Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged identity

Rss Feed Group items tagged

Paul Merrell

Jordan hanged Two and vows to avenge Fate of Air Force Pilot: Intelligence? | nsnbc int... - 0 views

  • The Jordanian Armed Forces announced that they would avenge the murder of ISIS hostages, including the captured Jordanian pilot Moaz al-Kasasbeh. At dawn, Jordanian authorities hanged the two terrorism convicts Sajida al-Rishawi and Ziad al-Karbouli. The issue underpins questions about Jordan’s role as central player in the war on Syria and Iraq and the role and function of the so-called Islamic State. The hangings of al-Risawi and Ziad al-Karboui were carried out at 4.00 am local time. Both terrorism convicts, including the female would-be suicide bomber Sajida al-Rishawi whose release was demanded in videos and audios allegedly published by ISIS, were linked to Al-Qaeda in Iraq, which eventually was re-branded as ISIS/, a.k.a. ISIL, Daesh or Islamic State.
  • The executions were carried out after a video, allegedly disseminated by ISIS, that featured Jordanian pilot Moaz al-Kasasbeh being burned alive in a cage. Jordanian authorities, including the Royal Court and the Armed Forces of Jordan promised “a swift and lethal response” to the murder of the Jordanian pilot.
  • While there is little doubt about the tragic execution of the Jordanian pilot, there are serious questions about Jordan’s role as key player in the war on Syria since 2011 and subsequently, the war on Iraq.
  • ...4 more annotations...
  • ronically, Jordan has provided one of the main staging theaters for “Al-Qaeda” and Muslim Brotherhood linked, foreign funded and armed mercenary brigades since the onset of the war on Syria.
  • Especially the region around the town of al-Mafraq and the Ramtha Air Base in Jordan are notorious for their function as training and staging facilities for terrorist brigades, as well as for the presence of Saudi, Turkish, NATO and U.S. intelligence services, special forces, as well as liaisons between the terrorist brigades on the ground and civilian as well as military intelligence services.
  • Both the city of Al-Mafraq and the Ramtha Air Base have been used as staging theater for the 2012 invasion of Syria by the about 20,000 strong, so-called, Libyan Brigade. The brigade had been assembled by the so-called Libyan Islamic Fighting Group, whose leader, Abdelhakim Belhadj was promoted to become the head of the Tripoli Military Council after the US/Turkish/Qatari/Saudi/Israeli/NATO supported ousting of the Libyan government in 2011.
  • The Libyan Brigade was led by the Irish-Libyan national Mahdi Al-Harati, the Libyan Islamic Fighting Group’s second in command. Both Abdelhakim Belhadj and Mahdi al-Harati have been implicated in cooperation with British, U.S. and NATO intelligence. ISIS, for its part, has its origin in the so-called Al-Qaedea in Iraq. The organization has had ties to Saudi Arabian and western intelligence services since it’s origin. A person from within the inner circle around former Lebanese PM Saad Hariri held a personal meeting with nsnbc editor-in-chief Christof Lehmann and disclosed that the final decision to invade Iraq with “ISIS” was made on the sidelines of the Atlantic Council’s Energy Summit in Turkey, in November 2013, and that the U.S. Embassy functions as coordination and command post for the war on the, depending on utility, friend or foe known as ISIS.
Paul Merrell

Israel wants to "Settle Israeli Sovereignty over Syrian Golan Heights" | nsnbc internat... - 0 views

  • Israel’s Foreign Minister, Avigdor Lieberman, has publicly called for “settling the Israeli sovereignty over the Golan Heights within the framework of the Israeli – Palestinian negotiations” adding that “part of this comprehensive bargain has to cover an understanding between Israel, the international community and the USA” and adding that “the Golan is part and parcel with Israel”.
  • The statement prompted a response by the Syrian government to the UN Secretary General and the President of the Security Council. The statement confirms information nsnbc received from a Palestinian intelligence expert in 2011 and 2012, who warned that Israel plans to permanently annex the Golan, parts of southern Lebanon and most of the West Bank, while planning to recognize a Palestinian State in the Gaza Strip plus micro enclaves in the West Bank. The statement also substantiates Christof Lehmann’s warnings about joint Israeli – US plans to that effect, issued in 2011, after the 66th Session of the UN General Assembly. During the 66th Session, US President Obama refused to recognize Palestine as a State, saying that “a solution for Palestine only could be found within the framework of a comprehensive solution for the Middle East“.
  • On Wednesday, the Syrian Foreign and Expatriates Ministry responded by sending two identical letters to the offices of the UN Secretary General and the President of the US Security Council, reports the Syrian news agency SANA. The letters inform the UN Secretary General and the UNSC President, that Lieberman made the statement on 31 January 2014, while visiting the occupied Syrian Golan. In the letters, the Syrian Foreign Ministry stressed that the Israeli Foreign Minister’s statements embody an insolent approach to the events in Syria and recklessness with regard to relevant UN resolutions, such as UNSC resolution 497 (1981) and others, which call on Israel to end the occupation of the Syrian Golan and all Arab lands which Israel has occupied since 1967. The Syrian government quotes Lieberman as claiming that: ” The dangers to security, linked to our capability to defend the North of the country, require a recognition of Isrel’s sovereignty over the Golan Heights by the international community”. The Syrian Foreign Ministry stressed that Israel is sponsoring terrorism in Syria and that Israel seems as if it mistakenly believes that it can exploit its sponsorship of the terrorist war on Syria to achieve its expansionist ambitions. The Syrian Foreign Ministry also stressed that 47 years have passed since Israel’s occupation of the Syrian Golan Heights and that Israel has defied hundreds of resolutions and calls on ending the occupation and to stop its inhuman racial policies and its killing of civilians in the Israeli occupied territories.
  • ...2 more annotations...
  • The ministry added that Lieberman’s statements indicate an escalation of Israel’s recklessness and disregard for the UN Security Council and the UN General Assembly and stressed, that Israel must not be allowed to escape from compliance with international law, resolutions, and if necessary punishment. Syria requests that the UN Secretary General and the President of the UN Security Council guarantee that Israel respects the UN resolutions, to oblige Israel to end its occupation of the Syrian Golan, and to withdraw from the Golan according to the red line on 4 June 1967. The Foreign Ministry asserted, that the UN continuously deals with the Israeli occupation of the Syrian Golan “on a routine basis without any serious move to enforce the Security Council’s resolutions” and that this nonchalant posture encourages the illegal situation to continue” thus “undermining the credibility of the UN organization”.
  • It is worth reiterating, that Lehmann, already in 2011, warned that US President Obama’s statement pertaining the recognition of Palestine, and his article based on information from a Palestinian intelligence expert explicitly stated, that the US administration of Barak Obama and Israel are complicit in planning Israel’s permanent annexation of the Israeli occupied Syrian Golan Heights, parts of southern Lebanon and some 97 percent of the Palestinian West Bank, while establishing Palestinian small enclaves, dependent on Jordan, in the remaining 3 percent of the West Bank and a recognized Palestinian State in the Gaza Strip.
  •  
    The return of the occupied Golan Heights is absolutely required by the U.N. Charter, Geneva Conventions, and numerous U.N. Security Council resolutions.  Israel's purported security concerns do not create a lawful exception. What is really at stake in the Golan Heights and the occupied territories of Palestine is whether the U.N. Charter did in fact put an end to the right of Conquest. 
Paul Merrell

What is no longer classified? (and what does it portend for the credibility of governme... - 0 views

  • The prosecution’s motion to amend the protective order in the 9/11 military commission is finally posted.  As I discussed here, Judge Spath has granted a similar motion in the al-Nashiri case.  Judge Pohl has yet to rule on this motion in the 9/11 case because the defense apparently intends to file at least one response to it. In an earlier post I explained why I think this development is very welcome and overdue. There’s another very noteworthy thing about the prosecution’s motion, as well:  It enumerates those categories of information about the CIA’s rendition/detention/interrogation program that are no longer classified at all, and that therefore presumably can now be discussed even by those (unlike the detainees) who were properly subject to restrictions on disclosing such matters–including information about the treatment of all 119 individuals who were in CIA custody, to wit:
  • • The fact that the former RDI Program was a covert action program authorized by the President in the September 17, 2001 Memorandum of Notification; • General allegations of torture by high-value detainees, unless such allegations reveal the identities (e.g., names, physical descriptions, or other identifying information) of CIA personnel or contractors, the locations of detention sites (including the name of any country in which the detention site was allegedly located), or any foreign intelligence service involvement in the detainees’ capture, rendition, detention, or interrogation; • The names and descriptions of the thirteen Enhanced Interrogation Techniques (EITs) that were approved for use, and the specified parameters within which the EITs could be applied;
  • • The techniques themselves as applied to the 119 individuals mentioned in Appendix 2 of the SSCI Executive Summary acknowledged to have been in CIA custody; • Information regarding the conditions of confinement as applied to those 119 individuals; • Information regarding the treatment of those 119 individuals, including the application of standard interrogation techniques; and • Information regarding the conditions of confinement or treatment during the transfer (“rendition”) of the 119 individuals.
  • ...1 more annotation...
  • This is important for several reasons, not least of which is that it might mean that it is now permissible to release the vast majority of the complete, 6000-or-so-page SSCI Report. One other thing:  The motion relates that in April 2012, in support of the Government’s motion requesting that Judge Pohl issue the protective order, the accompanying declarations of government officials set forth the “grave harm to national security that unauthorized disclosure of such information would cause.”  I think it’s fair to say, now that such information has been disclosed, that these alarms were unwarranted and ill-advised.  No grave harm has befallen the nation.  And so it appears, at least, as though there never was a very good reason why these important categories of information about the RDI program could not and should not have been disclosed years ago.
  •  
    But what about "extraordinary rendition?"
Paul Merrell

