Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged identity

Rss Feed Group items tagged

Paul Merrell

On Media Outlets That Continue to Describe Unknown Drone Victims As "Militants" - The I... - 0 views

  • It has been more than two years since The New York Times revealed that “Mr. Obama embraced a disputed method for counting civilian casualties” of his drone strikes which “in effect counts all military-age males in a strike zone as combatants…unless there is explicit intelligence posthumously proving them innocent.” The paper noted that “this counting method may partly explain the official claims of extraordinarily low collateral deaths,” and even quoted CIA officials as deeply “troubled” by this decision: “One called it ‘guilt by association’ that has led to ‘deceptive’ estimates of civilian casualties. ‘It bothers me when they say there were seven guys, so they must all be militants. They count the corpses and they’re not really sure who they are.’” But what bothered even some intelligence officials at the agency carrying out the strikes seemed of no concern whatsoever to most major media outlets. As I documented days after the Times article, most large western media outlets continued to describe completely unknown victims of U.S. drone attacks as “militants”—even though they (a) had no idea who those victims were or what they had done and (b) were well-aware by that point that the term had been “re-defined” by the Obama administration into Alice in Wonderland-level nonsense.
  • A new article in The New Yorker by Steve Coll underscores how deceptive this journalistic practice is. Among other things, he notes that the U.S. government itself—let alone the media outlets calling them “militants”—often has no idea who has been killed by drone strikes in Pakistan. That’s because, in 2008, George W. Bush and his CIA chief, Gen. Michael Hayden, implemented “signature strikes,” under which “new rules allowed drone operators to fire at armed military-aged males engaged in or associated with suspicious activity even if their identities were unknown.” The Intercept previously reported that targeting decisions can even be made on the basis of nothing more than metadata analysis and tracking of SIM cards in mobile phones.
  • The journalist Daniel Klaidman has noted that within the CIA, they “sometimes call it crowd killing….  If you don’t have positive ID on the people you’re targeting with these drone strikes.” The tactic of drone-killing first responders and rescuers who come to the scene of drone attacks or even mourners at funerals of drone victims—used by the Obama administration and designated “terror groups” alike—are classic examples. Nobody has any real idea who the dead are, but they are nonetheless routinely called “militants” by the American government and media. As international law professor Kevin Jon Heller documented in 2012, “The vast majority of drone attacks conducted by the U.S. have been signature strikes—those that target ‘groups of men who bear certain signatures, or defining characteristics associated with terrorist activity, but whose identities aren’t known.’”
Paul Merrell

Details Of Assassination Plot On Occupy Movement Leaders Withheld From Public At FBI's ... - 0 views

  • The FBI was right to withhold records about an alleged murder plot targeting the leaders of Occupy Houston, to protect its informants, a federal judge ruled. Plaintiff Ryan Noah Shapiro is a doctoral student at the Massachusetts Institute of Technology. His research includes “the policing of dissent … especially in the name of national security” and “examining FBI and other intelligence agency efforts to preserve domestic surveillance capabilities while simultaneously subverting the Freedom of Information Act,” according to his MIT profile. Shapiro sent the FBI three Freedom of Information Act requests in early 2013, asking for records about “a potential plan to gather intelligence against the leaders of [Occupy Wall Street-related protests in Houston] and obtain photographs, then formulate a plan to kill the leadership [of the protests] via suppressed sniper rifles.” Shapiro told Courthouse News he learned of the alleged plot from FBI documents obtained by investigative reporter Jason Leopold.
  • The FBI had refused to give Shapiro any documents until he filed an April 2013 federal complaint in Washington, D.C., after which the agency gave him 17 pages. U.S. District Judge Rosemary Collyer found last year that the FBI had properly withheld some records, but took issue with its use of Exemption 7 under the FOIA, which protects from disclosure “records or information compiled for law enforcement purposes.” Collyer dismissed the lawsuit this week after reviewing the documents in her chambers. Shapiro challenged the FBI’s withholding of the names of its murder plot sources, claiming there is no privacy expectation for people who could be called to testify as trial witnesses. But Collyer found Monday that the FBI correctly invoked FOIA exemption 7(c), which shields law enforcement records from disclosure if they could constitute an invasion of personal privacy. The judge also agreed with the FBI that exemption 7(d) applied to the case. It allows records to be withheld if they “could reasonably be expected to disclose the identity of a confidential source.”
  • Citing a declaration from FBI agent David Hardy that said the confidential sources are “individuals who are members of organized violent groups,” Collyer said the likelihood of retaliation justified keeping the sources’ identities under wraps. Shapiro vowed to keep fighting for the records. “I’m of course disappointed in, and disagree with, the judge’s ruling. I’m now conferring with my attorney to determine next steps,” Shapiro said in an email. He said he is concerned that the FBI collected dossiers on Occupy protestors while publicly denying it. “The FBI even flatly asserted in a separate FOIA lawsuit of mine that, ‘(T)he FBI determined that it had never opened an investigation on the Occupy movement,'” Shapiro wrote. “Yet, in the course of my FOIA lawsuit against the FBI for records about the sniper plot against Occupy Houston, the FBI contradicted its own position.” Shapiro said that with recently released FBI documents about Occupy Chicago, “We are coming ever closer to finally forcing the FBI to concede it actually possesses a large volume of documents about this FBI-coordinated nationwide investigation of political protesters as supposed terroristic threats to national security.”
Paul Merrell

Senator blasts CIA for censoring 'torture' report - 0 views

  • Sen. Ron Wyden says the CIA is trying to blunt the impact of an upcoming Senate report examining the harsh treatment of al-Qaida detainees by insisting on censoring the pseudonyms used for agency officers mentioned in the document. "The intelligence leadership doing everything they can to bury the facts," said Wyden, D-Ore., a Senate Intelligence Committee member who has been a frequent critic of the spy agency.
  • President Barack Obama and other senior officials have said the CIA's use of waterboarding, stress positions, sleep deprivation and other harsh techniques on some detainees constituted torture. Many current and former CIA officers dispute that. The Senate report asserts that the harsh treatment didn't work and that CIA officials misled Congress and other government agencies about it. Also to be released is a CIA response, and a separate one by Senate Republicans, which challenge the report's conclusions. CIA officials say they fear the publication of officer pseudonyms — often just a first name such as "Roger"— would lead to the unmasking of undercover officers. Readers could track the same person in different jobs and places, making it easier to discover their identity. Without the pseudonyms, Wyden says, the report would be much harder to understand because readers wouldn't be able to distinguish different CIA officers. Readers wouldn't know, for example, whether same CIA official had been accused of lying multiple times.
  • Wyden pointed out that the 9/11 Commission Report and a 2004 report into abuses at Iraq's Abu Ghraib prison used pseudonyms for CIA officers. "I think it is appropriate to redact specific identifying information so the identities of undercover officers are not publicly exposed," Wyden told The Associated Press. Wyden said the Senate report documents "falsehoods, misdeeds and mistakes" by the CIA. Asked about Wyden's remarks, CIA spokesman Dean Boyd said, "Pseudonyms are redacted to keep individual intelligence officers from being identified and potentially harmed. Making public those pseudonyms associated with individual officers, as well as dates, locations and other identifying information related to those officers, dramatically increases the likelihood that they will be exposed and potentially subject to threats or violence."
  •  
    But if we put the torturers in prison for the rest of their lives where they belong, we wouldn't need to worry about them being under cover or being identified. We could just use their real names. 
Paul Merrell

Information Warfare: Automated Propaganda and Social Media Bots | Global Research - 0 views

  • NATO has announced that it is launching an “information war” against Russia. The UK publicly announced a battalion of keyboard warriors to spread disinformation. It’s well-documented that the West has long used false propaganda to sway public opinion. Western military and intelligence services manipulate social media to counter criticism of Western policies. Such manipulation includes flooding social media with comments supporting the government and large corporations, using armies of sock puppets, i.e. fake social media identities. See this, this, this, this and this. In 2013, the American Congress repealed the formal ban against the deployment of propaganda against U.S. citizens living on American soil. So there’s even less to constrain propaganda than before.
  • Information warfare for propaganda purposes also includes: The Pentagon, Federal Reserve and other government entities using software to track discussion of political issues … to try to nip dissent in the bud before it goes viral “Controlling, infiltrating, manipulating and warping” online discourse Use of artificial intelligence programs to try to predict how people will react to propaganda
  • Some of the propaganda is spread by software programs. We pointed out 6 years ago that people were writing scripts to censor hard-hitting information from social media. One of America’s top cyber-propagandists – former high-level military information officer Joel Harding – wrote in December: I was in a discussion today about information being used in social media as a possible weapon.  The people I was talking with have a tool which scrapes social media sites, gauges their sentiment and gives the user the opportunity to automatically generate a persuasive response. Their tool is called a “Social Networking Influence Engine”. *** The implications seem to be profound for the information environment. *** The people who own this tool are in the civilian world and don’t even remotely touch the defense sector, so getting approval from the US Department of State might not even occur to them.
  • ...2 more annotations...
  • How Can This Real? Gizmodo reported in 2010: Software developer Nigel Leck got tired rehashing the same 140-character arguments against climate change deniers, so he programmed a bot that does the work for him. With citations! Leck’s bot, @AI_AGW, doesn’t just respond to arguments directed at Leck himself, it goes out and picks fights. Every five minutes it trawls Twitter for terms and phrases that commonly crop up in Tweets that refute human-caused climate change. It then searches its database of hundreds to find a counter-argument best suited for that tweet—usually a quick statement and a link to a scientific source. As can be the case with these sorts of things, many of the deniers don’t know they’ve been targeted by a robot and engage AI_AGW in debate. The bot will continue to fire back canned responses that best fit the interlocutor’s line of debate—Leck says this goes on for days, in some cases—and the bot’s been outfitted with a number of responses on the topic of religion, where the arguments unsurprisingly often end up. Technology has come a long way in the past 5 years. So if a lone programmer could do this 5 years ago, imagine what he could do now. And the big players have a lot more resources at their disposal than a lone climate activist/software developer does.  For example, a government expert told the Washington Post that the government “quite literally can watch your ideas form as you type” (and see this).  So if the lone programmer is doing it, it’s not unreasonable to assume that the big boys are widely doing it.
  • How Effective Are Automated Comments? Unfortunately, this is more effective than you might assume … Specifically, scientists have shown that name-calling and swearing breaks down people’s ability to think rationally … and intentionally sowing discord and posting junk comments to push down insightful comments  are common propaganda techniques. Indeed, an automated program need not even be that sophisticated … it can copy a couple of words from the main post or a comment, and then spew back one or more radioactive labels such as “terrorist”, “commie”, “Russia-lover”, “wimp”, “fascist”, “loser”, “traitor”, “conspiratard”, etc. Given that Harding and his compadres consider anyone who questions any U.S. policies as an enemy of the state  – as does the Obama administration (and see this) – many honest, patriotic writers and commenters may be targeted for automated propaganda comments.
Gary Edwards

