the key bulk collection systems. But they do not operate in isolation — and the scope of GCHQ’s spying extends far beyond them.
  • The agency operates a bewildering array of other eavesdropping systems, each serving its own specific purpose and designated a unique code name, such as: SOCIAL ANTHROPOID, which is used to analyze metadata on emails, instant messenger chats, social media connections and conversations, plus “telephony” metadata about phone calls, cell phone locations, text and multimedia messages; MEMORY HOLE, which logs queries entered into search engines and associates each search with an IP address; MARBLED GECKO, which sifts through details about searches people have entered into Google Maps and Google Earth; and INFINITE MONKEYS, which analyzes data about the usage of online bulletin boards and forums. GCHQ has other programs that it uses to analyze the content of intercepted communications, such as the full written body of emails and the audio of phone calls. One of the most important content collection capabilities is TEMPORA, which mines vast amounts of emails, instant messages, voice calls and other communications and makes them accessible through a Google-style search tool named XKEYSCORE.
  • As of September 2012, TEMPORA was collecting “more than 40 billion pieces of content a day” and it was being used to spy on people across Europe, the Middle East, and North Africa, according to a top-secret memo outlining the scope of the program. The existence of TEMPORA was first revealed by The Guardian in June 2013. To analyze all of the communications it intercepts and to build a profile of the individuals it is monitoring, GCHQ uses a variety of different tools that can pull together all of the relevant information and make it accessible through a single interface. SAMUEL PEPYS is one such tool, built by the British spies to analyze both the content and metadata of emails, browsing sessions, and instant messages as they are being intercepted in real time. One screenshot of SAMUEL PEPYS in action shows the agency using it to monitor an individual in Sweden who visited a page about GCHQ on the U.S.-based anti-secrecy website Cryptome.
  • Partly due to the U.K.’s geographic location — situated between the United States and the western edge of continental Europe — a large amount of the world’s Internet traffic passes through its territory across international data cables. In 2010, GCHQ noted that what amounted to “25 percent of all Internet traffic” was transiting the U.K. through some 1,600 different cables. The agency said that it could “survey the majority of the 1,600” and “select the most valuable to switch into our processing systems.”
  • According to Joss Wright, a research fellow at the University of Oxford’s Internet Institute, tapping into the cables allows GCHQ to monitor a large portion of foreign communications. But the cables also transport masses of wholly domestic British emails and online chats, because when anyone in the U.K. sends an email or visits a website, their computer will routinely send and receive data from servers that are located overseas. “I could send a message from my computer here [in England] to my wife’s computer in the next room and on its way it could go through the U.S., France, and other countries,” Wright says. “That’s just the way the Internet is designed.” In other words, Wright adds, that means “a lot” of British data and communications transit across international cables daily, and are liable to be swept into GCHQ’s databases.
  • A map from a classified GCHQ presentation about intercepting communications from undersea cables. GCHQ is authorized to conduct dragnet surveillance of the international data cables through so-called external warrants that are signed off by a government minister. The external warrants permit the agency to monitor communications in foreign countries as well as British citizens’ international calls and emails — for example, a call from Islamabad to London. They prohibit GCHQ from reading or listening to the content of “internal” U.K. to U.K. emails and phone calls, which are supposed to be filtered out from GCHQ’s systems if they are inadvertently intercepted unless additional authorization is granted to scrutinize them. However, the same rules do not apply to metadata. A little-known loophole in the law allows GCHQ to use external warrants to collect and analyze bulk metadata about the emails, phone calls, and Internet browsing activities of British people, citizens of closely allied countries, and others, regardless of whether the data is derived from domestic U.K. to U.K. communications and browsing sessions or otherwise. In March, the existence of this loophole was quietly acknowledged by the U.K. parliamentary committee’s surveillance review, which stated in a section of its report that “special protection and additional safeguards” did not apply to metadata swept up using external warrants and that domestic British metadata could therefore be lawfully “returned as a result of searches” conducted by GCHQ.
  • Perhaps unsurprisingly, GCHQ appears to have readily exploited this obscure legal technicality. Secret policy guidance papers issued to the agency’s analysts instruct them that they can sift through huge troves of indiscriminately collected metadata records to spy on anyone regardless of their nationality. The guidance makes clear that there is no exemption or extra privacy protection for British people or citizens from countries that are members of the Five Eyes, a surveillance alliance that the U.K. is part of alongside the U.S., Canada, Australia, and New Zealand. “If you are searching a purely Events only database such as MUTANT BROTH, the issue of location does not occur,” states one internal GCHQ policy document, which is marked with a “last modified” date of July 2012. The document adds that analysts are free to search the databases for British metadata “without further authorization” by inputing a U.K. “selector,” meaning a unique identifier such as a person’s email or IP address, username, or phone number. Authorization is “not needed for individuals in the U.K.,” another GCHQ document explains, because metadata has been judged “less intrusive than communications content.” All the spies are required to do to mine the metadata troves is write a short “justification” or “reason” for each search they conduct and then click a button on their computer screen.
  • Intelligence GCHQ collects on British persons of interest is shared with domestic security agency MI5, which usually takes the lead on spying operations within the U.K. MI5 conducts its own extensive domestic surveillance as part of a program called DIGINT (digital intelligence).
  • GCHQ’s documents suggest that it typically retains metadata for periods of between 30 days to six months. It stores the content of communications for a shorter period of time, varying between three to 30 days. The retention periods can be extended if deemed necessary for “cyber defense.” One secret policy paper dated from January 2010 lists the wide range of information the agency classes as metadata — including location data that could be used to track your movements, your email, instant messenger, and social networking “buddy lists,” logs showing who you have communicated with by phone or email, the passwords you use to access “communications services” (such as an email account), and information about websites you have viewed.
  • Records showing the full website addresses you have visited — for instance, www.gchq.gov.uk/what_we_do — are treated as content. But the first part of an address you have visited — for instance, www.gchq.gov.uk — is treated as metadata. In isolation, a single metadata record of a phone call, email, or website visit may not reveal much about a person’s private life, according to Ethan Zuckerman, director of Massachusetts Institute of Technology’s Center for Civic Media. But if accumulated and analyzed over a period of weeks or months, these details would be “extremely personal,” he told The Intercept, because they could reveal a person’s movements, habits, religious beliefs, political views, relationships, and even sexual preferences. For Zuckerman, who has studied the social and political ramifications of surveillance, the most concerning aspect of large-scale government data collection is that it can be “corrosive towards democracy” — leading to a chilling effect on freedom of expression and communication. “Once we know there’s a reasonable chance that we are being watched in one fashion or another it’s hard for that not to have a ‘panopticon effect,’” he said, “where we think and behave differently based on the assumption that people may be watching and paying attention to what we are doing.”
  • When compared to surveillance rules in place in the U.S., GCHQ notes in one document that the U.K. has “a light oversight regime.” The more lax British spying regulations are reflected in secret internal rules that highlight greater restrictions on how NSA databases can be accessed. The NSA’s troves can be searched for data on British citizens, one document states, but they cannot be mined for information about Americans or other citizens from countries in the Five Eyes alliance. No such constraints are placed on GCHQ’s own databases, which can be sifted for records on the phone calls, emails, and Internet usage of Brits, Americans, and citizens from any other country. The scope of GCHQ’s surveillance powers explain in part why Snowden told The Guardian in June 2013 that U.K. surveillance is “worse than the U.S.” In an interview with Der Spiegel in July 2013, Snowden added that British Internet cables were “radioactive” and joked: “Even the Queen’s selfies to the pool boy get logged.”
  • In recent years, the biggest barrier to GCHQ’s mass collection of data does not appear to have come in the form of legal or policy restrictions. Rather, it is the increased use of encryption technology that protects the privacy of communications that has posed the biggest potential hindrance to the agency’s activities. “The spread of encryption … threatens our ability to do effective target discovery/development,” says a top-secret report co-authored by an official from the British agency and an NSA employee in 2011. “Pertinent metadata events will be locked within the encrypted channels and difficult, if not impossible, to prise out,” the report says, adding that the agencies were working on a plan that would “(hopefully) allow our Internet Exploitation strategy to prevail.”
Paul Merrell

