Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged emails

Rss Feed Group items tagged

Paul Merrell

How Hillary Clinton Ignores Peace - Consortiumnews - 0 views

  • Publicly, Hillary Clinton has toyed with both the democracy and humanitarian arguments but one of her official emails – released by the State Department – explains that the underlying reason for the Syrian “regime change” war was the Israeli government’s desire to remove Syria as the link in the supply chain between Iran and Israel’s foe, Lebanon’s Hezbollah.
  • Though undated and unsigned, the Clinton email reflected the then-Secretary of State’s thinking as of late April 2012 (when it appears to have been sent), about one year into the Syrian civil war. The email explains the need for “regime change” in Damascus as important to Israel, which wanted to blunt Iranian regional influence and protect Israel’s “nuclear monopoly,” which is acknowledged quite frankly although Israel’s status as a rogue nuclear state is still considered a state secret by the U.S. government. “The best way to help Israel deal with Iran’s growing nuclear capability is to help the people of Syria overthrow the regime of Bashar Assad,” Clinton’s email states, brushing aside President Obama’s (eventually successful) negotiations to restrict Iran’s nuclear program. “Negotiations to limit Iran’s nuclear program will not solve Israel’s security dilemma,” the Clinton email says. “Nor will they stop Iran from improving the crucial part of any nuclear weapons program — the capability to enrich uranium. At best, the talks between the world’s major powers and Iran that began in Istanbul this April and will continue in Baghdad in May will enable Israel to postpone by a few months a decision whether to launch an attack on Iran that could provoke a major Mideast war.”
  • The email explains: “Iran’s nuclear program and Syria’s civil war may seem unconnected, but they are. For Israeli leaders, the real threat from a nuclear-armed Iran is not the prospect of an insane Iranian leader launching an unprovoked Iranian nuclear attack on Israel that would lead to the annihilation of both countries. What Israeli military leaders really worry about — but cannot talk about — is losing their nuclear monopoly. … “The result would be a precarious nuclear balance in which Israel could not respond to provocations with conventional military strikes on Syria and Lebanon, as it can today. If Iran were to reach the threshold of a nuclear weapons state, Tehran would find it much easier to call on its allies in Syria and Hezbollah to strike Israel, knowing that its nuclear weapons would serve as a deterrent to Israel responding against Iran itself.”
  • ...1 more annotation...
  • In other words, all the “humanitarian” talk about “safe zones” and other excuses for Syrian “regime change” was only the camouflage for Clinton’s desire to protect Israel’s “nuclear monopoly” and the freedom to mount what Israel has called “trimming the grass” operations, periodically mowing down Arabs in Lebanon, Gaza and elsewhere.
  •  
    The article quotes at length from the email and is well worth reading. But keep in mind that the consensus position of all U.S. intelligence agencies that Iran had no nuclear weapons program had first been published (and promptly leaked to the LA Times) in 2007. So when Hillary composed this email in 2012, she had to know that there was no truth to the Iranian nukes myth. In other words, she was basing her advocated position on war against Syria on a lie.
Paul Merrell

Ripped From Hillary's Emails: French Plot to Overthrow Gaddafi and Help Itself to Libya... - 0 views

  • The Congressional harrying of former U.S. Secretary of State Hillary Clinton over emails concerning the 2012 death of an American Ambassador and three staff members in Benghazi, Libya, has become a sort of running joke, with Republicans claiming “cover-up” and Democrats dismissing the whole matter as nothing more than election year politics. But there is indeed a story embedded in the emails, one that is deeply damning of American and French actions in the Libyan civil war, from secretly funding the revolt against Muammar Gaddafi, to the willingness to use journalism as a cover for covert action. The latest round of emails came to light June 22 in a fit of Republican pique over Clinton’s prevarications concerning whether she solicited intelligence from her advisor, journalist and former aide to President Bill Clinton, Sidney Blumenthal. If most newspaper readers rolled their eyes at this point and decided to check out the ball scores, one can hardly blame them. But that would be a big mistake.
  • The Congressional harrying of former U.S. Secretary of State Hillary Clinton over emails concerning the 2012 death of an American Ambassador and three staff members in Benghazi, Libya, has become a sort of running joke, with Republicans claiming “cover-up” and Democrats dismissing the whole matter as nothing more than election year politics. But there is indeed a story embedded in the emails, one that is deeply damning of American and French actions in the Libyan civil war, from secretly funding the revolt against Muammar Gaddafi, to the willingness to use journalism as a cover for covert action. The latest round of emails came to light June 22 in a fit of Republican pique over Clinton’s prevarications concerning whether she solicited intelligence from her advisor, journalist and former aide to President Bill Clinton, Sidney Blumenthal. If most newspaper readers rolled their eyes at this point and decided to check out the ball scores, one can hardly blame them. But that would be a big mistake. While the emails do raise questions about Hillary Clinton’s veracity, the real story is how French intelligence plotted to overthrow the Libyan leader in order to claim a hefty slice of Libya’s oil production and “favorable consideration” for French businesses.
  • Clinton was aware of everything the French were up to and apparently had little objection to the cold-blooded cynicism behind Paris’s policies in the region.
Paul Merrell