Ukraine's Oligarchs Turn on Each Other | Consortiumnews - 0 views

  • n the never-never land of how the mainstream U.S. press covers the Ukraine crisis, the appointment last year of thuggish oligarch Igor Kolomoisky to govern one of the country’s eastern provinces was pitched as a democratic “reform” because he was supposedly too rich to bribe, without noting that his wealth had come from plundering the country’s economy.In other words, the new U.S.-backed “democratic” regime, after overthrowing democratically elected President Viktor Yanukovych because he was “corrupt,” was rewarding one of Ukraine’s top thieves by letting him lord over his own province, Dnipropetrovsk Oblast, with the help of his personal army.
  • Last year, Kolomoisky’s brutal militias, which include neo-Nazi brigades, were praised for their fierce fighting against ethnic Russians from the east who were resisting the removal of their president. But now Kolomoisky, whose financial empire is crumbling as Ukraine’s economy founders, has turned his hired guns against the Ukrainian government led by another oligarch, President Petro Poroshenko.Last Thursday night, Kolomoisky and his armed men went to Kiev after the government tried to wrest control of the state-owned energy company UkrTransNafta from one of his associates. Kolomoisky and his men raided the company offices to seize and apparently destroy records. As he left the building, he cursed out journalists who had arrived to ask what was going on. He ranted about “Russian saboteurs.”It was a revealing display of how the corrupt Ukrainian political-economic system works and the nature of the “reformers” whom the U.S. State Department has pushed into positions of power. According to BusinessInsider, the Kiev government tried to smooth Kolomoisky’s ruffled feathers by announcing “that the new company chairman [at UkrTransNafta] would not be carrying out any investigations of its finances.”
  • Yet, it remained unclear whether Kolomoisky would be satisfied with what amounts to an offer to let any past thievery go unpunished. But if this promised amnesty wasn’t enough, Kolomoisky appeared ready to use his private army to discourage any accountability.On Monday, Valentyn Nalyvaychenko, chief of the State Security Service, accused Dnipropetrovsk officials of financing armed gangs and threatening investigators, Bloomberg News reported, while noting that Ukraine has sunk to 142nd place out of 175 countries in Transparency International’s Corruptions Perception Index, the worst in Europe.The see-no-evil approach to how the current Ukrainian authorities do business relates as well to Ukraine’s new Finance Minister Natalie Jaresko, who appears to have enriched herself at the expense of a $150 million U.S.-taxpayer-financed investment fund for Ukraine.
  • ...4 more annotations...
  • Regarding Kolomoisky’s claim about “Russian saboteurs,” the government said that was not the case, explaining that the clash resulted from the parliament’s vote last week to reduce Kolomoisky’s authority to run the company from his position as a minority owner. As part of the shakeup, Kolomoisky’s protégé Oleksandr Lazorko was fired as chairman, but he refused to leave and barricaded himself in his office, setting the stage for Kolomoisky’s arrival with armed men.On Tuesday, the New York Times reported on the dispute but also flashed back to its earlier propagandistic praise of the 52-year-old oligarch, recalling that “Mr. Kolomoisky was one of several oligarchs, considered too rich to bribe, who were appointed to leadership positions in a bid to stabilize Ukraine.”Kolomoisky also is believed to have purchased influence inside the U.S. government through his behind-the-scenes manipulation of Ukraine’s largest private gas firm, Burisma Holdings. Last year, the shadowy Cyprus-based company appointed Vice President Joe Biden’s son, Hunter Biden, to its board of directors. Burisma also lined up well-connected lobbyists, some with ties to Secretary of State John Kerry, including Kerry’s former Senate chief of staff David Leiter, according to lobbying disclosures.
  • Jaresko, a former U.S. diplomat who received overnight Ukrainian citizenship in December to become Finance Minister, had been in charge of the Western NIS Enterprise Fund (WNISEF), which became the center of insider-dealing and conflicts of interest, although the U.S. Agency for International Development showed little desire to examine the ethical problems – even after Jaresko’s ex-husband tried to blow the whistle. [See Consortiumnews.com’s “Ukraine Finance Minister’s American ‘Values.’”]Passing Out the BillionsJaresko will be in charge of dispensing the $17.5 billion that the International Monetary Fund is allocating to Ukraine, along with billions of dollars more expected from U.S. and European governments.
  • As Time magazine reported, “Leiter’s involvement in the firm rounds out a power-packed team of politically-connected Americans that also includes a second new board member, Devon Archer, a Democratic bundler and former adviser to John Kerry’s 2004 presidential campaign. Both Archer and Hunter Biden have worked as business partners with Kerry’s son-in-law, Christopher Heinz, the founding partner of Rosemont Capital, a private-equity company.”According to investigative journalism in Ukraine, the ownership of Burisma has been traced to Privat Bank, which is controlled by Kolomoisky.So, it appears that Ukraine’s oligarchs who continue to wield enormous power inside the corrupt country are now circling each other over what’s left of the economic spoils and positioning themselves for a share of the international bailouts to come.
  • As for “democratic reform,” only in the upside-down world of the State Department’s Orwellian “information war” against Russia over Ukraine would imposing a corrupt and brutal oligarch like Kolomoisky as the unelected governor of a defenseless population be considered a positive.(Early Wednesday morning, President Poroshenko dismissed Kolomoisky from his post as Dnipropetrovsk regional governor.)
  •  
    Another of the greatest U.S. exports: corruption.
  •  
    Corporate oligarchs leading private but well armed armies in raids against the Ukrainian government holdings - controlled by other corporate oligarchs? This article dives into the mess that the USA and European NATO allies have stirred in the Ukraine, and through this lens we get to see what the world will look like when corporate oligarchs and their Bankster masters rule the world. The article is revealing, but it fails to connect the corporatist to the Banks that are sending in billions of dollars. The connection instead is made to the democratic governments intent on pushing the world into world war 3. Nor is there much mention of the oil and natural gas pipeline and supply geographics that dominate battlefields from the Ukraine, to Syria, Iraq and Lybia. The New World Order needs a third World War if it's to truly overturn the fragile post World War II economic order loosely based on free market capitalism, individual liberty and democratic governance. The end of national sovereignty, religious and cultural identities has one more hurdle. And there is no doubt in my mind that the elites are ready to jump that hurdle. World War III has spread from the middle east to middle Europe. Best we all hold on. .................. "Exclusive: Ukraine's post-coup regime is facing what looks like a falling-out among thieves as oligarch-warlord Igor Kolomoisky, who was given his own province to rule, brought his armed men to Kiev to fight for control of the state-owned energy company, further complicating the State Department's propaganda efforts, reports Robert Parry. In the never-never land of how the mainstream U.S. press covers the Ukraine crisis, the appointment last year of thuggish oligarch Igor Kolomoisky to govern one of the country's eastern provinces was pitched as a democratic "reform" because he was supposedly too rich to bribe, without noting that his wealth had come from plundering the country's economy. In other words, the new U.S.-b
Paul Merrell

Edward Snowden Explains How To Reclaim Your Privacy - 0 views

  • Micah Lee: What are some operational security practices you think everyone should adopt? Just useful stuff for average people. Edward Snowden: [Opsec] is important even if you’re not worried about the NSA. Because when you think about who the victims of surveillance are, on a day-to-day basis, you’re thinking about people who are in abusive spousal relationships, you’re thinking about people who are concerned about stalkers, you’re thinking about children who are concerned about their parents overhearing things. It’s to reclaim a level of privacy. The first step that anyone could take is to encrypt their phone calls and their text messages. You can do that through the smartphone app Signal, by Open Whisper Systems. It’s free, and you can just download it immediately. And anybody you’re talking to now, their communications, if it’s intercepted, can’t be read by adversaries. [Signal is available for iOS and Android, and, unlike a lot of security tools, is very easy to use.] You should encrypt your hard disk, so that if your computer is stolen the information isn’t obtainable to an adversary — pictures, where you live, where you work, where your kids are, where you go to school. [I’ve written a guide to encrypting your disk on Windows, Mac, and Linux.] Use a password manager. One of the main things that gets people’s private information exposed, not necessarily to the most powerful adversaries, but to the most common ones, are data dumps. Your credentials may be revealed because some service you stopped using in 2007 gets hacked, and your password that you were using for that one site also works for your Gmail account. A password manager allows you to create unique passwords for every site that are unbreakable, but you don’t have the burden of memorizing them. [The password manager KeePassX is free, open source, cross-platform, and never stores anything in the cloud.]
  • The other thing there is two-factor authentication. The value of this is if someone does steal your password, or it’s left or exposed somewhere … [two-factor authentication] allows the provider to send you a secondary means of authentication — a text message or something like that. [If you enable two-factor authentication, an attacker needs both your password as the first factor and a physical device, like your phone, as your second factor, to login to your account. Gmail, Facebook, Twitter, Dropbox, GitHub, Battle.net, and tons of other services all support two-factor authentication.]
  • We should armor ourselves using systems we can rely on every day. This doesn’t need to be an extraordinary lifestyle change. It doesn’t have to be something that is disruptive. It should be invisible, it should be atmospheric, it should be something that happens painlessly, effortlessly. This is why I like apps like Signal, because they’re low friction. It doesn’t require you to re-order your life. It doesn’t require you to change your method of communications. You can use it right now to talk to your friends.
  • ...4 more annotations...
  • Lee: What do you think about Tor? Do you think that everyone should be familiar with it, or do you think that it’s only a use-it-if-you-need-it thing? Snowden: I think Tor is the most important privacy-enhancing technology project being used today. I use Tor personally all the time. We know it works from at least one anecdotal case that’s fairly familiar to most people at this point. That’s not to say that Tor is bulletproof. What Tor does is it provides a measure of security and allows you to disassociate your physical location. … But the basic idea, the concept of Tor that is so valuable, is that it’s run by volunteers. Anyone can create a new node on the network, whether it’s an entry node, a middle router, or an exit point, on the basis of their willingness to accept some risk. The voluntary nature of this network means that it is survivable, it’s resistant, it’s flexible. [Tor Browser is a great way to selectively use Tor to look something up and not leave a trace that you did it. It can also help bypass censorship when you’re on a network where certain sites are blocked. If you want to get more involved, you can volunteer to run your own Tor node, as I do, and support the diversity of the Tor network.]
  • Lee: So that is all stuff that everybody should be doing. What about people who have exceptional threat models, like future intelligence-community whistleblowers, and other people who have nation-state adversaries? Maybe journalists, in some cases, or activists, or people like that? Snowden: So the first answer is that you can’t learn this from a single article. The needs of every individual in a high-risk environment are different. And the capabilities of the adversary are constantly improving. The tooling changes as well. What really matters is to be conscious of the principles of compromise. How can the adversary, in general, gain access to information that is sensitive to you? What kinds of things do you need to protect? Because of course you don’t need to hide everything from the adversary. You don’t need to live a paranoid life, off the grid, in hiding, in the woods in Montana. What we do need to protect are the facts of our activities, our beliefs, and our lives that could be used against us in manners that are contrary to our interests. So when we think about this for whistleblowers, for example, if you witnessed some kind of wrongdoing and you need to reveal this information, and you believe there are people that want to interfere with that, you need to think about how to compartmentalize that.
  • Tell no one who doesn’t need to know. [Lindsay Mills, Snowden’s girlfriend of several years, didn’t know that he had been collecting documents to leak to journalists until she heard about it on the news, like everyone else.] When we talk about whistleblowers and what to do, you want to think about tools for protecting your identity, protecting the existence of the relationship from any type of conventional communication system. You want to use something like SecureDrop, over the Tor network, so there is no connection between the computer that you are using at the time — preferably with a non-persistent operating system like Tails, so you’ve left no forensic trace on the machine you’re using, which hopefully is a disposable machine that you can get rid of afterward, that can’t be found in a raid, that can’t be analyzed or anything like that — so that the only outcome of your operational activities are the stories reported by the journalists. [SecureDrop is a whistleblower submission system. Here is a guide to using The Intercept’s SecureDrop server as safely as possible.]
  • And this is to be sure that whoever has been engaging in this wrongdoing cannot distract from the controversy by pointing to your physical identity. Instead they have to deal with the facts of the controversy rather than the actors that are involved in it. Lee: What about for people who are, like, in a repressive regime and are trying to … Snowden: Use Tor. Lee: Use Tor? Snowden: If you’re not using Tor you’re doing it wrong. Now, there is a counterpoint here where the use of privacy-enhancing technologies in certain areas can actually single you out for additional surveillance through the exercise of repressive measures. This is why it’s so critical for developers who are working on security-enhancing tools to not make their protocols stand out.
  •  
    Lots more in the interview that I didn't highlight. This is a must-read.
Gary Edwards