You Should Really Consider Installing Signal, an Encrypted Messaging App for iPhone - T... - 0 views

  • In the age of ubiquitous government surveillance, the only way citizens can protect their privacy online is through encryption. Historically, this has been extremely difficult for mere mortals; just watch the video Edward Snowden made to teach Glenn Greenwald how to encrypt his emails to see how confusing it gets. But all of this is quickly changing as high-quality, user-friendly encryption software becomes available. App maker Open Whisper Systems took an important step in this direction today with the release of a major new version of its Signal encrypted calling app for iPhones and iPads. The new version, Signal 2.0, folds in support for encrypted text messages using a protocol called TextSecure, meaning users can communicate using voice and text while remaining confident nothing can be intercepted in transit over the internet. That may not sound like a particularly big deal, given that other encrypted communication apps are available for iOS, but Signal 2.0 offers something tremendously useful: peace of mind. Unlike other text messaging products, Signal’s code is open source, meaning it can be inspected by experts, and the app also supports forward secrecy, so if an attacker steals your encryption key, they cannot go back and decrypt messages they may have collected in the past.
  • Signal is also one special place on the iPhone where users can be confident all their communications are always fully scrambled. Other apps with encryption tend to enter insecure modes at unpredictable times — unpredictable for many users, at least. Apple’s iMessage, for example, employs strong encryption, but only when communicating between two Apple devices and only when there is a proper data connection. Otherwise, iMessage falls back on insecure SMS messaging. iMessage also lacks forward secrecy and inspectable source code. Signal also offers the ability for power users to verify the identity of the people they’re talking to, confirming that the encryption isn’t under attack. With iMessage, you just have to take Apple’s word for it. Strong, reliable, predictably-applied encryption is especially important at a time when the world just found out, via a report by The Intercept, that American and British spies hacked into the world’s largest SIM card manufacturer and stole the encryption keys that are used to protect communication between handsets and cell phone towers. With these keys, spies can eavesdrop on phone calls and texts just by passively listening to the airwaves.
  • iPhone users can find Signal here. For Android users, the product is, at the moment, split into two apps: TextSecure for private texting and RedPhone for private voice calls. “We’re working towards a single unified Signal app for Android, iPhone and the desktop,” says Marlinspike. It’s important to keep in mind that no technology is 100 percent secure, and an encrypted messaging app can only be as secure as the device you install it on. Intelligence agencies and other hackers can still exploit security bugs that have not been fixed, known as zero day exploits, to take over smartphones and bypass the encryption that privacy apps employ. But apps like Signal go a long way to making mass surveillance of billions of innocent people infeasible.
Paul Merrell

Fukushima Coverup: Sick US Navy Sailors' Class Action Law Suit, US Government, Doctors ... - 0 views

  • U.S. Navy sailors exposed to radioactive fallout from the Fukushima nuclear disaster have been falling ill, even as the Defense Department insists that they were not exposed to dangerous levels of radiation. Many of the sailors have now joined in a class action lawsuit against Fukushima operators and builders Tokyo Electric Power Company (Tepco), Toshiba, Hitachi, Ebasco and General Electric. Even if they wanted to — which many do not — the sailors would be unable to sue the Navy. According to a Supreme Court ruling from the 1950s known as the Feres Doctrine, soldiers cannot sue the government for injuries resulting directly from their military service.
  • Yet in the four years since the disaster, at least 500 sailors have fallen ill, and 247 of them have joined the class-action suit. The 100-page legal complaint chronicles their symptoms: an airplane mechanic suffering from unexplained muscle wasting; a woman whose baby was born ill; a sailor told his health problems must be genetic, even though his identical twin is perfectly healthy; and case after case of cancer, internal bleeding, abscesses, thyroid dysfunction and birth defects.
  • The defendants initially claimed that they could not be sued in a U.S. court, so plaintiffs’ attorney Paul Garner asked the sailors to come to a court hearing in San Diego, to offer moral support. Nearly all of them refused, for fear of public attack. Initial plaintiff Lindsey Cooper, for example, had already been mocked by atomic energy experts on CNN and by conservative radio hosts. Others were afraid of being perceived as anti-military, or un-American.
Paul Merrell

Responding to Failure: Reorganizing U.S. Policies in the Middle East | Middle East Poli... - 0 views

