Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged foreign-agents

Rss Feed Group items tagged

Paul Merrell

Barack Obama's Secret Terrorist-Tracking System, by the Numbers - The InterceptThe Inte... - 0 views

  • Nearly half of the people on the U.S. government’s widely shared database of terrorist suspects are not connected to any known terrorist group, according to classified government documents obtained by The Intercept. Of the 680,000 people caught up in the government’s Terrorist Screening Database—a watchlist of “known or suspected terrorists” that is shared with local law enforcement agencies, private contractors, and foreign governments—more than 40 percent are described by the government as having “no recognized terrorist group affiliation.” That category—280,000 people—dwarfs the number of watchlisted people suspected of ties to al Qaeda, Hamas, and Hezbollah combined. The documents, obtained from a source in the intelligence community, also reveal that the Obama Administration has presided over an unprecedented expansion of the terrorist screening system. Since taking office, Obama has boosted the number of people on the no fly list more than ten-fold, to an all-time high of 47,000—surpassing the number of people barred from flying under George W. Bush. “If everything is terrorism, then nothing is terrorism,” says David Gomez, a former senior FBI special agent. The watchlisting system, he adds, is “revving out of control.”
  • Most people placed on the government’s watchlist begin in a larger, classified system known as the Terrorist Identities Datamart Environment (TIDE). The TIDE database actually allows for targeting people based on far less evidence than the already lax standards used for placing people on the watchlist. A more expansive—and invasive—database, TIDE’s information is shared across the U.S. intelligence community, as well as with commando units from the Special Operations Command and with domestic agencies such as the New York City Police Department. In the summer of 2013, officials celebrated what one classified document prepared by the National Counterterrorism Center refers to as “a milestone”—boosting the number of people in the TIDE database to a total of one million, up from half a million four years earlier.
  •  
    How do we dismantle the Politics of Fear? 
Paul Merrell

U.S. hits oil giant Rosneft, other firms with toughest Russia sanctions - 0 views

  • President Barack Obama imposed the biggest package of U.S. economic sanctions yet on Russia on Wednesday, hitting Russia's largest oil producer Rosneft and other energy, financial and defense firms, with what he called significant but targeted penalties. Obama's latest round of sanctions came after close consultations with European leaders, who announced a less-ambitious package. The ultimate impact of the U.S. sanctions likely depends on whether the European Union follows suit. The extent of the sanctions against key parts of the Russian energy and financial industry, including Gazprombank , was intended to serve notice to Moscow that its refusal to curb violence in eastern Ukraine has consequences. The targeted companies also include Russia's second-largest gas producer, Novatek, Vnesheconombank, or VEB, a state-owned bank that acts as payment agent for the Russian government, and eight arms firms.
  •  
    Note that the violence in eastern Ukraine has been launched by the U.S.-backed coup government of Ukraine. 
Paul Merrell