Lavabit To Release Code As Open Source, As It Creates Dark Mail Alliance To Create Even... - 0 views

  • This whole morning, while all these stories of the NSA hacking directly into Google and Yahoo's network have been popping up, I've been at the Inbox Love conference, all about the future of email. The "keynote" that just concluded, was Ladar Levison from Lavabit (with an assist from Mike Janke from Silent Circle), talking about the just announced Dark Mail Alliance, between Lavabit and Silent Circle -- the other "security" focused communications company who shut down its email offering after Lavabit was forced to shut down. Levison joked that they went with "Dark Mail" because "Black Mail" might have negative connotations. Perhaps just as interesting, Levison is going to be releasing the Lavabit source code (and doing a Kickstarter project to support this), with the hope that many others can set up their own secure email using Lavabit's code, combined with the new Dark Mail Alliance secure technology which will be available next year. As noted, the Alliance is working on trying to create truly secure and surveillance-proof email. Of course, nothing is ever 100% surveillance proof -- and both members of the alliance have previously claimed that it was almost impossible to do surveillance-proof email. However, they're claiming they've had a "breakthrough" that will help.
  • The newly developed technology has been designed to look just like ordinary email, with an interface that includes all the usual folders—inbox, sent mail, and drafts. But where it differs is that it will automatically deploy peer-to-peer encryption, so that users of the Dark Mail technology will be able to communicate securely. The encryption, based on a Silent Circle instant messaging protocol called SCIMP, will apply to both content and metadata of the message and attachments. And the secret keys generated to encrypt the communications will be ephemeral, meaning they are deleted after each exchange of messages. For the NSA and similar surveillance agencies across the world, it will sound like a nightmare. The technology will thwart attempts to sift emails directly from Internet cables as part of so-called “upstream” collection programs and limit the ability to collect messages directly from Internet companies through court orders. Covertly monitoring encrypted Dark Mail emails would likely have to be done by deploying Trojan spyware on a targeted user. If every email provider in the world adopted this technology for all their users, it would render dragnet interception of email messages and email metadata virtually impossible.
  • Importantly, they're not asking everyone to just trust them to be secure -- even though both companies have the right pedigree to deserve some level of trust. Instead, they're going to release the source code for public scrutiny and audits, and they're hoping that other email providers will join the alliance. At the conference, Levison recounted much of what's happened over the last few months (with quite a bit of humor), joking about how he tried to be "nice" in giving the feds Lavabit's private keys printed out, by noting that he included line numbers to help (leaving unsaid that this would make OCR'ing the keys even more difficult). He also admitted that giving them the paper version was really just a way to buy time to shut down Lavabit.
  • ...1 more annotation...
  • Janke came up on stage to talk about the importance of changing the 40-year-old architecture of email, because it's just not designed for secure communications. The hope is that as many other email providers as possible will join the Alliance and that this new setup becomes the de facto standard for end-to-end secure email, which is where Levison's open sourcing of his code gets more interesting. In theory, if it all works out, it could be a lot easier for lots of companies to set up their own "dark mail" email providers. Either way, I would imagine that this development can't make the NSA all that happy.
  •  
    Oh, Goody!
Paul Merrell

File Says N.S.A. Found Way to Replace Email Program - The New York Times - 0 views

  • When the National Security Agency’s bulk collection of records about Americans’ emails came to light in 2013, the government conceded the program’s existence but said it had shut down the effort in December 2011 for “operational and resource reasons.” While that particular secret program stopped, newly disclosed documents show that the N.S.A. had found a way to create a functional equivalent. The shift has permitted the agency to continue analyzing social links revealed by Americans’ email patterns, but without collecting the data in bulk from American telecommunications companies — and with less oversight by the Foreign Intelligence Surveillance Court.
  • The disclosure comes as a sister program that collects Americans’ phone records in bulk is set to end this month. Under a law enacted in June, known as the U.S.A. Freedom Act, the program will be replaced with a system in which the N.S.A. can still gain access to the data to hunt for associates of terrorism suspects, but the bulk logs will stay in the hands of phone companies.The newly disclosed information about the email records program is contained in a report by the N.S.A.’s inspector general that was obtained by The New York Times through a lawsuit under the Freedom of Information Act. One passage lists four reasons that the N.S.A. decided to end the email program and purge previously collected data. Three were redacted, but the fourth was uncensored. It said that “other authorities can satisfy certain foreign intelligence requirements” that the bulk email records program “had been designed to meet.”The report explained that there were two other legal ways to get such data. One was the collection of bulk data that had been gathered in other countries, where the N.S.A.’s activities are largely not subject to regulation by the Foreign Intelligence Surveillance Act and oversight by the intelligence court. Because of the way the Internet operates, domestic data is often found on fiber optic cables abroad.
  • The N.S.A. had long barred analysts from using Americans’ data that had been swept up abroad, but in November 2010 it changed that rule, documents leaked by Edward J. Snowden have shown. The inspector general report cited that change to the N.S.A.’s internal procedures.The other replacement source for the data was collection under the FISA Amendments Act of 2008, which permits warrantless surveillance on domestic soil that targets specific noncitizens abroad, including their new or stored emails to or from Americans.“Thus,” the report said, these two sources “assist in the identification of terrorists communicating with individuals in the United States, which addresses one of the original reasons for establishing” the bulk email records program.
  • ...2 more annotations...
  • Timothy Edgar, a privacy official in the Office of the Director of National Intelligence in both the George W. Bush and Obama administrations who now teaches at Brown University, said the explanation filled an important gap in the still-emerging history of post-Sept. 11, 2001, surveillance. Advertisement Continue reading the main story Advertisement Continue reading the main story “The document makes it clear that N.S.A. is able to get all the Internet metadata it needs through foreign collection,” he said. “The change it made to its procedures in 2010 allowed it to exploit metadata involving Americans. Once that change was made, it was no longer worth the effort to collect Internet metadata inside the United States, in part because doing so requires N.S.A. to deal with” restrictions by the intelligence court.Observers have previously suggested that the N.S.A.’s November 2010 rules change on the use of Americans’ data gathered abroad might be connected to the December 2011 end of the bulk email records program. Marcy Wheeler of the national security blog Emptywheel, for example, has argued that this was probably what happened.
  • And officials, who spoke on the condition of anonymity to discuss sensitive collection programs, have said the rules change and the FISA Amendments Act helped make the email records program less valuable relative to its expense and trouble. The newly disclosed documents amount to official confirmation.
Paul Merrell

