Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged leaked-docs

Rss Feed Group items tagged

Paul Merrell

Leaked docs show spyware used to snoop on US computers | Ars Technica - 0 views

  • Software created by the controversial UK-based Gamma Group International was used to spy on computers that appear to be located in the United States, the UK, Germany, Russia, Iran, and Bahrain, according to a leaked trove of documents analyzed by ProPublica. It's not clear whether the surveillance was conducted by governments or private entities. Customer e-mail addresses in the collection appeared to belong to a German surveillance company, an independent consultant in Dubai, the Bosnian and Hungarian Intelligence services, a Dutch law enforcement officer, and the Qatari government.
  • The leaked files—which were posted online by hackers—are the latest in a series of revelations about how state actors including repressive regimes have used Gamma's software to spy on dissidents, journalists, and activist groups. The documents, leaked last Saturday, could not be readily verified, but experts told ProPublica they believed them to be genuine. "I think it's highly unlikely that it's a fake," said Morgan Marquis-Bore, a security researcher who while at The Citizen Lab at the University of Toronto had analyzed Gamma Group's software and who authored an article about the leak on Thursday. The documents confirm many details that have already been reported about Gamma, such as that its tools were used to spy on Bahraini activists. Some documents in the trove contain metadata tied to e-mail addresses of several Gamma employees. Bill Marczak, another Gamma Group expert at the Citizen Lab, said that several dates in the documents correspond to publicly known events—such as the day that a particular Bahraini activist was hacked.
  • The leaked files contain more than 40 gigabytes of confidential technical material, including software code, internal memos, strategy reports, and user guides on how to use Gamma Group software suite called FinFisher. FinFisher enables customers to monitor secure Web traffic, Skype calls, webcams, and personal files. It is installed as malware on targets' computers and cell phones. A price list included in the trove lists a license of the software at almost $4 million. The documents reveal that Gamma uses technology from a French company called Vupen Security that sells so-called computer "exploits." Exploits include techniques called "zero days" for "popular software like Microsoft Office, Internet Explorer, Adobe Acrobat Reader, and many more." Zero days are exploits that have not yet been detected by the software maker and therefore are not blocked.
  • ...2 more annotations...
  • Many of Gamma's product brochures have previously been published by the Wall Street Journal and Wikileaks, but the latest trove shows how the products are getting more sophisticated. In one document, engineers at Gamma tested a product called FinSpy, which inserts malware onto a user's machine, and found that it could not be blocked by most antivirus software. Documents also reveal that Gamma had been working to bypass encryption tools including a mobile phone encryption app, Silent Circle, and were able to bypass the protection given by hard-drive encryption products TrueCrypt and Microsoft's Bitlocker.
  • The documents also describe a "country-wide" surveillance product called FinFly ISP which promises customers the ability to intercept Internet traffic and masquerade as ordinary websites in order to install malware on a target's computer. The most recent date-stamp found in the documents is August 2, coincidung with the first tweet by a parody Twitter account, @GammaGroupPR, which first announced the hack and may be run by the hacker or hackers responsible for the leak. On Reddit, a user called PhineasFisher claimed responsibility for the leak. "Two years ago their software was found being widely used by governments in the middle east, especially Bahrain, to hack and spy on the computers and phones of journalists and dissidents," the user wrote. The name on the @GammaGroupPR Twitter account is also "Phineas Fisher." GammaGroup, the surveillance company whose documents were released, is no stranger to the spotlight. The security firm F-Secure first reported the purchase of FinFisher software by the Egyptian State Security agency in 2011. In 2012, Bloomberg News and The Citizen Lab showed how the company's malware was used to target activists in Bahrain. In 2013, the software company Mozilla sent a cease-and-desist letter to the company after a report by The Citizen Lab showed that a spyware-infected version of the Firefox browser manufactured by Gamma was being used to spy on Malaysian activists.
Paul Merrell

New Leak Puts "Stake In The Heart" Of Trump's Muslim Ban Rationale - 0 views

  • In a major scoop said to put a “stake in the heart of the Muslim ban,” MSNBC‘s Rachel Maddow reported Thursday evening on a new leaked Department of Homeland Security (DHS) analysis which essentially shreds the Trump administration’s rationale for banning travel from seven Muslim-majority nations. The document, prepared by DHS’ internal intelligence agency, the Office of Intelligence and Analysis, concludes that the majority of foreign-born, U.S.-based violent extremists were radicalized several years after their entry into the U.S.
  • The Washington Post‘s Greg Sargent on Friday suggested that the leaked analysis could be part of the “real reason for the delay,” rather than the stated reason of not wanting to sully the warm reception received by the president after his joint-session speech Tuesday evening. “The Trump administration can’t solve the problem that has always bedeviled this policy, which is that there isn’t any credible national security rationale for it,” he wrote. “Unlike on the campaign trail, when you’re governing, you actually have to have justification for what you’re proposing, or you often run into trouble.” Similarly, Maddow observed that “they really do have a problem here,” pointing to the document’s key finding, which states that “most foreign-born, U.S.-based violent extremists are likely radicalized several years after their entry to the United States, limiting the ability of screening and vetting officials to prevent their entry because of national security concerns.” “The national security justification for this whole ban—this setting up of extreme vetting—is bull-pucky,” Maddow said. “There’s nothing they can set up at the border to tell you years down the road who might become…a radical and violent person years from now.” This latest leak follows the release of another DHS analysis last week that similarly undermined the Trump administration’s claim that people traveling from Syria, Iran, Iraq, Yemen, Sudan, Libya, and Somalia pose a severe threat to the United States. That document, obtained by the Associated Press, concluded that “citizenship is an ‘unlikely indicator’ of terrorism threats to the United States and that few people from the countries Trump listed in his travel ban have carried out attacks or been involved in terrorism-related activities in the U.S. since Syria’s civil war started in 2011,” as AP reported. Taken together, the two documents throw cold water on most of the administration’s stated justification for the pending executive order.
  •  
    Sounds like the document and the earlier one via Associated Press may put an end to Trump's Muslim ban campaign promise, if not voluntarily then by court order.
Gary Edwards

Take A Break From The Snowden Drama For A Reminder Of What He's Revealed So Far - Forbes - 0 views

  • Here’s a recap of Snowden’s leaked documents published so far, in my own highly subjective order of importance.
  • The publication of Snowden’s leaks began with a top secret order from the Foreign Intelligence Surveillance Court (FISC) sent to Verizon on behalf of the NSA, demanding the cell phone records of all of Verizon Business Network Services’ American customers for the three month period ending in July. The order, obtained by the Guardian, sought only the metadata of those millions of users’ calls–who called whom when and from what locations–but specifically requested Americans’ records, disregarding foreigners despite the NSA’s legal restrictions that it may only surveil non-U.S. persons. Senators Saxby Chambliss and Diane Feinstein defended the program and said it was in fact a three-month renewal of surveillance practices that had gone for seven years.
  • In a congressional hearing, NSA director Keith Alexander argued that the kind of surveillance of Americans’ data revealed in that Verizon order was necessary to for archiving purposes, but was rarely accessed and only with strict oversight from Foreign Intelligence Surveillance Court judges. But another secret document published by the Guardian revealed the NSA’s own rules for when it makes broad exceptions to its foreign vs. U.S. persons distinction, accessing Americans’ data and holding onto it indefinitely. Those exceptions include anytime Americans’ data is judged to be “significant foreign intelligence” information or information about a crime that has been or is about to be committed, any data “involved in the unauthorized disclosure of national security information,” or necessary to “assess a communications security vulnerability.” Any encrypted data that the NSA wants to crack can also be held indefinitely, regardless of whether its American or foreign origin.
  • ...6 more annotations...
  • Another leaked slide deck revealed a software tool called Boundless Informant, which the NSA appears to use for tracking the origin of data it collects. The leaked materials included a map produced by the program showing the frequency of data collection in countries around the world. While Iran, Pakistan and Jordan appeared to be the most surveilled countries according to the map, it also pointed to significant data collection from the United States.
  • A leaked executive order from President Obama shows the administration asked intelligence agencies to draw up a list of potential offensive cyberattack targets around the world. The order, which suggests targeting “systems, processes and infrastructure” states that such offensive hacking operations “can offer unique and unconventional capabilities to advance U.S. national objectives around the world with little or no warning to the adversary or target and with potential effects ranging from subtle to severely damaging.” The order followed repeated accusations by the U.S. government that China has engaged in state-sponsored hacking operations, and was timed just a day before President Obama’s summit with Chinese President Xi Jinping.
  • Documents leaked to the Guardian revealed a five-year-old British intelligence scheme to tap transatlantic fiberoptic cables to gather data. A program known as Tempora, created by the U.K.’s NSA equivalent Government Communications Headquarters (GCHQ) has for the last 18 months been able to store huge amounts of that raw data for up to 30 days. Much of the data is shared with the NSA, which had assigned 250 analysts to sift through it as of May of last year.
  • Another GCHQ project revealed to the Guardian through leaked documents intercepted the communications of delegates to the G20 summit of world leaders in London in 2009. The scheme included monitoring the attendees’ phone calls and emails by accessing their Blackberrys, and even setting up fake Internet cafes that used keylogging software to surveil them.
  • Snowden showed the Hong Kong newspaper the South China Morning Post documents that it said outlined extensive hacking of Chinese and Hong Kong targets by the NSA since 2009, with 61,000 targets globally and “hundreds” in China. Other SCMP stories based on Snowden’s revelations stated that the NSA had gained access to the Chinese fiberoptic network operator Pacnet as well as Chinese mobile phone carriers, and had gathered large quantities of Chinese SMS messages.
  • The Guardian’s Glenn Greenwald has said that Snowden provided him “thousands” of documents, of which “dozens” are newsworthy. And Snowden himself has said he’d like to expose his trove of leaks to the global media so that each country’s reporters can decide whether “U.S. network operations against their people should be published.” So regardless of where Snowden ends up, expect more of his revelations to follow.
  •  
    Nice tight summary
Paul Merrell

The Spy Cables: A glimpse into the world of espionage - Al Jazeera English - 0 views

