Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged foreign-intelligence

Rss Feed Group items tagged

Paul Merrell

NSA 'secret backdoor' paved way to U.S. phone, e-mail snooping | Politics and Law - CNE... - 0 views

  • The National Security Agency created a "secret backdoor" so its massive databases could be searched for the contents of U.S. citizens' confidential phone calls and e-mail messages without a warrant, according to the latest classified documents leaked by Edward Snowden. A report in the Guardian on Friday quoted Sen. Ron Wyden, an Oregon Democrat who serves on the Senate Intelligence Committee, as saying the secret rule offers a loophole allowing "warrantless searches for the phone calls or emails of law-abiding Americans." That appears to confirm what Rep. Jerrold Nadler, a New York Democrat, said in June after receiving a classified briefing from administration officials a few days earlier on the extent of the NSA's domestic surveillance operations. If the NSA wants "to listen to the phone," an analyst's decision is sufficient, without any other legal authorization required, Nadler said he had been told during the briefing. "I was rather startled," said Nadler, an attorney who serves on the House Judiciary Committee.
  • FBI Director Robert Mueller responded by assuring Nadler, according to a transcript of the hearing, that to "listen to the phone," the government would need "a particularized order" from the Foreign Intelligence Surveillance Court -- a claim that is contradicted by today's Guardian report and other documents. Mueller has been succeeded by James Comey, who was confirmed last month by the Senate. In response to a CNET article at the time, Director of National Intelligence James Clapper released a statement saying: "The statement that a single analyst can eavesdrop on domestic communications without proper legal authorization is incorrect and was not briefed to Congress." Clapper never elaborated, however, on what "proper" authorization would be. Today's top-secret document leaked by Snowden reveals that "procedures approved on 3 October 2011 now allow for use of certain United States person names and identifiers as query terms when reviewing collected FAA 702 data."
  • FAA 702 is a reference to section 702 of a 2008 law that amended the Foreign Intelligence Surveillance Act. Those amendments created a warrantless surveillance process that could be employed by NSA analysts, but Congress never intended it to be used domestically against American citizens: A congressional report accompanying the law claimed it allows electronic surveillance only of "persons located outside the United States in order to acquire foreign intelligence information." In reality, though, the Obama Justice Department has devised secret interpretations of FAA 702 carving out loopholes in what were intended to be strict privacy safeguards. One loophole revealed in June shows that NSA, CIA, and FBI analysts are granted broad access to data vacuumed up by the world's most powerful intelligence agency -- but are supposed to follow certain "targeting" and "minimization" procedures to limit the number of Americans who become individual targets of warrantless surveillance.
  • ...2 more annotations...
  • Today's disclosures appear to be at odds with what President Obama has said over the last two months in defense of NSA surveillance. "What I can say unequivocally is that if you are a U.S. person, the NSA cannot listen to your telephone calls and the NSA cannot target your e-mails," Obama has said. Earlier reports have indicated that the NSA has the ability to record nearly all domestic and international phone calls -- in case an analyst needed to access the recordings in the future. A Wired magazine article last year disclosed that the NSA has established "listening posts" that allow the agency to collect and sift through billions of phone calls through a massive new data center in Utah, "whether they originate within the country or overseas." That includes not just metadata, but also the contents of the communications.
  • AT&T and other telecommunications companies that allow the NSA to tap into their fiber links receive absolute immunity from civil liability or criminal prosecution, thanks to Section 702 of the FISA Amendments Act, which Congress renewed in 2012. It says that any civil lawsuit "against any person for providing assistance to an element of the intelligence community...shall be promptly dismissed." Section 702 of the law says surveillance may be authorized by the attorney general and director of national intelligence without prior approval by the secret Foreign Intelligence Surveillance Court -- in practice, this means analysts at the NSA and other agencies with intelligence functions -- as long as minimization requirements and general procedures blessed by the court are followed. It's unclear whether the court has approved the "secret backdoor" allowing Americans' e-mail and phone messages to be targeted for domestic surveillance.
Paul Merrell

Three House panels to investigate whether ISIS intelligence was cooked | TheHill - 0 views

  • Three House committees will jointly investigate allegations U.S. Central Command altered intelligence reports, their chairmen announced Friday.“Today, the House Armed Services Committee, the House Permanent Select Committee on Intelligence and the House Appropriations Committee established a Joint Task Force to investigate allegations that senior U.S. Central Command (CENTCOM) officials manipulated intelligence products,” Reps. David Nunes (R-Calif.), Mac Thornberry (R-Texas) and Rodney Frelinghuysen (R-N.J.) said in a joint statement.Analysts at Centcom have alleged that senior officials altered their reports to paint a rosier picture of the fight against the Islamic State in Iraq and Syria (ISIS).The Pentagon’s inspector general is already conducting an investigation into the allegations.Magazine Foreign Policy reported last month that the task force would be formed.
  • In their statement, Nunes, Thornberry and Frelinghuysen said the task force would look into the specific allegations, as well as whether there are “systemic problems across the intelligence enterprise in CENTCOM or any other pertinent intelligence organizations.”Reps. Ken Calvert (R-Calif.), Mike Pompeo (R-Kan.) and Brad Wenstrup (R-Ohio) will lead the investigation.“Any accusation of intelligence being altered to fit a political narrative must be fully investigated and those responsible held accountable,” Pompeo said in a written statement. “This matters both to those who gather the intelligence, often at great risk to their personal safety, and to the policymakers who use this intelligence to make what are often life threatening decisions.”In an interview on Fox News, Thornberry said the issue was too important to wait to investigate until after the inspector general.
  • Democrats are participating, too, he said in the interview.  “They are participating in the investigation,” he said. “Their staff had been involved in the discussions we have had with a variety of folks from Centcom and elsewhere. So again we want to be careful and do it right, but it's important.” The task force expects to have preliminary results early next year, according to the chairmen’s statement.
Paul Merrell

Remarks by Director David H. Petraeus at In-Q-Tel CEO Summit - Central Intelligence Agency - 0 views

  • In any event, our partnership with In-Q-Tel is essential to helping identify and deliver groundbreaking technologies with mission-critical applications to the CIA and to our partner agencies.
  • As you know, our Agency has a global charter to collect intelligence. It’s our job to ensure that challenges that arise in any corner of the world are not surprises to the President or to other policymakers. Certainly, we will continue relentlessly to pursue terrorists and support the troops in several different theaters. That is imperative, and the last year has seen considerable achievement in the fight against al-Qa‘ida and its affiliates. But, to use the kids’ soccer analogy, we cannot turn the counterterrorist fight into a game of magnetball, in which the leadership is always focused on the counterterror mission. Everyone can’t flock to the ball and lose sight of the rest of the field—the whole rest of the world. And it’s an enormous field to cover:  again, the whole world, with proliferation of weapons and technology, cyber threats, counterintelligence threats, the next developments in the evolution of the Arab Spring, Iran, North Korea, China, illegal narcotics, emerging powers, non-state organizations, and even lone wolves. Our duty is nothing less than to be on top of every potential foreign challenge and opportunity facing the United States—and we now have to do it without the steady budget growth we saw in the years after 9/11. And this is why my job is so intellectually stimulating.
  • First, given the digital transparency I just mentioned, we have to rethink our notions of identity and secrecy. In the digital world, data is everywhere, as you all know well. Data is created constantly, often unknowingly and without permission. Every byte left behind reveals information about location, habits, and, by extrapolation, intent and probable behavior. The number of data points that can be collected is virtually limitless—presenting, of course, both enormous intelligence opportunities and equally large counterintelligence challenges. We must, for example, figure out how to protect the identity of our officers who increasingly have a digital footprint from birth, given that proud parents document the arrival and growth of their future CIA officer in all forms of social media that the world can access for decades to come. Moreover, we have to figure out how to create the digital footprint for new identities for some officers. As you all know, exploiting the intelligence opportunities—which is an easier subject to discuss in an unclassified setting than the counterintelligence challenges—will require a new class of in-place and remote sensors that operate across the electromagnetic spectrum. Moreover, these sensors will be increasingly interconnected.
  • ...2 more annotations...
  • The current “Internet of PCs” will move, of course, toward an “Internet of Things”—of devices of all types—50 to 100 billion of which will be connected to the Internet by 2020. As you know, whereas machines in the 19th century learned to do, and those in the 20th century learned to think at a rudimentary level, in the 21st century, they are learning to perceive—to actually sense and respond. Key applications developed by our In-Q-Tel investment companies are focused on technologies that are driving the Internet of Things. These include: Item identification, or devices engaged in tagging; Sensors and wireless sensor networks—devices that indeed sense and respond; Embedded systems—those that think and evaluate; And, finally, nanotechnology, allowing these devices to be small enough to function virtually anywhere.
  • Items of interest will be located, identified, monitored, and remotely controlled through technologies such as radio-frequency identification, sensor networks, tiny embedded servers, and energy harvesters—all connected to the next-generation Internet using abundant, low cost, and high-power computing—the latter now going to cloud computing, in many areas greater and greater supercomputing, and, ultimately, heading to quantum computing. In practice, these technologies could lead to rapid integration of data from closed societies and provide near-continuous, persistent monitoring of virtually anywhere we choose. “Transformational” is an overused word, but I do believe it properly applies to these technologies, particularly to their effect on clandestine tradecraft. Taken together, these developments change our notions of secrecy and create innumerable challenges—as well as opportunities.
  •  
    I missed this gem before, from March 1, 2012. Speech by then-CIA chief Gen. David Patraeus to a group of reps. from ICT startups who are employed by CIA through its In-Q-Tel technology development non-profit corp. See https://www.iqt.org/about-iqt/ Patraeus announces that the Internet of Things (devices of all kinds) is becoming an intelligence target. And that boils down to everything from your clock radio to your home's climate control system and more becoming a potential intelligence source. If the CIA is investing in this, you can bit your bippy that NSA is too; Patraeus mentions that "partner agencies" are also receiving applications via the In-Q-Tel investments.  Finally, Patraeus also acknowledges that the intelligence mission extends far beyond counter-terrorism, offering some detail. So it seems that before the Snowden leaks his the press, the intelligence mission was not all about counter-terrorism.
Paul Merrell