British Lawmakers Condemn 2011 Intervention in Libya - The New York Times - 0 views

  • A committee of British lawmakers issued a damning assessment on Wednesday of the 2011 intervention in Libya led by Britain and France, concluding that the military action had lacked a coherent strategy, had been based on poor intelligence and had led to a political collapse that aided the rise of the Islamic State in North Africa.
  • The report from the foreign affairs committee of the House of Commons directly blamed the former prime minister, David Cameron, saying he “was ultimately responsible for the failure to develop a coherent Libya strategy.”In echoing many criticisms from another inquiry, published this year, into Britain’s role in the Iraq war under one of Mr. Cameron’s predecessors, Tony Blair, the report suggested that lessons from that conflict had not been learned.Fearing civilian deaths, an international coalition assembled by Britain and France launched air and missile strikes in March 2011, after Col. Muammar el-Qaddafi’s forces threatened to attack the rebel-held city of Benghazi.Libya descended into chaos, and a power vacuum ensued after the Qaddafi government collapsed, allowing fighters for the Islamic State, also known as ISIS or ISIL, to gain a significant foothold in the country, and the report suggested that Britain had lost interest in the country after Colonel Qaddafi lost power. Advertisement Continue reading the main story The mission represented a significant shift from the Iraq war, with Britain and France assuming the main leadership role — Mr. Cameron had pressed for military action alongside the French president at the time, Nicolas Sarkozy — and the United States taking an active, but less visible, role.
  • In many ways, the report mirrored the assessment of President Obama, who offered a candid appraisal of the intervention in an interview published in The Atlantic this year. “It didn’t work,” Mr. Obama said, citing what he described as his misplaced faith that “the Europeans” in general would be invested in the follow-up. He also said that Mr. Cameron had soon become “distracted by other things” and that Mr. Sarkozy had been voted out of office the next year.The report by the 11-person committee, which included six lawmakers from Mr. Cameron’s Conservative Party, criticized the British strategy as flawed from its inception, concluding that it “was founded on erroneous assumptions and an incomplete understanding of the evidence.”
  • ...1 more annotation...
  • There had been, they said, no thorough assessment of the nature of the rebellion in Libya or of the real threat to civilians. Nor, they added, had there been any attempt at political engagement with the government, leaving military intervention as the sole focus. Today’s Headlines Wake up each morning to the day’s top news, analysis and opinion delivered to your inbox. Please verify you're not a robot by clicking the box. Invalid email address. Please re-enter. Sign Up Receive occasional updates and special offers for The New York Times's products and services. Thank you for subscribing to Today’s Headlines. An error has occurred. Please try again later. You are already subscribed to this email. View all New York Times newsletters. See Sample Manage Email Preferences Not you? Privacy Policy “By the summer of 2011, the limited intervention to protect civilians had drifted into an opportunist policy of regime change,” the lawmakers said.The consequence of the military action was “political and economic collapse, intermilitia and intertribal warfare, humanitarian and migrant crises, widespread human rights violations, the spread of Qaddafi regime weapons across the region and the growth of ISIL in North Africa,” the lawmakers said.
Paul Merrell

Clintons Are Under Multiple FBI Investigations as Agents Are Stymied - 0 views

  • Current and former FBI officials have launched a media counter-offensive to engage head to head with the Clinton media machine and to throw off the shackles the Loretta Lynch Justice Department has used to stymie their multiple investigations into the Clinton pay-to-play network. Over the past weekend, former FBI Assistant Director and current CNN Senior Law Enforcement Analyst Tom Fuentes told viewers that “the FBI has an intensive investigation ongoing into the Clinton Foundation.” He said he had received this information from “senior officials” at the FBI, “several of them, in and out of the Bureau.” (See video clip from CNN below.) That information was further supported by an in-depth article last evening in the Wall Street Journal by Devlin Barrett. According to Barrett, the “probe of the foundation began more than a year ago to determine whether financial crimes or influence peddling occurred related to the charity.” Barrett’s article suggests that the Justice Department, which oversees the FBI, has attempted to circumvent the investigation. The new revelations lead to the appearance of wrongdoing on the part of U.S. Attorney General Loretta Lynch for secretly meeting with Bill Clinton on her plane on the tarmac of Phoenix Sky Harbor International Airport on the evening of June 28 of this year. Not only was Bill Clinton’s wife under an FBI investigation at the time over her use of a private email server in the basement of her New York home over which Top Secret material was transmitted while she was Secretary of State but his own charitable foundation was also under investigation, a fact that was unknown at the time to the public and the media.
  • The reports leaking out of the FBI over the weekend came on the heels of FBI Director James Comey sending a letter to members of Congress on Friday acknowledging that the investigation into the Hillary Clinton email server was not closed as he had previously testified to Congress, but had been reopened as a result of “pertinent” emails turning up. According to multiple media sources, those emails were found on the laptop of Anthony Weiner, estranged husband of Hillary Clinton’s longtime aide, Huma Abedin. Weiner was forced to resign from Congress in 2011 over a sexting scandal with more sexting scandals to follow. Early this month, on October 3, the FBI raided Weiner’s apartment in New York with a search warrant in hand and seized multiple electronic devices. At least one of those devices had been used by both Weiner and Abedin to send email messages. The search warrant had been obtained following a detailed report that had appeared in the Daily Mail newspaper in the U.K. in September, showing sordid, sexual emails that Weiner had allegedly sent to a 15-year old girl in North Carolina. According to the content of the published emails, Weiner was aware that the girl was underage. While examining the hard drive of a laptop seized from Weiner, the FBI found metadata showing that thousands of the emails were exchanged between the private server located in Hillary Clinton’s basement in Chappaqua, New York. Since the FBI had only a search warrant to examine emails and documents related to the Weiner matter, it was not able to read the other emails but simply tallied up the metadata linked to the private server in Chappaqua to show how many potentially new emails might be in the trove on the laptop. (It is also possible that the FBI agents could have used a program to compare subject headings against those emails previously turned over by Abedin to make their case that Abedin had perjured herself when she testified to them that she had turned over all of her work-related emails from her time as Deputy Chief of Staff for Operations when Hillary Clinton served as Secretary of State.)
  • The FBI officials briefed FBI Director James Comey last Thursday on the new trove of emails and he went public with his letter to Congress the next day – leading the Clinton camp to immediately launch a media assault on his motives. As if all of this wasn’t enough for the public to digest over the weekend, yesterday morning James Kallstrom, the former Assistant Director in Charge of the FBI’s New York Division and 25-year veteran of the FBI, went on the John Catsimatidis radio program to call the Clintons a “crime family.” (You can hear the full program here.) Kallstrom’s comments were further amplified when the New York Daily News reported on his criticisms that the FBI had been hamstrung from conducting a real investigation. The Daily News quoted Kallstrom from the radio program as follows: “ ‘This investigation was never a real investigation, they never had grand jury empaneled…This investigation was without the ability to serve subpoenas, serve search warrants, and obtain evidence … It was just ludicrous.’ ” On Wednesday of last week, just two days before FBI Director Comey issued his public letter to Congress, WikiLeaks released a devastating memo from Douglas Band, at the time a key figure at the Clinton Foundation and President of his own corporate consulting firm, Teneo. The memo was rife with suggestions of pay-to-play and personal enrichment schemes at the Clinton Foundation. The same day, Washington Post reporters Rosalind Helderman and Tom Hamburger reported the story, including the following details:
  • ...1 more annotation...
  • “The memo, made public Wednesday by the anti-secrecy group WikiLeaks, lays out the aggressive strategy behind lining up the consulting contracts and paid speaking engagements for Bill Clinton that added tens of millions of dollars to the family’s fortune, including during the years that Hillary Clinton led the State Department. It describes how Band helped run what he called ‘Bill Clinton Inc.,’ obtaining ‘in-kind services for the President and his family — for personal travel, hospitality, vacation and the like.’… Band wrote that Teneo partners had raised in excess of $8 million for the foundation and $3 million in paid speaking fees for Bill Clinton. He said he had secured contracts for the former president that would pay out $66 million over the subsequent nine years if the deals remained in place.” The memo was likely the final straw for the FBI agents and officials who had been thwarted by the Justice Department in mounting an aggressive investigation of the Clinton Foundation using the full FBI arsenal typically available like subpoenas, witness interviews and wiretaps. Given the weekend leaks, it now appears that the FBI understands that the only hope for a real investigation is to shine some much needed sunlight on how Loretta Lynch’s Justice Department cowers before politically powerful people.
Paul Merrell