  • A digital leak to Al Jazeera of hundreds of secret intelligence documents from the world's spy agencies has offered an unprecedented insight into operational dealings of the shadowy and highly politicised realm of global espionage. Over the coming days, Al Jazeera's Investigative Unit is publishing The Spy Cables, in collaboration with The Guardian newspaper.
  • Spanning a period from 2006 until December 2014, they include detailed briefings and internal analyses written by operatives of South Africa's State Security Agency (SSA). They also reveal the South Africans' secret correspondence with the US intelligence agency, the CIA, Britain's MI6, Israel's Mossad, Russia's FSB and Iran's operatives, as well as dozens of other services from Asia to the Middle East and Africa.
  • Among the revelations, the Spy Cables disclose how: Israel's Mossad told its allies that Iran was not working to produce nuclear weapons just a month after Prime Minister Benjamin Netanyahu warned it was barely a year from being able to do so; The CIA made attempts to contact Hamas directly despite the US government listing the Palestinian group as a "terrorist organisation"; Britain's MI6 sought South African help in an operation to recruit a North Korean official who had previously refused their cash; and South African and Ethiopian spies struggled to "neutralise" an assassination plot targeting a leading African diplomat.
  • ...6 more annotations...
  • Mossad contradicted Netanyahu on Iran nuclear programme The Spy Cables A glimpse into the world of espionage Spy Cables South African spies wary of Iran operations Spy Cables expose 'desperate' US approach to Hamas Israeli cable reveals S Africa missile theft cover-up The Spy Cables - Al Jazeera English Yazidis battle ISIL Disaster 'made us stronger' Spy Cables Abbas and Israel ally against 2009 UN probe Cables describe British attempt to recruit N Korean spy The Rise of the Oligarchs
  • Unlike the Edward Snowden documents that focus on electronic signals intelligence, commonly referred to in intelligence circles as "SIGINT", the Spy Cables deal with human intelligence, or "HUMINT".
  • Rather than chronicling spy-movie style tales of  ruthless efficiency of intelligence agencies, they offer an unprecedented glimpse into the daily working lives of people whose jobs are kept secret from the public.
  • The Spy Cables also reveal that in many cases, intelligence agencies are over-classifying information and hiding behind an unnecessary veil of secrecy. This harms the ability of a democratic society to either consent to the activities of their intelligence agencies or provide adequate checks and balances to their powers.
  • Spy Cables expose 'desperate' US approach to Hamas Leaked documents also show Mossad lobbying South Africa against Goldstone Report, claiming Abbas shared their stance.
  • Spy Cables: South African spies wary of Iran operations Leaked documents describe Tehran working to counter sanctions by using front companies and official channels.
Paul Merrell

New WikiLeaks Trove Further Exposes TISA's Neoliberal Agenda - 0 views

  • WikiLeaks on Wednesday released a trove of documents detailing previously unknown pro-corporate provisions and updates to the Trade in Services Agreement (TISA), exposing the extent to which the U.S.-driven deal will force signatory nations to privatize public services and deregulate corporations. As the 52 nations involved in TISA comprise a full two-thirds of global GDP, the deal is poised to impact billions of lives around the world. The 18th round of negotiations on TISA resumed Thursday. Released for the very first time on Wednesday was TISA’s annex on “State-Owned Enterprises” (SOEs), which mandates that public services must be treated like private businesses. The documents reveal that the annex was introduced only two days after the U.S. successfully forced through similar text in the Trans-Pacific Partnership (TTP) in October 2015.
  • Trade expert Jane Kelsey, who teaches law at the University of Auckland, described how the U.S. pushed through such provisions in order to target other nations’ public services—and China’s in particular: When the [TPP] negotiations began in 2010 the U.S. made it clear that it required a chapter on SOEs. The goal was always to create precedent-setting rules that could target China, although the U.S. also had other countries’ SOEs in its sights—the state-managed Vietnamese economy, various countries’ sovereign wealth funds, and once Japan joined, Japan Post’s banking, insurance and delivery services. All the other countries were reluctant to concede the need for such a chapter and the talks went around in circles for several years. Eventually the U.S. had its way. “The U.S. proposal for TISA adopts and adapts key parts of the [TPP] chapter that force majority-owned SOEs to operate like private sector businesses,” Kelsey added. “The most extreme, complicated and potentially unworkable provisions in the [TPP] relating to state support are not included—yet. But there is an extraordinary power for a single TISA party to require the development of those rules if another TISA country, or a country seeking to join TISA, has too many large SOEs.”
  • Observers have long taken note of the implicitly anti-China stance of the several U.S.-backed pro-corporate “free trade” deals being negotiated now. While TISA is perhaps the least well-known of these agreements, together with the TPP and the TransAtlantic Trade and Investment Pact (TTIP), the deals “form not only a new legal order shaped for transnational corporations, but a new economic ‘grand enclosure,’ which excludes China and all other BRICS countries,” as WikiLeaks founder Julian Assange put it last year. The leaked documents also showed new, multinational-friendly updates to sections of the deal titled “Domestic Regulation,” “Transparency,” and “New Provisions.” The latest versions, argues WikiLeaks, have further advanced towards the ‘deregulation’ objectives of big corporations entering overseas markets. Local regulations like store size restrictions or hours of operations are considered an obstacle to achieve ‘operating efficiencies’ of large-scale retailing, disregarding their public benefit that foster livable neighbors and reasonable hours of work for employees.
  • ...1 more annotation...
  • Consumer protection advocates are outraged that such radically pro-corporate deals are being hidden and negotiated away from public view. “Consumer organizations shouldn’t have to rely on leaks to find out about negotiations that will have a major impact on consumers’ lives,” said Amanda Long, general director of the UK-based Consumers International, on Wednesday. “Without greater transparency, the negotiations can’t be exposed to the scrutiny needed to design a good agreement and build public trust, this must be a priority.” The impact of such an agreement will indeed be major: “The TISA provisions in their current form will establish a wide range of new grounds for domestic regulations to be challenged by corporations—even those without a local presence in that country,” WikiLeaks concluded. Kelsey observed, “As President Obama said of the [TPP] in October 2015, these agreements are about the U.S. making the rules for the global economy in the 21st century[…] in ways that ‘reflect America’s values.'”
Paul Merrell

Luxembourg: a tax haven by any other name? | nsnbc international - 0 views

  • The revelations that global and multinational businesses have been brokering “secret” tax deals with Luxembourg to avoid paying taxes in their home countries, may be the first time an entire country has been implicated in tax avoidance collusion. A cache of leaked agreements uncovered by the International Consortium of Investigative Journalism (ICIJ) appears to show that major companies have used the tiny EU state to dramatically cut their tax liabilities.
  • The ICIJ’s six-month investigation claims to have found household companies such as Aviva, HSBC, E-on, Tyco, Pepsi, IKEA and Deutsche Bank were among those which had taken advantage of legal tax avoidance schemes in Luxembourg. Luxembourg is routinely named as a tax haven on many of the world’s authoritative lists of tax havens, including the one compiled by me and my two co-authors, Richard Murphy and Christian Chavagneux. But Luxembourg has managed to remain “under the radar” not least because its politicians and bankers have been denying for years that it is, or ever was, a tax haven. The revelations suggest Luxembourg has been playing a double game. Luxembourg has been quick to comply with new regulations proposed by the Organisation for Economic Co-operation and Development (OECD) and the EU. In 2011, the OECD global forum on transparency and exchange of information commended Luxembourg for introducing new rules governing banking information or information protected by secrecy rules.
  • But at the same time, the revelations show that 340 well-known foreign companies have entered into secret agreements with the Luxembourg authorities, brokered by the accounting firm PricewaterhouseCoopers. To take a random example that applies for many of these companies, the ICIJ have a letter to the Luxembourg tax administration written on a PwC letterhead, where FedEx lays down its plan to set up a limited liability company as a tax resident in Luxembourg – so subject in principle to Luxembourg’s corporate income tax. The letter then provides details of a proposed shareholding arrangement that will ensure, I quote, that “neither that Fedex SCS nor its shareholders will be subject to corporate income tax, Municipal Business Tax and Net Wealth tax in Luxembourg”. The letter implies that Luxembourg will serve in effect as a tax haven for Fedex.
  • ...2 more annotations...
  • There have been a number of other highly publicised tax evasion and avoidance cases recently. For instance, many cases in the US involved branches or even key individuals working in branches of well-known Swiss and Israeli banks in the US, including UBS, Credit Swiss or Bank Leumi, or alternatively branches of American banks in Switzerland. But these tended to involve private firms. The Swiss government professed to have had no knowledge of such activities. Indeed, Swiss law prohibited Swiss banks, whether domestic or international, from providing any information on their clients to the Swiss state. This is a scandal with a difference. The leaked PricewaterhouseCoopers books imply there has been systemic collusion between companies from all over the world and the Luxembourg authorities in flagrant contravention of EU rules. The documents suggest that preferential tax treatments were guaranteed to these companies prior to their incorporation in Luxembourg.
  • This is the first case of suspected collusion between a government and a foreign firm in tax avoidance matters that I am aware of. In that sense, the current scandal places Luxembourg on par with Greece whose officials allegedly provided misleading data on Greek national debt to the Commission. More embarrassingly, all this took place during the time when the current president of the European Commission, Jean-Claude Juncker, served as the prime minister of Luxembourg from 1995-2013. It is difficult to imagine that the prime minister of such a small state was unaware such deals were taking place. There is a difference between the court of law and the court of public opinion. But we know from recent cases that the EU Commission has tended to follow the court of public opinion with criminal investigations of its own, as was the case of Amazon. It is likely that the Commission will now investigate these leaks and may impose fines on Luxembourg. I doubt Juncker can ride this one out.
  •  
    Woo-hoo! The IRS and Congress will be interested in this one too.  Now if someone would kindly send the docs to Wikileaks, the nations of the world can prosecute companies for tax evasion. But this time, would you all, pretty please, prosecute some human beings too and no settlements without at least a couple of years behind bars?
Paul Merrell

