Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged fake-news

Rss Feed Group items tagged

Paul Merrell

Craig Murray: Fake BBC Video - 0 views

  • Irrefutable evidence of a stunning bit of fakery by the BBC: In this version the medic being interviewed says about the 2 minute mark: “..It’s just absolute chaos and carnage here, erm we’ve had a massive influx of what looks like serious burns, er seems like it must be some sort of chemical weapon, I’m not really sure..” In this version she says – it is at about 2 mins 20 seconds in this edit: “..It’s just absolute chaos and carnage here, erm we’ve had a massive influx of what looks like serious burns, er seems like it must be some sort of, I’m not really sure, maybe napalm, something similar to that..” The disturbing thing is the footage of the doctor talking is precisely the same each time.  It is edited so as to give the impression the medic is talking in real time in her natural voice – there are none of the accepted devices used to indicate a voiceover translation.  But it must be true that in at least one, and possibly both, the clips she is not talking in real time in her own voice.  It is very hard to judge as her mouth and lips are fully covered throughout.  Perhaps neither of the above is what she actually said.
  • Terrible things are happening all the time in Syria’s civil war, between Assad’s disparate forces and still more disparate opposition forces, and innocent people are suffering.  There are dreadful crimes against civilians on all sides.  I have no desire at all to downplay or mitigate that.  But once you realise the indisputable fact of the fake interview the BBC has put out, some of the images in this video begin to be less than convincing on close inspection too.
Paul Merrell

The Feds & Media: How the FBI Destroyed Journalism | nsnbc international - 0 views

  • James Comey, director of the Federal Bureau of Investigations (FBI) defended the use of an FBI agent posing as an Associated Press journalist in order to install spyware into the computer of a teenager from Lacy, Washington State.
  • Comey said in an open letter published in mainstream media that the FBI did not “overstep its bounds” while using deceptive tactics during their investigation into the teen who was in communication “online with the” FBI agent.” According to Comey: “An F.B.I. agent communicated online with the anonymous suspect. Relying on an agency behavioral assessment that the anonymous suspect was a narcissist, the online undercover officer portrayed himself as an employee of The Associated Press, and asked if the suspect would be willing to review a draft article about the threats and attacks, to be sure that the anonymous suspect was portrayed fairly.” To entrap the student, the FBI produced a fake news report provided by the FBI agent to the Associated Press regarding a “technology savvy student holds Timberline High School hostage.”
  • The FBI agent made sure the teen saw the article which facilitated the downloading of spyware into the boy’s computer in order to track the child’s online whereabouts. Kathy Best, executive editor of the Seattle Times commented : “The FBI, in placing the name of The Associated Press on a phony story sent to a criminal suspect, crossed a line and undermined the credibility of journalists everywhere – including at The Times.” The FBI maintains that “the operation was aimed at preventing tragedy. We were fortunate that information provided by the public gave us the opportunity to step into a potentially dangerous situation before it was too late.” Kathleen Carroll, executive editor of AP said : “This latest revelation of how the FBI misappropriated the trusted name of the Associated Press doubles our concern and outrage, expressed earlier to Attorney General Eric Holder, about how the agency’s unacceptable tactics undermine AP and the vital distinction between the government and the press.”
  • ...2 more annotations...
  • The Reporters Committee for Freedom of the Press (RCFP) wrote a letter to Holder and Comey explaining : “The warrant for such action apparently did not mention that the tracker was delivered as an AP article, with an AP byline “and therefore impersonated a news media organization.” Concerned that the FBI not only failed to follow its own guidelines for such activity, but also did not make clear to the judge who signed the warrant or FBI counsel that the software ‘impersonated a media organization or that there were First Amendment concerns at stake’.”
  • The RCFP continued in their letter: “The utilization of news media as a cover for delivery of electronic surveillance software is unacceptable. This practice endangers the media’s credibility and creates the appearance that it is not independent of the government. It undermines media organizations’ ability to independently report on law enforcement.” Ironically, the FBI have a program targeting teenagers called, “The FBI Teen Reporter’s Workshop” where “selected” high school students in New York are brought to the FBI field office to “learn about how the FBI interacts with the media. In addition to hearing about the overall mission of the FBI and the mission of the Office of Public Affairs, the teens have the opportunity to meet members of the media and to take photos with FBI equipment.”
Paul Merrell

DOJ accuses firm that vetted Snowden of faking 665,000 background checks - Investigations - 0 views

  • As Edward Snowden prepares to defend himself in a worldwide webinar Thursday, the Justice Department is accusing the private contractor that vetted him and thousands of other intelligence workers of bilking U.S. taxpayers out of tens of millions of dollars by conducting phony background checks.USIS, the giant private contractor that conducted the background checks of both Snowden and Washington Navy Yard shooter Aaron Alexis, is accused in a Justice Department lawsuit filed Wednesday night of conducting 665,000 fake background checks between 2008 and 2012.
  • “USIS management devised and executed a scheme to deliberately circumvent contractually required quality reviews of completed background investigations in order to increase the company’s revenues and profits,” said the Justice Department in its complaint, which was filed in U.S. District Court in Alabama. Advertise | AdChoices The DOJ lawsuit cites internal emails to back up charges that USIS senior officials devised a wide-ranging "scheme" to defraud the federal government on background checks through a practice known as "dumping" or "flushing" in order to boost the firm's profits.
  • The practice of "dumping" or "flushing" involved certifying to the U.S. Office of Personnel Management that full "quality review" background checks had been  performed when in fact those reviews had not been completed. Aided by a software program known as "Blue Zone," USIS identified large volumes of cases at the end of day as "Review Complete" -- and then fraudulently certified them to OPM, according to the complaint.
  •  
    665,000 more reasons for not trusting the government with confidential citizen data. 
Paul Merrell