  • I want to speak with you today about the Middle East. This is the region where Africa, Asia, and Europe come together. It is also the part of the world where we have been most compellingly reminded that some struggles cannot be won, but there are no struggles that cannot be lost. It is often said that human beings learn little useful from success but can learn a great deal from defeat. If so, the Middle East now offers a remarkably rich menu of foreign-policy failures for Americans to study. • Our four-decade-long diplomatic effort to bring peace to the Holy Land sputtered to an ignominious conclusion a year ago. • Our unconditional political, economic, and military backing of Israel has earned us the enmity of Israel’s enemies even as it has enabled egregiously contemptuous expressions of ingratitude and disrespect for us from Israel itself.
  • • Our attempts to contain the Iranian revolution have instead empowered it. • Our military campaigns to pacify the region have destabilized it, dismantled its states, and ignited ferocious wars of religion among its peoples. • Our efforts to democratize Arab societies have helped to produce anarchy, terrorism, dictatorship, or an indecisive juxtaposition of all three. • In Iraq, Libya, and Syria we have shown that war does not decide who’s right so much as determine who’s left. • Our campaign against terrorism with global reach has multiplied our enemies and continuously expanded their areas of operation. • Our opposition to nuclear proliferation did not prevent Israel from clandestinely developing nuclear weapons and related delivery systems and may not preclude Iran and others from following suit.
  • • At the global level, our policies in the Middle East have damaged our prestige, weakened our alliances, and gained us a reputation for militaristic fecklessness in the conduct of our foreign affairs. They have also distracted us from challenges elsewhere of equal or greater importance to our national interests. That’s quite a record.
  • ...12 more annotations...
  • One can only measure success or failure by reference to what one is trying achieve. So, in practice, what have U.S. objectives been? Are these objectives still valid? If we’ve failed to advance them, what went wrong? What must we do now to have a better chance of success? Our objectives in the Middle East have not changed much over the course of the past half century or more. We have sought to 1. Gain acceptance and security for a Jewish homeland from the other states and peoples of the region; 2. Ensure the uninterrupted availability of the region’s energy supplies to sustain global and U.S. security and prosperity; 3. Preserve our ability to transit the region so as to be able to project power around the world; 4. Prevent the rise of a regional hegemon or the deployment of weapons of mass destruction that might threaten any or all of these first three objectives; 5. Maximize profitable commerce; and 6. Promote stability while enhancing respect for human rights and progress toward constitutional democracy. Let’s briefly review what’s happened with respect to each of these objectives. I will not mince words.
  • Israel has come to enjoy military supremacy but it remains excluded from most participation in its region’s political, economic, and cultural life. In the 67 years since the Jewish state was proclaimed, Israel has not made a single friend in the Middle East, where it continues to be regarded as an illegitimate legacy of Western imperialism engaged in racist removal of the indigenous population. International support for Israel is down to the United States and a few of the former colonial powers that originally imposed the Zionist project on the Arabs under Sykes-Picot and the related Balfour Declaration. The two-state solution has expired as a physical or political possibility. There is no longer any peace process to distract global attention from Israel’s maltreatment of its captive Arab populations. After years of deference to American diplomacy, the Palestinians are about to challenge the legality of Israel’s cruelties to them in the International Criminal Court and other venues in which Americans have no veto, are not present, or cannot protect the Jewish state from the consequences of its own behavior as we have always been able to do in the past. Israel’s ongoing occupation of the West Bank and siege of Gaza are fueling a drive to boycott its products, disinvest in its companies, and sanction its political and cultural elite. These trends are the very opposite of what the United States has attempted to achieve for Israel.
  • In a stunning demonstration of his country’s most famous renewable resource — chutzpah — Israel’s Prime Minister chose this very moment to make America the main issue in his reelection campaign while simultaneously transforming Israel into a partisan issue in the United States. This is the very opposite of a sound survival strategy for Israel. Uncertainties about their country’s future are leading many Israelis to emigrate, not just to America but to Europe. This should disturb not just Israelis but Americans, if only because of the enormous investment we have made in attempts to gain a secure place for Israel in its region and the world. The Palestinians have been silent about Mr. Netanyahu’s recent political maneuvers. Evidently, they recall Napoleon’s adage that one should never interrupt an enemy when he is making a mistake. This brings me to an awkward but transcendently important issue. Israel was established as a haven from anti-Semitism — Jew hatred — in Europe, a disease of nationalism and Christian culture that culminated in the Holocaust. Israel’s creation was a relief for European Jews but a disaster for the Arabs of Palestine, who were either ethnically cleansed by European Jewish settlers or subjugated, or both.  But the birth of Israel also proved tragic for Jews throughout the Middle East — the Mizrahim. In a nasty irony, the implementation of Zionism in the Holy Land led to the introduction of European-style anti-Semitism — including its classic Christian libels on Jews — to the region, dividing Arab Jews from their Muslim neighbors as never before and compelling them to join European Jews in taking refuge in Israel amidst outrage over the dispossession of Palestinians from their homeland. Now, in a further irony, Israel’s pogroms and other injustices to the Muslim and Christian Arabs over whom it rules are leading not just to a rebirth of anti-Semitism in Europe but to its globalization.
  • The late King `Abdullah of Saudi Arabia engineered a reversal of decades of Arab rejectionism at Beirut in 2002. He brought all Arab countries and later all 57 Muslim countries to agree to normalize relations with Israel if it did a deal — any deal — with the Palestinians that the latter could accept. Israel spurned the offer. Its working assumption seems to be that it does not need peace with its neighbors as long as it can bomb and strafe them. Proceeding on this basis is not just a bad bet, it is one that is dividing Israel from the world, including Jews outside Israel. This does not look like a story with a happy ending. It’s hard to avoid the thought that Zionism is turning out to be bad for the Jews. If so, given the American investment in it, it will also have turned out to be bad for America. The political costs to America of support for Israel are steadily rising. We must find a way to divert Israel from the largely self-engineered isolation into which it is driving itself, while repairing our own increasing international ostracism on issues related to Israel.  
  • Despite Mr. Netanyahu’s recent public hysteria about Iran and his efforts to demonize it, Israel has traditionally seen Iran’s rivalry with the Arabs as a strategic asset. It had a very cooperative relationship with the Shah. Neither Israelis nor Arabs have forgotten the strategic logic that produced Israel's entente with Iran. Israel is very much on Daesh’s list of targets, as is Iran. For now, however, Israel’s main concern is the possible loss of its nuclear monopoly in the Middle East. Many years ago, Israel actually did what it now accuses Iran of planning to do. It clandestinely developed nuclear weapons while denying to us and others that it was doing so. Unlike Iran, Israel has not adhered to the Nuclear Non-Proliferation Treaty or subjected its nuclear facilities to international inspection. It has expressed no interest in proposals for a nuclear-free zone in the Middle East. It sees its ability to bring on nuclear Armageddon as the ultimate guarantee of its existence.
  • To many, Israel now seems to have acquired the obnoxious habit of biting the American hand that has fed it for so long. The Palestinians have despaired of American support for their self-determination. They are reaching out to the international community in ways that deliberately bypass the United States. Random acts of violence herald mayhem in the Holy Land. Daesh has proclaimed the objective of erasing the Sykes-Picot borders and the states within them. It has already expunged the border between Iraq and Syria. It is at work in Lebanon and has set its sights on Jordan, Palestine, and Israel. Lebanon, under Saudi influence, has turned to France rather than America for support. Hezbollah has intervened militarily in Iraq and Syria, both of whose governments are close to Iran. Egypt and Turkey have distanced themselves from the United States as well as from each other. Russia is back as a regional actor and arms supplier. The Gulf Arabs, Egypt, and Turkey now separately intervene in Libya, Syria, and Iraq without reference to American policy or views. Iran is the dominant influence in Iraq, Syria, parts of Lebanon, and now Yemen. It has boots on the ground in Iraq. And now Saudi Arabia seems to be organizing a coalition that will manage its own nuclear deterrence and military balancing of Ir
  • To describe this as out of control is hardly adequate. What are we to do about it? Perhaps we should start by recalling the first law of holes — “when stuck in one, stop digging.” It appears that “don’t just sit there, bomb something” isn’t much of a strategy. When he was asked last summer what our strategy for dealing with Daesh was, President Obama replied, “We don’t yet have one.” He was widely derided for that. He should have been praised for making the novel suggestion that before Washington acts, it should first think through what it hopes to accomplish and how best to do it. Sunzi once observed that “tactics without strategy is the noise before defeat." America’s noisy but strategy-free approach to the Middle East has proven him right. Again the starting point must be what we are trying to accomplish. Strategy is "the discipline of achieving desired ends through the most efficient use of available means" [John Lewis Gaddis].Our desired ends with respect to the Middle East are not in doubt. They have been and remain to gain an accepted and therefore secure place for Israel there; to keep the region's oil and gas coming at reasonable prices; to be able to pass through the area at will; to head off challenges to these interests; to do profitable business in the markets of the Middle East; and to promote stability amidst the expansion of liberty in its countries. Judging by results, we have been doing a lot wrong. Two related problems in our overall approach need correction. They are “enablement” and the creation of “moral hazard.” Both are fall-out from  relationships of codependency.
  • Enablement occurs when one party to a relationship indulges or supports and thereby enables another party’s dysfunctional behavior. A familiar example from ordinary life is giving money to a drunk or a drug addict or ignoring, explaining away, or defending their subsequent self-destructive behavior.  Moral hazard is the condition that obtains when one party is emboldened to take risks it would not otherwise take because it knows another party will shoulder the consequences and bear the costs of failure. The U.S.-Israel relationship has evolved to exemplify codependency. It now embodies both enablement and moral hazard. U.S. support for Israel is unconditional.  Israel has therefore had no need to cultivate relations with others in the Middle East, to declare its borders, or to choose peace over continued expansion into formerly Arab lands. Confidence in U.S. backing enables Israel to do whatever it likes to the Palestinians and its neighbors without having to worry about the consequences. Israel is now a rich country, but the United States continues to subsidize it with cash transfers and other fiscal privileges. The Jewish state is the most powerful country in the Middle East. It can launch attacks on its neighbors, confident that it will be resupplied by the United States. Its use of U.S. weapons in ways that violate both U.S. and international law goes unrebuked. 41 American vetoes in the United Nations Security Council have exempted Israel from censure and international law. We enable it to defy the expressed will of the international community, including, ironically, our own.
  • We Americans are facilitating Israel's indulgence in denial and avoidance of the choices it must make if it is not to jeopardize its long-term existence as a state in the Middle East. The biggest contribution we could now make to Israel's longevity would be to ration our support for it, so as to cause it to rethink and reform its often self-destructive behavior. Such peace as Israel now enjoys with Egypt, Jordan, and the Palestinians is the direct result of tough love of this kind by earlier American administrations. We Americans cannot save Israel from itself, but we can avoid killing it with uncritical kindness. We should support Israel when it makes sense to do so and it needs our support on specific issues, but not otherwise. Israel is placing itself and American interests in jeopardy. We need to discuss how to reverse this dynamic.
  • Moral hazard has also been a major problem in our relationship with our Arab partners. Why should they play an active role in countering the threat to them they perceive from Iran, if they can get America to do this for them? Similarly, why should any Muslim country rearrange its priorities to deal with Muslim renegades like Daesh when it can count on America to act for it? If America thinks it must lead, why not let it do so? But responsible foreign and defense policies begin with self-help, not outsourcing of military risks. The United States has the power-projection and war-fighting capabilities to back a Saudi-led coalition effort against Daesh. The Saudis have the religious and political credibility, leadership credentials, and diplomatic connections to organize such an effort. We do not. Since this century began, America has administered multiple disappointments to its allies and friends in the Middle East, while empowering their and our adversaries. Unlike the Gulf Arabs, Egypt, and Turkey, Washington does not have diplomatic relations with Tehran. Given our non-Muslim identity, solidarity with Israel, and recent history in the Fertile Crescent, the United States cannot hope to unite the region’s Muslims against Daesh.  Daesh is an insurgency that claims to exemplify Islam as well as a governing structure and an armed force. A coalition led by inhibited foreign forces, built on papered-over differences, and embodying hedged commitments will not defeat such an insurgency with or without boots on the ground.
  • When elections have yielded governments whose policies we oppose, we have not hesitated to conspire with their opponents to overthrow them. But the results of our efforts to coerce political change in the Middle East are not just failures but catastrophic failures. Our policies have nowhere produced democracy. They have instead contrived the destabilization of societies, the kindling of religious warfare, and the installation of dictatorships contemptuous of the rights of religious and ethnic minorities. Frankly, we have done a lot better at selling things, including armaments, to the region than we have at transplanting the ideals of the Atlantic Enlightenment there. The region’s autocrats cooperate with us to secure our protection, and they get it. When they are nonetheless overthrown, the result is not democracy or the rule of law but socio-political collapse and the emergence of  a Hobbesian state of nature in which religious and ethnic communities, families, and individuals are able to feel safe only when they are armed and have the drop on each other. Where we have engineered or attempted to engineer regime change, violent politics, partition, and ethno-religious cleansing have everywhere succeeded unjust but tranquil order. One result of our bungled interventions in Iraq and Syria is the rise of Daesh. This is yet another illustration that, in our efforts to do good in the Middle East, we have violated the principle that one should first do no harm.
  • Americans used to believe that we could best lead by example. We and those in the Middle East seeking nonviolent change would all be better off if America returned to that tradition and forswore ideologically motivated hectoring and intervention. No one willingly follows a wagging finger. Despite our unparalleled ability to use force against foreigners, the best way to inspire them to emulate us remains showing them that we have our act together. At the moment, we do not. In the end, to cure the dysfunction in our policies toward the Middle East, it comes down to this. We must cure the dysfunction and venality of our politics. If we cannot, we have no business trying to use an 8,000-mile-long screwdriver to fix things one-third of the way around the world. That doesn’t work well under the best of circumstances. But when the country wielding the screwdriver has very little idea what it’s doing, it really screws things up.
  •  
    Chas Freeman served as US ambassador to Saudi Arabia during the war to liberate Kuwait and as Assistant Secretary of Defense from 1993-94. He was the editor of the Encyclopedia Britannica entry on "diplomacy" and is the author of five books, including "America's Misadventures in the Middle East" and "Interesting Times: China, America, and the Shifting Balance of Prestige."  I have largely omitted highlighting portions of the speech dealing with Muslim nations because Freeman has apparently lost touch with the actual U.S., Saudi, UAE, Kuwait, and Turish roles in creating and expanding ISIL. But his analysis of Israel's situation and recommendations for curing it seem quite valid, as well as his overall Mideast recommendation to heed the First Law of Holes: "when stuck in one, stop digging."   I recommend reading the entire speech notwithstanding his misunderstanding of ISIL. There is a lot of very important history there ably summarized.
Paul Merrell