Hating the Establishment Is Not the Same as Supporting Liberty | Foundation for Economi... - 1 views

  • You might point to the American Revolution as a contrary case. We tossed out the British monarchy and invented freedom! But think again. The war itself created a new establishment consisting of politicians, military generals, bond dealers, and influential landholders.
  • Twelve years after the Declaration of Independence, these groups got together and formed a new government that, in time, became as oppressive and restrictive — and in some ways, more so — as the one the revolutionaries overthrew. And this occurred despite the existence of classical liberal political norms and intellectual culture.
  • He has said nothing about dismantling power.
  • ...9 more annotations...
  • Indeed, he is on record with his desire to radically expand the power of the state.
  • He wants surveillance, controls on the internet, religious tests for migration, war-like tariffs, industrial planning, and autocratic foreign-policy power. He’s praised police power and toyed with ideas such as internment and killings of political enemies. His entire governing philosophy boils down to arbitrary, free-wheeling authoritarianism.
  • As for Sanders, everything that is bad about the current establishment he promises to make worse with more programs, bureaucracy, taxes, controls, and government power in order to making life fair, just, and equitable. He speaks as if he’s never heard of the failed history of socialism and certainly hasn’t learned anything from it.
  • The ideal is liberty, not the overthrow of existing elite structures as such.
  • They resist rampant populism that would lead to a pillaging of the nation that is serving them so well.
  • To understand Machiavelli, realize that his black beast was the cleric Savonarola, Florence’s quasi-dictator who led a mass movement of crazed pietists who pillaged and burned material possessions as a pathway to heaven. The Bonfire of the Vanities of 1487 was one result. This is exactly the kind of mania that establishments exist to keep at bay.
  • The main payout is the control of the state apparatus that outlives the establishment’s overthrow. It makes sense that the results will tend to be more ruthless, vengeful, and bloody than anything that came before.
  • Establishments are as Machiavelli described: stable machines that keep competitors at bay but otherwise seek to make the system work for themselves.
  • The goal should be the tearing down of power itself and its replacement by simple human rights and a society that functions according to civilized standards.
  •  
    "But there's a problem. The state power we oppose is not identical to the establishment we reject. You can overthrow the establishment and still be left with a gigantic machinery of legalized exploitation. All the agencies, laws, regulations, and powers are still in place. And now you have a problem: someone else is in charge of the state itself. You might call it a new establishment. It could be even more wicked than the one you swept away. Indeed, it usually is. Maybe always. Anatomy of the Establishment What is an establishment? It is a network of large and cooperating interest groups that have developed a stable relationship with state power. It includes finance, organized labor, public bureaucrats, government contractors, big businesses with quid pro quo relationships with regulators and politicians, political families with a strong stake in the election process, intellectuals at state-friendly think tanks and universities, and so on."
Paul Merrell

Cy Vance's Proposal to Backdoor Encrypted Devices Is Riddled With Vulnerabilities | Jus... - 0 views