Obama confidant's spine-chilling proposal - Salon.com - 0 views

  • Cass Sunstein has long been one of Barack Obama’s closest confidants.  Often mentioned as a likely Obama nominee to the Supreme Court, Sunstein is currently Obama’s head of the Office of Information and Regulatory Affairs where, among other things, he is responsible for “overseeing policies relating to privacy, information quality, and statistical programs.”  In 2008, while at Harvard Law School, Sunstein co-wrote a truly pernicious paper proposing that the U.S. Government employ teams of covert agents and pseudo-”independent” advocates to “cognitively infiltrate” online groups and websites — as well as other activist groups — which advocate views that Sunstein deems “false conspiracy theories” about the Government.  This would be designed to increase citizens’ faith in government officials and undermine the credibility of conspiracists.  The paper’s abstract can be read, and the full paper downloaded, here. Sunstein advocates that the Government’s stealth infiltration should be accomplished by sending covert agents into “chat rooms, online social networks, or even real-space groups.”  He also proposes that the Government make secret payments to so-called “independent” credible voices to bolster the Government’s messaging (on the ground that those who don’t believe government sources will be more inclined to listen to those who appear independent while secretly acting on behalf of the Government).   This program would target those advocating false “conspiracy theories,” which they define to mean: “an attempt to explain an event or practice by reference to the machinations of powerful people, who have also managed to conceal their role.”  Sunstein’s 2008 paper was flagged by this blogger, and then amplified in an excellent report by Raw Story‘s Daniel Tencer.
  • There’s no evidence that the Obama administration has actually implemented a program exactly of the type advocated by Sunstein, though in light of this paper and the fact that Sunstein’s position would include exactly such policies, that question certainly ought to be asked.  Regardless, Sunstein’s closeness to the President, as well as the highly influential position he occupies, merits an examination of the mentality behind what he wrote.  This isn’t an instance where some government official wrote a bizarre paper in college 30 years ago about matters unrelated to his official powers; this was written 18 months ago, at a time when the ascendancy of Sunstein’s close friend to the Presidency looked likely, in exactly the area he now oversees.  Additionally, the government-controlled messaging that Sunstein desires has been a prominent feature of U.S. Government actions over the last decade, including in some recently revealed practices of the current administration, and the mindset in which it is grounded explains a great deal about our political class.  All of that makes Sunstein’s paper worth examining in greater detail.
  • Initially, note how similar Sunstein’s proposal is to multiple, controversial stealth efforts by the Bush administration to secretly influence and shape our political debates.  The Bush Pentagon employed teams of former Generals to pose as “independent analysts” in the media while secretly coordinating their talking points and messaging about wars and detention policies with the Pentagon.  Bush officials secretly paid supposedly “independent” voices, such as Armstrong Williams and Maggie Gallagher, to advocate pro-Bush policies while failing to disclose their contracts.  In Iraq, the Bush Pentagon hired a company, Lincoln Park, which paid newspapers to plant pro-U.S. articles while pretending it came from Iraqi citizens.  In response to all of this, Democrats typically accused the Bush administration of engaging in government-sponsored propaganda — and when it was done domestically, suggested this was illegal propaganda.  Indeed, there is a very strong case to make that what Sunstein is advocating is itself illegal under long-standing statutes prohibiting government ”propaganda” within the U.S., aimed at American citizens: As explained in a March 21, 2005 report by the Congressional Research Service, “publicity or propaganda” is defined by the U.S. Government Accountability Office (GAO) to mean either (1) self-aggrandizement by public officials, (2) purely partisan activity, or (3) “covert propaganda.”  By covert propaganda, GAO means information which originates from the government but is unattributed and made to appear as though it came from a third party.
  • ...10 more annotations...
  • Covert government propaganda is exactly what Sunstein craves.  His mentality is indistinguishable from the Bush mindset that led to these abuses, and he hardly tries to claim otherwise.  Indeed, he favorably cites both the covert Lincoln Park program as well as Paul Bremer’s closing of Iraqi newspapers which published stories the U.S. Government disliked, and justifies them as arguably necessary to combat “false conspiracy theories” in Iraq — the same goal Sunstein has for the U.S.Sunstein’s response to these criticisms is easy to find in what he writes, and is as telling as the proposal itself.  He acknowledges that some “conspiracy theories” previously dismissed as insane and fringe have turned out to be entirely true (his examples:  the CIA really did secretly administer LSD in “mind control” experiments; the DOD really did plot the commission of terrorist acts inside the U.S. with the intent to blame Castro; the Nixon White House really did bug the DNC headquarters).  Given that history, how could it possibly be justified for the U.S. Government to institute covert programs designed to undermine anti-government “conspiracy theories,” discredit government critics, and increase faith and trust in government pronouncements?  Because, says Sunstein, such powers are warranted only when wielded by truly well-intentioned government officials who want to spread The Truth and Do Good — i.e., when used by people like Cass Sunstein and Barack Obama
  • Throughout, we assume a well-motivated government that aims to eliminate conspiracy theories, or draw their poison, if and only if social welfare is improved by doing so. But it’s precisely because the Government is so often not “well-motivated” that such powers are so dangerous.  Advocating them on the ground that “we will use them well” is every authoritarian’s claim.  More than anything else, this is the toxic mentality that consumes our political culture:  when our side does X, X is Good, because we’re Good and are working for Good outcomes.  That was what led hordes of Bush followers to endorse the same large-government surveillance programs they long claimed to oppose, and what leads so many Obama supporters now to justify actions that they spent the last eight years opposing.
  • Consider the recent revelation that the Obama administration has been making very large, undisclosed payments to MIT Professor Jonathan Gruber to provide consultation on the President’s health care plan.  With this lucrative arrangement in place, Gruber spent the entire year offering public justifications for Obama’s health care plan, typically without disclosing these payments, and far worse, was repeatedly held out by the White House — falsely — as an “independent” or “objective” authority.  Obama allies in the media constantly cited Gruber’s analysis to support their defenses of the President’s plan, and the White House, in turn, then cited those media reports as proof that their plan would succeed.  This created an infinite “feedback loop” in favor of Obama’s health care plan which — unbeknownst to the public — was all being generated by someone who was receiving hundreds of thousands of dollars in secret from the administration (read this to see exactly how it worked).In other words, this arrangement was quite similar to the Armstrong Williams and Maggie Gallagher scandals which Democrats, in virtual lockstep, condemned.  Paul Krugman, for instance, in 2005 angrily lambasted right-wing pundits and policy analysts who received secret, undisclosed payments, and said they lack “intellectual integrity”; he specifically cited the Armstrong Williams case.  Yet the very same Paul Krugman last week attacked Marcy Wheeler for helping to uncover the Gruber payments by accusing her of being “just like the right-wingers with their endless supply of fake scandals.”  What is one key difference?  Unlike Williams and Gallagher, Jonathan Gruber is a Good, Well-Intentioned Person with Good Views — he favors health care — and so massive, undisclosed payments from the same administration he’s defending are dismissed as a “fake scandal.”
  • Sunstein himself — as part of his 2008 paper — explicitly advocates that the Government should pay what he calls “credible independent experts” to advocate on the Government’s behalf, a policy he says would be more effective because people don’t trust the Government itself and would only listen to people they believe are “independent.”  In so arguing, Sunstein cites the Armstrong Williams scandal not as something that is wrong in itself, but as a potential risk of this tactic (i.e., that it might leak out), and thus suggests that “government can supply these independent experts with information and perhaps prod them into action from behind the scenes,” but warns that “too close a connection will be self-defeating if it is exposed.”  In other words, Sunstein wants the Government to replicate the Armstrong Williams arrangement as a means of more credibly disseminating propaganda — i.e., pretending that someone is an “independent” expert when they’re actually being “prodded” and even paid “behind the scenes” by the Government — but he wants to be more careful about how the arrangement is described (don’t make the control explicit) so that embarrassment can be avoided if it ends up being exposed.  
  • In this 2008 paper, then, Sunstein advocated, in essence, exactly what the Obama administration has been doing all year with Gruber:  covertly paying people who can be falsely held up as “independent” analysts in order to more credibly promote the Government line.  Most Democrats agreed this was a deceitful and dangerous act when Bush did it, but with Obama and some of his supporters, undisclosed arrangements of this sort seem to be different.  Why?  Because, as Sunstein puts it:  we have “a well-motivated government” doing this so that “social welfare is improved.”  Thus, just like state secrets, indefinite detention, military commissions and covert, unauthorized wars, what was once deemed so pernicious during the Bush years — coordinated government/media propaganda — is instantaneously transformed into something Good.* * * * *What is most odious and revealing about Sunstein’s worldview is his condescending, self-loving belief that “false conspiracy theories” are largely the province of fringe, ignorant Internet masses and the Muslim world.  That, he claims, is where these conspiracy theories thrive most vibrantly, and he focuses on various 9/11 theories — both domestically and in Muslim countries — as his prime example.
  • It’s certainly true that one can easily find irrational conspiracy theories in those venues, but some of the most destructive “false conspiracy theories” have emanated from the very entity Sunstein wants to endow with covert propaganda power:  namely, the U.S. Government itself, along with its elite media defenders. Moreover, “crazy conspiracy theorist” has long been the favorite epithet of those same parties to discredit people trying to expose elite wrongdoing and corruption. Who is it who relentlessly spread “false conspiracy theories” of Saddam-engineered anthrax attacks and Iraq-created mushroom clouds and a Ba’athist/Al-Qaeda alliance — the most destructive conspiracy theories of the last generation?  And who is it who demonized as “conspiracy-mongers” people who warned that the U.S. Government was illegally spying on its citizens, systematically torturing people, attempting to establish permanent bases in the Middle East, or engineering massive bailout plans to transfer extreme wealth to the industries which own the Government?  The most chronic and dangerous purveyors of “conspiracy theory” games are the very people Sunstein thinks should be empowered to control our political debates through deceit and government resources:  namely, the Government itself and the Enlightened Elite like him.
  • It is this history of government deceit and wrongdoing that renders Sunstein’s desire to use covert propaganda to “undermine” anti-government speech so repugnant.  The reason conspiracy theories resonate so much is precisely that people have learned — rationally — to distrust government actions and statements.  Sunstein’s proposed covert propaganda scheme is a perfect illustration of why that is.  In other words, people don’t trust the Government and “conspiracy theories” are so pervasive precisely because government is typically filled with people like Cass Sunstein, who think that systematic deceit and government-sponsored manipulation are justified by their own Goodness and Superior Wisdom.
  • The point is that there are severe dangers to the Government covertly using its resources to “infiltrate” discussions and to shape political debates using undisclosed and manipulative means.  It’s called “covert propaganda” and it should be opposed regardless of who is in control of it or what its policy aims are. UPDATE II:  Ironically, this is the same administration that recently announced a new regulation dictating that “bloggers who review products must disclose any connection with advertisers, including, in most cases, the receipt of free products and whether or not they were paid in any way by advertisers, as occurs frequently.”  Without such disclosure, the administration reasoned, the public may not be aware of important hidden incentives (h/t pasquin).  Yet the same administration pays an MIT analyst hundreds of thousands of dollars to advocate their most controversial proposed program while they hold him out as “objective,” and selects as their Chief Regulator someone who wants government agents to covertly mold political discussions “anonymously or even with false identities.”
  • UPDATE III:  Just to get a sense for what an extremist Cass Sunstein is (which itself is ironic, given that his paper calls for ”cognitive infiltration of extremist groups,” as the Abstract puts it), marvel at this paragraph:
  • So Sunstein isn’t calling right now for proposals (1) and (2) — having Government ”ban conspiracy theorizing” or “impose some kind of tax on those who” do it — but he says “each will have a place under imaginable conditions.”  I’d love to know the “conditions” under which the government-enforced banning of conspiracy theories or the imposition of taxes on those who advocate them will “have a place.”  That would require, at a bare minumum, a repeal of the First Amendment.  Anyone who believes this should, for that reason alone, be barred from any meaningful government position.
  •  
    This is a January 2010 article by Glenn Greenwald. The Sunstein paper referred to was published in 2008 and is at http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1084585  Sunstein left the Obama Administration in 2012 and now teaches law at Harvard. He is the husband of U.S. Ambassador to the U.N. Susan Rice,a notorious neocon.  His paper is scholarly only in format. His major premises have no citations and in at least two cases are straw man logical fallacies that misportray the position of the groups he criticizes. This is "academic" work that a first-year-law student heading for a 1.0 grade point average could make mincemeat of. This paper alone would seem to disqualify him from a Supreme Court nomination and from teaching law. Has he never heard of the First Amendment and why didn't he bother to check whether it is legal to inflict propaganda on the American public? But strange things happen when you're a buddy of an American president. Most noteworthy, however, is that the paper unquestionably puts an advocate of waging psychological warfare against the foreign populations *and* the American public as the head of the White House White House OMB Office of Information and Regulatory Affairs from 2008 through 2012 and on Obama's short list for the Supreme Court. Given the long history of U.S. destabilization of foreign nations via propaganda, of foreign wars waged under false pretenses, of the ongoing barrage of false information disseminated by our federal government, can there be any reasonable doubt that the American public is not being manipulated by false propaganda disseminated by their own government?  An inquiring mind wants to know ...   
Paul Merrell

No Slap On The Wrist: Wells Fargo Plunges After Federal Reserve Bars Lender's Growth - 0 views

