Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged foreign-intelligence

Rss Feed Group items tagged

Paul Merrell

Establish "No Spy Zones"? Current Law Could Make It Hard - Secrecy News - 0 views

  • Disclosure of U.S. intelligence surveillance activities in Germany and other allied countries has aroused angry public reaction in those countries, and has prompted discussion of the possibility of negotiating “no spy zones” abroad in which certain types of intelligence collection would be renounced and prohibited. Some have spoken of extending to Germany or other countries the “Five Eyes” agreement that has long existed among the US, the UK, Canada, Australia and New Zealand to share intelligence, and not to spy on each other. But a rarely-noted statute could make it difficult for any U.S. administration to achieve an international agreement involving binding new limits on intelligence collection against a foreign country, unless Congress enacts the limitation itself.
  • In the FY 2001 intelligence authorization act (P.L. 106-567, sect. 308), Congress said that the imperatives of U.S. intelligence gathering are to be understood to take precedence over any treaty or international agreement: “No Federal law enacted on or after the date of the enactment of the Intelligence Authorization Act for Fiscal Year 2001 that implements a treaty or other international agreement shall be construed as making unlawful an otherwise lawful and authorized intelligence activity of the United States Government or its employees, or any other person to the extent such other person is carrying out such activity on behalf of, and at the direction of, the United States, unless such Federal law specifically addresses such intelligence activity.” By way of explanation, the Senate Intelligence Committee said in a 2000 report:  “There has been a concern that future legislation implementing international agreements could be interpreted…. as restricting intelligence activities that are otherwise entirely consistent with U.S. law and policy.” At a minimum, this provision appears to complicate any such restriction on intelligence activities that is advanced by international agreement, unless it is explicitly affirmed by Congress itself.
  •  
    The quoted passage include a link to the public law version of the quoted statute, which includes a definition of "authorized intelligence activities" and a reference indicating the law was codified at 50 U.S.C. 442. But it ain't there in the LII Cornell online version of the Code or in the Senate's online version. The Senate version has a reference saying that it was editorially transferred to another location in a Title dealing with disposal of government records. But the referenced sections do not exist there. So a trip to the law library to check the printed version and Westlaw. At this point I cannot confirm that the statute is still in force. But this is a great example of the evils of tucking substantive legislation into appropriation and other "Christmas Tree" bills. Oregon has a state constitutional provision limiting legislative enactments to a single subject. It's been used as authority by Oregon courts to void legislation on many occasions. But good luck trying to get the federal constitution amended to add a similar limitation.   
Paul Merrell

The U.S. Government's Secret Plans to Spy for American Corporations - The Intercept - 0 views

  • Throughout the last year, the U.S. government has repeatedly insisted that it does not engage in economic and industrial espionage, in an effort to distinguish its own spying from China’s infiltrations of Google, Nortel, and other corporate targets. So critical is this denial to the U.S. government that last August, an NSA spokesperson emailed The Washington Post to say (emphasis in original): “The department does ***not*** engage in economic espionage in any domain, including cyber.” After that categorical statement to the Post, the NSA was caught spying on plainly financial targets such as the Brazilian oil giant Petrobras; economic summits; international credit card and banking systems; the EU antitrust commissioner investigating Google, Microsoft, and Intel; and the International Monetary Fund and World Bank. In response, the U.S. modified its denial to acknowledge that it does engage in economic spying, but unlike China, the spying is never done to benefit American corporations.
  • Director of National Intelligence James Clapper, for instance, responded to the Petrobras revelations by claiming: “It is not a secret that the Intelligence Community collects information about economic and financial matters…. What we do not do, as we have said many times, is use our foreign intelligence capabilities to steal the trade secrets of foreign companies on behalf of—or give intelligence we collect to—U.S. companies to enhance their international competitiveness or increase their bottom line.” But a secret 2009 report issued by Clapper’s own office explicitly contemplates doing exactly that. The document, the 2009 Quadrennial Intelligence Community Review—provided by NSA whistleblower Edward Snowden—is a fascinating window into the mindset of America’s spies as they identify future threats to the U.S. and lay out the actions the U.S. intelligence community should take in response. It anticipates a series of potential scenarios the U.S. may face in 2025, from a “China/Russia/India/Iran centered bloc [that] challenges U.S. supremacy” to a world in which “identity-based groups supplant nation-states,” and games out how the U.S. intelligence community should operate in those alternative futures—the idea being to assess “the most challenging issues [the U.S.] could face beyond the standard planning cycle.”
  • One of the principal threats raised in the report is a scenario “in which the United States’ technological and innovative edge slips”— in particular, “that the technological capacity of foreign multinational corporations could outstrip that of U.S. corporations.” Such a development, the report says “could put the United States at a growing—and potentially permanent—disadvantage in crucial areas such as energy, nanotechnology, medicine, and information technology.” How could U.S. intelligence agencies solve that problem? The report recommends “a multi-pronged, systematic effort to gather open source and proprietary information through overt means, clandestine penetration (through physical and cyber means), and counterintelligence” (emphasis added). In particular, the DNI’s report envisions “cyber operations” to penetrate “covert centers of innovation” such as R&D facilities.
  • ...3 more annotations...
  • In a graphic describing an “illustrative example,” the report heralds “technology acquisition by all means.” Some of the planning relates to foreign superiority in surveillance technology, but other parts are explicitly concerned with using cyber-espionage to bolster the competitive advantage of U.S. corporations. The report thus envisions a scenario in which companies from India and Russia work together to develop technological innovation, and the U.S. intelligence community then “conducts cyber operations” against “research facilities” in those countries, acquires their proprietary data, and then “assesses whether and how its findings would be useful to U.S. industry” (click on image to enlarge):
  • he report describes itself as “an essential long-term piece, looking out between 10 and 20 years” designed to enable ”the IC [to] best posture itself to meet the range of challenges it may face.” Whatever else is true, one thing is unmistakable: the report blithely acknowledges that stealing secrets to help American corporations secure competitive advantage is an acceptable future role for U.S. intelligence agencies. In May, the U.S. Justice Department indicted five Chinese government employees on charges that they spied on U.S. companies. At the time, Attorney General Eric Holder said the spying took place “for no reason other than to advantage state-owned companies and other interests in China,” and “this is a tactic that the U.S. government categorically denounces.” But the following day, The New York Times detailed numerous episodes of American economic spying that seemed quite similar. Harvard Law School professor and former Bush Justice Department official Jack Goldsmith wrote that the accusations in the indictment sound “a lot like the kind of cyber-snooping on firms that the United States does.” But U.S. officials continued to insist that using surveillance capabilities to bestow economic advantage for the benefit of a country’s corporations is wrong, immoral, and illegal.
  • Yet this 2009 report advocates doing exactly that in the event that ”that the technological capacity of foreign multinational corporations outstrip[s] that of U.S. corporations.” Using covert cyber operations to pilfer “proprietary information” and then determining how it ”would be useful to U.S. industry” is precisely what the U.S. government has been vehemently insisting it does not do, even though for years it has officially prepared to do precisely that.
  •  
    DNI James Clapper caught telling another whopper. 
Paul Merrell

Spies Infiltrate a Fantasy Realm of Online Games - NYTimes.com - 0 views

  • Not limiting their activities to the earthly realm, American and British spies have infiltrated the fantasy worlds of World of Warcraft and Second Life, conducting surveillance and scooping up data in the online games played by millions of people across the globe, according to newly disclosed classified documents.
  • Fearing that terrorist or criminal networks could use the games to communicate secretly, move money or plot attacks, the documents show, intelligence operatives have entered terrain populated by digital avatars that include elves, gnomes and supermodels. The spies have created make-believe characters to snoop and to try to recruit informers, while also collecting data and contents of communications between players, according to the documents, disclosed by the former National Security Agency contractor Edward J. Snowden. Because militants often rely on features common to video games — fake identities, voice and text chats, a way to conduct financial transactions — American and British intelligence agencies worried that they might be operating there, according to the papers.
  • Online games might seem innocuous, a top-secret 2008 N.S.A. document warned, but they had the potential to be a “target-rich communication network” allowing intelligence suspects “a way to hide in plain sight.” Virtual games “are an opportunity!” another 2008 N.S.A. document declared. But for all their enthusiasm — so many C.I.A., F.B.I. and Pentagon spies were hunting around in Second Life, the document noted, that a “deconfliction” group was needed to avoid collisions — the intelligence agencies may have inflated the threat. The documents, obtained by The Guardian and shared with The New York Times and ProPublica, do not cite any counterterrorism successes from the effort. Former American intelligence officials, current and former gaming company employees and outside experts said in interviews that they knew of little evidence that terrorist groups viewed the games as havens to communicate and plot operations.
  • ...5 more annotations...
  • In the 2008 N.S.A. document, titled “Exploiting Terrorist Use of Games & Virtual Environments,” the agency said that “terrorist target selectors” — which could be a computer’s Internet Protocol address or an email account — “have been found associated with Xbox Live, Second Life, World of Warcraft” and other games. But that document does not present evidence that terrorists were participating in the games. Still, the intelligence agencies found other benefits in infiltrating these online worlds. According to the minutes of a January 2009 meeting, GCHQ’s “network gaming exploitation team” had identified engineers, embassy drivers, scientists and other foreign intelligence operatives to be World of Warcraft players — potential targets for recruitment as agents.
  • The surveillance, which also included Microsoft’s Xbox Live, could raise privacy concerns. It is not clear exactly how the agencies got access to gamers’ data or communications, how many players may have been monitored or whether Americans’ communications or activities were captured. One American company, the maker of World of Warcraft, said that neither the N.S.A. nor its British counterpart, the Government Communications Headquarters, had gotten permission to gather intelligence in its game. Many players are Americans, who can be targeted for surveillance only with approval from the nation’s secret intelligence court. The spy agencies, though, face far fewer restrictions on collecting certain data or communications overseas.
  • “The Sigint Enterprise needs to begin taking action now to plan for collection, processing, presentation and analysis of these communications,” said one April 2008 N.S.A. document, referring to “signals intelligence.” The document added, “With a few exceptions, N.S.A. can’t even recognize the traffic,” meaning that the agency could not distinguish gaming data from other Internet traffic. By the end of 2008, according to one document, the British spy agency, known as GCHQ, had set up its “first operational deployment into Second Life” and had helped the police in London in cracking down on a crime ring that had moved into virtual worlds to sell stolen credit card information. The British spies running the effort, which was code-named Operation Galician, were aided by an informer using a digital avatar “who helpfully volunteered information on the target group’s latest activities.”
  • Even before the American government began spying in virtual worlds, the Pentagon had identified the potential intelligence value of video games. The Pentagon’s Special Operations Command in 2006 and 2007 worked with several foreign companies — including an obscure digital media business based in Prague — to build games that could be downloaded to mobile phones, according to people involved in the effort. They said the games, which were not identified as creations of the Pentagon, were then used as vehicles for intelligence agencies to collect information about the users. Eager to cash in on the government’s growing interest in virtual worlds, several large private contractors have spent years pitching their services to American intelligence agencies. In one 66-page document from 2007, part of the cache released by Mr. Snowden, the contracting giant SAIC promoted its ability to support “intelligence collection in the game space,” and warned that online games could be used by militant groups to recruit followers and could provide “terrorist organizations with a powerful platform to reach core target audiences.”
  • In spring 2009, academics and defense contractors gathered at the Marriott at Washington Dulles International Airport to present proposals for a government study about how players’ behavior in a game like World of Warcraft might be linked to their real-world identities. “We were told it was highly likely that persons of interest were using virtual spaces to communicate or coordinate,” said Dmitri Williams, a professor at the University of Southern California who received grant money as part of the program. After the conference, both SAIC and Lockheed Martin won contracts worth several million dollars, administered by an office within the intelligence community that finances research projects.
  •  
    Coming soon: disclosure of the NSA's public bathroom cams and microphones because people talk there and exchange germs that might have DNA in them that can be used to track terrorists. 
Paul Merrell