Land Destroyer: CNN: Libyan "Rebels" Are Now ISIS - 0 views

  • The United States has attempted to claim that the only way to stop the so-called "Islamic State" in Syria and Iraq is to first remove the government in Syria. Complicating this plan are developments in Libya, benefactor of NATO's last successful regime change campaign. In 2011, NATO armed, funded, and backed with a sweeping air campaign militants in Libya centered around the eastern Libyan cities of Tobruk, Derna, and Benghazi. By October 2011, NATO successfully destroyed the Libyan government, effectively handing the nation over to these militants. 
  • What ensued was a campaign of barbarism, genocide, and sectarian extremism as brutal in reality as what NATO claimed in fiction was perpetrated by the Libyan government ahead of its intervention. The so-called "rebels" NATO had backed were revealed to be terrorists led by Al Qaeda factions including the Libyan Islamic Fighting Group (LIFG) and Al-Qaeda in the Islamic Maghreb (AQIM). The so-called "pro-democracy protesters" Libyan leader Muammar Qaddafi was poised to attack in what NATO claimed was pending "genocide" were in fact heavily armed terrorists that have festered for decades in eastern Libya. Almost immediately after NATO successfully destroyed Libya's government, its terrorist proxies were mobilized to take part in NATO's next campaign against Syria. Libyan terrorists were sent first to NATO-member Turkey were they were staged, armed, trained, and equipped, before crossing the Turkish-Syrian border to take part in the fighting. 
  • CNN in an article titled, "ISIS comes to Libya," claims: The black flag of ISIS flies over government buildings. Police cars carry the group's insignia. The local football stadium is used for public executions. A town in Syria or Iraq? No. A city on the coast of the Mediterranean, in Libya.  Fighters loyal to the Islamic State in Iraq and Syria are now in complete control of the city of Derna, population of about 100,000, not far from the Egyptian border and just about 200 miles from the southern shores of the European Union.  The fighters are taking advantage of political chaos to rapidly expand their presence westwards along the coast, Libyan sources tell CNN. Only the black flag of Al Qaeda/ISIS has already long been flying over Libya - even at the height of NATO's intervention there in 2011.  ISIS didn't "come to" Libya, it was always there in the form of Al Qaeda's local franchises LIFG and AQIM - long-term, bitter enemies of the now deposed and assassinated Libyan leader Muammar Qaddafi.
  • ...7 more annotations...
  • CNN's latest article is merely the veneer finally peeling away from the alleged "revolution" it had attempted to convince readers had taken place in 2011.
  • Even amid CNN's own spin, it admits ISIS' presence in Libya is not a new phenomenon but rather the above mentioned sectarian extremists who left Libya to fight in Syria simply returning and reasserting themselves in the eastern Cyrenaica region. CNN also admits that these terrorists have existed in Libya for decades and were kept in check primarily by Libyan leader Muammar Qaddafi. With Qaddafi eliminated and all semblance of national unity destroyed by NATO's intervention in 2011, Al Qaeda has been able to not only prosper in Libya but use the decimated nation as a spingboard for invading and destroying other nations. Worst of all, Al Qaeda's rise in Libya was not merely the unintended consequence of a poorly conceived plan by NATO for military intervention, but a premeditated regional campaign to first build up then use Al Qaeda as a mercenary force to overthrow and destroy a series of nations, beginning with Libya, moving across North Africa and into nations like Egypt, Syria, Lebanon, Iraq, and eventually Iran. From there, NATO's mercenary force would be on the borders of Russia and China ready to augment already Western-backed extremists in the Caucasus and Xinjiang regions. In 2011, geopolitical analyst Dr. Webster Tarpley in his article, "The CIA’s Libya Rebels: The Same Terrorists who Killed US, NATO Troops in Iraq," noted that the US strategy was to:
  • ...use Al Qaeda to overthrow independent governments, and then either Balkanize and partition the countries in question, or else use them as kamikaze puppets against larger enemies like Russia, China, or Iran. Dr. Tarpley would also note in 2011 that: One of the fatal contradictions in the current State Department and CIA policy is that it aims at a cordial alliance with Al Qaeda killers in northeast Libya, at the very moment when the United States and NATO are mercilessly bombing the civilian northwest Pakistan in the name of a total war against Al Qaeda, and US and NATO forces are being killed by Al Qaeda guerrillas in that same Afghanistan-Pakistan theater of war. The force of this glaring contradiction causes the entire edifice of US war propaganda to collapse. The US has long since lost any basis in morality for military force.  In fact, terrorist fighters from northeast Libya may be killing US and NATO troops in Afghanistan right now, even as the US and NATO protect their home base from the Qaddafi government. Indeed, the very terrorists NATO handed the entire nation of Libya over to, are now allegedly prime targets in Syria and Iraq. The "pro-democracy rebels" of 2011 are now revealed to be "ISIS terrorists" with long-standing ties to Al Qaeda.
  • Not even mentioning the fact that Al Qaeda's very inception was to serve as a joint US-Saudi mercenary force to fight a proxy war in Afghanistan against the Soviet Union, the terrorist organization has since played a central role in the Balkans to justify NATO intervention there, and as a divisive force in Iraq during the US occupation to blunt what began as a formidable joint Sunni-Shia'a resistance movement. In 2007, it was revealed by Pulitzer Prize-winning veteran journalist Seymour Hersh that the United States, Israel, and Saudi Arabia were conspiring to use Al Qaeda once again, this time to undermine, destabilize, and destroy the governments of Syria and Iran in what would be a regional sectarian bloodbath. Hersh would report (emphasis added): To undermine Iran, which is predominantly Shiite, the Bush Administration has decided, in effect, to reconfigure its priorities in the Middle East. In Lebanon, the Administration has coöperated with Saudi Arabia’s government, which is Sunni, in clandestine operations that are intended to weaken Hezbollah, the Shiite organization that is backed by Iran. The U.S. has also taken part in clandestine operations aimed at Iran and its ally Syria. A by-product of these activities has been the bolstering of Sunni extremist groups that espouse a militant vision of Islam and are hostile to America and sympathetic to Al Qaeda. 
  • Hersh would note that Iran was perceived to be the greater threat and therefore, despite a constant barrage of propaganda claiming otherwise, Al Qaeda and its various affiliates were "lesser enemies." Even in 2007, Hersh's report would predict almost verbatim the cataclysmic regional sectarian bloodbath that would take place, with the West's extremists waging war not only on Shia'a populations but also on other religious minorities including Christians. His report would note: Robert Baer, a former longtime C.I.A. agent in Lebanon, has been a severe critic of Hezbollah and has warned of its links to Iranian-sponsored terrorism. But now, he told me, “we’ve got Sunni Arabs preparing for cataclysmic conflict, and we will need somebody to protect the Christians in Lebanon. It used to be the French and the United States who would do it, and now it’s going to be Nasrallah and the Shiites.  And this is precisely what is happening, word for word, page by page - everything warned about in Hersh's report has come to pass. In 2011, geopolitical analyst Dr. Webster Tarpley and others would also reiterate the insidious regional campaign Western policymakers were carrying out with Al Qaeda terrorists disguised as "rebels," "activists," and "moderate fighters" for the purpose of arming, funding, and even militarily intervening on their behalf in attempts to effect regime change and tilt the balance in the Middle East and North Africa region against Iran, Russia, and China. CNN's attempt to explain why ISIS is "suddenly" in Libya is one of many attempts to explain the regional rise of this organization in every way possible besides in terms of the truth - that ISIS is the result of multinational state sponsored terrorism including the US, UK, EU, Turkey, Jordan, Saudi Arabia, Qatar, and Israel as its chief backers.
  • Inexplicably, amid allegedly fighting ISIS in Iraq and Syria, the United States now claims it must first overthrow the Syrian government, despite it being the only viable, secular force in the region capable of keeping ISIS and its affiliates in check. CNN, in an article titled, "Sources: Obama seeks new Syria strategy review to deal with ISIS, al-Assad," would report: President Barack Obama has asked his national security team for another review of the U.S. policy toward Syria after realizing that ISIS may not be defeated without a political transition in Syria and the removal of President Bashar al-Assad, senior U.S. officials and diplomats tell CNN. Neither CNN, nor the politicians it cited in its article were able to articulate just why removing Syrian President Bashar al-Assad from power would somehow diminish the fighting capacity of ISIS. With CNN's recent article on ISIS' gains in Libya despite US-led NATO regime change there, after decades of Libyan leader Qaddafi keeping extremists in check, it would appear that NATO is once again attempting not to stop Al Qaeda/ISIS, but rather hand them yet another country to use as a base of operations. The goal is not to stop ISIS or even effect regime change in Syria alone - but rather hand Syria over as a failed, divided state to terrorists to use as a springboard against Iran, then Russia and China.
  • Clearly, ISIS' appearance in Libya negates entirely the already incomprehensible strategy the US has proposed of needing to first depose the Syrian government, then fight ISIS. The Syrian government, like that of Libyan leader Muammar Qaddafi, is the only effective force currently fighting ISIS and Al Qaeda's many other franchises operating in the region. Deposing the government in Damascus would compound the fight against sectarian terrorists - and the West is fully aware of that. Therefore, attempts to topple the secular government in Damascus is in every way the intentional aiding and abetting of ISIS and the sharing in complicity of all the horrific daily atrocities ISIS and its affiliates are carrying out. The morally bankrupt, insidious, dangerous, and very genocidal plans hatched in 2007 and executed in earnest in 2011 illustrate that ISIS alone is not the greatest threat to global peace and stability, but also those that constitute its multinational state sponsors. The very West purportedly defending civilization is the chief protagonist destroying it worldwide.  
Paul Merrell