Drone strikes counterproductive, says secret CIA report - 0 views

  • Drone strikes and other "targeted killings" of terrorist and insurgent leaders favoured by the US and supported by Australia can strengthen extremist groups and be counterproductive, according to a secret CIA report published by WikiLeaks.According to a leaked document by the CIA's Directorate of Intelligence, "high value targeting" (HVT) involving air strikes and special forces operations against insurgent leaders can be effective, but can also havenegative effects including increasing violence and greater popular support for extremist groups.The leaked document is classified secret and "NoForn" (meaning not to be distributed to non-US nationals) and reviews attacks by the United States and other countries engaged in counter-insurgency operations over the past 50 years.The CIA assessment is the first leaked secret intelligence document published by WikiLeaks since 2011. Led by Australian publisher Julian Assange, the anti-secrecy group says the CIA assessment is the first in what will be a new series of leaked documents relating to the US agency.
  • The 2009 CIA study lends support to critics of US drone strikes in Afghanistan, Iraq, Pakistan, Somalia and Yemen by warning that such operations "may increase support for the insurgents, particularly if these strikes enhance insurgent leaders' lore, if non-combatants are killed in the attacks, if legitimate or semi-legitimate politicians aligned with the insurgents are targeted, or if the government is already seen as overly repressive or violent".
  • Similarly, the CIA observes that Israel's "targeted-killings campaign" against Hamas and Hezbollah was of limited effectiveness owing to "decentralised command structures, compartmented leadership, strong succession planning, and deep ties to their communities, making the[se] groups highly resilient to leadership losses".The CIA review does suggest that targeted killings can be useful when they are part of a broader counter-insurgency strategy that employs other military and non-military counter-insurgency instruments. 
  • ...2 more annotations...
  • The CIA study observes that the US-led coalition in Afghanistan made "a sustained effort since 2001 to target Taliban leaders", but "Afghan government corruption and lack of unity, insufficient strength of Afghan and NATO security forces, and the country's endemic lawlessness have constrained the effectiveness of these counter-insurgency elements"."Senior Taliban leaders' use of sanctuary in Pakistan has also complicated the HVT effort," the CIA says. "Moreover, the Taliban has a high overall ability to replace lost leaders, a centralised but flexible command and control overlaid with egalitarian Pashtun structures, and good succession planning and bench strength, especially at the middle levels."The CIA study also reports mixed results for such tactics in Iraq, noting that al-Qaeda in Iraq "initially lost several iterations of its senior leadership and numerous local emirs, but these losses initially did little to slow AQI's momentum".
  • Drone strikes and other "targeted killings" of terrorist and insurgent leaders favoured by the US and supported by Australia can strengthen extremist groups and be counterproductive, according to a secret CIA report published by WikiLeaks.According to a leaked document by the CIA's Directorate of Intelligence, "high value targeting" (HVT) involving air strikes and special forces operations against insurgent leaders can be effective, but can also havenegative effects including increasing violence and greater popular support for extremist groups.
  •  
    The report is at http://www.wikileaks.org/cia-hvt-counterinsurgency/ Apparently we have a new leaker with access to top secret/no foreign documents.  
Paul Merrell

U.S. Military Bans The Intercept - The Intercept - 0 views

  • A portion of an email (redacted and slightly altered to protect the source) sent to staff last week at a U.S. Marine Corps installation directing employees not to read this web site. The U.S. military is banning and blocking employees from visiting The Intercept in an apparent effort to censor news reports that contain leaked government secrets. According to multiple military sources, a notice has been circulated to units within the Army, Navy, Air Force, and Marine Corps warning staff that they are prohibited from reading stories published by The Intercept on the grounds that they may contain classified information. The ban appears to apply to all employees—including those with top-secret security clearance—and is aimed at preventing classified information from being viewed on unclassified computer networks, even if it is freely available on the internet. Similar military-wide bans have been directed against news outlets in the past after leaks of classified information.
  • A directive issued to military staff at one location last week, obtained by The Intercept, threatens that any employees caught viewing classified material in the public domain will face “long term security issues.” It suggests that the call to prohibit employees from viewing the website was made by senior officials over concerns about a “potential new leaker” of secret documents. The directive states: We have received information from our higher headquarters regarding a potential new leaker of classified information.  Although no formal validation has occurred, we thought it prudent to warn all employees and subordinate commands.  Please do not go to any website entitled “The Intercept” for it may very well contain classified material. As a reminder to all personnel who have ever signed a non-disclosure agreement, we have an ongoing responsibility to protect classified material in all of its various forms.  Viewing potentially classified material (even material already wrongfully released in the public domain) from unclassified equipment will cause you long term security issues.  This is considered a security violation.
  • A military insider subject to the ban said that several employees expressed concerns after being told by commanders that it was “illegal and a violation of national security” to read publicly available news reports on The Intercept. “Even though I have a top secret security clearance, I am still forbidden to read anything on the website,” said the source, who spoke on condition of anonymity due to the sensitivity of the subject.  “I find this very disturbing that they are threatening us and telling us what websites and news publishers we are allowed to read or not.”
  • ...2 more annotations...
  • In an emailed statement, Defense Department spokeswoman Lt. Col. Valerie Henderson said that she had not been able to establish whether the DoD had been the source of “any guidance related to your website.” Henderson added, however, that “DoD personnel have an obligation to safeguard classified information. Classified information, whether made public by unauthorized disclosure, remains classified until declassified by an appropriate government authority. DoD is committed to preventing classified information from being introduced onto DoD’s unclassified networks.” Earlier this month, after the publication of two Intercept stories revealing classified details about the vast scope of the government’s watchlisting program, Reuters reported that “intelligence officials were preparing a criminal referral” over the leaks.
  • The ban on The Intercept appears to have come in the aftermath of those stories, representing the latest in a string of U.S. military crackdowns on news websites that have published classified material. Last year, the Army admitted that it was blocking parts of The Guardian’s website after it published secret documents from former National Security Agency contractor Edward Snowden. In 2010, WikiLeaks and several major news organizations were subject to similar measures after the publication of leaked State Department diplomatic files. Flanagan, the Marine Corps spokesman, told The Intercept that The Washington Post was also blocked by some military agencies last year after it published documents from Snowden revealing covert NSA surveillance operations. “Just because classified information is published on a public website, that doesn’t mean military people with security clearance have the ability to download it,” Flanagan said.
  •  
    Enforced ignorance of the U.S. military. The official reason is a bucket that doesn't hold water. Despite official "classified" status, public is public. Any enemy can read it, so why should our military be barred from doing so. The real reason, I suspect, is protecting morale. 
Paul Merrell

Is the Justice Department Protecting An Anti-Iran Smear Campaign? « LobeLog - 0 views

  • A new wrinkle in an already bizarre lawsuit is shaping up to potentially embarrass the Obama administration. If allegations made in a recent court filing are true, then the US Department of Justice, with an unprecedented assertion of the state secrets privilege, might be shielding from any accountability a group actively engaged in spreading false information. The lawsuit revolves around United Against Nuclear Iran (UANI), an anti-Iran, pro-sanctions outfit that takes a hard line against Iran and lodges name-and-shame campaigns against companies it says are doing business with the country. The group is made up of former officials from the Bush and Obama administrations, as well as a host of academics, former diplomats and former intelligence officials from foreign countries, including Israel.
  • Last week, things got even weirder: in a motion filed on Wednesday, Restis’s lawyers suggested that UANI had leaked information to the Jerusalem Post that resulted in a piece accusing Restis of doing more illegal business in Iran. The Post later retracted the article, citing “new information” that indicated the purportedly illegal shipping had been “legitimate and permitted,” and scrubbed the article from its website. “Defendants appear to have provided The Jerusalem Post with false information purporting to show an American company’s legal and humanitarian cargo of soya beans to Iran aboard Plaintiffs’ vessel violated sanctions against Iran,” said a footnote in the filing from Restis’s lawyers. “Although it printed Defendants’ false allegations against Plaintiffs, The Jerusalem Post recognized the falsity of the allegations and issued a retraction and apology.”
  • If true, the alleged UANI leak of false information to the Jerusalem Post would contradict UANI’s lawyers’ assertion in an October hearing that “UANI has made no statements whatsoever about Victor Restis or his companies, about any subject, doing business with Iran or any subject since February of 2014.” The Jerusalem Post article also said that the information it revealed would be “raised… in an upcoming hearing in a US federal court.” UANI’s lawyers brought up the purported revelations the following day in the October 8 hearing. It has not been proven that UANI leaked information to the Post.
  • ...4 more annotations...
  • In a separate filing last Wednesday, lawyers from the American Civil Liberties Union, the Center for Constitutional Rights, the Electronic Frontier Foundation and other groups spelled out how unusual the Justice Department intervention was. The groups submitted a friend of the court briefing—itself an unusual move, since amicus briefs are usually filed when cases reach the appellate stage—agreeing with Restis’s team. “Never before has the government sought dismissal of a suit between private parties on state secrets grounds without providing the parties and the public any information about the government’s interest in the case,” the lawyers from the groups wrote. “It is hard to see why, unlike in every other state secrets case in history, meaningful public disclosure to the parties is not possible in this case.”
  • The October 7 Jerusalem Post article in question, headlined “Evidence obtained by JPost shows alleged ongoing violation of Iran sanctions” and written by legal correspondent Yonah Jeremy Bob, went through several iterations online before being retracted. (Bob did not respond to requests for comment.) The original version of the article purported to present evidence that Restis’s companies were continuing to violate Iran sanctions by pointing to information that a ship owned by Restis docked in Iran on September 27. (The article was amended without notice before being captured by a web archive on October 8.) Lowell, the lawyer for Restis, denied the charges to the Post at the time. “In September 2014, a major US-based food company made a legal shipment of soya beans from Argentina to Iran aboard the Helvetia One, a vessel owned by the Restis family,” Lowell told the paper. “The provision of food cargo to Iran is entirely legal and encouraged under the humanitarian carve-outs to international sanctions regimes.”
  • The original version of the article purported to present evidence that Restis’s companies were continuing to violate Iran sanctions by pointing to information that a ship owned by Restis docked in Iran on September 27. (The article was amended without notice before being captured by a web archive on October 8.) Lowell, the lawyer for Restis, denied the charges to the Post at the time. “In September 2014, a major US-based food company made a legal shipment of soya beans from Argentina to Iran aboard the Helvetia One, a vessel owned by the Restis family,” Lowell told the paper. “The provision of food cargo to Iran is entirely legal and encouraged under the humanitarian carve-outs to international sanctions regimes.”
  • On October 22, the Post came around to Lowell’s perspective, scrubbing the story and issuing a “clarification and correction” that expressed regret for publishing the story. The Post said its assertions of illegal business were “contradicted by new information provided to us and therefore no allegations of misconduct should be concluded from the above article.”
  •  
    The strange Restis case just keeps getting more strange.
Paul Merrell