CIA Torture Report: Oversight, But No Remedies Yet - 0 views

  • The release of the executive summary of the Senate Intelligence Committee report on CIA’s post-9/11 interrogation program is, among other things, an epic act of record preservation. Numerous CIA records that might not have been disclosed for decades, or ever, were rescued from oblivion by the Senate report and are now indelibly cited and quoted, even if many of them are not yet released in full. That’s not a small thing, since the history of the CIA interrogation program was not a story that the Agency was motivated or equipped to tell. “The CIA informed the Committee that due to CIA record retention policies, the CIA could not produce all CIA email communications requested by the Committee,” the report noted, explaining that the desired information was sometimes recovered from a reply message when the original email was missing. Agency emails turned out to be a critical source of information, a fact that illuminates the Committee’s sharp response recently to the (now suspended) CIA proposal to the National Archives (NARA) to destroy most Agency emails of non-senior officials.
  • Thus, the gruesome record of the waterboarding of al Qaeda operative Abu Zubaydah “was referenced in emails, but was not documented or otherwise noted in CIA cables.” (This is at odds with NARA’s initial view that “It is unlikely that permanent records will be found in these email accounts that is not filed in other appropriate files.”) The Committee report is also a remarkable demonstration of the congressional oversight function that is all the more impressive because it was performed in adverse, unfavorable conditions. It is striking to see how the CIA sometimes treated the Senate Intelligence Committee, its leadership and its staff with the same disdain and evasiveness that is often perceived by FOIA requesters and other members of the public. Committee questions were ignored, inaccurate information was provided, and the oversight process was gamed.
  • “Internal CIA emails include discussion of how the CIA could ‘get… off the hook on the cheap’ regarding [then-Committee] Chairman [Bob] Graham’s requests for additional information…. In the end, CIA officials simply did not respond to Graham’s requests prior to his departure from the Committee in January 2003,” the report said. “I am deeply disturbed by the implications of the study for the committee’s ability to discharge its oversight responsibility,” wrote Sen. Angus King (I-Maine) in his additional remarks. “Because it appears from the study that the committee was continuously misled as to virtually all aspects of this program, it naturally raises the extremely troubling question as to whether we can trust the representations of the agency in connection with difficult or sensitive issues in the future.” But minority members of the Committee disputed this characterization: “In reality, the overall pattern of engagement with the Congress shows that the CIA attempted to keep the Congress informed of its activities,” they wrote in their extensive dissenting views. Perhaps the most important achievement of the Committee report was to document and memorialize the fact that agents of the US Government practiced torture. Not “harsh measures” or “enhanced techniques,” but torture.
  • ...2 more annotations...
  • Senator Susan Collins (R-Maine), who criticized what she said were methodological flaws in the Committee report, said in her additional views that “Despite these significant flaws, the report’s findings lead me to conclude that some detainees were subject to techniques that constituted torture. This inhumane and brutal treatment never should have occurred.” By the same token, the most important omission from the report is the absence of any discussion of remedies. Now that it is firmly established that “we tortured some folks,” as President Obama awkwardly put it, the question is what to do about it. Confession without atonement is incomplete. Prosecution seems problematic for a number of reasons, including the difficulty of localizing responsibility, when it is entire institutions and not just particular officials that failed. A different approach to the problem would start by considering the individuals who suffered abuse at the hands of the U.S. government, including a number of persons who were detained in error. Congress could now ask how some of them (i.e. those who are still alive) could be compensated in some measure for what was wrongly done to them.
  • Several previous efforts to seek remedies for torture were deflected by use of the state secrets privilege. In light of the detailed findings of the Senate Intelligence Committee report, that sort of evasion should be harder to sustain. Congress could accelerate a resolution of the problem with a focused investigation of what potential remedies are now feasible and appropriate.
Paul Merrell

Weekly Update: JW Sues for Unmasking Targeting Trump Team - 0 views

  • Much Needed New Scrutiny of the Clinton Foundation   Will there ever be a serious investigation and prosecution of the Clinton cash machine? Maybe. Micah Morrison, our chief investigative reporter, has an important update in his latest Investigative Bulletin:   Rumors have been floating up from Little Rock for months now of a new investigation into the Clinton Foundation. John Solomon advanced the story recently in a January report for The Hill. FBI agents in the Arkansas capital, he wrote, “have taken the lead” in a new Justice Department inquiry “into whether the Clinton Foundation engaged in any pay-to-play politics or other illegal activities while Hillary Clinton served as secretary of state.” Solomon reports that the probe “may also examine whether any tax-exempt assets were converted for personal or political use and whether the foundation complied with applicable tax laws.”   Main Justice also is “re-examining whether there are any unresolved issues from the closed case into Clinton’s transmission of classified information through her personal email server,” Solomon notes.   Solomon is not alone. The Wall Street Journal is tracking the story. And earlier this month, investigative journalist Peter Schweizer cryptically told SiriusXM radio that federal authorities should “convene a grand jury” in Little Rock “and let the American people look at the evidence” about the Clinton Foundation.   Judicial Watch continues to turn up new evidence of Clinton pay-to-play and mishandling of classified information. In recent months, through FOIA litigation, Judicial Watch has forced the release of more than 2,600 emails and documents from Mrs. Clinton and her associates, with more to come. The emails include evidence of Clinton Foundation donors such XL Keystone lobbyist Gordon Griffin, futures brokerage firm CME Group chairman Terrence Duffy, and an associate of Shangri La Entertainment mogul Steve Bing seeking special favors from the State Department. Read more about Judicial Watch’s pay-to-play disclosures here.   Judicial Watch also revealed many previously unreported incidents of mishandling of classified information. Mrs. Clinton and her former State Department deputy chief of staff, Huma Abedin, sent and received classified information through unsecure channels. The emails and documents involved sensitive information about President Obama, the Middle East, Africa, Afghanistan, Mexico, Burma, India, intelligence-related operations and world leaders. For documents and details from Judicial Watch on the mishandling of classified information, see here, here, here and here.   Smelling a rat in Arkansas when it comes to the Clintons of course is nothing new, and the former First Couple are masters of the gray areas around pay-to-play. But mishandling of classified information is a serious matter. And the tax angle is intriguing, even if you’re not Al Capone. The tenacious financial expert Charles Ortel, who has been digging deep into Clinton finances for years, told us back in 2015 that there are “epic problems” with the entire Clinton Foundation edifice, which traces its origins back to Arkansas. He noted that independent accounting firms may have been “duped by false and materially misleading representations” made by Clinton charitable entities. Down in Arkansas, law enforcement may be finally catching up with Ortel’s insights.
Paul Merrell

5 Biggest Revelations from Latest Podesta Emails - 0 views

  • Wikileaks’ releases of the now infamous “Podesta Emails” have become such a regular occurrence, it’s becoming difficult to keep up. 11 “batches” have been released so far, bringing the total to 17,510 with an estimated 32,000 left to go before the US election takes place on November 8th. Though True Activist covered many of the earlier leaks, including the transcripts of Clinton’s private speeches and Clinton’s admission that the Saudis are funding ISIS, many other potentially damning revelations have since come to light. Here are the top 5 newest revelations from the last 3 email releases (#9 to 11).
  • 4. Wall Street Handpicked Obama’s Entire 2008 Cabinet Though most of the leaks thus far have been focused largely on Clinton and her campaign, some of the released emails have shed light on corruption within the Obama administration. In 2008, at the height of the financial crisis, an executive from CitiGroup emailed John Podesta one month before Podesta was named chairman of Obama’s 2008 transition team. CitiGroup, at the time, was the largest company and bank in the world by assets. The email from CitiGroup executive Michael Froman is titled “Lists.” The lists within, naming prospective candidates for cabinet positions, matches Obama’s 2008 Cabinet almost exactly. They also suggest choosing candidates of various ethnic minorities as a political tactic (see #3 above). The email proposed: Robert Gates as secretary of Defense; Eric Holder as attorney general; Janet Napolitano as secretary of Homeland Security; Rahm Emanuel as White House chief of staff; Susan Rice as United Nations ambassador; Arne Duncan as secretary of Education; Kathleen Sebelius as secretary of Health and Human Services; Peter Orszag as head of the Office of Management and Budget; Eric Shinseki as secretary of Veterans Affairs; and Melody Barnes as chief of the Domestic Policy Council. Froman offered Podesta with three possibilities for the position of Secretary of the Treasury: Robert Rubin and his close disciples Lawrence Summers and Timothy Geithner. Obama ultimately chose Geithner, who was then president of the Federal Reserve Bank of New York. Geithner, along with Bush Treasury Secretary and former Goldman Sachs CEO Henry Paulson and then-Fed Chairman Ben Bernanke, were those chiefly responsible for organizing the Wall Street bailout.
  •  
    Citibank chose Obama's 2008 cabinet. Why am I not surprised?
Paul Merrell

