The NSA's Secret Role in the U.S. Assassination Program - The Intercept - 0 views
-
The National Security Agency is using complex analysis of electronic surveillance, rather than human intelligence, as the primary method to locate targets for lethal drone strikes – an unreliable tactic that results in the deaths of innocent or unidentified people. According to a former drone operator for the military’s Joint Special Operations Command (JSOC) who also worked with the NSA, the agency often identifies targets based on controversial metadata analysis and cell-phone tracking technologies. Rather than confirming a target’s identity with operatives or informants on the ground, the CIA or the U.S. military then orders a strike based on the activity and location of the mobile phone a person is believed to be using. The drone operator, who agreed to discuss the top-secret programs on the condition of anonymity, was a member of JSOC’s High Value Targeting task force, which is charged with identifying, capturing or killing terrorist suspects in Yemen, Somalia, Afghanistan and elsewhere. His account is bolstered by top-secret NSA documents previously provided by whistleblower Edward Snowden. It is also supported by a former drone sensor operator with the U.S. Air Force, Brandon Bryant, who has become an outspoken critic of the lethal operations in which he was directly involved in Iraq, Afghanistan and Yemen
-
The National Security Agency is using complex analysis of electronic surveillance, rather than human intelligence, as the primary method to locate targets for lethal drone strikes – an unreliable tactic that results in the deaths of innocent or unidentified people. According to a former drone operator for the military’s Joint Special Operations Command (JSOC) who also worked with the NSA, the agency often identifies targets based on controversial metadata analysis and cell-phone tracking technologies. Rather than confirming a target’s identity with operatives or informants on the ground, the CIA or the U.S. military then orders a strike based on the activity and location of the mobile phone a person is believed to be using. The drone operator, who agreed to discuss the top-secret programs on the condition of anonymity, was a member of JSOC’s High Value Targeting task force, which is charged with identifying, capturing or killing terrorist suspects in Yemen, Somalia, Afghanistan and elsewhere. His account is bolstered by top-secret NSA documents previously provided by whistleblower Edward Snowden. It is also supported by a former drone sensor operator with the U.S. Air Force, Brandon Bryant, who has become an outspoken critic of the lethal operations in which he was directly involved in Iraq, Afghanistan and Yemen.
-
In his speech at the National Defense University last May, President Obama declared that “before any strike is taken, there must be near-certainty that no civilians will be killed or injured – the highest standard we can set.” He added that, “by narrowly targeting our action against those who want to kill us and not the people they hide among, we are choosing the course of action least likely to result in the loss of innocent life.” But the increased reliance on phone tracking and other fallible surveillance tactics suggests that the opposite is true. The Bureau of Investigative Journalism, which uses a conservative methodology to track drone strikes, estimates that at least 273 civilians in Pakistan, Yemen and Somalia have been killed by unmanned aerial assaults under the Obama administration. A recent study conducted by a U.S. military adviser found that, during a single year in Afghanistan – where the majority of drone strikes have taken place – unmanned vehicles were 10 times more likely than conventional aircraft to cause civilian casualties.
Spying by N.S.A. Ally Entangled U.S. Law Firm - NYTimes.com - 0 views
-
The list of those caught up in the global surveillance net cast by the National Security Agency and its overseas partners, from social media users to foreign heads of state, now includes another entry: American lawyers. A top-secret document, obtained by the former N.S.A. contractor Edward J. Snowden, shows that an American law firm was monitored while representing a foreign government in trade disputes with the United States. The disclosure offers a rare glimpse of a specific instance in which Americans were ensnared by the eavesdroppers, and is of particular interest because lawyers in the United States with clients overseas have expressed growing concern that their confidential communications could be compromised by such surveillance. Related Coverage Text: Document Describes Eavesdropping on American Law FirmFEB. 15, 2014 The government of Indonesia had retained the law firm for help in trade talks, according to the February 2013 document. It reports that the N.S.A.’s Australian counterpart, the Australian Signals Directorate, notified the agency that it was conducting surveillance of the talks, including communications between Indonesian officials and the American law firm, and offered to share the information.
-
The Australians told officials at an N.S.A. liaison office in Canberra, Australia, that “information covered by attorney-client privilege may be included” in the intelligence gathering, according to the document, a monthly bulletin from the Canberra office. The law firm was not identified, but Mayer Brown, a Chicago-based firm with a global practice, was then advising the Indonesian government on trade issues. On behalf of the Australians, the liaison officials asked the N.S.A. general counsel’s office for guidance about the spying. The bulletin notes only that the counsel’s office “provided clear guidance” and that the Australian agency “has been able to continue to cover the talks, providing highly useful intelligence for interested US customers.” The N.S.A. declined to answer questions about the reported surveillance, including whether information involving the American law firm was shared with United States trade officials or negotiators.