ECHELON: NSA's Global Electronic Interception - 0 views

  • 12 August 1988  Cover, pages 10-12   Somebody's  listening  . . . and they don't give a damn about personal privacy or commercial confidence. Project 415 is a top-secret new global surveillance system. It can tap into a billion calls a year in the UK alone. Inside Duncan Campbell on how spying entered the 21st century . . .  They've got it taped In the booming surveillance industry they spy on whom they wish, when they wish, protected by barriers of secrecy, fortified by billions of pounds worth of high, high technology. Duncan Campbell reports from the United States on the secret Anglo-American plan for a global electronic spy system for the 21st century capable of listening in to most of us most of the time   American, British and Allied intelligence agencies are soon to embark on a massive, billion-dollar expansion of their global electronic surveillance system. According to information given recently in secret to the US Congress, the surveillance system will enable the agencies to monitor and analyse civilian communications into the 21st century. Identified for the moment as Project P415, the system will be run by the US National Security Agency (NSA). But the intelligence agencies of many other countries will be closely involved with the new network, including those from Britain, Australia, Germany and Japan--and, surprisingly, the People's Republic of China. New satellite stations and monitoring centres are to be built around the world, and a chain of new satellites launched, so that NSA and its British counterpart, the Government Communications Headquarters (GCHQ) at Cheltenham, may keep abreast of the burgeoning international telecommunications traffic.
  • Both the new and existing surveillance systems are highly computerised. They rely on near total interception of international commercial and satellite communications in order to locate the telephone or other messages of target individuals. Last month, a US newspaper, the Cleveland Plain Dealer, revealed that the system had been used to target the telephone calls of a US Senator, Strom Thurmond. The fact that Thurmond, a southern Republican and usually a staunch supporter of the Reagan administration, is said to have been a target has raised fears that the NSA has restored domestic, electronic, surveillance programmes. These were originally exposed and criticised during the Watergate investigations, and their closure ordered by President Carter. After talking to the NSA, Thurmond later told the Plain Dealer that he did not believe the allegation. But Thurmond, a right-wing Republican, may have been unwilling to rock the boat. Staff members of the Permanent Select Committee on Intelligence said that staff were "digging into it" despite the "stratospheric security classification" of all the systems involved. The Congressional officials were first told of the Thurmond interception by a former employee of the Lockheed Space and Missiles Corporation, Margaret Newsham, who now lives in Sunnyvale, California. Newsham had originally given separate testimony and filed a lawsuit concerning corruption and mis-spending on other US government "black" projects. She has worked in the US and Britain for two corporations which manufacture signal intelligence computers, satellites and interception equipment for NSA, Ford Aerospace and Lockheed. Citing a special Executive Order signed by President Reagan. she told me last month that she could not and would not discuss classified information with journalists. But according to Washington sources (and the report in the Plain Dealer, she informed a US Congressman that the Thurmond interception took place at Menwith Hill, and that she p
  • A secret listening agreement, called UKUSA (UK-USA), assigns parts of the globe to each participating agency. GCHQ at Cheltenham is the co-ordinating centre for Europe, Africa and the Soviet Union (west of the Ural Mountains). The NSA covers the rest of the Soviet Union and most of the Americas. Australia--where another station in the NSA listening network is located in the outback--co-ordinates the electronic monitoring of the South Pacific, and South East Asia.
  • ...6 more annotations...
  • During the Watergate affair. it was revealed that NSA, in collaboration with GCHQ, had routinely intercepted the international communications of prominent anti-Vietnam war leaders such as Jane Fonda and Dr Benjamin Spock. Another target was former Black Panther leader Eldridge Cleaver. Then in the late 1970s, it was revealed that President Carter had ordered NSA to stop obtaining "back door" intelligence about US political figures through swapping intelligence data with GCHQ Cheltenham.
  • ince then, investigators have subpoenaed other witnesses and asked them to provide the complete plans and manuals of the ECHELON system and related projects. The plans and blueprints are said to show that targeting of US political figures would not occur by accident. but was designed into the system from the start. While working at Menwith Hill, Newsham is reported to have said that she was able to listen through earphones to telephone calls being monitored at the base. Other conversations that she heard were in Russian. After leaving Menwith Hill, she continued to have access to full details of Menwith Hill operations from a position as software manager for more than a dozen VAX computers at Menwith which operate the ECHELON system. Newsham refused last month to discuss classified details of her career, except with cleared Congressional officials. But it has been publicly acknowledged that she worked on a large range of so-called "black" US intelligence programmes, whose funds are concealed inside the costs of other defence projects. She was fired from Lockheed four years ago after complaining about the corruption, and sexual harassment.
  • he largest overseas station in the Project P415 network is the US satellite and communications base at Menwith Hill. near Harrogate in Yorkshire. It is run undercover by the NSA and taps into all Britain's main national and international communications networks (New Statesman, 7 August 1980). Although high technology stations such as Menwith Hill are primarily intended to monitor international communications, according to US experts their capability can be, and has been, turned inwards on domestic traffic. Menwith Hill, in particular, has been accused by a former employee of gross corruption and the monitoring of domestic calls. The vast international global eavesdropping network has existed since shortly after the second world war, when the US, Britain, Canada, Australia and New Zealand signed a secret agreement on signals intelligence, or "sigint". It was anticipated, correctly, that electronic monitoring of communications signals would continue to be the largest and most important form of post-war secret intelligence, as it had been through the war. Although it is impossible for analysts to listen to all but a small fraction of the billions of telephone calls, and other signals which might contain "significant" information, a network of monitoring stations in Britain and elsewhere is able to tap all international and some domestic communications circuits, and sift out messages which sound interesting. Computers automatically analyse every telex message or data signal, and can also identify calls to, say, a target telephone number in London, no matter from which country they originate.
  • If Margaret Newsham's testimony is confirmed by the ongoing Congressional investigation, then the NSA has been behaving illegally under US law--unless it can prove either that Thurmond's call was intercepted completely accidentally, or that the highly patriotic Senator is actually a foreign spy or terrorist. Moreover NSA's international phone tapping operations from Menwith Hill and at Morwenstow, Cornwall, can only be legal in Britain if special warrants have been issued by the Secretary of State to specify that American intelligence agents are persons to whom information from intercepts must or should be given. This can not be established, since the government has always refused to publish any details of the targets or recipients of specific interception warrants.
  • Both British and American domestic communications are also being targeted and intercepted by the ECHELON network, the US investigators have been told. The agencies are alleged to have collaborated not only on targeting and interception, but also on the monitoring of domestic UK communications. Special teams from GCHQ Cheltenham have been flown in secretly in the last few years to a computer centre in Silicon Valley near San Francisco for training on the special computer systems that carry out both domestic and international interception.
  • The centre near San Francisco has also been used to train staff from the "Technical Department" of the People's Liberation Army General Staff, which is the Chinese version of GCHQ. The Department operates two ultra-secret joint US-Chinese listening stations in the Xinjiang Uighur Autonomous Region, close to the Soviet Siberian border. Allegedly, such surveillance systems are only used to target Soviet or Warsaw Pact communications signals, and those suspected of involvement in espionage and terrorism. But those involved in ECHELON have stressed to Congress that there are no formal controls over who may be targeted. And I have been told that junior intelligence staff can feed target names into the system at all levels, without any check on their authority to do so. Witnesses giving evidence to the Congressional inquiry have discussed whether the Democratic presidential contender Jesse Jackson was targeted; one source implied that he had been. Even test engineers from manufacturing companies are able to listen in on private citizens' communications, the inquiry was told. But because of the special Executive Order signed by President Reagan, US intelligence operatives who know about such politically sensitive operations face jail sentences if they speak out--despite the constitutional American protection of freedom of speech and of the press. And in Britain, as we know, the government is in the process of tightening the Official Secrets Act to make the publication of any information from intelligence officials automatically a crime, even if the information had already been published, or had appeared overseas first.
  •  
    From the original series of ariticles * in 1988 * that first brought the Five Eyes' nation's ECHELON surveillance project to light. But note the paragarph about the disclosure during the Watergate scandal (early 1970s) about domestic digital surveillance of antiwar leaders and Black Panther leader Eldridge Cleaver.    
Paul Merrell

Bulk Collection Under Section 215 Has Ended… What's Next? | Just Security - 0 views

  • The first (and thus far only) roll-back of post-9/11 surveillance authorities was implemented over the weekend: The National Security Agency shuttered its program for collecting and holding the metadata of Americans’ phone calls under Section 215 of the Patriot Act. While bulk collection under Section 215 has ended, the government can obtain access to this information under the procedures specified in the USA Freedom Act. Indeed, some experts have argued that the Agency likely has access to more metadata because its earlier dragnet didn’t cover cell phones or Internet calling. In addition, the metadata of calls made by an individual in the United States to someone overseas and vice versa can still be collected in bulk — this takes place abroad under Executive Order 12333. No doubt the NSA wishes that this was the end of the surveillance reform story and the Paris attacks initially gave them an opening. John Brennan, the Director of the CIA, implied that the attacks were somehow related to “hand wringing” about spying and Sen. Tom Cotton (R-Ark.) introduced a bill to delay the shut down of the 215 program. Opponents of encryption were quick to say: “I told you so.”
  • But the facts that have emerged thus far tell a different story. It appears that much of the planning took place IRL (that’s “in real life” for those of you who don’t have teenagers). The attackers, several of whom were on law enforcement’s radar, communicated openly over the Internet. If France ever has a 9/11 Commission-type inquiry, it could well conclude that the Paris attacks were a failure of the intelligence agencies rather than a failure of intelligence authorities. Despite the passage of the USA Freedom Act, US surveillance authorities have remained largely intact. Section 702 of the FISA Amendments Act — which is the basis of programs like PRISM and the NSA’s Upstream collection of information from Internet cables — sunsets in the summer of 2017. While it’s difficult to predict the political environment that far out, meaningful reform of Section 702 faces significant obstacles. Unlike the Section 215 program, which was clearly aimed at Americans, Section 702 is supposedly targeted at foreigners and only picks up information about Americans “incidentally.” The NSA has refused to provide an estimate of how many Americans’ information it collects under Section 702, despite repeated requests from lawmakers and most recently a large cohort of advocates. The Section 215 program was held illegal by two federal courts (here and here), but civil attempts to challenge Section 702 have run into standing barriers. Finally, while two review panels concluded that the Section 215 program provided little counterterrorism benefit (here and here), they found that the Section 702 program had been useful.
  • There is, nonetheless, some pressure to narrow the reach of Section 702. The recent decision by the European Court of Justice in the safe harbor case suggests that data flows between Europe and the US may be restricted unless the PRISM program is modified to protect the information of Europeans (see here, here, and here for discussion of the decision and reform options). Pressure from Internet companies whose business is suffering — estimates run to the tune of $35 to 180 billion — as a result of disclosures about NSA spying may also nudge lawmakers towards reform. One of the courts currently considering criminal cases which rely on evidence derived from Section 702 surveillance may hold the program unconstitutional either on the basis of the Fourth Amendment or Article III for the reasons set out in this Brennan Center report. A federal district court in Colorado recently rejected such a challenge, although as explained in Steve’s post, the decision did not seriously explore the issues. Further litigation in the European courts too could have an impact on the debate.
  • ...2 more annotations...
  • The US intelligence community’s broadest surveillance authorities are enshrined in Executive Order 12333, which primarily covers the interception of electronic communications overseas. The Order authorizes the collection, retention, and dissemination of “foreign intelligence” information, which includes information “relating to the capabilities, intentions or activities of foreign powers, organizations or persons.” In other words, so long as they are operating outside the US, intelligence agencies are authorized to collect information about any foreign person — and, of course, any Americans with whom they communicate. The NSA has conceded that EO 12333 is the basis of most of its surveillance. While public information about these programs is limited, a few highlights give a sense of the breadth of EO 12333 operations: The NSA gathers information about every cell phone call made to, from, and within the Bahamas, Mexico, Kenya, the Philippines, and Afghanistan, and possibly other countries. A joint US-UK program tapped into the cables connecting internal Yahoo and Google networks to gather e-mail address books and contact lists from their customers. Another US-UK collaboration collected images from video chats among Yahoo users and possibly other webcam services. The NSA collects both the content and metadata of hundreds of millions of text messages from around the world. By tapping into the cables that connect global networks, the NSA has created a database of the location of hundreds of millions of mobile phones outside the US.
  • Given its scope, EO 12333 is clearly critical to those seeking serious surveillance reform. The path to reform is, however, less clear. There is no sunset provision that requires action by Congress and creates an opportunity for exposing privacy risks. Even in the unlikely event that Congress was inclined to intervene, it would have to address questions about the extent of its constitutional authority to regulate overseas surveillance. To the best of my knowledge, there is no litigation challenging EO 12333 and the government doesn’t give notice to criminal defendants when it uses evidence derived from surveillance under the order, so the likelihood of a court ruling is slim. The Privacy and Civil Liberties Oversight Board is currently reviewing two programs under EO 12333, but it is anticipated that much of its report will be classified (although it has promised a less detailed unclassified version as well). While the short-term outlook for additional surveillance reform is challenging, from a longer-term perspective, the distinctions that our law makes between Americans and non-Americans and between domestic and foreign collection cannot stand indefinitely. If the Fourth Amendment is to meaningfully protect Americans’ privacy, the courts and Congress must come to grips with this reality.
Paul Merrell