  • Less than a week after the attacks in Paris — while the public and policymakers were still reeling, and the investigation had barely gotten off the ground — Cy Vance, Manhattan’s District Attorney, released a policy paper calling for legislation requiring companies to provide the government with backdoor access to their smartphones and other mobile devices. This is the first concrete proposal of this type since September 2014, when FBI Director James Comey reignited the “Crypto Wars” in response to Apple’s and Google’s decisions to use default encryption on their smartphones. Though Comey seized on Apple’s and Google’s decisions to encrypt their devices by default, his concerns are primarily related to end-to-end encryption, which protects communications that are in transit. Vance’s proposal, on the other hand, is only concerned with device encryption, which protects data stored on phones. It is still unclear whether encryption played any role in the Paris attacks, though we do know that the attackers were using unencrypted SMS text messages on the night of the attack, and that some of them were even known to intelligence agencies and had previously been under surveillance. But regardless of whether encryption was used at some point during the planning of the attacks, as I lay out below, prohibiting companies from selling encrypted devices would not prevent criminals or terrorists from being able to access unbreakable encryption. Vance’s primary complaint is that Apple’s and Google’s decisions to provide their customers with more secure devices through encryption interferes with criminal investigations. He claims encryption prevents law enforcement from accessing stored data like iMessages, photos and videos, Internet search histories, and third party app data. He makes several arguments to justify his proposal to build backdoors into encrypted smartphones, but none of them hold water.
  • Before addressing the major privacy, security, and implementation concerns that his proposal raises, it is worth noting that while an increase in use of fully encrypted devices could interfere with some law enforcement investigations, it will help prevent far more crimes — especially smartphone theft, and the consequent potential for identity theft. According to Consumer Reports, in 2014 there were more than two million victims of smartphone theft, and nearly two-thirds of all smartphone users either took no steps to secure their phones or their data or failed to implement passcode access for their phones. Default encryption could reduce instances of theft because perpetrators would no longer be able to break into the phone to steal the data.
  • Vance argues that creating a weakness in encryption to allow law enforcement to access data stored on devices does not raise serious concerns for security and privacy, since in order to exploit the vulnerability one would need access to the actual device. He considers this an acceptable risk, claiming it would not be the same as creating a widespread vulnerability in encryption protecting communications in transit (like emails), and that it would be cheap and easy for companies to implement. But Vance seems to be underestimating the risks involved with his plan. It is increasingly important that smartphones and other devices are protected by the strongest encryption possible. Our devices and the apps on them contain astonishing amounts of personal information, so much that an unprecedented level of harm could be caused if a smartphone or device with an exploitable vulnerability is stolen, not least in the forms of identity fraud and credit card theft. We bank on our phones, and have access to credit card payments with services like Apple Pay. Our contact lists are stored on our phones, including phone numbers, emails, social media accounts, and addresses. Passwords are often stored on people’s phones. And phones and apps are often full of personal details about their lives, from food diaries to logs of favorite places to personal photographs. Symantec conducted a study, where the company spread 50 “lost” phones in public to see what people who picked up the phones would do with them. The company found that 95 percent of those people tried to access the phone, and while nearly 90 percent tried to access private information stored on the phone or in other private accounts such as banking services and email, only 50 percent attempted contacting the owner.
  • ...8 more annotations...
  • In addition to his weak reasoning for why it would be feasible to create backdoors to encrypted devices without creating undue security risks or harming privacy, Vance makes several flawed policy-based arguments in favor of his proposal. He argues that criminals benefit from devices that are protected by strong encryption. That may be true, but strong encryption is also a critical tool used by billions of average people around the world every day to protect their transactions, communications, and private information. Lawyers, doctors, and journalists rely on encryption to protect their clients, patients, and sources. Government officials, from the President to the directors of the NSA and FBI, and members of Congress, depend on strong encryption for cybersecurity and data security. There are far more innocent Americans who benefit from strong encryption than there are criminals who exploit it. Encryption is also essential to our economy. Device manufacturers could suffer major economic losses if they are prohibited from competing with foreign manufacturers who offer more secure devices. Encryption also protects major companies from corporate and nation-state espionage. As more daily business activities are done on smartphones and other devices, they may now hold highly proprietary or sensitive information. Those devices could be targeted even more than they are now if all that has to be done to access that information is to steal an employee’s smartphone and exploit a vulnerability the manufacturer was required to create.
  • Privacy is another concern that Vance dismisses too easily. Despite Vance’s arguments otherwise, building backdoors into device encryption undermines privacy. Our government does not impose a similar requirement in any other context. Police can enter homes with warrants, but there is no requirement that people record their conversations and interactions just in case they someday become useful in an investigation. The conversations that we once had through disposable letters and in-person conversations now happen over the Internet and on phones. Just because the medium has changed does not mean our right to privacy has.
  • Vance attempts to downplay this serious risk by asserting that anyone can use the “Find My Phone” or Android Device Manager services that allow owners to delete the data on their phones if stolen. However, this does not stand up to scrutiny. These services are effective only when an owner realizes their phone is missing and can take swift action on another computer or device. This delay ensures some period of vulnerability. Encryption, on the other hand, protects everyone immediately and always. Additionally, Vance argues that it is safer to build backdoors into encrypted devices than it is to do so for encrypted communications in transit. It is true that there is a difference in the threats posed by the two types of encryption backdoors that are being debated. However, some manner of widespread vulnerability will inevitably result from a backdoor to encrypted devices. Indeed, the NSA and GCHQ reportedly hacked into a database to obtain cell phone SIM card encryption keys in order defeat the security protecting users’ communications and activities and to conduct surveillance. Clearly, the reality is that the threat of such a breach, whether from a hacker or a nation state actor, is very real. Even if companies go the extra mile and create a different means of access for every phone, such as a separate access key for each phone, significant vulnerabilities will be created. It would still be possible for a malicious actor to gain access to the database containing those keys, which would enable them to defeat the encryption on any smartphone they took possession of. Additionally, the cost of implementation and maintenance of such a complex system could be high.
  • Vance also suggests that the US would be justified in creating such a requirement since other Western nations are contemplating requiring encryption backdoors as well. Regardless of whether other countries are debating similar proposals, we cannot afford a race to the bottom on cybersecurity. Heads of the intelligence community regularly warn that cybersecurity is the top threat to our national security. Strong encryption is our best defense against cyber threats, and following in the footsteps of other countries by weakening that critical tool would do incalculable harm. Furthermore, even if the US or other countries did implement such a proposal, criminals could gain access to devices with strong encryption through the black market. Thus, only innocent people would be negatively affected, and some of those innocent people might even become criminals simply by trying to protect their privacy by securing their data and devices. Finally, Vance argues that David Kaye, UN Special Rapporteur for Freedom of Expression and Opinion, supported the idea that court-ordered decryption doesn’t violate human rights, provided certain criteria are met, in his report on the topic. However, in the context of Vance’s proposal, this seems to conflate the concepts of court-ordered decryption and of government-mandated encryption backdoors. The Kaye report was unequivocal about the importance of encryption for free speech and human rights. The report concluded that:
  • States should promote strong encryption and anonymity. National laws should recognize that individuals are free to protect the privacy of their digital communications by using encryption technology and tools that allow anonymity online. … States should not restrict encryption and anonymity, which facilitate and often enable the rights to freedom of opinion and expression. Blanket prohibitions fail to be necessary and proportionate. States should avoid all measures that weaken the security that individuals may enjoy online, such as backdoors, weak encryption standards and key escrows. Additionally, the group of intelligence experts that was hand-picked by the President to issue a report and recommendations on surveillance and technology, concluded that: [R]egarding encryption, the U.S. Government should: (1) fully support and not undermine efforts to create encryption standards; (2) not in any way subvert, undermine, weaken, or make vulnerable generally available commercial software; and (3) increase the use of encryption and urge US companies to do so, in order to better protect data in transit, at rest, in the cloud, and in other storage.
  • The clear consensus among human rights experts and several high-ranking intelligence experts, including the former directors of the NSA, Office of the Director of National Intelligence, and DHS, is that mandating encryption backdoors is dangerous. Unaddressed Concerns: Preventing Encrypted Devices from Entering the US and the Slippery Slope In addition to the significant faults in Vance’s arguments in favor of his proposal, he fails to address the question of how such a restriction would be effectively implemented. There is no effective mechanism for preventing code from becoming available for download online, even if it is illegal. One critical issue the Vance proposal fails to address is how the government would prevent, or even identify, encrypted smartphones when individuals bring them into the United States. DHS would have to train customs agents to search the contents of every person’s phone in order to identify whether it is encrypted, and then confiscate the phones that are. Legal and policy considerations aside, this kind of policy is, at the very least, impractical. Preventing strong encryption from entering the US is not like preventing guns or drugs from entering the country — encrypted phones aren’t immediately obvious as is contraband. Millions of people use encrypted devices, and tens of millions more devices are shipped to and sold in the US each year.
  • Finally, there is a real concern that if Vance’s proposal were accepted, it would be the first step down a slippery slope. Right now, his proposal only calls for access to smartphones and devices running mobile operating systems. While this policy in and of itself would cover a number of commonplace devices, it may eventually be expanded to cover laptop and desktop computers, as well as communications in transit. The expansion of this kind of policy is even more worrisome when taking into account the speed at which technology evolves and becomes widely adopted. Ten years ago, the iPhone did not even exist. Who is to say what technology will be commonplace in 10 or 20 years that is not even around today. There is a very real question about how far law enforcement will go to gain access to information. Things that once seemed like merely science fiction, such as wearable technology and artificial intelligence that could be implanted in and work with the human nervous system, are now available. If and when there comes a time when our “smart phone” is not really a device at all, but is rather an implant, surely we would not grant law enforcement access to our minds.
  • Policymakers should dismiss Vance’s proposal to prohibit the use of strong encryption to protect our smartphones and devices in order to ensure law enforcement access. Undermining encryption, regardless of whether it is protecting data in transit or at rest, would take us down a dangerous and harmful path. Instead, law enforcement and the intelligence community should be working to alter their skills and tactics in a fast-evolving technological world so that they are not so dependent on information that will increasingly be protected by encryption.
Paul Merrell

A caller had a lewd tape of Donald Trump. Then the race to break the story was on. - Th... - 0 views

  • Reporter David Fahrenthold got a phone call around 11 a.m. Friday from a source with a tip about Donald Trump. The source asked: Would Fahrenthold be interested in seeing some previously unaired video of Trump? Fahrenthold didn’t hesitate. Within a few moments of watching an outtake of footage from a 2005 segment on “Access Hollywood,” the Washington Post reporter was on the phone, calling Trump’s campaign, “Access Hollywood” and NBC for reaction. By 4 p.m., his story was causing shock waves.
  • Fahrenthold’s story about the recording — which some observers said might deal a death blow to Trump’s presidential campaign — was the second major revelation, or “October surprise,” that came courtesy of an anonymous source. The New York Times last week revealed that Trump took a $916 million loss on his 1995 taxes, which could have relieved him from paying federal income taxes for as many as 18 years. The Times’ story was based on tax returns supplied by a source whose identity is unknown even to the Times. Fahrenthold, a 16-year veteran of The Post, said he knows who pointed him to the “Access Hollywood” video, but he will not reveal the identity because he promised anonymity to his tipster. But like many readers, he said he was surprised and shocked by what he saw on the tape.
  • As it happens, Fahrenthold was racing to produce his story in competition with “Access Hollywood” itself. The syndicated show, owned by NBC Universal, had found the Trump recording in its archives and was preparing its own story. NBC News, tipped by “Access Hollywood,” was also aware of the tape and was preparing a story, which it intended to broadcast after the entertainment show aired the recording. It was not clear, however, when “Access Hollywood” and NBC News were planning to go ahead with their stories.
  • ...3 more annotations...
  • Fahrenthold’s story proved to be the most concurrently viewed article in the history of The Post’s website; more than 100,000 people read it simultaneously at one point on Friday. The interest was so heavy that it briefly crashed the servers of the newspaper’s internal tracking system.
  • The story not only damaged Trump but also elicited intense criticism of Bush on social media. Bush, 44, a cousin of former president George W. Bush, is now a co-host of NBC’s “Today” show. Noting that “Today” has a huge following among women, some critics called for Bush’s resignation.
  • The quick succession of events left several questions unanswered, among them: Why did a 2005 recording of Trump remain in the “Access Hollywood” archives for so long before becoming public? And what other damaging outtakes, if any, remain in the archives of NBC’s “The Apprentice” and “Celebrity Apprentice,” the reality shows in which Trump starred?
  •  
    I went looking for what was known about the source of the Trump video. This is all I found. The original WaPo story on the video is here. https://www.washingtonpost.com/politics/trump-recorded-having-extremely-lewd-conversation-about-women-in-2005/2016/10/07/3b9ce776-8cb4-11e6-bf8a-3d26847eeed4_story.html I'm reminded of the Republican drive to impeach Bill Clinton that resulted in Larry Flynt (of Hustler magazine fame) offering a million-dollar reward for dirt on Republican members' of Congress affairs with women. He found a lot of takers and several Repubs were forced to resign from Congress after their affairs were publicized. I recall that Newt Gingrich said something along the lines of "I've never seen such a strong counterpunch before." The timing was exquisite, just after Trump let it be known that he'd be attacking Hillary in the next debate for her attacks on the women who had come forward claiming that Bill Clinton had either had affairs with them or made unwelcome sexual advances on them. The timing was also great to pull the sting from the Wikileaks release of the latest 2,000 Hillary emails showing that she perjured herself before Congress about shipment of arms to al-Qaeda in Syria from Libya. That never made it into mainstream media, although a few articles resulted from the leak of Hillary's talk to Goldman Sachs. All swept from the headlines by the eleven-year-old recording of Trump making sexist remarks. It says something about American politics that the next election may be determined by such a recording as opposed to life and death issues like U.S. foreign wars that are killing hundreds of thousands of people, climate change that threatens the extinction of the human race in as little as 100 years, etc.
Paul Merrell

Harder for Americans to Rise From Lower Rungs - NYTimes.com - 0 views

  • Benjamin Franklin did it. Henry Ford did it. And American life is built on the faith that others can do it, too: rise from humble origins to economic heights. “Movin’ on up,” George Jefferson-style, is not only a sitcom song but a civil religion.
  • But many researchers have reached a conclusion that turns conventional wisdom on its head: Americans enjoy less economic mobility than their peers in Canada and much of Western Europe. The mobility gap has been widely discussed in academic circles, but a sour season of mass unemployment and street protests has moved the discussion toward center stage. Former Senator Rick Santorum of Pennsylvania, a Republican candidate for president, warned this fall that movement “up into the middle income is actually greater, the mobility in Europe, than it is in America.” National Review, a conservative thought leader, wrote that “most Western European and English-speaking nations have higher rates of mobility.” Even Representative Paul D. Ryan, a Wisconsin Republican who argues that overall mobility remains high, recently wrote that “mobility from the very bottom up” is “where the United States lags behind.”
  • Liberal commentators have long emphasized class, but the attention on the right is largely new.
  • ...2 more annotations...
  • At least five large studies in recent years have found the United States to be less mobile than comparable nations. A project led by Markus Jantti, an economist at a Swedish university, found that 42 percent of American men raised in the bottom fifth of incomes stay there as adults. That shows a level of persistent disadvantage much higher than in Denmark (25 percent) and Britain (30 percent) — a country famous for its class constraints. Meanwhile, just 8 percent of American men at the bottom rose to the top fifth. That compares with 12 percent of the British and 14 percent of the Danes.
  • Despite frequent references to the United States as a classless society, about 62 percent of Americans (male and female) raised in the top fifth of incomes stay in the top two-fifths, according to research by the Economic Mobility Project of the Pew Charitable Trusts. Similarly, 65 percent born in the bottom fifth stay in the bottom two-fifths. By emphasizing the influence of family background, the studies not only challenge American identity but speak to the debate about inequality. While liberals often complain that the United States has unusually large income gaps, many conservatives have argued that the system is fair because mobility is especially high, too: everyone can climb the ladder. Now the evidence suggests that America is not only less equal, but also less mobile.
Paul Merrell