-
Most attorney-client conversations do not get special protections under American law from N.S.A. eavesdropping. Amid growing concerns about surveillance and hacking, the American Bar Association in 2012 revised its ethics rules to explicitly require lawyers to “make reasonable efforts” to protect confidential information from unauthorized disclosure to outsiders.Last year, the Supreme Court, in a 5-to-4 decision, rebuffed a legal challenge to a 2008 law allowing warrantless wiretapping that was brought in part by lawyers with foreign clients they believed were likely targets of N.S.A. monitoring. The lawyers contended that the law raised risks that required them to take costly measures, like traveling overseas to meet clients, to protect sensitive communications. But the Supreme Court dismissed their fears as “speculative.”The N.S.A. is prohibited from targeting Americans, including businesses, law firms and other organizations based in the United States, for surveillance without warrants, and intelligence officials have repeatedly said the N.S.A. does not use the spy services of its partners in the so-called Five Eyes alliance — Australia, Britain, Canada and New Zealand — to skirt the law.
- ...4 more annotations...
Why Leaker Chelsea Manning Should Receive Appropriate Medical Care in Prison | David S.... - 0 views
-
The day after after being sentenced to 35 years in prison for leaking classified government materials, Bradley Manning declared that she identified as female and preferred to be known as Chelsea Manning. Having struggled with her gender identity for years while serving in the Army, Manning’s gender identity disorder (GID) played a key role in her trial and sentencing. The question remains whether she will receive the hormone replacement therapy she has requested to receive while in prison at Fort Leavenworth. Although the prison has reportedly issued a statement that it does not provide hormone therapy or gender reassignment surgery, recent case law suggests that it may be constitutionally required to do so.In this column I will consider whether Fort Leavenworth must provide Manning with the requested hormone therapy. I will discuss several federal courts’ decisions on the issue, all of which suggest an affirmative answer to this question. Although Fort Leavenworth is not bound by these courts’ rulings, I argue that both as a matter of policy and as a matter of constitutional law, the prison must provide Manning’s requested treatment.
Articles of Impeachment Against Obama - 0 views
-
Sarasota, FL ( August 12, 2013) - The National Black Republican Association (NBRA) based in Sarasota, FL, headed by Chairman Frances Rice, filed Articles of Impeachment against President Barack Obama with the following language. We, black American citizens, in order to free ourselves and our fellow citizens from governmental tyranny, do herewith submit these Articles of Impeachment to Congress for the removal of President Barack H. Obama, aka, Barry Soetoro, from office for his attack on liberty and commission of egregious acts of despotism that constitute high crimes and misdemeanors. On July 4, 1776, the founders of our nation declared their independence from governmental tyranny and reaffirmed their faith in independence with the ratification of the Bill of Rights in 1791. Asserting their right to break free from the tyranny of a nation that denied them the civil liberties that are our birthright, the founders declared: "When a long train of abuses and usurpations, pursuing invariably the same Object evinces a design to reduce them under absolute Despotism, it is their right, it is their duty, to throw off such Government, and to provide new Guards for their future security." - Declaration of Independence, July 4, 1776. THE IMPEACHMENT POWER Article II, Section IV of the United States Constitution provides: "The President, Vice President and all civil Officers of the United States, shall be removed from Office on Impeachment for, and Conviction of, Treason, Bribery, or other high Crimes and Misdemeanors." THE ARTICLES OF IMPEACHMENT In his conduct of the office of President of the United States, Barack H. Obama, aka Barry Soetoro, personally and through his subordinates and agents, in violation or disregard of the constitutional rights of citizens and in violation of his constitutional duty to take care that the laws be faithfully executed, has prevented, obstructed, and impeded the administration of justice, in that: ARTICL
'Israel will attack Iran if you sign the deal, French MP told Fabius' | The Times of Is... - 0 views
-
French member of parliament telephoned French Foreign Minister Laurent Fabius in Geneva at the weekend to warn him that Prime Minister Benjamin Netanyahu would attack Iran’s nuclear facilities if the P5+1 nations did not stiffen their terms on a deal with Iran, Israel’s Channel 2 News reported Sunday
-
“I know [Netanyahu],” the French MP, Meyer Habib, reportedly told Fabius, and predicted that the Israeli prime minister would resort to the use of force if the deal was approved in its form at the time. “If you don’t toughen your positions, Netanyahu will attack Iran,” the report quoted Habib as saying. “I know this. I know him. You have to toughen your positions in order to prevent war.” France’s Fabius is widely reported to have scuppered the finalizing of the emerging deal late Saturday, leading to the halting of the negotiations with Iran, and an agreement to reconvene on November 20. Explaining his concerns to reporters in Geneva, Fabius said Tehran was resisting demands that it suspend work on its plutonium-producing reactor at Arak and downgrade its stockpile of higher-enriched uranium. Habib, the deputy president of the Jewish umbrella organization in France, was elected to the National Assembly in Paris in June, to represent the district of southern Europe, which includes French nationals residing in Israel.