French warning over business with settlements may have broader impact on Israeli econom... - 0 views

  • France today advised its citizens and companies against doing business with Israeli settlements in occupied territories. The government warned that firms could face legal action tied to “land, water, mineral and other natural resources” as well as “reputational risks.” The step could have implications for the Israeli economy far beyond activities limited to Israeli settlements themselves. The Palestinian Boycott, Divestment and Sanctions National Committee (BNC) welcomed the move.
  • Spain, Germany, Italy, Sweden and Luxembourg are expected to publish similar guidance in coming days in what appears to be a coordinated move by European states. The French warning follows similar steps by the UK and Netherlands, prompted by an advocacy effort by civil society groups and members of the European Parliament.
  • The new guidance published by the French foreign ministry states that “The West Bank, including East Jerusalem, Gaza and the Golan Heights are territories occupied by Israeli since 1967. The settlements are illegal under international law.”
  • ...1 more annotation...
  • The French warning is worded in language almost identical to that issued by the UK last December, suggesting a high degree of intergovernmental coordination.
  •  
    More than 60 years overdue, but better late than never. We're not there yet, but apartheid Israel is definitely approaching the point where it must bow to the anti Palestinian Boycott, Sanctions, and DIvestment movement, just as the apartheid South African government had to. A boatload of European nations joining the BSD movement is a powerful message to the Izzies that the era of them occupying and colonizing Palestine is quickly approaching its end. 
Paul Merrell

New leaker disclosing US secrets, government concludes - CNN.com - 0 views

  • The federal government has concluded there's a new leaker exposing national security documents in the aftermath of surveillance disclosures by former NSA contractor Edward Snowden, U.S. officials tell CNN. Proof of the newest leak comes from national security documents that formed the basis of a news story published Tuesday by the Intercept, the news site launched by Glenn Greenwald, who also published Snowden's leaks.
  • The article cites documents prepared by the National Counterterrorism Center dated August 2013, which is after Snowden left the United States to avoid criminal charges. Greenwald has suggested there was another leaker. In July, he said on Twitter "it seems clear at this point" that there was another. Government officials have been investigating to find out that identity.
  • It's not yet clear how many documents the new leaker has shared and how much damage it may cause. So far, the documents shared by the new leaker are labeled "Secret" and "NOFORN," which means it isn't to be shared with foreign government. That's a lower level of classification than most of the documents leaked by Snowden.
Paul Merrell

Ellen Brown ~ Did The Other Shoe Just Drop? Black Rock And PIMCO Sue Banks For $250 Bil... - 0 views

  • For years, homeowners have been battling Wall Street in an attempt to recover some portion of their massive losses from the housing Ponzi scheme. But progress has been slow, as they have been outgunned and out-spent by the banking titans. In June, however, the banks may have met their match, as some equally powerful titans strode onto the stage.  Investors led by BlackRock, the world’s largest asset manager, and PIMCO, the world’s largest bond-fund manager, have sued some of the world’s largest banks for breach of fiduciary duty as trustees of their investment funds. The investors are seeking damages for losses surpassing $250 billion. That is the equivalent of one million homeowners with $250,000 in damages suing at one time. The defendants are the so-called trust banks that oversee payments and enforce terms on more than $2 trillion in residential mortgage securities. They include units of Deutsche Bank AG, U.S. Bank, Wells Fargo, Citigroup, HSBC Holdings PLC, and Bank of New York Mellon Corp. Six nearly identical complaints charge the trust banks with breach of their duty to force lenders and sponsors of the mortgage-backed securities to repurchase defective loans.
  • Why the investors are only now suing is complicated, but it involves a recent court decision on the statute of limitations. Why the trust banks failed to sue the lenders evidently involves the cozy relationship between lenders and trustees. The trustees also securitized loans in pools where they were not trustees. If they had started filing suit demanding repurchases, they might wind up suedon other deals in retaliation. Better to ignore the repurchase provisions of the pooling and servicing agreements and let the investors take the losses—better, at least, until they sued. Beyond the legal issues are the implications for the solvency of the banking system itself. Can even the largest banks withstand a $250 billion iceberg? The sum is more than 40 times the $6 billion “London Whale” that shook JPMorganChase to its foundations.
Paul Merrell

Senate Bill Requires Report on "All" NSA Bulk Collection | Federation Of American Scien... - 0 views

  • The National Security Agency would be required to prepare an unclassified report on “all NSA bulk collection activities,” the Senate Appropriations Committee directed in its report on the Fiscal Year 2015 Department of Defense Appropriations bill, published yesterday. The Committee told the NSA to prepare a report “describing all NSA bulk collection activities, including when such activities began, the cost of such activities, what types of records have been collected in the past, what types of records are currently being collected, and any plans for future bulk collection.” Such a report would be expected to clarify whether NSA bulk collection extends beyond the acknowledged telephone metadata program in Section 215 of the USA Patriot Act. The required report is to be “unclassified to the greatest extent possible,” the Senate Committee said. In the reporting requirements that it imposed on NSA, the Senate Appropriations Committee notably went beyond what was required by the Senate or House Intelligence Committees. The Appropriations Committee also directed NSA to submit additional reports on the total number of records acquired and reviewed by NSA in its bulk telephone metadata program over the past five years, and an estimate of the number of records of U.S. persons that have been acquired and reviewed in the telephone metadata program. Another unclassified report is required to provide “a list of terrorist activities that were disrupted, in whole or in part, with the aid of information obtained through NSA’s telephone metadata program.”
  • Update: Identical reporting language was included by the Senate Appropriations Committee last year in its report on the FY2014 Defense Appropriations bill (h/t @byersalex), yet the required NSA reports were not produced. At Emptywheel, Marcy Wheeler questions the utility of the proposed reports, particularly since the Senate Committee language lacks a clear, unambiguous definition of “bulk collection.”
Paul Merrell

UAE Terror List Nibs NATO's Covert Infrastructure in The Bud | nsnbc international - 0 views