And The Benghazi Media Circus Plays On… | Global Research - 0 views

  • A recent article written by this writer for Global Research posted last Saturday – “The Benghazi Scandal Is Obama’s Watergate But Worse” – was written in an effort to seek and uncover the truth. Accurate reporting on major world events is a challenge in today’s world where propaganda and disinformation are mainstream media norms and where virtually all major players in American politics simply lie through their teeth every time they open their mouths in constant effort to look good and cover up the truth. The American public knows this pathetic and sobering fact that deception has come to rule in the world of both politics and the media. People today neither believe their newscasters nor their political leaders. That is why examining the content of the tidal wave of assertions and opinions spewing forth from politicians and pundits in the aftermath of the latest Benghazi revelations must be taken with a grain of salt. Again, truth in today’s world is hard to come by. But as an investigative reporter, presenting a brief overview of recent comments and statements for any informed citizen to process and digest seems a worthwhile and important enterprise.
  • A timeline of recently unfolding events: On 10/12/12 exactly one month after the Benghazi incident, the legal conservative group Judicial Watch filed a Freedom of Information Act request seeking documents related to the Benghazi attack on September 11th, 2012 that killed the US Ambassador to Libya Christopher Stevens and three other Americans. Obama, who had campaigned on a promise of transparency in the criminal wake of the Bush regime, has proven to be anything but open and transparent. Having to sue the US government for access to the records, on April 18th, 2014, a full year and a half later, the Obama administration’s stonewalling ultimately failed and Judicial Watch successfully got hold of 41 State Department Benghazi related documents. Emails between high level White House officials discussing damage control strategies in the immediate aftermath of the Benghazi assault were released last week. Jubilant Republicans are now calling one of those emails their “smoking gun,” believing it is so incriminating that it will do in their would-be opponent Hillary Clinton from potentially competing in the 2016 presidential election.
  • The newly declassified email written by Obama’s then Deputy Strategic Communications Adviser Ben Rhodes specifically directed then UN Ambassador Susan Rice in preparation for her Sunday morning talk show appearances on September 16th, 2012 to explain the administration’s take on what it knew of the Benghazi murders. Rhodes advised Rice to attribute the Benghazi uprising as “rooted in an Internet video, and not a failure of policy,” pushing talking points designed to bolster Obama’s presidential image as a cool-as-a-cucumber-under-fire kind of wise and benevolent leader and statesman. The major emphasis of the email instructed Rice to blame the bogus anti-Moslem video as inciting a spontaneous protest like in other countries in the region that apparently grew violently out of control, of course all the while knowing that that was a boldface lie. This crucial piece of evidence proves that President Obama and Secretary of State Hillary Clinton both knew that the video did not cause the attack but that they chose to willfully deceive the American public in order to protect their own political careers and hence was born the infamously never ending Benghazi cover-up. Obama and Hillary withheld this damning email evidence even from the House Oversight Committee led by Congressman Darrel Issa (R-CA) requesting all documents pertaining to Benghazi more than a year ago. With the presidential election less than two months away at the time of the attack, Obama and Hillary were determined at all cost to keep hidden from Americans the real truth of criminal Benghazi activity they were guilty of engaging in during the months leading up to the attack. Last Thursday an angry Issa subpoenaed current Secretary of State John Kerry to appear before the committee on May 21st to further explain why those critical State Department records recently given to Judicial Watch were not among the 3200 documents originally handed over to his committee well over a year ago.
  • ...9 more annotations...
  • Investigative reporter Kenneth R. Timmerman as author of a new forthcoming book entitled ‘Dark Forces: The Truth About What Happened in Benghazi’ states: We know that orders were issued, then recalled, to deploy a 50-man Special Forces unit from Croatia that could have reached Benghazi within hours.Timmerman concludes that to date no documents revealing the person who ordered that unit to stand down have yet to surface.
  • Within hours of the general’s testimony came rebukes from both the senior Republican and Democrat on the powerful House Armed Services Committee making claims backing the administration’s that the military was incapable of responding in time to assist the ill-fated Americans in Benghazi. Because they represent the military in Congress that had already drawn the conclusion that nothing tactically could have been done to save the four Americans, they were quick to rebut the general’s testimony. Yet the day before 9/11 every year since 9/11/01 including on 9/10/11, the president meets with top military and security personnel to ensure that US embassies around the globe are bolstered with much needed extra security for 9/11 readiness. Yet the Benghazi compound was so insecure despite repeated requests, both Obama and the military apparently failed to have any military units on standby that could reach Benghazi to be of service on the night of 9/11/12. And this comes after intelligence sources have been reporting insufficient security at the Benghazi embassy compound.
  • Another disclosure at last Thursday’s House Oversight Committee hearing further damaging the credibility and actions of the Obama administration came from retired Air Force General Robert Lovell who at the time of Benghazi was in Germany serving as the senior African Command deputy director for intelligence. Lovell testified, “We should have sent help,” adding that the White House decision not to attempt military assistance due to the time factor was unacceptable. Lovell also stated unequivocally that the military knew that the Benghazi attack had nothing to do with the video falsely used by the administration to explain away the tragedy. The ex-general felt his military should have intervened and was waiting all night long for the call that never came from his bosses in Washington. Clearly he feels a sense of remorse and regret over the passivity imposed on him by his commander-in-chief Obama and State Department head Clinton.