  • Wells Fargo WFC -9.22%Wells FargoWFC$58.16$-5.91(-9.22%)As of 02/06/2018, 01:01am EST is facing far more than a fine for its fake accounts scandal, in which employees at the lender's branches across the country opened over a million fraudulent checking and credit card accounts to hit their numbers. Late on Friday, the Federal Reserve decided to restrict growth at America's third-largest bank by assets until its risk and governance is improved. The order, which also called for a revamp of Wells Fargo's board of directors, sent the bank reeling in early trading Monday. Wells Fargo shares plunged 9% lower in Monday trading, erasing most of its gains over the past 12 months. For its top shareholder, Warren Buffett's Berkshire Hathaway, the Fed-inspired stock slide meant its Wells Fargo holdings lost over $2.7 billion in value. "We cannot tolerate pervasive and persistent misconduct at any bank and the consumers harmed by Wells Fargo expect that robust and comprehensive reforms will be put in place to make certain that the abuses do not occur again," said chair Janet L. Yellen on Friday. The order was her last as head of the Federal Reserve. On Monday, successor Jerome Powell was sworn in. Added Yellen, "the enforcement action we are taking today will ensure that Wells Fargo will not expand until it is able to do so safely and with the protections needed to manage all of its risks and protect its customers." In September 2016, Wells Fargo paid a $185 million fine to the Consumer Financial Protection Bureau after the agency found branch bankers had opened well over a million fake accounts, which generated millions of dollars in fees to the lender. When the scandal, which occurred over almost a decade, was first revealed, Wells Fargo and its board didn't immediately overhaul their leadership, or sanction top executives in the divisions where fake accounts were created. Only after significant public outcry, in addition to a widening scope of the scandal, did Wells Fargo begin a revamp, firing CEO John Stumpf and clawing back bonuses for numerous executives. Backer Warren Buffett later said in an appearance on CNBC the bank and its leadership had misjudged the severity of the problem.
  • In addition to harsh words, the Fed is ordering a sanction of almost unprecedented severity. It will restrict the bank's growth until its governance and risk management improve, though it will allow Wells to continue current operations from taking deposits to offering loans.
  • Three Wells Fargo long-standing board directors, John Chen, Lloyd Dean and Enrique Hernandez, will likely retire at the firm's annual meeting as part of the Fed's additional order for a refreshment of four board directors. Analysts did not brush off the Fed's move, as they have large fines coming out of the crisis.
  • ...1 more annotation...
  • The bottom line is that the consent and decree order will mean Wells will have a harder time maintaining market share and will have to compete more on price or credit terms versus peers, in our view. Wells will also have to maintain the balance sheet while other banks are growing, and we view this as defensive versus peers," Kleinhanzl added.
Paul Merrell

New Saudi King Tied to Al Qaeda, Bin Laden and Islamic Terrorism Washington's Blog - 0 views

  • We’ve long noted that Saudi Arabia is a huge supporter of terrorism. But the new Saudi king is particularly bad. Investors Business Daily notes: King Salman has a history of funding al-Qaida, and his son has been accused of knowing in advance about the 9/11 attacks. *** Salman once ran a Saudi charity tied to al-Qaida and has been named a defendant in two lawsuits accusing the Saudi royal family of helping the 9/11 terrorists, one of which the U.S. Supreme Court recently let move forward after years of being blocked by the State Department and the well-funded Saudi lobby. Plaintiffs have provided an enormous amount of material to source their accusations against Salman. Here’s why his ascension to the throne is not good news, especially as the terrorism threat grows: • Salman once headed the Saudi High Commission for Relief to Bosnia and Herzegovina, which served as a key charitable front for al-Qaida in the Balkans. • According to a United Nations-sponsored investigation, Salman in the 1990s transferred more than $120 million from commission accounts under his control — as well as his own personal accounts — to the Third World Relief Agency, another al-Qaida front and the main pipeline for illegal weapons shipments to al-Qaida fighters in the Balkans.
  • • A U.N. audit found that the money was transferred following meetings with Salman, transfers that had no legitimate “humanitarian” purpose. • Former CIA officer Robert Baer has reported that an international raid of Saudi High Commission offices found evidence of terrorist plots against America. • Baer also revealed that Salman “personally approved” distribution of funds from the International Islamic Relief Organization, which also has provided material support to al-Qaida. • A recent Gulf Institute report says Salman and former Saudi intelligence chief Prince Turki al-Faisal knowingly aided and abetted al-Qaida in the run-up to 9/11. • Salman works closely with Saudi clerics Saleh al-Moghamsy, a radical anti-Semite, and Safar Hawali, a one-time mentor of Osama bin Laden, according to the Washington Free Beacon. • In “Why America Slept,” author Gerald Posner claimed that Salman’s son Ahmed bin Salman also had ties to al-Qaida and even advance knowledge of the Sept. 11, 2001 attacks.
  • David Andrew Weinberg provides a superb round-up of Salman’s ties to terrorism and extremism: As former CIA official Bruce Riedel astutely pointed out, Salman was the regime’s lead fundraiser for mujahideen, or Islamic holy warriors, in Afghanistan in the 1980s, as well as for Bosnian Muslims during the Balkan struggles of the 1990s. In essence, he served as Saudi Arabia’s financial point man for bolstering fundamentalist proxies in war zones abroad. As longtime governor of Riyadh, Salman was often charged with maintaining order and consensus among members of his family. Salman’s half brother King Khalid (who ruled from 1975 to 1982) therefore looked to him early on in the Afghan conflict to use these family contacts for international objectives, appointing Salman to run the fundraising committee that gathered support from the royal family and other Saudis to support the mujahideen against the Soviets. Riedel writes that in this capacity, Salman “work[ed] very closely with the kingdom’s Wahhabi clerical establishment.” Another CIA officer who was stationed in Pakistan in the late 1980s estimates that private Saudi donations during that period reached between $20 million and $25 million every month. And as Rachel Bronson details in her book, Thicker Than Oil: America’s Uneasy Partnership With Saudi Arabia, Salman also helped recruit fighters for Abdul Rasul Sayyaf, an Afghan Salafist fighter who served as a mentor to both Osama bin Laden and 9/11 mastermind Khalid Sheikh Mohammed.
  • ...7 more annotations...
  • Reprising this role in Bosnia, Salman was appointed by his full brother and close political ally King Fahd to direct the Saudi High Commission for Relief of Bosnia and Herzegovina (SHC) upon its founding in 1992. Through the SHC, Salman gathered donations from the royal family for Balkan relief, supervising the commission until its until its recent closure in 2011. By 2001, the organization had collected around $600 million — nominally for relief and religious purposes, but money that allegedly also went to facilitating arms shipments, despite a U.N. arms embargo on Bosnia and other Yugoslav successor states from 1991 to 1996. And what kind of supervision did Salman exercise over this international commission? In 2001, NATO forces raided the SHC’s Sarajevo offices, discovering a treasure trove of terrorist materials: before-and-after photographs of al Qaeda attacks, instructions on how to fake U.S. State Department badges, and maps marked to highlight government buildings across Washington. The Sarajevo raid was not the first piece of evidence that the SHC’s work went far beyond humanitarian aid. Between 1992 and 1995, European officials tracked roughly $120 million in donations from Salman’s personal bank accounts and from the SHC to a Vienna-based Bosnian aid organization named the Third World Relief Agency (TWRA). Although the organization claimed to be focused on providing humanitarian relief, Western intelligence agencies estimated that the TWRA actually spent a majority of its funds arming fighters aligned with the Bosnian government.
  • A defector from al Qaeda called to testify before the United Nations, and who gave a deposition for lawyers representing the families of 9/11 victims, alleged that both Salman’s SHC and the TWRA provided essential support to al Qaeda in Bosnia, including to his 107-man combat unit. In a deposition related to the 9/11 case, he stated that the SHC “participated extensively in supporting al Qaida operations in Bosnia” and that the TWRA “financed, and otherwise supported” the terrorist group’s fighters. The SHC’s connection to terrorist groups has long been scrutinized by U.S. intelligence officials as well. The U.S. government’s Joint Task Force Guantanamo once included the Saudi High Commission on its list of suspected “terrorist and terrorist support entities.” The Defense Intelligence Agency also once accused the Saudi High Commission of shipping both aid and weapons to Mohamed Farrah Aidid, the al Qaeda-linked Somali warlord depicted as a villain in the movie Black Hawk Down. Somalia was subject to a United Nations arms embargo starting in January 1992. *** The board of trustees for the Prince Salman Youth Center, which Salman himself chairs, today includes Saleh Abdullah Kamel, a Saudi billionaire whose name showed up on a purported list of al Qaeda’s earliest supporters known as the “golden chain.” (The Wall Street Journal reported that Kamel “denies supporting terror.”) But as the United States sought to shut down Saudi charities with ties to terrorism in the aftermath of the 9/11 attacks, Kamel and Salman both condemned the effort as an anti-Islamic witch hunt.
  • In 1995, US aid worker William Jefferson is killed in Bosnia. One of the likely suspects, Ahmed Zuhair Handala, is linked to the SHC. He also is let go, despite evidence linking him to massacres of civilians in Bosnia. [Schindler, 2007, pp. 263-264] In 1997, a Croatian apartment building is bombed, and Handala and two other SHC employees are suspected of the bombing. They escape, but Handala will be captured after 9/11 and sent to Guantanamo prison. [Schindler, 2007, pp. 266] In 1997, SHC employee Saber Lahmar is arrested for plotting to blow up the US embassy in Saravejo. He is convicted, but pardoned and released by the Bosnian government two years later. He will be arrested again in 2002 for involvement in an al-Qaeda plot in Bosnia and sent to Guantanamo prison (see January 18, 2002). By 1996, NSA wiretaps reveal that Prince Salman is funding Islamic militants using charity fronts (Between 1994 and July 1996).
  • History Commons adds important details: By 1994, if not earlier, the NSA is collecting electronic intercepts of conversations between Saudi Arabian royal family members. Journalist Seymour Hersh will later write, “according to an official with knowledge of their contents, the intercepts show that the Saudi government, working through Prince Salman [bin Abdul Aziz], contributed millions to charities that, in turn, relayed the money to fundamentalists. ‘We knew that Salman was supporting all of the causes,’ the official told me.” By July 1996 or soon after, US intelligence “had more than enough raw intelligence to conclude… bin Laden [was] receiving money from prominent Saudis.” [Hersh, 2004, pp. 324, 329-330] One such alleged charity front linked to Salman is the Saudi High Commission in Bosnia (see 1996 and After). Prince Salman has long been the governor of Riyadh province. At the time, he is considered to be about fourth in line to be king of Saudi Arabia. His son Prince Ahmed bin Salman will later be accused of having connections with al-Qaeda leader Abu Zubaida (see Early April 2002). [PBS, 10/4/2004] It appears this surveillance of Saudi royals will come to an end in early 2001 (see (February-March 2001)).
  • Author Roland Jacquard will later claim that in 1996, al-Qaeda revives its militant network in Bosnia in the wake of the Bosnian war and uses the Saudi High Commission (SHC) as its main charity front to do so. [Jacquard, 2002, pp. 69] This charity was founded in 1993 by Saudi Prince Salman bin Abdul-Aziz and is so closely linked to and funded by the Saudi government that a US judge will later render it immune to a 9/11-related lawsuit after concluding that it is an organ of the Saudi government. [New York Law Journal, 9/28/2005] In 1994, British aid worker Paul Goodall is killed in Bosnia execution-style by multiple shots to the back of the head. A SHC employee, Abdul Hadi al-Gahtani, is arrested for the murder and admits the gun used was his, but the Bosnian government lets him go without a trial. Al-Gahtani will later be killed fighting with al-Qaeda and the Taliban in Afghanistan. [Schindler, 2007, pp. 143-144; Schindler is a professor at the U.S. Army War College] In 1995, the Bosnian Ministry of Finance raids SHC’s offices and discovers documents that show SHC is “clearly a front for radical and terrorism-related activities.” [Burr and Collins, 2006, pp. 145]
  • In November 2002, Prince Salman patronized a fundraising gala for three Saudi charities under investigation by Washington: the International Islamic Relief Organization, al-Haramain Foundation, and the World Assembly of Muslim Youth. Since 9/11, all three organizations have had branches shuttered or sanctioned over allegations of financially supporting terrorism. That same month, Salman cited his experience on the boards of charitable societies, asserting that “it is not the responsibility of the kingdom” if others exploit Saudi donations for terrorism. *** The new king has also embraced Saudi cleric Saleh al-Maghamsi, an Islamic supremacist who declared in 2012 that Osama bin Laden had more “sanctity and honor in the eyes of Allah,” simply for being a Muslim, than “Jews, Christians, Zoroastrians, apostates, and atheists,” whom he described by nature as “infidels.” That didn’t put an end to Salman’s ties to Maghamsi, however. The new Saudi king recently served as head of the supervisory board for a Medina research center directed by Maghamsi. A year after Maghamsi’s offensive comments, Salman sponsored and attended a large cultural festival organized by the preacher. Maghamsi also advises two of Salman’s sons ….
  • A 1996 CIA report mentions, “We continue to have evidence that even high ranking members of the collecting or monitoring agencies in Saudi Arabia, Kuwait, and Pakistan – such as the Saudi High Commission – are involved in illicit activities, including support for terrorists” (see January 1996). Jacquard claims that most of the leadership of the SHC supports bin Laden. The SHC, while participating in some legitimate charitable functions, uses its cover to ship illicit goods, drugs, and weapons in and out of Bosnia. In May 1997, a French military report concludes: ”(T)he Saudi High Commission, under cover of humanitarian aid, is helping to foster the lasting Islamization of Bosnia by acting on the youth of the country. The successful conclusion of this plan would provide Islamic fundamentalism with a perfectly positioned platform in Europe and would provide cover for members of the bin Laden organization.” [Jacquard, 2002, pp. 69-71] However, the US will take no action until shortly after 9/11, when it will lead a raid on the SHC’s Bosnia offices. Incriminating documents will be found, including information on how to counterfeit US State Department ID badges, and handwritten notes about meetings with bin Laden. Evidence of a planned attack using crop duster planes is found as well. [Schindler, 2007, pp. 129, 284]
  •  
    So the U.S. invades Afghanistan and Iraq instead of Saudi Arabia? 
Gary Edwards