Middle East Updates / Syria claims terror groups used chlorine as weapon - Middle East ... - 0 views

  • 2:57 P.M. Syria claims terror groups used chlorine as weapon Syria's vice foreign minister has denied that his government ever used chemical weapons or chlorine during the country's brutal civil war and warns that terror groups are using such weapons. The comments Monday by Faysal Mekdad to a meeting of the Organization for the Prohibition of Chemical Weapons underscored what could be the organization's next major challenge, even as it comes close to fully eliminating Damascus' deadly stockpile of nerve agents and poison gas. Mekdad said Monday that terror groups "have used chlorine gas in several of the regions of Syria and Iraq." The government of President Bashar Assad is widely believed to have unleashed chemical weapons during the civil war, but there are growing fears that terror groups like Islamic State also could use chlorine as a weapon. (AP)
Paul Merrell

'Empire of Chaos' in the House - RT Op-Edge - 0 views

  • And yet, Air Force One, we got a problem. High-level US financial sources assure this correspondent the trip is all about Obama shoring up the new King’s support for their financial/economic war on Russia as the House of Saud is starting to have second thoughts. The Saudi role in this war has been to come up with the oil price shock – which is hurting not only Russia but also Iran and Venezuela, among others. Besides, the US puppet theoretically in charge in Ukraine, Petro Poroshenko, has just visited Saudi Arabia. Russia is not Iran – with all due respect to Iran. If the House of Saud really believes they are talking to the head of a superpower rather than a ventriloquist’s puppet – which is Obama’s role – they are effectively doomed. Nothing Obama says means a thing. The real ‘Masters of the Universe’ who run the ‘Empire of Chaos’ want the House of Saud to do most of their dirty work against Russia; and in a later stage they will take care of the “towel heads” - as the saying goes in Washington - over their development of nuclear missiles with Pakistan. And especially because the Saudi-launched oil price war is bound to destroy the US oil industry - against US national interests.
  • The House of Saud has absolutely nothing to gain from this undeclared financial/economic war on Russia. The Saudis have already “lost” Yemen and Iraq. Bahrain is held by mercenary troops containing the alienation of the Shia majority. They are freaking out with the possibility of ultimate “enemy” Iran reaching a nuclear deal with His Master’s Voice. They are desperate that “Assad won’t go”. They want every Muslim Brotherhood in sight – or the vicinity – jailed or beheaded. They fear any Arab Spring-style stirrings as worse than the plague. And then there’s the fake Caliphate of ISIS/ISIL/Daesh threatening to go all the way to Mecca and Medina. The House of Saud is effectively surrounded.
  • Meanwhile, as the tempest approaches, all is smiles – amid a silent family bloodbath. The powerful Sudairi clan has exacted their “revenge” as King Abdullah’s corpse was still warm. King Salman, almost 80, and with Alzheimer’s about to turn him into mush, took no time to appoint his nephew Mohammed bin Naif as deputy crown prince. And just in case nepotism was not evident enough, he also appointed his son Prince Mohammed bin Salman as defense minister. Mohammed bin Naif is a Pentagon/CIA darling; the House of Saud’s head of counterterrorism.
  • ...1 more annotation...
  • But playing the ‘Empire of Chaos’ game – financial/economic war on Russia - is a game-changer, as in playing with fire. US/EU sanctions, attacks on the oil price and the ruble by giant derivative players as agents, are something way above the Saudi pay grade. The House of Saud swore that they didn’t change their production quota during 2014. But there was an excess supply – and it was brought into the market to help cause the oil price crash, alongside the manipulation by derivatives speculators. Scores of oil analysts still can’t figure out why the House of Saud went after Russia; all reasons are political, not economical (Russian support for Syria and Iran, the Americans agreeing with the strategy, etc.). The fact is Moscow did perceive it as a declaration of economic war by Saudi Arabia. Petroleum Intelligence Weekly, cautiously, has already hinted it may get much worse, as in “potential for disruption in Mideast Gulf monarchies.” Beware of an Emperor bearing gifts – or mourning a late King. The ‘Empire of Chaos’ is essentially asking the House of Saud to keep going kamikaze all the way against Russia. Sooner or later someone in Riyadh will realize this is the roadmap to House suicide.
Paul Merrell

A Year After Reform Push, NSA Still Collects Bulk Domestic Data, Still Lacks Way to Ass... - 0 views

  • The presidential advisory board on privacy that recommended a slew of domestic surveillance reforms in the wake of the Edward Snowden revelations reported today that many of its suggestions have been agreed to “in principle” by the Obama administration, but in practice, very little has changed. Most notably, the Privacy and Civil Liberties Oversight Board called attention to the obvious fact that one full year after it concluded that the government’s bulk collection of metadata on domestic telephone calls is illegal and unproductive, the program continues apace. “The Administration accepted our recommendation in principle. However, it has not ended the bulk telephone records program on its own, opting instead to seek legislation to create an alternative to the existing program,” the report notes.
  • And while Congress has variously debated, proposed, neutered, and failed to agree on any action, the report’s authors point the finger of blame squarely at President Obama. “It should be noted that the Administration can end the bulk telephone records program at any time, without congressional involvement,” the report says. Obama said a year ago that he favored an end to the government collection of those records if an alternative — such as keeping the records at the telephone companies, or with a third party — still allowed them to be searchable by the government. The White House was recently said to be “still considering” the matter. The board noted that Obama has accepted some, but not all, of the privacy safeguards it recommended — somewhat reducing the ease and depth with which National Security Agency agents can dig through the domestic data, but not, for instance, agreeing to delete the data after three years, instead of five.
  • But one recommendation in particular – that the intelligence community develop some sort of methodology to assess whether any of this stuff is actually doing any good — has been notably “not implemented.” “Determining the efficacy and value of particular counterterrorism programs is critical,” the board says. “Without such determinations, policymakers and courts cannot effectively weigh the interests of the government in conducting a program against the intrusions on privacy and civil liberties that it may cause.”
  • ...2 more annotations...
  • A year ago, the board also recommended that Congress enact legislation enabling the secretive Foreign Intelligence Surveillance Court, which currently approves both specific and blanket warrant applications without allowing anyone to argue otherwise, to hear independent views. It recommended more appellate reviews of that court’s rulings. There’s been no progress on either front. A year ago, the board recommended that “the scope of surveillance authorities affecting Americans should be public,” and that the intelligence community should “develop principles and criteria for the public articulation of the legal authorities under which it conducts surveillance affecting Americans.” Something is apparently brewing in that area, but it’s not entirely clear what. “Intelligence Community representatives have advised us that they are committed to implementing this recommendation,” with principles “that they will soon be releasing,” the report says.
  • The presidential advisory board on privacy that recommended a slew of domestic surveillance reforms in the wake of the Edward Snowden revelations reported today that many of its suggestions have been agreed to “in principle” by the Obama administration, but in practice, very little has changed. Most notably, the Privacy and Civil Liberties Oversight Board called attention to the obvious fact that one full year after it concluded that the government’s bulk collection of metadata on domestic telephone calls is illegal and unproductive, the program continues apace. “The Administration accepted our recommendation in principle. However, it has not ended the bulk telephone records program on its own, opting instead to seek legislation to create an alternative to the existing program,” the report notes.
Paul Merrell