  • Meanwhile, last week in a heated exchange with ABC correspondent Jon Karl a visibly agitated White House Press Secretary Jay Carney insisted that Rhodes’ email was not related to Benghazi at all but referred to the Moslem protests generally taking place in the region in response to the video. The next day Fox reporter Ed Henry engaged Carney on the same issue, eliciting the same haranguing reaction. All this appears to be yet more desperate lies in a feeble attempt to cover his bosses’ Obama and Hillary’s asses called criminal guilt, and by so doing committing his own. Carney had been among the original recipients of Rhodes’ email. Carney further explained that the same Rhodes talking points echoed those delivered earlier to Congress and the White House by deputy CIA director Mike Morell who a month ago claimed he received no pressure or influence from anyone in the Obama administration in coming up with his version of what most likely transpired on 9/11/12 based on all CIA intelligence sources available at the time. Yet on his own Morell admitted to toning down the intelligence reports leading up to the Benghazi attack purposely so as to not appear to be an “I told you so” gesture that would offend Hillary and her State Department. That said, Hillary’s underling and rising star Victoria Nuland (the later promoted to profanity-speaking Assistant Secretary of State who played such a key role in the recent US backed fascist Ukrainan coup) objected to Morell’s talking points that in her mind leaned too heavily toward blaming her boss and their State Department for insufficient security at the Benghazi compound. Her words:
  • Why do we want Hill to start fingering Ansar Al Sharia [the known al Qaeda affiliated attackers that murdered the four Americans], when we aren’t doing that ourselves until we have the investigation results…and the penultimate point could be abused by Members to beat the State Department for not paying attention to Agency warnings so why do we want to feed that?… Concerned.Observe how the exclusive focus of all post-Benghazi interdepartmental correspondence from Rhodes’ to Morell’s to Nuland’s all center on appearance and potential perception to avoid CYA blame. Furthest down on their priority list is honest and truthful disclosure and self-accountability. Again, the name of the game in the world of politics is passing the buck whenever possible to minimize potential heat that comes with looking bad and maximizing looking good by any means or lies necessary. Benghazi perfectly illustrates all of this.
  • Based on the information finally coming to light all last week, last Friday House Speaker John Boehner (R-OH) called for a special select committee not unlike the one for Watergate to further investigate Benghazi. Representative Trey Gowdy (SC-R) has already been selected as its lead investigator. This grandstanding ploy seems a bit superfluous and redundant since the House Oversight Committee has ostensibly been trying to get to the bottom of Benghazi for nearly a year and a half, albeit thus far ineffective in its results, no help from the State Department’s prior email omissions. Not only is Benghazi the hot topic buzzing here in America, on that same day last Friday, more bullets was buzzing in Benghazi as well. Nine police security soldiers were gunned down by, you guessed it, the same murderers still remaining at large that were behind the 9/11/12 Benghazi attack – the militant group the US has for years labeled an al Qaeda affiliated terrorist organization Ansar al-Sharia. After massacring 31 peaceful demonstrators protesting outside the militants’ headquarters last June, last week’s massacre is a powerful statement showing that the terrorists are still in charge in Benghazi and immune from any accountability from the US installed puppet government either in Tripoli or Washington. They remain free men at large despite Obama’s promise to hunt them down and bring them to justice.
  • The senior Democratic House Intel Committee Representative Adam Schiff (D-CA) typifies the partisan Obama-Hillary politics games of each side racing to the media to point fingers at each other in their same old, same old blame game. On Sunday Schiff stated he does not want any Democrats to participate in the newly forming select committee that the Republican House Speaker Boehner has just recently called for, already naming its GOP chair. That is simply a game the Dems will refuse to play. Why? Because Republicans cannot make them. Sound familiar? Perhaps your 7-year old child might employ this same game strategy. Insider Dems like former White House advisor turned ABC analyst (and another original recipient of Rhodes’ infamous email) David Plouffe conveniently took to ABC’s Sunday morning On This Week with George Stephanopoulos crying foul even louder with their familiar “conspiracy” chant they customarily use to discredit any criticism leveled at the Obama administration. His cries reaching desperation this week accuse a “very loud, delusional minority” of Republicans of an obsessive politics game over Benghazi. Another all too familiar grade school tactic, whatever misbehavior you are accused of, simply accuse your enemy of the same offense, an old early childhood trick that you never need outgrow in the world of politics.
  • Still another indignant reaction hardcore defenders of Hillary and Obama are now quick to cite are the thirteen embassy attacks that occurred as so called “Benghazi’s on Bush’s watch” when not a peep was ever heard from the press. This straw house strategy is designed to show how Republicans and Fox News are hypocritical in their obsession to find dirt on Benghazi where they deny any exists. Yet this accusation seems to omit one very significant fact. Not one of those embassy attacks during the Bush regime resulted in any murdered Americans, much less four of them and one being a US Ambassador, something that has not happened in the last 32 years before Benghazi. The media circus demonizing partisan politics players on both sides epitomizes why the US government is so utterly broken, horribly dysfunctional, morally bankrupt and totally ineffective in addressing any and all of the most pressing problems facing America and the world today. The blame game is all they know. Yet in all their exaggeration, lies, name calling and finger pointing, not one of them is even addressing the pink elephant in the room.
  • Obama, Hillary and then CIA Director retired General Betrayus Petraeus were/are international gun running criminal outlaws of the worst kind, working with the very same al Qaeda terrorist bunch that murdered those four nearly forgotten Americans. US tax dollars were/are going into the pockets of Ansar al-Sharia and al Qaeda mercenaries that looted Muammar Kaddafi’s gold cache and enormous weapon arsenal that included chemical weapons as well as surface to air missiles. And Obama, Petraeus and 2016 presidential heir apparent Hillary were in deep over their heads under Hillary and Stevens’ State Department cover, shipping them from Benghazi through Turkey to Syria to covertly fight a war by proxy against Assad’s government forces. After more than three bloody years, to this day the US is still bent on destroying another sovereign nation posing absolutely no security threat to America. These are the war crimes constantly being committed by Obama, Petraeus and Hillary and their lies upon lies are unraveling at an accelerated clip with each passing month. Thus, expect to see more desperate acts of aggression from desperate despots who know that their jig is up. Yet desperate despots do not care how many humans they will take down with them. But justice for these longtime perpetrators of multiple crimes against humanity will be served in the end.
Paul Merrell

A Clinton Fan Manufactured Fake News That MSNBC Personalities Spread to Discredit WikiL... - 0 views