Google News - 0 views

  •  
    WOW!!! Incredible presentation concerning the history of Freedom vs. Tyranny. WOW!! If ever there's a MUST Watch, this is it. Very impressive and sweeping comparison of how authoritarian collectivist seize power in a free society and establish their tyrannies. My notes are listed below: How to recognize potential tyrants and keep them from seizing power. The urge to save humanity is always used to justify those who want to rule humanity. - ML Menken Daniel Webster on the Constitution Obstacles to Tyranny : Limited powers of government .... Due Process .... Presumption of Innocence .... Freedom to Dissent .... Armed Populace: The right to be Armed! Due Process .... 5th Amendment .... Emergency powers. there is no authorization in the US Constitution to suspend Due Process or any aspect of the Bill of Rights .... Asset Seizure Laws for criminal activities (alleged - without warrant or court order) .... Eminent Domain: seizure of private property for government uses: 2005 Kelo vs New London seizure based on jobs (economy) and tax revenue possibilities. .... 6th Amendment - right to trial by jury : plea bargaining admonition based on facing the awesome power of the government to prosecute no matter what - intimidation and threat of personal destruction. .... Forced confessions through plea bargaining. .... Indefinite detention without trial or charges: President has power to kill or issue orders without warrant, charges or trial .... Presumption of Innocence: Probable Cause .... Random stops at Border check points. 5th Amendment protections violated .... Sobriety Check Points: 4th and 5th Amendments violated - no presumption of innocence .... Random detention and questioning: airport security pat downs, housing projects, bus transportation .... The Right to Privacy: financial transactions and the IRS audit (without warrant or accusation) .... Warrant-less Spying .... Agents writing their own search warrants .... Snatch and Peek Freedom to Disse
Paul Merrell

Israel Provided IAEA with Fake Documents on Iran's Nuclear Program - 0 views

  • Q: Right. I read in Peter Jenkins’ analysis of your book that Israel has fabricated certain documents, including the information said to have been retrieved from a laptop computer in Iran in 2004, as you mentioned earlier, and the fabricated, fake data helped keep Iran’s nuclear controversy alive. Would you please elaborate more on Israel’s involvement in providing the U.S. and the IAEA with the false and groundless data and how they complicated Iran’s nuclear dossier? A: Well, I think that evidence that Israel was fabricating these documents that the IAEA received in 2005 as well as later documents turned over to the IAEA directly by Israel in 2008 and 2009, according to Mohamed ElBaradei, is very strong, and there are several indicators that it was an Israeli job. One is that we know the Mujahedin-e-Khalq turned these documents over to German intelligence; that’s where they came from. A former German intelligence official gave me a detailed account of that in an interview I did with him last year for my book. So, that’s the first indication that it was an Israeli job, because the MEK, we know, has been used by Israel to provide the intelligence they didn’t want to be known as coming from Israel on more than one occasion. And of course the MEK has let its name to testimony to support the Israeli point of view on accusations of Iranian terrorism, specifically in the case of the Buenos Aires bombing of the AMIA community center in 1994. That’s one indicator. The second indicator is that we know the Israelis had a program in Mossad to influence the foreign governments and news media on Iran and that office sometimes basically claimed that there were documents that come from inside Iran that they would share with the governments and the press. So they had a special office for operations against Iran. So, I’m quite convinced that Israel was behind these documents.
Paul Merrell

Former Fox News guest accused of fabricating CIA career | TheHill - 0 views

  • A former cable news commentator was arrested on Thursday for allegedly fabricating a 27-year career with the CIA.According to the Justice Department, 62-year-old Wayne Simmons used the false story to try and gain security clearances and government contracts, including a successful overseas posting to advise military personnel.ADVERTISEMENTHe falsely claimed to have worked as an “Outside Paramilitary Special Operations Officer” from 1973 to 2000, the government alleges in its indictment, in order to work with contractors engaged in multi-million dollar deals with the United States government.He also used his time with the CIA to “bolster his credibility” with someone investing $125,000 in a fake real estate investment, the government charged.Additionally, Simmons lied on government forms to deny that he had been charged with or convicted of a felony offense and to claim that his prior arrests were “directly related related to his supposed intelligence work for the CIA,” according to the charges.
  • Simmons was charged with major fraud against the U.S., wire fraud and making false statements to the government. If convicted, he could be imprisoned for decades.CIA spokesman Dean Boyd said in a brief statement that the agency was “working closely with the Justice Department on this matter.”
Paul Merrell