A Distorted Lens Justifying An Illegitimate Ukrainian Government - 0 views

  • Support it or oppose it, a coup d’état took place in Kiev after an EU-brokered agreement was signed by the Ukrainian government and the mainstream opposition on Feb. 21. The agreement called for power sharing between both sides through the formation of a national unity government and for an end to the opposition-led street protests in Kiev. President Viktor Yanukovych ordered the Ukrainian police and security forces to withdraw from their positions, and even earlier, he had made multiple concessions to the opposition leadership. Instead of keeping its end of the bargain, the Ukrainian mainstream opposition executed a coup through the use of violence by organized ultra-nationalist gangs, which some analysts have compared to stay-behinds or secretive militias that were created by NATO during the Cold War. These armed ultra-nationalist groups took over administrative bodies in Ukraine and fought until they managed to oust the Ukrainian government and opened the path for opposition leaders to take power on Feb. 25. The Ukrainian mainstream opposition used the EU-brokered agreement, which the Brussels-based European Commission deliberately refused to enforce, as a means of justifying the formation of a coup-imposed government.
  • In the absence of almost half the Ukrainian Verkhovna Rada, or Ukrainian Parliament, the opposition parties began to arbitrarily pass unconstitutional laws. They also unconstitutionally selected Oleksandr/Aleksandr Valentynovych Turchynov as the acting president of Ukraine before President Viktor Yanukovych was even impeached. Intimidation and violence were additionally used to secure the cooperation of any disagreeing parliamentarians or state officials in Kiev. Saying that the ultra-nationalists and fascists are marginal elements, the mainstream media networks in North America and the European Union have simply dismissed the armed ultra-nationalist groups involved in the coup that are presently integrated into the putsch regime running Kiev. The militant ultra-nationalists, however, are very influential and amassing power under the illegal premiership of Arseniy Yatsenyuk.  Yatsenyuk, himself, is from Yulia Tymoshenko’s notoriously corrupt All-Ukrainian Union Fatherland Party (Batkivshchyna) and essentially a U.S. and EU appointee. There is even a pre-coup leaked telephone interception, likely either recorded by the intelligence services of Russia or Ukraine, in which U.S. Assistant Secretary of State Victory Nuland says that Yatsenyuk will be appointed as the prime minister of the Ukrainian government that the U.S. is putting together.
  • It is unlikely that Yatsenyuk and the loosely-knit alliance of the governing parties that ran Ukraine under the Yushchenko-Tymoshenko governments, foreign-based Ukrainians, and the forces behind the Orange Revolution that form the Orangist camp which he belongs to could have gotten back into power in Ukraine without pressure, the use of force and foreign backing. Yatsenyuk was even threatened and booed by the Ukrainians gathered at Independence Square when it was announced that he would be appointed as the prime minister of the post-coup government. A vast segment of the protesters made it clear that Tymoshenko, Yatsenyuk’s party leader, was no alternative to the ousted President Viktor Yanukovych in their eyes, either, when it was announced that she wanted to run for prime minister. The Orangists do not have the support of a majority of the population, nor did they form the parliamentary majority in the Verkhovna Rada. Their Orangist president, Viktor Yushchenko, only got 5 percent of the vote in January 2010, in a show of no-confidence, whereas Viktor Yanukovych won the first and second rounds of the presidential elections in 2010. According to Victoria Nuland, the U.S. has also poured $5 billion into “democracy promotion” inside Ukraine. This is U.S. State Department doublespeak for politicized funding that Washington has sent to Ukraine to organize the Orange Revolution and its Euromaidan sequel or what can frankly be described as regime change.
  • ...10 more annotations...
  • To rule Ukraine once more, the Orangists and their foreign backers have used and manipulated the ultra-nationalist elements of the population — some of which are openly anti-European Union — as their foot soldiers in an application of force against their democratically-elected opponents. Despite their views, the ultra-nationalists are actually more honest than the Orangist liberal figures like Arseniy Yatsenyuk. Unlike the misleading and utterly corrupt Orangist leaders, the ultra-nationalists do not hide their agendas and platforms.
  • The ultra-nationalists have inconsolably anti-Russian attitudes. Many of them also dislike a vast spectrum of other groups, including Jews, Armenians, Roma, Poles, Tatars, supporters of the Party of Regions and communists. In this context, it should come as no surprise that one of the first decisions that the post-coup regime in Kiev made was to remove the legal status of the Russian language as the regional language of half of Ukraine. Right Sector is, itself, a coalition of militant ultra-nationalists. These militants were instrumental in fighting government forces and taking over both government buildings in Kiev and regional governments in the western portion of Ukraine. Despite the protests of First Deputy Defense Minister Oleynik, Deputy Defense Minister Mozharovskiy and Defense Minister Babenk, Arseniy Yatsenyuk’s post-coup government has even given the ultra-nationalist opposition militias official status within the Ukrainian military and security forces. Yatsenyuk and the Orangists also dismissed all the officials that protested that the move would fracture the country and make the political divide in Ukraine irreversible.
  • Several members of Svoboda have been given key cabinet and government posts. One of the two junior deputy prime ministers, or assistant deputy prime ministers, is Oleksandr Sych. The ministry of agriculture and food has been given for management to Ihor Shvaika. The environment and natural resources ministry has been assigned to Andry/Andriy Mokhnyk. The defense minister is Ihor Tenyukh, a former admiral in the Ukrainian Navy who obstructed Russian naval movements in Sevastopol during the Russo-Georgian War over South Ossetia and who was later dismissed by the Ukrainian government for insubordination. Oleh Makhnitsky, another member of Svoboda, has been assigned as the new prosecutor-general of Ukraine by the coup government. Andry Parubiy, one of the founders of Svoboda, is now the post-coup secretary of the National Security and Defense Council of Ukraine (RNBO). He was the man controlling the so-called “Euromaidan security forces” that fought government forces in Kiev. His job as secretary is to represent the president and act on his behalf in coordinating and implementing the RNBO’s decisions. As a figure, Parubiy clearly illustrates how the mainstream opposition in Ukraine is integrated with the ultra-nationalists. Parubiy is an Orangist and was a leader in the Orange Revolution. He has changed parties several times. After founding Svoboda, he joined Viktor Yushchenko’s Our Ukraine before joining Yulia Tymoshenko’s Fatherland Party and being elected as one of the Fatherland Party’s deputies, or members of parliament.
  • While the mainstream media in North America and the EU look the other way about the ultra-nationalists in the coup government in Kiev, the facts speak for themselves. Both the EU and the U.S. governments have rubbed their elbows with the ultra-nationalists. Oleh Tyahnybok, the leader of Svoboda (formerly the Social Nationalist Party of Ukraine), was even part of the opposition triumvirate that all the U.S. and EU officials visiting Kiev met with while performing their political pilgrimages to Ukraine to encourage the protesters to continue with their demonstrations and riots demanding Euro-Atlantic integration. Svoboda has popularly been described as a neo-Nazi grouping. The World Jewish Congress has demanded that Svoboda be banned. The ultra-nationalist party was even condemned by the EU’s own European Parliament, which passed a motion on Dec. 13, 2012 categorically condemning Svoboda.
  • The ultra-nationalists are such an integral part of the mainstream opposition that the U.S.-supported Orangist president of Ukraine, Viktor Yushchenko, posthumously awarded the infamous Nazi collaborator Stepan Bandera the title and decoration of the “Hero of Ukraine” in 2010. Foreign audiences, however, would not know that if they relied on reportage from the likes of the U.S. state-run Radio Free Europe, which tried to protect Yushchenko because he wanted to reorient Ukraine toward the U.S. and EU. Parubiy also lobbied the European Parliament not to oppose Yushchenko’s decision. Other smaller ultra-nationalists parties were also given government posts, and several of the independent cabinet members are also aligned to these parties. Dmytro Yarosh from Right Sector (Pravyi Sektor) is the deputy secretary of the RNBO, and the Trizub Party was given the education ministry. Trizub had Sergey Kvit appointed to the post of education minister.
  • The role of the ultra-nationalists in executing the coup has been essentially ignored by the mainstream media in North America and the EU. The roots of the bloodshed in Kiev have been ignored, too. The shootings of protesters by snipers have simply been presented as the vile actions of the Ukrainian government, never taking into consideration the agitation of the armed ultra-nationalist gangs and the mainstream opposition leaders for a conflict. According to a leaked telephone conversation on Feb. 26 between Estonian Foreign Minister Urmas Paet and European Union Commissionaire Catherine Ashton, which was leaked by the Security Service of Ukraine (SBU) , the snipers who shot at protesters and police in Kiev were allegedly hired by Ukrainian opposition leaders. Estonian Foreign Minister Paet made the statements on the basis of details he was given by one of the head doctors of the medical team of the anti-government protests, Olga Bogomolets, an opponent of Viktor Yanukovych’s government who wanted it removed from power. Paet tells Ashton the following first: “There is now stronger and stronger understanding that behind the snipers, it was not Yanukovych, but it was somebody from the new coalition.” This is also corroborated by the fact that Yanukovych actually had ordered the Ukrainian riot police and security forces not to use lethal force.
  • The Estonian official then mentions that it was verified to him that the same snipers were killing people on both sides. He tells Ashton the following: “And second, what was quite disturbing, this same Olga [Bogomolets] told as well that all the evidence shows that the people who were killed by snipers from both sides, among policemen and then people from the streets, that they were the same snipers killing people from both sides.” Another important point that Paet makes to Ashton is the following: “[Dr. Olga Bogomolets] then also showed me some photos she said that as a medical doctor she can say that it is the same handwriting, the same type of bullets, and it’s really disturbing that now the new coalition, that they don’t want to investigate what exactly happened.” Past reports that the mainstream media were hostile to the ousted Ukrainian government also raise serious questions that corroborate what has been said about the snipers intentionally killing protesters to instigate regime change.
  • The Telegraph reported on Feb. 20 that “[a]t least three of the bodies displayed single bullet wounds to the heads,” and “were shot in the head, the neck or the heart. None were shot anywhere else like in the legs.” This means that the snipers were making kill shots by design, which seems like the last thing that the Ukrainian government would want to do when it was trying to appease the protesters and bring calm to Kiev. The Ukrainian journalist Alexey Yaroshevsky’s account of the sniper shootings is also worth noting, and it is backed up by footage taken by his Russian crew in Kiev.  Their footage shows armed opposition members running away from the scene of the shooting of anti-government protesters. What comes across as unusual is that the armed members of the opposition were constantly agitating to start firefights at every opportunity that they could get.
  • The commandant of the SSU, Major-General Oleksandr Yakimenko, has testified that his counter-intelligence forces were monitoring the CIA in Ukraine during the protests. According to the SSU, the CIA was active on the ground in Kiev and collaborating with a small circle of opposition figures. Yakimenko has also said that it was not the police or government forces that fired on the protesters, but snipers from the Philharmonic Building that was controlled by the opposition leader Andriy Parubiy, which he asserts was interacting with the CIA. Speaking to the Russian media, Yakimenko said that 20 men wearing “special combat clothes” and carrying “sniper rifle cases, as well as AKMs with scopes” ran out of the opposition-controlled Philharmonic Building and split into two groups of 10 people, with one taking position at the Ukraine Hotel. The anti-government protesters even saw this and asked Ukrainian police to pursue them, and even figures from Right Sector and Svoboda asked Yakimenko’s SSU to investigate and apprehend them, but Parubiy prevented it. Major-General Yakimenko has categorically stated that opposition leaders were behind the shootings. Following the release of the conversation between Paet and Ashton, the Estonian Foreign Ministry confirmed that the leak was authentic, whereas the European Commission kept silent. The mainstream media in North America and the EU either ignored it or said very little. The Telegraph even claimed that Dr. Bogomolets told it that she had not treated any government forces even though she contradicts this directly in an interview with CNN where says she treated military personnel.
  • CNN, on the other hand, quickly glossed over the story, giving it only enough attention to create the impression that the network is fairly covering the news. Opting not to give the story the airtime that it deserved, CNN instead posted it on its webpage. The conversation is immediately discredited, undermined and dismissed in the first sentence of the article, which is attributed to Foreign Minister Paet: “Don’t read too much into the conversation.” The article was deliberately structured by CNN to undermine the important information that would challenge the narrative that the U.S. mainstream media have been painting. The title, sub-titles and opening sentences of most texts act as microcosms or summaries of the articles, and in many cases, readers evaluate or decide to read the articles on the basis of what these texts communicate. Moreover, the first sentence of the article sets the tempo for readers and and influences their opinion, too. Although anyone who listens to the conversation between Paet and Ashton and considers the evidence that is being discussed would realize just how important the news was, the message being set forth by CNN was a dismissive one.
Paul Merrell