-
The TV report on Sunday said Jerusalem believed that Netanyahu’s angry public criticism of the emerging deal, and his phone conversations with world leaders — including Presidents Barack Obama, Vladimir Putin, and Francois Hollande, Chancellor Angela Merkel and Prime Minister David Cameron — had played a crucial role in stalling the deal, but that Israel was well aware that an agreement would be reached very soon. Netanyahu himself said Sunday that he was aware of the “strong desire” for a deal on the part of the P5+1 negotiators, and had asked the various leaders in his calls, “What’s the hurry?” The report, quoting sources in Jerusalem, said Netanyahu and ministers close to him were castigating the United States for its “radical eagerness” in seeking a deal, and saying that Washington appeared fearful of confrontation with Iran. “This is no way to run a negotiation,” the sources were quoted as saying. The Americans “are giving up all of their pressure points, and the Iranians recognize the Americans’ weakness.”
- ...2 more annotations...
-
Let's remember that Netanyahu made identical go-it-alone threats to attack Iran during the run-up to the U.S. 2012 presidential election to bring pressure on Obama to send U.S. military forces in to bomb Iranian nuclear facilities. All the while, the Israeli Defense Force top brass were telling the press that Israel doesn't have the military power to go it alone against Iran. I doubt that Netanyahu's message mattered much to the French. Netanyahu has a credibility problem on that issue. So Netanyahu tried to play the stick role while the House of Saud offered the carrot of weapons purchases from the French and the like. Some stick.
Spies Infiltrate a Fantasy Realm of Online Games - NYTimes.com - 0 views
-
Not limiting their activities to the earthly realm, American and British spies have infiltrated the fantasy worlds of World of Warcraft and Second Life, conducting surveillance and scooping up data in the online games played by millions of people across the globe, according to newly disclosed classified documents.
-
Fearing that terrorist or criminal networks could use the games to communicate secretly, move money or plot attacks, the documents show, intelligence operatives have entered terrain populated by digital avatars that include elves, gnomes and supermodels. The spies have created make-believe characters to snoop and to try to recruit informers, while also collecting data and contents of communications between players, according to the documents, disclosed by the former National Security Agency contractor Edward J. Snowden. Because militants often rely on features common to video games — fake identities, voice and text chats, a way to conduct financial transactions — American and British intelligence agencies worried that they might be operating there, according to the papers.
-
Online games might seem innocuous, a top-secret 2008 N.S.A. document warned, but they had the potential to be a “target-rich communication network” allowing intelligence suspects “a way to hide in plain sight.” Virtual games “are an opportunity!” another 2008 N.S.A. document declared. But for all their enthusiasm — so many C.I.A., F.B.I. and Pentagon spies were hunting around in Second Life, the document noted, that a “deconfliction” group was needed to avoid collisions — the intelligence agencies may have inflated the threat. The documents, obtained by The Guardian and shared with The New York Times and ProPublica, do not cite any counterterrorism successes from the effort. Former American intelligence officials, current and former gaming company employees and outside experts said in interviews that they knew of little evidence that terrorist groups viewed the games as havens to communicate and plot operations.
- ...5 more annotations...
New federal database will track Americans' credit scores, financial history | Police St... - 0 views
-
The Federal Housing Finance Agency (FHFA) has given notice of its intent to database a large number of very personal data points on every American who possesses a mortgage — which may include as many as 227 million Americans. These points include things like financial histories, credit card balances, credit scores, personal demographics, lists of assets and property, family information, and more. Assembled with the help of the the Consumer Finance Protection Bureau, the database’s stated purpose is for research and modeling. The agencies have been collecting data for modeling for years, but the addition of many new pieces of personally identifiable information is a reversal of previously stated policy.