Edward Snowden: NSA whistleblower answers reader questions | World news | guardian.co.uk - 0 views

  • The 29-year-old former NSA contractor and source of the Guardian's NSA files coverage will – with the help of Glenn Greenwald – take your questions today on why he revealed the NSA's top-secret surveillance of US citizens, the international storm that has ensued, and the uncertain future he now faces. Ask him anything.
  • I did not reveal any US operations against legitimate military targets. I pointed out where the NSA has hacked civilian infrastructure such as universities, hospitals, and private businesses because it is dangerous. These nakedly, aggressively criminal acts are wrong no matter the target. Not only that, when NSA makes a technical mistake during an exploitation operation, critical systems crash. Congress hasn't declared war on the countries - the majority of them are our allies - but without asking for public permission, NSA is running network operations against them that affect millions of innocent people. And for what? So we can have secret access to a computer in a country we're not even fighting? So we can potentially reveal a potential terrorist with the potential to kill fewer Americans than our own Police? No, the public needs to know the kinds of things a government does in its name, or the "consent of the governed" is meaningless.
  • I was debriefed by Glenn and his peers over a number of days, and not all of those conversations were recorded. The statement I made about earnings was that $200,000 was my "career high" salary. I had to take pay cuts in the course of pursuing specific work. Booz was not the most I've been paid.
  • ...17 more annotations...
  • 1) More detail on how direct NSA's accesses are is coming, but in general, the reality is this: if an NSA, FBI, CIA, DIA, etc analyst has access to query raw SIGINT databases, they can enter and get results for anything they want. Phone number, email, user id, cell phone handset id (IMEI), and so on - it's all the same. The restrictions against this are policy based, not technically based, and can change at any time. Additionally, audits are cursory, incomplete, and easily fooled by fake justifications. For at least GCHQ, the number of audited queries is only 5% of those performed.
  • Obama's campaign promises and election gave me faith that he would lead us toward fixing the problems he outlined in his quest for votes. Many Americans felt similarly. Unfortunately, shortly after assuming power, he closed the door on investigating systemic violations of law, deepened and expanded several abusive programs, and refused to spend the political capital to end the kind of human rights violations like we see in Guantanamo, where men still sit without charge.
  • All I can say right now is the US Government is not going to be able to cover this up by jailing or murdering me. Truth is coming, and it cannot be stopped
  • NSA likes to use "domestic" as a weasel word here for a number of reasons. The reality is that due to the FISA Amendments Act and its section 702 authorities, Americans’ communications are collected and viewed on a daily basis on the certification of an analyst rather than a warrant. They excuse this as "incidental" collection, but at the end of the day, someone at NSA still has the content of your communications. Even in the event of "warranted" intercept, it's important to understand the intelligence community doesn't always deal with what you would consider a "real" warrant like a Police department would have to, the "warrant" is more of a templated form they fill out and send to a reliable judge with a rubber stamp.
  • Glenn Greenwald follow up: When you say "someone at NSA still has the content of your communications" - what do you mean? Do you mean they have a record of it, or the actual content? Both. If I target for example an email address, for example under FAA 702, and that email address sent something to you, Joe America, the analyst gets it. All of it. IPs, raw data, content, headers, attachments, everything. And it gets saved for a very long time - and can be extended further with waivers rather than warrants.
  • What are your thoughts on Google's and Facebook's denials? Do you think that they're honestly in the dark about PRISM, or do you think they're compelled to lie? Perhaps this is a better question to a lawyer like Greenwald, but: If you're presented with a secret order that you're forbidding to reveal the existence of, what will they actually do if you simply refuse to comply (without revealing the order)? Answer: Their denials went through several revisions as it become more and more clear they were misleading and included identical, specific language across companies. As a result of these disclosures and the clout of these companies, we're finally beginning to see more transparency and better details about these programs for the first time since their inception. They are legally compelled to comply and maintain their silence in regard to specifics of the program, but that does not comply them from ethical obligation. If for example Facebook, Google, Microsoft, and Apple refused to provide this cooperation with the Intelligence Community, what do you think the government would do? Shut them down?
  • Some skepticism exists about certain of your claims, including this: I, sitting at my desk, certainly had the authorities to wiretap anyone, from you, or your accountant, to a federal judge, to even the President if I had a personal email. Do you stand by that, and if so, could you elaborate? Answer: Yes, I stand by it. US Persons do enjoy limited policy protections (and again, it's important to understand that policy protection is no protection - policy is a one-way ratchet that only loosens) and one very weak technical protection - a near-the-front-end filter at our ingestion points. The filter is constantly out of date, is set at what is euphemistically referred to as the "widest allowable aperture," and can be stripped out at any time. Even with the filter, US comms get ingested, and even more so as soon as they leave the border. Your protected communications shouldn't stop being protected communications just because of the IP they're tagged with. More fundamentally, the "US Persons" protection in general is a distraction from the power and danger of this system. Suspicionless surveillance does not become okay simply because it's only victimizing 95% of the world instead of 100%. Our founders did not write that "We hold these Truths to be self-evident, that all US Persons are created equal."
  • Edward, there is rampant speculation, outpacing facts, that you have or will provide classified US information to the Chinese or other governments in exchange for asylum. Have/will you? Answer: This is a predictable smear that I anticipated before going public, as the US media has a knee-jerk "RED CHINA!" reaction to anything involving HK or the PRC, and is intended to distract from the issue of US government misconduct. Ask yourself: if I were a Chinese spy, why wouldn't I have flown directly into Beijing? I could be living in a palace petting a phoenix by now.
  • US officials say this every time there's a public discussion that could limit their authority. US officials also provide misleading or directly false assertions about the value of these programs, as they did just recently with the Zazi case, which court documents clearly show was not unveiled by PRISM. Journalists should ask a specific question: since these programs began operation shortly after September 11th, how many terrorist attacks were prevented SOLELY by information derived from this suspicionless surveillance that could not be gained via any other source? Then ask how many individual communications were ingested to acheive that, and ask yourself if it was worth it. Bathtub falls and police officers kill more Americans than terrorism, yet we've been asked to sacrifice our most sacred rights for fear of falling victim to it. Further, it's important to bear in mind I'm being called a traitor by men like former Vice President Dick Cheney. This is a man who gave us the warrantless wiretapping scheme as a kind of atrocity warm-up on the way to deceitfully engineering a conflict that has killed over 4,400 and maimed nearly 32,000 Americans, as well as leaving over 100,000 Iraqis dead. Being called a traitor by Dick Cheney is the highest honor you can give an American, and the more panicked talk we hear from people like him, Feinstein, and King, the better off we all are. If they had taught a class on how to be the kind of citizen Dick Cheney worries about, I would have finished high school.
  • Is encrypting my email any good at defeating the NSA survelielance? Id my data protected by standard encryption? Answer: Encryption works. Properly implemented strong crypto systems are one of the few things that you can rely on. Unfortunately, endpoint security is so terrifically weak that NSA can frequently find ways around it. 
  • Binney, Drake, Kiriakou, and Manning are all examples of how overly-harsh responses to public-interest whistle-blowing only escalate the scale, scope, and skill involved in future disclosures. Citizens with a conscience are not going to ignore wrong-doing simply because they'll be destroyed for it: the conscience forbids it. Instead, these draconian responses simply build better whistleblowers. If the Obama administration responds with an even harsher hand against me, they can be assured that they'll soon find themselves facing an equally harsh public response. This disclosure provides Obama an opportunity to appeal for a return to sanity, constitutional policy, and the rule of law rather than men. He still has plenty of time to go down in history as the President who looked into the abyss and stepped back, rather than leaping forward into it. I would advise he personally call for a special committee to review these interception programs, repudiate the dangerous "State Secrets" privilege, and, upon preparing to leave office, begin a tradition for all Presidents forthwith to demonstrate their respect for the law by appointing a special investigator to review the policies of their years in office for any wrongdoing. There can be no faith in government if our highest offices are excused from scrutiny - they should be setting the example of transparency. 
  • What would you say to others who are in a position to leak classified information that could improve public understanding of the intelligence apparatus of the USA and its effect on civil liberties?
  • This country is worth dying for.
  • My question: given the enormity of what you are facing now in terms of repercussions, can you describe the exact moment when you knew you absolutely were going to do this, no matter the fallout, and what it now feels like to be living in a post-revelation world? Or was it a series of moments that culminated in action? I think it might help other people contemplating becoming whistleblowers if they knew what the ah-ha moment was like. Again, thanks for your courage and heroism. Answer: I imagine everyone's experience is different, but for me, there was no single moment. It was seeing a continuing litany of lies from senior officials to Congress - and therefore the American people - and the realization that that Congress, specifically the Gang of Eight, wholly supported the lies that compelled me to act. Seeing someone in the position of James Clapper - the Director of National Intelligence - baldly lying to the public without repercussion is the evidence of a subverted democracy. The consent of the governed is not consent if it is not informed.
  • Regarding whether you have secretly given classified information to the Chinese government, some are saying you didn't answer clearly - can you give a flat no? Answer: No. I have had no contact with the Chinese government. Just like with the Guardian and the Washington Post, I only work with journalists.
  • So far are things going the way you thought they would regarding a public debate? – tikkamasala Answer: Initially I was very encouraged. Unfortunately, the mainstream media now seems far more interested in what I said when I was 17 or what my girlfriend looks like rather than, say, the largest program of suspicionless surveillance in human history.
  • Thanks to everyone for their support, and remember that just because you are not the target of a surveillance program does not make it okay. The US Person / foreigner distinction is not a reasonable substitute for individualized suspicion, and is only applied to improve support for the program. This is the precise reason that NSA provides Congress with a special immunity to its surveillance.
  •  
    I particularly liked this Snowden observation as an idea for a constitutional amendment: "This disclosure provides Obama an opportunity to appeal for a return to sanity, constitutional policy, and the rule of law rather than men. He still has plenty of time to go down in history as the President who looked into the abyss and stepped back, rather than leaping forward into it. I would advise he personally call for a special committee to review these interception programs, repudiate the dangerous "State Secrets" privilege, and, upon preparing to leave office, begin a tradition for all Presidents forthwith to demonstrate their respect for the law by appointing a special investigator to review the policies of their years in office for any wrongdoing. There can be no faith in government if our highest offices are excused from scrutiny - they should be setting the example of transparency. " Repeal of the State Secrets privilege would require a constitutional amendment because the Supreme Court decided back when that it is inherent in the President's power as commander in chief of the military forces. In other words, neither Congress nor the courts can second-guess such claims, a huge contributing factor in the over-classification of government records when the real reason is to protect bureaucrats from embarrassment, civil rights suits, and criminal prosecution. It is no accident that we have an Executive Branch that is out-of-control, waging dictatorial powers under the protection of the State Secrets privilege. 
Paul Merrell