NSA chief says Snowden leaked up to 200,000 secret documents | Reuters - 0 views

  • (Reuters) - Former U.S. National Security Agency contractor Edward Snowden leaked as many as 200,000 classified U.S. documents to the media, according to little-noticed public remarks by the eavesdropping agency's chief late last month. In a question-and-answer session following a speech to a foreign affairs group in Baltimore on October 31, NSA Director General Keith Alexander was asked by a member of the audience what steps U.S. authorities were taking to stop Snowden from leaking additional information to journalists."I wish there was a way to prevent it. Snowden has shared somewhere between 50 (thousand) and 200,000 documents with reporters. These will continue to come out," Alexander said.
  • Alexander added that the documents were "being put out in a way that does the maximum damage to NSA and our nation," according to a transcript of his talk made available by NSA.U.S. officials briefed on investigations into Snowden's activities have said privately for months that internal government assessments indicate that the number of classified documents to which Snowden got access as a systems operator at NSA installations ran into the hundreds of thousands.Officials said that while investigators now believe they know the range of documents that Snowden accessed, they remain unsure which documents he downloaded for leaking to the media.
  •  
    50K to 200K documents, NSA thinks they know the range of documents Snowden accessed but not which ones. But that's information from Gen. Alexander, who is a congenital liar, caught in lie after lie. 
Paul Merrell

Use Tor or 'EXTREMIST' Tails Linux? Congrats, you're on the NSA's list * The Register - 0 views

  • Alleged leaked documents about the NSA's XKeyscore snooping software appear to show the paranoid agency is targeting Tor and Tails users, Linux Journal readers – and anyone else interested in online privacy.Apparently, this configuration file for XKeyscore is in the divulged data, which was obtained and studied by members of the Tor project and security specialists for German broadcasters NDR and WDR. <a href="http://pubads.g.doubleclick.net/gampad/jump?iu=/6978/reg_security/front&sz=300x250%7C300x600&tile=3&c=33U7ZK6qwQrMkAACSrTugAAAP1&t=ct%3Dns%26unitnum%3D3%26unitname%3Dwww_top_mpu%26pos%3Dtop%26test%3D0" target="_blank"> <img src="http://pubads.g.doubleclick.net/gampad/ad?iu=/6978/reg_security/front&sz=300x250%7C300x600&tile=3&c=33U7ZK6qwQrMkAACSrTugAAAP1&t=ct%3Dns%26unitnum%3D3%26unitname%3Dwww_top_mpu%26pos%3Dtop%26test%3D0" alt=""></a> In their analysis of the alleged top-secret documents, they claim the NSA is, among other things:Specifically targeting Tor directory servers Reading email contents for mentions of Tor bridges Logging IP addresses used to search for privacy-focused websites and software And possibly breaking international law in doing so. We already know from leaked Snowden documents that Western intelligence agents hate Tor for its anonymizing abilities. But what the aforementioned leaked source code, written in a rather strange custom language, shows is that not only is the NSA targeting the anonymizing network Tor specifically, it is also taking digital fingerprints of any netizens who are remotely interested in privacy.
  • These include readers of the Linux Journal site, anyone visiting the website for the Tor-powered Linux operating system Tails – described by the NSA as "a comsec mechanism advocated by extremists on extremist forums" – and anyone looking into combining Tails with the encryption tool Truecrypt.If something as innocuous as Linux Journal is on the NSA's hit list, it's a distinct possibility that El Reg is too, particularly in light of our recent exclusive report on GCHQ – which led to a Ministry of Defence advisor coming round our London office for a chat.
  • If you take even the slightest interest in online privacy or have Googled a Linux Journal article about a broken package, you are earmarked in an NSA database for further surveillance, according to these latest leaks.This is assuming the leaked file is genuine, of course.Other monitored sites, we're told, include HotSpotShield, FreeNet, Centurian, FreeProxies.org, MegaProxy, privacy.li and an anonymous email service called MixMinion. The IP address of computer users even looking at these sites is recorded and stored on the NSA's servers for further analysis, and it's up to the agency how long it keeps that data.The XKeyscore code, we're told, includes microplugins that target Tor servers in Germany, at MIT in the United States, in Sweden, in Austria, and in the Netherlands. In doing so it may not only fall foul of German law but also the US's Fourth Amendment.
  • ...2 more annotations...
  • The nine Tor directory servers receive especially close monitoring from the NSA's spying software, which states the "goal is to find potential Tor clients connecting to the Tor directory servers." Tor clients linking into the directory servers are also logged."This shows that Tor is working well enough that Tor has become a target for the intelligence services," said Sebastian Hahn, who runs one of the key Tor servers. "For me this means that I will definitely go ahead with the project.”
  • While the German reporting team has published part of the XKeyscore scripting code, it doesn't say where it comes from. NSA whistleblower Edward Snowden would be a logical pick, but security experts are not so sure."I do not believe that this came from the Snowden documents," said security guru Bruce Schneier. "I also don't believe the TAO catalog came from the Snowden documents. I think there's a second leaker out there."If so, the NSA is in for much more scrutiny than it ever expected.
Paul Merrell

HSBC files show how Swiss bank helped clients dodge taxes and hide millions | Business ... - 0 views

  • HSBC’s Swiss banking arm helped wealthy customers dodge taxes and conceal millions of dollars of assets, doling out bundles of untraceable cash and advising clients on how to circumvent domestic tax authorities, according to a huge cache of leaked secret bank account files. The files – obtained through an international collaboration of news outlets, including the Guardian, the French daily Le Monde, BBC Panorama and the Washington-based International Consortium of Investigative Journalists – reveal that HSBC’s Swiss private bank: • Routinely allowed clients to withdraw bricks of cash, often in foreign currencies of little use in Switzerland. • Aggressively marketed schemes likely to enable wealthy clients to avoid European taxes. • Colluded with some clients to conceal undeclared “black” accounts from their domestic tax authorities. • Provided accounts to international criminals, corrupt businessmen and other high-risk individuals.
  • The revelations will amplify calls for crackdowns on offshore tax havens and stoke political arguments in the US, Britain and elsewhere in Europe where exchequers are seen to be fighting a losing battle against fleet-footed and wealthy individuals in the globalised world. Approached by the Guardian, HSBC, the world’s second largest bank, has now admitted wrongdoing by its Swiss subsidiary. “We acknowledge and are accountable for past compliance and control failures,” the bank said in a statement. The Swiss arm, the statement said, had not been fully integrated into HSBC after its purchase in 1999, allowing “significantly lower” standards of compliance and due diligence to persist. That response raises serious questions about oversight of the Swiss operation by the then senior executives of its parent company, HSBC Group, headquartered in London. It has now acknowledged that it was not until 2011 that action was taken to bring the Swiss bank into line. “HSBC was run in a more federated way than it is today and decisions were frequently taken at a country level,” the bank said.
  • Although tax authorities around the world have had confidential access to the leaked files since 2010, the true nature of the Swiss bank’s misconduct has never been made public until now. Hollywood stars, shopkeepers, royalty and clothing merchants feature in the files along with the heirs to some of Europe’s biggest fortunes.
  • ...2 more annotations...
  • The files show how HSBC in Switzerland keenly marketed tax avoidance strategies to its wealthy clients. The bank proactively contacted clients in 2005 to suggest ways to avoid a new tax levied on the Swiss savings accounts of EU citizens, a measure brought in through a treaty between Switzerland and the EU to tackle secret offshore accounts. The documents also show HSBC’s Swiss subsidiary providing banking services to relatives of dictators, people implicated in African corruption scandals, arms industry figures and others. Swiss banking rules have since 1998 required high levels of diligence on the accounts of politically connected figures, but the documents suggest that at the time HSBC happily provided banking services to such controversial individuals. The Guardian’s evidence of a pattern of misconduct at HSBC in Switzerland is supported by the outcome of recent court cases in the US and Europe.
  • HSBC is already facing criminal investigations and charges in France, Belgium, the US and Argentina as a result of the leak of the files, but no legal action has been taken against it in Britain. Former tax inspector Richard Brooks tells BBC Panorama in a programme to be aired on Monday night: “I think they were a tax avoidance and tax evasion service. I think that’s what they were offering. “There are very few reasons to have an offshore bank account, apart from just saving tax. There are some people who can use an ... account to avoid tax legally. For others it’s just a way to keep money secret.”
Gary Edwards