U.S. military confirms rebels had sarin - 1 views

  • As part of the Obama administration’s repeated insistence – though without offering proof – that the recent sarin gas attack near Damascus was the work of the Assad regime, the administration has downplayed or denied the possibility that al-Qaida-linked Syrian rebels could produce deadly chemical weapons. However, in a classified document just obtained by WND, the U.S. military confirms that sarin was confiscated earlier this year from members of the Jabhat al-Nusra Front, the most influential of the rebel Islamists fighting in Syria. The document says sarin from al-Qaida in Iraq made its way into Turkey and that while some was seized, more could have been used in an attack last March on civilians and Syrian military soldiers in Aleppo.
  • The document, classified Secret/Noforn – “Not for foreign distribution” – came from the U.S. intelligence community’s National Ground Intelligence Center, or NGIC, and was made available to WND Tuesday. It revealed that AQI had produced a “bench-scale” form of sarin in Iraq and then transferred it to Turkey. A U.S. military source said there were a number of interrogations as well as some clan reports as part of what the document said were “50 general indicators to monitor progress and characterize the state of the ANF/AQI-associated Sarin chemical warfare agent developing effort.” “This (document) depicts our assessment of the status of effort at its peak – primarily research and procurement activities – when disrupted in late May 2013 with the arrest of several key individuals in Iraq and Turkey,” the document said. “Future reporting of indicators not previously observed would suggest that the effort continues to advance despite the arrests,” the NGIC document said.
  • This seizure followed a chemical weapons attack in March on the Khan al-Assal area of rural Aleppo, Syria. In that attack, some 26 people and Syrian government forces were killed by what was determined to be sarin gas, delivered by a rocket attack. The Syrian government called for an investigation by the United Nations. Damascus claimed al-Qaida fighters were behind the attack, also alleging that Turkey was involved. “The rocket came from a place controlled by the terrorists and which is located close to the Turkish territory,” according to a statement from Damascus. “One can assume that the weapon came from Turkey.” The report of the U.S. intelligence community’s NGIC reinforces a preliminary U.N. investigation of the attack in Aleppo which said the evidence pointed to Syrian rebels. It also appears to bolster allegations in a 100-page report on an investigation turned over to the U.N. by Russia. The report concluded the Syrian rebels – not the Syrian government – had used the nerve agent sarin in the March chemical weapons attack in Aleppo.
  • ...7 more annotations...
  • The May 2013 seizure occurred when Turkish security forces discovered a two-kilogram cylinder with sarin gas while searching homes of Syrian militants from the al-Qaida-linked Jabhat al-Nusra Front following their initial detention. The sarin gas was found in the homes of suspected Syrian Islamic radicals detained in the southern provinces of Adana and Mersia. Some 12 suspected members of the al-Nusra Front were arrested. At the time, they were described by Turkish special anti-terror forces as the “most aggressive and successful arm” of the Syrian rebels. In the seizure, Turkish anti-terror police also found a cache of weapons, documents and digital data. At the time of the arrest, the Russians called for a thorough investigation of the detained Syrian militants found in possession of sarin gas.
  • While the contents of the report have yet to be released, sources tell WND the documentation indicates that deadly sarin poison gas was manufactured in a Sunni-controlled region of Iraq and then transported to Turkey for use by the Syrian opposition, whose ranks have swelled with members of al-Qaida and affiliated groups. The documentation that the U.N. received from the Russians indicated specifically that the sarin gas was supplied to Sunni foreign fighters by a Saddam-era general working under the outlawed Iraqi Baath party leader, Izzat Ibrahim al-Douri. Al-Douri was a top aide to Saddam Hussein before he was deposed as Iraqi president. The sarin nerve gas used in the Allepo attack, sources say, had been prepared by former Iraqi Military Industries Brig. Gen. Adnan al-Dulaimi. It then was supplied to Baath-affiliated foreign fighters of the Sunni and Saudi Arabian-backed al-Nusra Front in Aleppo, with Turkey’s cooperation, through the Turkish town of Antakya in Hatay Province. The source who brought out the documentation now in the hands of the U.N. is said to have been an aide to al-Douri. Al-Dulaimi was a major player in Saddam’s chemical weapons production projects, the former aide said. Moreover, Al-Dulaimi has been working in the Sunni-controlled region of northwestern Iraq where the outlawed Baath party now is located and produces the sarin.
  • The NGIC depiction of the variety of sarin as “bench-scale” reinforces an analysis by terrorism expert Yossef Bodansky, who said the recent findings on the chemical weapons attack of Aug. 21 on the outskirts of Damascus, Syria, was “indeed a self-inflicted attack” by the Syrian opposition to provoke U.S. and military intervention in Syria.
  • The terrorism expert said that the jihadist movement has technologies which have been confirmed in captured jihadist labs in both Turkey and Iraq, as well as from the wealth of data recovered from al-Qaida in Afghanistan in 2001 and 2002. He added that the projectiles shown by the opposition, which were tested by U.N. inspectors, are not standard weapons of the Syrian army.
  • Now, a former analyst for the Central Intelligence Agency, Ray McGovern, similarly backs the claim that the Syrian rebels perpetrated the poison gas attack on Aug. 21 McGovern was one of a number of veteran intelligence professionals who recently signed a letter to Obama saying that Damascus wasn’t behind the Aug. 21 chemical attack. As WND recently reported, former U.S. intelligence analysts claim current intelligence analysts have told them Assad was not responsible for the Aug. 21 poison gas attack, saying there was a “growing body of evidence” that reveals the incident was a pre-planned provocation by the Syrian opposition.
  • “Initial meetings between senior opposition military commanders and Qatari, Turkish and U.S. intelligence officials took place at the converted Turkish military garrison in Antakya, Hatay Province, now used as the command center and headquarters of the Free Syrian Army and their foreign sponsors,” the analysts said.
  • The VIPS memo to Obama reinforces separate videos, which show foreign fighters associated with the Syrian opposition firing artillery canisters of poison gas. One video shows Nadee Baloosh, a member of an al-Qaida-affiliated group Rioyadh al-Abdeen, admitting to the use of chemical weapons. In the video clip, al-Abdeen, who is in the Latakia area of Syria, said his forces used “chemicals which produce lethal and deadly gases that I possess.”
Paul Merrell

Putin signs "undesirable NGOs" Bill into Law | nsnbc international - 0 views

  • Russian President Vladimir Putin has signed a bill, enabling the designation of foreign and foreign-funded NGOs as undesirables after the bill passed both the Lower and Upper House of Parliament.
  • The bill authorizes the designation of foreign and foreign funded non-profit as well as for profit NGOs as “undesirables” on grounds of “national security. The bill passed the second reading in Russia’s Lower House of Parliament (State Duma), last week and was approved by the Upper House of Parliament, the Federation Council. The bill had been proposed by legislators of the governing United Russia party of President Vladimir Putin, The passing of the bill in both houses of parliament and the signing of the bill by Putin was no surprise since United Russia has a majority in both chambers. The bill has been heavily criticized by foreign, particularly western media, western politicians and primarily western-based or funded NGOs, including Human Rights Watch, Amnesty International, among many others. One of the NGOs that is certain to fall under the provisions of the bill is USAID.
  • he new law follows up on a law that was adopted in 2012 that obliged foreign-funded non-governmental organizations to register as “foreign agents”. The law provides for declaring foreigners and foreign-funded NGOs as“undesirable”. Persons who are violating the newly adopted law could face a fine up to 10,000 dollar to be paid in local currency and up to six years imprisonment. Supporters of the bill are referring to the risk that foreign-funded NGOs could pose to the Russian Federation’s national security while critics maintain that the wording of the legislation and especially the term “undesirable” is ambiguous and opens the floodgates for the abuse of the law to crack down on legal and legitimate dissent.
  • ...5 more annotations...
  • While the wording and the use of “undesirable” is ambiguous and does pose legal problems as much as it opens the floodgates for the abuse of the legislation, there may be a good reason for keeping the wording ambiguous. Internationally acting NGOs have increasingly become “weaponized”; That is, that they have increasingly been utilized as tool for everything from supporting legitimate dissent to the organization of political violence and coup d’état. Another disturbing fact is that this pattern includes UN organizations such as the UN Interagency Framework Team for Preventive Action (Framework Team). Examples? Doctors Without Borders (MSF) played a key role in accusing the Syrian government for the use of chemical weapons, stating MSF sources. Later on the NGO had to admit that it had no staff in Damascus and exclusively relied on statements by “partners” in “rebel-held territories”.
  • Amnesty International for its part issued a report about alleged war crimes committed during NATO’s bombing of Libya in 2011. A 2012 report by Amnesty International claimed that Operation Unified Protector, authorized by UNSC Resolution 1973 has resulted in 55 documented cases of named civilian casualties, including 16 children and 14 women that were killed in air strikes in the capital Tripoli and the towns of Zliten, Majer, Sirte, and Brega. The low figure is utterly inconsistent with casualty figures provided by local NGOs as well as documented eyewitness reports. Two things are worth considering with regard to the Amnesty report. During the first night of the operation NATO forces launched over 100 cruise missiles into Tripoli alone.
  • The Director of Amnesty International at that time was Suzanne Nozzel, who also worked as adviser on U.S. government – NGO relations for the then U.S. Secretary of State Hillary Clinton.
  • While Human Right Watch does, indeed, engage in justified human rights advocacy, it has also been engaged in issuing strongly biased reports, in politicizing that “representatives are denied entry to e.g. Egypt”, while failing to mention that proper visa procedures had not been followed, and so forth. The most disturbing NGO may, however, be the UN Interagency Framework Team for Preventive Action. The Framework Team is largely privately funded with George Soros as one of the primary sponsors. The NGO under UN cover is “coordinating UN, governmental and non-governmental initiatives”.
  • The UN organization could undoubtedly be useful but it has also been sharply criticized for “fanning the flames” of the inter-communal violence in Myanmar’s Rakhine State, and for its active role in creating rather than preventing ethnic and sectarian disputes and violence in Nepal. In both the case of Myanmar and in the case of Nepal it is easy to establish ties between the Framework Team and Western or Western allied intelligence services. Criticism of the ambiguous wording of the new Russian legislation is, in other words, as justified as criticism of NGOs who prostitute themselves and the best intentions of the members at their base as pawns in geopolitical chess-games.
  •  
    More than understandable given the long history of the U.S. weaponizing NGOs in aid of its "color revolutions" strategy to overthrow governments in secular states and left-leaning democracies. The most recent examples are the successful U.S. coup in Ukraine and the thrice-failed coup attempts in Venezuela.  U.S. NGOs have been attempting to provoke such a coup in Russia for some time but have failed thus far because of Putin's immense popularity and a perhaps better-informed Russian public. The Russian people know they are under attack and have wisely closed ranks rather than falling for a divide-and-conquer strategy. Venezuela recently enacted similar legislation.  
Paul Merrell

In Hearing on Internet Surveillance, Nobody Knows How Many Americans Impacted in Data C... - 0 views

