Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged legal-memos

Rss Feed Group items tagged

Paul Merrell

Hacked Emails Prove Coordination Between Clinton Campaign and Super PACs - 0 views

  • The fact that political candidates are closely coordinating with friendly Super PACs — making a mockery of a central tenet of the Supreme Court’s 2010 Citizens United decision — is one of the biggest open secrets in Washington. Super PACs are only allowed to accept unlimited contributions on the condition that the money is spent independently of specific campaigns. The Federal Election Commission hasn’t reacted for a variety of reasons, including a lack of hard evidence, vague rules, and a partisan divide among the commissioners so bitter they can’t even agree to investigate obvious crimes. But newly disclosed hacked campaign documents published by WikiLeaks and a hacker who calls himself Guccifer 2.0 reveal in stark terms how Hillary Clinton’s staffers made Super PACs an integral part of her presidential campaign.
  • The emails show consistent, repeated efforts by the Clinton campaign to collaborate with Super PACs on strategy, research, attacks on political adversaries and fundraising. The cache also reveal meetings between the campaign and Priorities USA Action, and that campaign officials have helped with the group’s fundraising. The files were apparently hacked from a variety of Clinton staffers and have been posted online in recent weeks by Wikileaks and Guccifer 2.0. Obama administration intelligence officials have alleged, without providing evidence, that the email hacks were conducted on behalf of the Russian government in an attempt to disrupt the U.S. elections.
  • Super PACs, known technically as “Independent Expenditure-Only Political Committees,” are a direct result of the Citizens United court decision. Justice Anthony Kennedy, the author of the decision, proclaimed that deregulating outside money would have no corrupting effect upon candidates because there would be strict firewalls between candidates and outside groups
  • ...3 more annotations...
  • Correct the Record has long argued it could work directly with the Clinton campaign. When the group launched, it said it would only produce and distribute communications online, and that its work would therefore be exempt from FEC coordination rules. The Super PAC was recently the subject of a complaint filed with the Federal Elections Commission by the Campaign Legal Center, which called on regulators to investigate whether Clinton’s campaign has illegally coordinated with the group. The Campaign Legal Center, a nonpartisan watchdog organization, has also alleged that officials working for Donald Trump have similarly blurred the line between the campaign and one of its largest Super PACs, Make America Number 1, by employing common vendors. The Campaign Legal Center argued that Correct the Record has likely made “coordinated expenditures” that could be considered in-kind contributions to the Clinton campaign — such as its spending on “opposition research, message development, surrogate training, reporter pitches, media booking, video production, ‘rapid response’ press outreach, and other ‘earned media.’” “These documents affirm what we’ve been saying all along about Correct the Record,” said Brendan Fischer, an associate counsel at the Campaign Legal Center. “They are basically operating as an arm of the Clinton campaign.”
  • While Correct the Record has argued it is exempt from FEC rules, Clinton herself has said she does not work with Priorities USA Action. That Super PAC has spent millions of dollars on independent expenditures, including six-figure media advertising buys, to boost Clinton’s candidacy. The group has raised over $133 million through individual donations as large as $6 million. As other media outlets have reported, Marc Elias, the Clinton campaign attorney, provided a memo with guidance on how the campaign could solicit funds for Priorities USA Action. The memo notes that campaign staffers would have to use certain language when trying to raise money for the Super PAC:
  • Elias’s law firm, Perkins Coie LLP, has provided legal services to the Clinton campaign, Correct the Record and Priorities USA Action, making it a central node in the campaign infrastructure.
Paul Merrell

What's Scarier: Terrorism, or Governments Blocking Websites in its Name? - The Intercept - 0 views