ECHELON: NSA's Global Electronic Interception - 0 views

  • 12 August 1988  Cover, pages 10-12   Somebody's  listening  . . . and they don't give a damn about personal privacy or commercial confidence. Project 415 is a top-secret new global surveillance system. It can tap into a billion calls a year in the UK alone. Inside Duncan Campbell on how spying entered the 21st century . . .  They've got it taped In the booming surveillance industry they spy on whom they wish, when they wish, protected by barriers of secrecy, fortified by billions of pounds worth of high, high technology. Duncan Campbell reports from the United States on the secret Anglo-American plan for a global electronic spy system for the 21st century capable of listening in to most of us most of the time   American, British and Allied intelligence agencies are soon to embark on a massive, billion-dollar expansion of their global electronic surveillance system. According to information given recently in secret to the US Congress, the surveillance system will enable the agencies to monitor and analyse civilian communications into the 21st century. Identified for the moment as Project P415, the system will be run by the US National Security Agency (NSA). But the intelligence agencies of many other countries will be closely involved with the new network, including those from Britain, Australia, Germany and Japan--and, surprisingly, the People's Republic of China. New satellite stations and monitoring centres are to be built around the world, and a chain of new satellites launched, so that NSA and its British counterpart, the Government Communications Headquarters (GCHQ) at Cheltenham, may keep abreast of the burgeoning international telecommunications traffic.
  • Both the new and existing surveillance systems are highly computerised. They rely on near total interception of international commercial and satellite communications in order to locate the telephone or other messages of target individuals. Last month, a US newspaper, the Cleveland Plain Dealer, revealed that the system had been used to target the telephone calls of a US Senator, Strom Thurmond. The fact that Thurmond, a southern Republican and usually a staunch supporter of the Reagan administration, is said to have been a target has raised fears that the NSA has restored domestic, electronic, surveillance programmes. These were originally exposed and criticised during the Watergate investigations, and their closure ordered by President Carter. After talking to the NSA, Thurmond later told the Plain Dealer that he did not believe the allegation. But Thurmond, a right-wing Republican, may have been unwilling to rock the boat. Staff members of the Permanent Select Committee on Intelligence said that staff were "digging into it" despite the "stratospheric security classification" of all the systems involved. The Congressional officials were first told of the Thurmond interception by a former employee of the Lockheed Space and Missiles Corporation, Margaret Newsham, who now lives in Sunnyvale, California. Newsham had originally given separate testimony and filed a lawsuit concerning corruption and mis-spending on other US government "black" projects. She has worked in the US and Britain for two corporations which manufacture signal intelligence computers, satellites and interception equipment for NSA, Ford Aerospace and Lockheed. Citing a special Executive Order signed by President Reagan. she told me last month that she could not and would not discuss classified information with journalists. But according to Washington sources (and the report in the Plain Dealer, she informed a US Congressman that the Thurmond interception took place at Menwith Hill, and that she p
  • A secret listening agreement, called UKUSA (UK-USA), assigns parts of the globe to each participating agency. GCHQ at Cheltenham is the co-ordinating centre for Europe, Africa and the Soviet Union (west of the Ural Mountains). The NSA covers the rest of the Soviet Union and most of the Americas. Australia--where another station in the NSA listening network is located in the outback--co-ordinates the electronic monitoring of the South Pacific, and South East Asia.
  • ...6 more annotations...
  • During the Watergate affair. it was revealed that NSA, in collaboration with GCHQ, had routinely intercepted the international communications of prominent anti-Vietnam war leaders such as Jane Fonda and Dr Benjamin Spock. Another target was former Black Panther leader Eldridge Cleaver. Then in the late 1970s, it was revealed that President Carter had ordered NSA to stop obtaining "back door" intelligence about US political figures through swapping intelligence data with GCHQ Cheltenham.
  • ince then, investigators have subpoenaed other witnesses and asked them to provide the complete plans and manuals of the ECHELON system and related projects. The plans and blueprints are said to show that targeting of US political figures would not occur by accident. but was designed into the system from the start. While working at Menwith Hill, Newsham is reported to have said that she was able to listen through earphones to telephone calls being monitored at the base. Other conversations that she heard were in Russian. After leaving Menwith Hill, she continued to have access to full details of Menwith Hill operations from a position as software manager for more than a dozen VAX computers at Menwith which operate the ECHELON system. Newsham refused last month to discuss classified details of her career, except with cleared Congressional officials. But it has been publicly acknowledged that she worked on a large range of so-called "black" US intelligence programmes, whose funds are concealed inside the costs of other defence projects. She was fired from Lockheed four years ago after complaining about the corruption, and sexual harassment.
  • he largest overseas station in the Project P415 network is the US satellite and communications base at Menwith Hill. near Harrogate in Yorkshire. It is run undercover by the NSA and taps into all Britain's main national and international communications networks (New Statesman, 7 August 1980). Although high technology stations such as Menwith Hill are primarily intended to monitor international communications, according to US experts their capability can be, and has been, turned inwards on domestic traffic. Menwith Hill, in particular, has been accused by a former employee of gross corruption and the monitoring of domestic calls. The vast international global eavesdropping network has existed since shortly after the second world war, when the US, Britain, Canada, Australia and New Zealand signed a secret agreement on signals intelligence, or "sigint". It was anticipated, correctly, that electronic monitoring of communications signals would continue to be the largest and most important form of post-war secret intelligence, as it had been through the war. Although it is impossible for analysts to listen to all but a small fraction of the billions of telephone calls, and other signals which might contain "significant" information, a network of monitoring stations in Britain and elsewhere is able to tap all international and some domestic communications circuits, and sift out messages which sound interesting. Computers automatically analyse every telex message or data signal, and can also identify calls to, say, a target telephone number in London, no matter from which country they originate.
  • If Margaret Newsham's testimony is confirmed by the ongoing Congressional investigation, then the NSA has been behaving illegally under US law--unless it can prove either that Thurmond's call was intercepted completely accidentally, or that the highly patriotic Senator is actually a foreign spy or terrorist. Moreover NSA's international phone tapping operations from Menwith Hill and at Morwenstow, Cornwall, can only be legal in Britain if special warrants have been issued by the Secretary of State to specify that American intelligence agents are persons to whom information from intercepts must or should be given. This can not be established, since the government has always refused to publish any details of the targets or recipients of specific interception warrants.
  • Both British and American domestic communications are also being targeted and intercepted by the ECHELON network, the US investigators have been told. The agencies are alleged to have collaborated not only on targeting and interception, but also on the monitoring of domestic UK communications. Special teams from GCHQ Cheltenham have been flown in secretly in the last few years to a computer centre in Silicon Valley near San Francisco for training on the special computer systems that carry out both domestic and international interception.
  • The centre near San Francisco has also been used to train staff from the "Technical Department" of the People's Liberation Army General Staff, which is the Chinese version of GCHQ. The Department operates two ultra-secret joint US-Chinese listening stations in the Xinjiang Uighur Autonomous Region, close to the Soviet Siberian border. Allegedly, such surveillance systems are only used to target Soviet or Warsaw Pact communications signals, and those suspected of involvement in espionage and terrorism. But those involved in ECHELON have stressed to Congress that there are no formal controls over who may be targeted. And I have been told that junior intelligence staff can feed target names into the system at all levels, without any check on their authority to do so. Witnesses giving evidence to the Congressional inquiry have discussed whether the Democratic presidential contender Jesse Jackson was targeted; one source implied that he had been. Even test engineers from manufacturing companies are able to listen in on private citizens' communications, the inquiry was told. But because of the special Executive Order signed by President Reagan, US intelligence operatives who know about such politically sensitive operations face jail sentences if they speak out--despite the constitutional American protection of freedom of speech and of the press. And in Britain, as we know, the government is in the process of tightening the Official Secrets Act to make the publication of any information from intelligence officials automatically a crime, even if the information had already been published, or had appeared overseas first.
  •  
    From the original series of ariticles * in 1988 * that first brought the Five Eyes' nation's ECHELON surveillance project to light. But note the paragarph about the disclosure during the Watergate scandal (early 1970s) about domestic digital surveillance of antiwar leaders and Black Panther leader Eldridge Cleaver.    
Paul Merrell