  • The Senate Judiciary Committee held an open hearing today on the FISA Amendments Act, the law that ostensibly authorizes the digital surveillance of hundreds of millions of people both in the United States and around the world. Section 702 of the law, scheduled to expire next year, is designed to allow U.S. intelligence services to collect signals intelligence on foreign targets related to our national security interests. However—thanks to the leaks of many whistleblowers including Edward Snowden, the work of investigative journalists, and statements by public officials—we now know that the FISA Amendments Act has been used to sweep up data on hundreds of millions of people who have no connection to a terrorist investigation, including countless Americans. What do we mean by “countless”? As became increasingly clear in the hearing today, the exact number of Americans impacted by this surveillance is unknown. Senator Franken asked the panel of witnesses, “Is it possible for the government to provide an exact count of how many United States persons have been swept up in Section 702 surveillance? And if not the exact count, then what about an estimate?”
  • Elizabeth Goitein, the Brennan Center director whose articulate and thought-provoking testimony was the highlight of the hearing, noted that at this time an exact number would be difficult to provide. However, she asserted that an estimate should be possible for most if not all of the government’s surveillance programs. None of the other panel participants—which included David Medine and Rachel Brand of the Privacy and Civil Liberties Oversight Board as well as Matthew Olsen of IronNet Cybersecurity and attorney Kenneth Wainstein—offered an estimate. Today’s hearing reaffirmed that it is not only the American people who are left in the dark about how many people or accounts are impacted by the NSA’s dragnet surveillance of the Internet. Even vital oversight committees in Congress like the Senate Judiciary Committee are left to speculate about just how far-reaching this surveillance is. It's part of the reason why we urged the House Judiciary Committee to demand that the Intelligence Community provide the public with a number. 
  • The lack of information makes rigorous oversight of the programs all but impossible. As Senator Franken put it in the hearing today, “When the public lacks even a rough sense of the scope of the government’s surveillance program, they have no way of knowing if the government is striking the right balance, whether we are safeguarding our national security without trampling on our citizens’ fundamental privacy rights. But the public can’t know if we succeed in striking that balance if they don’t even have the most basic information about our major surveillance programs."  Senator Patrick Leahy also questioned the panel about the “minimization procedures” associated with this type of surveillance, the privacy safeguard that is intended to ensure that irrelevant data and data on American citizens is swiftly deleted. Senator Leahy asked the panel: “Do you believe the current minimization procedures ensure that data about innocent Americans is deleted? Is that enough?”  David Medine, who recently announced his pending retirement from the Privacy and Civil Liberties Oversight Board, answered unequivocally:
  • ...2 more annotations...
  • Senator Leahy, they don’t. The minimization procedures call for the deletion of innocent Americans’ information upon discovery to determine whether it has any foreign intelligence value. But what the board’s report found is that in fact information is never deleted. It sits in the databases for 5 years, or sometimes longer. And so the minimization doesn’t really address the privacy concerns of incidentally collected communications—again, where there’s been no warrant at all in the process… In the United States, we simply can’t read people’s emails and listen to their phone calls without court approval, and the same should be true when the government shifts its attention to Americans under this program. One of the most startling exchanges from the hearing today came toward the end of the session, when Senator Dianne Feinstein—who also sits on the Intelligence Committee—seemed taken aback by Ms. Goitein’s mention of “backdoor searches.” 
  • Feinstein: Wow, wow. What do you call it? What’s a backdoor search? Goitein: Backdoor search is when the FBI or any other agency targets a U.S. person for a search of data that was collected under Section 702, which is supposed to be targeted against foreigners overseas. Feinstein: Regardless of the minimization that was properly carried out. Goitein: Well the data is searched in its unminimized form. So the FBI gets raw data, the NSA, the CIA get raw data. And they search that raw data using U.S. person identifiers. That’s what I’m referring to as backdoor searches. It’s deeply concerning that any member of Congress, much less a member of the Senate Judiciary Committee and the Senate Intelligence Committee, might not be aware of the problem surrounding backdoor searches. In April 2014, the Director of National Intelligence acknowledged the searches of this data, which Senators Ron Wyden and Mark Udall termed “the ‘back-door search’ loophole in section 702.” The public was so incensed that the House of Representatives passed an amendment to that year's defense appropriations bill effectively banning the warrantless backdoor searches. Nonetheless, in the hearing today it seemed like Senator Feinstein might not recognize or appreciate the serious implications of allowing U.S. law enforcement agencies to query the raw data collected through these Internet surveillance programs. Hopefully today’s testimony helped convince the Senator that there is more to this topic than what she’s hearing in jargon-filled classified security briefings.
  •  
    The 4th Amendment: "The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and *particularly describing the place to be searched, and the* persons or *things to be seized."* So much for the particularized description of the place to be searched and the thngs to be seized.  Fah! Who needs a Constitution, anyway .... 
Paul Merrell

Tomgram: Alfred McCoy, It's About Blackmail, Not National Security | TomDispatch - 0 views

  • For more than six months, Edward Snowden’s revelations about the National Security Agency (NSA) have been pouring out from the Washington Post, the New York Times, the Guardian, Germany’s Der Spiegel, and Brazil’s O Globo, among other places.  Yet no one has pointed out the combination of factors that made the NSA’s expanding programs to monitor the world seem like such a slam-dunk development in Washington.  The answer is remarkably simple.  For an imperial power losing its economic grip on the planet and heading into more austere times, the NSA’s latest technological breakthroughs look like a bargain basement deal when it comes to projecting power and keeping subordinate allies in line -- like, in fact, the steal of the century.  Even when disaster turned out to be attached to them, the NSA’s surveillance programs have come with such a discounted price tag that no Washington elite was going to reject them.
  • What exactly was the aim of such an unprecedented program of massive domestic and planetary spying, which clearly carried the risk of controversy at home and abroad? Here, an awareness of the more than century-long history of U.S. surveillance can guide us through the billions of bytes swept up by the NSA to the strategic significance of such a program for the planet’s last superpower. What the past reveals is a long-term relationship between American state surveillance and political scandal that helps illuminate the unacknowledged reason why the NSA monitors America’s closest allies. Not only does such surveillance help gain intelligence advantageous to U.S. diplomacy, trade relations, and war-making, but it also scoops up intimate information that can provide leverage -- akin to blackmail -- in sensitive global dealings and negotiations of every sort. The NSA’s global panopticon thus fulfills an ancient dream of empire. With a few computer key strokes, the agency has solved the problem that has bedeviled world powers since at least the time of Caesar Augustus: how to control unruly local leaders, who are the foundation for imperial rule, by ferreting out crucial, often scurrilous, information to make them more malleable.
  • Once upon a time, such surveillance was both expensive and labor intensive. Today, however, unlike the U.S. Army’s shoe-leather surveillance during World War I or the FBI’s break-ins and phone bugs in the Cold War years, the NSA can monitor the entire world and its leaders with only 100-plus probes into the Internet’s fiber optic cables. This new technology is both omniscient and omnipresent beyond anything those lacking top-secret clearance could have imagined before the Edward Snowden revelations began.  Not only is it unimaginably pervasive, but NSA surveillance is also a particularly cost-effective strategy compared to just about any other form of global power projection. And better yet, it fulfills the greatest imperial dream of all: to be omniscient not just for a few islands, as in the Philippines a century ago, or a couple of countries, as in the Cold War era, but on a truly global scale. In a time of increasing imperial austerity and exceptional technological capability, everything about the NSA’s surveillance told Washington to just “go for it.”  This cut-rate mechanism for both projecting force and preserving U.S. global power surely looked like a no-brainer, a must-have bargain for any American president in the twenty-first century -- before new NSA documents started hitting front pages weekly, thanks to Snowden, and the whole world began returning the favor.
  • ...12 more annotations...
  • As the gap has grown between Washington’s global reach and its shrinking mailed fist, as it struggles to maintain 40% of world armaments (the 2012 figure) with only 23% of global gross economic output, the U.S. will need to find new ways to exercise its power far more economically. As the Cold War took off, a heavy-metal U.S. military -- with 500 bases worldwide circa 1950 -- was sustainable because the country controlled some 50% of the global gross product. But as its share of world output falls -- to an estimated 17% by 2016 -- and its social welfare costs climb relentlessly from 4% of gross domestic product in 2010 to a projected 18% by 2050, cost-cutting becomes imperative if Washington is to survive as anything like the planet’s “sole superpower.” Compared to the $3 trillion cost of the U.S. invasion and occupation of Iraq, the NSA’s 2012 budget of just $11 billion for worldwide surveillance and cyberwarfare looks like cost saving the Pentagon can ill-afford to forego. Yet this seeming “bargain” comes at what turns out to be an almost incalculable cost. The sheer scale of such surveillance leaves it open to countless points of penetration, whether by a handful of anti-war activists breaking into an FBI field office in Media, Pennsylvania, back in 1971 or Edward Snowden downloading NSA documents at a Hawaiian outpost in 2012.
  • In October 2001, not satisfied with the sweeping and extraordinary powers of the newly passed Patriot Act, President Bush ordered the National Security Agency to commence covert monitoring of private communications through the nation's telephone companies without the requisite FISA warrants. Somewhat later, the agency began sweeping the Internet for emails, financial data, and voice messaging on the tenuous theory that such “metadata” was “not constitutionally protected.” In effect, by penetrating the Internet for text and the parallel Public Switched Telephone Network (PSTN) for voice, the NSA had gained access to much of the world’s telecommunications. By the end of Bush’s term in 2008, Congress had enacted laws that not only retrospectively legalized these illegal programs, but also prepared the way for NSA surveillance to grow unchecked. Rather than restrain the agency, President Obama oversaw the expansion of its operations in ways remarkable for both the sheer scale of the billions of messages collected globally and for the selective monitoring of world leaders.
  • By 2012, the centralization via digitization of all voice, video, textual, and financial communications into a worldwide network of fiber optic cables allowed the NSA to monitor the globe by penetrating just 190 data hubs -- an extraordinary economy of force for both political surveillance and cyberwarfare.
  • With a few hundred cable probes and computerized decryption, the NSA can now capture the kind of gritty details of private life that J. Edgar Hoover so treasured and provide the sort of comprehensive coverage of populations once epitomized by secret police like East Germany’s Stasi. And yet, such comparisons only go so far. After all, once FBI agents had tapped thousands of phones, stenographers had typed up countless transcripts, and clerks had stored this salacious paper harvest in floor-to-ceiling filing cabinets, J. Edgar Hoover still only knew about the inner-workings of the elite in one city: Washington, D.C.  To gain the same intimate detail for an entire country, the Stasi had to employ one police informer for every six East Germans -- an unsustainable allocation of human resources. By contrast, the marriage of the NSA’s technology to the Internet’s data hubs now allows the agency’s 37,000 employees a similarly close coverage of the entire globe with just one operative for every 200,000 people on the planet
  • Through the expenditure of $250 million annually under its Sigint Enabling Project, the NSA has stealthily penetrated all encryption designed to protect privacy. “In the future, superpowers will be made or broken based on the strength of their cryptanalytic programs,” reads a 2007 NSA document. “It is the price of admission for the U.S. to maintain unrestricted access to and use of cyberspace.” By collecting knowledge -- routine, intimate, or scandalous -- about foreign leaders, imperial proconsuls from ancient Rome to modern America have gained both the intelligence and aura of authority necessary for dominion over alien societies. The importance, and challenge, of controlling these local elites cannot be overstated. During its pacification of the Philippines after 1898, for instance, the U.S. colonial regime subdued contentious Filipino leaders via pervasive policing that swept up both political intelligence and personal scandal. And that, of course, was just what J. Edgar Hoover was doing in Washington during the 1950s and 1960s.
  • Indeed, the mighty British Empire, like all empires, was a global tapestry woven out of political ties to local leaders or “subordinate elites” -- from Malay sultans and Indian maharajas to Gulf sheiks and West African tribal chiefs. As historian Ronald Robinson once observed, the British Empire spread around the globe for two centuries through the collaboration of these local leaders and then unraveled, in just two decades, when that collaboration turned to “non-cooperation.” After rapid decolonization during the 1960s transformed half-a-dozen European empires into 100 new nations, their national leaders soon found themselves the subordinate elites of a spreading American global imperium. Washington suddenly needed the sort of private information that could keep such figures in line. Surveillance of foreign leaders provides world powers -- Britain then, America now -- with critical information for the exercise of global hegemony. Such spying gave special penetrating power to the imperial gaze, to that sense of superiority necessary for dominion over others.  It also provided operational information on dissidents who might need to be countered with covert action or military force; political and economic intelligence so useful for getting the jump on allies in negotiations of all sorts; and, perhaps most important of all, scurrilous information about the derelictions of leaders useful in coercing their compliance.
  • In late 2013, the New York Times reported that, when it came to spying on global elites, there were “more than 1,000 targets of American and British surveillance in recent years,” reaching down to mid-level political actors in the international arena. Revelations from Edward Snowden’s cache of leaked documents indicate that the NSA has monitored leaders in some 35 nations worldwide -- including Brazilian president Dilma Rousseff, Mexican presidents Felipe Calderón and Enrique Peña Nieto, German Chancellor Angela Merkel, and Indonesia’s president Susilo Bambang Yudhoyono.  Count in as well, among so many other operations, the monitoring of “French diplomatic interests” during the June 2010 U.N. vote on Iran sanctions and “widespread surveillance” of world leaders during the Group 20 summit meeting at Ottawa in June 2010. Apparently, only members of the historic “Five Eyes” signals-intelligence alliance (Australia, Canada, New Zealand, and Great Britain) remain exempt -- at least theoretically -- from NSA surveillance. Such secret intelligence about allies can obviously give Washington a significant diplomatic advantage. During U.N. wrangling over the U.S. invasion of Iraq in 2002-2003, for example, the NSA intercepted Secretary-General Kofi Anan’s conversations and monitored the “Middle Six” -- Third World nations on the Security Council -- offering what were, in essence, well-timed bribes to win votes. The NSA’s deputy chief for regional targets sent a memo to the agency’s Five Eyes allies asking “for insights as to how membership is reacting to on-going debate regarding Iraq, plans to vote on any related resolutions [..., and] the whole gamut of information that could give U.S. policymakers an edge in obtaining results favorable to U.S. goals.”
  • Indicating Washington’s need for incriminating information in bilateral negotiations, the State Department pressed its Bahrain embassy in 2009 for details, damaging in an Islamic society, on the crown princes, asking: “Is there any derogatory information on either prince? Does either prince drink alcohol? Does either one use drugs?” Indeed, in October 2012, an NSA official identified as “DIRNSA,” or Director General Keith Alexander, proposed the following for countering Muslim radicals: “[Their] vulnerabilities, if exposed, would likely call into question a radicalizer’s devotion to the jihadist cause, leading to the degradation or loss of his authority.” The agency suggested that such vulnerabilities could include “viewing sexually explicit material online” or “using a portion of the donations they are receiving… to defray personal expenses.” The NSA document identified one potential target as a “respected academic” whose “vulnerabilities” are “online promiscuity.”
  • Just as the Internet has centralized communications, so it has moved most commercial sex into cyberspace. With an estimated 25 million salacious sites worldwide and a combined 10.6 billion page views per month in 2013 at the five top sex sites, online pornography has become a global business; by 2006, in fact, it generated $97 billion in revenue. With countless Internet viewers visiting porn sites and almost nobody admitting it, the NSA has easy access to the embarrassing habits of targets worldwide, whether Muslim militants or European leaders. According to James Bamford, author of two authoritative books on the agency, “The NSA's operation is eerily similar to the FBI's operations under J. Edgar Hoover in the 1960s where the bureau used wiretapping to discover vulnerabilities, such as sexual activity, to ‘neutralize’ their targets.”
  • Indeed, whistleblower Edward Snowden has accused the NSA of actually conducting such surveillance.  In a December 2013 letter to the Brazilian people, he wrote, “They even keep track of who is having an affair or looking at pornography, in case they need to damage their target's reputation.” If Snowden is right, then one key goal of NSA surveillance of world leaders is not U.S. national security but political blackmail -- as it has been since 1898. Such digital surveillance has tremendous potential for scandal, as anyone who remembers New York Governor Eliot Spitzer’s forced resignation in 2008 after routine phone taps revealed his use of escort services; or, to take another obvious example, the ouster of France’s budget minister Jérôme Cahuzac in 2013 following wire taps that exposed his secret Swiss bank account. As always, the source of political scandal remains sex or money, both of which the NSA can track with remarkable ease.
  • By starting a swelling river of NSA documents flowing into public view, Edward Snowden has given us a glimpse of the changing architecture of U.S. global power. At the broadest level, Obama’s digital “pivot” complements his overall defense strategy, announced in 2012, of reducing conventional forces while expanding into the new, cost-effective domains of space and cyberspace. While cutting back modestly on costly armaments and the size of the military, President Obama has invested billions in the building of a new architecture for global information control. If we add the $791 billion expended to build the Department of Homeland Security bureaucracy to the $500 billion spent on an increasingly para-militarized version of global intelligence in the dozen years since 9/11, then Washington has made a $1.2 trillion investment in a new apparatus of world power.
  • So formidable is this security bureaucracy that Obama’s recent executive review recommended the regularization, not reform, of current NSA practices, allowing the agency to continue collecting American phone calls and monitoring foreign leaders into the foreseeable future. Cyberspace offers Washington an austerity-linked arena for the exercise of global power, albeit at the cost of trust by its closest allies -- a contradiction that will bedevil America’s global leadership for years to come. To update Henry Stimson: in the age of the Internet, gentlemen don't just read each other’s mail, they watch each other’s porn. Even if we think we have nothing to hide, all of us, whether world leaders or ordinary citizens, have good reason to be concerned.
Paul Merrell