As Democrats Gather, a Russian Subplot Raises Intrigue - The New York Times - 0 views

  • An unusual question is capturing the attention of cyberspecialists, Russia experts and Democratic Party leaders in Philadelphia: Is Vladimir V. Putin trying to meddle in the American presidential election?Until Friday, that charge, with its eerie suggestion of a Kremlin conspiracy to aid Donald J. Trump, has been only whispered.But the release on Friday of some 20,000 stolen emails from the Democratic National Committee’s computer servers, many of them embarrassing to Democratic leaders, has intensified discussion of the role of Russian intelligence agencies in disrupting the 2016 campaign. #conventions-briefing-promo .interactive-graphic { margin-bottom: 0; } .g-briefing-promo a { color: #000; } .g-briefing-promo .g-headline { font: 700 21px/1.1 nyt-cheltenham, georgia, serif; font-style: italic; } .viewport-medium-10 .g-briefing-promo .g-headline { font-size: 24px; line-height: 1.2; } .g-briefing-promo .g-kicker { color: #a81817; } .g-briefing-promo .g-item { font: 400 14px/1.3 nyt-franklin, helvetica, arial, sans-serif; padding: 9px 0 1px 16px; display: block; } .viewport-medium-10 .g-briefing-promo .g-item { font-size: 15px; line-height: 1.2; padding-bottom: 3px; } .g-briefing-promo .g-item:before { content: '•'; display: block; position: absolute; margin-top: 2px; margin-left: -14px; font-size: 11px; }
  • The emails, released first by a supposed hacker and later by WikiLeaks, exposed the degree to which the Democratic apparatus favored Hillary Clinton over her primary rival, Senator Bernie Sanders of Vermont, and triggered the resignation of Debbie Wasserman Schultz, the party chairwoman, on the eve of the convention’s first day.Proving the source of a cyberattack is notoriously difficult. But researchers have concluded that the national committee was breached by two Russian intelligence agencies, which were the same attackers behind previous Russian cyberoperations at the White House, the State Department and the Joint Chiefs of Staff last year. And metadata from the released emails suggests that the documents passed through Russian computers. Though a hacker claimed responsibility for giving the emails to WikiLeaks, the same agencies are the prime suspects. Whether the thefts were ordered by Mr. Putin, or just carried out by apparatchiks who thought they might please him, is anyone’s guess.
  •  
    Yes, talk about anything but the contents of the emails.
Paul Merrell

Clinton: Destroy Syria for Israel - - 0 views

  • A newly-released Hilary Clinton email confirmed that the Obama administration has deliberately provoked the civil war in Syria as the “best way to help Israel.” In an indication of her murderous and psychopathic nature, Clinton also wrote that it was the “right thing” to personally threaten Bashar Assad’s family with death.
  • In the email, released by Wikileaks, then Secretary of State Clinton says that the “best way to help Israel” is to “use force” in Syria to overthrow the government. The document was one of many unclassified by the US Department of State under case number F-2014-20439, Doc No. C05794498, following the uproar over Clinton’s private email server kept at her house while she served as Secretary of State from 2009 to 2013. Although the Wikileaks transcript dates the email as December 31, 2000, this is an error on their part, as the contents of the email (in particular the reference to May 2012 talks between Iran and the west over its nuclear program in Istanbul) show that the email was in fact sent on December 31, 2012. The email makes it clear that it has been US policy from the very beginning to violently overthrow the Syrian government—and specifically to do this because it is in Israel’s interests.
  • She specifically links Iran’s mythical atom bomb program to Syria because, she says, Iran’s “atom bomb” program threatens Israel’s “monopoly” on nuclear weapons in the Middle East. If Iran were to acquire a nuclear weapon, Clinton asserts, this would allow Syria (and other “adversaries of Israel” such as Saudi Arabia and Egypt) to “go nuclear as well,” all of which would threaten Israel’s interests. Therefore, Clinton, says, Syria has to be destroyed.
  • ...2 more annotations...
  • “The best way to help Israel deal with Iran’s growing nuclear capability is to help the people of Syria overthrow the regime of Bashar Assad,” Clinton forthrightly starts off by saying. Even though all US intelligence reports had long dismissed Iran’s “atom bomb” program as a hoax (a conclusion supported by the International Atomic Energy Agency), Clinton continues to use these lies to “justify” destroying Syria in the name of Israel.
  • A newly-released Hilary Clinton email confirmed that the Obama administration has deliberately provoked the civil war in Syria as the “best way to help Israel.” In an indication of her murderous and psychopathic nature, Clinton also wrote that it was the “right thing” to personally threaten Bashar Assad’s family with death.
Paul Merrell

Former NSA and CIA director says terrorists love using Gmail - 0 views

  • Former NSA and CIA director Michael Hayden stood on the pulpit of a church across from the White House on Sunday and declared Gmail the preferred online service of terrorists. As part of an adult education forum at St. John’s Episcopal Church, Hayden gave a wide ranging speech on "the tension between security and liberty." During the speech, he specifically defended Section 702 of the Foreign Surveillance Intelligence Act (FISA), which provides the legal basis for the PRISM program. In doing so, Hayden claimed "Gmail is the preferred Internet service provider of terrorists worldwide," presumably meaning online service rather than the actual provider of Internet service. He added: "I don't think you're going to see that in a Google commercial, but it's free, it's ubiquitous, so of course it is."
  •  
    I wonder if he was just shooting from the hip, or if not, whether his analysis ignored some important factors, e.g., -- Qualitative factors, e.g., is he talking about run-of-the-mill terrorists or tech-savvy "terrorists." One might reasonably suspect that the tech-savvy would avoid Gmail like the plague particularly since Edward Snowden's disclosures began to appear. -- Likewise, are the NSA's foreign language Email scanning abilities as good as their English scanning abilities? One might reasonably suspect that the tech-savvy "terrorists" communicate using fairly obscure foreign human languages that NSA's scanners do less than a good job of comprehending. Remember the "Wind Talkers" of World War II who communicated using the Navajo language, a "code" the Japanese never decoded.  -- There's also the selection factor. We now know that NSA gets daily doses of email metadata from Google and Yahoo! but hasn't yet set up similar listening posts for most email services on the globe. Are we to believe that the availability of the metadata  for the big two email services has no effect on detection of "terrorist" emails? I doubt that NSA would be fighting so hard to keep PRISM were that true.
Gary Edwards