Spying by N.S.A. Ally Entangled U.S. Law Firm - NYTimes.com - 0 views

  • The list of those caught up in the global surveillance net cast by the National Security Agency and its overseas partners, from social media users to foreign heads of state, now includes another entry: American lawyers. A top-secret document, obtained by the former N.S.A. contractor Edward J. Snowden, shows that an American law firm was monitored while representing a foreign government in trade disputes with the United States. The disclosure offers a rare glimpse of a specific instance in which Americans were ensnared by the eavesdroppers, and is of particular interest because lawyers in the United States with clients overseas have expressed growing concern that their confidential communications could be compromised by such surveillance. Related Coverage Text: Document Describes Eavesdropping on American Law FirmFEB. 15, 2014 The government of Indonesia had retained the law firm for help in trade talks, according to the February 2013 document. It reports that the N.S.A.’s Australian counterpart, the Australian Signals Directorate, notified the agency that it was conducting surveillance of the talks, including communications between Indonesian officials and the American law firm, and offered to share the information.
  • The Australians told officials at an N.S.A. liaison office in Canberra, Australia, that “information covered by attorney-client privilege may be included” in the intelligence gathering, according to the document, a monthly bulletin from the Canberra office. The law firm was not identified, but Mayer Brown, a Chicago-based firm with a global practice, was then advising the Indonesian government on trade issues. On behalf of the Australians, the liaison officials asked the N.S.A. general counsel’s office for guidance about the spying. The bulletin notes only that the counsel’s office “provided clear guidance” and that the Australian agency “has been able to continue to cover the talks, providing highly useful intelligence for interested US customers.” The N.S.A. declined to answer questions about the reported surveillance, including whether information involving the American law firm was shared with United States trade officials or negotiators.
  • Most attorney-client conversations do not get special protections under American law from N.S.A. eavesdropping. Amid growing concerns about surveillance and hacking, the American Bar Association in 2012 revised its ethics rules to explicitly require lawyers to “make reasonable efforts” to protect confidential information from unauthorized disclosure to outsiders.Last year, the Supreme Court, in a 5-to-4 decision, rebuffed a legal challenge to a 2008 law allowing warrantless wiretapping that was brought in part by lawyers with foreign clients they believed were likely targets of N.S.A. monitoring. The lawyers contended that the law raised risks that required them to take costly measures, like traveling overseas to meet clients, to protect sensitive communications. But the Supreme Court dismissed their fears as “speculative.”The N.S.A. is prohibited from targeting Americans, including businesses, law firms and other organizations based in the United States, for surveillance without warrants, and intelligence officials have repeatedly said the N.S.A. does not use the spy services of its partners in the so-called Five Eyes alliance — Australia, Britain, Canada and New Zealand — to skirt the law.
  • ...4 more annotations...
  • The N.S.A.’s protections for attorney-client conversations are narrowly crafted, said Stephen Gillers, an expert on legal ethics at New York University’s School of Law. The agency is barred from sharing with prosecutors intercepted attorney-client communications involving someone under indictment in the United States, according to previously disclosed N.S.A. rules. But the agency may still use or share the information for intelligence purposes. Andrew M. Perlman, a Suffolk University law professor who specializes in legal ethics and technology issues, said the growth of surveillance was troubling for lawyers. He helped create the bar association’s ethics code revisions that require lawyers to try to avoid being overheard by eavesdroppers. “You run out of options very quickly to communicate with someone overseas,” he said. “Given the difficulty of finding anything that is 100 percent secure, lawyers are in a difficult spot to ensure that all of the information remains in confidence.” 
  • Still, the N.S.A. can intercept the communications of Americans if they are in contact with a foreign intelligence target abroad, such as Indonesian officials. The N.S.A. is then required to follow so-called minimization rules to protect their privacy, such as deleting the identity of Americans or information that is not deemed necessary to understand or assess the foreign intelligence, before sharing it with other agencies. An N.S.A. spokeswoman said the agency’s Office of the General Counsel was consulted when issues of potential attorney-client privilege arose and could recommend steps to protect such information. “Such steps could include requesting that collection or reporting by a foreign partner be limited, that intelligence reports be written so as to limit the inclusion of privileged material and to exclude U.S. identities, and that dissemination of such reports be limited and subject to appropriate warnings or restrictions on their use,” said Vanee M. Vines, the spokeswoman.
  • In justifying the agency’s sweeping powers, the Obama administration often emphasizes the N.S.A.’s role in fighting terrorism and cyberattacks, but disclosures in recent months from the documents leaked by Mr. Snowden show the agency routinely spies on trade negotiations, communications of economic officials in other countries and even foreign corporations.
  • Other documents obtained from Mr. Snowden reveal that the N.S.A. shares reports from its surveillance widely among civilian agencies. A 2004 N.S.A. document, for example, describes how the agency’s intelligence gathering was critical to the Agriculture Department in international trade negotiations. “The U.S.D.A. is involved in trade operations to protect and secure a large segment of the U.S. economy,” that document states. Top agency officials “often rely on SIGINT” — short for the signals intelligence that the N.S.A. eavesdropping collects — “to support their negotiations.”
  •  
    Outrageous.
Paul Merrell

Feinstein promotes bill to strengthen NSA's hand on warrantless searches | World news |... - 0 views

  • A Senate bill promoted as a surveillance reform would codify the ability of the National Security Agency to search its troves of foreign phone and email communications for Americans’ information, and permit law enforcement agencies to search the vast databases as well. The Fisa Improvements Act, promoted by Dianne Feinstein, the California Democrat who chairs the Senate intelligence committee, would both make permanent a loophole permitting the NSA to search for Americans’ identifying information without a warrant – and, civil libertarians fear, contains an ambiguity that might allow the FBI, the DEA and other law enforcement agencies to do the same thing. “For the first time, the statute would explicitly allow the government to proactively search through the NSA data troves of information without a warrant,” said Michelle Richardson, the surveillance lobbyist for the ACLU.
  • “It may also expand current practices by allowing law enforcement to directly access US person information that was nominally collected for foreign intelligence purposes. This fourth amendment back door needs to be closed, not written into stone.” Feinstein’s bill passed the committee on an 11 to 4 vote on 31 October. An expanded report on its provisions released by the committee this week added details about the ability of both intelligence and law enforcement to sift through foreign communications databases that it accumulates under section 702 of the Fisa Amendments Act of 2008. Section 6 of Feinstein’s bill blesses what her committee colleague Ron Wyden, the Oregon Democrat and civil libertarian, has called the “backdoor search provision,” which the Guardian revealed thanks to a leak by Edward Snowden.  The section permits intelligence agencies to search “the contents of communications” collected primarily overseas for identifying information on US citizens, resident aliens and people inside the US, provided that the “purpose of the query is to obtain foreign intelligence information or information necessary to understand foreign intelligence information or to assess its importance.”
  • Section 6 bills itself as a “restriction,” but it would not stop the NSA from performing the warrantless search, merely requiring intelligence agencies to log their queries and make them “available for review” to Congress, the Fisa court, the Justice Department and inspectors general inside the executive branch. Additionally, the report on Section 6 explicitly states that the provision “does not limit the authority of law enforcement agencies to conduct queries of data acquired pursuant to Section 702 of Fisa for law enforcement purposes.” There is ambiguity surrounding whether the FBI can currently search through the NSA’s foreign communications databases, or is reliant on the NSA to pass on information from the databases relevant to the bureau. A declassified Fisa court document from 2011 refers to “FBI minimization procedures,” but it is unclear what those procedures are. A copy of the FBI minimization procedures from 2009, acquired by the ACLU under the Freedom of Information Act is almost completely redacted. So is the section in the government’s most recent report on its Section 702 collection dealing with the FBI’s role, though it contains references to how the FBI “receive[s] … unminimized Section 70 acquired communications” from the NSA. 
  • ...1 more annotation...
  • Feinstein’s bill “seems to imply there is currently some authority for law enforcement to query the database, which [intelligence community] officials have not mentioned in any of their remarks on Section 702,” said Alan Butler, an attorney with the Electronic Privacy Information Center. The provision is also unclear about whether law enforcement agencies can search through the foreign communications databases for information on US persons. Feinstein’s office did not respond to a request for clarification by deadline. The ambiguity concerns civil libertarians, as it opens a door for law enforcement agencies to sidestep warrant requirements. “If Senator Feinstein or other congressional supporters of this bill believe that it would in fact expand law enforcement access to the database, that would be an unjustified expansion of surveillance over Americans,” Butler said.
Paul Merrell

Did Certain Foreign Governments Facilitate the 9/11 Attacks? by Justin Raimondo -- Anti... - 0 views

  • Some thirteen years after the event, the shadow of the 9/11 terrorist attacks on the World Trade Center in Manhattan and the Pentagon still darkens our world. The legacy of that terrible day has impacted not only our foreign policy, bequeathing to a new generation an apparently endless "war on terrorism," it also has led directly to what is arguably the most massive assault on our civil liberties since the Alien and Sedition Acts. Getting all the information about what happened that day – and why it happened – is key to understanding the course we have taken since. This was supposed to have been the purpose of the 9/11 Commission, whose massive report is now looked to as the primary source on the subject. Yet there is another, far more specific investigative report, the one issued by the intelligence committees of both houses of Congress, entitled "Joint Inquiry into Intelligence Community Activities Before and After the Terrorist Attacks of September 11, 2001." If you actually take the time to read the report, all goes along swimmingly (except for occasional redactions) until you get to p. 369, whereupon the text is blacked out for the next twenty-eight pages.
  • Some thirteen years after the event, the shadow of the 9/11 terrorist attacks on the World Trade Center in Manhattan and the Pentagon still darkens our world. The legacy of that terrible day has impacted not only our foreign policy, bequeathing to a new generation an apparently endless "war on terrorism," it also has led directly to what is arguably the most massive assault on our civil liberties since the Alien and Sedition Acts. Getting all the information about what happened that day – and why it happened – is key to understanding the course we have taken since. This was supposed to have been the purpose of the 9/11 Commission, whose massive report is now looked to as the primary source on the subject. Yet there is another, far more specific investigative report, the one issued by the intelligence committees of both houses of Congress, entitled "Joint Inquiry into Intelligence Community Activities Before and After the Terrorist Attacks of September 11, 2001." If you actually take the time to read the report, all goes along swimmingly (except for occasional redactions) until you get to p. 369, whereupon the text is blacked out for the next twenty-eight pages.
  • Do you get the impression someone has something to hide? The censored section is entitled "Finding, Discussion and Narrative Regarding Certain Sensitive National Security Matters," and the introduction – left largely intact – is instructive: "Through its investigation, the Joint Inquiry developed information suggesting specific sources of foreign support for some of the September 11 hijackers while they were in the United States. The Joint Inquiry’s review confirmed that the Intelligence Community also has information, much of which has yet to be independently verified, concerning these potential sources of support. In their testimony, neither CIA nor FBI officials were able to address definitively the extent of such support for the hijackers globally or within the United States or the extent to which such support, if it exists, is knowing or inadvertent in nature."
  • ...1 more annotation...
  • What’s in the 28 censored pages of the Joint Inquiry into 9/11? We don’t know for sure – but if Israel is involved, then we do know why they won’t let us read those pages. Representatives Jones, Lynch, and Massie have sparked a movement to declassify the 28 pages: go here for more information. This is a fight we need to win – but we can only do it by raising a huge stink. Call or write your congressional representatives and urge them to join the three congressmen who are fighting for your right to know. And spread the word.
  •  
    Eloquent essay on the 60 Israeli "students" swept up by the FBI right after 9/11 then as swiftly shuttled onto airliners bound for Israel. It's a plea for the declassification of the 28 pages censored from the public version of the Congressional Intelligence Committees joint report on "Intelligence Community Activities Before and After the Terrorist Attacks of September 11, 2001." The essay's theme is wrapped around the preface to the censored pages mention of plural "sources of foreign support for some of the September 11 hijackers[.]" And it uses reported information about the  60 "students" and some statements by members of Congress who have read the 28 pages to argue there is a strong whiff that Israel was one of those plural sources of support. But the essay otherwise does not address the large mound of circumstantial evidence of Israel's involvement. I've got a lot of notes and links on that issue, so may blog about that later.
Paul Merrell