Spy chief trashes leaks, assures Trump of loyalty - POLITICO - 0 views

  • The outgoing U.S. director of national intelligence has extended an olive branch of sorts to Donald Trump — denouncing media leaks, casting skepticism on a report that Russia has damaging material on the president-elect, and assuring Trump that America's spies stand ready to serve him. In an unusual statement, James Clapper said he had spoken Wednesday evening with Trump, five days after the spy chief and some of his counterparts met with the incoming president to discuss U.S. intelligence assessments that Russia tried to interfere in the 2016 election, possibly to help him win.Story Continued Below The assessment has badly aggravated existing tensions between the intelligence community and Trump. On Tuesday, CNN, BuzzFeed and other media outlets reported that, during Friday’s briefing, the intelligence officials told Trump about an unsubstantiated private report that detailed how Russia's government allegedly had salacious information about him. In addition, BuzzFeed published the apparent dossier, which Trump has since denounced as “fake news.” "I expressed my profound dismay at the leaks that have been appearing in the press, and we both agreed that they are extremely corrosive and damaging to our national security," Clapper said of the information that has come out since last week's intelligence briefing.
  • Clapper’s statement represented a dramatic turn of events only 24 hours after initial leaks about the intelligence leaders having told Trump of the dossier. And while Clapper’s statement indirectly confirmed the media reports of the briefing, it also could be viewed as a concession of sorts from an intelligence community that has come under repeated, direct fire from the president-elect. Trump had compared the leak from his briefing to “Nazi Germany” on Twitter on Wednesday morning, writing, “Intelligence agencies should never have allowed this fake news to "leak" into the public. One last shot at me. Are we living in Nazi Germany?” In a news conference, also held Wednesday, Trump defended the comparison and elaborated further, saying, “A thing like that should have never been written, it should never have been had, and it certainly should never have been released.” Clapper, however, said he did not believe the leaks to the press came from the intelligence community. At the same time, he indicated that the intelligence community decided to share the material with Trump because its mere existence was important for the incoming president to know about.
  • As far as the "private security company document," Clapper said, "I emphasized that this document is not a U.S. Intelligence Community product and that I do not believe the leaks came from within the IC. The IC has not made any judgment that the information in this document is reliable, and we did not rely upon it in any way for our conclusions."
  • ...1 more annotation...
  • "Part of our obligation is to ensure that policymakers are provided with the fullest possible picture of any matters that might affect national security," Clapper added. Clapper's statement comes amid extraordinary strains between the spy world and Trump, who takes office next week. The president-elect has been resistant to U.S. intelligence assessments that Russia intervened in the election, although during a press conference Wednesday morning Trump admitted that Moscow likely did do some hacking. Steven Hall, a former head of Russian operations at the CIA, said Clapper’s statement didn’t appear to be an all-out apology, but that it was possible the spy chief wants to try to patch up the tensions between Trump and the intelligence world before he himself steps down in just a few days. “He just might very well be like, wow, this really has kind of gotten out of control,” said Hall, who described Clapper as an “old-school, principled” kind of guy. “This might be his parting attempt to say, look at the very least after more than a 50-year career in intelligence, I don’t want this to be what I’m remembered by.”
Paul Merrell

Hollywood producer claims Boston bombing was a "false flag attack" - News - VoR Intervi... - 0 views

  • Crisis actors, smoke bombs, fake blood and literal "smoke and mirrors" were all part of what was the false flag terrorist attack called the Boston Marathon Bombing. To anyone who saw the pictures and footage of fake blood, make- up artists and smiling “victims”. It was obvious that something was not right. For those involved in filmmaking and in the know the discrepancies were obvious. We spoke to famous Hollywood filmmaker, producer and director Nathan Folks about why he is certain the Boston Marathon Bombing was a false flag terrorist attackRead more: http://voiceofrussia.com/2014_04_25/The-Boston-bombing-was-a-false-flag-attack-Nathan-Folks-7658/
Paul Merrell

Information Warfare: Automated Propaganda and Social Media Bots | Global Research - 0 views

  • NATO has announced that it is launching an “information war” against Russia. The UK publicly announced a battalion of keyboard warriors to spread disinformation. It’s well-documented that the West has long used false propaganda to sway public opinion. Western military and intelligence services manipulate social media to counter criticism of Western policies. Such manipulation includes flooding social media with comments supporting the government and large corporations, using armies of sock puppets, i.e. fake social media identities. See this, this, this, this and this. In 2013, the American Congress repealed the formal ban against the deployment of propaganda against U.S. citizens living on American soil. So there’s even less to constrain propaganda than before.
  • Information warfare for propaganda purposes also includes: The Pentagon, Federal Reserve and other government entities using software to track discussion of political issues … to try to nip dissent in the bud before it goes viral “Controlling, infiltrating, manipulating and warping” online discourse Use of artificial intelligence programs to try to predict how people will react to propaganda
  • Some of the propaganda is spread by software programs. We pointed out 6 years ago that people were writing scripts to censor hard-hitting information from social media. One of America’s top cyber-propagandists – former high-level military information officer Joel Harding – wrote in December: I was in a discussion today about information being used in social media as a possible weapon.  The people I was talking with have a tool which scrapes social media sites, gauges their sentiment and gives the user the opportunity to automatically generate a persuasive response. Their tool is called a “Social Networking Influence Engine”. *** The implications seem to be profound for the information environment. *** The people who own this tool are in the civilian world and don’t even remotely touch the defense sector, so getting approval from the US Department of State might not even occur to them.
  • ...2 more annotations...
  • How Can This Real? Gizmodo reported in 2010: Software developer Nigel Leck got tired rehashing the same 140-character arguments against climate change deniers, so he programmed a bot that does the work for him. With citations! Leck’s bot, @AI_AGW, doesn’t just respond to arguments directed at Leck himself, it goes out and picks fights. Every five minutes it trawls Twitter for terms and phrases that commonly crop up in Tweets that refute human-caused climate change. It then searches its database of hundreds to find a counter-argument best suited for that tweet—usually a quick statement and a link to a scientific source. As can be the case with these sorts of things, many of the deniers don’t know they’ve been targeted by a robot and engage AI_AGW in debate. The bot will continue to fire back canned responses that best fit the interlocutor’s line of debate—Leck says this goes on for days, in some cases—and the bot’s been outfitted with a number of responses on the topic of religion, where the arguments unsurprisingly often end up. Technology has come a long way in the past 5 years. So if a lone programmer could do this 5 years ago, imagine what he could do now. And the big players have a lot more resources at their disposal than a lone climate activist/software developer does.  For example, a government expert told the Washington Post that the government “quite literally can watch your ideas form as you type” (and see this).  So if the lone programmer is doing it, it’s not unreasonable to assume that the big boys are widely doing it.
  • How Effective Are Automated Comments? Unfortunately, this is more effective than you might assume … Specifically, scientists have shown that name-calling and swearing breaks down people’s ability to think rationally … and intentionally sowing discord and posting junk comments to push down insightful comments  are common propaganda techniques. Indeed, an automated program need not even be that sophisticated … it can copy a couple of words from the main post or a comment, and then spew back one or more radioactive labels such as “terrorist”, “commie”, “Russia-lover”, “wimp”, “fascist”, “loser”, “traitor”, “conspiratard”, etc. Given that Harding and his compadres consider anyone who questions any U.S. policies as an enemy of the state  – as does the Obama administration (and see this) – many honest, patriotic writers and commenters may be targeted for automated propaganda comments.
Gary Edwards

Obama's Terrorism Claim Hides an Inconvenient Truth - 0 views

  •  
    "On Tuesday, President Barack Obama stated that "Over [the] last eight years, no foreign terrorist organization has successfully planned and executed an attack on our homeland." Talk about something actually deserving of being labeled as "fake news." Obama's statement obscures the reality that the U.S. has faced 66 Islamist terrorist plots against the U.S. homeland during Obama's time in office, 13 of which were successful. When President George W. Bush left office, the U.S. had faced 28 Islamist plots after 9/11, only one of which was successful. Now there have been 93 Islamist plots since 9/11, and 14 successful attacks. Obama's statement is technically accurate since none of these attacks were planned and directed from abroad. Instead, the vast majority of the terror plots and all of the successful attacks since 9/11 have involved homegrown terrorists-that is, terrorists who radicalized and plotted here in the U.S. While preventing such foreign orchestrated plots is vital, it is no longer enough. The threat has morphed and the U.S. must now do more to counter homegrown and lone wolf Islamist terrorists. Obama's comment obscures the truth that in his eight years in office, as shown by the sharp increase in the number of Islamist plots and successful attacks, the homeland has been less safe. Claiming victory while the U.S. is in the most active period of terrorist activity since 9/11 is not only pushing a false narrative, but it risks diverting our attention from what needs to be done to defend the U.S. homeland."
Gary Edwards

Accidentally Released - and Incredibly Embarrassing - Documents Show How Goldman et al ... - 0 views

  •  
    Incredible.  Take your time reading this because we now have legal evidence of outrageous Bankster criminality.  Read carefully. excerpt: The lawsuit between Overstock and the banks concerned a phenomenon called naked short-selling, a kind of high-finance counterfeiting that, especially prior to the introduction of new regulations in 2008, short-sellers could use to artificially depress the value of the stocks they've bet against. The subject of naked short-selling is a) highly technical, and b) very controversial on Wall Street, with many pundits in the financial press for years treating the phenomenon as the stuff of myths and conspiracy theories. Now, however, through the magic of this unredacted document, the public will be able to see for itself what the banks' attitudes are not just toward the "mythical" practice of naked short selling (hint: they volubly confess to the activity, in writing), but toward regulations and laws in general. "Fuck the compliance area - procedures, schmecedures," chirps Peter Melz, former president of Merrill Lynch Professional Clearing Corp. (a.k.a. Merrill Pro), when a subordinate worries about the company failing to comply with the rules governing short sales. ...................... If this sounds complicated, just focus on this: naked short selling, in essence, is selling stock you do not have. If you don't have to actually locate and borrow stock before you short it, you're creating an artificial supply of stock shares. ................ The process of how banks circumvented federal clearing regulations is highly technical and incredibly difficult to follow. These companies were using obscure loopholes in regulations that allowed them to short companies by trading in shadows, or echoes, of real shares in their stock. They manipulated rules to avoid having to disclose these "failed" trades to regulators. The import of this is that it made it cheaper and easier to bet down the value of a stock
Paul Merrell