  • The phrase “Fake News” has exploded in usage since the election, but the term is similar to other malleable political labels such as “terrorism” and “hate speech”; because the phrase lacks any clear definition, it is essentially useless except as an instrument of propaganda and censorship. The most important fact to realize about this new term: those who most loudly denounce Fake News are typically those most aggressively disseminating it. One of the most egregious examples was the recent Washington Post article hyping a new anonymous group and its disgusting blacklist of supposedly pro-Russia news outlets – a shameful article mindlessly spread by countless journalists who love to decry Fake News, despite the Post article itself being centrally based on Fake News. (The Post this week finally added a lame editor’s note acknowledging these critiques; the Post editors absurdly claimed that they did not mean to “vouch for the validity” of the blacklist even though the article’s key claims were based on doing exactly that). Now we have an even more compelling example. Back in October, when WikiLeaks was releasing emails from the John Podesta archive, Clinton campaign officials and their media spokespeople adopted a strategy of outright lying to the public, claiming – with no basis whatsoever – that the emails were doctored or fabricated and thus should be ignored. That lie – and that is what it was: a claim made with knowledge of its falsity or reckless disregard for its truth – was most aggressively amplified by MSNBC personalities such as Joy Ann Reid and Malcolm Nance, The Atlantic’s David Frum, and Newsweek’s Kurt Eichenwald.
  • The phrase “Fake News” has exploded in usage since the election, but the term is similar to other malleable political labels such as “terrorism” and “hate speech”; because the phrase lacks any clear definition, it is essentially useless except as an instrument of propaganda and censorship. The most important fact to realize about this new term: Those who most loudly denounce Fake News are typically those most aggressively disseminating it. One of the most egregious examples was the recent Washington Post article hyping a new anonymous group and its disgusting blacklist of supposedly pro-Russia news outlets — a shameful article mindlessly spread by countless journalists who love to decry Fake News, despite the Post article itself being centrally based on Fake News. (The Post this week finally added a lame editor’s note acknowledging these critiques; the Post editors absurdly claimed that they did not mean to “vouch for the validity” of the blacklist even though the article’s key claims were based on doing exactly that). Now we have an even more compelling example. Back in October, when WikiLeaks was releasing emails from the John Podesta archive, Clinton campaign officials and their media spokespeople adopted a strategy of outright lying to the public, claiming — with no basis whatsoever — that the emails were doctored or fabricated and thus should be ignored. That lie — and that is what it was: a claim made with knowledge of its falsity or reckless disregard for its truth — was most aggressively amplified by MSNBC personalities such as Joy Ann Reid and Malcolm Nance, The Atlantic’s David Frum, and Newsweek’s Kurt Eichenwald.
  • That the emails in the Wikileaks archive were doctored or faked — and thus should be disregarded — was classic Fake News, spread not by Macedonian teenagers or Kremlin operatives but by established news outlets such as MSNBC, The Atlantic, and Newsweek. And, by design, this Fake News spread like wildfire all over the internet, hungrily clicked and shared by tens of thousands of people eager to believe it was true. As a result of this deliberate disinformation campaign, anyone reporting on the contents of the emails was instantly met with claims that the documents in the archive had been proven fake. The most damaging such claim came from MSNBC’s intelligence analyst Malcolm Nance. As I documented on October 11, he tweeted what he — for some bizarre reason — labeled an “Official Warning.” It decreed: “#PodestaEmails are already proving to be riddled with obvious forgeries & #blackpropaganda not even professionally done.” That tweet was re-tweeted by more than 4,000 people. It was vested with added credibility by Clinton-supporting journalists like Reid and Frum (“expert to take seriously”).
  • ...3 more annotations...
  • All of that, in turn, led to an article in something called the “Daily News Bin” with the headline: “MSNBC intelligence expert: WikiLeaks is releasing falsified emails not really from Hillary Clinton.” This classic fake news product — citing Nance and Reid among others — was shared more than 40,000 times on Facebook alone.
  • From the start, it was obvious that it was this accusation from Clinton supporters — not the WikiLeaks documents — that was a complete fraud, perpetrated on the public as deliberate disinformation. With regard to the claim about the Podesta emails, now we know exactly who created it in the first instance: a hard-core Clinton fanatic.
  • Sadly for Chacon, however, the people who ended up getting fooled by his Fake News items were the nation’s most prominent Clinton supporters, including supposed experts and journalists from MSNBC who used his obvious fakes to try to convince the world that the WikiLeaks archive had been compromised and thus should be ignored.
Gary Edwards

Arnold Ahlert: Russia Would Love a Third Obama Term - The Patriot Post - 0 views

  • New York Post columnist John Crudele obliterates the despicable word-parsing. “Clinton was so careless when using her BlackBerry that the Russians stole her password,” he writes. “All Russian President Vladimir Putin’s gang had to do was log into Clinton’s account and read whatever they wanted.” When it comes to the DNC hack, “The Russians did it” is the theme-du-jour. Clinton campaign manager, Robby Mook stated Sunday that “experts are telling us that Russian state actors broke into the DNC, stole these emails, [and are] releasing these emails for the purpose of helping Donald Trump.” The campaign itself echoed that assertion. “This is further evidence the Russian government is trying to influence the outcome of the election.”
  • The reliably leftist Politico — so far left that reporter Ken Vogel remains employed there despite sending a story to the DNC before he sent it to his own editor — is quite comfortable advancing that agenda, using it as a vehicle to buff up Clinton’s tenure as secretary of state. “Former U.S. officials who worked on Russia policy with Clinton say that Putin was personally stung by Clinton’s December 2011 condemnation of Russia’s parliamentary elections, and had his anger communicated directly to President Barack Obama,” Politico reports. “They say Putin and his advisers are also keenly aware that, even as she executed Obama’s ‘reset’ policy with Russia, Clinton took a harder line toward Moscow than others in the administration. And they say Putin sees Clinton as a forceful proponent of ‘regime change’ policies that the Russian leader considers a grave threat to his own survival.” Yet even Politico is forced to admit the payback angle is “speculation,” and that some experts remain “unconvinced that Putin’s government engineered the DNC email hack or that it was meant to influence the election in Trump’s favor as opposed to embarrassing DNC officials for any number of reasons.”
  • Americans would also be wise to remain highly skeptical of this claim for any number of reasons. WikiLeaks founder Julian Assange asserts there is “there is no proof whatsoever” Russia is behind the hack and that “this is a diversion that’s being pushed by the Hillary Clinton campaign.” To be fair, Assange is a Russian sympathizer, and leftists aren’t the only ones attributing the hack to the Russians. The same FBI that gave Clinton a pass will be investigating the DNC hack, and at some point the bureau will reach a conclusion. In the meantime, it might be worth considering that this smacks of a carefully orchestrated disinformation campaign similar to the one Clinton and several other Obama administration officials engineered with regard to Benghazi. While Clinton was never held personally or legally accountable for the deaths of four Americans, it is beyond dispute that she lied unabashedly about a video causing the attack, while sending her daughter a damning email at 11:12 p.m. on Sept. 11, 2012, admitting the administration knew “the attack had nothing to do with the film. It was a planned attack, not a protest.” The theme of this coordinated narrative? Clinton campaign chair John Podesta referred Monday night to “a kind of bromance going on” between Putin and Trump. Clinton campaign manager Robby Mook echoed that assertion, insisting the email dump comes on the heels of “changes to the Republican platform to make it more pro-Russian.”
  • ...3 more annotations...
  • The Leftmedia were equally obliging. “The theory that Moscow orchestrated the leaks to help Trump … is fast gaining currency within the Obama administration because of the timing of the leaks and Trump’s own connections to the Russian government,” reports the Daily Beast. Other Leftmedia examples abound. “Until Friday, that charge, with its eerie suggestion of a Kremlin conspiracy to aid Donald J. Trump, has been only whispered,” shouted the New York Times. “Because the leaks are widely suspected of being the result of a Russian hacking operation, they can be used to reinforce the narrative that Russian President Vladimir Putin is rooting for Trump and that Trump, in turn, would be too accommodating to Moscow,” adds the Los Angeles Times. “Why would Russian President Vladimir Putin want to help Donald Trump win the White House?” asks NPR. “If you want to indulge in a bit of conspiracy theory, remember that Russian President Vladimir Putin has praised candidate Trump as recently as June,” states the Burlington Free Press.
  • Ultimately, here’s the question: If the Russians could access the DNC server, they could certainly access Clinton’s unsecure server. And if they could access Clinton’s server, including the 33,000 emails she deleted (maybe some were about how the Clintons profited from selling American uranium to Russia), ask yourself who they’d rather have in the Oval Office: Donald Trump, who professed admiration for Putin but remains a highly unpredictable individual — or Hillary Clinton, who could be subjected to blackmail for as long as eight years? Russia’s clear objective would be to have the weakest American leadership they can get. Blackmail aside, what would be weaker than an extension of Obama’s presidency?
  • Moreover, it is just as likely a number of the so-called “experts” as well as Clinton’s useful idiot media apparatchiks have considered the blackmail possibility and are trying to divert attention from it with a phony Trump connection story. Democrats can theorize, complain and blame to their hearts' content, but none of it obscures the reality that the DNC — and by extension Hillary Clinton and the entire Democrat Party — are a conglomeration of morally bereft, utterly incompetent individuals wholly ill-equipped to handle internal security, much less national security. And they are aided and abetted by an equally corrupt media, more than willing to abide that potentially catastrophic reality as long as it gets a Democrat in the Oval Office. WikiLeaks has promised additional dumps with be forthcoming. How much deeper Democrats sink is anyone’s guess.
  •  
    "If one lives by the vulnerable server, one dies by the vulnerable server. As the week unfolds, America is witnessing the ultimate unmasking of the Democrat Party, an entity whose self-aggrandizing claims of unity, fairness and intellectual honesty have been revealed as utterly fraudulent by a flood of DNC emails released by WikiLeaks. Moreover, a stunning level of hypocrisy attends the entire exposure, as DNC Chairwoman Debbie Wasserman Schultz is sent packing for this breach of confidential party information, while Hillary Clinton, whose equally accessible private server contained far more critical top-secret information, officially became the party's standard-bearer. But not to worry, assured FBI Director James Comey, who insisted there was no direct evidence that Clinton's server had been hacked by hostile actors - before adding it was possible that hostile actors "gained access" to Clinton's accounts. Clinton was equally adept at making semantical distinctions. "If you go by the evidence, there is no evidence that the system was breached or hacked successfully," Clinton said. "And I think that what's important here is follow the evidence. And there is no evidence. And that can't be said about a lot of other systems, including government systems.""
Paul Merrell