NSA performed warrantless searches on Americans' calls and emails - Clapper |... - 0 views

  • US intelligence chiefs have confirmed that the National Security Agency has used a "back door" in surveillance law to perform warrantless searches on Americans’ communications.The NSA's collection programs are ostensibly targeted at foreigners, but in August the Guardian revealed a secret rule change allowing NSA analysts to search for Americans' details within the databases.Now, in a letter to Senator Ron Wyden, an Oregon Democrat on the intelligence committee, the director of national intelligence, James Clapper, has confirmed the use of this legal authority to search for data related to “US persons”.
  • “There have been queries, using US person identifiers, of communications lawfully acquired to obtain foreign intelligence targeting non-US persons reasonably believed to be located outside the United States,” Clapper wrote in the letter, which has been obtained by the Guardian.“These queries were performed pursuant to minimization procedures approved by the Fisa court and consistent with the statute and the fourth amendment.” The legal authority to perform the searches, revealed in top-secret NSA documents provided to the Guardian by Edward Snowden, was denounced by Wyden as a “backdoor search loophole.”Many of the NSA's most controversial programs collect information under the law affected by the so-called loophole. These include Prism, which allows the agency to collect data from Google, Apple, Facebook, Yahoo and other tech companies, and the agency's Upstream program – a huge network of internet cable taps.
  • Clapper did not say how many warrantless searches had been performed by the NSA. It was not the first time the searches had been confirmed: after the Snowden leaks, the office of the director of national intelligence declassified documents that discussed the rule change. But Clapper's letter drew greater attention to the issue.Confirmation that the NSA has searched for Americans’ communications in its phone call and email databases complicates President Barack Obama’s initial defenses of the broad surveillance in June.“When it comes to telephone calls, nobody is listening to your telephone calls. That’s not what this program’s about,” Obama said. “As was indicated, what the intelligence community is doing is looking at phone numbers and durations of calls. They are not looking at people’s names, and they’re not looking at content.”Obama was referring specifically to the bulk collection of US phone records, but his answer misleadingly suggested that the NSA could not examine Americans’ phone calls and emails.
  • ...4 more annotations...
  • At a recent hearing of the Privacy and Civil Liberties Oversight Board, administration lawyers defended their latitude to perform such searches. The board is scheduled to deliver a report on the legal authority under which the communications are collected, Section 702 of the Foreign Intelligence Surveillance Act (Fisa), passed in 2008. Wyden and Colorado Democrat Mark Udall failed in 2012 to persuade their fellow Senate intelligence committee members to prevent such warrantless searches during the re-authorisation of the 2008 Fisa Amendments Act, which wrote Section 702 into law. Dianne Feinstein, the California Democrat who chairs the committee, defended the practice, and argued that it did not violate the act’s “reverse targeting” prohibition on using NSA’s vast powers to collect content on Americans.
  • Much of the NSA's bulk data collection is covered by section 702 of the Fisa Amendments Act. This allows for the collection of communications – content and metadata alike – without individual warrants, so long as there is a reasonable belief the communications are both foreign and overseas.The communications of Americans in direct contact with foreign targets can also be collected without a warrant, and the intelligence agencies acknowledge that purely domestic communications can also be inadvertently swept into its databases. That process is known as "incidental collection".Initially, NSA rules on such data prevented the databases being searched for any details relating to "US persons" – that is, citizens or residents of the US. However, in October 2011 the Fisa court approved new procedures which allowed the agency to search for US person data, a revelation contained in documents revealed by Snowden.
  • The ruling appears to give the agency free access to search for information relating to US people within its vast databases, though not to specifically collect information against US citizens in the first place. However, until the DNI's disclosure to Wyden, it was not clear whether the NSA had ever actually used these powers.On Tuesday, Wyden and Udall said the NSA’s warrantless searches of Americans’ emails and phone calls “should be concerning to all.” “This is unacceptable. It raises serious constitutional questions, and poses a real threat to the privacy rights of law-abiding Americans. If a government agency thinks that a particular American is engaged in terrorism or espionage, the fourth amendment requires that the government secure a warrant or emergency authorisation before monitoring his or her communications. This fact should be beyond dispute,” the two senators said in a joint statement.
  • They continued: “Today’s admission by the Director of National Intelligence is further proof that meaningful surveillance reform must include closing the back-door searches loophole and requiring the intelligence community to show probable cause before deliberately searching through data collected under section 702 to find the communications of individual Americans."
Gary Edwards

Whistleblowers & NSA - Shows - Coast to Coast AM - 0 views

  •  
    Interview Date: 07-27-13 :: 3 hours on mp3 Host: John B. Wells Guests: William E. Binney This amazing interview covers 3 hours with William Edward Binney; the former highly placed intelligence official with the United States National Security Agency (NSA) turned whistleblower who resigned on October 31, 2001, after more than 30 years with the agency. He joined John B. Wells to discuss living his life as a whistleblower, the NSA scandal and related topics. "The NSA was chartered to do foreign intelligence only, not domestic intelligence," he said. Prior to the Bush Administration, if the NSA happened to randomly intercept a U.S. citizen's communications, the database was purged of the collection and records erased, Binney revealed. After 9/11 and per a "secret interpretation" of the Patriot Act, the NSA decided it could build a register of every phone in the country, he explained, noting that they now keep records on who every U.S. Citizen calls, how often and for how long. A person has the right to free association with others only as long as the NSA knows about it, he admonished. According to Binney, there is substantial danger that data collected from phone and internet communications as well as financial records will be used to target particular Americans, a scenario recently played out when the IRS was caught harassing tea party members, he pointed out. Because the threat is real and the spy organization's reach well beyond its original charter, Binney said he has signed an affidavit for the Electronic Frontier Foundation's lawsuit challenging the NSA's constitutional authority to collect this kind of information. Another peril to U.S. citizens are FISA Courts (Foreign Intelligence Surveillance Court) which can order the transfer of domestic intelligence data but have no way of validating the intelligence being given to them, he continued. Binney called for the defunding of FISA Courts since they, like the NSA, are in violation of their original charter. He
Paul Merrell

Guess who credits the Mossad with producing the 'laptop documents?' | Middle East Eye - 0 views

  • In the United States and Europe, it is unchallenged in political and media circles that intelligence documents purporting to be from a covert Iranian nuclear weapons program for which the IAEA long demanded an Iranian explanation are genuine.   But evidence has continued to accumulate that the documents - sometimes called the “laptop documents” because they were said to have been on a laptop computer belonging to one of the participants in the program - were fabricated by Israel’s foreign intelligence agency (Mossad).  We now know that the documents did not come from an Iranian participant in the alleged project, as the media were led to believe for years; they were turned over to German intelligence by the anti-regime Iranian terrorist organisation, Mujahedeen E Khalq, (MEK). I first reported this in 2008 and have now confirmed from an authoritative German source in my book on the Iran nuclear issue. The MEK was well known to have been a client of the Mossad, serving to launder Israeli intelligence claims that the Israelis did not want attributed to themselves.
  • Although it has never been mentioned in news media, former International Atomic Energy Agency (IAEA) Director General, Mohamed El Baradei recalled in his memoirs that he was doubtful of the authenticity of the documents. “No one knew if any of this was real,” he wrote in reference to the laptop documents. Another former senior IAEA official told me, “It just really didn’t add up.  It made more sense that this information originated in another country.”  And as I have detailed in articles and in my book, key documents in the collection bear clear indications of fabrication. Support for that virtually unknown part of the Iran nuclear story has come from a surprising source: a popular Israeli account, celebrating the successes of the Mossad’s covert operations. “Mossad: The Greatest Missions of the Israeli Secret Service,” first published in Hebrew in 2010, and then published in English in 2012, was Israel’s best-selling book for months in 2010. But not only does it acknowledge that it was indeed the MEK that delivered the documents, it also suggests that at least some of the documents came from the Mossad.  
  • The co-authors of the book are far from critics of Israel’s policy toward Iran; One of the co-authors, Michael Bar-Zohar, is a well-connected former member of the Israeli Knesset and former paratrooper, who had previously written an authorised biography of Shimon Peres, as well as the biography of Isser Harel, the Mossad chief who presided over the kidnapping of Adolph Eichmann in Argentina. Much of what Bar-Zohar chronicled in the book had already been reported earlier by Israeli journalists - especially Ronen Bergman of the daily Yedioth Ahronoth.  In fact, Bergman accused Bar-Zohar of plagiarising his articles for much of the book, while changing only a few words.  But one thing that Bar-Zohar and co-author Nisham Mishal did not get from other Israeli journalists, was the role of the Mossad in regard to the laptop documents. 
  • ...5 more annotations...
  • Although they do not flatly state that the Mossad was the source of the documents, they certainly lead the reader to that conclusion. They begin by establishing the fact that the MEK was fronting for the Mossad in its revelation in August 2002 of Iran’s first enrichment facility at Natanz. The CIA, they write, “appeared to believe that the Mossad and the British MI6 were feeding MEK intelligence they had obtained, using the Iranian opposition as a hopefully credible source”.  And they explicitly confirm CIA’s suspicions. “According to Israeli sources,” they write, “It was, in fact, a watchful Mossad officer who had discovered the mammoth centrifuge installation at Natanz.”  Other sources, including Seymour Hersh and Connie Bruck have reported that the MEK got the intelligence on Natanz from the Israelis, but theirs is the first explicit acknowledgement attributed to an Israeli source that the MEK had revealed Natanz on the basis of Mossad intelligence.  What the Israeli co-authors do not say is that the Mossad was simply guessing at the purpose of Natanz, which the MEK mistakenly called a “fuel fabrication” facility, rather than a centrifuge enrichment facility.
  • Bar-Zohar and Mishal are little concerned with whether the Mossad’s laptop caper involved fraud or not. They obviously view the Israeli intelligence agency’s use of an Iranian exile group to get out documents that had been central to the international sanctions regime against Iran as a great triumph. But whatever their reasons, their book adds another layer to the growing body of evidence showing that the Bush administration and its allies hoodwinked the rest of the world with those documents.
  • The authors further suggest that the Mossad was behind information later released by the MEK on Mohsen Fakhrizadeh, the Iranian physics professor said to be shown in the laptop documents as the man in charge of that purported Iranian nuclear weapons research program. The MEK disclosed such personal details as Fakhrizadeh’s passport number and his home telephone number. But the Mossad chroniclers write: “This abundance of detail and means of transmission leads one to believe that, again, “a certain secret service” ever suspected by the West of pursuing its own agenda, painstakingly collected these facts and figures about the Iranian scientists and passed them to the Iranian resistance.” I asked Bar-Zohar’s research assistant, Nilly Ovnat, whether he had Israeli sources for those statements relating to the MEK and the laptop documents. She responded by          e-mail: “Professor Bar Zohar had other sources for most of the material concerning MEK and Natanz [and the] laptop, yet they could not be mentioned and cannot be discussed.”
  • Turning to the laptop documents, they make it clear that western intelligence had indeed obtained the documents from the MEK and suggest that the MEK got them from somewhere else. “The dissidents wouldn’t say how they had gotten hold of the laptop,” they write. They again frame the question of the origins of those documents in terms of CIA suspicions. “[T]he skeptical Americans suspected that the documents had been only recently scanned into the computer,” they write. “They accused the Mossad of having slipped in some information obtained from our own sources - and passing it to the MEK leaders for delivery to the West." Bar-Zohar and Mishal steer clear of any suggestion that the Mossad fabricated any documents, but their account leaves little doubt that they are convinced that the Mossad should be credited for the appearance of the documents. Their approach of referring to US suspicions, rather than stating it directly, appears to be a way of avoiding problems with Israeli military censors, who often clamp down on local reporting on sensitive issues while allowing references to foreign reports.
  • In the United States and Europe, it is unchallenged in political and media circles that intelligence documents purporting to be from a covert Iranian nuclear weapons program for which the IAEA long demanded an Iranian explanation are genuine.   But evidence has continued to accumulate that the documents - sometimes called the “laptop documents” because they were said to have been on a laptop computer belonging to one of the participants in the program - were fabricated by Israel’s foreign intelligence agency (Mossad).  We now know that the documents did not come from an Iranian participant in the alleged project, as the media were led to believe for years; they were turned over to German intelligence by the anti-regime Iranian terrorist organisation, Mujahedeen E Khalq, (MEK). I first reported this in 2008 and have now confirmed from an authoritative German source in my book on the Iran nuclear issue. The MEK was well known to have been a client of the Mossad, serving to launder Israeli intelligence claims that the Israelis did not want attributed to themselves.
Paul Merrell