-
The database will include very specific and personal information on the borrowers and co-borrowers. According to the Federal Register Notice on April 16, 2014, the database includes: Individual’s name, address, and phone number; Individual’s Social Security Number; Individual’s gender, race, ethnicity, and religion; Individual’s marital status; Individual’s household composition (number and ages of males, females, children); Individual’s household income; Individual’s credit score; Individual’s education records; Individual’s military status/records; Individual’s employment status/records; Individual’s bank account numbers; List of individual’s “financial events in the last few years”; List of individual’s “life events in the last few years”;
-
List of individual’s other assets/wealth; Individual’s current mortgage balance; Individual’s current monthly mortgage payment; Individual’s payment delinquency records; Individual’s bankruptcy records; Individual’s credit card numbers; Individual’s credit card balances; Individual’s credit card charge limit and the highest balance charged; Individual’s minimum payments due on all loans; Attributes of the property (square footage, number of rooms, lot size…); Sale price and down payment of the property; Mortgage information (dates, interest rate, amount, loan servicer…);
- ...1 more annotation...
Pollster: İhsanoğlu fails to garner different political identities' votes | P... - 0 views
-
ISTANBUL – With only weeks left before Turkey's first-ever direct presidential election a recent survey published by polling company Optimar predicted that Justice and Development Party (AK Party) presidential candidate and Turkish Prime Minister Recep Tayyip Erdoğan will be elected president in the first round on Aug. 10 with 53.8 percent of the vote while Ekmeleddin İhsanoğlu, the Republican People's Party (CHP) and Nationalist Movement Party's (MHP) joint presidential candidate and former head of the Organization of Islamic Cooperation (OIC), will receive 38.4 percent of the vote. Pro-Kurdish Peoples' Democratic Party (HDP) presidential candidate Selahattin Demirtaş, who is a popular political figure among Kurds, is expected to lag far behind with 7.8 percent.
Profiled From Radio to Porn, British Spies Track Web Users' Online Identities | Global ... - 0 views
-
One system builds profiles showing people’s web browsing histories. Another analyzes instant messenger communications, emails, Skype calls, text messages, cell phone locations, and social media interactions. Separate programs were built to keep tabs on “suspicious” Google searches and usage of Google Maps. The surveillance is underpinned by an opaque legal regime that has authorized GCHQ to sift through huge archives of metadata about the private phone calls, emails and Internet browsing logs of Brits, Americans, and any other citizens all without a court order or judicial warrant.
-
The power of KARMA POLICE was illustrated in 2009, when GCHQ launched a top-secret operation to collect intelligence about people using the Internet to listen to radio shows. The agency used a sample of nearly 7 million metadata records, gathered over a period of three months, to observe the listening habits of more than 200,000 people across 185 countries, including the U.S., the U.K., Ireland, Canada, Mexico, Spain, the Netherlands, France, and Germany.
-
GCHQ’s documents indicate that the plans for KARMA POLICE were drawn up between 2007 and 2008. The system was designed to provide the agency with “either (a) a web browsing profile for every visible user on the Internet, or (b) a user profile for every visible website on the Internet.” The origin of the surveillance system’s name is not discussed in the documents. But KARMA POLICE is also the name of a popular song released in 1997 by the Grammy Award-winning British band Radiohead, suggesting the spies may have been fans. A verse repeated throughout the hit song includes the lyric, “This is what you’ll get, when you mess with us.”
- ...3 more annotations...
From Radio to Porn, British Spies Track Web Users' Online Identities - 0 views
-
HERE WAS A SIMPLE AIM at the heart of the top-secret program: Record the website browsing habits of “every visible user on the Internet.” Before long, billions of digital records about ordinary people’s online activities were being stored every day. Among them were details cataloging visits to porn, social media and news websites, search engines, chat forums, and blogs. The mass surveillance operation — code-named KARMA POLICE — was launched by British spies about seven years ago without any public debate or scrutiny. It was just one part of a giant global Internet spying apparatus built by the United Kingdom’s electronic eavesdropping agency, Government Communications Headquarters, or GCHQ. The revelations about the scope of the British agency’s surveillance are contained in documents obtained by The Intercept from National Security Agency whistleblower Edward Snowden. Previous reports based on the leaked files have exposed how GCHQ taps into Internet cables to monitor communications on a vast scale, but many details about what happens to the data after it has been vacuumed up have remained unclear.