For sale: Systems that can secretly track where cellphone users go around the globe - T... - 0 views

  • Makers of surveillance systems are offering governments across the world the ability to track the movements of almost anybody who carries a cellphone, whether they are blocks away or on another continent. The technology works by exploiting an essential fact of all cellular networks: They must keep detailed, up-to-the-minute records on the locations of their customers to deliver calls and other services to them. Surveillance systems are secretly collecting these records to map people’s travels over days, weeks or longer, according to company marketing documents and experts in surveillance technology.
  • The world’s most powerful intelligence services, such as the National Security Agency and Britain’s GCHQ, long have used cellphone data to track targets around the globe. But experts say these new systems allow less technically advanced governments to track people in any nation — including the United States — with relative ease and precision.
  • It is unclear which governments have acquired these tracking systems, but one industry official, speaking on the condition of anonymity to share sensitive trade information, said that dozens of countries have bought or leased such technology in recent years. This rapid spread underscores how the burgeoning, multibillion-dollar surveillance industry makes advanced spying technology available worldwide. “Any tin-pot dictator with enough money to buy the system could spy on people anywhere in the world,” said Eric King, deputy director of Privacy International, a London-based activist group that warns about the abuse of surveillance technology. “This is a huge problem.”
  • ...9 more annotations...
  • Yet marketing documents obtained by The Washington Post show that companies are offering powerful systems that are designed to evade detection while plotting movements of surveillance targets on computerized maps. The documents claim system success rates of more than 70 percent. A 24-page marketing brochure for SkyLock, a cellular tracking system sold by Verint, a maker of analytics systems based in Melville, N.Y., carries the subtitle “Locate. Track. Manipulate.” The document, dated January 2013 and labeled “Commercially Confidential,” says the system offers government agencies “a cost-effective, new approach to obtaining global location information concerning known targets.”
  • tracking systems that access carrier location databases are unusual in their ability to allow virtually any government to track people across borders, with any type of cellular phone, across a wide range of carriers — without the carriers even knowing. These systems also can be used in tandem with other technologies that, when the general location of a person is already known, can intercept calls and Internet traffic, activate microphones, and access contact lists, photos and other documents. Companies that make and sell surveillance technology seek to limit public information about their systems’ capabilities and client lists, typically marketing their technology directly to law enforcement and intelligence services through international conferences that are closed to journalists and other members of the public.
  • Security experts say hackers, sophisticated criminal gangs and nations under sanctions also could use this tracking technology, which operates in a legal gray area. It is illegal in many countries to track people without their consent or a court order, but there is no clear international legal standard for secretly tracking people in other countries, nor is there a global entity with the authority to police potential abuses.
  • (Privacy International has collected several marketing brochures on cellular surveillance systems, including one that refers briefly to SkyLock, and posted them on its Web site. The 24-page SkyLock brochure and other material was independently provided to The Post by people concerned that such systems are being abused.)
  • Verint, which also has substantial operations in Israel, declined to comment for this story. It says in the marketing brochure that it does not use SkyLock against U.S. or Israeli phones, which could violate national laws. But several similar systems, marketed in recent years by companies based in Switzerland, Ukraine and elsewhere, likely are free of such limitations.
  • The tracking technology takes advantage of the lax security of SS7, a global network that cellular carriers use to communicate with one another when directing calls, texts and Internet data. The system was built decades ago, when only a few large carriers controlled the bulk of global phone traffic. Now thousands of companies use SS7 to provide services to billions of phones and other mobile devices, security experts say. All of these companies have access to the network and can send queries to other companies on the SS7 system, making the entire network more vulnerable to exploitation. Any one of these companies could share its access with others, including makers of surveillance systems.
  • Companies that market SS7 tracking systems recommend using them in tandem with “IMSI catchers,” increasingly common surveillance devices that use cellular signals collected directly from the air to intercept calls and Internet traffic, send fake texts, install spyware on a phone, and determine precise locations. IMSI catchers — also known by one popular trade name, StingRay — can home in on somebody a mile or two away but are useless if a target’s general location is not known. SS7 tracking systems solve that problem by locating the general area of a target so that IMSI catchers can be deployed effectively. (The term “IMSI” refers to a unique identifying code on a cellular phone.)
  • Verint can install SkyLock on the networks of cellular carriers if they are cooperative — something that telecommunications experts say is common in countries where carriers have close relationships with their national governments. Verint also has its own “worldwide SS7 hubs” that “are spread in various locations around the world,” says the brochure. It does not list prices for the services, though it says that Verint charges more for the ability to track targets in many far-flung countries, as opposed to only a few nearby ones. Among the most appealing features of the system, the brochure says, is its ability to sidestep the cellular operators that sometimes protect their users’ personal information by refusing government requests or insisting on formal court orders before releasing information.
  • Another company, Defentek, markets a similar system called Infiltrator Global Real-Time Tracking System on its Web site, claiming to “locate and track any phone number in the world.” The site adds: “It is a strategic solution that infiltrates and is undetected and unknown by the network, carrier, or the target.”
  •  
    The Verint company has very close ties to the Iraeli government. Its former parent company Comverse, was heavily subsidized by Israel and the bulk of its manufacturing and code development was done in Israel. See https://en.wikipedia.org/wiki/Comverse_Technology "In December 2001, a Fox News report raised the concern that wiretapping equipment provided by Comverse Infosys to the U.S. government for electronic eavesdropping may have been vulnerable, as these systems allegedly had a back door through which the wiretaps could be intercepted by unauthorized parties.[55] Fox News reporter Carl Cameron said there was no reason to believe the Israeli government was implicated, but that "a classified top-secret investigation is underway".[55] A March 2002 story by Le Monde recapped the Fox report and concluded: "Comverse is suspected of having introduced into its systems of the 'catch gates' in order to 'intercept, record and store' these wire-taps. This hardware would render the 'listener' himself 'listened to'."[56] Fox News did not pursue the allegations, and in the years since, there have been no legal or commercial actions of any type taken against Comverse by the FBI or any other branch of the US Government related to data access and security issues. While no real evidence has been presented against Comverse or Verint, the allegations have become a favorite topic of conspiracy theorists.[57] By 2005, the company had $959 million in sales and employed over 5,000 people, of whom about half were located in Israel.[16]" Verint is also the company that got the Dept. of Homeland Security contract to provide and install an electronic and video surveillance system across the entire U.S. border with Mexico.  One need not be much of a conspiracy theorist to have concerns about Verint's likely interactions and data sharing with the NSA and its Israeli equivalent, Unit 8200. 
Paul Merrell