DNI Clapper: Transparency is the Way Forward - Secrecy News - 0 views

  • The primary lesson that emerges from the unauthorized disclosures of classified intelligence information by Edward Snowden is that U.S. intelligence agencies must be more transparent in their operations, said Director of National Intelligence James R. Clapper yesterday. “The major takeaway for us, certainly for me, from the past several months is that we must lean in the direction of transparency, wherever and whenever we can,” DNI Clapper told the Senate Intelligence Committee. “With greater transparency about these intelligence programs the American people may be more likely to accept them,” he said, promising “further declassification.” Another possibility, he acknowledged, is that even with greater transparency the American people will choose not to accept certain kinds of intelligence programs. “If dealing with reduced capacities is what we need to ensure the faith and confidence of the American people and their elected representatives, then we in the intelligence community will work as hard as we can to meet the expectations before us,” DNI Clapper said.
  • The primary lesson that emerges from the unauthorized disclosures of classified intelligence information by Edward Snowden is that U.S. intelligence agencies must be more transparent in their operations, said Director of National Intelligence James R. Clapper yesterday. “The major takeaway for us, certainly for me, from the past several months is that we must lean in the direction of transparency, wherever and whenever we can,” DNI Clapper told the Senate Intelligence Committee. “With greater transparency about these intelligence programs the American people may be more likely to accept them,” he said, promising “further declassification.” Another possibility, he acknowledged, is that even with greater transparency the American people will choose not to accept certain kinds of intelligence programs.
  • Already, the Snowden disclosures have caused “profound damage” to U.S. intelligence, the DNI said. “What Snowden has stolen and exposed has gone way, way beyond his professed concerns with so-called domestic surveillance programs. As a result, we’ve lost critical foreign intelligence collection sources, including some shared with us by valued partners.” “Snowden claims that he’s won and that his mission is accomplished. If that is so, I call on him and his accomplices to facilitate the return of the remaining stolen documents that have not yet been exposed to prevent even more damage to U.S. security,” the DNI said. The use of the word “accomplices” appeared to suggest that the DNI views the journalists who possess and report on the Snowden documents as Snowden’s partners in crime, and even as criminals themselves. “Is it now the official view of the Obama administration that these journalists and media outlets are ‘accomplices’ in what they regard as Snowden’s crimes? If so, that is a rather stunning and extremist statement,” wrote Glenn Greenwald, who first reported on the Snowden releases last June.
Paul Merrell

The Engineered Destruction and Political Fragmentation of Iraq. Towards the Creation of... - 0 views

  • The Capture of Mosul:  US-NATO Covert Support to the Islamic State of Iraq and Syria (ISIS) Something unusual occurred in Mosul which cannot be explained in strictly military terms. On June 10, the insurgent forces of the Islamic State of Iraq and the Levant (ISIS) captured Mosul, Iraq’s second largest city, with a population of close to 1.5 million people.  While these developments were “unexpected” according to the Obama administration, they were known to the Pentagon and US intelligence, which were not only providing weapons, logistics and financial support to the ISIS rebels, they were also coordinating, behind the scenes, the ISIS attack on the city of Mosul. While ISIS is a well equipped and disciplined rebel army when compared to other Al Qaeda affiliated formations, the capture of Mosul, did not hinge upon ISIS’s military capabilities. Quite the opposite: Iraqi forces which outnumbered the rebels by far, equipped with advanced weapons systems could have easily repelled the ISIS rebels. There were 30,000 government forces in Mosul as opposed to 1000 ISIS rebels, according to reports. The Iraqi army chose not to intervene. The media reports explained without evidence that the decision of the Iraqi armed forces not to intervene was spontaneous characterized by mass defections.
  • Iraqi officials told the Guardian that two divisions of Iraqi soldiers – roughly 30,000 men – simply turned and ran in the face of the assault by an insurgent force of just 800 fighters. Isis extremists roamed freely on Wednesday through the streets of Mosul, openly surprised at the ease with which they took Iraq’s second largest city after three days of sporadic fighting. (Guardian, June 12, 2014, emphasis added) The reports point to the fact that Iraqi military commanders were sympathetic with the Sunni led ISIS insurgency: Speaking from the Kurdish city of Erbil, the defectors accused their officers of cowardice and betrayal, saying generals in Mosul “handed over” the city over to Sunni insurgents, with whom they shared sectarian and historical ties. (Daily Telegraph,  13 June 2014) What is important to understand, is that both sides, namely the regular Iraqi forces and the ISIS rebel army are supported by US-NATO. There were US military advisers and special forces including operatives from private military companies on location in Mosul working with Iraq’s regular armed forces. In turn, there are Western special forces or mercenaries within ISIS (acting on contract to the CIA or the Pentagon) who are in liaison with US-NATO (e.g. through satellite phones).
  • Under these circumstances, with US intelligence amply involved, there would have been routine communication, coordination, logistics and exchange of intelligence between a US-NATO military and intelligence command center, US-NATO military advisers forces or private military contractors on the ground assigned to the Iraqi Army and Western special forces attached to the ISIS brigades. These Western special forces operating covertly within the ISIS could have been dispatched by a private security company on contract to US-NATO.
  • ...14 more annotations...
  • In this regard, the capture of Mosul appears to have been a carefully engineered operation, planned well in advance. With the exception of a few skirmishes, no fighting took place. Entire divisions of the Iraqi National Army –trained by the US military with advanced weapons systems at their disposal– could have easily repelled the ISIS rebels. Reports suggest that they were ordered by their commanders not to intervene. According to witnesses, “Not a single shot was fired”. The forces that had been in Mosul have fled — some of which abandoned their uniforms as well as their posts as the ISIS forces swarmed into the city. Fighters with the Islamic State of Iraq and Syria (ISIS), an al-Qaeda offshoot, overran the entire western bank of the city overnight after Iraqi soldiers and police apparently fled their posts, in some instances discarding their uniforms as they sought to escape the advance of the militants. http://hotair.com/archives/2014/06/10/mosul-falls-to-al-qaeda-as-us-trained-security-forces-flee/
  • A contingent of one thousand ISIS rebels take over a city of more than one million? Without prior knowledge that the US controlled Iraqi Army (30,000 strong) would not intervene, the Mosul operation would have fallen flat, the rebels would have been decimated. Who was behind the decision to let the ISIS terrorists take control of Mosul? Had the senior Iraqi commanders been instructed by their Western military advisers to hand over the city to the ISIS terrorists? Were they co-opted?
  • The formation of the caliphate may be the first step towards a broader conflict in the Middle East, bearing in mind that Iran is supportive of the Al Maliki government and the US ploy may indeed be to encourage the intervention of Iran. The proposed redivision of Iraq is broadly modeled on that of the Federation of Yugoslavia which was split up into seven “independent states” (Serbia, Croatia, Bosnia-Herzegovina, Macedonia (FYRM), Slovenia, Montenegro, Kosovo). According to Mahdi Darius Nazemroaya, the re division of Iraq into three separate states is part of a broader process of redrawing the Map of the Middle East.
  • US forces could have intervened. They had been instructed to let it happen. It was part of a carefully planned agenda to facilitate the advance of the ISIS rebel forces and the installation of the ISIS caliphate. The whole operation appears to have been carefully staged.
  • In Mosul, government buildings, police stations, schools, hospitals, etc are formally now under the control of the Islamic State of Iraq and Syria (ISIS). In turn, ISIS has taken control of military hardware including helicopters and tanks which were abandoned by the Iraqi armed forces. What is unfolding is the installation of a US sponsored Islamist ISIS caliphate alongside the rapid demise of the Baghdad government. Meanwhile, the Northern Kurdistan region has de facto declared its independence from Baghdad. Kurdish peshmerga rebel forces (which are supported by Israel) have taken control of the cities of Arbil and Kirkuk. (See map above) Concluding Remarks There were no Al Qaeda rebels in Iraq prior to the 2003 invasion. Moreover, Al Qaeda was non-existent in Syria until the outset of the US-NATO-Israeli supported insurgency in March 2011. The ISIS is not an independent entity. It is a creation of US intelligence. It is a US intelligence asset, an instrument of non-conventional warfare.
  • Was the handing over of Mosul to ISIS part of a US intelligence agenda? Were the Iraqi military commanders manipulated or paid off into allowing the city to fall into the hands of the ISIS rebels without “a single shot being fired”. Shiite General Mehdi Sabih al-Gharawi who was in charge of the Mosul Army divisions “had left the city”. Al Gharawi had worked hand in glove with the US military. He took over the command of Mosul in September 2011, from US Col Scott McKean. Had he been co-opted, instructed by his US counterparts to abandon his command?
  • The ultimate objective of this ongoing US-NATO engineered conflict opposing Maliki government forces to the ISIS insurgency is to destroy and destabilize Iraq as a Nation State. It is part of an intelligence operation, an engineered process of  transforming countries into territories. The break up of Iraq along sectarian lines is a longstanding policy of the US and its allies. The ISIS is a caliphate project of creating a Sunni Islamist state. It is not a project of the Sunni population of Iraq which historically has been committed to a secular system of government. The caliphate project is a US design. The advances of ISIS forces is intended to garnish broad support within the Sunni population directed against the Al Maliki government The division of Iraq along sectarian-ethnic lines has been on the drawing board of the Pentagon for more than 10 years.
  • The above map was prepared by Lieutenant-Colonel Ralph Peters. It was published in the Armed Forces Journal in June 2006, Peters is a retired colonel of the U.S. National War Academy. (Map Copyright Lieutenant-Colonel Ralph Peters 2006). Although the map does not officially reflect Pentagon doctrine, it has been used in a training program at NATO’s Defense College for senior military officers”. (See Plans for Redrawing the Middle East: The Project for a “New Middle East” By Mahdi Darius Nazemroaya, Global Research, November 2006)
  • The Western media in chorus have described the unfolding conflict in Iraq as a “civil war” opposing the Islamic State of Iraq and al-Sham against the Armed forces of the Al-Maliki government. (Also referred to as Islamic State of Iraq and the Levant (ISIL) or Islamic State of Iraq and Syria (ISIS)) The conflict is casually described as “sectarian warfare” between Radical Sunni and Shia without addressing “who is behind the various factions”.  What is at stake is a carefully staged US military-intelligence agenda. Known and documented, Al Qaeda affiliated entities have been used by US-NATO in numerous conflicts as “intelligence assets” since the heyday of the Soviet-Afghan war. In Syria, the Al Nusrah and ISIS rebels are the foot-soldiers of the Western military alliance, which oversees and controls the recruitment and training of paramilitary forces.
  • The Al Qaeda affiliated Islamic State of Iraq (ISI) re-emerged in April 2013 with a different name and acronym, commonly referred to as the Islamic State of Iraq and Syria (ISIS). The formation of a terrorist entity encompassing both Iraq and Syria was part of a US intelligence agenda. It responded to geopolitical objectives. It also coincided with the advances of Syrian government forces against the US sponsored insurgency in Syria and the failures of both the Free Syrian Army (FSA) and its various “opposition” terror brigades. The decision was taken by Washington to channel its support (covertly) in favor of a terrorist entity which operates in both Syria and Iraq and which has logistical bases in both countries. The Islamic State of Iraq and al-Sham’s Sunni caliphate project coincides with a longstanding US agenda to carve up both Iraq and Syria into three separate territories: A Sunni Islamist Caliphate, an Arab Shia Republic, and a Republic of Kurdistan.
  • Whereas the (US proxy) government in Baghdad purchases advanced weapons systems from the US including F16 fighter jets from Lockheed Martin, the Islamic State of Iraq and al-Sham –which is fighting Iraqi government forces– is supported covertly by Western intelligence. The objective is to engineer a civil war in Iraq, in which both sides are controlled indirectly by US-NATO. The scenario is to arm and equip them, on both sides, finance them with advanced weapons systems and then “let them fight”.
  • The Islamic caliphate is supported covertly by the CIA in liaison with Saudi Arabia, Qatar and Turkish intelligence. Israel is also involved in channeling support to both Al Qaeda rebels in Syria (out of the Golan Heights) as well to the Kurdish separatist movement in Syria and Iraq.
  • First published by GR on June 14, 2014.  President Barack Obama has initiated a series of US bombing raids in Iraq allegedly directed towards the rebel army of the Islamic State (IS). The Islamic State terrorists are portrayed as an enemy of America and the Western world. Amply documented, the Islamic State is a creation of Western intelligence, supported by the CIA and Israel’s Mossad and financed by Saudi Arabia and Qatar. We are dealing with a diabolical military agenda whereby the United States is targeting a rebel army which is directly funded by the US and its allies. The incursion into Iraq of the Islamic State rebels in late June was part of a carefully planned intelligence operation. The rebels of the Islamic state, formerly known as the ISIS, were covertly supported by US-NATO-Israel  to wage a terrorist insurgency against the Syrian government of Bashar Al Assad.  The atrocities committed in Iraq are similar to those committed in Syria. The sponsors of IS including Barack Obama have blood on their hands.
  • The killings of innocent civilians by the Islamic state terrorists create a pretext and the justification for US military intervention on humanitarian grounds. Lest we forget, the rebels who committed these atrocities and who are a target of US military action are supported by the United States. The bombing raids ordered by Obama are not intended to eliminate the terrorists. Quite the opposite, the US is targeting the civilian population as well as the Iraqi resistance movement. The endgame is to destabilize Iraq as a nation state and trigger its partition into three separate entities.
  •  
    The destabilization and fragmentation of Israel's neighboring nations has indeed been on the Zionist/Neocon drawing board for a very long time. http://goo.gl/Z1gdoA In the Mideast, it's important to remember that there are no significant Islamist forces that are not under the control of the U.S. or its allies Saudi Arabia and Qatar. The Iraqi Army's withdrawal of the two divisions from the defense of Mosul is indeed curious. In that regard, Col. Peters' map of a future Mideast is almost certainly more than a coincidence. 
Paul Merrell