-
Amid a renewed push from the U.K. government for more surveillance powers, more than two dozen documents being disclosed today by The Intercept reveal for the first time several major strands of GCHQ’s existing electronic eavesdropping capabilities.
-
The surveillance is underpinned by an opaque legal regime that has authorized GCHQ to sift through huge archives of metadata about the private phone calls, emails and Internet browsing logs of Brits, Americans, and any other citizens — all without a court order or judicial warrant
- ...17 more annotations...
U.S. Embassy in Ankara Headquarter for ISIS War on Iraq - Hariri Insider | nsnbc intern... - 0 views
-
The green light for the use of ISIS brigades to carve up Iraq, widen the Syria conflict into a greater Middle East war and to throw Iran off-balance was given behind closed doors at the Atlantic Council meeting in Turkey, in November 2013, told a source close to Saudi – Lebanese billionaire Saad Hariri, adding that the U.S. Embassy in Ankara is the operation’s headquarter.
-
A “trusted source” close to the Saudi – Lebanese multi-billionaire and former Lebanese P.M. Saad Hariri told on condition of anonymity, that the final green light for the war on Iraq with ISIS or ISIL brigades was given behind closed doors, at the sidelines of the Atlantic Council’s Energy Summit in Istanbul, Turkey, on November 22 – 23, 2013. The Atlantic Council is one of the most influential U.S. think tanks with regard to U.S. and NATO foreign policy and geopolitics.
-
“Had Baghdad been more cooperative about the Syrian oil fields at Deir-Ez-Zor in early 2013 and about autonomy for the North [Iraq’s northern, predominantly Kurdish region] they would possibly not have turned against al-Maliki; Or he would have been given more time”, said the Hariri insider during the almost two-hour-long conversation.
- ...6 more annotations...
Swedish Troops to join faux anti ISIS Alliance in Iraq | nsnbc international - 0 views
-
The Swedish government announced on Thursday that Sweden will deploy armed forces to Iraq to support military operations against the Islamic State, a.k.a. ISIS or ISIL. The terrorist organization is known to be overtly and covertly funded and armed by members of the so-called “coalition against the Islamic State”. The deployment of 35 Swedish troops is a minimal contribution but has, nonetheless maximum political effect. That is, that the Scandinavian country lends its political credence to the: “the fight against ISIS“ narrative.
-
Swedish Foreign Minister Margot Wallstöm and Defense Minister Peter Hultquist were quoted in the Swedish daily Dagens Nyheter (Daily News) as saying that “Cooperation against terrorism is the key to success. Sweden will continue to support these common efforts”. The two ministers added that Sweden could eventually expand its mission to 120 troops. The Scandinavian country has a population of about 9.7 million. Political and Legal Implications; Crimes against Peace: To understand the political implications one has to understand the genesis of the war on Syria, why and how it spread to Iraq, related energy-security planning, as well as the direct support of ISIS via NATO member States, Saudi Arabia, as well as other Middle Eastern countries. One also has to understand that the so-called “moderate opposition” and ISIS effectively have the same utility and that arms are transferred in-between the diverse mercenary brigades in the region. None of the above is mentioned in any of the Swedish mainstream media.
-
War Planned Years in Advance: In June 2013 the senior French Statesman and former Foreign Minister Roland Dumas said during an appearance in the French TV channel LPC that top-British officials had asked him, in 2009, if he wanted to participate in ousting the Syrian government with the help of “rebels”. That was years before the first “protests” erupted in 2011: (nsnbc audio archives) Dumas said:
- ...5 more annotations...
Customer proprietary network information - Wikipedia, the free encyclopedia - 0 views
-
Customer proprietary network information (CPNI) is the data collected by telecommunications companies about a consumer's telephone calls. It includes the time, date, duration and destination number of each call, the type of network a consumer subscribes to, and any other information that appears on the consumer's telephone bill. Telemarketers working on behalf of telephone companies, attempting to either win back a customer or upsell a customer with more services, must ask the customer's consent before accessing the billing information or before using that information to offer an upsell or any change of services. Usually this is done at the beginning of a call from the telemarketer to the telephone subscriber.