Wikimedia v. NSA: Another Court Blinds Itself to Mass NSA Surveillance | Electronic Fro... - 0 views

  • We all know justice is blind. But that is supposed to mean that everyone before it is treated equally, not that the justice system must close its eyes and refuse to look at important legal issues facing Americans.  Yet the government continues to convince courts that they cannot consider the constitutionality of its behavior in national security cases and, last week, in an important case for anyone who has ever used Wikipedia, another judge agreed with that position.  A federal district judge in Maryland dismissed Wikimedia v. NSA, a case challenging the legality of the NSA’s “upstream” surveillance—mass surveillance of Internet communications as they flow through the Internet backbone. The case was brought by our friends at the ACLU on behalf of nine plaintiffs, including human rights organizations, members of the media, and the Wikimedia Foundation.1 We filed a brief in the case, too, in support of Wikimedia and the other plaintiffs. The judge dismissed the case based on a legal principle called standing. Standing is supposed to ensure, among other things, that the party bringing the lawsuit has suffered a concrete harm, caused by the party being sued, and that the court can resolve the harm with a favorable ruling.
  • But the U.S. government has taken this doctrine, which was intended to limit the cases federal courts hear to actual live controversies, and turned it into a perverse shell game in surveillance cases—essentially arguing that because aspects of the surveillance program are secret, plaintiffs cannot prove that their communications were actually, in fact, intercepted and surveilled. And without that proof, the government argues, there’s no standing, because plaintiffs can’t show that they’ve suffered harm. Sadly, like several other courts before it, the judge agreed to this shell game and decided that it couldn’t decide whether the constitutional rights of Wikimedia and the other plaintiffs were violated.  This game is mighty familiar to us at EFF, but that doesn’t make it any less troubling. In our system, the courts have a fundamental obligation to conclusively determine the legality of government action that affects individuals’ constitutional rights. For years now, plaintiffs have tried to get the courts to simply issue a ruling on the merits of NSA surveillance programs. And for years, the government has successfully persuaded the courts to rely on standing and related doctrines to avoid doing so. That is essentially what happened here. The court labeled as “speculative” Wikimedia’s claim that, at a minimum, even one of its approximately one trillion Internet communications had been swept up in the NSA’s upstream surveillance program. Remember, this is a program that, by the government’s own admission, involves the searching and scanning of vast amounts of Internet traffic at key Internet junctures on the Internet’s backbone. Yet in court’s view, Wikimedia’s allegations describing upstream—based on concrete facts, taken from government documents— coupled with a plaintiff that engages in a large volume of internet communications were not enough to state a “plausible” claim that Wikimedia had been surveilled.
  • On the way to reaching that conclusion, and putting on its blindfold, the court made a number of mistakes. The Government’s Automated Eyes Are Still Government Eyes First, it appears the court fundamentally misunderstood Wikimedia’s claim about upstream surveillance and, in particular, “about surveillance.” As Wikimedia alleged, “about surveillance” (a specific aspect of upstream surveillance that searches the content of communications for references to particular email addresses or other identifiers) amounts to “the digital analogue of having a government agent open every piece of mail that comes through the post to determine whether it mentions a particular word or phrase.” The court held, however, that this type of “about” surveillance was “targeted insofar as it makes use of only those communications that contain information matching the tasked selectors,” like email addresses. But what the government "makes use of" is entirely beside the point—it is the scanning of the communications for the tasked selectors in the first place that is the problem.  To put it into a different context, the government conducts a search when it enters into your house and starts rifling through your files—not just when it finds something it wants to keep. The government's ultimate decision to “make use of” the communications it finds interesting is irrelevant. It is the search of the communications that matters.
  • ...2 more annotations...
  • Back of the Envelope Gymnastics Another troubling aspect of the court’s decision was its attack on the probabilities Wikimedia assigned to the likelihood of its communications being intercepted. Given that Wikimedia engages in a large volume of Internet communications, Wikimedia alleged that—even assuming a .00000001% chance that any one particular communication is intercepted—it would still have a 99.9999999999% of having one of its communications intercepted. The statistic was used to illustrate that, even assuming very low probabilities for interception, there was still a near-certainty that Wikipedia’s traffic was collected. But the court attacked Wikimedia’s simple statistical analysis (and the attack tracked, to a great degree, arguments made in the government’s declarations that the court purportedly did not consider). The court seemed to believe it had seized upon a great flaw in Wikimedia’s case by observing that, if the probability of any given communication being intercepted were decreased 100% or 1000%, the probability of one of Wikimedia’s communications being intercepted would similarly drop. The “mathematical gymnastics” the court believed it had unearthed were nothing more than Wikimedia using an intentionally small (and admittedly arbitrary) probability to illustrate the high likelihood that its communications had been swept up. But even if the court disagreed with the probabilities Wikimedia relied on, it’s not at all clear why that would justify dismissing the case at the outset. If it turned out, after development of the record, that the probabilities were off, then dismissal might be appropriate. But the court cut the case off before Wikimedia had the opportunity to introduce evidence or other facts that might support the probability they assigned.
  • Someone Else Probably Has Standing, Right? Perhaps most troubling was the court’s mistaken belief that the legality of upstream surveillance could be challenged in other ways, beyond civil cases like Wikimedia or our ongoing case, Jewel v. NSA. The court asserted its decision would not insulate upstream from judicial review, which—according to the court—could still receive judicial scrutiny through (1) review from the Foreign Intelligence Surveillance Court (FISC), (2) a challenge by a criminal defendant, or (3) a challenge from an electronic service provider. None of these options is truly a viable alternative, however. First, the FISC (until very recently) did not have adversarial proceedings—it only heard from the government, and its proceedings remain both far more limited and more secretive than a regular court’s. Second, a challenge from a criminal defendant won’t work either, because, to date, the government has explicitly refused to disclose—even where defendants are notified of the use of FISA surveillance—whether their communications were obtained using upstream surveillance. And, finally, in the nearly 15 years (or more) the government has conducted upstream surveillance, we’re not aware of any service provider that has challenged the legality of the practice. Indeed, given that upstream is done with the cooperation of telecoms like AT&T and Verizon—the same telcos that did not challenge the NSA’s bulk collection of Americans’ call records for over a decade—we're not holding our breath for a challenge anytime soon. Instead, we need the courts to tackle these cases. Upstream surveillance presents unique constitutional issues that no federal court has seriously addressed. It's time the federal courts stepped up to the challenge.
  •  
    The notion that the government can intentionally violate the privacy rights of its citizens yet a court find that those citizens have no right to seek redress announces a view that privacy rights are hollow --- that those wronged by government malfeasance have no remedy in the courts of our nation. That is a view that must be thrown in the dustbins of history if freedom is to be preserved. 
Paul Merrell

Cy Vance's Proposal to Backdoor Encrypted Devices Is Riddled With Vulnerabilities | Jus... - 0 views