Welcome to Post-Constitution America - Peter Van Buren - 0 views

  • On July 30, 1778, the Continental Congress created the first whistleblower protection law, stating “that it is the duty of all persons in the service of the United States to give the earliest information to Congress or other proper authority of any misconduct, frauds, or misdemeanors committed by any officers or persons in the service of these states.”
  • Two hundred thirty-five years later, on July 30, 2013, Bradley Manning was found guilty on 20 of the 22 charges for which he was prosecuted, specifically for “espionage” and for videos of war atrocities he released, but not for “aiding the enemy.”
  • Days after the verdict, with sentencing hearings in which Manning could receive 136 years of prison time ongoing, the pundits have had their say. The problem is that they missed the most chilling aspect of the Manning case: the way it ushered us, almost unnoticed, into post-Constitutional America.
  • ...22 more annotations...
  • As at Guantanamo, rules of evidence reaching back to early
  • During the months of the trial, the U.S. military refused to release official transcripts of the proceedings. Even a private courtroom sketch artist was barred from the room. Independent journalist and activist Alexa O’Brien then took it upon herself to attend the trial daily, defy the Army, and make an unofficial record of the proceedings by hand. Later in the trial, armed military police were stationed behind reporters listening to testimony. Above all, the feeling that Manning’s fate was predetermined could hardly be avoided. After all, President Obama, the former Constitutional law professor, essentially proclaimed him guilty back in 2011 and the Department of Defense didn’t hesitate to state more generally that “leaking is tantamount to aiding the enemies of the United States.”
  • And so to Bradley Manning. As the weaponry and technology of war came home, so did a new, increasingly Guantanamo-ized definition of justice. This is one thing the Manning case has made clear. As a start, Manning was treated no differently than America’s war-on-terror prisoners at Guantanamo and the black sites that the Bush administration set up around the world. Picked up on the “battlefield,” Manning was first kept incommunicado in a cage in Kuwait for two months with no access to a lawyer. Then, despite being an active duty member of the Army, he was handed over to the Marines, who also guard Guantanamo, to be held in a military prison in Quantico, Virginia. What followed were three years of cruel detainment, where, as might well have happened at Gitmo, Manning, kept in isolation, was deprived of clothing, communications, legal advice, and sleep. The sleep deprivation regime imposed on him certainly met any standard, other than Washington’s and possibly Pyongyang’s, for torture. In return for such abuse, even after a judge had formally ruled that he was subjected to excessively harsh treatment, Manning will only get a 112-day reduction in his eventual sentence. Eventually the Obama administration decided Manning was to be tried as a soldier before a military court. In the courtroom, itself inside a military facility that also houses NSA headquarters, there was a strikingly gulag-like atmosphere.  His trial was built around secret witnesses and secret evidence; severe restrictions were put on the press -- the Army denied press passes to 270 of the 350 media organizations that applied; and there was a clear appearance of injustice. Among other things, the judge ruled against nearly every defense motion.
  • English common law were turned upside down. In Manning’s case, he was convicted of espionage, even though the prosecution did not have to prove either his intent to help another government or that harm was caused; a civilian court had already paved the way for such a ruling in another whistleblower case. In addition, the government was allowed to label Manning a “traitor” and an “anarchist” in open court, though he was on trial for neither treason nor anarchy.
  • Given all this, it is small comfort to know that Manning, nailed on the Espionage Act after multiple failures in other cases by the Obama administration, was not convicted of the extreme charge of “aiding the enemy.”
  • Obama administration lawyers went on to claim the legal right to execute U.S. citizens without trial or due process and have admitted to killing four Americans. Attorney General Eric Holder declared that “United States citizenship alone does not make such individuals immune from being targeted.”
  • As if competing for an Orwellian prize, an unnamed Obama administration official told the Washington Post,
  • “What constitutes due process in this case is a due process in war.”
  • Similarly, full-spectrum spying is not considered to violate the Fourth Amendment and does not even require probable cause.
  • An Obama administration Insider Threat Program requires federal employees (including the Peace Corps) to report on the suspicious behavior of coworkers.
  • Government officials concerned over possible wrongdoing in their departments or agencies who “go through proper channels” are fired or prosecuted.
  • Government whistleblowers are commanded to return to face justice, while law-breakers in the service of the government are allowed to flee justice. CIA officers who destroy evidence of torture go free, while a CIA agent who blew the whistle on torture is locked up.
  • Thanks to the PATRIOT Act, citizens, even librarians, can be served by the FBI with a National Security Letter (not requiring a court order) demanding records and other information, and gagging them from revealing to anyone that such information has been demanded or such a letter delivered.
  • Citizens may be held without trial, and denied their Constitutional rights as soon as they are designated “terrorists.” Lawyers and habeas corpus are available only when the government allows.
  • The war on whistleblowers is metastasizing into a war on the First Amendment.
  • People may now be convicted based on secret testimony by unnamed persons.
  • Military courts and jails can replace civilian ones.
  • Justice can be twisted and tangled into an almost unrecognizable form and then used to send a young man to prison for decades.
  • Claiming its actions lawful while shielding the “legal” opinions cited, often even from Congress, the government can send its drones to assassinate its own citizens.
  • One by one, the tools and attitudes of the war on terror, of a world in which the “gloves” are eternally off, have come home.
  • The comic strip character Pogo’s classic warning -- “We have met the enemy and he is us” -- seems ever less like a metaphor.
  • According to the government, increasingly we are now indeed their enemy.
  •  
    Well written and researched article describing what it means to live in a post-Constitutional America.  Chilling facts with a cold but obvious conclusion.
Paul Merrell

Greenwald: Snowden's Files Are Out There if "Anything Happens" To Him - The Daily Beast - 0 views

  • Glenn Greenwald, the Guardian journalist who Snowden first contacted in February, told The Daily Beast on Tuesday that Snowden “has taken extreme precautions to make sure many different people around the world have these archives to insure the stories will inevitably be published.” Greenwald added that the people in possession of these files “cannot access them yet because they are highly encrypted and they do not have the passwords.” But, Greenwald said, “if anything happens at all to Edward Snowden, he told me he has arranged for them to get access to the full archives.” The fact that Snowden has made digital copies of the documents he accessed while working at the NSA poses a new challenge to the U.S. intelligence community that has scrambled in recent days to recover them and assess the full damage of the breach. Even if U.S. authorities catch up with Snowden and the four classified laptops the Guardian reported he brought with him to Hong Kong the secrets Snowden hopes to expose will still likely be published.
  • A former U.S. counterintelligence officer following the Snowden saga closely said his contacts inside the U.S. intelligence community “think Snowden has been planning this for years and has stashed files all over the Internet.” This source added, “At this point there is very little anyone can do about this.” The arrangement to entrust encrypted archives of his files with others also sheds light on a cryptic statement Snowden made on June 17 during a live chat with The Guardian. In the online session he said, “All I can say right now is the U.S. government is not going to be able to cover this up by jailing or murdering me. Truth is coming, and it cannot be stopped.”
  • However, Greenwald said that in his dealings with Snowden the 30-year-old systems administrator was adamant that he and his newspaper go through the document and only publish what served the public’s right to know. “Snowden himself was vehement from the start that we do engage in that journalistic process and we not gratuitously publish things,” Greenwald said. “I do know he was vehement about that. He was not trying to harm the U.S. government; he was trying to shine light on it.” Greenwald said Snowden for example did not wish to publicize information that gave the technical specifications or blueprints for how the NSA constructed its eavesdropping network. “He is worried that would enable other states to enhance their security systems and monitor their own citizens.” Greenwald also said Snowden did not wish to repeat the kinds of disclosures made famous a generation ago by former CIA spy, Philip Agee—who published information after defecting to Cuba that outed undercover CIA officers. “He was very insistent he does not want to publish documents to harm individuals or blow anyone’s undercover status,” Greenwald said. He added that Snowden told him, “Leaking CIA documents can actually harm people, whereas leaking NSA documents can harm systems.”
  • ...2 more annotations...
  • Greenwald said that he himself has thousands of documents from Snowden that he is continuing to examine. That figure is considerably higher than the 200 documents that Sen. Dianne Feinstein, the chairwoman of the Senate Select Committee, said over the weekend that she was told Snowden possessed. “I don’t know for sure whether [Snowden] has more documents than the ones he has given me,” Greenwald said. “I believe he does. He was clear he did not want to give to journalists things he did not think should be published.”
  • For now, Greenwald said he is taking extra precautions against the prospect that he is a target of U.S. surveillance. He said he began using encrypted email when he began communicating with Snowden in February after Snowden sent him a YouTube video walking him through the procedure to encrypt his email. “When I was in Hong Kong, I spoke to my partner in Rio via Skype and told him I would send an electronic encrypted copy of the documents,” Greenwald said. “I did not end up doing it. Two days later his laptop was stolen from our house and nothing else was taken. Nothing like that has happened before. I am not saying it’s connected to this, but obviously the possibility exists.” When asked if Greenwald believed his computer was being monitored by the U.S. government. “I would be shocked if the U.S. government were not trying to access the information on my computer. I carry my computers and data with me everywhere I go.”
Paul Merrell