Fearing 'enemies,' Turkey blocks YouTube | Europe | DW.DE | 28.03.2014 - 0 views

  • First Twitter, now YouTube. The Turkish telecoms authority TIB said the move to was an "administrative measure." But only a few hours before the measure came into force, a rather provocative recording was posted on the site. According to the official view, the audio clip is one of the most flagrant among the many that anonymous opponents of the government have been leaking online over the last few months. It exposes the Islamic-conservative government led by Prime Minister Recep Tayyip Erdogan just before the municipal elections scheduled to take place on March 30. The conversation that was leaked this time is between Foreign Minister Ahmet Davutoglu and several heads of the intelligence service and the military. Participants of the conversation were apparently looking for a reason to go to war with Syria.
  • According to reports from the Turkish newspaper Hürriyet, the Turkish foreign ministry has confirmed the authenticity of the recording and has explained that the conversation took place in the foreign ministry. The ministry also emphasized, however, that the contents of the recording were distorted. In a statement issued by the Ministry of Foreign Affairs this explanation was given: "Monitoring such a meeting of a highly confidential nature which was held at a location such as the office of the foreign minister, where the most sensitive security issues of the state are discussed; and releasing these conversations to the public are a despicable attack, an act of espionage and a very serious crime against the national security of Turkey. This incident reveals the extent the threats of cyber and electronic attacks that Turkey encounters." The statement called the perpetrators "enemies of our state" and said they would be identified and severely punished as soon as possible.
  • The Turkish radio and television supervisory board RTÜK banned several Turkish media outlets from spreading the video or communicating its contents. According to the newspaper Hürriyet, the Turkish federal prosecutor's office has already initiated investigations against those responsible for the video. Measures taken too far According to legal expert Bertan Tokuzlu, the recording gives the impression that the government wanted to make trouble internationally, in order to distract the public from internal problems. "If the government wanted to create a reason for war, that is absolutely not in keeping with international legal standards," says Tokuzlu.
  • ...2 more annotations...
  • But according to the legal expert, another aspect of the problem is at stake here. "This is a case of espionage. The alleged conversation took place in a secure location and it is on a very sensitive topic - the question of whether there should or should not be a war with Syria," he says. Tokuzlu added that the content of the conversation was clearly supposed to be released to the public in order to influence the results of this Sunday's (30.03.2014) local elections. But blocking the whole YouTube site was never an appropriate solution, Tokuzlu maintains. "There is no reason to block entire sites. You could block individual accounts or videos; that would be legitimate in this sort of a case," he said. Tokuzlu also explained that blocking YouTube could not be compared with the move to block Twitter: "The Security Council in Turkey held an emergency meeting. Right after, YouTube was blocked. That shows how important this case is."
  • The recording also mentions Turkish arms deliveries to Syrian opposition groups. "If that is the case and we have a war crime to deal with, then the public has a right to know this information, according to the European Court of Human Rights," Tokuzlu stressed, adding that the Turkish government's reaction to the publication of the conversation was very thin-skinned. "If the recording provides evidence of a war crime, then that might mean the government will be brought before a war crimes tribunal in the near future. That is a delicate subject."
  •  
    This article is from 28 March 2014. The Turkish government a few days ago restored access to YouTube and Twitter, after reports that more than 300,000 Turks had thwarted the ban by learning to use Tor and VPN tunneling, posing a long-term obstacle to Turkish intelligence service surveillance. The Foreign Ministry recording was of the Foreign Minister and other high Turkish officials discussing plans for a false flag attack on Turkey to justify Turkey launching its own direct military attacks on Syria. Because Turkey is a member of NATO, an attack on Turkey triggers the obligations of other NATO member nations to join Turkey's "defense." 
Paul Merrell

F.B.I. Is Broadening Surveillance Role, Report Shows - NYTimes.com - 0 views

  • Although the government’s warrantless surveillance program is associated with the National Security Agency, the Federal Bureau of Investigation has gradually become a significant player in administering it, a newly declassified report shows.In 2008, according to the report, the F.B.I. assumed the power to review email accounts the N.S.A. wanted to collect through the “Prism” system, which collects emails of foreigners from providers like Yahoo and Google. The bureau’s top lawyer, Valerie E. Caproni, who is now a Federal District Court judge, developed procedures to make sure no such accounts belonged to Americans.
  • Then, in October 2009, the F.B.I. started retaining copies of unprocessed communications gathered without a warrant to analyze for its own purposes. And in April 2012, the bureau began nominating new email accounts and phone numbers belonging to foreigners for collection, including through the N.S.A.’s “upstream” system, which collects communications transiting network switches.That information is in a 231-page study by the Justice Department’s inspector general about the F.B.I.’s activities under the FISA Amendments Act of 2008, which authorized the surveillance program. The report was entirely classified when completed in September 2012. But the government has now made a semi-redacted version of the report public in response to a Freedom of Information Act lawsuit filed by The New York Times.
  • The report also filled in a gap about the evolving legality of the warrantless wiretapping program, which traces back to a decision by President George W. Bush in October 2001 to direct the N.S.A. to collect Americans’ international phone calls and emails, from network locations on domestic soil, without the individual warrants required by the Foreign Intelligence Surveillance Act, or FISA. The Times revealed that program in December 2005.After the article appeared, telecommunications providers that had voluntarily participated in the program were sued, and a Federal District Court judge in Detroit ruled that the program was illegal, although that decision was later vacated. The Bush administration sought to put the program on more solid legal footing by gaining orders from the Foreign Intelligence Surveillance Court approving it.Continue reading the main story Continue reading the main story Continue reading the main story In January 2007, the Bush administration persuaded the court’s Judge Malcolm Howard to issue an order to telephone and network companies requiring them to let the security agency target foreigners’ accounts for collection without individual warrants. But in April 2007, when the order came up for renewal before Judge Roger Vinson, he said that it was illegal.
  • ...1 more annotation...
  • Judge Vinson’s resistance led Congress to enact, in August 2007, the Protect America Act, a temporary law permitting warrantless surveillance of foreigners from domestic network locations. The next year, Congress replaced that law with the FISA Amendments Act.Last month, as a result of separate Freedom of Information Act lawsuits by The Times and the Electronic Frontier Foundation, the government declassified the identities of the judges who disagreed in early 2007 and several court filings from that episode. But it remained unclear what the N.S.A. had done in June and July of 2007.The newly declassified report said Judge Vinson issued an order on May 31, 2007, that allowed existing surveillance to continue by approving collection on a long list of specific foreign phone numbers and email addresses. But after that, when the agency wanted to start wiretapping an additional person, it had to ask the court for permission.The report said that “the rigorous nature of the FISA Court’s probable cause review of new selectors submitted to the various FISA Court judges following Judge Vinson’s May 31, 2007, order caused the N.S.A. to place fewer foreign selectors under coverage than it wanted to.” That and other factors “combined to accelerate the government’s efforts” to persuade Congress to enact the Protect America Act.
Paul Merrell