Argentina Prosecutor Who Accused Kirchner Had Steady Contact With US Embassy, Leaked Ca... - 0 views

  • Alberto Nisman, the prosecutor who accused Argentina's president of a cover-up plot over the 1994 bombing of a Jewish center before being found shot to death, met repeatedly with the US embassy in Buenos Aires during his investigation, leaked diplomatic cables show.Nisman gave US officials advanced notice on his procedural moves and was apparently coached by the embassy in "improving" his requests for arrest warrants for Iranians that Nisman suspected of carrying out the deadly attack against the Argentine Israeli Mutual Association, or AIMA, according to cables published by Wikileaks."Embassy can now more logically approach the [government of Argentina] about [its] anticipated next steps and ways we might be able to coordinate outreach to other governments [...] to bring attention to the warrants and pressure to bear on Iran and Hezbollah," says one US cable dated November 1, 2006, after a meeting with Nisman.The revelations are adding fodder to the entangled scandal over the AIMA center bombing, Nisman's mysterious death, and the reactions of President Cristina Fernandez de Kirchner and her government loyalists.The president and her supporters have piled doubt on Nisman's investigation, suggesting he didn't himself write the inquiry accusing Kirchner of a cover-up deal with Iran, and that he was influenced by foreign agents in his claims. Kirchner said this week that Nisman was manipulated and double-crossed by government spies plotting against her.
  • Nisman on January 16 told VICE News he had proof that Kirchner sought a back-channel deal with Iran — swapping Iranian oil for Argentine grain — in exchange for abandoning efforts to prosecute former Iranian diplomats in connection to the Jewish center bombing.Eight-five people were killed in the terror attack, which remains unsolved. Survivors and opposition forces are now blaming Kirchner's government for Nisman's death.
  • The prosecutor, who was found dead the night before making his blockbuster claim against Kirchner and her foreign minister in Argentina's Congress, is mentioned in 46 leaked US cables.In the cable from November 2006, Nisman informed US officials of the likelihood that a judge would follow his recommendations to seek charges against Iranian suspects for the bombing. American embassy officials discussed plans to inform "other governments" ahead of time, in an apparent push to make the case against the Iranians an international matter.Another cable, dated January 19, 2007, suggests the US embassy had a hand in shaping Nisman's warrant requests with Interpol, the international diplomatic police force. The cable shows US officials thought Nisman's work was shoddy and needed help.Before the Justice Department's Office of International Affairs intervened in the warrant applications, the cable says, Nisman's paperwork contained "statements that were presumptuous conclusions of guilt."Nisman took on the case of the AIMA center bombing in 2004, at the request of the then-President Nestor Kirchner, Cristina Fernandez's late husband. In his interview with VICE News — perhaps his last with a foreign news organization — Nisman denied connections with any foreign spy agencies.
  • ...4 more annotations...
  • "You won't find reports from the CIA, Mossad, or the MI5 in my files. I have no doubt that there is a link between them and the Argentine intelligence agency, but I never dealt with any foreign intelligence agencies," Nisman said, two days before he was found dead.The US embassy in Buenos Aires declined to discuss its officers' interactions with Nisman. "We will not comment on the contents of these alleged cables that purport to include classified information," an embassy spokesman told VICE News.
  • The relationship was apparently so involved that Nisman apologized for not letting then-ambassador Earl Anthony Wayne know that he would call for the arrest of former president Carlos Menem in relation to the case."AMIA Special Prosecutor Alberto Nisman called the Ambassador on May 23 to apologize for not giving the Embassy advance notice of his request for the arrest of former President Menem and other [government of Argentina] officials for their alleged roles in the cover up of the 'local connection' in the 1994 terrorist bombing of the AMIA Jewish community center," says a cable from May 2008.The prosecutor also apologized that the judicial order coincided with a visit to Argentina from the former deputy director of the FBI, John Pistole, adding it was "completely unintentional," the cable shows."He noted that he was very sorry and that he sincerely appreciates all of the [US government's] help and support and in no way meant to undermine that," the cable continues.
  • The cable also notes that US officials "have for the past two years recommended to Nisman that he focus on the perpetrators of the terrorist attack and not on the possible mishandling of the first investigation."Santiago O'Donnell, author of two books based on the cables released by Julian Assange, said in an interview that the leaked cables show the US influenced Nisman throughout his work on the AIMA bombing investigation."The embassy gave instructions to the prosecutor Nisman for him to follow the Iranian lead, and not follow other leads, like the Syrian lead, or the local connection, because that would detract from the terrorist image that the US was trying to impose on Iran," O'Donnell said.President Kirchner this week proposed in a nationally televised address to disband and reform the government's intelligence agency. In doing so, she said rogue government spies were responsible for Nisman's death. Opposition voices, meanwhile, said the reform plan for the Secretaría de Inteligencia, or SI, would further politicize the work of the embattled spy agency and make it more responsive to the president's political whims.
  • Alberto Nisman, the prosecutor who accused Argentina's president of a cover-up plot over the 1994 bombing of a Jewish center before being found shot to death, met repeatedly with the US embassy in Buenos Aires during his investigation, leaked diplomatic cables show.Nisman gave US officials advanced notice on his procedural moves and was apparently coached by the embassy in "improving" his requests for arrest warrants for Iranians that Nisman suspected of carrying out the deadly attack against the Argentine Israeli Mutual Association, or AIMA, according to cables published by Wikileaks."Embassy can now more logically approach the [government of Argentina] about [its] anticipated next steps and ways we might be able to coordinate outreach to other governments [...] to bring attention to the warrants and pressure to bear on Iran and Hezbollah," says one US cable dated November 1, 2006, after a meeting with Nisman.
  •  
    Well this is interesting. The U.S. was covertly working through an Argentinian prosecutor to topple Argentina's head of state. On the plan to reform the Argentine intelligence service, that service's subordination to the CIA was the prototype operation than led to Operation Condor, in which the CIA subverted most intelligence services in Latin America, leading to coups and the deaths and disappearnaces of hundreds of thousands Latin American citizens suspected of being left-leaning. The overthrow of the Allende government in Chile is perhaps the best known in the U.S. 
Paul Merrell

Exclusive: Dozens of Clinton emails were classified from the start, U.S. rules suggest ... - 0 views

  • For months, the U.S. State Department has stood behind its former boss Hillary Clinton as she has repeatedly said she did not send or receive classified information on her unsecured, private email account, a practice the government forbids.While the department is now stamping a few dozen of the publicly released emails as "Classified," it stresses this is not evidence of rule-breaking. Those stamps are new, it says, and do not mean the information was classified when Clinton, the Democratic frontrunner in the 2016 presidential election, first sent or received it.But the details included in those "Classified" stamps — which include a string of dates, letters and numbers describing the nature of the classification — appear to undermine this account, a Reuters examination of the emails and the relevant regulations has found.The new stamps indicate that some of Clinton's emails from her time as the nation's most senior diplomat are filled with a type of information the U.S. government and the department's own regulations automatically deems classified from the get-go — regardless of whether it is already marked that way or not.In the small fraction of emails made public so far, Reuters has found at least 30 email threads from 2009, representing scores of individual emails, that include what the State Department's own "Classified" stamps now identify as so-called 'foreign government information.' The U.S. government defines this as any information, written or spoken, provided in confidence to U.S. officials by their foreign counterparts.
  • This sort of information, which the department says Clinton both sent and received in her emails, is the only kind that must be "presumed" classified, in part to protect national security and the integrity of diplomatic interactions, according to U.S. regulations examined by Reuters."It's born classified," said J. William Leonard, a former director of the U.S. government's Information Security Oversight Office (ISOO). Leonard was director of ISOO, part of the White House's National Archives and Records Administration, from 2002 until 2008, and worked for both the Bill Clinton and George W. Bush administrations."If a foreign minister just told the secretary of state something in confidence, by U.S. rules that is classified at the moment it's in U.S. channels and U.S. possession," he said in a telephone interview, adding that for the State Department to say otherwise was "blowing smoke."
  • Although it appears to be true for Clinton to say none of her emails included classification markings, a point she and her staff have emphasized, the government's standard nondisclosure agreement warns people authorized to handle classified information that it may not be marked that way and that it may come in oral form.The State Department disputed Reuters' analysis but declined requests to explain how it was incorrect.
  • ...5 more annotations...
  • Clinton and her senior staff routinely sent foreign government information among themselves on unsecured networks several times a month, if the State Department's markings are correct. Within the 30 email threads reviewed by Reuters, Clinton herself sent at least 17 emails that contained this sort of information. In at least one case it was to a friend, Sidney Blumenthal, not in government. The information appears to include privately shared comments by a prime minister, several foreign ministers and a foreign spy chief, unredacted bits of the emails show. Typically, Clinton and her staff first learned the information in private meetings, telephone calls or, less often, in email exchanges with the foreign officials.
  • The findings of the Reuters review are separate from the recent analysis by the inspector general for U.S. intelligence agencies, who said last month that his office found four emails that contained classified government secrets at the time they were sent in a sample of 40 emails not yet made public.The State Department has said it does not know whether the inspector general is correct.
  • The Reuters review also found that the declassification dates the department has been marking on these emails suggest the department might believe the information was classified all along. Gerlach said this was incorrect.
  • A series of presidential executive orders has governed how officials should handle the ceaseless incoming stream of raw, usually unmarked information they acquire in their work. Since at least 2003, they have emphasized that information shared by a foreign government with an expectation or agreement of confidentiality is the only kind that is "presumed" classified.The State Department's own regulations, as laid out in the Foreign Affairs Manual, have been unequivocal since at least 1999: all department employees "must ... safeguard foreign government and NATO RESTRICTED information as U.S. Government Confidential" or higher, according to the version in force in 2009, when these particular emails were sent.
  • A spokeswoman for one of the foreign governments whose information appears in Clinton's emails said, on condition of anonymity to protect diplomatic relations, that the information was shared confidentially in 2009 with Clinton and her senior staff.If so, it appears this information should have been classified at the time and not handled on a private unsecured email network, according to government regulations.The foreign government expects all private exchanges with U.S. officials to be treated that way, the spokeswoman for the foreign government said.Leonard, the former ISOO director, said this sort of information was improperly shared by officials through insecure channels more frequently than the public may realize, although more typically within the unsecured .gov email network than on private email accounts.With few exceptions, officials are forbidden from sending classified information even via the .gov email network and must use a dedicated secure network instead. The difference in Clinton's case, Leonard said, is that so-called "spillages" of classified information within the .gov network are easier to track and contain.
Gary Edwards