How Israel helps eavesdrop on US citizens | The Electronic Intifada - 0 views

  • It is well-known that the two largest American telecom companies AT&T and Verizon collaborated with the US government to allow illegal eavesdropping on their customers. The known uses to which information obtained this way has been put include building the government’s massive secret “watch lists,” and “no-fly lists” and even, Bamford suggests, to deny Small Business Administration loans to citizens or reject their children’s applications to military colleges. What is less well-known is that AT&T and Verizon handed “the bugging of their entire networks — carrying billions of American communications every day” to two companies founded in Israel. Verint and Narus, as they are called, are “superintrusive — conducting mass surveillance on both international and domestic communications 24/7,” and sifting traffic at “key Internet gateways” around the US.
  • Virtually all US voice and data communications and much from the rest of the world can be remotely accessed by these companies in Israel, which Bamford describes as “the eavesdropping capital of the world.” Although there is no way to prove cooperation, Bamford writes that “the greatest potential beneficiaries of this marriage between the Israeli eavesdroppers and America’s increasingly centralized telecom grid are Israel’s intelligence agencies.” Israel’s spy agencies have long had a revolving-door relationship with Verint and Narus and other Israeli military-security firms. The relationship is particularly close between the firms and Israel’s own version of the NSA, called “Unit 8200.”
  • Israeli companies seeking a share of massively expanded US intelligence budgets formed similarly incestuous relationships with some in the American intelligence establishment: Ken Minihan, a former director of the NSA, served on Verint’s “security committee” and the former Federal Bureau of Investigation (FBI) official responsible for liaison with the telecom industry became head of the Verint unit that sold eavesdropping equipment to the FBI and NSA.
  • ...4 more annotations...
  • FISA — the Foreign Intelligence Surveillance Act of 1978 — required the government to seek court warrants for wiretaps where at least one target was in the US. In 2005, it was revealed that the Bush administration had been flagrantly violating this law. Last July, Congress passed a bill legalizing this activity and giving retroactive immunity to the telecom companies that had assisted.
  • Israel has a well-established record of compromising American national security. The most notorious case was that of convicted spy Jonathan Pollard. Although the full details of his crimes are still secret, he is thought to have passed critical information about US intelligence-gathering methods to Israel, which then traded those secrets to US adversaries. In 2005, Larry Franklin, a Defense Department analyst, pleaded guilty to spying for Israel. Most recently, Ben-Ami Kadish, a retired US army engineer, was indicted in April for allegedly passing classified documents about US nuclear weapons to Israel from 1979 to 1985. Two former officials of AIPAC, the pro-Israel lobbying group, are still awaiting trial on charges that they passed classified information between Franklin and the Israeli government.
  • Nor have particular Israeli firms established a record of trustworthiness that would justify such complacency. Jacob “Kobi” Alexander, the former Israeli intelligence officer who founded Verint, fled the US to Israel in 2006 just before he and other top executives of a subsidiary were indicted for fraud that allegedly cost US taxpayers and company shareholders $138 million. Alexander eventually adopted a fake identity and hid in the southern African country of Namibia where he is now fighting extradition
  • Israeli companies do not assist the US only to spy on its own citizens, of course. Another Israeli firm, Natural Speech Communication (NSC), among whose directors is former Mossad chief Shabtai Shavit, makes software that the US uses to electronically analyze and key-word search recorded conversations in “Levantine Arabic,” the dialects “spoken by Israeli Arabs, Jordanians, Lebanese and Palestinians.” Mexico and Australia are among other countries known to use Israeli technologies and firms to eavesdrop on their citizens.
Paul Merrell

NEW TIME POLL: Support for the Leaker-and His Prosecution | TIME.com - 0 views

  • More than half of Americans approve of a former intelligence contractor’s decision to leak classified details of sprawling government surveillance programs, according to the results of a new TIME poll. Fifty-four percent of respondents said the leaker, Edward Snowden, 29, did a “good thing” in releasing information about the government programs, which collect phone, email, and Internet search records in an effort, officials say, to prevent terrorist attacks. Just 30 percent disagreed. But an almost identical number of Americans —  53 percent —  still said he should be prosecuted for the leak, compared to 28% who said he should not. Americans aged 18 to 34 break from older generations in showing far more support for Snowden’s actions. Just 41 percent of that cohort say he should face charges, while 43 percent say he should not. Just 19 percent of that age group say the leak was a “bad thing.”
  • Overall, Americans are sharply divided over the government’s use of surveillance programs to prevent terrorist attacks, according to the results of the poll. Forty-eight percent of Americans approve of the surveillance programs, while 44 percent disapprove, a statistical tie given the poll’s four-point margin of error.
  • A majority of the poll’s respondents say that the surveillance programs have helped protect national security, with 63 percent saying they’ve had “some” or a “great deal” of impact in protecting the country. Just 31 percent says they’ve done “not much” or “nothing at all.” A narrow plurality of those polled, 48 percent to 43 percent, believe that the federal government is striking the right balance between protecting Americans’ privacy and protecting their physical well-being or that the government should be doing more to prevent terrorism.
  • ...1 more annotation...
  • Nearly 60 percent believe the revelations will not force the government to curtail the surveillance program. But 76 percent of Americans believe there will soon be additional disclosures that the spying programs are bigger and more widespread than currently known. Americans are largely split on partisan grounds as to whether Obama is more careful about respecting privacy than President George W. Bush. Twenty-eight percent said Bush was more careful, one-quarter sided with Obama, and 42 percent say there has been little difference between the two.
Paul Merrell

Congress Repeals Financial Disclosure Requirements For Senior U.S. Officials : The Two-... - 0 views

  • Joining the Senate, the House of Representatives approved a measure today that repeals a requirement that top government officials post financial disclosures on the Internet. The House, like the Senate, acted quietly without a vote. Instead, they sent the measure to the president's desk by unanimous consent. The provision was part of the Stop Trading on Congressional Knowledge Act (Stock), which became law in March of 2012. The act was intended to stop members of congress from profiting from nonpublic information.
  • : "That law mainly addressed conflict-of-interest policies for members of Congress and their staffs, but it also included a requirement that the financial disclosure forms filed by some 28,000 high-ranking federal employees be posted online. "While those forms are public records, they must be requested individually from employing agencies. The Stock Act envisions online posting first on agency sites and later in a central, searchable database. "The posting requirement was delayed three times out of concerns about the potential for identity theft and other crimes against career employees, as well as security risks to the government."
  • The Sunlight Foundation, which advocates for a more open government, called today's repeal an "epic failure." The foundation explained that instead of addressing specific security concerns, Congress has acted broadly. For instance, they note, the president, vice president, members of Congress, congressional candidates and individuals subject to Senate confirmation are still required to make their financial disclosures public. But the change in law now makes the posting of those disclosures on the Internet optional.
Paul Merrell

CIA whistleblower John Kiriakou given more than two years in prison | World news | guar... - 0 views

  • The former CIA officer John Kiriakou was sentenced Friday to more than two years in prison, by a federal judge who rejected arguments that he was acting as a whistleblower when he leaked a covert officer's name to a reporter. A plea deal required the judge to impose a sentence of two and a half years. US district judge Leonie Brinkema said she would have given Kiriakou much more time if she could.Kiriakou's supporters describe him as a whistleblower who exposed aspects of the CIA's use of torture against detained terrorists. Prosecutors said Kiriakou was merely seeking to increase his fame and public stature by trading on his insider knowledge. The 48-year-old Arlington resident pleaded guilty last year to violating the Intelligence Identities Protection Act. No one had been convicted under the law in 27 years.
  • His 2007 interviews about the interrogations of Abu Zubaydah were among the first by a CIA insider confirming reports that several detainees, including Abu Zubaydah, had been waterboarded.
  •  
    Obama's war against government whistleblowers continues. 
Gary Edwards

The Ruling Class Consensus On Domestic Spying | Online Library of Law and Liberty - 0 views

  • This means that the US government’s vast apparatus is almost completely useless against serious terrorists or criminals, and useful primarily to do whatever the government might choose to innocent persons.
    • Gary Edwards
       
      Bold statement, but then how did the Fort Hood massacre and Boston Marathon massacre occur?  Plenty of email and phone call evidence in both cases.  Yet the government was caught totally unaware.  I guess it really depends on who the watchers are watching.  Proof is slowly being gathered that the watchers are watching those whom the government elites seek to destroy through blackmail, intimidation (IRS anyone?), and breach of Constitutional rights (take your pick of any three letter government agency acronym you like).
  • Ever since the 1970s, the art of code-making has surpassed the art of code-breaking – period.
  • Hence, on the high end, anyone can purchase voice and internet communications software that are beyond the capacity of anyone to access without an electronic key.
  • ...13 more annotations...
  • If collection is universal, the collectors don’t have to explain to others (or even to themselves) why they are targeting this person or group and not another. Possessing the data in secret, they can then decide in secret who they are really interested in.
  • That flight from responsibility is also why, in 1978, the intelligence agencies pressed Congress to pass the Foreign Intelligence Surveillance Act (FISA), under which the agencies submit their requests for detailed targeting, in secret, to a court that decides ex parte and in secret.
  • the FISA court. But that court acts not just in secret, but ex parte – hearing only one side.
  • The relevant question about the uses of the NSA programs, then, is simply “against whom, in the broad American public, is the US government likely to turn its animus?
  • Alas, the ruling class has shown itself all too able to treat domestic opponents as public enemies. But that is another story.
  • In the words of General Keith Alexander, director of NSA, this surveillance has “helped to prevent” “dozens of terrorist events.”
  • From Barack Obama to Karl Rove, the ruling class is in unison: The NSA’s collection of data on virtually all Americans is essential to preventing you from “being blown to smithereens on your morning commute”
  • Another, PRISM, gives access to all records of email, chat, photos, videos and file transfers from the servers of leading US internet companies.
  • Here are the facts.
  • These programs stand between Americans and terrorists. Worries that they will be misused are misplaced or downright kooky.
  • Project Constant Informant, which tracks essentially all American phone calls, allows matching the account holder’s identity with each call’s precise location in time and place.
  • anyone who has followed telecommunication technology and intelligence during the past three decades can only scoff at the claim that universal collection of telephone externals and access to internet traffic can thwart serious criminals or terrorists.
  • In fact, the expansion of the US government’s capacity to intrude on innocent communications happened just as technology enabled competent persons who intend to hide their communications to do so without fail.
Gary Edwards