NSA Director Finally Admits Encryption Is Needed to Protect Public's Privacy - 0 views

  • NSA Director Finally Admits Encryption Is Needed to Protect Public’s Privacy The new stance denotes a growing awareness within the government that Americans are not comfortable with the State’s grip on their data. By Carey Wedler | AntiMedia | January 22, 2016 Share this article! https://mail.google.com/mail/?view=cm&fs=1&to&su=NSA%20Director%20Finally%20Admits%20Encryption%20Is%20Needed%20to%20Protect%20Public%E2%80%99s%20Privacy&body=http%3A%2F%2Fwww.mintpress
  • Rogers cited the recent Office of Personnel Management hack of over 20 million users as a reason to increase encryption rather than scale it back. “What you saw at OPM, you’re going to see a whole lot more of,” he said, referring to the massive hack that compromised the personal data about 20 million people who obtained background checks. Rogers’ comments, while forward-thinking, signify an about face in his stance on encryption. In February 2015, he said he “shares [FBI] Director [James] Comey’s concern” about cell phone companies’ decision to add encryption features to their products. Comey has been one loudest critics of encryption. However, Rogers’ comments on Thursday now directly conflict with Comey’s stated position. The FBI director has publicly chastised encryption, as well as the companies that provide it. In 2014, he claimed Apple’s then-new encryption feature could lead the world to “a very dark place.” At a Department of Justice hearing in November, Comey testified that “Increasingly, the shadow that is ‘going dark’ is falling across more and more of our work.” Though he claimed, “We support encryption,” he insisted “we have a problem that encryption is crashing into public safety and we have to figure out, as people who care about both, to resolve it. So, I think the conversation’s in a healthier place.”
  • At the same hearing, Comey and Attorney General Loretta Lynch declined to comment on whether they had proof the Paris attackers used encryption. Even so, Comey recently lobbied for tech companies to do away with end-to-end encryption. However, his crusade has fallen on unsympathetic ears, both from the private companies he seeks to control — and from the NSA. Prior to Rogers’ statements in support of encryption Thursday, former NSA chief Michael Hayden said, “I disagree with Jim Comey. I actually think end-to-end encryption is good for America.” Still another former NSA chair has criticized calls for backdoor access to information. In October, Mike McConnell told a panel at an encryption summit that the United States is “better served by stronger encryption, rather than baking in weaker encryption.” Former Department of Homeland Security chief, Michael Chertoff, has also spoken out against government being able to bypass encryption.
  • ...2 more annotations...
  • Regardless of these individual defenses of encryption, the Intercept explained why these statements may be irrelevant: “Left unsaid is the fact that the FBI and NSA have the ability to circumvent encryption and get to the content too — by hacking. Hacking allows law enforcement to plant malicious code on someone’s computer in order to gain access to the photos, messages, and text before they were ever encrypted in the first place, and after they’ve been decrypted. The NSA has an entire team of advanced hackers, possibly as many as 600, camped out at Fort Meade.”
  • Rogers statements, of course, are not a full-fledged endorsement of privacy, nor can the NSA be expected to make it a priority. Even so, his new stance denotes a growing awareness within the government that Americans are not comfortable with the State’s grip on their data. “So spending time arguing about ‘hey, encryption is bad and we ought to do away with it’ … that’s a waste of time to me,” Rogers said Thursday. “So what we’ve got to ask ourselves is, with that foundation, what’s the best way for us to deal with it? And how do we meet those very legitimate concerns from multiple perspectives?”
Paul Merrell

As Democrats Gather, a Russian Subplot Raises Intrigue - The New York Times - 0 views

  • An unusual question is capturing the attention of cyberspecialists, Russia experts and Democratic Party leaders in Philadelphia: Is Vladimir V. Putin trying to meddle in the American presidential election?Until Friday, that charge, with its eerie suggestion of a Kremlin conspiracy to aid Donald J. Trump, has been only whispered.But the release on Friday of some 20,000 stolen emails from the Democratic National Committee’s computer servers, many of them embarrassing to Democratic leaders, has intensified discussion of the role of Russian intelligence agencies in disrupting the 2016 campaign. #conventions-briefing-promo .interactive-graphic { margin-bottom: 0; } .g-briefing-promo a { color: #000; } .g-briefing-promo .g-headline { font: 700 21px/1.1 nyt-cheltenham, georgia, serif; font-style: italic; } .viewport-medium-10 .g-briefing-promo .g-headline { font-size: 24px; line-height: 1.2; } .g-briefing-promo .g-kicker { color: #a81817; } .g-briefing-promo .g-item { font: 400 14px/1.3 nyt-franklin, helvetica, arial, sans-serif; padding: 9px 0 1px 16px; display: block; } .viewport-medium-10 .g-briefing-promo .g-item { font-size: 15px; line-height: 1.2; padding-bottom: 3px; } .g-briefing-promo .g-item:before { content: '•'; display: block; position: absolute; margin-top: 2px; margin-left: -14px; font-size: 11px; }
  • The emails, released first by a supposed hacker and later by WikiLeaks, exposed the degree to which the Democratic apparatus favored Hillary Clinton over her primary rival, Senator Bernie Sanders of Vermont, and triggered the resignation of Debbie Wasserman Schultz, the party chairwoman, on the eve of the convention’s first day.Proving the source of a cyberattack is notoriously difficult. But researchers have concluded that the national committee was breached by two Russian intelligence agencies, which were the same attackers behind previous Russian cyberoperations at the White House, the State Department and the Joint Chiefs of Staff last year. And metadata from the released emails suggests that the documents passed through Russian computers. Though a hacker claimed responsibility for giving the emails to WikiLeaks, the same agencies are the prime suspects. Whether the thefts were ordered by Mr. Putin, or just carried out by apparatchiks who thought they might please him, is anyone’s guess.
  •  
    Yes, talk about anything but the contents of the emails.
Gary Edwards