  • The United Arab Emirates designated a large number of organizations, topped by the Muslim Brotherhood. The list includes a large number of other organizations who have been implicated in US/NATO subversion worldwide, such as CAIR and CANVAS. On November 15 that Cabinet of the United Arab Emirates (UAE) adopted a list that designates eighty-three organizations as terrorist organizations. The UAE’s government notes that the list is not final, implying others could be added but noting that those organizations who find themselves on the list have the possibility to apply for being removed from the list. The UAE stressed that it saw it necessary to designate the included organizations as terrorist organizations to protect the security of the emirates.
  • The United Arab Emirates designated a large number of organizations, topped by the Muslim Brotherhood. The list includes a large number of other organizations who have been implicated in US/NATO subversion worldwide, such as CAIR and CANVAS. On November 15 that Cabinet of the United Arab Emirates (UAE) adopted a list that designates eighty-three organizations as terrorist organizations. The UAE’s government notes that the list is not final, implying others could be added but noting that those organizations who find themselves on the list have the possibility to apply for being removed from the list. The UAE stressed that it saw it necessary to designate the included organizations as terrorist organizations to protect the security of the emirates.
  • The list includes organizations which are currently legally operating in at lest seven European countries and at least two organizations which are legally operating in the United States. Among those operating in the United States are the Council on American-Islamic Relations, CAIR and the Muslim American Society. CAIR is commonly perceived as the successor organization of the Muslim Brotherhood and Hamas associated organizations such as WAMY and the Institute of Islamic Thought whose leadership had direct links to the White House but who were outlawed when their involvement in terrorism became too much part of the public record.
  • ...3 more annotations...
  • It is noteworthy that many of the leading members of Syrian Transitional National Council, who first met in Turkey and which was backed by the USA and other core NATO members had direct links to CAIR. The organization’s leadership is known for having close ties to, among others, U.S. security adviser and “Grand Architect” or NATO’s current military-politico strategies, Zbigniev Brzezinski. Or, in other words, to Rockefeller money. U.S. State Department spokesman Jeff Rathke commented on the UAE’s anti-terror list, saying: “We have examined the list of organizations that were classified as terrorist groups that was published by the United Arab Emirates a few days ago, and we are aware that two of the organizations on that list are based in the United States. We are trying to get information on the reasons behind this decision”.
  • The inclusion of CANVAS in the list is widely perceived as a direct slap into the face of NATO covert operations planners, the U.S. State Department and the CIA. CANVAS, a.k.a. DEMOZ has been implicated in U.S.-backed subversion from the former Republic of Yugoslavia to Egypt and Ukraine. In December 2013 the National Security Agency of Kuwait released a social media video that explained the role CANVAS played in promoting dissent in Kuwait. It is noteworthy that virtually identical CANVAS/DEMOZ flyers, instructing people in how to prepare for violent clashes with state authorities were distributed during the Rabaa al-Adweya and Nadah Square sit ins in Egypt and during the armed ouster of the Ukrainian government in February 2014.
  • Organizations in the following countries outside the United Arab Emirates are affected: * Afghanistan * Algeria * Belgium * Denmark * Egypt * France * Germany * India * Iraq * Italy * Lebanon * Libya * Mali * Norway * Palestine * Pakistan * Philippines * Russian Federation * Saudi Arabia * Sweden * Somalia * Syria * Tunisia * United Kingdom * United States of America * Uzbekistan * Yemen. Affected regions / regional operations: GCC, EU, AL, AU. The list of organizations which the Cabinet of the United Arab Emirates designated as terrorist organizations includes:
Paul Merrell

Tomgram: Shamsi and Harwood, An Electronic Archipelago of Domestic Surveillance | TomDi... - 0 views

  • Uncle Sam’s Databases of Suspicion A Shadow Form of National ID
  • We do know that the nation’s domestic-intelligence network is massive, including at least 59 federal agencies, over 300 Defense Department units, and approximately 78 state-based fusion centers, as well as the multitude of law enforcement agencies they serve. We also know that local law enforcement agencies have themselves raised concerns about the system’s lack of privacy protections.
  • The SAR database is part of an ever-expanding domestic surveillance system established after 9/11 to gather intelligence on potential terrorism threats. At an abstract level, such a system may seem sensible: far better to prevent terrorism before it happens than to investigate and prosecute after a tragedy. Based on that reasoning, the government exhorts Americans to “see something, say something” -- the SAR program’s slogan. Indeed, just this week at a conference in New York City, FBI Director James Comey asked the public to report any suspicions they have to authorities. “When the hair on the back of your neck stands, listen to that instinct and just tell somebody,” said Comey. And seeking to reassure those who do not want to get their fellow Americans in trouble based on instinct alone, the FBI director added, “We investigate in secret for a very good reason, we don't want to smear innocent people.”
  • ...15 more annotations...
  • At a fundamental level, suspicious activity reporting, as well as the digital and physical infrastructure of networked computer servers and fusion centers built around it, depends on what the government defines as suspicious.  As it happens, this turns out to include innocuous, First Amendment-protected behavior. As a start, a little history: the Nationwide Suspicious Activity Reporting Initiative was established in 2008 as a way for federal agencies, law enforcement, and the public to report and share potential terrorism-related information. The federal government then developed a list of 16 behaviors that it considered “reasonably indicative of criminal activity associated with terrorism.” Nine of those 16 behaviors, as the government acknowledges, could have nothing to do with criminal activity and are constitutionally protected, including snapping photographs, taking notes, and “observation through binoculars.”
  • There are any number of problems with this approach, starting with its premise.  Predicting who exactly is a future threat before a person has done anything wrong is a perilous undertaking. That’s especially the case if the public is encouraged to report suspicions of neighbors, colleagues, and community members based on a “hair-on-the-back-of-your-neck” threshold. Nor is it any comfort that the FBI promises to protect the innocent by investigating “suspicious” people in secret. The civil liberties and privacy implications are, in fact, truly hair-raising, particularly when the Bureau engages in abusive and discriminatory sting operations and other rights violations.
  • A few months later, a scathing report from the Senate subcommittee on homeland security described similar intelligence problems in state-based fusion centers. It found that Department of Homeland Security (DHS) personnel assigned to the centers “forwarded ‘intelligence’ of uneven quality -- oftentimes shoddy, rarely timely, sometimes endangering citizens’ civil liberties and Privacy Act protections... and more often than not unrelated to terrorism.”
  • Law enforcement officials, including the Los Angeles Police Department’s top counterterrorism officer, have themselves exhibited skepticism about suspicious activity reporting (out of concern with the possibility of overloading the system). In 2012, George Washington University’s Homeland Security Policy Institute surveyed counterterrorism personnel working in fusion centers and in a report generally accepting of SARs noted that the program had “flooded fusion centers, law enforcement, and other security outfits with white noise,” complicating “the intelligence process” and distorting “resource allocation and deployment decisions.” In other words, it was wasting time and sending personnel off on wild goose chases.
  • Under federal regulations, the government can only collect and maintain criminal intelligence information on an individual if there is a “reasonable suspicion” that he or she is “involved in criminal conduct or activity and the information is relevant to that criminal conduct or activity.” The SAR program officially lowered that bar significantly, violating the federal government’s own guidelines for maintaining a “criminal intelligence system.” There’s good reason for, at a minimum, using a reasonable suspicion standard. Anything less and it’s garbage in, garbage out, meaning counterterrorism “intelligence” databases become anything but intelligent.
  • yet another burgeoning secret database that the federal government calls its “consolidated terrorism watchlist.” Inclusion in this database -- and on government blacklists that are generated from it -- can bring more severe repercussions than unwarranted law enforcement attention. It can devastate lives.
  • There is hope, however. In August, four years after the ACLU filed a lawsuit on behalf of 13 people on the no-fly list, a judge ruled that the government’s redress system is unconstitutional. In early October, the government notified Mashal and six others that they were no longer on the list. Six of the ACLU’s clients remain unable to fly, but at least the government now has to disclose just why they have been put in that category, so that they can contest their blacklisting. Soon, others should have the same opportunity.
  • As of August 2013, there were approximately 47,000 people, including 800 U.S. citizens and legal permanent residents like Mashal, on that secretive no-fly list, all branded as “known or suspected terrorists.” All were barred from flying to, from, or over the United States without ever being given a reason why. On 9/11, just 16 names had been on the predecessor “no transport” list. The resulting increase of 293,650% -- perhaps more since 2013 -- isn’t an accurate gauge of danger, especially given that names are added to the list based on vague, broad, and error-prone standards.
  • The No Fly List is only the best known of the government’s web of terrorism watchlists. Many more exist, derived from the same master list.  Currently, there are more than one million names in the Terrorist Identities Datamart Environment, a database maintained by the National Counterterrorism Center. This classified source feeds the Terrorist Screening Database (TSDB), operated by the FBI’s Terrorist Screening Center. The TSDB is an unclassified but still secret list known as the “master watchlist.” containing what the government describes as “known or suspected terrorists,” or KSTs.
  • Nothing encapsulates the post-9/11, Alice-in-Wonderland inversion of American notions of due process more strikingly than this “blacklist first, innocence later... maybe” mindset. The Terrorist Screening Database is then used to fill other lists. In the context of aviation, this means the no-fly list, as well as the selectee and expanded selectee lists. Transportation security agents subject travelers on the latter two lists to extra screenings, which can include prolonged and invasive interrogation and searches of laptops, phones, and other electronic devices. Around the border, there’s the State Department’s Consular Lookout and Support System, which it uses to flag people it thinks shouldn’t get a visa, and the TECS System, which Customs and Border Protection uses to determine whether someone can enter the country.
  • According to documents recently leaked to the Intercept, as of August 2013 that master watchlist contained 680,000 people, including 5,000 U.S. citizens and legal permanent residents. The government can add people’s names to it according to a shaky “reasonable suspicion” standard. There is, however, growing evidence that what’s “reasonable” to the government may only remotely resemble what that word means in everyday usage. Information from a single source, even an uncorroborated Facebook post, can allow a government agent to watchlist an individual with virtually no outside scrutiny. Perhaps that’s why 40% of those on the master watchlist have “no recognized terrorist group affiliation,” according to the government’s own records.
  • This opens up the possibility of increased surveillance and tense encounters with the police, not to speak of outright harassment, for a large but undivulged number of people. When a police officer stops a person for a driving infraction, for instance, information about his or her KST status will pop up as soon a driver’s license is checked.  According to FBI documents, police officers who get a KST hit are warned to “approach with caution” and “ask probing questions.” When officers believe they’re about to go face to face with a terrorist, bad things can happen. It’s hardly a stretch of the imagination, particularly after a summer of police shootings of unarmed men, to suspect that an officer approaching a driver whom he believes to be a terrorist will be quicker to go for his gun. Meanwhile, the watchlisted person may never even know why his encounters with police have taken such a peculiar and menacing turn. According to the FBI's instructions, under no circumstances is a cop to tell a suspect that he or she is on a watchlist.
  • Inside the United States, no watchlist may be as consequential as the one that goes by the moniker of the Known or Appropriately Suspected Terrorist File. The names on this blacklist are shared with more than 17,000 state, local, and tribal police departments nationwide through the FBI’s National Crime Information Center (NCIC). Unlike any other information disseminated through the NCIC, the KST File reflects mere suspicion of involvement with criminal activity, so law enforcement personnel across the country are given access to a database of people who have secretly been labeled terrorism suspects with little or no actual evidence, based on virtually meaningless criteria.
  • And once someone is on this watchlist, good luck getting off it. According to the government’s watchlist rulebook, even a jury can’t help you. “An individual who is acquitted or against whom charges are dismissed for a crime related to terrorism,” it reads, “may nevertheless meet the reasonable standard and appropriately remain on, or be nominated to, the Terrorist Watchlist.” No matter the verdict, suspicion lasts forever.
  • The SARs program and the consolidated terrorism watchlist are just two domestic government databases of suspicion. Many more exist. Taken together, they should be seen as a new form of national ID for a growing group of people accused of no crime, who may have done nothing wrong, but are nevertheless secretly labeled by the government as suspicious or worse. Innocent until proven guilty has been replaced with suspicious until determined otherwise. Think of it as a new shadow system of national identification for a shadow government that is increasingly averse to operating in the light. It’s an ID its “owners” don’t carry around with them, yet it’s imposed on them whenever they interact with government agents or agencies. It can alter their lives in disastrous ways, often without their knowledge. And they could be you. If this sounds dystopian, that’s because it is.
Paul Merrell