The Day - U.S. alerts foreign services about Snowden documents | News from southeastern... - 0 views

  • U.S. officials are alerting some foreign intelligence services that documents detailing their secret cooperation with the United States have been obtained by former National Security Agency contractor Edward Snowden, according to government officials.Snowden, U.S. officials said, took tens of thousands of documents, some of which contain sensitive material about collection programs against adversaries such as Iran, Russia and China. Some refer to operations that in some cases involve countries not publicly allied with the United States.The process of informing officials in capital after capital about the risk of disclosure is delicate. In some cases, one part of the cooperating government may know about the collaboration while others may not, the officials said. The documents, if disclosed, could compromise operations, officials said.
  • The Office of the Director of National Intelligence is handling the job of informing the other intelligence services, the officials said. ODNI declined to comment.
  • Snowden lifted the documents from a top secret network run by the Defense Intelligence Agency and used by intelligence arms of the Army, Air Force, Navy and Marines, according to sources, who spoke on the condition of anonymity to discuss sensitive matters.Snowden took 30,000 documents that involve the intelligence work of one of the services, the official said. He gained access to the documents through the Joint Worldwide Intelligence Communications System, or JWICS, for top secret/sensitive compartmented information, the sources said.The material in question does not deal with NSA surveillance but primarily with standard intelligence about other countries' military capabilities, including weapons systems-missiles, ships and jets, the officials say.
  • ...1 more annotation...
  • Nonetheless, the military intelligence agencies remain fearful, officials said. The NSA in recent months has provided them with an accounting of the documents it believes Snowden obtained.Intelligence officials said they could discern no pattern to the military intelligence documents taken and said Snowden appeared to harvest them at random. "It didn't seem like he was targeting something specific," the U.S. official said.
  •  
    A bit of comedy here. Our spy agencies will warn collaborating nations but when it comes to Congress or the American public, no warning. 
Paul Merrell

French and Spanish intelligence aided NSA spying - report - RT News - 0 views

  • Electronic surveillance which the European media and politicians blamed on the NSA was also carried out by their own intelligence services, as part of a wide-ranging allied security effort, according to US officials. European spy agencies collected phone records in war zones and areas outside their borders and shared information with the NSA, US officials said on Tuesday, as part of wider efforts to protect allied soldiers and civilians, according to a report in the Wall Street Journal. This is a markedly different version of events to what has been reported in Europe and throws up questions about the level of European involvement in global surveillance.
  • However, these efforts are separate to the US program which targeted foreign leaders, including Angela Merkel. There has so far been no comment from either the French or Spanish authorities or from the NSA.
  • But James Clapper, the director of National Intelligence said that the notion that the NSA had eavesdropped on the phone calls of 70 million French citizens was false and that the allegations were based on “inaccurate and misleading information regarding US foreign intelligence activities.” But he didn’t provide any other explanation. US intelligence officials have, according to the Wall Street Journal, privately said that the disclosures by the European press put them in a difficult position. They are keen to put the record straight but to do so would expose the activities of their allies’ intelligence activities. US officials also say that the leaked documents that the Le Monde story was based on were not supplied by the NSA, but rather were NSA data received from French intelligence. The US reached the conclusion that the phone records the French had collected were from outside France and were then shared with the NSA. There was a similar story for the documents citied in El Mundo, the officials said. There are considerable diplomatic sensitivities of outing partner services, which the NSA relies on for a considerable amount of intelligence. A public exposure of European complicity may spark domestic outrage in Europe and threaten co-operation with the US in future.
  •  
    Finger-pointing by the U.S. Intelligence Community is good news, a strong sign that the Western nation's surveillance conspiracy is fragmenting. When one defendant blames another, their front is no longer united. 
Paul Merrell

NSA oversight dismissed as 'illusory' as anger intensifies in Europe and beyond | World... - 0 views

  • The Obama administration's international surveillance crisis deepened on Monday as representatives from a Latin American human rights panel told US diplomats that oversight of the programs was "illusory".Members of the Inter-American Commission on Human Rights, an arm of the Organization of American States, expressed frustration and dissatisfaction with the National Security Agency's mass surveillance of foreign nationals – something the agency argues is both central to its existence and necessary to prevent terrorism. "With a program of this scope, it's obvious that any form of control becomes illusory when there's hundreds of millions of communications that become monitored and surveilled," said Felipe Gonzales, a commissioner and Chilean national."This is of concern to us because maybe the Inter-American Committee on Human Rights may become a target as well of surveillance," said Rodrigo Escobar Gil, a commissioner and Colombian citizen.
  • Frank La Rue, the United Nations special rapporteur on the right to freedom of opinion and expression, told the commission that the right to privacy was "inextricably linked" to free expression. "What is not permissible from a human rights point of view is that those that hold political power or those that are in security agencies or, even less, those in intelligence agencies decide by themselves, for themselves, what the scope of these surveillance activities are, or who will be targeted, or who will be blank surveilled," La Rue said.While the US sent four representatives to the hearing, they offered no defence, rebuttal or elaboration about bulk surveillance, saying the October government shutdown prevented them from adequate preparation. "We are here to listen," said deputy permanent representative Lawrence Gumbiner, who pledged to submit written responses within 30 days.All 35 North, Central and South American nations are members of the commission. La Rue, originally from Guatemala and an independent expert appointed by the Human Rights Council, travels the world reporting on human rights concerns – often in countries with poor democratic standards.
  • The Obama administration has been fielding a week's worth of European outrage following media reports that the NSA had collected a similarly large volume of phone calls from France – which director of national intelligence James Clapper, who recently apologised for misleading the Senate about domestic spying, called "false" – and spying on German chancellor Angela Merkel's own cellphone, which US officials have effectively confessed to. Brazil and Mexico are also demanding answers from US intelligence officials, following reports about intrusive acts of espionage in their territory revealed by documents provided to journalists by former NSA contractor Edward Snowden. The White House has said it will provide some answers after the completion of an external review of its surveillance programs, scheduled to be completed before the end of the year. The Guardian reported on Thursday that the NSA has intercepted the communications of 35 world leaders.
  • ...3 more annotations...
  • Spying on foreigners is the core mission of the NSA, one that it vigorously defends as appropriate, legal and unexceptional given the nature of global threats and widespread spycraft. Monday's hearing suggested that there are diplomatic consequences to bulk surveillance even if there may not be legal redress for non-Americans. Brazil has already shown a willingness to challenge Washington over bulk surveillance. President Dilma Rousseff postponed a September meeting with President Obama in protest, and denounced the spying during the UN general assembly shortly thereafter. Brazil is also teaming up with Germany at the UN on a general assembly resolution demanding an end to the mass surveillance. The commission's examination of the NSA's bulk surveillance activities suggested a potential southern front could open in the spy crisis just as the administration is attempting to calm down Europe.
  • International discomfort with NSA bulk surveillance is not the only spy challenge the Obama administration now confronts. Congressman James Sensenbrenner, the Wisconsin Republican and key author of the 2001 Patriot Act, is poised to introduce a bill this week that would prevent the NSA from collecting phone records on American citizens in bulk and without an individual warrant. The National Journal reported that Sensenbrenner's bill, which has a companion in the Senate, has attracted eight co-sponsors who either voted against or abstained on a July amendment in the House that would have defunded the domestic phone records bulk collection, a legislative gambit that came within seven votes of passage.Sensenbrenner's bill, like its Senate counterpart sponsored by Vermont Democrat Patrick Leahy, would not substantially restrict the NSA's foreign-focused surveillance, which is a traditional NSA activity. There is practically no congressional appetite, and no viable legislation, to limit the NSA from intercepting the communications of foreigners. An early sign about the course of potential surveillance reforms in the House of Representatives may come as early as Tuesday. The House intelligence committee, a hotbed of support for the NSA, will hold its first public hearing of the fall legislative calendar on proposed surveillance legislation. Its chairman, Mike Rogers of Michigan, has proposed requiring greater transparency on the NSA and the surveillance court that oversees it, but would largely leave the actual surveillance activities of the NSA, inside and outside the United States, untouched.
  • Alex Abdo, a lawyer with the ACLU, which requested the hearing at the Inter-American Commission on Human Rights, warned the human rights panel that the NSA could "target the foreign members of this commission when they travel abroad", as well as foreign dissidents of US-aligned governments; foreign lawyers for Guantánamo detainees; and other foreigners."If every country were to engage in surveillance as pervasive as the NSA, we would soon live in a state … with no refuge for the world's dissidents, journalists and human rights defenders," Abdo said.
Paul Merrell

U.S. Says It Spied on 89,000 Targets Last Year, But the Number Is Deceptive | Threat Le... - 0 views

  • About 89,000 foreigners or organizations were targeted for spying under a U.S. surveillance order last year, according to a new transparency report. The report was released for the first time Friday by the Office of the Director of Intelligence, upon order of the president, in the wake of surveillance leaks by NSA whistleblower Edward Snowden. But the report, which covers only surveillance orders issued in 2013, doesn’t tell the whole story about how many individuals the spying targeted or how many Americans were caught in the surveillance that targeted foreigners. Civil liberties groups say the real number is likely “orders of magnitude” larger than this. “Even if it was an honest definition of ‘target’—that is, an individual instead of a group—that also is not encompassing those who are ancillary to a target and are caught up in the dragnet,” says Kurt Opsahl, deputy general counsel of the Electronic Frontier Foundation.
  • In its report, the government indicated that the 423 selectors involved just 248 “known or presumed” Americans whose information was collected by the agency in the database. But Opsahl says that both of these numbers are deceptive given what we know about the database and how it’s been used. “We know it’s affecting millions of people,” he points out. But “then we have estimated numbers of affected people [that are just] in the three digits. That requires some effort [on the government's part] to find a way to do the definition of the number [in such a way] to make it as small as possible.”
  • “If you’re actually trying to get a sense of the number of human beings affected or the number of Americans affected, the number of people affected is vastly, vastly larger,” says Julian Sanchez, senior fellow at the Cato Institute. “And how many of those are Americans is impossible to say. But [although] you may not think you are routinely communicating with foreign persons, [this] is not any kind of assurance that your communications are not part of the traffic subject to interception.” Sanchez points out that each individual targeted is likely communicating with dozens or hundred of others, whose communications will be picked up in the surveillance. “And probably a lot of these targets are not individuals but entire web sites or companies. While [a company like the Chinese firm] Huawei might be a target, thousands of emails used by thousands of employees will be swept up.” How many of those employees might be American or communicating with Americans is unknown.
  • ...5 more annotations...
  • Also revealed in today’s report is the number of times the government has queried the controversial phone records database it created by collecting the phone records of every subscriber from U.S. providers. According to the report, the government used 423 “selectors” to search its massive phone records database, which includes records going back to at least 2006 when the program began. A search involves querying a specific phone number or device ID that appears in the database. The government has long maintained that its collection of phone records isn’t a violation of its authority, since it only views the records of specific individuals targeted in an investigation. But such searches, even if targeted at phone numbers used by foreigners, would include calls made to and from Americans as well as calls exchanged with people two or three hops out from the targeted number.
  • The report, remarkably, shows that the government obtained just one order last year under Section 702 of FISA—which allows for bulk collection of data on foreigners—and that this one order covered 89,138 targets. But, as the report notes, “target” can refer to “an individual person, a group, an organization composed of multiple individuals or a foreign power that possesses or is likely to communicate foreign intelligence information.” Furthermore, Section 702 orders are actually certificates issued by the FISA Court that can cover surveillance of an entire facility. And since, as the government points out in its report, the government cannot know how many people use a facility, the figure only “reflects an estimate of the number of known users of particular facilities (sometimes referred to as selectors) subject to intelligence collection under those Certifications,” the report notes.
  • One additional figure today’s report covers is the number of National Security Letters the government issued last year to businesses to obtain data on accountholders and users—19,212. NSLs are written demands from the FBI that compel internet service providers, credit companies, financial institutions and others to hand over confidential records about their customers, such as subscriber information, phone numbers and e-mail addresses, websites visited, and more. These letters are a powerful tool because they do not require court approval, and they come with a built-in gag order, preventing recipients from disclosing to anyone that they have received an NSL. An FBI agent looking into a possible anti-terrorism case can self-issue an NSL to a credit bureau, ISP, or phone company with only the sign-off of the Special Agent in Charge of their office. The FBI has merely to assert that the information is “relevant” to an investigation into international terrorism or clandestine intelligence activities.
  • The FBI has issued hundreds of thousands of NSLs over the years and has been reprimanded for abusing them. Last year a federal judge ruled that the use of NSLs is unconstitutional, due to the gag order that accompanies them, and ordered the government to stop using them. Her ruling, however, was stayed pending the government’s appeal.
  • According to the government’s report today, the 19,000 NSLs issued last year involved more than 38,000 requests for information.
Paul Merrell