  • Less than a week after the attacks in Paris — while the public and policymakers were still reeling, and the investigation had barely gotten off the ground — Cy Vance, Manhattan’s District Attorney, released a policy paper calling for legislation requiring companies to provide the government with backdoor access to their smartphones and other mobile devices. This is the first concrete proposal of this type since September 2014, when FBI Director James Comey reignited the “Crypto Wars” in response to Apple’s and Google’s decisions to use default encryption on their smartphones. Though Comey seized on Apple’s and Google’s decisions to encrypt their devices by default, his concerns are primarily related to end-to-end encryption, which protects communications that are in transit. Vance’s proposal, on the other hand, is only concerned with device encryption, which protects data stored on phones. It is still unclear whether encryption played any role in the Paris attacks, though we do know that the attackers were using unencrypted SMS text messages on the night of the attack, and that some of them were even known to intelligence agencies and had previously been under surveillance. But regardless of whether encryption was used at some point during the planning of the attacks, as I lay out below, prohibiting companies from selling encrypted devices would not prevent criminals or terrorists from being able to access unbreakable encryption. Vance’s primary complaint is that Apple’s and Google’s decisions to provide their customers with more secure devices through encryption interferes with criminal investigations. He claims encryption prevents law enforcement from accessing stored data like iMessages, photos and videos, Internet search histories, and third party app data. He makes several arguments to justify his proposal to build backdoors into encrypted smartphones, but none of them hold water.
  • Before addressing the major privacy, security, and implementation concerns that his proposal raises, it is worth noting that while an increase in use of fully encrypted devices could interfere with some law enforcement investigations, it will help prevent far more crimes — especially smartphone theft, and the consequent potential for identity theft. According to Consumer Reports, in 2014 there were more than two million victims of smartphone theft, and nearly two-thirds of all smartphone users either took no steps to secure their phones or their data or failed to implement passcode access for their phones. Default encryption could reduce instances of theft because perpetrators would no longer be able to break into the phone to steal the data.
  • Vance argues that creating a weakness in encryption to allow law enforcement to access data stored on devices does not raise serious concerns for security and privacy, since in order to exploit the vulnerability one would need access to the actual device. He considers this an acceptable risk, claiming it would not be the same as creating a widespread vulnerability in encryption protecting communications in transit (like emails), and that it would be cheap and easy for companies to implement. But Vance seems to be underestimating the risks involved with his plan. It is increasingly important that smartphones and other devices are protected by the strongest encryption possible. Our devices and the apps on them contain astonishing amounts of personal information, so much that an unprecedented level of harm could be caused if a smartphone or device with an exploitable vulnerability is stolen, not least in the forms of identity fraud and credit card theft. We bank on our phones, and have access to credit card payments with services like Apple Pay. Our contact lists are stored on our phones, including phone numbers, emails, social media accounts, and addresses. Passwords are often stored on people’s phones. And phones and apps are often full of personal details about their lives, from food diaries to logs of favorite places to personal photographs. Symantec conducted a study, where the company spread 50 “lost” phones in public to see what people who picked up the phones would do with them. The company found that 95 percent of those people tried to access the phone, and while nearly 90 percent tried to access private information stored on the phone or in other private accounts such as banking services and email, only 50 percent attempted contacting the owner.
  • ...8 more annotations...
  • In addition to his weak reasoning for why it would be feasible to create backdoors to encrypted devices without creating undue security risks or harming privacy, Vance makes several flawed policy-based arguments in favor of his proposal. He argues that criminals benefit from devices that are protected by strong encryption. That may be true, but strong encryption is also a critical tool used by billions of average people around the world every day to protect their transactions, communications, and private information. Lawyers, doctors, and journalists rely on encryption to protect their clients, patients, and sources. Government officials, from the President to the directors of the NSA and FBI, and members of Congress, depend on strong encryption for cybersecurity and data security. There are far more innocent Americans who benefit from strong encryption than there are criminals who exploit it. Encryption is also essential to our economy. Device manufacturers could suffer major economic losses if they are prohibited from competing with foreign manufacturers who offer more secure devices. Encryption also protects major companies from corporate and nation-state espionage. As more daily business activities are done on smartphones and other devices, they may now hold highly proprietary or sensitive information. Those devices could be targeted even more than they are now if all that has to be done to access that information is to steal an employee’s smartphone and exploit a vulnerability the manufacturer was required to create.
  • Privacy is another concern that Vance dismisses too easily. Despite Vance’s arguments otherwise, building backdoors into device encryption undermines privacy. Our government does not impose a similar requirement in any other context. Police can enter homes with warrants, but there is no requirement that people record their conversations and interactions just in case they someday become useful in an investigation. The conversations that we once had through disposable letters and in-person conversations now happen over the Internet and on phones. Just because the medium has changed does not mean our right to privacy has.