Israeli Law to be Extended to West Bank | nsnbc international - 1 views

  • The Israeli ministerial committee approved a bill, on Sunday, to extend laws regulated by the Israeli Knesset into the occupied West Bank.
  • adings before becoming law. Israeli settlers living in the occupied West Bank are, as of now, formally subject to military rule. The area’s 350,000 settlers, however, are effectively under the jurisdiction of Israeli civilian courts because parliament has already applied a clutch of laws to them, primarily criminal, tax and military conscription. The new draft bill would make it mandatory for the commander to issue, within a month and a half of a law’s passage in parliament, an identically-phrased military order, effectively ensuring that all ratified legislation also applies to settlers.
  • Furthermore, according to the new bill, Israelis living in the occupied West Bank will be under Israeli law, while Palestinians living in the same areas would remain under military rule. Director of the Jerusalem Legal Aid and Human Rights Centre, Issam Aruri, told Al Jazeera that this essentially means all Knesset permanent committees can exercise their oversight over the West Bank: “This means the Knesset may become responsible for certain parts of the West Bank, which may be a step towards the formal annexation of the occupied Palestinian territory without a formal announcement as such,” he said
  • ...2 more annotations...
  • PNN further reports that Palestinian chief negotiator and PLO executive Dr. Saeb Erekat said that the Knesset’s approval on regulating Israeli law in the West Bank will be taken to the International Criminal Court. Dr. Erekat’s response to the news came during his meeting with UN peace envoy, Robert Serry, and councils of the US, England, Germany and France.
  • Erekat pointed out that the Foreign Affairs, Negotiation Departments, Ministry of justice and other Palestinian organizations now prepare official papers for Palestinian state joining of a number of international treaties and documents, topped by the international court. (Palestine is recognized as a High Contracting Party, according to the Fourth Geneva Convention of 1949.) All Israeli settlements in the occupied territories, including those in East Jerusalem, have been declared illegal under international law.
  •  
    If accurate, this news will result ion a ruckus.
Paul Merrell

US v. Comprehensive Drug Testing, Inc., 621 F. 3d 1162 - Court of Appeals, 9th Circuit ... - 0 views

  • Concluding Thoughts
  • This case well illustrates both the challenges faced by modern law enforcement in retrieving information it needs to pursue and prosecute wrongdoers, and the threat to the privacy of innocent parties from a vigorous criminal investigation. At the time of Tamura, most individuals and enterprises kept records in their file cabinets or similar physical facilities. Today, the same kind of data is usually stored electronically, often far from the premises. Electronic storage facilities intermingle data, making them difficult to retrieve without a thorough understanding of the filing and classification systems used—something that can often only be determined by closely analyzing the data in a controlled environment. Tamura involved a few dozen boxes and was considered a broad seizure; but even inexpensive electronic storage media today can store the equivalent of millions of pages of information. 1176*1176 Wrongdoers and their collaborators have obvious incentives to make data difficult to find, but parties involved in lawful activities may also encrypt or compress data for entirely legitimate reasons: protection of privacy, preservation of privileged communications, warding off industrial espionage or preventing general mischief such as identity theft. Law enforcement today thus has a far more difficult, exacting and sensitive task in pursuing evidence of criminal activities than even in the relatively recent past. The legitimate need to scoop up large quantities of data, and sift through it carefully for concealed or disguised pieces of evidence, is one we've often recognized. See, e.g., United States v. Hill, 459 F.3d 966 (9th Cir.2006).
  • This pressing need of law enforcement for broad authorization to examine electronic records, so persuasively demonstrated in the introduction to the original warrant in this case, see pp. 1167-68 supra, creates a serious risk that every warrant for electronic information will become, in effect, a general warrant, rendering the Fourth Amendment irrelevant. The problem can be stated very simply: There is no way to be sure exactly what an electronic file contains without somehow examining its contents—either by opening it and looking, using specialized forensic software, keyword searching or some other such technique. But electronic files are generally found on media that also contain thousands or millions of other files among which the sought-after data may be stored or concealed. By necessity, government efforts to locate particular files will require examining a great many other files to exclude the possibility that the sought-after data are concealed there. Once a file is examined, however, the government may claim (as it did in this case) that its contents are in plain view and, if incriminating, the government can keep it. Authorization to search some computer files therefore automatically becomes authorization to search all files in the same sub-directory, and all files in an enveloping directory, a neighboring hard drive, a nearby computer or nearby storage media. Where computers are not near each other, but are connected electronically, the original search might justify examining files in computers many miles away, on a theory that incriminating electronic data could have been shuttled and concealed there.
  • ...3 more annotations...
  • The advent of fast, cheap networking has made it possible to store information at remote third-party locations, where it is intermingled with that of other users. For example, many people no longer keep their email primarily on their personal computer, and instead use a web-based email provider, which stores their messages along with billions of messages from and to millions of other people. Similar services exist for photographs, slide shows, computer code and many other types of data. As a result, people now have personal data that are stored with that of innumerable strangers. Seizure of, for example, Google's email servers to look for a few incriminating messages could jeopardize the privacy of millions. It's no answer to suggest, as did the majority of the three-judge panel, that people can avoid these hazards by not storing their data electronically. To begin with, the choice about how information is stored is often made by someone other than the individuals whose privacy would be invaded by the search. Most people have no idea whether their doctor, lawyer or accountant maintains records in paper or electronic format, whether they are stored on the premises or on a server farm in Rancho Cucamonga, whether they are commingled with those of many other professionals 1177*1177 or kept entirely separate. Here, for example, the Tracey Directory contained a huge number of drug testing records, not only of the ten players for whom the government had probable cause but hundreds of other professional baseball players, thirteen other sports organizations, three unrelated sporting competitions, and a non-sports business entity—thousands of files in all, reflecting the test results of an unknown number of people, most having no relationship to professional baseball except that they had the bad luck of having their test results stored on the same computer as the baseball players.
  • Second, there are very important benefits to storing data electronically. Being able to back up the data and avoid the loss by fire, flood or earthquake is one of them. Ease of access from remote locations while traveling is another. The ability to swiftly share the data among professionals, such as sending MRIs for examination by a cancer specialist half-way around the world, can mean the difference between death and a full recovery. Electronic storage and transmission of data is no longer a peculiarity or a luxury of the very rich; it's a way of life. Government intrusions into large private databases thus have the potential to expose exceedingly sensitive information about countless individuals not implicated in any criminal activity, who might not even know that the information about them has been seized and thus can do nothing to protect their privacy. It is not surprising, then, that all three of the district judges below were severely troubled by the government's conduct in this case. Judge Mahan, for example, asked "what ever happened to the Fourth Amendment? Was it ... repealed somehow?" Judge Cooper referred to "the image of quickly and skillfully moving the cup so no one can find the pea." And Judge Illston regarded the government's tactics as "unreasonable" and found that they constituted "harassment." Judge Thomas, too, in his panel dissent, expressed frustration with the government's conduct and position, calling it a "breathtaking expansion of the `plain view' doctrine, which clearly has no application to intermingled private electronic data." Comprehensive Drug Testing, 513 F.3d at 1117.
  • Everyone's interests are best served if there are clear rules to follow that strike a fair balance between the legitimate needs of law enforcement and the right of individuals and enterprises to the privacy that is at the heart of the Fourth Amendment. Tamura has provided a workable framework for almost three decades, and might well have sufficed in this case had its teachings been followed. We have updated Tamura to apply to the daunting realities of electronic searches. We recognize the reality that over-seizing is an inherent part of the electronic search process and proceed on the assumption that, when it comes to the seizure of electronic records, this will be far more common than in the days of paper records. This calls for greater vigilance on the part of judicial officers in striking the right balance between the government's interest in law enforcement and the right of individuals to be free from unreasonable searches and seizures. The process of segregating electronic data that is seizable from that which is not must not become a vehicle for the government to gain access to data which it has no probable cause to collect.
  •  
    From a Ninth U.S. Circuit Court of Appeals en banc ruling in 2010. The Court's holding was that federal investigators had vastly overstepped the boundaries of multiple subpoenas and a search warrant --- and the Fourth Amendment --- by seizing records of a testing laboratory and reviewing them for information not described in the warrant or the subpoenas. At issue in this particular case was the government's use of a warrant that found probable cause to believe that the records contained evidence that steroids had been found in the urine of ten major league baseball players but searched the seized records for urine tests of other baseball players. The Court upheld the lower courts' rulings that the government was required to return all records other than those relevant to the ten players identified in the warrant. (The government had instead used the records of other player's urine tests to issue subpoenas for evidence relevant to those players potential use of steroids.) This decision cuts very heavily against the notion that the Fourth Amendment allows the bulk collection of private information about millions of Americans with or without a warrantor court order on the theory that some of the records *may* later become relevant to a lawful investigation.   Or rephrased, here is the en banc decision of the largest federal court of appeals (as many judges as most other federal appellate courts combined), in direct disagreement with the FISA Court orders allowing bulk collection of telephone records and bulk "incidental" collection of Americans' telephone conversations on the theory that the records *might* become relevant to national security investigations. Yet none of the FISA judges in any of the FISA opinions published thus far even cited, let alone distinguished, this Ninth Circuit en banc decision. Which says a lot of the quality of the legal research performed by the FISA Court judges. However, this precedent is front and center in briefs filed with the Ni
Paul Merrell