Secret White House Email Accounts Uncover IRS-Obama Smoking Gun : palookavillepost.com - 0 views

  • During an investigation of President Barack Hussein Obama’s political appointees and White House aides, FBI agents discovered secret government email accounts they say were used as primary means for Obama’s staff to interact with IRS officials for day-to-day business.
  • Investigators became curious about the possibility of such accounts after Congress requested all emails from the White House regarding the Benghazi, IRS and other scandals, and the White House could only produce a handful of emails that discussed those topics.
  • “We had one of our hackers get into a White House intern’s computer, and that’s where we located a slew of private email accounts not associated with Federal government accounts,” said a spokesman for the powerful federal police agency.
  • ...6 more annotations...
  • Emails sent to people outside of the secret network of White House email accounts were programmed to automatically be deleted five minutes after opening the message, just like on Mission Impossible. This explains the absence of White House emails received by IRS officials.
  • “The content of the emails is still being reviewed, but it is clear that people inside the White House knew about the IRS targeting conservatives, and that somebody with the nickname “Basketball Jones” was the person who told American forces to stand down during the attacks in Benghazi.”
  • “The White House tried to cover their tracks by saying that former IRS Commissioner Douglas Shulman visited the White House 157 times, and that they never used email to communicate,” said the FBI spokesman.
  • Only a few of the emails have been reviewed, but already several of them indicate that President Obama not only knew about the scheme, but he himself ordered the IRS to flood the Tea Party with paperwork and fees.
  • Here is one transcript of a hidden email from an unknown White House aide in April, 2011:
  • “Hey Shulman… What’s up?… Don’t forget BJ(Basketball Jones) wants you to kick up the fees on anyone with Tea Party or Conservative in their names… try to see if you can make them hire expensive tax attorneys too… bog them down with paperwork so they can’t campaign for milk boy(Mitt Romney) or Ru Paul(Ron Paul)… sorry you missed the Easter Egg Hunt… maybe next year… I’d invite you to stay in the Lincoln bedroom but that costs real money… send me a report on how many Tea Party groups quit because of being jerked around…ASAP… Chow!”
  •  
    Although this article has zero credibility and even less reference checking, everyone in America knows that Obama ordered the IRS hit on Tea Party Patriots, Conservatives and Jewish Homeland organizations.  That the IRS admits to violating the Constitutional civil rights of tens of millions of law abviding Americans, and did so in ways that only benefit the Obama re-election campaign is proof enough for anyone who loves liberty.
Paul Merrell

The NSA is turning the internet into a total surveillance system | Alexander Abdo and P... - 0 views

  • Another burst of sunlight permeated the National Security Agency's black box of domestic surveillance last week.According to the New York Times, the NSA is searching the content of virtually every email that comes into or goes out of the United States without a warrant. To accomplish this astonishing invasion of Americans' privacy, the NSA reportedly is making a copy of nearly every international email. It then searches that cloned data, keeping all of the emails containing certain keywords and deleting the rest – all in a matter of seconds.
  • The NSA appears to believe this general monitoring of our electronic communications is justified because the entire process takes, in one official's words, "a small number of seconds". Translation: the NSA thinks it can intercept and then read Americans' emails so long as the intrusion is swift, efficient and silent.That is not how the fourth amendment works.Whether the NSA inspects and retains these messages for years, or only searches through them once before moving on, the invasion of Americans' privacy is real and immediate. There is no "five-second rule" for fourth amendment violations: the US constitution does not excuse these bulk searches simply because they happen in the blink of an eye.The government claims that this program is authorized by a surveillance statute passed in 2008 that allows the government to target foreigners for surveillance. Although the government has frequently defended that law as a necessary tool in gathering foreign intelligence, the government has repeatedly misled the public about the extent to which the statute implicates Americans' communications.
  • There should no longer be any doubt: the US government has for years relied upon its authority to collect foreigners' communications as a useful cover for its sweeping surveillance of Americans' communications. The surveillance program revealed last week confirms that the interception of American communications under this law is neither "targeted" at foreigners (in any ordinary sense of that word) nor "inadvertent", as officials have repeatedly claimed.Last week's revelations are a disturbing harbinger of future surveillance. Two months ago, this newspaper reported that the US government has been forcing American telecommunications companies to turn over the call records of every one of their customers "on an ongoing daily basis", to allow the NSA to later search those records when it has a reason to do so. The government has since defended the program, in part on the theory that Americans' right to privacy is not implicated by the initial acquisition of their phone records, only by their later searching.That legal theory is extraordinarily dangerous because it would allow the NSA to acquire virtually all digital information today simply because it might possibly become relevant tomorrow. The surveillance program revealed by the New York Times report goes one step further still. No longer is the government simply collecting information now so that the data is available to search, should a reasonable suspicion arise at some point in the future; the NSA is searching everything now – in real time and without suspicion – merely on the chance that it finds something of interest.
  • ...1 more annotation...
  • That principle of pre-emptive surveillance threatens to subvert the most basic protections of the fourth amendment, which generally prohibit the government from conducting suspicion-less fishing expeditions through our private affairs. If the government is correct that it can search our every communication in case we say or type something suspicious, there is little to prevent the NSA from converting the internet into a tool of pervasive surveillance.
  •  
    Obama was apparently technically accurate but materially misleading when he he said that no one is reading your email. But government computers are reading every email. "Although conduct by law enforcement officials prior to trial may ultimately impair that right, a constitutional violation occurs only at trial. Kastigar v. United States, 406 U. S. 441, 453 (1972). The Fourth Amendment functions differently. It prohibits 'unreasonable searches and seizures' whether or not the evidence is sought to be used in a criminal trial, and a violation of the Amendment is 'fully accomplished' at the time of an unreasonable governmental intrusion. United States v. Calandra, 414 U. S. 338, 354 (1974); United States v. Leon, 468 U. S. 897, 906 (1984)." United States v. Verdugo-Urquidez, 494 US 259, 265 (1990), http://scholar.google.com/scholar_case?case=10167007390100843851  
1 - 20 of 177 Next › Last »
Showing 20 items per page