The List: Unnecessarily Shut Down by Obama to Inflict Public Pain - 0 views

  •  
    "The media may or may not report on these individual occurrences, but what they will never do is provide the American people with the full context and scope of Obama's shrill pettiness. Below is a list of illogical, unnecessary, and shockingly spiteful moves our government is making in the name of essential and non-essential. This list will be regularly updated, and if you have something you feel should be added, please email me at jnolte@breitbart.com or tweet me @NolteNC.Please include a link to the news source. -- 1. Treatments for Children Suffering From Cancer - The GOP have agreed to a compromise by funding part of the government, including the National Institutes of Health, which offers children with cancer last-chance experimental treatment. Obama has threatened to veto this funding. 2. The World War II Memorial - The WWII memorial on the DC Mall is a 24/7 open-air memorial that is not regularly staffed. Although the White House must have known that WWII veterans in their eighties and nineties had already booked flights to visit this memorial, the White House still found the resources to spitefully barricade the attraction.  The Republican National Committee has offered to cover any costs required to keep the memorial open. The White House refused. Moreover, like the NIH, the GOP will pass a compromise bill that would fund America's national parks. Obama has threatened to veto that bill. 3. Furloughed Military Chaplains Not Allowed to Work for Free - Furloughed military chaplains willing to celebrate Mass and baptisms for free have been told they will be punished for doing so. 4. Business Stops In Florida Keys - Although the GOP have agreed to compromise in the ongoing budget stalemate and fund the parks, Obama has threatened to veto that funding. As a result, small businesses, hunters, and commercial fisherman can't practice their trade. While the feds have deemed the personnel necessary to keep this area open "non-essential," the "enforcement office
Paul Merrell

State Dept. turns up thousands of emails from top Clinton aide | TheHill - 0 views

  • State Department officials have uncovered thousands of emails between Philippe Reines, a top Hillary Clinton aide, and members of the media, they previously said did not exist.In a court filing last Thursday, the State Department estimated that a recent search turned up more than 81,000 emails from Reines’s official account while at the State Department. And 17,855 potentially fall within a Freedom of Information Act (FOIA) lawsuit filed by Gawker earlier this year.ADVERTISEMENTThat is a reversal from 2013, when the State Department said a thorough search turned up no responsive records for Gawker’s request. In 2012, Gawker requested all emails between Reines and reporters from 34 media outlets.The State Department did not explain the reversal in the court document, nor did it return a request for comment.It will begin releasing a tranche of Reines's emails by the end of September.
  • fter it was revealed earlier this year that Clinton, and potentially some of her aides, used personal email accounts for official business, Gawker sued the State Department over its initial request for communications between Reines and reporters.Gawker asserted the search must not have been exhaustive if it turned up no emails between the press and a State Department spokesman, who regularly communicated with the media.In March, Reines said reporters would have to ask the State Department about the apparent discrepancy.In last week’s court filing, the State Department estimated it would begin releasing some of those emails that do not fall within an exemption on Sept. 30. It will release more every 30 days as they are reviewed.The agency said it does not know how many of the 17,855 are exempt from disclosure and will have to be redacted or handed over to other agencies for redaction
Paul Merrell

3,000 Pages of Hillary Clinton's Emails Were Just Released - Many Heavily Redacted | VI... - 0 views

  • At 9pm ET Tuesday evening, the State Department released about 3,000 pages of Hillary Clinton's emails, which cover much of 2009, her first year as Secretary of State.The emails refer to a wide-range of topics and hot-button issues Clinton, currently the Democratic presidential frontrunner, confronted that year, including Afghanistan, Iran, and the detention center at Guantanamo Bay. Despite the fact that Clinton said she wanted "all of her emails" released "as soon as possible," the State Department redacted her emails and applied numerous exemptions under the Freedom of Information Act (FOIA) justifying the withholding of certain information.The State Department redacted large swaths of information in the emails, often citing a privacy exemption and an exemption that protects the so-called "deliberative process." The emails also contained redactions in which the State Department withheld information citing a national security exemption, which calls into question Clinton's assertion that she did not send classified information over her private email server.
Paul Merrell

Western Spy Agencies Secretly Rely on Hackers for Intel and Expertise - The Intercept - 0 views