-
Note that as long as an affiliate is "communications" related, the FCC has ruled that CPNI is under an opt-out approach (can be shared without your explicit permission). A phone company is permitted to sell all information on you, such as numbers you call, when you called them, where you were when you called them, or any other personally identifying information. CPNI would normally require a warrant for law enforcement agencies, but it can be freely sold to "communications" related companies. One can verify this by checking rule 64.2007(b)(1) and footnote 137 in the 2007 CPNI order. One can call up a phone company and opt out by requesting that they do not share CPNI information. In the case of
-
The U.S. Telecommunications Act of 1996 granted the Federal Communications Commission (FCC) authority to regulate how customer proprietary network information (CPNI) can be used and to enforce related consumer information privacy provisions. The rules in the 2007 FCC CPNI Order further restrict CPNI use and create new notification and reporting requirements. The rules in the 2007 CPNI Order include: Limits the information which carriers may provide to third-party marketing firms without first securing the affirmative consent of their customers Defines when and how customer service representatives may share call details Creates new notification and reporting obligations for carriers (including identity verification procedures) Verification process must MATCH what is shown with the company placing the call.
- ...1 more annotation...
REVEALED: GCHQ's BEYOND TOP SECRET Middle Eastern INTERNET SPY BASE * The Register - 0 views
-
Exclusive Above-top-secret details of Britain’s covert surveillance programme - including the location of a clandestine British base tapping undersea cables in the Middle East - have so far remained secret, despite being leaked by fugitive NSA sysadmin Edward Snowden. Government pressure has meant that some media organisations, despite being in possession of these facts, have declined to reveal them. Today, however, the Register publishes them in full.The secret British spy base is part of a programme codenamed “CIRCUIT” and also referred to as Overseas Processing Centre 1 (OPC-1). It is located at Seeb, on the northern coast of Oman, where it taps in to various undersea cables passing through the Strait of Hormuz into the Persian/Arabian Gulf. Seeb is one of a three site GCHQ network in Oman, at locations codenamed “TIMPANI”, “GUITAR” and “CLARINET”. TIMPANI, near the Strait of Hormuz, can monitor Iraqi communications. CLARINET, in the south of Oman, is strategically close to Yemen. British national telco BT, referred to within GCHQ and the American NSA under the ultra-classified codename “REMEDY”, and Vodafone Cable (which owns the former Cable & Wireless company, aka “GERONTIC”) are the two top earners of secret GCHQ payments running into tens of millions of pounds annually.
-
The actual locations of such codenamed “access points” into the worldwide cable backbone are classified 3 levels above Top Secret and labelled “Strap 3”. The true identities of the companies hidden behind codenames such as “REMEDY”, “GERONTIC”, “STREETCAR” or “PINNAGE” are classified one level below this, at “Strap 2”.After these details were withheld, the government opted not to move against the Guardian newspaper last year for publishing above-top-secret information at the lower level designated “Strap 1”. This included details of the billion-pound interception storage system, Project TEMPORA, which were revealed in 2013 and which have triggered Parliamentary enquiries in Britain and Europe, and cases at the European Court of Human Rights. The Guardian was forced to destroy hard drives of leaked information to prevent political embarrassment over extensive commercial arrangements with these and other telecommunications companies who have secretly agreed to tap their own and their customers’ or partners’ overseas cables for the intelligence agency GCHQ. Intelligence chiefs also wished to conceal the identities of countries helping GCHQ and its US partner the NSA by sharing information or providing facilities
-
According to documents revealed by Edward Snowden to journalists including Glenn Greenwald among others, the intelligence agency annually pays selected companies tens of millions of pounds to run secret teams which install hidden connections which copy customers' data and messages to the spooks’ processing centres. The GCHQ-contracted companies also install optical fibre taps or “probes” into equipment belonging to other companies without their knowledge or consent. Within GCHQ, each company has a special section called a “Sensitive Relationship Team” or SRT.BT and Vodafone/C&W also operate extensive long distance optical fibre communications networks throughout the UK, installed and paid for by GCHQ, NSA, or by a third and little known UK intelligence support organization called the National Technical Assistance Centre (NTAC).
WikiLeaks statement on the mass recording of Afghan telephone calls by the NSA - 0 views
-
The National Security Agency has been recording and storing nearly all the domestic (and international) phone calls from two or more target countries as of 2013. Both the Washington Post and The Intercept (based in the US and published by eBay chairman Pierre Omidyar) have censored the name of one of the victim states, which the latter publication refers to as country "X". Both the Washington Post and The Intercept stated that they had censored the name of the victim country at the request of the US government. Such censorship strips a nation of its right to self-determination on a matter which affects its whole population. An ongoing crime of mass espionage is being committed against the victim state and its population. By denying an entire population the knowledge of its own victimisation, this act of censorship denies each individual in that country the opportunity to seek an effective remedy, whether in international courts, or elsewhere. Pre-notification to the perpetrating authorities also permits the erasure of evidence which could be used in a successful criminal prosecution, civil claim, or other investigations.