Moon of Alabama - 0 views

  • Over the last year the U.S. bombed Jabhat al-Nusra personal and facilities in Syria some five or six times. The al-Qaeda subgroup also has a history of attacking U.S. paid "relative moderate" proxy forces in Syria. The Pentagon recently inserted another U.S. mercenary group into north Syria. This was accompanied by a media campaign in which the administration lauded itself for the operation. The newly inserted group is especially trained and equipped to direct U.S. air attacks like those that earlier hit al-Nusra fighters. Now that freshly inserted group was attacked by Jabhat al-Nusra. Some of its members were killed and others were abducted. The Obama administration is shocked, SHOCKED, ABSOLUTELY SHOCKED that Jabhat al-Nusra would do such a ghastly deed. "Why would they do that?" "Who could have known that they would attack U.S. proxy forces???"
  • There is no longer an Jihadist ISIS or ISIL in Syria and Iraq. The people leading that entity declared (pdf) today, at the highly symbolic beginning of Ramadan, themselves to be a new caliphate:
  • Could someone explain to the fucking dimwits in the Pentagon and the Obama administrations that people everywhere, and especially terrorists group, hate it when you bomb them and kill their leaders? That those people you bomb might want to take revenge against you and your proxies? That people you bombed will not like your targeting team moving in next door to them? That alQaeda is not an "ally"? These people are too pathetically clueless to even be embarrassed about it. The accumulated intelligence quotient of the administration and Pentagon officials running the anti-Syria operation must be below three digits. But aside from their lack of basic intelligence the utter lack of simple "street smarts" is the real problem here. These people have no idea how life works outside of their beltway cages.
  • ...12 more annotations...
  • On more thought from me on why the dimwits did not foresee that Nusra would attack. The White House insisted on calling a part of Nusra the "Khorasan group" and explained that it was only bombing this groups of alQaeda veterans now part of Nusra because the "Khorasan group" planning to hit in "western" countries. No expert nor anyone on the ground in Syria thought that this differentiation was meaningful. Nusra is alQaeda and so are all of its members. But the White House and Pentagon probably thought that Nusra would accept the artificial separation they themselves had made up. That Nusra would understand that it is seen as an "ally" and only the "Khorasan group" is seen as an enemy. If that was the line of thinking, and the situation seems to point to that, then these people have fallen for their own propaganda stunt. They probably believed that the "Khorasan group" was an accepted narrative because they were telling that tale to themselves. Poor idiots.
  • UPDATE: The one sane guy at the Council of Foreign relations, Micah Zenko, foresaw this debacle and wrote on March 2: [The U.S. trained mercenaries] will immediately be an attractive target for attacks by the Islamic State, Assad’s ground and air forces, and perhaps Nusra and other forces. Killing or taking prisoner fighters (or the families of those fighters) who were trained by the U.S. military will offer propaganda value, as well as leverage, to bargain for those prisoners’ release. He compared the whole operation to the 1961 CIA invasion of Cuba: Last September, the White House and Congress agreed to authorize and fund a train-and-equip project similar to the Bay of Pigs, but this time in the Middle East, without any discussion about phase two. The Syrian project resembles 1961 in two ways: What happens when the fighting starts is undecided, and the intended strategic objective is wholly implausible.
  • The attack on Friday was mounted by the Nusra Front, which is affiliated with Al Qaeda. It came a day after the Nusra Front captured two leaders and at least six fighters of Division 30, which supplied the first trainees to graduate from the Pentagon’s anti-Islamic State training program. In Washington, several current and former senior administration officials acknowledged that the attack and the abductions by the Nusra Front took American officials by surprise and amounted to a significant intelligence failure. While American military trainers had gone to great lengths to protect the initial group of trainees from attacks by Islamic State or Syrian Army forces, they did not anticipate an assault from the Nusra Front. In fact, officials said on Friday, they expected the Nusra Front to welcome Division 30 as an ally in its fight against the Islamic State....A senior Defense Department official acknowledged that the threat to the trainees and their Syrian recruiters had been misjudged, and said that officials were trying to understand why the Nusra Front had turned on the trainees. Like other Obama administration operations this one did not fail because of "intelligence failure" but because an utter lack of common sense.
  • U.S. media can no agree with itself if Russia is giving ISIS an airforce or if Russia pounds ISIS with the biggest bomber raid in decades. Such confusion occurs when propaganda fantasies collide with the observable reality. To bridge such divide requires some fudging. So when the U.S. claims to act against the finances of the Islamic State while not doing much, the U.S Public Broadcasting Service has to use footage of Russian airstrikes against the Islamic State while reporting claimed U.S. airstrike successes. The U.S. military recently claimed to have hit Islamic State oil tankers in Syria. This only after Putin embarrassed Obama at the G-20 meeting in Turkey. Putin showed satellite pictures of ridiculous long tanker lines waiting for days and weeks to load oil from the Islamic State without any U.S. interference.
  • The U.S. then claimed to have hit 116 oil tankers while the Russian air force claims to have hit 500. But there is an important difference between these claims. The Russians provided videos showing how their airstrikes hit at least two different very large oil tanker assemblies with hundreds of tankers in each. They also provided video of several hits on oil storage sites and refinery infrastructure. I have found no video of U.S. hits on Islamic State oil tanker assemblies. The U.S. PBS NewsHour did not find any either. In their TV report yesterday about Islamic State financing and the claimed U.S. hits on oil trucks they used the videos Russia provided without revealing the source. You can see the Russian videos played within an interview with a U.S. military spokesperson at 2:22 min.
  • The U.S. military spokesperson speaks on camera about U.S. airforce hits against the Islamic State. The video cuts to footage taken by Russian airplanes hitting oil tanks and then trucks. The voice-over while showing the Russian video with the Russians blowing up trucks says: "For the first time the U.S. is attacking oil delivery trucks." The video then cuts back to the U.S. military spokesperson. At no point is the Russian campaign mentioned or the source of the footage revealed. Any average viewer of the PBS report will assume that the black and white explosions of oil trucks and tanks are from of U.S. airstrikes filmed by U.S. air force planes. The U.S. military itself admitted that its strikes on IS oil infrastructure over the last year were "minimally effective". One wonders then how effective the claimed strike against 116 trucks really was. But unless we have U.S. video of such strikes and not copies of Russian strike video fraudulently passed off as U.S. strikes we will not know if those strikes happened at all.
  • The wannabe Sultan Erdogan did not get his will in Syria where he had planned to capture and annex Aleppo. The Russians prevented that. He now goes for his secondary target, Mosul in Iraq, which many Turks see as historic part of their country
  • Mosul, Iraq's second biggest city with about a million inhabitants, is currently occupied by the Islamic State. On Friday a column of some 1,200 Turkish soldiers with some 20 tanks and heavy artillery moved into a camp near Mosul. The camp was one of four small training areas where Turkey was training Kurds and some Sunni-Arab Iraqis to fight the Islamic State. The small camps in the northern Kurdish area have been there since the 1990s. They were first established to fight the PKK. Later their Turkish presence was justified as ceasefire monitors after an agreement ended the inner Kurdish war between the KDP forces loyal to the Barzani clan and the PUK forces of the Talabani clan. The bases were actually used to monitor movement of the PKK forces which fight for Kurdish independence in Turkey. The base near Mosul is new and it was claimed to be just a small weapons training base. But tanks and artillery have a very different quality than some basic AK-47 training. Turkey says it will increase the numbers in these camps to over 2000 soldiers.
  • Should Mosul be cleared of the Islamic State the Turkish heavy weapons will make it possible for Turkey to claim the city unless the Iraqi government will use all its power to fight that claim. Should the city stay in the hands of the Islamic State Turkey will make a deal with it and act as its protector. It will benefit from the oil around Mosul which will be transferred through north Iraq to Turkey and from there sold on the world markets. In short: This is an effort to seize Iraq's northern oil fields. That is the plan but it is a risky one. Turkey did not ask for permission to invade Iraq and did not inform the Iraqi government. The Turks claim that they were invited by the Kurds: Turkey will have a permanent military base in the Bashiqa region of Mosul as the Turkish forces in the region training the Peshmerga forces have been reinforced, Hürriyet reported. The deal regarding the base was signed between Kurdistan Regional Government (KRG) President Massoud Barzani and Turkish Foreign Minister Feridun Sinirlioğlu, during the latter’s visit to northern Iraq on Nov. 4. There are two problems with this. First: Massoud Barzani is no longer president of the KRG. His mandate ran out and the parliament refused to prolong it. Second: Mosul and its Bashiqa area are not part of the KRG. Barzani making a deal about it is like him making a deal about Paris.
  • The Iraqi government and all major Iraqi parties see the Turkish invasion as a hostile act against their country. Abadi demanded the immediate withdrawal of the Turkish forces but it is unlikely that Turkey will act on that. Some Iraqi politicians have called for the immediate dispatch of the Iraqi air force to bomb the Turks near Mosul. That would probably the best solution right now but the U.S. installed Premier Abadi is too timid to go for such strikes. The thinking in Baghdad is that Turkey can be kicked out after the Islamic State is defeated. But this thinking gives Turkey only more reason to keep the Islamic State alive and use it for its own purpose. The cancer should be routed now as it is still small. Barzani's Kurdistan is so broke that is has even confiscated foreign bank accounts to pay some bills. That may be the reason why Barzani agreed to the deal now. But the roots run deeper. Barzani is illegally selling oil that belongs to the Iraqi government to Turkey. The Barzani family occupies  not only the presidential office in the KRG but also the prime minister position and the local secret services. It is running the oil business and gets a big share of everything else. On the Turkish side the oil deal is handled within the family of President Erdogan. His son in law, now energy minister, had the exclusive right to transport the Kurdish oil through Turkey. Erdogan's son controls the shipping company that transports the oil over sea to the customer, most often Israel. The oil under the control of the Islamic State in Iraq passes the exactly same route. These are businesses that generate hundreds of millions per year.
  • It is unlikely that U.S., if it is not behinds Turkey new escapade, will do anything about it. The best Iraq could do now is to ask the Russians for their active military support. The Turks insisted on their sovereignty when they ambushed a Russian jet that brushed its border but had no intend of harming Turkey. Iraq should likewise insist on its sovereignty, ask Russia for help and immediately kick the Turks out. The longer it waits the bigger the risk that Turkey will eventually own Mosul.
  • Another fake news item currently circling is that Trump has given order to the military to create safe zones for Syria. The reality is still far from it: [H]is administration crafted a draft order that would direct the Pentagon and the State Department to submit plans for the safe zones within 90 days. The order hasn't yet been issued. The draft of the order, which will be endlessly revised, says that safe zones could be in Syria or in neighboring countries. The Pentagon has always argued against such zones in Syria and the plans it will submit, should such an order be issued at all, will reflect that. The safe zones in Syria ain't gonna happen
  •  
    So the first group of U.S. trained "moderate" Syrian opposition fighters are an epic fail. Who'd of thunk? 
Paul Merrell

Wells Fargo Fined Over Secret Sales Policy to Open Fake Customer Accounts - nsnbc inter... - 0 views

  • The Consumer Financial Protection Bureau (CFPB) has fined Wells Fargo for $100 million based on fraudulent customer account practices. An additional $85 million is to be paid to the city of Los Angeles in California, along with the Office of the Comptroller of the Currency.
  • Last year Wells Fargo was sued by employees (current and former) and customers all across the nation for setting up “unwanted accounts, unwarranted fees”. According to the lawsuit, this was “the largest California-based bank violated state and federal laws by misusing confidential information and failing to notify customers when personal information was breached.” Using “aggressive tactics” to coerce new customers, Wells Fargo made it “difficult to correct the mistakes” made by Wells Fargo and return fees to customers because of “high-pressure sales culture set unrealistic quotas, spurring employees to engage in fraudulent conduct to keep their jobs and boost the company’s profits.” Over the course of an extended period of time, “Wells Fargo employees secretly opened unauthorized accounts to hit sales targets and receive bonuses.” There were 1.5 million accounts opened without the authorization of customers and 500,000 credit cards accounts to boot. Wells Fargo has consistently blames “a few rogue employees. Five hundred employees were terminated, according to a Wells Fargo spokesperson. There was no mention of rescinding of bonuses paid to those employees, and there is no clear evidence that executive’s payouts totaling $155 million for “performance based compensation” for 2012 through 2013 was returned to the bank.
  • Those bonuses were administered based on the fraudulent accounts opened without customer approval. In a statement, Wells Fargo expressed belated regret and a sudden desire to “take responsibility for any instances where customers may have received a product that they did not request.” The training that caused this problem in the first place was a cross-selling strategy called “Going For Gr-Eight” which is a brochure for employees to push banking products onto households of existing customers to increase fee potential and overall profitability. Wells Fargo “staffers, fearing disciplinary action from managers, begged friends and family members to open ghost accounts” and forged signatures “and falsified phone numbers” of customers who did not want to open an account. This practice drove Wells Fargo’s financial success with an estimated “26% of the company’s revenue was from fee income, including those from credit and debit card accounts, trusts and investments.” The bank not only stole money from customers but “also damage their credit scores” and put some into collections to garner fees “for unauthorized accounts went unpaid”. In case of a complaining customer, Wells Fargo would “sandbag” their customers; meaning “failing to open accounts when requested by customers, and instead accumulating a number of account applications to be opened at a later date.”
  • ...1 more annotation...
  • Another devious tactic Wells Fargo employed was “bundling” or “incorrectly informing customers that certain products are available only in packages with other products such as additional accounts, insurance, annuities, and retirement plans.” This is not an isolated incident. Wells Fargo has fired 5,300 employees for this same “illegal behavior”. Beyond this questionable business practice, Wells Fargo was previously recognized by the CFPB for misapplying student loan payments in order to increase fee income. In this case, Wells Fargo was fined $3.6 million and forced to pay $410,000 to student loan borrowers for restitution.
Paul Merrell