Did the White House Help Plan the Syrian Chemical Attack? - 0 views

  •  
    "by Yossef Bodansky excerpt: There is a growing volume of new evidence from numerous sources in the Middle East - mostly affiliated with the Syrian opposition and its sponsors and supporters - which makes a very strong case, based on solid circumstantial evidence, that the August 21, 2013, chemical strike in the Damascus suburbs was indeed a pre-meditated provocation by the Syrian opposition. The extent of US foreknowledge of this provocation needs further investigation because available data puts the "horror" of the Barack Obama White House in a different and disturbing light. On August 13-14, 2013, Western-sponsored opposition forces in Turkey started advance preparations for a major and irregular military surge. Initial meetings between senior opposition military commanders and representatives of Qatari, Turkish, and US Intelligence ["Mukhabarat Amriki"] took place at the converted Turkish military garrison in Antakya, Hatay Province, used as the command center and headquarters of the Free Syrian Army (FSA) and their foreign sponsors. Very senior opposition commanders who had arrived from Istanbul briefed the regional commanders of an imminent escalation in the fighting due to "a war-changing development" which would, in turn, lead to a US-led bombing of Syria. The opposition forces had to quickly prepare their forces for exploiting the US-led bombing in order to march on Damascus and topple the Bashar al-Assad Government, the senior commanders explained. The Qatari and Turkish intelligence officials assured the Syrian regional commanders that they would be provided with plenty of weapons for the coming offensive. Indeed, unprecedented weapons distribution started in all opposition camps in Hatay Province on August 21-23, 2013. In the Reyhanli area alone, opposition forces received well in excess of 400 tons of weapons, mainly anti-aircraft weaponry from shoulder-fired missiles to ammunition for light-guns and machine guns. The weapons were distri
  •  
    "by Yossef Bodansky excerpt: There is a growing volume of new evidence from numerous sources in the Middle East - mostly affiliated with the Syrian opposition and its sponsors and supporters - which makes a very strong case, based on solid circumstantial evidence, that the August 21, 2013, chemical strike in the Damascus suburbs was indeed a pre-meditated provocation by the Syrian opposition. The extent of US foreknowledge of this provocation needs further investigation because available data puts the "horror" of the Barack Obama White House in a different and disturbing light. On August 13-14, 2013, Western-sponsored opposition forces in Turkey started advance preparations for a major and irregular military surge. Initial meetings between senior opposition military commanders and representatives of Qatari, Turkish, and US Intelligence ["Mukhabarat Amriki"] took place at the converted Turkish military garrison in Antakya, Hatay Province, used as the command center and headquarters of the Free Syrian Army (FSA) and their foreign sponsors. Very senior opposition commanders who had arrived from Istanbul briefed the regional commanders of an imminent escalation in the fighting due to "a war-changing development" which would, in turn, lead to a US-led bombing of Syria. The opposition forces had to quickly prepare their forces for exploiting the US-led bombing in order to march on Damascus and topple the Bashar al-Assad Government, the senior commanders explained. The Qatari and Turkish intelligence officials assured the Syrian regional commanders that they would be provided with plenty of weapons for the coming offensive. Indeed, unprecedented weapons distribution started in all opposition camps in Hatay Province on August 21-23, 2013. In the Reyhanli area alone, opposition forces received well in excess of 400 tons of weapons, mainly anti-aircraft weaponry from shoulder-fired missiles to ammunition for light-guns and machine guns. The weapons were distri
Paul Merrell

The Latest Rules on How Long NSA Can Keep Americans' Encrypted Data Look Too Familiar |... - 0 views

  • Does the National Security Agency (NSA) have the authority to collect and keep all encrypted Internet traffic for as long as is necessary to decrypt that traffic? That was a question first raised in June 2013, after the minimization procedures governing telephone and Internet records collected under Section 702 of the Foreign Intelligence Surveillance Act were disclosed by Edward Snowden. The issue quickly receded into the background, however, as the world struggled to keep up with the deluge of surveillance disclosures. The Intelligence Authorization Act of 2015, which passed Congress this last December, should bring the question back to the fore. It established retention guidelines for communications collected under Executive Order 12333 and included an exception that allows NSA to keep ‘incidentally’ collected encrypted communications for an indefinite period of time. This creates a massive loophole in the guidelines. NSA’s retention of encrypted communications deserves further consideration today, now that these retention guidelines have been written into law. It has become increasingly clear over the last year that surveillance reform will be driven by technological change—specifically by the growing use of encryption technologies. Therefore, any legislation touching on encryption should receive close scrutiny.
  • Section 309 of the intel authorization bill describes “procedures for the retention of incidentally acquired communications.” It establishes retention guidelines for surveillance programs that are “reasonably anticipated to result in the acquisition of [telephone or electronic communications] to or from a United States person.” Communications to or from a United States person are ‘incidentally’ collected because the U.S. person is not the actual target of the collection. Section 309 states that these incidentally collected communications must be deleted after five years unless they meet a number of exceptions. One of these exceptions is that “the communication is enciphered or reasonably believed to have a secret meaning.” This exception appears to be directly lifted from NSA’s minimization procedures for data collected under Section 702 of FISA, which were declassified in 2013. 
  • While Section 309 specifically applies to collection taking place under E.O. 12333, not FISA, several of the exceptions described in Section 309 closely match exceptions in the FISA minimization procedures. That includes the exception for “enciphered” communications. Those minimization procedures almost certainly served as a model for these retention guidelines and will likely shape how this new language is interpreted by the Executive Branch. Section 309 also asks the heads of each relevant member of the intelligence community to develop procedures to ensure compliance with new retention requirements. I expect those procedures to look a lot like the FISA minimization guidelines.
  • ...6 more annotations...
  • This language is broad, circular, and technically incoherent, so it takes some effort to parse appropriately. When the minimization procedures were disclosed in 2013, this language was interpreted by outside commentators to mean that NSA may keep all encrypted data that has been incidentally collected under Section 702 for at least as long as is necessary to decrypt that data. Is this the correct interpretation? I think so. It is important to realize that the language above isn’t just broad. It seems purposefully broad. The part regarding relevance seems to mirror the rationale NSA has used to justify its bulk phone records collection program. Under that program, all phone records were relevant because some of those records could be valuable to terrorism investigations and (allegedly) it isn’t possible to collect only those valuable records. This is the “to find a needle a haystack, you first have to have the haystack” argument. The same argument could be applied to encrypted data and might be at play here.
  • This exception doesn’t just apply to encrypted data that might be relevant to a current foreign intelligence investigation. It also applies to cases in which the encrypted data is likely to become relevant to a future intelligence requirement. This is some remarkably generous language. It seems one could justify keeping any type of encrypted data under this exception. Upon close reading, it is difficult to avoid the conclusion that these procedures were written carefully to allow NSA to collect and keep a broad category of encrypted data under the rationale that this data might contain the communications of NSA targets and that it might be decrypted in the future. If NSA isn’t doing this today, then whoever wrote these minimization procedures wanted to at least ensure that NSA has the authority to do this tomorrow.
  • There are a few additional observations that are worth making regarding these nominally new retention guidelines and Section 702 collection. First, the concept of incidental collection as it has typically been used makes very little sense when applied to encrypted data. The way that NSA’s Section 702 upstream “about” collection is understood to work is that technology installed on the network does some sort of pattern match on Internet traffic; say that an NSA target uses example@gmail.com to communicate. NSA would then search content of emails for references to example@gmail.com. This could notionally result in a lot of incidental collection of U.S. persons’ communications whenever the email that references example@gmail.com is somehow mixed together with emails that have nothing to do with the target. This type of incidental collection isn’t possible when the data is encrypted because it won’t be possible to search and find example@gmail.com in the body of an email. Instead, example@gmail.com will have been turned into some alternative, indecipherable string of bits on the network. Incidental collection shouldn’t occur because the pattern match can’t occur in the first place. This demonstrates that, when communications are encrypted, it will be much harder for NSA to search Internet traffic for a unique ID associated with a specific target.
  • This lends further credence to the conclusion above: rather than doing targeted collection against specific individuals, NSA is collecting, or plans to collect, a broad class of data that is encrypted. For example, NSA might collect all PGP encrypted emails or all Tor traffic. In those cases, NSA could search Internet traffic for patterns associated with specific types of communications, rather than specific individuals’ communications. This would technically meet the definition of incidental collection because such activity would result in the collection of communications of U.S. persons who aren’t the actual targets of surveillance. Collection of all Tor traffic would entail a lot of this “incidental” collection because the communications of NSA targets would be mixed with the communications of a large number of non-target U.S. persons. However, this “incidental” collection is inconsistent with how the term is typically used, which is to refer to over-collection resulting from targeted surveillance programs. If NSA were collecting all Tor traffic, that activity wouldn’t actually be targeted, and so any resulting over-collection wouldn’t actually be incidental. Moreover, greater use of encryption by the general public would result in an ever-growing amount of this type of incidental collection.
  • This type of collection would also be inconsistent with representations of Section 702 upstream collection that have been made to the public and to Congress. Intelligence officials have repeatedly suggested that search terms used as part of this program have a high degree of specificity. They have also argued that the program is an example of targeted rather than bulk collection. ODNI General Counsel Robert Litt, in a March 2014 meeting before the Privacy and Civil Liberties Oversight Board, stated that “there is either a misconception or a mischaracterization commonly repeated that Section 702 is a form of bulk collection. It is not bulk collection. It is targeted collection based on selectors such as telephone numbers or email addresses where there’s reason to believe that the selector is relevant to a foreign intelligence purpose.” The collection of Internet traffic based on patterns associated with types of communications would be bulk collection; more akin to NSA’s collection of phone records en mass than it is to targeted collection focused on specific individuals. Moreover, this type of collection would certainly fall within the definition of bulk collection provided just last week by the National Academy of Sciences: “collection in which a significant portion of the retained data pertains to identifiers that are not targets at the time of collection.”
  • The Section 702 minimization procedures, which will serve as a template for any new retention guidelines established for E.O. 12333 collection, create a large loophole for encrypted communications. With everything from email to Internet browsing to real-time communications moving to encrypted formats, an ever-growing amount of Internet traffic will fall within this loophole.
  •  
    Tucked into a budget authorization act in December without press notice. Section 309 (the Act is linked from the article) appears to be very broad authority for the NSA to intercept any form of telephone or other electronic information in bulk. There are far more exceptions from the five-year retention limitation than the encrypted information exception. When reading this, keep in mind that the U.S. intelligence community plays semantic games to obfuscate what it does. One of its word plays is that communications are not "collected" until an analyst looks at or listens to partiuclar data, even though the data will be searched to find information countless times before it becomes "collected." That searching was the major basis for a decision by the U.S. District Court in Washington, D.C. that bulk collection of telephone communications was unconstitutional: Under the Fourth Amendment, a "search" or "seizure" requiring a judicial warrant occurs no later than when the information is intercepted. That case is on appeal, has been briefed and argued, and a decision could come any time now. Similar cases are pending in two other courts of appeals. Also, an important definition from the new Intelligence Authorization Act: "(a) DEFINITIONS.-In this section: (1) COVERED COMMUNICATION.-The term ''covered communication'' means any nonpublic telephone or electronic communication acquired without the consent of a person who is a party to the communication, including communications in electronic storage."       
Paul Merrell