Freedom to Fascism - the movie - 0 views

  •  
    "Are you aware the money in your pocket is printed by a private bank? Are you aware the REAL ID law will require you to carry a national identification card? Are you aware that there are plans being developed to have all Americans embedded with a Radio Frequency Identification (RFID) computer chip under their skin so they can be tracked wherever they go? Are you aware the Supreme Court has ruled that the government has no authority to impose a direct unapportioned tax on the labor of the American people, and the 16th Amendment does not give the government that power? Are you aware that computer voting machines can be rigged and there is no way to ensure that vote is counted Our Friend and Hero, Aaron Russo Has Passed Esteemed filmmaker, ardent activist and loyal patriot Aaron Russo lost his battle to cancer on August 24, 2007 at the age of 64. Aaron will be profoundly missed but always remembered. He was a husband, father, friend, mentor, and inspiration to many. Aaron's long list of achievements includes his work in the areas of filmmaking and political activism. His documentary film, "America: From Freedom to Fascism", debunked the justification of both the IRS and the Federal Reserve as well as exposed their crooked basis. This movie received widespread acclaim, including opening to standing ovations at the Cannes Film Festival. Congressman Ron Paul was also featured in the documentary, in which he presents his views on the economy and the Federal Reserve. Aaron's work in the realm of activism proved to be invaluable and selfless. He will be perpetually revered as a true patriot and tireless fighter for our freedom. We must continue to venerate Aaron's legacy as we move forward by honoring his great words: "There are no boundaries one must adhere to when preserving one's liberty"."
Paul Merrell

What the Third Circuit Said in Hassan v. City of New York | Just Security - 0 views

  • In Hassan v. City of New York, the Third Circuit yesterday emphatically overturned a New Jersey district court, which had dismissed a challenge to the New York City Police Department’s Muslim surveillance program. The decision is important not only for the New Jersey plaintiffs who brought the case, but also for its analysis of several legal issues that have dogged efforts to obtain judicial review of surveillance programs.
  • The threshold issue in Hassan was whether the plaintiffs had alleged injury sufficient to establish standing to bring claims that the NYPD’s surveillance of Muslim communities in New Jersey violated the equal protection clause of the Fourteenth Amendment as well as the free exercise and establishment clauses of the First Amendment. The Third Circuit ruled that the fundamental injury alleged by the plaintiffs — unequal treatment on the basis of religion — was sufficient to keep them in court. The court rejected as “too cramped,” the City’s contention that discrimination is only actionable when it results in deprivation of “a tangible benefit like college admission or Social Security.”
  • One of the most remarkable aspects of the lower court’s dismissal of Hassan was its acceptance of the City’s argument that any injury to the plaintiffs was not fairly traceable to the police. Rather, defendants argued, it was the fault of the Associated Press, which published a Pulitzer Prize-winning investigation of the NYPD’s surveillance of Muslim communities in New York and New Jersey. The court described this position — variants of which have been articulated in the wake of Snowden’s disclosures as well — as “What you don’t know can’t hurt you. And, if you do know, don’t shoot us. Shoot the messenger.” The Third Circuit wasn’t buying it. The primary injury alleged was discrimination, which was caused by the City, not than the press.
  • ...5 more annotations...
  • Next up was the lower court’s dismissal of the case on the grounds that the plaintiffs had failed to state a claim. The plaintiffs had alleged that the NYPD’s surveillance program was facially discriminatory because it targeted Muslims. In response, the City had demanded information about “when, by whom, and how the policy was enacted and where it was written down.” But the court found the plaintiffs had met their burden, alleging specifics about the program “including when it was conceived (January 2002), where the City implemented it (in the New York Metropolitan area with a focus on New Jersey), and why it has been employed because of the belief ‘that Muslim religious identity … is a permissible proxy for criminality.’” In other words, the plaintiffs had sufficiently alleged a facially discriminatory policy even when they couldn’t identify a piece of paper on which it was memorialized. For civil rights lawyers concerned that cases like Iqbal and Twombly are closing off avenues for civil rights litigation, the Third Circuit holding provides some comfort. A key issue in the case was the NYPD’s intent in monitoring Muslims. The City had successfully argued below that it “could not have monitored New Jersey for Muslim terrorist activities without monitoring the Muslim community itself.” Its motive, the City argued, was counterterrorism, not treating Muslims differently. The problem with this argument, the Third Circuit explained, was that the City was mixing up “intent” and “motive.” The intent inquiry focuses on whether a person acts intentionally rather than accidentally, while the motive inquiry focuses on why a person acts. “[E]ven if NYPD officers were subjectively motivated by a legitimate law enforcement purpose … they’ve intentionally discriminated if they wouldn’t have surveilled Plaintiffs had they not been Muslim,” the court concluded.
  • The court then turned to whether, assuming differential treatment, the NYPD program was nevertheless justified on security or public safety grounds. It began its inquiry by examining the appropriate standard of review, concluding that it was appropriate to apply heightened scrutiny to religion-based classifications under the equal protection clause rather than simply to examine whether the City had a rational basis for its actions. Even though religious affiliation, unlike race, is capable of being changed, the Third Circuit agreed with many of its sister courts that it was of such fundamental importance that people should not be required to change their faith.
  • New York City had argued that the surveillance program met the heightened scrutiny standard because it was necessary to meet the threat of terrorism. In support, the City put forward its oft-repeated argument that a “comprehensive understanding of the makeup of the community would help the NYPD figure out where to look — and where not to look — in the event it received information that an Islamist radicalized to violence may be secreting himself in New Jersey.” The court was not convinced that this was a sufficiently close fit with the goal, finding that the City failed to meet its burden of rebutting the presumption of unconstitutionality created by plausible allegation of discrimination. Harking back to the World War II internment of Japanese Americans
  • the Third Circuit cautioned: No matter how tempting it might be to do otherwise, we must apply the same rigorous standards even where national security is at stake. We have learned from experience that it is often where the asserted interest appears most compelling that we must be most vigilant in protecting constitutional rights … Given that “unconditional deference to [the] government[’s] … invocation of ‘emergency’ … has a lamentable place in our history,” the past should not preface yet again bending our constitutional principles merely because an interest in national security is invoked.
  • Lastly, the Third Circuit rejected as “threadbare” the City’s argument that plaintiffs First Amendment free exercise and establishment clause claims failed because they did not allege “overt hostility and prejudice.” As with the equal protection claims, it was not necessary for plaintiffs to demonstrate animus. *     *     * In conclusion, the court reminded us that the targeting of Muslims, which has been a leitmotif of US security policy, was not new. We have been down similar roads before. Jewish-Americans during the Red Scare, African Americans during the Civil Rights Movement, and Japanese-Americans during World War II are examples that readily spring to mind. We are left to wonder why we cannot see with foresight what we see so clearly with hindsight — that “[l]oyalty is a matter of the heart and mind[,] not race, creed, or color.”
Paul Merrell

Mass Surveillance and the Right to Privacy: Adding Nuance to the Schrems Case | Just Se... - 0 views

  • Last week’s post by Megan Graham is certainly a welcome contribution in explaining the implications of the Max Schrems case by the European Union Court of Justice, and specifically how it relates to the Safe Harbor arrangement between the US and the EU. Let me add a different perspective: Irrespective of its consequences for Safe Harbor, last week’s ruling is hugely important on a more general level, namely for the understanding of what the right to privacy entails in Europe and what this means for mass surveillance. Through its ruling in Max Schrems the EU’s highest court has established that: Mere access by public authorities to confidential or group-specific communications data constitutes an intrusion into the right to privacy, even without any further processing of that data; and While indiscriminate intrusion into “metadata” may constitute a particularly serious intrusion into the right to privacy, access to “content” data will affect the essence of the right to privacy.
  • These findings were made under Article 7 of the EU Charter of Fundamental Rights, a broad provision on the right to respect for one’s private life. This provision of the EU Charter, which is a part of the foundational treaty framework of the European Union, is almost identical to Article 8 of the European Convention on Human Rights, a treaty legally binding for broader Europe and routinely a part of domestic legal orders. It remains to be seen whether the guardian of the latter framework, the European Court of Human Rights, will also be courageous enough to determine that indiscriminate mass surveillance that provides access to “content” data breaches the essential core of the right to privacy. The highest EU court already took that bold step. One of the most important implications of identifying government access to content as breaching the essence of the right to privacy, is that it negates the need for a proportionality assessment. Measures that compromise the essence of privacy have already crossed a red line, and there is no need for any further “balancing” between privacy and security. Therefore, the Max Schrems ruling is a huge blow to many of the current methods of electronic mass surveillance, including those practiced by the US and several European countries (including the United Kingdom).
  • Several additional points from my earlier post in Verfassungsblog about this case are also worth noting. First, the EU court did not really dwell on the separate Article 8 provision of the EU Charter on Fundamental Rights, concerning the right to the protection of personal data. This was perhaps because that provision is triggered by the “processing” of data, while the general privacy (Article 7) impact comes into play through mere “access.” Another point is that while it was easy to establish the jurisdiction of the EU court over data transfers from Europe to Facebook’s servers in the US, it may be much harder to bring a case before that court concerning “upstream” methods of mass surveillance, such as the NSA’s tapping of transatlantic fiber optic telecommunications cables. Perhaps most importantly, the substantive ruling in the Schrems case is formulated in a way that it would apply to any method of mass surveillance that gives public authorities access to the content of ordinary people’s private communications, including communications intended for a group of people but not for the authorities. Hence, the ruling is a major contribution as to what the right to privacy substantively means in Europe.
Paul Merrell

Smoking gun emails reveal 'deal in blood' George Bush and Tony Blair made as they secre... - 0 views