Pentagon Officials: No Actionable Intelligence From Yemen Raid - 0 views

  • The Trump Administration’s decision to continue hyping a failed Yemeni raid, despite all evidence to the contrary, as having netted a trove of intelligence continues to blow up in their face tonight, as Pentagon officials once again affirmed that the information gathered was minimal, and things they already knew about. Some equipment was recovered giving them some insight into tactics, but so far none of the laptops and cellphones seized has any useful information on it. This is in keeping with what other US officials said just two days prior, that no “actionable” intelligence was gathered in the raid, but is in direct contradiction to claims by President Trump last night at the Congressional address, and Vice President Mike Pence today, that “significant” intelligence was obtained. The first major foreign military operation on his term, President Trump has invested a lot of effort into portraying the operation as an unquestioned success. Repeated concessions from the military that there were myriad problems, and things didn’t go nearly as well as intended, have all been dismissed, with Trump continuing on with the success claims.
  • That we never really get good information on what the source of intelligence is for future raids means it’s likely impossible to ever conclusively prove no actionable intelligence came from Yemen, though the fact that the Pentagon keeps saying this is the case certainly lends credence to the idea that the operation, on top of all of its other failures, didn’t accomplish anything intelligence-wise.
  •  
    The Deep State keeps lobbing more shells at Trump.
Gary Edwards

Take A Break From The Snowden Drama For A Reminder Of What He's Revealed So Far - Forbes - 0 views

  • Here’s a recap of Snowden’s leaked documents published so far, in my own highly subjective order of importance.
  • The publication of Snowden’s leaks began with a top secret order from the Foreign Intelligence Surveillance Court (FISC) sent to Verizon on behalf of the NSA, demanding the cell phone records of all of Verizon Business Network Services’ American customers for the three month period ending in July. The order, obtained by the Guardian, sought only the metadata of those millions of users’ calls–who called whom when and from what locations–but specifically requested Americans’ records, disregarding foreigners despite the NSA’s legal restrictions that it may only surveil non-U.S. persons. Senators Saxby Chambliss and Diane Feinstein defended the program and said it was in fact a three-month renewal of surveillance practices that had gone for seven years.
  • A leaked executive order from President Obama shows the administration asked intelligence agencies to draw up a list of potential offensive cyberattack targets around the world. The order, which suggests targeting “systems, processes and infrastructure” states that such offensive hacking operations “can offer unique and unconventional capabilities to advance U.S. national objectives around the world with little or no warning to the adversary or target and with potential effects ranging from subtle to severely damaging.” The order followed repeated accusations by the U.S. government that China has engaged in state-sponsored hacking operations, and was timed just a day before President Obama’s summit with Chinese President Xi Jinping.
  • ...6 more annotations...
  • Another leaked slide deck revealed a software tool called Boundless Informant, which the NSA appears to use for tracking the origin of data it collects. The leaked materials included a map produced by the program showing the frequency of data collection in countries around the world. While Iran, Pakistan and Jordan appeared to be the most surveilled countries according to the map, it also pointed to significant data collection from the United States.
  • In a congressional hearing, NSA director Keith Alexander argued that the kind of surveillance of Americans’ data revealed in that Verizon order was necessary to for archiving purposes, but was rarely accessed and only with strict oversight from Foreign Intelligence Surveillance Court judges. But another secret document published by the Guardian revealed the NSA’s own rules for when it makes broad exceptions to its foreign vs. U.S. persons distinction, accessing Americans’ data and holding onto it indefinitely. Those exceptions include anytime Americans’ data is judged to be “significant foreign intelligence” information or information about a crime that has been or is about to be committed, any data “involved in the unauthorized disclosure of national security information,” or necessary to “assess a communications security vulnerability.” Any encrypted data that the NSA wants to crack can also be held indefinitely, regardless of whether its American or foreign origin.
  • Documents leaked to the Guardian revealed a five-year-old British intelligence scheme to tap transatlantic fiberoptic cables to gather data. A program known as Tempora, created by the U.K.’s NSA equivalent Government Communications Headquarters (GCHQ) has for the last 18 months been able to store huge amounts of that raw data for up to 30 days. Much of the data is shared with the NSA, which had assigned 250 analysts to sift through it as of May of last year.
  • Another GCHQ project revealed to the Guardian through leaked documents intercepted the communications of delegates to the G20 summit of world leaders in London in 2009. The scheme included monitoring the attendees’ phone calls and emails by accessing their Blackberrys, and even setting up fake Internet cafes that used keylogging software to surveil them.
  • Snowden showed the Hong Kong newspaper the South China Morning Post documents that it said outlined extensive hacking of Chinese and Hong Kong targets by the NSA since 2009, with 61,000 targets globally and “hundreds” in China. Other SCMP stories based on Snowden’s revelations stated that the NSA had gained access to the Chinese fiberoptic network operator Pacnet as well as Chinese mobile phone carriers, and had gathered large quantities of Chinese SMS messages.
  • The Guardian’s Glenn Greenwald has said that Snowden provided him “thousands” of documents, of which “dozens” are newsworthy. And Snowden himself has said he’d like to expose his trove of leaks to the global media so that each country’s reporters can decide whether “U.S. network operations against their people should be published.” So regardless of where Snowden ends up, expect more of his revelations to follow.
  •  
    Nice tight summary
Paul Merrell

N.S.A. Spied on Allies, Aid Groups and Businesses - NYTimes.com - 0 views

  • Secret documents reveal more than 1,000 targets of American and British surveillance in recent years, including the office of an Israeli prime minister, heads of international aid organizations, foreign energy companies and a European Union official involved in antitrust battles with American technology businesses.
  • While the names of some political and diplomatic leaders have previously emerged as targets, the newly disclosed intelligence documents provide a much fuller portrait of the spies’ sweeping interests in more than 60 countries. Britain’s Government Communications Headquarters, working closely with the National Security Agency, monitored the communications of senior European Union officials, foreign leaders including African heads of state and sometimes their family members, directors of United Nations and other relief programs, and officials overseeing oil and finance ministries, according to the documents. In addition to Israel, some targets involved close allies like France and Germany, where tensions have already erupted over recent revelations about spying by the N.S.A.
  • Details of the surveillance are described in documents from the N.S.A. and Britain’s eavesdropping agency, known as GCHQ, dating from 2008 to 2011. The target lists appear in a set of GCHQ reports that sometimes identify which agency requested the surveillance, but more often do not. The documents were leaked by the former N.S.A. contractor Edward J. Snowden and shared by The New York Times, The Guardian and Der Spiegel. The reports are spare, technical bulletins produced as the spies, typically working out of British intelligence sites, systematically tapped one international communications link after another, focusing especially on satellite transmissions. The value of each link is gauged, in part, by the number of surveillance targets found to be using it for emails, text messages or phone calls. More than 1,000 targets, which also include people suspected of being terrorists or militants, are in the reports. It is unclear what the eavesdroppers gleaned. The documents include a few fragmentary transcripts of conversations and messages, but otherwise contain only hints that further information was available elsewhere, possibly in a larger database.
  • ...8 more annotations...
  • Ms. Hansen, the spokeswoman for the European Commission, said that it was already engaged in talks with the United States that were “needed to restore trust and confidence in the trans-Atlantic relationship.” She added that “the commission will raise these new allegations with U.S. and U.K. authorities.”
  • Also appearing on the surveillance lists is Joaquín Almunia, vice president of the European Commission, which, among other powers, has oversight of antitrust issues in Europe. The commission has broad authority over local and foreign companies, and it has punished a number of American companies, including Microsoft and Intel, with heavy fines for hampering fair competition. The reports say that spies intercepted Mr. Almunia’s communications in 2008 and 2009. Mr. Almunia, a Spaniard, assumed direct authority over the commission’s antitrust office in 2010. He has been involved in a three-year standoff with Google over how the company runs its search engine. Competitors of the online giant had complained that it was prioritizing its own search results and using content like travel reviews and ratings from other websites without permission. While pushing for a settlement with Google, Mr. Almunia has warned that the company could face large fines if it does not cooperate.
  • Some condemned the surveillance on Friday as unjustified and improper. “This is not the type of behavior that we expect from strategic partners,” Pia Ahrenkilde Hansen, a spokeswoman for the European Commission, said on the latest revelations of American and British spying in Europe. Some of the surveillance relates to issues that are being scrutinized by President Obama and a panel he appointed in Washington that on Wednesday recommended tighter limits on the N.S.A., particularly on spying of foreign leaders, especially allies.
  • “We do not use our foreign intelligence capabilities to steal the trade secrets of foreign companies on behalf of — or give intelligence we collect to — U.S. companies to enhance their international competitiveness or increase their bottom line,” said Vanee Vines, an N.S.A. spokeswoman. But she added that some economic spying was justified by national security needs. “The intelligence community’s efforts to understand economic systems and policies, and monitor anomalous economic activities, are critical to providing policy makers with the information they need to make informed decisions that are in the best interest of our national security,” Ms. Vines said.
  • The surveillance reports show American and British spies’ deep appetite for information. The French companies Total, the oil and gas giant, and Thales, an electronics, logistics and transportation outfit, appear as targets, as do a French ambassador, an “Estonian Skype security team” and the German Embassy in Rwanda.
  • Multiple United Nations Missions in Geneva are listed as targets, including Unicef and the United Nations Institute for Disarmament Research. So is Médecins du Monde, a medical relief organization that goes into war-ravaged areas. Leigh Daynes, an executive director of the organization in Britain, responded to news about the surveillance by saying: “There is absolutely no reason for our operations to be secretly monitored.” More obvious intelligence targets are also listed, though in smaller numbers, including people identified as “Israeli grey arms dealer,” “Taleban ministry of refugee affairs” and “various entities in Beijing.” Some of those included are described as possible members of Al Qaeda, and as suspected extremists or jihadists.
  • While few if any American citizens appear to be named in the documents, they make clear that some of the intercepted communications either began or ended in the United States and that N.S.A. facilities carried out interceptions around the world in collaboration with their British partners. Some of the interceptions appear to have been made at the Sugar Grove, W.Va., listening post run by the N.S.A. and code-named Timberline, and some are explicitly tied to N.S.A. target lists in the reports.
  • Strengthening the likelihood that full transcripts were taken during the intercepts is the case of Mohamed Ibn Chambas, an official of the Economic Community of West African States, known as Ecowas, a regional initiative of 15 countries that promotes economic and industrial activity. Whether intentionally or through some oversight, when Mr. Chambas’s communications were intercepted in August 2009, dozens of his complete text messages were copied into one of the reports.
  •  
    No mention of any "terrorist" targets. Could it be that Snowden and Greenwald are right, that the surveillance is not about terrorism at all? Surely our nation's leaders would not lie to us about that. Right. The Politics of Fear.
Paul Merrell

First Unitarian Church of Los Angeles v. NSA | Electronic Frontier Foundation - 0 views