  • The U.S., U.K. and Canadian governments characterize hackers as a criminal menace, warn of the threats they allegedly pose to critical infrastructure, and aggressively prosecute them, but they are also secretly exploiting their information and expertise, according to top secret documents. In some cases, the surveillance agencies are obtaining the content of emails by monitoring hackers as they breach email accounts, often without notifying the hacking victims of these breaches. “Hackers are stealing the emails of some of our targets… by collecting the hackers’ ‘take,’ we . . .  get access to the emails themselves,” reads one top secret 2010 National Security Agency document. These and other revelations about the intelligence agencies’ reliance on hackers are contained in documents provided by whistleblower Edward Snowden. The documents—which come from the U.K. Government Communications Headquarters agency and NSA—shed new light on the various means used by intelligence agencies to exploit hackers’ successes and learn from their skills, while also raising questions about whether governments have overstated the threat posed by some hackers.
  • By looking out for hacking conducted “both by state-sponsored and freelance hackers” and riding on the coattails of hackers, Western intelligence agencies have gathered what they regard as valuable content: Recently, Communications Security Establishment Canada (CSEC) and Menwith Hill Station (MHS) discovered and began exploiting a target-rich data set being stolen by hackers. The hackers’ sophisticated email-stealing intrusion set is known as INTOLERANT. Of the traffic observed, nearly half contains category hits because the attackers are targeting email accounts of interest to the Intelligence Community. Although a relatively new data source, [Target Offices of Primary Interest] have already written multiple reports based on INTOLERANT collect. The hackers targeted a wide range of diplomatic corps, human rights and democracy activists and even journalists: INTOLERANT traffic is very organized. Each event is labeled to identify and categorize victims. Cyber attacks commonly apply descriptors to each victim – it helps herd victims and track which attacks succeed and which fail. Victim categories make INTOLERANT interesting: A = Indian Diplomatic & Indian Navy B = Central Asian diplomatic C = Chinese Human Rights Defenders D = Tibetan Pro-Democracy Personalities E = Uighur Activists F = European Special Rep to Afghanistan and Indian photo-journalism G = Tibetan Government in Exile
  • In those cases, the NSA and its partner agencies in the United Kingdom and Canada were unable to determine the identity of the hackers who collected the data, but suspect a state sponsor “based on the level of sophistication and the victim set.” In instances where hacking may compromise data from the U.S. and U.K. governments, or their allies, notification was given to the “relevant parties.” In a separate document, GCHQ officials discuss plans to use open source discussions among hackers to improve their own knowledge. “Analysts are potentially missing out on valuable open source information relating to cyber defence because of an inability to easily keep up to date with specific blogs and Twitter sources,” according to one document. GCHQ created a program called LOVELY HORSE to monitor and index public discussion by hackers on Twitter and other social media. The Twitter accounts designated for collection in the 2012 document:
  • ...3 more annotations...
  • These accounts represent a cross section of the hacker community and security scene. In addition to monitoring multiple accounts affiliated with Anonymous, GCHQ monitored the tweets of Kevin Mitnick, who was sent to prison in 1999 for various computer and fraud related offenses. The U.S. Government once characterized Mitnick as one of the world’s most villainous hackers, but he has since turned security consultant and exploit broker. Among others, GCHQ monitored the tweets of reverse-engineer and Google employee, Thomas Dullien. Fellow Googler Tavis Ormandy, from Google’s vulnerability research team Project Zero, is featured on the list, along with other well known offensive security researchers, including Metasploit’s HD Moore and James Lee (aka Egypt) together with Dino Dai Zovi and Alexander Sotirov, who at the time both worked for New York-based offensive security company, Trail of Bits (Dai Zovi has since taken up a position at payment company, Square). The list also includes notable anti-forensics and operational security expert “The Grugq.” GCHQ monitored the tweets of former NSA agents Dave Aitel and Charlie Miller, and former Air Force intelligence officer Richard Bejtlich as well as French exploit vendor, VUPEN (who sold a one year subscription for its binary analysis and exploits service to the NSA in 2012).
  • Documents published with this article: LOVELY HORSE – GCHQ Wiki Overview INTOLERANT – Who Else Is Targeting Your Target? Collecting Data Stolen by Hackers – SIDtoday  HAPPY TRIGGER/LOVELY HORSE/Zool/TWO FACE – Open Source for Cyber Defence/Progress NATO Civilian Intelligence Council – Cyber Panel – US Talking Points
  • The U.S., U.K. and Canadian governments characterize hackers as a criminal menace, warn of the threats they allegedly pose to critical infrastructure, and aggressively prosecute them, but they are also secretly exploiting their information and expertise, according to top secret documents. In some cases, the surveillance agencies are obtaining the content of emails by monitoring hackers as they breach email accounts, often without notifying the hacking victims of these breaches. “Hackers are stealing the emails of some of our targets… by collecting the hackers’ ‘take,’ we . . .  get access to the emails themselves,” reads one top secret 2010 National Security Agency document. These and other revelations about the intelligence agencies’ reliance on hackers are contained in documents provided by whistleblower Edward Snowden. The documents—which come from the U.K. Government Communications Headquarters agency and NSA—shed new light on the various means used by intelligence agencies to exploit hackers’ successes and learn from their skills, while also raising questions about whether governments have overstated the threat posed by some hackers.
Paul Merrell

U.S. judge orders discovery to go forward over Clinton's private email system - The Was... - 0 views

  • A federal judge on Tuesday ruled that State Department officials and top aides to Hillary Clinton should be questioned under oath about whether they intentionally thwarted federal open records laws by using or allowing the use of a private email server throughout Clinton’s tenure as secretary of state from 2009 to 2013. The decision by U.S. District Judge Emmet G. Sullivan of Washington came in a lawsuit over public records brought by Judicial Watch, a conservative legal watchdog group, regarding its May 2013 request for information about the employment arrangement of Huma Abedin, a longtime Clinton aide.
  • Sullivan set an April 12 deadline for parties to litigate a detailed investigative plan--subject to court approval--that would reach well beyond the limited and carefully worded explanations of the use of the private server that department and Clinton officials have given. Sullivan also suggested from the bench that he might at some point order the department to subpoena Clinton and Abedin to return all emails related to Clinton’s private account, not just records their camps previously deemed work-related and returned.
  • In granting Judicial Watch’s request, Sullivan said that months of piecemeal revelations about Clinton and the State Department’s handling of the email controversy created “at least a ‘reasonable suspicion’ ” that public access to official government records under the federal Freedom of Information Act was undermined. Sullivan noted that there was no dispute that senior State Department officials were aware of the email set-up from time Clinton took office, citing a January 2009 email exchange including Undersecretary for Management Patrick F. Kennedy, Clinton chief of staff Cheryl D. Mills and Abedin about establishing a “stand-alone network” email system. Sullivan said the State Department’s inspector general last month faulted the department and Clinton’s office for overseeing processes that repeatedly allowed “inaccurate and incomplete” FOIA responses, including a May 2013 reply that found “no records” concerning email accounts Clinton used, even though dozens of senior officials had corresponded with her private account.
  • ...1 more annotation...
  • Sullivan’s decision came as Clinton seeks the Democratic presidential nomination and three weeks after the State Department acknowledged for the first time that “top secret” information passed through the server.
  •  
    For a federal judge to allow depositions to be taken in a Freedom of Information Act case is rare in the extreme. I know of only two other cases in which it was allowed. It requires a judicial finding that the government agency's affidavits submitted in support of a motion for summary judgment may have been executed in bad faith, i.e., may be perjurious.  
Paul Merrell

Enron Corpus - Wikipedia, the free encyclopedia - 0 views

  • The Enron Corpus is a large database of over 600,000 emails generated by 158 employees[1] of the Enron Corporation and acquired by the Federal Energy Regulatory Commission during its investigation after the company's collapse.[2]
  • The Enron data was originally collected at Enron Corporation headquarters in Houston during two weeks in May 2002 by Joe Bartling,[3] a litigation support and data analysis contractor working for Aspen Systems, now Lockheed Martin, whom the Federal Energy Regulatory Commission (FERC) had hired to preserve and collect the vast amounts of data in the wake of the Enron Bankruptcy in December 2001. In addition to the Enron employee emails, all of Enron's enterprise database systems,[4] hosted in Oracle databases on Sun Microsystems servers, were also captured and preserved including its online energy trading platform, EnronOnline. Once collected, the Enron emails were processed and hosted in litigation platform Concordance, and then iCONECT, for the investigative team from the Federal Energy Regulatory Commission, the Commodity Futures Trading Commission, and Department of Justice investigators to review. At the conclusion of the investigation, and upon the issuance of the FERC staff report,[5] the emails and information collected were deemed to be in the public domain, to be used for historical research and academic purposes. The email archive was made publicly available and searchable via the web using iCONECT 24/7, but the sheer volume of email of over 160GB made it impractical to use. Copies of the collected emails and databases were made available on hard drives.
  • A copy of the email database was subsequently purchased for $10,000 by Andrew McCallum, a computer scientist at the University of Massachusetts Amherst.[6] He released this copy to researchers, providing a trove of data that has been used for studies on social networking and computer analysis of language.
  • ...1 more annotation...
  • The corpus is unique in that it is one of the only publicly available mass collections of real emails easily available for study, as such collections are typically bound by numerous privacy and legal restrictions which render them prohibitively difficult to access.[6] In 2010, EDRM.net published a revised version 2 of the corpus.[7] This expanded corpus, containing over 1.7 million messages, is now available on Amazon S3 for easy access to the research community. Jitesh Shetty and Jafar Adibi from the University of Southern California processed this corpus in 2004 and released a MySQL version[8] of it and also published some link analysis results based on this.[9]
Paul Merrell