The Assassination Complex - 0 views

  • The Intercept has obtained a cache of secret slides that provides a window into the inner workings of the U.S. military’s kill/capture operations at a key time in the evolution of the drone wars — between 2011 and 2013. The documents, which also outline the internal views of special operations forces on the shortcomings and flaws of the drone program, were provided by a source within the intelligence community who worked on the types of operations and programs described in the slides. The Intercept granted the source’s request for anonymity because the materials are classified and because the U.S. government has engaged in aggressive prosecution of whistleblowers. The stories in this series will refer to the source as “the source.” The source said he decided to provide these documents to The Intercept because he believes the public has a right to understand the process by which people are placed on kill lists and ultimately assassinated on orders from the highest echelons of the U.S. government. “This outrageous explosion of watchlisting — of monitoring people and racking and stacking them on lists, assigning them numbers, assigning them ‘baseball cards,’ assigning them death sentences without notice, on a worldwide battlefield — it was, from the very first instance, wrong,” the source said.
  • The articles in The Drone Papers were produced by a team of reporters and researchers from The Intercept that has spent months analyzing the documents. The series is intended to serve as a long-overdue public examination of the methods and outcomes of America’s assassination program. This campaign, carried out by two presidents through four presidential terms, has been shrouded in excessive secrecy. The public has a right to see these documents not only to engage in an informed debate about the future of U.S. wars, both overt and covert, but also to understand the circumstances under which the U.S. government arrogates to itself the right to sentence individuals to death without the established checks and balances of arrest, trial, and appeal.
  • How the president authorizes targets for assassination
  • ...6 more annotations...
  • Assassinations depend on unreliable intelligence and hurt intelligence gathering
  • Strikes often kill many more than the intended target
  • The military labels unknown people it kills as “enemies killed in action”
  • The number of people targeted for drone strikes and other finishing operations
  • How geography shapes the assassination campaign
  • Inconsistencies with White House statements about targeted killing
  •  
    Large group of articles based on documents leaked from very deep in the Deep State.
Paul Merrell

Spy Tech Company 'Hacking Team' Gets Hacked | Motherboard - 0 views

  • Sometimes even the cops get robbed. The controversial Italian surveillance company Hacking Team, which sells spyware to governments all around the world, including agencies in Ethiopia, Morocco, the United Arab Emirates, as well as the US Drug Enforcement Administration, appears to have been seriously hacked. Hackers have made 500 GB of client files, contracts, financial documents, and internal emails, some as recent as 2015, publicly available for download. Hacking Team’s spokesperson Eric Rabe did not immediately respond to Motherboard’s calls and email asking for verification that the hacked information is legitimate. Without confirmation from the company itself, it’s difficult to know what percentage of the files are real—however, based on the sheer size of the breach and the information in the files, the hack appears to be authentic. What’s more, the unknown hackers announced their feat through Hacking Team’s own Twitter account.
  • he hackers composed the tweets as if they were written by Hacking Team. “Since we have nothing to hide, we're publishing all our e-mails, files, and source code,” the hackers wrote in a tweet, which included the link to around 500 Gb of files. The hackers also started tweeting a few samples of internal emails from the company. One of the screenshots shows an email dated 2014 from Hacking Team’s founder and CEO David Vincenzetti to another employee. In the email, titled “Yet another Citizen Lab attack,” Vincenzetti links to a report from the online digital rights research center Citizen Lab, at the University of Toronto’s Munk School of Global Affairs, which has exposed numerous cases of abuse from Hacking Team’s clients. Hacking Team has never revealed a list of its clients, and has always and repeatedly denied selling to sketchy governments, arguing that it has an internal procedure to address human rights concerns about prospective customers.
  • It’s unclear exactly how much the hackers got their hands on, but judging from the size of the files, it’s certainly a large collection of internal files. A source who asked to speak anonymously due to the sensitivity of the issue, told me that based on the file names and folders in the leak, the hackers who hit Hacking Team "got everything." A few hours after the initial hack, a list of alleged Hacking Team customers was posted on Pastebin. The list includes past and current customers. Among the most notable, there are a few that were previously unknown, such as the FBI, Chile, Australia, Spain, and Iraq, among others.
  • ...1 more annotation...
  • The breach on Hacking Team comes almost a year after another surveillance tech company, the competing FinFisher, was hacked in a similar way, with a hacker leaking 40 Gb of internal files. FinFisher, like Hacking Team, sells surveillance software to law enforcement agencies across the world. Their software, once surreptitiously installed on a target’s cell phone or computer, can be used to monitor the target’s communications, such as phone calls, text messages, Skype calls, or emails. Operators can also turn on the target’s webcam and exfiltrate files from the infected device.
Paul Merrell