Obama administration had restrictions on NSA reversed in 2011 - The Washington Post - 0 views

  • The Obama administration secretly won permission from a surveillance court in 2011 to reverse restrictions on the National Security Agency’s use of intercepted phone calls and e-mails, permitting the agency to search deliberately for Americans’ communications in its massive databases, according to interviews with government officials and recently declassified material. In addition, the court extended the length of time that the NSA is allowed to retain intercepted U.S. communications from five years to six years — and more under special circumstances, according to the documents, which include a recently released 2011 opinion by U.S. District Judge John D. Bates, then chief judge of the Foreign Intelligence Surveillance Court.
  • What had not been previously acknowledged is that the court in 2008 imposed an explicit ban — at the government’s request — on those kinds of searches, that officials in 2011 got the court to lift the bar and that the search authority has been used. Together the permission to search and to keep data longer expanded the NSA’s authority in significant ways without public debate or any specific authority from Congress. The administration’s assurances rely on legalistic definitions of the term “target” that can be at odds with ordinary English usage. The enlarged authority is part of a fundamental shift in the government’s approach to surveillance: collecting first, and protecting Americans’ privacy later.
  • “The government says, ‘We’re not targeting U.S. persons,’ ” said Gregory T. Nojeim, senior counsel at the Center for Democracy and Technology. “But then they never say, ‘We turn around and deliberately search for Americans’ records in what we took from the wire.’ That, to me, is not so different from targeting Americans at the outset.”
  • ...7 more annotations...
  • The court decision allowed the NSA “to query the vast majority” of its e-mail and phone call databases using the e-mail addresses and phone numbers of Americans and legal residents without a warrant, according to Bates’s opinion. The queries must be “reasonably likely to yield foreign intelligence information.” And the results are subject to the NSA’s privacy rules.
  • But in 2011, to more rapidly and effectively identify relevant foreign intelligence communications, “we did ask the court” to lift the ban, ODNI general counsel Robert S. Litt said in an interview. “We wanted to be able to do it,” he said, referring to the searching of Americans’ communications without a warrant.
  • But — and this was the nub of the criticism — a warrant for each target would no longer be required. That means that communications with Americans could be picked up without a court first determining that there is probable cause that the people they were talking to were terrorists, spies or “foreign powers.”That is why it is important to require a warrant before searching for Americans’ data, Udall said. “Our founders laid out a roadmap where Americans’ privacy rights are protected before their communications are seized or searched — not after the fact,” he said in a statement to The Post.
  • The [surveillance] Court documents declassified recently show that in late 2011 the court authorized the NSA to conduct warrantless searches of individual Americans’ communications using an authority intended to target only foreigners,” Wyden said in a statement to The Washington Post. “Our intelligence agencies need the authority to target the communications of foreigners, but for government agencies to deliberately read the e-mails or listen to the phone calls of individual Americans, the Constitution requires a warrant.”
  • Senior administration officials disagree. “If we’re validly targeting foreigners and we happen to collect communications of Americans, we don’t have to close our eyes to that,” Litt said. “I’m not aware of other situations where once we have lawfully collected information, we have to go back and get a warrant to look at the information we’ve already collected.” The searches take place under a surveillance program Congress authorized in 2008 under Section 702 of the Foreign Intelligence Surveillance Act. Under that law, the target must be a foreigner “reasonably believed” to be outside the United States, and the court must approve the targeting procedures in an order good for one year.
  • The court’s expansion of authority went largely unnoticed when the opinion was released, but it formed the basis for cryptic warnings last year by a pair of Democratic senators, Ron Wyden (Ore.) and Mark Udall (Colo.), that the administration had a “back-door search loophole” that enabled the NSA to scour intercepted communications for those of Americans. They introduced legislation to require a warrant, but they were barred by classification rules from disclosing the court’s authorization or whether the NSA was already conducting such searches.
  • The NSA intercepts more than 250 million Internet communications each year under Section 702. Ninety-one percent are from U.S. Internet companies such as Google and Yahoo. The rest come from “upstream” companies that route Internet traffic to, from and within the United States. The expanded search authority applies only to the downstream collection.
  •  
    An important article I missed, from last September. Searching the content of American citizens' calls and emails without a search warrant. Straight-up violation of the Fourth and Fifth amendments (warrantless search and deprivation of due process).  And directly contrary to what Obama, Clapper, and Alexander told the public over and over again.
Paul Merrell

Obama Pins Fate of Nuclear Pact on Documents From an Iranian "Curveball" - 0 views

  • Obama administration officials insist "possible military dimensions" of Iran’s nuclear program must be resolved to the satisfaction of the IAEA to complete a nuclear agreement. But the term refers to discredited intelligence from suspect sources. One of the issues Obama administration officials are insisting must be resolved to the satisfaction of the International Atomic Energy Agency (IAEA) before any nuclear agreement may be concluded involves "possible military dimensions." That term refers to documents long discredited by German intelligence but which the United States and the IAEA have maintained came from a covert Iranian nuclear weapons program. A former senior German official has now revealed that the biggest collection of documents cited as evidence of such a covert Iran program actually came from a member of the Iranian terrorist organization Mujihedin-E-Khalq (MEK) and that German intelligence sought to warn the George W. Bush administration that the source of the documents was not trustworthy.
  • The use of those documents to make a case for action against Iran closely parallels the Bush administration's use of the testimony of the now-discredited Iraqi exile called "Curveball" to convince the US public to support war against Iraq. The parallel between the two episodes was recognized explicitly by the German intelligence service, the Bundesnachrichtendienst (BND), according to Karsten Voigt, who was the German Foreign Office's coordinator of North American-German relations. Voigt provided details of the story behind the appearance of the mysterious Iran nuclear documents in an interview with this writer last March for a book on the false narrative surrounding Iran's nuclear program that is newly published, Manufactured Crisis. 
  • In 2004, Powell and his State Department team still regarded the MEK as a disreputable terrorist organization, but the neoconservatives in the administration viewed it as useful as an anti-regime tool. The MEK was known to have served the interests of Israel's Mossad by providing a way to "launder" intelligence claims that Israel wanted to get out to the public but didn't want identified as having come from Israel. In the best-known case, the group's political front organization, the National Council of Resistance in Iran, had revealed the location of the Iranian uranium enrichment facility at Natanz in an August 2002 press conference, but it had been given the coordinates of the construction site by Israeli intelligence, according to both a senior IAEA official and an Iranian opposition group source, cited by Seymour Hersh and New Yorker writer Connie Bruck, respectively. The purported Iranian documents conveyed by the MEK to Western intelligence also displayed multiple indications of having been fabricated by an outside actor. The clearest and most significant anomaly was that the drawings of efforts to redesign the Shahab-3 missile to accommodate a nuclear weapons showed a missile that had already been abandoned by Iran's Defense Ministry by the time the drawings were said to have been made, as was confirmed by former IAEA deputy director general for safeguards, Olli Heinonen, in an interview with this writer. The Iranian abandonment of the earlier missile design became known to foreign analysts, however, only after Iran flight-tested a completely new missile design in August 2004 - after the "laptop documents" had already been conveyed to the BND by its MEK source. Whoever ordered those drawings was unaware of the switch to the new missile design, which would rule out a genuine Iranian Defense Ministry or military program.
  • ...3 more annotations...
  • A former IAEA official familiar with those documents recalled in interview with Truthout that senior officials at the IAEA were immediately suspicious of the entire collection of documents given to the agency in 2005. "The documents were never really convincing," said the former official. The creators of the documents had taken publicly available information about people, organizations and location and had "woven their own narrative" around them, he said. Furthermore, he recalled finding anomalies in the stamps and signature blocs of documents. The fabricated documents, depicting Iran as redesigning their missile reentry vehicle to accommodate a nuclear weapon, among other things, fit into a Bush administration strategy - coordinated with Israel - that was aimed at justifying a military confrontation with Iran. The working assumption, as was revealed by David Wurmser, special assistant to Bolton and then to Cheney, in October 2007, was that the United States would probably need to use force to bring about that change once Iraq was brought under control. Bolton recalls in his memoirs that his aim was to move the Iran nuclear issue out of the IAEA to the United Nations Security Council, where the Bush administration would call for international action against Iran, and failing that, take unilateral action.
  • The IAEA got more documents and intelligence directly from Israel in 2008 and 2009 claiming Iranian work on nuclear weapons, according to then-IAEA Director-General Mohamed ElBaradei. The intelligence passed on by Israel included the claim that Iran had installed a large metal cylinder for high explosives tests at its Parchin military facility in 2000, which it intended to use for hydrodynamic tests of nuclear weapons designs. But the IAEA never revealed the information had come from Israel, covering up the primary fact relevant to its reliability and authenticity. The Safeguards Department had been prepared as early as 2009 to publish a dossier on what it called the "possible military dimensions" of the Iranian nuclear program that would accept all the intelligence reports and documents provided by Israel as genuine and accurate. But ElBaradei's successor, Yukiya Amano, waited to do so until November 2011, when the Obama administration was ready to organize an international coalition for harsh sanctions against Iran's oil export sector. The Obama administration returned to the "possible military dimensions" last November, insisting on a provision in the interim Iran nuclear agreement that required Iran to "resolve" all the "concerns" about that issue. A "senior administration official" briefing the press on the agreement November 24 said there would be no final agreement unless Iran showed that it had "come into compliance with its obligations under the NPT and its obligations to the IAEA."
  • In response to a request from Truthout for a confirmation or denial of the revelation by Karsten Voigt of the MEK role in transmitting the purported Iranian documents to the BND in 2004, NSC officials declined to comment on the matter, according to NSC spokesperson Bernadette Meehan. Some observers believe US negotiators hope to get Iran to admit to having had a nuclear weapons program. However, Iran is certainly not going to admit that the documents and intelligence reports it knows to be fabrications are true. But the Obama administration may well believe so strongly in the Iran nuclear narrative it inherited from the Bush administration and in the idea that the sanctions against Iran confer ultimate negotiating leverage on the United States that it sees an Iranian confession as a realistic goal. In any case, the decision to introduce the falsified evidence of the past into the final negotiations is bound to bring them to an impasse unless the United States is prepared to back down.
  •  
    Neocons in the Obama administration are at it again, fueling the Iranian nukes myth with fabricated intelligence on behalf of Israel. 
Paul Merrell

'Comprehensive' CIA Torture Report Won't Even Name Well-Known Architects of Torture Pro... - 0 views