Investigating Donald Trump, F.B.I. Sees No Clear Link to Russia - The New York Times - 0 views

  • For much of the summer, the F.B.I. pursued a widening investigation into a Russian role in the American presidential campaign. Agents scrutinized advisers close to Donald J. Trump, looked for financial connections with Russian financial figures, searched for those involved in hacking the computers of Democrats, and even chased a lead — which they ultimately came to doubt — about a possible secret channel of email communication from the Trump Organization to a Russian bank.Law enforcement officials say that none of the investigations so far have found any conclusive or direct link between Mr. Trump and the Russian government. And even the hacking into Democratic emails, F.B.I. and intelligence officials now believe, was aimed at disrupting the presidential election rather than electing Mr. Trump.Hillary Clinton’s supporters, angry over what they regard as a lack of scrutiny of Mr. Trump by law enforcement officials, pushed for these investigations. In recent days they have also demanded that James B. Comey, the director of the F.B.I., discuss them publicly, as he did last week when he announced that a new batch of emails possibly connected to Mrs. Clinton had been discovered.
  • Supporters of Mrs. Clinton have argued that Mr. Trump’s evident affinity for Russia’s president, Vladimir V. Putin — Mr. Trump has called him a great leader and echoed his policies toward NATO, Ukraine and the war in Syria — and the hacks of leading Democrats like John D. Podesta, the chairman of the Clinton campaign, are clear indications that Russia has taken sides in the presidential race and that voters should know what the F.B.I. has found. Continue reading the main story Related Coverage 3 U.S. States Turn Down Russian Requests to Monitor Elections OCT. 21, 2016 Donald Trump Says He Might Meet With Putin Before Inauguration OCT. 17, 2016 Advertisement Continue reading the main story The F.B.I.’s inquiries into Russia’s possible role continue, as does the investigation into the emails involving Mrs. Clinton’s top aide, Huma Abedin, on a computer she shared with her estranged husband, Anthony D. Weiner. Mrs. Clinton’s supporters argue that voters have as much right to know what the F.B.I. has found in Mr. Trump’s case, even if the findings are not yet conclusive.
  • Senator Harry Reid of Nevada, the minority leader, responded angrily on Sunday with a letter accusing the F.B.I. of not being forthcoming about Mr. Trump’s alleged ties with Moscow.“It has become clear that you possess explosive information about close ties and coordination between Donald Trump, his top advisers, and the Russian government — a foreign interest openly hostile to the United States, which Trump praises at every opportunity,” Mr. Reid wrote. “The public has a right to know this information.”F.B.I. officials declined to comment on Monday. Intelligence officials have said in interviews over the last six weeks that apparent connections between some of Mr. Trump’s aides and Moscow originally compelled them to open a broad investigation into possible links between the Russian government and the Republican presidential candidate. Still, they have said that Mr. Trump himself has not become a target. And no evidence has emerged that would link him or anyone else in his business or political circle directly to Russia’s election operations.
  •  
    The same story is running on CNN. There is another story moving on MSM that the FBI has found no evidence of Russian attempts to sway the election between the two candidates, instead being aimed at spreading chaos. Combined with FBI Director Comey's announcement last week that the Hillary email criminal investigation has been reopened, at least three temtative conclusions are suggested: [i] Comey and the FBI have mounted a three-pronged attack on Hillary's election run, on the email front, deFUDding Hillary's claim that Trump has ties with Vladimir Putin, and defanging the Hillary claim that Russia is attempting to elect Donald Trump; [ii] MSM is covering those stories; and [iii[ by implication, those who have real power over the U.S. government have decided they don't want Hillary do win the election. All good news for Trump and bad news for the Clintons.
Paul Merrell

Under Intense Pressure to Silence Wikileaks, Secretary of State Hillary Clinton Propose... - 0 views