  • Twenty-two organizations including Unitarian church groups, gun ownership advocates, and a broad coalition of membership and political advocacy organizations filed suit against the National Security Agency for violating their First Amendment right of association by illegally collecting their call records. The coalition is represented by EFF. At the heart of First Unitarian Church of Los Angeles v. NSA is the bulk telephone records collection program that was confirmed by the publication of an order from the Foreign Intelligence Surveillance Court (FISC) in June of 2013. The Director of National Intelligence (DNI) further confirmed that this formerly secret document was authentic, and part of a broader program to collect all major telecommunications customers’ call history. The order demands wholesale collection of every call made, the location of the phone, the time of the call, the duration of the call, and other “identifying information” for every phone and call for all customers of Verizon for a period of three months. Government officials further confirmed that this was just one of series of orders issued on a rolling basis since at least 2006. First Unitarian v. NSA argues that this spying violates the First Amendment, which protects the freedom to associate and express political views as a group.
  • Twenty-two organizations including Unitarian church groups, gun ownership advocates, and a broad coalition of membership and political advocacy organizations filed suit against the National Security Agency for violating their First Amendment right of association by illegally collecting their call records. The coalition is represented by EFF. At the heart of First Unitarian Church of Los Angeles v. NSA is the bulk telephone records collection program that was confirmed by the publication of an order from the Foreign Intelligence Surveillance Court (FISC) in June of 2013. The Director of National Intelligence (DNI) further confirmed that this formerly secret document was authentic, and part of a broader program to collect all major telecommunications customers’ call history. The order demands wholesale collection of every call made, the location of the phone, the time of the call, the duration of the call, and other “identifying information” for every phone and call for all customers of Verizon for a period of three months. Government officials further confirmed that this was just one of series of orders issued on a rolling basis since at least 2006. First Unitarian v. NSA argues that this spying violates the First Amendment, which protects the freedom to associate and express political views as a group.
  • The case challenges the mass telephone records collection that was confirmed by the FISA Order that was published on June 5, 2013 and confirmed by the Director of National Intelligence (DNI) on June 6, 2013. The DNI confirmed that the collection was “broad in scope” and conducted under the “business records” provision of the Foreign Intelligence Surveillance Act, also known as section 215 of the Patriot Act and 50 U.S.C. section 1861. The facts have long been part of EFF’s Jewel v. NSA case. The case does not include section 702 programs, which includes the recently made public and called the PRISM program or the fiber optic splitter program that is included (along with the telephone records program) in the Jewel v. NSA case. 
  • ...5 more annotations...
  • Our goal is to highlight one of the most important ways that the government collection of telephone records is unconstitutional: it violates the First Amendment right of association. When the government gets access to the phone records of political and activist organizations and their members, it knows who is talking to whom, when, and for how long. This so-called “metadata,” especially when collected in bulk and aggregated, tracks the associations of these organizations. After all, if the government knows that you call the Unitarian Church or Calguns or People for the American Way or Students for Sensible Drug Policy regularly, it has a very good indication that you are a member and it certainly knows that you associate regularly. The law has long recognized that government access to associations can create a chilling effect—people are less likely to associate with organizations when they know the government is watching and when the government can track their associations. 
  • Twenty-two organizations including Unitarian church groups, gun ownership advocates, and a broad coalition of membership and political advocacy organizations filed suit against the National Security Agency for violating their First Amendment right of association by illegally collecting their call records. The coalition is represented by EFF. At the heart of First Unitarian Church of Los Angeles v. NSA is the bulk telephone records collection program that was confirmed by the publication of an order from the Foreign Intelligence Surveillance Court (FISC) in June of 2013. The Director of National Intelligence (DNI) further confirmed that this formerly secret document was authentic, and part of a broader program to collect all major telecommunications customers’ call history. The order demands wholesale collection of every call made, the location of the phone, the time of the call, the duration of the call, and other “identifying information” for every phone and call for all customers of Verizon for a period of three months. Government officials further confirmed that this was just one of series of orders issued on a rolling basis since at least 2006. First Unitarian v. NSA argues that this spying violates the First Amendment, which protects the freedom to associate and express political views as a group.
  • The First Amendment right of association is a well established doctrine that prevents the government “interfering with the right to peaceably assemble or prohibit the petition for a governmental redress of grievances.” The most famous case embracing it is a 1958 Supreme Court Case from the Civil Rights era called  NAACP v. Alabama. In that case the Supreme Court held that it would violate the First Amendment for the NAACP to have to turn over its membership lists in litigation. The right stems from the simple fact that the First Amendment protects the freedom to associate and express political views as a group. This constitutional protection is critical because, as the court noted “[e]ffective advocacy of both public and private points of view, particularly controversial ones, is undeniably enhanced by group association[.]” NAACP v. Alabama, 357 U.S. at 460. As another court noted: the Constitution protects freedom of association to encourage the “advancing ideas and airing grievances” Bates v. City of Little Rock, 361 U.S. 516, 522-23 (1960).
  • The collection and analysis of telephone records give the government a broad window into our associations. The First Amendment protects against this because, as the Supreme Court has recognized, “it may induce members to withdraw from the association and dissuade others from joining it because of fear of exposure of their beliefs shown through their associations and of the consequences of their exposure.” NAACP v. Alabama, 357 U.S. at 462-63. See also Bates, 361 U.S. at 523; Gibson v. Florida Legislative Investigation Comm., 372 U.S. 539 (1963).  Privacy in one’s associational ties is also closely linked to freedom of association: “Inviolability of privacy in group association may in many circumstances be indispensable to preservation of freedom of association, particularly where a group espouses dissident beliefs.” NAACP v. Alabama, 357 U.S. at 462. 
  • The Supreme Court has made clear that infringements on freedom of association may survive constitutional scrutiny only when they “serve compelling state interests, unrelated to the suppression of ideas, that cannot be achieved through means significantly less restrictive of associational freedoms.” Roberts v. United States Jaycees, 468 U.S. 609, 623 (1984); see also NAACP v. Button, 371 U.S. at 341; Knox v. SEIU, Local 1000, 132 S. Ct. 2277, 2291 (2012)  Here, the wholesale collection of telephone records of millions of innocent Americans’ communications records, and thereby collection of their associations, is massively overbroad, regardless of the government’s interest. Thus, the NSA spying program fails under the basic First Amendment tests that have been in place for over fifty years.
  •  
    This case is related to EFF's earlier pending case, Jewel v. NSA and has been assigned to Judge Whyte, the same judge who ruled earlier in Jewel that the State Secrets Privilege does not apply to NSA's call metadata "haystack." The plaintiffs are 22 different groups who would make strange bedfellows indeed, except in opposition to government surveillance and repression. 
Paul Merrell

The Latest US and World News - USATODAY.com - 0 views

  • The U.S. government started keeping secret records of Americans' international telephone calls nearly a decade before the Sept. 11 terrorist attacks, harvesting billions of calls in a program that provided a blueprint for the far broader National Security Agency surveillance that followed.For more than two decades, the Justice Department and the Drug Enforcement Administration amassed logs of virtually all telephone calls from the USA to as many as 116 countries linked to drug trafficking, current and former officials involved with the operation said. The targeted countries changed over time but included Canada, Mexico and most of Central and South America.Federal investigators used the call records to track drug cartels' distribution networks in the USA, allowing agents to detect previously unknown trafficking rings and money handlers. They also used the records to help rule out foreign ties to the bombing in 1995 of a federal building in Oklahoma City and to identify U.S. suspects in a wide range of other investigations.The Justice Department revealed in January that the DEA had collected data about calls to "designated foreign countries." But the history and vast scale of that operation have not been disclosed until now.
  • The now-discontinued operation, carried out by the DEA's intelligence arm, was the government's first known effort to gather data on Americans in bulk, sweeping up records of telephone calls made by millions of U.S. citizens regardless of whether they were suspected of a crime. It was a model for the massive phone surveillance system the NSA launched to identify terrorists after the Sept. 11 attacks. That dragnet drew sharp criticism that the government had intruded too deeply into Americans' privacy after former NSA contractor Edward Snowden leaked it to the news media two years ago.More than a dozen current and former law enforcement and intelligence officials described the details of the Justice Department operation to USA TODAY. Most did so on the condition of anonymity because they were not authorized to publicly discuss the intelligence program, part of which remains classified.The DEA program did not intercept the content of Americans' calls, but the records — which numbers were dialed and when — allowed agents to map suspects' communications and link them to troves of other police and intelligence data. At first, the drug agency did so with help from military computers and intelligence analysts
  • The extent of that surveillance alarmed privacy advocates, who questioned its legality. "This was aimed squarely at Americans," said Mark Rumold, an attorney with the Electronic Frontier Foundation. "That's very significant from a constitutional perspective."Holder halted the data collection in September 2013 amid the fallout from Snowden's revelations about other surveillance programs. In its place, current and former officials said the drug agency sends telecom companies daily subpoenas for international calling records involving only phone numbers that agents suspect are linked to the drug trade or other crimes — sometimes a thousand or more numbers a day.Tuesday, Justice Department spokesman Patrick Rodenbush said the DEA "is no longer collecting bulk telephony metadata from U.S. service providers." A DEA spokesman declined to comment.
  • ...6 more annotations...
  • The system they built ultimately allowed the drug agency to stitch together huge collections of data to map trafficking and money laundering networks both overseas and within the USA. It allowed agents to link the call records its agents gathered domestically with calling data the DEA and intelligence agencies had acquired outside the USA. (In some cases, officials said the DEA paid employees of foreign telecom firms for copies of call logs and subscriber lists.) And it eventually allowed agents to cross-reference all of that against investigative reports from the DEA, FBI and Customs Service.
  • The result "produced major international investigations that allowed us to take some big people," Constantine said, though he said he could not identify particular cases.
  • In 1992, in the last months of Bush's administration, Attorney General William Barr and his chief criminal prosecutor, Robert Mueller, gave the DEA permission to collect a much larger set of phone data to feed into that intelligence operation.Instead of simply asking phone companies for records about calls made by people suspected of drug crimes, the Justice Department began ordering telephone companies to turn over lists of all phone calls from the USA to countries where the government determined drug traffickers operated, current and former officials said
  • The DEA obtained those records using administrative subpoenas that allow the agency to collect records "relevant or material to" federal drug investigations. Officials acknowledged it was an expansive interpretation of that authority but one that was not likely to be challenged because unlike search warrants, DEA subpoenas do not require a judge's approval. "We knew we were stretching the definition," a former official involved in the process said.Officials said a few telephone companies were reluctant to provide so much information, but none challenged the subpoenas in court. Those that hesitated received letters from the Justice Department urging them to comply.
  • A spokesman for AT&T declined to comment. Sprint spokeswoman Stephanie Vinge Walsh said only that "we do comply with all state and federal laws regarding law enforcement subpoenas."Agents said that when the data collection began, they sought to limit its use mainly to drug investigations and turned away requests for access from the FBI and the NSA. They allowed searches of the data in terrorism cases, including the bombing of a federal building in Oklahoma City that killed 168 people in 1995, helping to rule out theories linking the attack to foreign terrorists. They allowed even broader use after Sept. 11, 2001. The DEA's public disclosure of its program in January came in the case of a man charged with violating U.S. export restrictions by trying to send electrical equipment to Iran.At first, officials said the DEA gathered records only of calls to a handful of countries, focusing on Colombian drug cartels and their supply lines. Its reach grew quickly, and by the late 1990s, the DEA was logging "a massive number of calls," said a former intelligence official who supervised the program.
  • At its peak, the operation gathered data on calls to 116 countries, an official involved in reviewing the list said. Two other officials said they did not recall the precise number of countries, but it was more than 100. That gave the collection a considerable sweep; the U.S. government recognizes a total of 195 countries.
« First ‹ Previous 41 - 60 of 693 Next › Last »
Showing 20 items per page