Launching in 2015: A Certificate Authority to Encrypt the Entire Web | Electronic Front... - 0 views

  • Today EFF is pleased to announce Let’s Encrypt, a new certificate authority (CA) initiative that we have put together with Mozilla, Cisco, Akamai, IdenTrust, and researchers at the University of Michigan that aims to clear the remaining roadblocks to transition the Web from HTTP to HTTPS.Although the HTTP protocol has been hugely successful, it is inherently insecure. Whenever you use an HTTP website, you are always vulnerable to problems, including account hijacking and identity theft; surveillance and tracking by governments, companies, and both in concert; injection of malicious scripts into pages; and censorship that targets specific keywords or specific pages on sites. The HTTPS protocol, though it is not yet flawless, is a vast improvement on all of these fronts, and we need to move to a future where every website is HTTPS by default.With a launch scheduled for summer 2015, the Let’s Encrypt CA will automatically issue and manage free certificates for any website that needs them. Switching a webserver from HTTP to HTTPS with this CA will be as easy as issuing one command, or clicking one button.
  • The biggest obstacle to HTTPS deployment has been the complexity, bureaucracy, and cost of the certificates that HTTPS requires. We’re all familiar with the warnings and error messages produced by misconfigured certificates. These warnings are a hint that HTTPS (and other uses of TLS/SSL) is dependent on a horrifyingly complex and often structurally dysfunctional bureaucracy for authentication.
  • The need to obtain, install, and manage certificates from that bureaucracy is the largest reason that sites keep using HTTP instead of HTTPS. In our tests, it typically takes a web developer 1-3 hours to enable encryption for the first time. The Let’s Encrypt project is aiming to fix that by reducing setup time to 20-30 seconds. You can help test and hack on the developer preview of our Let's Encrypt agent software or watch a video of it in action here:
  • ...1 more annotation...
  • Let’s Encrypt will employ a number of new technologies to manage secure automated verification of domains and issuance of certificates. We will use a protocol we’re developing called ACME between web servers and the CA, which includes support for new and stronger forms of domain validation. We will also employ Internet-wide datasets of certificates, such as EFF’s own Decentralized SSL Observatory, the University of Michigan’s scans.io, and Google's Certificate Transparency logs, to make higher-security decisions about when a certificate is safe to issue.The Let’s Encrypt CA will be operated by a new non-profit organization called the Internet Security Research Group (ISRG). EFF helped to put together this initiative with Mozilla and the University of Michigan, and it has been joined for launch by partners including Cisco, Akamai, and Identrust.
Paul Merrell

German Embassy Releases "Alarming" Declaration to Residents in Venezuela | venezuelanal... - 0 views

  • The German Embassy in Caracas has alarmed political observers in Venezuela by publishing what the press has described as an "alarming” official declaration to its citizens in the South American country. Published on February 5th, the declaration is written and signed by the Chargé d’Affaires at the German Embassy, Dr. Jörg Polster. It began to make the rounds on social media networks over the last two days.  In the statement, German diplomat Polster informs readers that the embassy is extremely “worried” about the current situation in the country and advises German residents to take a number of “precautions in the face of the crisis”. These precautions include having “lots of provisions” such as enough food and drinking water to last “in our opinion, for 2 weeks”, as well as cash, medicine, batteries, candles, and copies of important documents.
  • “We shouldn’t take it for granted that we will have access to electricity or internet services. The validity of passports and identity documents should be verified regularly,” continues the text. A 24 hour emergency phone line and link to an information e-mailing list are also given in the statement, which recommends that members of the German community have the embassy’s phone number “at hand at all times”. “In terms of the precautions to take in the face of the current crisis, it’s important to add that the embassy is constantly monitoring the situation and will publish information about the development of events when necessary,” it states.
  • Many news outlets in the country have described the statement as “alarming” whilst others have  labelled it “suspicious”.  The socialist administration of Nicolas Maduro is currently facing a stepped up economic war which is causing scarcities of basic goods, as well as increased calls by the political opposition for his government to step down. Many observers have likened the situation to pre-coup 1973 Chile, whilst government supporters have accused the US of plotting to facilitate a coup alongside the rightwing opposition.  “What development are they waiting for? Is it possible that they know something more than they are letting on?” stated an article on the pro-government website, Laiguana in reaction to the declaration.  
Paul Merrell

Western Spy Agencies Secretly Rely on Hackers for Intel and Expertise - The Intercept - 0 views