  • Clinton’s State Department was getting pressure from President Obama and his White House inner circle, as well as heads of state internationally, to try and cutoff Assange’s delivery of the cables and if that effort failed, then to forge a strategy to minimize the administration’s public embarrassment over the contents of the cables. Hence, Clinton’s early morning November meeting of State’s top brass who floated various proposals to stop, slow or spin the Wikileaks contamination. That is when a frustrated Clinton, sources said, at some point blurted out a controversial query. “Can’t we just drone this guy?” Clinton openly inquired, offering a simple remedy to silence Assange and smother Wikileaks via a planned military drone strike, according to State Department sources. The statement drew laughter from the room which quickly died off when the Secretary kept talking in a terse manner, sources said. Clinton said Assange, after all, was a relatively soft target, “walking around” freely and thumbing his nose without any fear of reprisals from the United States. Clinton was upset about Assange’s previous 2010 records releases, divulging secret U.S. documents about the war in Afghanistan in July and the war in Iraq just a month earlier in October, sources said. At that time in 2010, Assange was relatively free and not living cloistered in in the embassy of Ecuador in London. Prior to 2010, Assange focused Wikileaks’ efforts on countries outside the United States but now under Clinton and Obama, Assange was hammering America with an unparalleled third sweeping Wikileaks document dump in five months. Clinton was fuming, sources said, as each State Department cable dispatched during the Obama administration was signed by her.
  • Following Clinton’s alleged drone proposal, another controversial remedy was floated in the State Department to place a reward or bounty for Assange’s capture and extradition to the United States, sources said. Numbers were discussed in the realm of a $10 million bounty. A State Department source described that staff meeting as bizarre. One minute staffers were inquiring about the Secretary’s blue and black checkered knit sweater and the next minute, the room was discussing the legalities of a drone strike on Assange and financial bounties, sources said. Immediately following the conclusion of the wild brainstorming session, one of Clinton’s top aides, State Department Director of Policy Planning Ann-Marie Slaughter, penned an email to Clinton, Chief of Staff Cheryl Mills, and aides Huma Abebin and Jacob Sullivan at 10:29 a.m. entitled “an SP memo on possible legal and nonlegal strategies re Wikileaks.” “Nonlegal strategies.” How did that phrasing make it into an official State Department email subject line dealing with solving Wikileaks and Assange? Why would the secretary of state and her inner circle be discussing any “nonlegal strategies” for anything whatsoever? Against anyone? Shouldn’t all the strategies discussed by the country’s top diplomat be strictly legal only? And is the email a smoking gun to confirm Clinton was actually serious about pursuing an obvious “nonlegal strategy” proposal to allegedly assassinate Assange? Numerous attempts were made to try and interview and decipher Slaughter’s choice of email wording, however, she could not be reached for comment.
  • Slaughter’s cryptic email also contained an attached document called “SP Wikileaks doc final11.23.10.docx.” That attachment portion of Slaughter’s “nonlegal strategies” email has yet to be recovered by federal investigators and House committee investigators probing Clinton’s email practices while at State. Even Wikileaks does not have the document. Slaughter, however, shed some light on the attachment: “The result is the attached memo, which has one interesting legal approach and I think some very good suggestions about how to handle our public diplomacy.” But did it also include details on the “nonlegal strategies” teased in the subject line? Sources confirm Clinton took the email and attachment with her to the White House for an afternoon meeting with Secretary of Defense Bob Gates and National Security Advisor Tom Donilon prior to an additional evening meeting at the White House. President Obama, sources said, did not attend the early meeting with Gates as he was traveling with Vice President Joe Biden. President Obama did attend the second meeting, however, and Wikileaks and Assange’s planned release of secret cables were discussed at length, sources said. Attending this meeting were President Obama, Clinton, Gates, Donilon, Director of National Intelligence James Clapper, Deputy Secretary of State James Steinberg, Under Secretary of Defense for Policy Michele Flournoy, Chairman of the Joint Chiefs of Staff Admiral “Mike” Mullen, Vice Chairman of the Joint Chiefs of Staff Gen. James Cartwright as well as a half dozen or more various policy aides, sources confirmed. Did Clinton also share her alleged morning query of droning Assange with the members of the National Security Council and the President? Was it discussed among the top secret subjects in the meeting? Or was Clinton planning to conduct or hatch her own secret foreign policy in defiance of the President, a likely violation of the Logan Act?
  • ...3 more annotations...
  • The FBI’s 302 report from Clinton’s email investigation interview, again, specified that Clinton had “many discussions” related to “nominating” drone strikes on individuals: “Clinton could not recall a specific process for nominating a target for a drone strike and recalled much debate pertaining to the concurrence process. Clinton knew there was a role for DOD, State and the CIA but could not provide specifics as to what it was. Due to a disagreement between these agencies, Clinton recalled having many discussions related to nominating an individual for a drone strike. When Clinton exchanged classified information pertaining to the drone program internally at State, it was in her office or on a secure call. When Clinton exchanged classified information pertaining to the drone program externally it was at the White House. Clinton never had a concern with how classified information pertaining to the drone program was handled.” Sources said Clinton’s comments on neutralizing Assange fits a pattern of callousness when combined with the FBI testimony that she often considered droning individuals and then coupled with her reaction to Libyan leader Moammar Gaddafi’s death in Oct. 2011.
  • Unable to legally counter or stop Wikileaks, and likely abandoning any and all legal and “nonlegal strategies,” Clinton and her staff were forced to weather the collateral damage of CableGate. In fact, just five days after Clinton’s meetings on Mahogany Row in the State Department and the White House, Wikileaks began releasing cables to news outlets globally on Sunday November 28, 2010. Shortly after CableGate, the WikiLeaks founder sought refuge from authorities and threats by hiding at the Ecuadorian Embassy in London. Now 45, Assange is in his fifth year living quarantined inside the embassy. Clinton remains the Democratic nominee for the presidency of the United States.
  • Perhaps Democratic political operative Bob Beckel wasn’t a party outlier during this controversial Fox broadcast. Likely, Beckel was projecting what others, including Clinton, had already privately proposed.
Paul Merrell

John Podesta Was Warned in 2008 to Start Encrypting Sensitive Emails - 0 views

  • John Podesta, the Clinton campaign chairman whose hacked emails have exposed countless Democratic secrets to the world, was warned in 2008 to start protecting sensitive documents “by at least encrypting them.” The warning came in an unencrypted email chain forwarded by Denis McDonough, then a top Obama campaign aide and currently the White House chief of staff, to Podesta, who at the time was running Obama’s transition team. McDonough initially sent the warning to Obama economic adviser Daniel Tarullo in an email on November 3, 2008, the day before President Obama’s election victory, presumably in response to a detailed November 2 memo Tarullo sent around about the upcoming G-20 meeting President Bush had called to discuss the ongoing financial crisis. McDonough wrote: I was struck by the memo partly because it was first I had heard of it but much more because it was a sensitive doc bumping around on public email addresses. There is a very real threat to the security of our documents (particularly sensitive ones like the one you worked up), and we need to protect them by at least encrypting them.
Paul Merrell

'Facebook Suppressed Article On Clinton Email Leaks - 0 views

  • On December 11, Craig Murray posted the article, entitled ‘The CIA’s Absence of Conviction.’ It was quickly shared by several hundred Facebook users — but 12 hours later, the post had received a mere 22 visits via the social networking site.
  • The former ambassador then published another article, calling out Facebook’s clampdown. Within hours, visitors from Facebook skyrocketed. “There’s no doubt Facebook suppressed my piece. Evidently, someone at the site saw I’d realized what was going on and flicked a proverbial switch, because not long after my supplementary post, visits from Facebook exploded. Overall, the article’s been viewed around 150,000 times now, with half of that traffic flowing from Facebook.”
  • The suppressed article set out to counter allegations of Russian hacker involvement in the Podesta and DNC email leaks. Murray said he was “incredulous” at how the CIA’s “unsubstantiated” “blatant lie” had grown as a media story. “A little logic demolishes the CIA’s claims. They claim to “know the individuals” involved. Yet under Obama the USA has been absolutely ruthless in its persecution of whistleblowers and its pursuit of foreign hackers through extradition. We are supposed to believe that in the most vital instance imaginable, an attempt by a foreign power to destabilize a US election, nobody is going to be arrested or extradited, or made subject to banking and other restrictions — even though the CIA knows who the individuals are?” Beyond logic, Murray told Sputnik with certainty the source of the emails was an “insider leak”, from “someone with legal access” to the emails — he’s certain, as he’s met one of the leakers in question. They are “certainly not Russian,” he added. “The worst thing about all this is it is aimed at promoting further conflict with Russia. This puts everyone in danger for the sake of more profits for the arms and security industries — and of course bigger budgets for the CIA.”
Paul Merrell