  • Some familiar names will be missing from the Senate Intelligence Committee's long-awaited report on the CIA's torture program, VICE News has learned.Notably, two retired Air Force psychologists, Dr. Bruce Jessen and Dr. James Mitchell, who have been credited with being the architects of the CIA's so-called "enhanced interrogation techniques," have their names redacted in the 480-page executive summary of the report, according to current and former US officials knowledgeable about the contents of the document.
  • Feinstein's concerns about the redactions led Senator Carl Levin to issue a statement condemning the blacked-out passages, in which he noted that much of the redacted information had already been disclosed in a previous report about the treatment of detainees in custody of the US military. That report was released in 2009 by the Senate Armed Services Committee, of which he is chairman.Specifically, Levin is referring to a section that addresses the CIA's interrogation of Abu Zubaydah, whose interrogation and torture also factors prominently in the Senate Intelligence Committee's executive summary, portions of which have been redacted, officials familiar with the document told VICE News.
  • The CIA has argued that the Intelligence Committee's use of pseudonyms in its executive summary does not provide the officers who were involved in the program with enough cover. People familiar with the document also said it leaves an impression that the agency gave the committee its blessing to partially identify its officers.Officials say the agency is concerned that journalists and human rights researchers will be able to unmask the officers, whose identities, in some cases, are still classified, based on the way the pseudonyms are used and the fact that some information about the individuals has already appeared in previously published reports.The report currently says individual CIA officers and contractors, identified by pseudonyms, were present in unnamed European countries with named CIA captives during particular years. In some cases, those officers are identified with the same pseudonyms in other parts of the report as having been promoted to leadership positions in the CIA, which also makes it easier to identify them.
  • ...3 more annotations...
  • One version of the Senate Intelligence Committee's executive summary had apparently identified Mitchell and Jessen by name, and a copy of the panel's findings and conclusions obtained by McClatchy Newspapers included a bullet point that said: "Two contract psychologists devised the CIA's enhanced interrogation techniques and were central figures in the program's operation."But, according to current and former intelligence officials and committee staffers knowledgeable about the report, the CIA has insisted that the executive summary exclude any reference to Mitchell and Jessen by name, despite the fact that their roles in the program have been widely reported. The issue is part of a larger battle that has surfaced in recent weeks between the CIA and the Senate Intelligence Committee over the intelligence community's redactions in the executive summary that the committee's chairwoman, Senator Dianne Feinstein, said were excessive.
  • The names of countries where the CIA set up so-called black site prisons have also been redacted."Exposing details of past intelligence cooperation with specific foreign governments could jeopardize current relationships with those governments, cause domestic political upheaval in those countries, and undermine the willingness of foreign intelligence services to work with America in the future," the person familiar with the administration's redactions said.
  • The CIA, which has responded to the Senate's report with a 122-page rebuttal, does not wholly disagree with the Intelligence Committee's findings. But there are vehement disagreements the CIA has with the committee over certain assertions the panel has made involving 10 detainees. The rebuttal includes a list of recommendations the agency intends to implement. The CIA response does not defend the use of torture techniques and it adds that there were instances when the value of intelligence was inflated.With that said, several committee staffers say that the CIA's response asserts that all of the intelligence obtained from detainees was valuable and saved lives. It also says there is no way to determine whether interrogators would have been able to obtain intelligence if the detainee were not tortured.
  •  
    Let's keep in mind that the CIA agents' names that CIA wants to keep concealed are required to be arrested and prosecuted as war criminals by a treaty the U.S. is party to, the Convention against Torture and Other Cruel, Inhuman or Degrading Treatment or Punishment. E.g., in Article 6: " Upon being satisfied, after an examination of information available to it, that the circumstances so warrant, any State Party in whose territory a person alleged to have committed any offence referred to in article 4 is present shall take him into custody or take other legal measures to ensure his presence. The custody and other legal measures shall be as provided in the law of that State but may be continued only for such time as is necessary to enable any criminal or extradition proceedings to be instituted." But here we are presented with the CIA attempting to conceal the identities of its officials who committed torture and to retain them as active agents, rather than assisting in their arrest and prosecution. From the same treaty's Article 2: "1. Each State Party shall take effective legislative, administrative, judicial or other measures to prevent acts of torture in any territory under its jurisdiction. "2. No exceptional circumstances whatsoever, whether a state of war or a threat of war, internal political instability or any other public emergency, may be invoked as a justification of torture. "3. An order from a superior officer or a public authority may not be invoked as a justification of torture."  
Paul Merrell

Exclusive: This Is the ISIS Intel the U.S. Military Dumbed Down - The Daily Beast - 0 views

  • The intelligence pros said killing certain ISIS leaders might not diminish the group and that airstrikes might not be working. The bosses didn’t like those answers—not at all.Senior intelligence officials at the U.S. military’s Central Command demanded significant alterations to analysts’ reports that questioned whether airstrikes against the so-called Islamic State widely known as ISIS were damaging the group’s finances and its ability to launch attacks. But reports that showed the group being weakened by the U.S.-led air campaign received comparatively little scrutiny, The Daily Beast has learned. Senior CENTCOM intelligence officials who reviewed the critical reports sent them back to the analysts and ordered them to write new versions that included more footnotes and details to support their assessments, according to two officials familiar with a complaint levied by more than 50 analysts about intelligence manipulation by CENTCOM higher-ups.
  • In some cases, analysts were also urged to state that killing particular ISIS leaders and key officials would diminish the group and lead to its collapse. Many analysts, however, didn’t believe that simply taking out top ISIS leaders would have an enduring effect on overall operations. “There was the reality on the ground but it was not as rosy as [the leadership] wanted it to be,” a defense official familiar with the complaint told The Daily Beast. “The challenge was assessing whether the glass was half empty, not half full.”Some analysts have also complained that they felt “bullied” into reaching conclusions favored by their bosses, two separate sources familiar with analysts’ complaints said. The written and verbal pressure created a climate at CENTCOM in which analysts felt they had to self-censor some of their reports.
  • Army General Lloyd Austin came under withering bipartisan criticism on Wednesday when he testified before the Senate Armed Services Committee that after spending at least $43 million over a 10-month period, the U.S. had trained only nine fighters to confront ISIS in Syria. Senators were dumbfounded that the nearly year-long effort had produced such paltry results, calling it “a joke” and “an abject failure.”
  • ...3 more annotations...
  • Some of the analysts have also accused their bosses of changing the reports in order to appeal to what they perceived as the Obama administration’s official line that the anti-ISIS campaign was making progress and would eventually end with the group’s destruction.Lawmakers and even presidential candidates seized on the allegations of politicizing intelligence as the White House tried to distance itself from the very strategy it has been pursuing.
  • Meanwhile, Pentagon investigators are examining the back-and-forth between the intelligence bosses at CENTCOM and the analysts, which created a paper trail. Favorable reports had fewer comments written on them, and requests that were more critical showed heavy questioning, the two officials said. The altering of intelligence led to reports that overstated the damage that U.S. strikes had on specific ISIS targets. For instance, strikes on oil refineries and equipment were said to have done more damage to the group’s financing of operations through illicit oil sales than the analysts believed. Also, strikes on military equipment were said to have set back the group’s ability to wage combat operations, when the analysts believed that wasn’t always the case.The altered reports made ISIS seem financially weakened and less capable of launching attacks, the analysts allege.
  • The CENTCOM supervisors “did not like the reports on the impact [of the airstrikes] because they didn’t believe it,” one military adviser familiar with CENTCOM operations told The Daily Beast. The Defense Department inspector general has been conducting interviews at CENTCOM headquarters in Tampa, Florida, in order to determine who in the command’s intelligence directorate may have distorted or manipulated the intelligence reports, some of which eventually made their way into materials briefed to President Obama. Investigators have pulled CENTCOM personnel one by one into private interviews to get to the bottom of the allegations and determine who was ultimately responsible for changing intelligence reports, according to individuals with knowledge of the investigation. The inspector general has confirmed that the investigation is focused on the CENTCOM intelligence directorate, or J2. Multiple sources told The Daily Beast that the head of intelligence, Army Major General Steven Grove, is named in the complaint, as are several other senior officials at CENTCOM. The tone of the complaint is said to be harsh and highly critical of senior officials’ leadership and actions.
Paul Merrell

James Clapper Confirms VADM Mike Rogers Needlessly Obfuscated in Confirmation Hearing |... - 0 views

  • On Friday, James Clapper finally provided Ron Wyden an unclassified response to a question he posed on January 29, admitting that the NSA conducts back door searches. (via Charlie Savage) As reflected in the August 2013 Semiannual Assessment of Compliance with Procedures and Guidelines Issued Pursuant to Section 702, which we declassified and released on August 21, 2013, there have been queries, using U.S. person identifiers, of communications lawfully acquired to obtain foreign intelligence by targeting non U.S. persons reasonably believed to be located outside the U.S. pursuant to Section 702 of FISA. It has taken just 9 months for Clapper to admit that, contrary to months of denials, the NSA (and FBI, which he doesn’t confirm but which the Report makes clear, as well as the CIA) can get the content of Americans’ communications without a warrant. But Clapper’s admission that this fact was declassified in August should disqualify Vice Admiral Mike Rogers from confirmation as CyberComm head (I believe he started serving as DIRNSA head, which doesn’t require confirmation, yesterday). Because it means Rogers refused to answer a question the response to which was already declassified.
  • Udall: If I might, in looking ahead, I want to turn to the 702 program and ask a policy question about the authorities under Section 702 that’s written into the FISA Amendments Act. The Committee asked your understanding of the legal rationale for NASA [sic] to search through data acquired under Section 702 using US person identifiers without probable cause. You replied the NASA–the NSA’s court approved procedures only permit searches of this lawfully acquired data using US person identifiers for valid foreign intelligence purposes and under the oversight of the Justice Department and the DNI. The statute’s written to anticipate the incidental collection of Americans’ communications in the course of collecting the communications of foreigners reasonably believed to be located overseas. But the focus of that collection is clearly intended to be foreigners’ communications, not Americans. But declassified court documents show that in 2011 the NSA sought and obtained the authority to go through communications collected under Section 702 and conduct warrantless searches for the communications of specific Americans. Now, my question is simple. Have any of those searches been conducted?
  • Rogers: I apologize Sir, I’m not in a position to answer that as the nominee. Udall: You–yes. Rogers: But if you would like me to come back to you in the future if confirmed to be able to specifically address that question I will be glad to do so, Sir. Udall: Let me follow up on that. You may recall that Director Clapper was asked this question in a hearing earlier this year and he didn’t believe that an open forum was the appropriate setting in which to discuss these issues. The problem that I have, Senator Wyden’s had, and others is that we’ve tried in various ways to get an unclassified answer — simple answer, yes or no — to the question. We want to have an answer because it relates — the answer does — to Americans’ privacy. Can you commit to answering the question before the Committee votes on your nomination?
  • ...3 more annotations...
  • Rogers: Sir, I believe that one of my challenges as the Director, if confirmed, is how do we engage the American people — and by extension their representatives — in a dialogue in which they have a level of comfort as to what we are doing and why. That is no insignificant challenge for those of us with an intelligence background, to be honest. But I believe that one of the takeaways from the situation over the last few months has been as an intelligence professional, as a senior intelligence leader, I have to be capable of communicating in a way that we are doing and why to the greatest extent possible. That perhaps the compromise is, if it comes to the how we do things, and the specifics, those are perhaps best addressed in classified sessions, but that one of my challenges is I have to be able to speak in broad terms in a way that most people can understand. And I look forward to that challenge. Udall: I’m going to continue asking that question and I look forward to working with you to rebuild the confidence. [my emphasis]
  • I assume that now that Clapper has given him the okay to discuss unclassified topics with Congress, Rogers will now provide a forthright answer, all the while claiming he was ignorant about the answer at the time (fine! then make me DIRNSA because I know more about it!). But Rogers’ response went far beyond such an answer. He refused — not just in the hearing but even after it — to commit to answering a question with a completely unclassified answer. And as I pointed out in this post, his written answers were even more obfuscatory. I don’t get a vote. But I think this should disqualify him as a nominee.
  • Update: Here’s the exchange in Rogers’ questions for the record on back door searches. What is your understanding of the legal rationale for NSA to search through data acquired under section 702 using U.S. Persons identifiers without probable cause? Information acquired by NSA under Section 702 of FI SA must be handled in strict accordance with minimization procedures adopted by the Attorney General and approved by the Foreign Intelligence Surveillance Court. As required by the statute and certifications approving Section 702 acquisitions, such activities must be limite d to targeting non-U.S. persons reasonably believed to be located outside the United States . NSA’s Court-approved procedures only permit searches of this lawfully acquired data using U.S. person identifiers for valid foreign intelligence purposes and under the oversight of the Department of Justice and Office of Director of National Intelligence.
‹ Previous 21 - 40 of 693 Next › Last »
Showing 20 items per page