  • Vance attempts to downplay this serious risk by asserting that anyone can use the “Find My Phone” or Android Device Manager services that allow owners to delete the data on their phones if stolen. However, this does not stand up to scrutiny. These services are effective only when an owner realizes their phone is missing and can take swift action on another computer or device. This delay ensures some period of vulnerability. Encryption, on the other hand, protects everyone immediately and always. Additionally, Vance argues that it is safer to build backdoors into encrypted devices than it is to do so for encrypted communications in transit. It is true that there is a difference in the threats posed by the two types of encryption backdoors that are being debated. However, some manner of widespread vulnerability will inevitably result from a backdoor to encrypted devices. Indeed, the NSA and GCHQ reportedly hacked into a database to obtain cell phone SIM card encryption keys in order defeat the security protecting users’ communications and activities and to conduct surveillance. Clearly, the reality is that the threat of such a breach, whether from a hacker or a nation state actor, is very real. Even if companies go the extra mile and create a different means of access for every phone, such as a separate access key for each phone, significant vulnerabilities will be created. It would still be possible for a malicious actor to gain access to the database containing those keys, which would enable them to defeat the encryption on any smartphone they took possession of. Additionally, the cost of implementation and maintenance of such a complex system could be high.
  • Vance also suggests that the US would be justified in creating such a requirement since other Western nations are contemplating requiring encryption backdoors as well. Regardless of whether other countries are debating similar proposals, we cannot afford a race to the bottom on cybersecurity. Heads of the intelligence community regularly warn that cybersecurity is the top threat to our national security. Strong encryption is our best defense against cyber threats, and following in the footsteps of other countries by weakening that critical tool would do incalculable harm. Furthermore, even if the US or other countries did implement such a proposal, criminals could gain access to devices with strong encryption through the black market. Thus, only innocent people would be negatively affected, and some of those innocent people might even become criminals simply by trying to protect their privacy by securing their data and devices. Finally, Vance argues that David Kaye, UN Special Rapporteur for Freedom of Expression and Opinion, supported the idea that court-ordered decryption doesn’t violate human rights, provided certain criteria are met, in his report on the topic. However, in the context of Vance’s proposal, this seems to conflate the concepts of court-ordered decryption and of government-mandated encryption backdoors. The Kaye report was unequivocal about the importance of encryption for free speech and human rights. The report concluded that:
  • States should promote strong encryption and anonymity. National laws should recognize that individuals are free to protect the privacy of their digital communications by using encryption technology and tools that allow anonymity online. … States should not restrict encryption and anonymity, which facilitate and often enable the rights to freedom of opinion and expression. Blanket prohibitions fail to be necessary and proportionate. States should avoid all measures that weaken the security that individuals may enjoy online, such as backdoors, weak encryption standards and key escrows. Additionally, the group of intelligence experts that was hand-picked by the President to issue a report and recommendations on surveillance and technology, concluded that: [R]egarding encryption, the U.S. Government should: (1) fully support and not undermine efforts to create encryption standards; (2) not in any way subvert, undermine, weaken, or make vulnerable generally available commercial software; and (3) increase the use of encryption and urge US companies to do so, in order to better protect data in transit, at rest, in the cloud, and in other storage.
  • The clear consensus among human rights experts and several high-ranking intelligence experts, including the former directors of the NSA, Office of the Director of National Intelligence, and DHS, is that mandating encryption backdoors is dangerous. Unaddressed Concerns: Preventing Encrypted Devices from Entering the US and the Slippery Slope In addition to the significant faults in Vance’s arguments in favor of his proposal, he fails to address the question of how such a restriction would be effectively implemented. There is no effective mechanism for preventing code from becoming available for download online, even if it is illegal. One critical issue the Vance proposal fails to address is how the government would prevent, or even identify, encrypted smartphones when individuals bring them into the United States. DHS would have to train customs agents to search the contents of every person’s phone in order to identify whether it is encrypted, and then confiscate the phones that are. Legal and policy considerations aside, this kind of policy is, at the very least, impractical. Preventing strong encryption from entering the US is not like preventing guns or drugs from entering the country — encrypted phones aren’t immediately obvious as is contraband. Millions of people use encrypted devices, and tens of millions more devices are shipped to and sold in the US each year.
  • Finally, there is a real concern that if Vance’s proposal were accepted, it would be the first step down a slippery slope. Right now, his proposal only calls for access to smartphones and devices running mobile operating systems. While this policy in and of itself would cover a number of commonplace devices, it may eventually be expanded to cover laptop and desktop computers, as well as communications in transit. The expansion of this kind of policy is even more worrisome when taking into account the speed at which technology evolves and becomes widely adopted. Ten years ago, the iPhone did not even exist. Who is to say what technology will be commonplace in 10 or 20 years that is not even around today. There is a very real question about how far law enforcement will go to gain access to information. Things that once seemed like merely science fiction, such as wearable technology and artificial intelligence that could be implanted in and work with the human nervous system, are now available. If and when there comes a time when our “smart phone” is not really a device at all, but is rather an implant, surely we would not grant law enforcement access to our minds.
  • Policymakers should dismiss Vance’s proposal to prohibit the use of strong encryption to protect our smartphones and devices in order to ensure law enforcement access. Undermining encryption, regardless of whether it is protecting data in transit or at rest, would take us down a dangerous and harmful path. Instead, law enforcement and the intelligence community should be working to alter their skills and tactics in a fast-evolving technological world so that they are not so dependent on information that will increasingly be protected by encryption.
Paul Merrell