Spy Chief James Clapper Wins Rosemary Award - 0 views

  • Director of National Intelligence James Clapper has won the infamous Rosemary Award for worst open government performance in 2013, according to the citation published today by the National Security Archive at www.nsarchive.org. Despite heavy competition, Clapper's "No, sir" lie to Senator Ron Wyden's question: "Does the NSA collect any type of data at all on millions or hundreds of millions of Americans?" sealed his receipt of the dubious achievement award, which cites the vastly excessive secrecy of the entire U.S. surveillance establishment. The Rosemary Award citation leads with what Clapper later called the "least untruthful" answer possible to congressional questions about the secret bulk collection of Americans' phone call data. It further cites other Clapper claims later proved false, such as his 2012 statement that "we don't hold data on U.S. citizens." But the Award also recognizes Clapper's fellow secrecy fetishists and enablers, including:
  • Gen. Keith Alexander, director of the NSA, for multiple Rose Mary Woods-type stretches, such as (1) claiming that the secret bulk collection prevented 54 terrorist plots against the U.S. when the actual number, according to the congressionally-established Privacy and Civil Liberties Oversight Board (PCLOB) investigation (pp. 145-153), is zero; (2) his 2009 declaration to the wiretap court that multiple NSA violations of the court's orders arose from differences over "terminology," an explanation which the chief judge said "strains credulity;" and (3) public statements by the NSA about its programs that had to be taken down from its website for inaccuracies (see Documents 78, 85, 87 in The Snowden Affair), along with public statements by other top NSA officials now known to be untrue (see "Remarks of Rajesh De," NSA General Counsel, Document 53 in The Snowden Affair).
  • Robert Mueller, former FBI director, for suggesting (as have Gen. Alexander and many others) that the secret bulk collection program might have been able to prevent the 9/11 attacks, when the 9/11 Commission found explicitly the problem was not lack of data points, but failing to connect the many dots the intelligence community already had about the would-be hijackers living in San Diego. The National Security Division lawyers at the Justice Department, for misleading their own Solicitor General (Donald Verrilli) who then misled (inadvertently) the U.S. Supreme Court over whether Justice let defendants know that bulk collection had contributed to their prosecutions. The same National Security Division lawyers who swore under oath in the Electronic Frontier Foundation's Freedom of Information Act lawsuit for a key wiretap court opinion that the entire text of the opinion was appropriately classified Top Secret/Sensitive Compartmented Information (release of which would cause "exceptionally grave damage" to U.S. national security). Only after the Edward Snowden leaks and the embarrassed governmental declassification of the opinion did we find that one key part of the opinion's text simply reproduced the actual language of the 4th Amendment to the U.S. Constitution, and the only "grave damage" was to the government's false claims.
  • ...9 more annotations...
  • President Obama for his repeated misrepresentations about the bulk collection program (calling the wiretap court "transparent" and saying "all of Congress" knew "exactly how this program works") while in effect acknowledging the public value of the Edward Snowden leaks by ordering the long-overdue declassification of key documents about the NSA's activities, and investigations both by a special panel and by the Privacy and Civil Liberties Oversight Board. The PCLOB directly contradicted the President, pointing out that "when the only means through which legislators can try to understand a prior interpretation of the law is to read a short description of an operational program, prepared by executive branch officials, made available only at certain times and locations, which cannot be discussed with others except in classified briefings conducted by those same executive branch officials, legislators are denied a meaningful opportunity to gauge the legitimacy and implications of the legal interpretation in question. Under such circumstances, it is not a legitimate method of statutory construction to presume that these legislators, when reenacting the statute, intended to adopt a prior interpretation that they had no fair means of evaluating." (p. 101)
  • Even an author of the Patriot Act, Rep. Jim Sensenbrenner (R-WI), was broadsided by the revelation of the telephone metadata dragnet. After learning of the extent of spying on Americans that his Act unleashed, he wrote that the National Security Agency "ignored restrictions painstakingly crafted by lawmakers and assumed plenary authority never imagined by Congress" by cloaking its actions behind the "thick cloud of secrecy" that even our elected representatives could not breech. Clapper recently conceded to the Daily Beast, "I probably shouldn't say this, but I will. Had we been transparent about this [phone metadata collection] from the outset … we wouldn't have had the problem we had." The NSA's former deputy director, John "Chris" Inglis, said the same when NPR asked him if he thought the metadata dragnet should have been disclosed before Snowden. "In hindsight, yes. In hindsight, yes." Speaking about potential (relatively minimal) changes to the National Security Agency even the president acknowledged, "And all too often new authorities were instituted without adequate public debate," and "Given the unique power of the state, it is not enough for leaders to say: Trust us. We won't abuse the data we collect. For history has too many examples when that trust has been breached." (Exhibit A, of course, is the NSA "watchlist" in the 1960's and 1970's that targeted not only antiwar and civil rights activists, but also journalists and even members of Congress.)
  • The Archive established the not-so-coveted Rosemary Award in 2005, named after President Nixon's secretary, Rose Mary Woods, who testified she had erased 18-and-a-half minutes of a crucial Watergate tape — stretching, as she showed photographers, to answer the phone with her foot still on the transcription pedal. Bestowed annually to highlight the lowlights of government secrecy, the Rosemary Award has recognized a rogue's gallery of open government scofflaws, including the CIA, the Treasury Department, the Air Force, the FBI, the Federal Chief Information Officers' Council, and the career Rosemary leader — the Justice Department — for the last two years. Rosemary-winner James Clapper has offered several explanations for his untruthful disavowal of the National Security Agency's phone metadata dragnet. After his lie was exposed by the Edward Snowden revelations, Clapper first complained to NBC's Andrea Mitchell that the question about the NSA's surveillance of Americans was unfair, a — in his words — "When are you going to stop beating your wife kind of question." So, he responded "in what I thought was the most truthful, or least untruthful, manner by saying 'no.'"
  • After continuing criticism for his lie, Clapper wrote a letter to Chairman of the Senate Select Committee on Intelligence Dianne Feinstein, now explaining that he misunderstood Wyden's question and thought it was about the PRISM program (under Section 702 of the Foreign Intelligence Surveillance Act) rather than the telephone metadata collection program (under Section 215 of the Patriot Act). Clapper wrote that his staff "acknowledged the error" to Senator Wyden soon after — yet he chose to reject Wyden's offer to amend his answer. Former NSA senior counsel Joel Brenner blamed Congress for even asking the question, claiming that Wyden "sandbagged" Clapper by the "vicious tactic" of asking "Does the NSA collect any type of data at all on millions or hundreds of millions of Americans?" Meanwhile, Steve Aftergood of the Federation of American Scientists countered that "it is of course wrong for officials to make false statements, as DNI Clapper did," and that in fact the Senate Intelligence Committee "became complicit in public deception" for failing to rebut or correct Clapper's statement, which they knew to be untruthful. Clapper described his unclassified testimony as a game of "stump the chump." But when it came to oversight of the National Security Agency, it appears that senators and representatives were the chumps being stumped. According to Representative Justin Amash (R-Mich), the House Intelligence Committee "decided it wasn't worthwhile to share this information" about telephone metadata surveillance with other members of Congress. Classified briefings open to the whole House were a "farce," Amash contended, often consisting of information found in newspapers and public statutes.
  • The Emmy and George Polk Award-winning National Security Archive, based at the George Washington University, has carried out thirteen government-wide audits of FOIA performance, filed more than 50,000 Freedom of Information Act requests over the past 28 years, opened historic government secrets ranging from the CIA's "Family Jewels" to documents about the testing of stealth aircraft at Area 51, and won a series of historic lawsuits that saved hundreds of millions of White House e-mails from the Reagan through Obama presidencies, among many other achievements.
  • Director Clapper joins an undistinguished list of previous Rosemary Award winners: 2012 - the Justice Department (in a repeat performance, for failure to update FOIA regulations for compliance with the law, undermining congressional intent, and hyping its open government statistics) 2011- the Justice Department (for doing more than any other agency to eviscerate President Obama's Day One transparency pledge, through pit-bull whistleblower prosecutions, recycled secrecy arguments in court cases, retrograde FOIA regulations, and mixed FOIA responsiveness) 2010 - the Federal Chief Information Officers' Council (for "lifetime failure" to address the crisis in government e-mail preservation) 2009 - the FBI (for having a record-setting rate of "no records" responses to FOIA requests) 2008 - the Treasury Department (for shredding FOIA requests and delaying responses for decades) 2007 - the Air Force (for disappearing its FOIA requests and having "failed miserably" to meet its FOIA obligations, according to a federal court ruling) 2006 - the Central Intelligence Agency (for the biggest one-year drop-off in responsiveness to FOIA requests yet recorded).   ALSO-RANS The Rosemary Award competition in 2013 was fierce, with a host of government contenders threatening to surpass the Clapper "least untruthful" standard. These secrecy over-achievers included the following FOI delinquents:
  • Admiral William McRaven, head of the Special Operations Command for the raid that killed Osama Bin Laden, who purged his command's computers and file cabinets of all records on the raid, sent any remaining copies over to CIA where they would be effectively immune from the FOIA, and then masterminded a "no records" response to the Associated Press when the AP reporters filed FOIA requests for raid-related materials and photos. If not for a one-sentence mention in a leaked draft inspector general report — which the IG deleted for the final version — no one would have been the wiser about McRaven's shell game. Subsequently, a FOIA lawsuit by Judicial Watch uncovered the sole remaining e-mail from McRaven ordering the evidence destruction, in apparent violation of federal records laws, a felony for which the Admiral seems to have paid no price. Department of Defense classification reviewers who censored from a 1962 document on the Cuban Missile Crisis direct quotes from public statements by Soviet Premier Nikita Khrushchev. The quotes referred to the U.S. Jupiter missiles in Turkey that would ultimately (and secretly) be pulled out in exchange for Soviet withdrawal of its missiles in Cuba. The denials even occurred after an appeal by the National Security Archive, which provided as supporting material the text of the Khrushchev statements and multiple other officially declassified documents (and photographs!) describing the Jupiters in Turkey. Such absurd classification decisions call into question all of the standards used by the Pentagon and the National Declassification Center to review historical documents.
  • Admiral William McRaven memo from May 13, 2011, ordering the destruction of evidence relating to the Osama bin Laden raid. (From Judicial Watch)
  • The Department of Justice Office of Information Policy, which continues to misrepresent to Congress the government's FOIA performance, while enabling dramatic increases in the number of times government agencies invoke the purely discretionary "deliberative process" exemption. Five years after President Obama declared a "presumption of openness" for FOIA requests, Justice lawyers still cannot show a single case of FOIA litigation in which the purported new standards (including orders from their own boss, Attorney General Eric Holder) have caused the Department to change its position in favor of disclosure.
Paul Merrell

How the FBI Created a Terrorist - The Intercept - 0 views

  • Informant-led sting operations are central to the FBI’s counterterrorism program. Of 508 defendants prosecuted in federal terrorism-related cases in the decade after 9/11, 243 were involved with an FBI informant, while 158 were the targets of sting operations. Of those cases, an informant or FBI undercover operative led 49 defendants in their terrorism plots, similar to the way Osmakac was led in his. In these cases, the FBI says paid informants and undercover agents are foiling attacks before they occur. But the evidence suggests — and a recent Human Rights Watch report on the subject illustrates — that the FBI isn’t always nabbing would-be terrorists so much as setting up mentally ill or economically desperate people to commit crimes they could never have accomplished on their own.
  • At least in Osmakac’s case, FBI agents seem to agree with that criticism, though they never intended for that admission to become public. In the Osmakac sting, the undercover FBI agent went by the pseudonym “Amir Jones.” He’s the guy behind the camera in Osmakac’s martyrdom video. Amir, posing as a dealer who could provide weapons, wore a hidden recording device throughout the sting. The device picked up conversations, including, apparently, back at the FBI’s Tampa Field Office, a gated compound beneath the flight path of Tampa International Airport, among agents and employees who assumed their words were private and protected. These unintentional recordings offer an exclusive look inside an FBI counterterrorism sting, and suggest that, even in the eyes of the FBI agents involved, these sting targets aren’t always the threatening figures they are made out to be.
  • OW OSMAKAC CAME to the attention of law enforcement in the first place is still unclear. In a December 2012 Senate floor speech, Dianne Feinstein, chairwoman of the Senate Intelligence Committee, cited Osmakac’s case as one of nine that demonstrated the effectiveness of surveillance under the FISA Amendments Act. Senate legal counsel later walked back those comments, saying they were misconstrued. Osmakac is among terrorism defendants who were subjected to some sort of FISA surveillance, according to court records, but whether he was under individual surveillance or identified through bulk collection is unknown. Discovery material referenced in a defense motion included a surveillance log coversheet with the description, “CT-GLOBAL EXTREMIST INSPIRED.” If he first came onto the FBI’s radar as a result of eavesdropping, then it’s plausible that as part of the sting, the FBI manufactured another explanation for his targeting. This is a long-running, if controversial process known as “parallel construction,” which has also been used by the U.S. Drug Enforcement Administration when drug offenders are identified through bulk collection and then prosecuted for drug crimes. In court records, the FBI maintained that Osmakac came to agents’ attention through Dabus. The informant reached out to the FBI after meeting Osmakac, and soon offered him a job at Java Village.
  •  
    A judge denied the defense access to FBI transcripts of conversations among agents on grounds that they would provide no assistance to the defense beyond what was available to the defense by discovery. He also entered a protective order barring their disclosure. The defendant was found guilty and sentenced to 40 years in prison.  But the FBI transcripts were leaked to The Intercept, apparently by someone inside the Dept. of Justice or the judicial system, since the defense never was provided with them. The transcripts along with evidence from the case and gathered through interviews provide a chilling look into the methods the FBI uses to manufacture "terrorists" for prosecution and conviction (in this case victimizing a young Muslim American with a severe mental illness), obviously only for propaganda and to justify its counter-terrorism budget. This is an area that needs Congressional attention. The courts' protections from entrapment are far too lax, particularly when members of a particular religion are being targeted for political reasons and anti-Muslim hysteria is sweeping the land. The government should not be permitted to manufacture criminals.
Paul Merrell

HSBC tax evasion: Bank helped conceal $100 billion in Swiss accounts - Feb. 8, 2015 - 0 views

  • Global banking giant HSBC for years catered to a motley crew of weapons dealers, tax evaders, tin-pot dictators and celebrities, using its private Swiss arm to shield accounts worth more than $100 billion. Documents obtained and analyzed by the International Consortium of Investigative Journalists (ICIJ) reveal how HSBC (HSBC) used the secretive Swiss banking system to conceal the identities of accounts holders, and in many cases, help depositors avoid paying taxes.
  • ICIJ's findings are based on data turned over to French authorities by former HSBC employee Hervé Falciani in 2008. The files were later obtained by the newspaper Le Monde and shared among other media outlets. ICIJ said the leaked documents show that HSBC "repeatedly reassured clients that it would not disclose details of accounts to national authorities" and even "discussed with clients a range of measures that would ultimately allow clients to avoid paying taxes in their home countries." In a statement provided to ICIJ, HSBC said that its Swiss private bank has undergone a "radical transformation in recent years," including reforms that will make it more difficult for clients to evade taxes or launder money. "We acknowledge that the compliance culture and standards of due diligence in HSBC's Swiss private bank, as well as the industry in general, were significantly lower than they are today," the statement said.
1 - 20 of 57 Next › Last »
Showing 20 items per page