-
We know from previous reporting that the National Security Agency’s mass interception system is a key component in the United States’ drone targeting program. The US drone targeting program has killed thousands of people and hundreds of women and children in Afghanistan, Pakistan, Yemen and Somalia in violation of international law. The censorship of a victim state’s identity directly assists the killing of innocent people. Although, for reasons of source protection we cannot disclose how, WikiLeaks has confirmed that the identity of victim state is Afghanistan. This can also be independently verified through forensic scrutiny of imperfectly applied censorship on related documents released to date and correlations with other NSA programs (see http://freesnowden.is). We do not believe it is the place of media to "aid and abet" a state in escaping detection and prosecution for a serious crime against a population. Consequently WikiLeaks cannot be complicit in the censorship of victim state X. The country in question is Afghanistan.
Sandy Hook and Obama's Connecticut Social Security number | Fellowship of the Minds - 1 views
-
In May 2011, blogger The Obama Hustle conducted a database pull for SSN 042-68-4425 and got the names of Harrison J. Bounel and Barack Obama (see below), indicating that one SSN was being used by both men.
-
"Sandy Hook and Obama's Connecticut Social Security number Posted on December 27, 2014 by Dr. Eowyn | 18 Comments One of the many curiosities about the sitting President of the United States is the fact that, unlike us, he has not one, but multiple Social Security numbers (SSN). In 2010, two licensed private investigators, Susan Daniels and Neal Sankey, found that multiple SS numbers are associated with Barack Obama's name. Daniels and Sankey put their findings in sworn affidavits. Dr. Orly Taitz further verified their information with a third source, a retired Department of Homeland Security senior investigator named John Sampson. In May 2010, the mystery deepened when it was determined that the SSN Obama is currently using (042-68-4425) has a Connecticut prefix, 042, but Obama had never lived in nor had associations with the state of Connecticut. Obama has been using that 042 SS number since 1979 when he was 18 years old. In an article for Western Journalism, Stephen Baldwin writes: All told, there are 49 addresses and 16 different Social Security numbers listed for a person whose name is spelled "Barack Obama." […] the one Social Security number Obama most frequently used, the one beginning with 042, is a number issued in Connecticut sometime during 1976-1977, yet there is no record of Obama ever living or working in Connecticut. Indeed, during this time period Obama would have been 15-16 years old and living in Hawaii at the time. In late February 2011, the mystery further deepened when retired US Air Force Col. Gregory Hollister, the litigant in an Obama eligibility lawsuit, conducted a search for Obama's Connecticut SSN in the Social Security Number Verification System used by small businesses to verify employment eligibility. The results came back as: Failed: SSN not in file (never issued) To the question of why Obama obtained a Connecticut-issued SSN instead of one by Hawaii, Joel Gilbert, maker of the documentary Dreams from
News Roundup and Notes: September 12, 2014 | Just Security - 0 views
-
Iraq and Syria The Pentagon has begun rolling out the expanded campaign against the Islamic State, although operations will increase gradually over a number of months [Wall Street Journal’s Julian E. Barnes]. Retired Marine general, John R. Allen, has been chosen to coordinate the international coalition against ISIS, according to a senior administration official [New York Times’ Michael R. Gordon]. In an interview with NPR (Eyder Peralta), Obama’s national security advisor Susan Rice emphasized that the operation against ISIS would not be “Iraq war redux” and that the U.S. is not going to deploy ground troops with a combat role.
-
Democratic senators are reportedly unnerved by President Obama’s attempt to gain swift authority from Congress to arm and train Syrian rebels [Politico’s Burgess Everett and Seung Min Kim]. House Republicans are said to be split on their views, with some, including Intelligence Chairman Mike Rogers speaking out in favor, whereas others showed more caution [The Hill’s Scott Wong et al]. The New York Times (Jonathan Weisman) reports that House Republican leaders will call members back to the Capitol early next week, in “a rare show of unity” with President Obama, to authorize the arming and training of rebels in Syria. Arab states remained reserved about the extent of their commitment to military efforts to combat the Islamic State yesterday, even as Secretary of State John Kerry succeeded in obtaining their support at a meeting in Saudi Arabia [Wall Street Journal’s Maria Abi-Habib and Jay Solomon]. Al Jazeera reports that French President Francois Hollande is travelling to Iraq in an act of visible support ahead of possible airstrikes with the U.S.-led coalition against the Islamic State.