The Daily Dot - How a major bank and the U.S. government joined forces to spy on Anonymous - 0 views

  • New details have surfaced regarding the surveillance protocols used by Bank of America to keep tabs on social activists. Last year, Anonymous hacktivists published 14 gigabytes of private emails and spreadsheets which revealed that Bank of America was monitoring social media and other online services used by activists for basic communication. This time however, information about the bank’s recent surveillance activities were obtained legally through a public records request by a single petitioner. The newly published documents reveal a coordinated effort by Bank of America, the Washington State Patrol (WSP), and federal counterterrorism agencies, to monitor activists as they prepared for a public demonstration in Olympia, Wash. Over 230 people originally signed up to attend the “Million Mask March” event, which was organized by the Anonymous movement and took place on November 5, 2013. Although an official report by the WSP described the event as a “peaceful protest” being organized by activists who had made “no threats of violence,” those involved were still monitored by the department before the event took place. Information gathered about the potential protesters was then shared with Bank of America. Furthermore, Bank of America solicited information about activists from various federal agencies, including the Federal Bureau of Investigation.
  • According to Andrew Charles Hendricks, an activist who originally acquired the documents, the emails included the home address of a demonstration organizer. Hendricks claims he redacted the address before publishing the documents online. The relationship between Bank of America and the WSP, as well as their long-term investment in surveillance, is highlighted by an email sent on September 23, 2013. Kim Triplett-Kolerich, an intelligence analyst for Bank of America requested that WSP share any intelligence gathered on activists taking part in the Million Mask March with the bank. She began the email by identifying herself as a former officer and provided her former rank. “From time to time I will see items that I believe will be of use to my friends at WSP—especially during session,” she told the officer. “May Day I will pick your brain for intel and I will give you a lot also,” she wrote.
  • The next week, Triplett-Kolerich emailed the same WSP sergeant again about the march. “Sorry for not getting back to you sooner—hectic weeks lately with foreclosures and this MMM,” Triplett-Kolerich wrote. She then notified the sergeant that Bank of America has been in contact with “the Fusion Center and JTTF” regarding the Anonymous march. JTTF refers to the Joint Terrorism Task Force, which is a group comprised of local law enforcement agencies, the Federal Bureau of Investigation (with whom it shares a website) and the Homeland Security department. The Fusion Center is a state-level counterterrorism agency, which coordinates “national intelligence” between various local law enforcement and public safety departments. In addition, the Fusion Center provides for “the effective communication of locally generated threat-related information to the federal government.”
  • ...2 more annotations...
  • Triplett-Kolerich concluded her email by boasting that the surveillance tactics used by Bank of America to monitor activists online was superior to that of the WSP. “I will most likely find it first as social media trolling is not what WSP does best. Bank of America has a team of 20 people and that’s all they do all day and then pass it to us around the country!!!” On October 24, an email was sent by a sergeant at the WSP’s Special Operations Division to an executive aide at the Thurston County Sheriff’s Office. The sergeant notified the office that a large number of arrests may take place during the Million Mask March, which could impact the jail. Attached to the letter was a message written by an Anonymous activist, and a link to its Facebook event page where the names of those planning to attend the march could be seen.
  • Unbeknownst to the crowd, the supervisor of a local transit company had dropped off an Olympia city bus nearby at the request of the WSP. According to recently published emails, it was parked on the west side of an administration building close to the demonstration, just in case they needed to move in and haul a large group of disorderly protesters off to jail—but they didn’t. The Daily Dot reached out to Triplett-Kolerich and three Bank of America media relations contacts requesting a comment for this article, but received no response. 
  •  
    More evidence of the cozy relationship between the banksters and the "anti-terrorism" folk in the U.S. Of particular interest BofA has a 20-person unit that spends their days trolling social media for intelligence.
Paul Merrell

Paris attacks: David Cameron to discuss greater spying powers with UK security chiefs a... - 0 views

  • Print Your friend's email address Your email address Note: We do not store your email address(es) but your IP address will be logged to prevent abuse of this feature. Please read our Legal Terms & Policies A A A Email David Cameron is to meet with UK security chiefs on Monday to discuss whether Britain will give greater powers to its police and spies in the wake of the Paris terror attacks. The Prime Minister said there were “things to learn” from the wave of violence that saw 17 killed across northern France from Wednesday to Friday – and he has faced pressure to revive the so-called “snooper’s charter” that would make it easier for GCHQ to monitor online communications. The head of MI5, Andrew Parker, has warned that a group of al-Qaeda terrorists in Syria is planning “mass casualty attacks” against Western targets, while former Royal Navy chief Lord West called for more money to be budgeted to the security service.
  • David Cameron is to meet with UK security chiefs on Monday to discuss whether Britain will give greater powers to its police and spies in the wake of the Paris terror attacks. The Prime Minister said there were “things to learn” from the wave of violence that saw 17 killed across northern France from Wednesday to Friday – and he has faced pressure to revive the so-called “snooper’s charter” that would make it easier for GCHQ to monitor online communications. The head of MI5, Andrew Parker, has warned that a group of al-Qaeda terrorists in Syria is planning “mass casualty attacks” against Western targets, while former Royal Navy chief Lord West called for more money to be budgeted to the security service.
  • In a broadcast interview ahead of his appearance at the unity march in Paris today, Mr Cameron said: “It's important to look at what happened in France and think through those scenarios and other scenarios like them: how we'd respond, how well prepared we are.
  • ...3 more annotations...
  • The Lib Dem leader Nick Clegg, who also attended the London demonstration, was criticised by Lord West for blocking the “snooper’s charter” in his capacity as deputy Prime Minister. “I think we need to make sure that we don't lose powers,” Lord West said. “The Communications Data Bill was there to ensure we kept capabilities we had which are beginning to disappear. I think that needs to go through.
  • “I'll be meeting with security and intelligence chiefs on Monday morning to once again go through all of those questions and to make sure we do everything we can to in order to ensure we're as well prepared as we can be to deal with this threat. “It's a threat that has been with us for many years and I believe will be with us for many years to come.” Speaking to Sky News from a demonstration in support of Paris at Trafalgar Square, the Mayor of London Boris Johnson said: “I’m not interested in this civil liberties stuff. If they’re a threat, I want their emails and calls listened to.”
  • “I was very irked that it was removed by the deputy prime minister when it had all been agreed across all parties. That needs to be pushed through.”
  •  
    Let's remember that the lid came off NATO's use of staged false flag terrorist attacks in Europe several years ago. E.g., https://www.youtube.com/watch?v=k83L3I6Z35w
« First ‹ Previous 41 - 60 of 750 Next › Last »
Showing 20 items per page