The US government doesn't want you to know the cops are tracking you | Trevor Timm | Co... - 0 views

  • All across America, from Florida to Colorado and back again, the country's increasingly militarized local police forces are using a secretive technology to vacuum up cellphone data from entire neighborhoods – including from people inside their own homes – almost always without a warrant. This week, numerous investigations by major news agencies revealed the US government is now taking unbelievable measures to make sure you never find out about it. But a landmark court ruling for privacy could soon force the cops to stop, even as the Obama administration fights to keep its latest tool for mass surveillance a secret.So-called International Mobile Subscriber Identity (IMSI) catchers – more often called their popular brand name, "Stingray" – have long been the talk of the civil liberties crowd, for the indiscriminate and invasive way these roving devices conduct surveillance. Essentially, Stingrays act as fake cellphone towers (usually mounted in a mobile police truck) that police can point toward any given area and force every phone in the area to connect to it. So even if you're not making a call, police can find out who you've been calling, and for how long, as well as your precise location. As Nathan Freed Wessler of the ACLU explained on Thursday, "In one Florida case, a police officer explained in court that he 'quite literally stood in front of every door and window' with his stingray to track the phones inside a large apartment complex."
  • Yet these mass surveillance devices have largely stayed out of the public eye, thanks to the federal government and local police refusing to disclose they're using them in the first place – sometimes, shockingly, even to judges. As the Associated Press reported this week, the Obama administration has been telling local cops to keep information on Stingrays secret from members of the news media, even when it seems like local public records laws would mandate their disclosure. The AP noted:Federal involvement in local open records proceedings is unusual. It comes at a time when President Barack Obama has said he welcomes a debate on government surveillance and called for more transparency about spying in the wake of disclosures about classified federal surveillance programs.
  • Some of the government's tactics to hide Stingray from journalists and the public have been downright disturbing. After the ACLU had filed a records request for information on Stingrays, the local police force initially told them that, yes, they had the documents and to come on down to the station to look at them. But just before an ACLU rep was due to arrive, US Marshals seized the records and hid them away at another location, in what Wessler describes as "a blatant violation of state open-records laws".The federal government has used various other tactics around the country to prevent disclosure of similar information.USA Today also published a significant nationwide investigation about the Stingray problem, as well as what are known as "cellphone tower dumps". When police agencies don't have Stingrays at their disposal, they can go to cell phone providers to get the cellphone location information of everyone who has connected to a specific cell tower (which inevitably includes thousands of innocent people). The paper's John Kelly reported that one Colorado case shows cellphone tower dumps got police "'cellular telephone numbers, including the date, time and duration of any calls,' as well as numbers and location data for all phones that connected to the towers searched, whether calls were being made or not."
  • ...3 more annotations...
  • You may be asking: how, exactly, are the local cops getting their hands on such advanced military technology? Well, the feds are, in many cases, giving away the technology for free. When the US government is not loaning police agencies their own Stingrays, the Defense Department and Homeland Security are giving federal grants to cops, which allow departments to purchase the gear at the cost of $400,000 a pop from defense contractors like Harris Corporation, which makes the Stingray brand.
  • It's scary enough to think that the NSA is collecting so much information, but this mass location and metadata tracking at the local level all may be about to change. This week, the ACLU won a historic victory in the 11th Circuit Court of Appeals (serving Florida, Alabama and Georgia), which ruled that police need to get a warrant from a judge before extracting from your cellphone the location data obtained by way of a cell tower. This ruling will apply whether cops are going after one person, the whole tower and, one can assume, Stingrays. (The case was also argued by the aforementioned Wessler, who clearly is this month’s civil liberties Most Valuable Player.)This case has huge implications, and not just for the Stingrays secretly being used in Florida. It virtually guarantees the US supreme court will soon have to tackle the larger cellphone location question in some form – and whether police across the country have to finally start getting a warrant to find out where your precise location for days or weeks at a time. But as Stanford law professor Jennifer Granick wrote on Friday, it could also have an impact on NSA spying, which relies on the theory that indiscriminately collecting metadata is fair game until a court says otherwise.
  • Like Stingrays, and the NSA's phone dragnet before them, the militarization of America's local cops is a phenomenon that's only now getting widespread attention. As journalist Radley Balko, who wrote a seminal book on the subject two years ago, said this week, the Obama administration could easily limit these tactics to "cases of legitimate national security" – but has clearly chosen not to.No matter how much President Obama talks about how he has "maintained a healthy skepticism toward our surveillance programs", it seems the Most Transparent Administration in American History™ remains much more interested in maintaining a healthy, top-secret surveillance state.
Paul Merrell

NSA Spying Inspires ProtonMail 'End-to-End' Encrypted Email Service | NDTV Gadgets - 0 views

  • ne new email service promising "end-to-end" encryption launched on Friday, and others are being developed while major services such as Google Gmail and Yahoo Mail have stepped up security measures.A major catalyst for email encryption were revelations about widespread online surveillance in documents leaked by Edward Snowden, the former National Security Agency contractor."A lot of people were upset with those revelations, and that coalesced into this effort," said Jason Stockman, a co-developer of ProtonMail, a new encrypted email service which launched Friday with collaboration of scientists from Harvard, the Massachusetts Institute of Technology and the European research lab CERN.Stockman said ProtonMail aims to be as user-friendly as the major commercial services, but with extra security, and with its servers located in Switzerland to make it more difficult for US law enforcement to access.
  • "Our vision is to make encryption and privacy mainstream by making it easy to use," Stockman told AFP. "There's no installation. Everything happens behind the scenes automatically."Even though email encryption using special codes or keys, a system known as PGP, has been around for two decades, "it was so complicated," and did not gain widespread adoption, Stockman said.After testing over the past few months, ProtonMail went public Friday using a "freemium" model a basic account will be free with some added features for a paid account.
  • As our users from China, Iran, Russia, and other countries around the world have shown us in the past months, ProtonMail is an important tool for freedom of speech and we are happy to finally be able to provide this to the whole world," the company said in a blog post.Google and Yahoo recently announced efforts to encrypt their email communications, but some specialists say the effort falls short."These big companies don't want to encrypt your stuff because they spy on you, too," said Bruce Schneier, a well-known cryptographer and author who is chief technology officer for CO3 Systems."Hopefully, the NSA debate is creating incentives for people to build more encryption."Stockman said that with services like Gmail, even if data is encrypted, "they have the key right next to it if you have the key and lock next to each other, so it's pretty much useless."
  • ...3 more annotations...
  • By locating in Switzerland, ProtonMail hopes to avoid the legal woes of services like Lavabit widely believed to be used by Snowden which shut down rather than hand over data to the US government, and which now faces a contempt of court order.Even if a Swiss court ordered data to be turned over, Stockman said, "we would hand over piles of encrypted data. We don't have a key. We never see the password."
  • Lavabit founder Ladar Levison meanwhile hopes to launch a new service with other developers in a coalition known as the "Dark Mail Alliance."Levison told AFP he hopes to have a new encrypted email system in testing within a few months and widely available later this year."The goal is to make it ubiquitous, so people don't have to turn it on," he said.But he added that the technical hurdles are formidable, because the more user-friendly the system becomes, "the more susceptible it is to a sophisticated attacker with fake or spoofed key information."Levison said he hopes Dark Mail will become a new open standard that can be adopted by other email services.
  • on Callas, a cryptographer who developed the PGP standard and later co-founded the secure communications firm Silent Circle, cited challenges in making a system that is both secure and ubiquitous."If you are a bank you have to have an email system that complies with banking regulations," Callas told AFP, which could allow, for example, certain emails to be subject to regulatory or court review."Many of the services on the Internet started with zero security. We want to start with a system that is totally secure and let people dial it down."The new email system would complement Silent Circle's existing secure messaging system and encrypted mobile phone, which was launched earlier this year."If we start competing for customers on the basis of maximum privacy, that's good for everybody," Callas said.
  •  
    They're already so swamped that you have to reserve your user name and wait for an invite. They say they have to add servers. Web site is at https://protonmail.ch/ "ProtonMail works on all devices, including desktops, laptops, tablets, and smartphones. It's as simple as visiting our site and logging in. There are no plugins or apps to install - simply use your favorite web browser." "ProtonMail works on all devices, including desktops, laptops, tablets, and smartphones.
‹ Previous 21 - 40 of 83 Next › Last »
Showing 20 items per page