  • A bombshell White House memo has revealed for the first time details of the ‘deal in blood’ forged by George Bush and Tony Blair over the Iraq War.The damning memo, from secretary of state Colin Powell to president George Bush, was written on March 28, 2002, a week before Bush’s famous summit with Blair at his Crawford ranch in Texas.The Powell document, headed ‘Secret... Memorandum for the President’, lifts the lid on how Blair and Bush secretly plotted the war behind closed doors at Crawford. In it, Powell tells Bush that Blair ‘will be with us’ on military action. Powell assures the president: ‘The UK will follow our lead’.The classified document also discloses that Blair agreed to act as a glorified spin doctor for the president by presenting ‘public affairs lines’ to convince a skeptical public that Saddam had Weapons of Mass Destruction - when none existed.In return, the president would flatter Blair’s ego and give the impression that Britain was not America’s poodle but an equal partner in the ‘special relationship’. 
  • The sensational leak shows that Blair had given an unqualified pledge to sign up to the conflict a year before the invasion started.It flies in the face of the UK Prime Minister’s public claims at the time that he was seeking a diplomatic solution to the crisis.He told voters: ‘We’re not proposing military action’ - in direct contrast to what the secret email now reveals. 
  • The disclosure is certain to lead for calls for Sir John Chilcot to reopen his inquiry into the Iraq War if, as is believed, he has not seen the Powell memo.A second explosive memo from the same cache also reveals how Bush used ‘spies’ in the Labour Party to help him to manipulate British public opinion in favor of the war.The documents, obtained by The Mail on Sunday, are part of a batch of secret emails held on the private server of Democratic presidential candidate Hillary Clinton which U.S. courts have forced her to reveal.Former UK Conservative shadow home secretary David Davis said: ‘The memos prove in explicit terms what many of us have believed all along: Tony Blair effectively agreed to act as a frontman for American foreign policy in advance of any decision by the House of Commons or the British Cabinet.
  • ...8 more annotations...
  • ‘He was happy to launder George Bush’s policy on Iraq and sub-contract British foreign policy to another country without having the remotest ability to have any real influence over it. And in return for what?'For George Bush pretending Blair was a player on the world stage to impress voters in the UK when the Americans didn’t even believe it themselves’.Davis was backed by a senior diplomat with close knowledge of Blair-Bush relations who said: ‘This memo shows beyond doubt for the first time Blair was committed to the Iraq War before he even set foot in Crawford.'And it shows how the Americans planned to make Blair look an equal partner in the special relationship to bolster his position in the UK.’Blair’s spokesman insisted last night that Powell’s memo was ‘consistent with what he was saying publicly at the time’.The former Prime Minister has always hotly denied the claim that the two men signed a deal ‘in blood’ at Crawford to embark on the war, which started on March 20, 2003. Powell says to Bush: ‘He will present to you the strategic, tactical and public affairs lines that he believes will strengthen global support for our common cause,’ adding that Blair has the presentational skills to ‘make a credible public case on current Iraqi threats to international peace’.Five months after the summit, Downing Street produced the notorious ‘45 minutes from doom’ dossier on Saddam Hussein’s supposed Weapons of Mass Destruction. After Saddam was toppled, the dossier’s claims were exposed as bogus.Nowhere in the memo is a diplomatic route suggested as the preferred option.
  • Instead, Powell says that Blair will also advise on how to ‘handle calls’ for the ‘blessing’ of the United Nations Security Council, and to ‘demonstrate that we have thought through “the day after” ’ – in other words, made adequate provision for a post-Saddam Iraq.Critics of the war say that the lack of post-conflict planning has contributed to the loss of more than 100,000 lives since the invasion – and a power vacuum which has contributed to the rise of Islamic State terrorism.Significantly, Powell warns Bush that Blair has hit ‘domestic turbulence’ for being ‘too pro-U.S. in foreign and security policy, too arrogant and “presidential” ’, which Powell points out is ‘not a compliment in the British context’.Powell also reveals that the splits in Blair’s Cabinet were deeper than was realized: he says that apart from Foreign Secretary Jack Straw and Defence Secretary Geoff Hoon, ‘Blair’s Cabinet shows signs of division, and the British public are unconvinced that military action is warranted now’.Powell says that although Blair will ‘stick with us on the big issues’, he wants to minimisze the ‘political price’ he would have to pay: ‘His voters will look for signs that Britain and America are truly equity partners in the special relationship.’The president certainly did his best to flatter Blair’s ego during the Crawford summit, where he was the first world leader to be invited into Bush’s sanctuary for two nights.
  • Mystery has long surrounded what was discussed at Crawford as advisers were kept out of a key meeting between the two men.Sir Christopher Meyer, who was present in Crawford as Britain’s ambassador to the U.S., told Chilcot that his exclusion meant he was ‘not entirely clear to this day... what degree of convergence was, if you like, signed in blood at the Crawford ranch’.But in public comments during his time at Crawford, Blair denied that Britain was on an unstoppable path to war.‘This is a matter for considering all the options’, he said. ‘We’re not proposing military action at this point in time’.
  • During his appearance before the Chilcot inquiry in January 2010, Blair denied that he had struck a secret deal with Bush at Crawford to overthrow Saddam. Blair said the two men had agreed on the need to confront the Iraqi dictator, but insisted they did not get into ‘specifics’.‘The one thing I was not doing was dissembling in that position,’ he told Chilcot.‘The position was not a covert position, it was an open position. This isn’t about a lie or a conspiracy or a deceit or a deception. It’s a decision. What I was saying... was “We are going to be with you in confronting and dealing with this threat.” ’Pressed on what he thought Bush took from their meeting, he said the president had realized Britain would support military action if the diplomatic route had been exhausted.In his memoirs, Blair again said it was ‘a myth’ he had signed a promise ‘in blood’ to go to war, insisting: ‘I made no such commitment’.Critics who claimed that Blair acted as the ‘poodle’ of the US will point to a reference in Mr Powell’s memo to the fact Mr Blair ‘readily committed to deploy 1,700 commandos’ to Afghanistan ‘even though his experts warn that British forces are overstretched’.The decision made the previous October in the wake of the September 11 attacks led to widespread concern that the UK was entering an open-ended commitment to a bloody conflict in Afghanistan – a concern many critics now say was well-founded.
  • Mr Powell’s memo goes on to say that a recent move by the U.S. to protect its steel industry with tariffs, which had damaged UK exports, was a ‘bitter blow’ for Blair, but he was prepared to ‘insulate our broader relationship from this and other trade disputes’.The memo was included in a batch of 30,000 emails which were received by Mrs Clinton on her private server when she was US Secretary of State between 2009 and 2013.Another document included in the email batch is a confidential briefing for Powell prepared by the U.S. Embassy in London, shortly before the Crawford summit.The memo, dated ‘April 02’, includes a detailed assessment of the effect on Blair’s domestic position if he backs US military action.The document says: ‘A sizeable number of his [Blair’s] MPs remain at present opposed to military action against Iraq... some would favor shifting from a policy of containment of Iraq if they had recent (and publicly usable) proof that Iraq is developing WMD/missiles... most seem to want some sort of UN endorsement for military action.‘Blair’s challenge now is to judge the timing and evolution of America’s Iraq policy and to bring his party and the British people on board.'There have been a few speculative pieces in the more feverish press about Labor [sic] unease re Iraq policy… which have gone on to identify the beginnings of a challenge to Blair’s leadership of the party.
  • 'Former Cabinet member Peter Mandelson, still an insider, called it all "froth". Nonetheless, this is the first time since the 1997 election that such a story is even being printed’.The paper draws on information given to it by Labour ‘spies’, whose identities have been hidden.It states: ‘[name redacted] told us the intention of those feeding the story is not to bring down Blair but to influence him on the Iraq issue’.‘Some MPs would endorse action if they had proof that Iraq has continued to develop WMD since UN inspectors left.‘More would follow if convinced that Iraq has succeeded in developing significant WMD capability and the missiles to deliver it.'Many more would follow if they see compelling evidence that Iraq intends and plans to use such weapons. A clear majority would support military action if Saddam is implicated in the 9/11 attacks or other egregious acts of terrorism’.‘Blair has proved an excellent judge of political timing, and he will need to be especially careful about when to launch a ramped-up campaign to build support for action against Iraq.'He will want neither to be too far in front or behind US policy... if he waits too long, then the keystone of any coalition we wish to build may not be firmly in place. No doubt these are the calculations that Blair hopes to firm up when he meets the President’.A spokesperson for Blair said: ‘This is consistent with what Blair was saying publicly at the time and with Blair’s evidence given to the Chilcot Inquiry’.
  • Stunning memo proves Blair signed up for Iraq even before Americans - comment by former shadow home secretary David DavisThis is one of the most astonishing documents I have ever read.It proves in explicit terms what many of us have believed all along: Tony Blair effectively agreed to act as a front man for American foreign policy in advance of any decision by the House of Commons or the British Cabinet.He was happy to launder George Bush’s policy on Iraq and sub-contract British foreign policy to another country without having the remotest ability to have any real influence over it.And in return for what? For George Bush pretending Blair was a player on the world stage to impress voters in the UK when the Americans didn’t even believe it themselves.Blair was content to cynically use Britain’s international reputation for honest dealing in diplomacy, built up over many years, as a shield against worldwide opprobrium for Bush’s ill-considered policy.Judging from this memorandum, Blair signed up for the Iraq War even before the Americans themselves did. It beggars belief.
  • Blair was telling MPs and voters back home that he was still pursuing a diplomatic solution while Colin Powell was telling President Bush: ‘Don’t worry, George, Tony is signed up for the war come what may – he’ll handle the PR for you, just make him look big in return.’It should never be forgotten that a minimum of 120,000 people died as a direct result of the Iraq War.What is truly shocking is the casualness of it all, such as the reference in the memo to ‘the day after’ – meaning the day after Saddam would be toppled.The offhand tone gives the game away: it is patently obvious nobody thought about ‘the day after’ when Bush and Blair met in Crawford.And they gave it no more thought right through to the moment ‘the day after’ came about a year later when Saddam’s statue fell to the ground.We saw the catastrophic so-called ‘de-Baathification’ of Iraq, with the country’s entire civil and military structure dismantled, leading to years of bloodshed and chaos. It has infected surrounding countries to this day and created the vacuum into which Islamic State has stepped.This may well be the Iraq ‘smoking gun’ we have all been looking for.
« First ‹ Previous 41 - 60 of 185 Next › Last »
Showing 20 items per page