Syria Delivers Evidence to UN Showing Peparations for False Flag Chemical Attack in Idlib - 0 views

  • During a speech delivered on Tuesday to the United Nations Security Council, Syria’s Permanent UN Representative Bashir al-Jaafari claimed to have provided information to the council that was evidence that armed opposition groups, including Al Qaeda affiliate al-Nusra Front, were gearing up to use chemical weapons against civilians in the Syrian province of Idlib in an effort to frame the Syrian government for the attack. Jaafari’s warning comes as Syria and its allies are preparing for a major military offensive that would target the rebel-held Idlib province, which even mainstream Western outlets admit is dominated by terrorist groups and their affiliates. Speaking to the council, Jaafari stated:
  • put in your hands documented information on the preparations taken by Jabhat al-Nusra [al-Nusra Front] terrorist organization and the affiliated groups to use the chemical weapons against civilians in Idlib province to accuse the Syrian Arab Army and to justify any aggression that might be launched on Syria.” He added that eight canisters of chlorine had been transported to Halouz village in Idlib. The evidence Jaafari provided to the Security Council regarding an imminent “false flag” attack has not been made public. Jaafari’s mention of chlorine gas being transported into Idlib follows similar warnings from Russia’s Defense Ministry, which warned in a statement on Tuesday that “a large supply of poisonous [chemical] agents has been brought to the city of Saraqib on two trucks from the village of Afs” and that the deadly cargo has been “accompanied by eight members of the White Helmets organization” and received by two high-ranking Ahrar al-Sham commanders.
Paul Merrell

Syria Delivers Evidence to UN Showing Peparations for False Flag Chemical Attack in Idlib - 0 views

  • During a speech delivered on Tuesday to the United Nations Security Council, Syria’s Permanent UN Representative Bashir al-Jaafari claimed to have provided information to the council that was evidence that armed opposition groups, including Al Qaeda affiliate al-Nusra Front, were gearing up to use chemical weapons against civilians in the Syrian province of Idlib in an effort to frame the Syrian government for the attack. Jaafari’s warning comes as Syria and its allies are preparing for a major military offensive that would target the rebel-held Idlib province, which even mainstream Western outlets admit is dominated by terrorist groups and their affiliates. Speaking to the council, Jaafari stated:
  • I put in your hands documented information on the preparations taken by Jabhat al-Nusra [al-Nusra Front] terrorist organization and the affiliated groups to use the chemical weapons against civilians in Idlib province to accuse the Syrian Arab Army and to justify any aggression that might be launched on Syria.” He added that eight canisters of chlorine had been transported to Halouz village in Idlib. The evidence Jaafari provided to the Security Council regarding an imminent “false flag” attack has not been made public. Jaafari’s mention of chlorine gas being transported into Idlib follows similar warnings from Russia’s Defense Ministry, which warned in a statement on Tuesday that “a large supply of poisonous [chemical] agents has been brought to the city of Saraqib on two trucks from the village of Afs” and that the deadly cargo has been “accompanied by eight members of the White Helmets organization” and received by two high-ranking Ahrar al-Sham commanders. Ahrar al-Sham has long been a battlefield ally of al-Nusra Front and The New York Times wrote in 2015 that its membership included associates of Osama bin Laden. In addition, the White Helmets group, which receives millions in funding from Western governments, has repeatedly been linked to falsifying evidence of both bombings and chemical weapon attacks in order to facilitate Western military intervention in the Syrian conflict. The Russian military added that a part of the load was later put into “unmarked plastic barrels and transported to another militant base in southern Idlib in order to stage the use of chemical weapons.” It is currently unclear if the area of southern Idlib cited in this statement coincided with Jaafari’s statements that chlorine gas canisters had been delivered to Halouz village in Idlib with this intent.
  • Warnings from Syria’s UN representative and the Russian military follow hawkish statements recently made by members of the Trump administration, particularly National Security Advisor John Bolton, who stated last Wednesday that the U.S. would respond “very strongly” if the Syrian government is accused of chemical weapons use in Idlib. Bolton, speaking to reporters in Jerusalem, also boasted of the U.S.’ past responses to alleged Syrian government involvement in chemical weapons attacks on Syrian civilians this April and in April of last year.
« First ‹ Previous 141 - 151 of 151
Showing 20 items per page