-
The Syrian deputy foreign minister has said that Syria has “no reservations” about airstrikes in the territory, but said that “it is a must” for Obama to call Syrian President Assad [NBC News]. Anne Bernard [New York Times] writes that the prospect of U.S. strikes in Syria “captivated” the people on Thursday, with debate over whether the strikes would help or hinder President Assad. The New York Times (Ben Hubbard et al.) explores the complexities faced by the U.S. in using decentralized and diverse Syrian rebels to counter the Islamic State in Syria. Tom Perry and Alexander Dziadosz [Reuters] explore the impact that U.S. support for the Syrian opposition against the Islamic State will have on the Assad regime.
- ...3 more annotations...
In Midst of War, Ukraine Becomes Gateway for Jihad - The Intercept - 0 views
-
Khalid, who uses a pseudonym, leads the Islamic State’s underground branch in Istanbul. He came from Syria to help control the flood of volunteers arriving in Turkey from all over the world, wanting to join the global jihad. Now, he wanted to put me in touch with Rizvan, a “brother” fighting with Muslims in Ukraine. The “brothers” are members of ISIS and other underground Islamic organizations, men who have abandoned their own countries and cities. Often using pseudonyms and fake identities, they are working and fighting in the Middle East, Africa and the Caucasus, slipping across borders without visas. Some are fighting to create a new Caliphate — heaven on earth. Others — like Chechens, Kurds and Dagestanis — say they are fighting for freedom, independence and self-determination. They are on every continent, and in almost every country, and now they are in Ukraine, too.
-
Ukraine is now becoming an important stop-off point for the brothers, like Rizvan. In Ukraine, you can buy a passport and a new identity. For $15,000, a fighter receives a new name and a legal document attesting to Ukrainian citizenship. Ukraine doesn’t belong to the European Union, but it’s an easy pathway for immigration to the West. Ukrainians have few difficulties obtaining visas to neighboring Poland, where they can work on construction sites and in restaurants, filling the gap left by the millions of Poles who have left in search of work in the United Kingdom and Germany. You can also do business in Ukraine that’s not quite legal. You can earn easy money for the brothers fighting in the Caucasus, Syria and Afghanistan. You can “legally” acquire unregistered weapons to fight the Russian-backed separatists, and then export them by bribing corrupt Ukrainian customs officers.
Barack Obama's Secret Terrorist-Tracking System, by the Numbers - The InterceptThe Inte... - 0 views
-
Nearly half of the people on the U.S. government’s widely shared database of terrorist suspects are not connected to any known terrorist group, according to classified government documents obtained by The Intercept. Of the 680,000 people caught up in the government’s Terrorist Screening Database—a watchlist of “known or suspected terrorists” that is shared with local law enforcement agencies, private contractors, and foreign governments—more than 40 percent are described by the government as having “no recognized terrorist group affiliation.” That category—280,000 people—dwarfs the number of watchlisted people suspected of ties to al Qaeda, Hamas, and Hezbollah combined. The documents, obtained from a source in the intelligence community, also reveal that the Obama Administration has presided over an unprecedented expansion of the terrorist screening system. Since taking office, Obama has boosted the number of people on the no fly list more than ten-fold, to an all-time high of 47,000—surpassing the number of people barred from flying under George W. Bush. “If everything is terrorism, then nothing is terrorism,” says David Gomez, a former senior FBI special agent. The watchlisting system, he adds, is “revving out of control.”
-
Most people placed on the government’s watchlist begin in a larger, classified system known as the Terrorist Identities Datamart Environment (TIDE). The TIDE database actually allows for targeting people based on far less evidence than the already lax standards used for placing people on the watchlist. A more expansive—and invasive—database, TIDE’s information is shared across the U.S. intelligence community, as well as with commando units from the Special Operations Command and with domestic agencies such as the New York City Police Department. In the summer of 2013, officials celebrated what one classified document prepared by the National Counterterrorism Center refers to as “a milestone”—boosting the number of people in the TIDE database to a total of one million, up from half a million four years earlier.
‹ Previous
21 - 40 of 185
Next ›
Last »
Showing 20▼ items per page