  • The U.S., U.K. and Canadian governments characterize hackers as a criminal menace, warn of the threats they allegedly pose to critical infrastructure, and aggressively prosecute them, but they are also secretly exploiting their information and expertise, according to top secret documents. In some cases, the surveillance agencies are obtaining the content of emails by monitoring hackers as they breach email accounts, often without notifying the hacking victims of these breaches. “Hackers are stealing the emails of some of our targets… by collecting the hackers’ ‘take,’ we . . .  get access to the emails themselves,” reads one top secret 2010 National Security Agency document. These and other revelations about the intelligence agencies’ reliance on hackers are contained in documents provided by whistleblower Edward Snowden. The documents—which come from the U.K. Government Communications Headquarters agency and NSA—shed new light on the various means used by intelligence agencies to exploit hackers’ successes and learn from their skills, while also raising questions about whether governments have overstated the threat posed by some hackers.
  • By looking out for hacking conducted “both by state-sponsored and freelance hackers” and riding on the coattails of hackers, Western intelligence agencies have gathered what they regard as valuable content: Recently, Communications Security Establishment Canada (CSEC) and Menwith Hill Station (MHS) discovered and began exploiting a target-rich data set being stolen by hackers. The hackers’ sophisticated email-stealing intrusion set is known as INTOLERANT. Of the traffic observed, nearly half contains category hits because the attackers are targeting email accounts of interest to the Intelligence Community. Although a relatively new data source, [Target Offices of Primary Interest] have already written multiple reports based on INTOLERANT collect. The hackers targeted a wide range of diplomatic corps, human rights and democracy activists and even journalists: INTOLERANT traffic is very organized. Each event is labeled to identify and categorize victims. Cyber attacks commonly apply descriptors to each victim – it helps herd victims and track which attacks succeed and which fail. Victim categories make INTOLERANT interesting: A = Indian Diplomatic & Indian Navy B = Central Asian diplomatic C = Chinese Human Rights Defenders D = Tibetan Pro-Democracy Personalities E = Uighur Activists F = European Special Rep to Afghanistan and Indian photo-journalism G = Tibetan Government in Exile
  • In those cases, the NSA and its partner agencies in the United Kingdom and Canada were unable to determine the identity of the hackers who collected the data, but suspect a state sponsor “based on the level of sophistication and the victim set.” In instances where hacking may compromise data from the U.S. and U.K. governments, or their allies, notification was given to the “relevant parties.” In a separate document, GCHQ officials discuss plans to use open source discussions among hackers to improve their own knowledge. “Analysts are potentially missing out on valuable open source information relating to cyber defence because of an inability to easily keep up to date with specific blogs and Twitter sources,” according to one document. GCHQ created a program called LOVELY HORSE to monitor and index public discussion by hackers on Twitter and other social media. The Twitter accounts designated for collection in the 2012 document:
  • ...3 more annotations...
  • These accounts represent a cross section of the hacker community and security scene. In addition to monitoring multiple accounts affiliated with Anonymous, GCHQ monitored the tweets of Kevin Mitnick, who was sent to prison in 1999 for various computer and fraud related offenses. The U.S. Government once characterized Mitnick as one of the world’s most villainous hackers, but he has since turned security consultant and exploit broker. Among others, GCHQ monitored the tweets of reverse-engineer and Google employee, Thomas Dullien. Fellow Googler Tavis Ormandy, from Google’s vulnerability research team Project Zero, is featured on the list, along with other well known offensive security researchers, including Metasploit’s HD Moore and James Lee (aka Egypt) together with Dino Dai Zovi and Alexander Sotirov, who at the time both worked for New York-based offensive security company, Trail of Bits (Dai Zovi has since taken up a position at payment company, Square). The list also includes notable anti-forensics and operational security expert “The Grugq.” GCHQ monitored the tweets of former NSA agents Dave Aitel and Charlie Miller, and former Air Force intelligence officer Richard Bejtlich as well as French exploit vendor, VUPEN (who sold a one year subscription for its binary analysis and exploits service to the NSA in 2012).
  • Documents published with this article: LOVELY HORSE – GCHQ Wiki Overview INTOLERANT – Who Else Is Targeting Your Target? Collecting Data Stolen by Hackers – SIDtoday  HAPPY TRIGGER/LOVELY HORSE/Zool/TWO FACE – Open Source for Cyber Defence/Progress NATO Civilian Intelligence Council – Cyber Panel – US Talking Points
  • The U.S., U.K. and Canadian governments characterize hackers as a criminal menace, warn of the threats they allegedly pose to critical infrastructure, and aggressively prosecute them, but they are also secretly exploiting their information and expertise, according to top secret documents. In some cases, the surveillance agencies are obtaining the content of emails by monitoring hackers as they breach email accounts, often without notifying the hacking victims of these breaches. “Hackers are stealing the emails of some of our targets… by collecting the hackers’ ‘take,’ we . . .  get access to the emails themselves,” reads one top secret 2010 National Security Agency document. These and other revelations about the intelligence agencies’ reliance on hackers are contained in documents provided by whistleblower Edward Snowden. The documents—which come from the U.K. Government Communications Headquarters agency and NSA—shed new light on the various means used by intelligence agencies to exploit hackers’ successes and learn from their skills, while also raising questions about whether governments have overstated the threat posed by some hackers.
Paul Merrell

HSBC tax evasion: Bank helped conceal $100 billion in Swiss accounts - Feb. 8, 2015 - 0 views

  • Global banking giant HSBC for years catered to a motley crew of weapons dealers, tax evaders, tin-pot dictators and celebrities, using its private Swiss arm to shield accounts worth more than $100 billion. Documents obtained and analyzed by the International Consortium of Investigative Journalists (ICIJ) reveal how HSBC (HSBC) used the secretive Swiss banking system to conceal the identities of accounts holders, and in many cases, help depositors avoid paying taxes.
  • ICIJ's findings are based on data turned over to French authorities by former HSBC employee Hervé Falciani in 2008. The files were later obtained by the newspaper Le Monde and shared among other media outlets. ICIJ said the leaked documents show that HSBC "repeatedly reassured clients that it would not disclose details of accounts to national authorities" and even "discussed with clients a range of measures that would ultimately allow clients to avoid paying taxes in their home countries." In a statement provided to ICIJ, HSBC said that its Swiss private bank has undergone a "radical transformation in recent years," including reforms that will make it more difficult for clients to evade taxes or launder money. "We acknowledge that the compliance culture and standards of due diligence in HSBC's Swiss private bank, as well as the industry in general, were significantly lower than they are today," the statement said.
Paul Merrell

New regs say passengers cannot fly without biometric ID card - Police State USA - 0 views

  • The ability to travel in the United States is about to become more restrictive as the TSA announces it will soon be enforcing new identification standards in American airports. Beginning in 2016, passengers attempting to pass through a federal TSA checkpoint will be subject to the requirements of the REAL ID Act. To that end, the TSA will put higher scrutiny on travelers’ identities, and will only accept a federal passport or a “REAL-ID” card, which is issued by the states to meet federal requirements. Passengers will not be allowed to fly through an American airport without submitting to the advanced federal specifications. Both federal passports and REAL-ID cards require a number of unique personal identifiers to be stored together in government databases, including his or her full name, date of birth, Social Security Number, scanned signature, and other identifiers. Both cards require biometric data: a front-facing digital photograph of the passenger’s face, which is ultimately used with a facial recognition database.
Paul Merrell

EU Realignment on Saudi Arabia and Iran? « LobeLog - 0 views

  • In a rare move, the European Parliament (EP) recently adopted a strongly worded resolution condemning human rights abuses in Saudi Arabia by a vote of 460 to 153. The focus of the resolution was Raif Badawi, a blogger that the Saudi authorities charged with blasphemy and sentenced to 1,000 lashes, 10 years of prison, and a 228,000 euro fine for founding a liberal website. But the resolution took a broader view on the human rights situation in Saudi Arabia. The European MPs didn´t mince words. Although they took note of some cautious reforms undertaken by the late king Abdullah, they charged that the Saudi political and social system “remains profoundly undemocratic, makes women and Shia Muslims second-class citizens, seriously discriminates against the country’s large foreign workforce and severely represses all voices of dissent.” They portrayed the Badawi case “as a symbol of the Kingdom’s characteristic policies of intolerance and extremist interpretation of Islamic law.” In particularly damning paragraphs, the EP took Saudi Arabia to task for playing “a leading role in financing, disseminating and promoting worldwide a particularly extremist interpretation of Islam, which, in its most sectarian vision, has inspired terrorist organisations such as the so-called Islamic State and al‑Qaeda.” In language that is certain to provoke Riyadh´s ire, the MPs noted that the so-called Islamic State (ISIS or IS) and Saudi Arabia prescribe near-identical punishments for a host of crimes, and that Saudi claims to be a partner to the EU in fighting IS and al-Qaeda would have been more credible “if it did not engage in anachronistic and extremist practices, such as public beheadings, stoning and other forms of torture, similar to those committed by IS.”
  • By way of conclusion, the MPs asked the EU and the Member States “to reconsider their relationship with Saudi Arabia, in a way that allows it to pursue its economic, energy and security interests, whilst not undermining the credibility of its core human rights commitments.” This unprecedented criticism of Saudi Arabia, officially an “ally,” by a EU institution contrasts with the relatively milder treatment accorded to Iran, an official “foe” and Saudi Arabia´s regional antagonist. In its last resolution adopted in May 2014, the EP criticized Iran for its human rights abuses, but the overall tone was much more positive, highlighting an array of possible areas of cooperation.
  • the EP resolution sends an important political message. In the wake of the terrorist attacks in Paris and Copenhagen, it echoes a growing realization among policymakers, diplomats, and the wider security community that Saudi Arabia´s track record of supporting extremist groups may be a root cause of the terrorist threat, while Iran´s opposition to IS and al-Qaeda could help Europe tackle this threat. The prospects for regional cooperation with Iran in countering IS, al-Qaeda, and also the Taliban, are a staple of think-tank conferences in Europe these days. The idea of Iran´s potentially stabilizing role in the region is becoming mainstream.
« First ‹ Previous 141 - 160 of 185 Next › Last »
Showing 20 items per page