  • Forcibly taking down websites deemed to be supportive of terrorism, or criminalizing speech deemed to “advocate” terrorism, is a major trend in both Europe and the West generally. Last month in Brussels, the European Union’s counter-terrorism coordinator issued a memo proclaiming that “Europe is facing an unprecedented, diverse and serious terrorist threat,” and argued that increased state control over the Internet is crucial to combating it. The memo noted that “the EU and its Member States have developed several initiatives related to countering radicalisation and terrorism on the Internet,” yet argued that more must be done. It argued that the focus should be on “working with the main players in the Internet industry [a]s the best way to limit the circulation of terrorist material online.” It specifically hailed the tactics of the U.K. Counter-Terrorism Internet Referral Unit (CTIRU), which has succeeded in causing the removal of large amounts of material it deems “extremist”:
  • In addition to recommending the dissemination of “counter-narratives” by governments, the memo also urged EU member states to “examine the legal and technical possibilities to remove illegal content.” Exploiting terrorism fears to control speech has been a common practice in the West since 9/11, but it is becoming increasingly popular even in countries that have experienced exceedingly few attacks. A new extremist bill advocated by the right-wing Harper government in Canada (also supported by Liberal Party leader Justin Trudeau even as he recognizes its dangers) would create new crimes for “advocating terrorism”; specifically: “every person who, by communicating statements, knowingly advocates or promotes the commission of terrorism offences in general” would be a guilty and can be sent to prison for five years for each offense. In justifying the new proposal, the Canadian government admits that “under the current criminal law, it is [already] a crime to counsel or actively encourage others to commit a specific terrorism offence.” This new proposal is about criminalizing ideas and opinions. In the government’s words, it “prohibits the intentional advocacy or promotion of terrorism, knowing or reckless as to whether it would result in terrorism.”
  • If someone argues that continuous Western violence and interference in the Muslim world for decades justifies violence being returned to the West, or even advocates that governments arm various insurgents considered by some to be “terrorists,” such speech could easily be viewed as constituting a crime. To calm concerns, Canadian authorities point out that “the proposed new offence is similar to one recently enacted by Australia, that prohibits advocating a terrorist act or the commission of a terrorism offence-all while being reckless as to whether another person will engage in this kind of activity.” Indeed, Australia enacted a new law late last year that indisputably targets political speech and ideas, as well as criminalizing journalism considered threatening by the government. Punishing people for their speech deemed extremist or dangerous has been a vibrant practice in both the U.K. and U.S. for some time now, as I detailed (coincidentally) just a couple days before free speech marches broke out in the West after the Charlie Hebdo attacks. Those criminalization-of-speech attacks overwhelmingly target Muslims, and have resulted in the punishment of such classic free speech activities as posting anti-war commentary on Facebook, tweeting links to “extremist” videos, translating and posting “radicalizing” videos to the Internet, writing scholarly articles in defense of Palestinian groups and expressing harsh criticism of Israel, and even including a Hezbollah channel in a cable package.
  • ...2 more annotations...
  • Beyond the technical issues, trying to legislate ideas out of existence is a fool’s game: those sufficiently determined will always find ways to make themselves heard. Indeed, as U.S. pop star Barbra Streisand famously learned, attempts to suppress ideas usually result in the greatest publicity possible for their advocates and/or elevate them by turning fringe ideas into martyrs for free speech (I have zero doubt that all five of the targeted sites enjoyed among their highest traffic dates ever today as a result of the French targeting). But the comical futility of these efforts is exceeded by their profound dangers. Who wants governments to be able to unilaterally block websites? Isn’t the exercise of this website-blocking power what has long been cited as reasons we should regard the Bad Countries — such as China and Iran — as tyrannies (which also usually cite “counterterrorism” to justify their censorship efforts)?
  • s those and countless other examples prove, the concepts of “extremism” and “radicalizing” (like “terrorism” itself) are incredibly vague and elastic, and in the hands of those who wield power, almost always expand far beyond what you think it should mean (plotting to blow up innocent people) to mean: anyone who disseminates ideas that are threatening to the exercise of our power. That’s why powers justified in the name of combating “radicalism” or “extremism” are invariably — not often or usually, but invariably — applied to activists, dissidents, protesters and those who challenge prevailing orthodoxies and power centers. My arguments for distrusting governments to exercise powers of censorship are set forth here (in the context of a prior attempt by a different French minister to control the content of Twitter). In sum, far more damage has been inflicted historically by efforts to censor and criminalize political ideas than by the kind of “terrorism” these governments are invoking to justify these censorship powers. And whatever else may be true, few things are more inimical to, or threatening of, Internet freedom than allowing functionaries inside governments to unilaterally block websites from functioning on the ground that the ideas those sites advocate are objectionable or “dangerous.” That’s every bit as true when the censors are in Paris, London, and Ottawa, and Washington as when they are in Tehran, Moscow or Beijing.
Gary Edwards

Liberal Activists Worked With AGs to Target Conservatives - 0 views

  • violate “constitutionally protected rights of freedom of speech, freedom from unreasonable searches and seizures, and due process of law and constitute the common law tort of abuse of process.”
  • ExxonMobil also alleges that Walker’s delegation of his prosecutorial power to a private law firm “likely on a contingency-fee basis” violates basic “due process of law and fundamental fairness,” particularly because that same law firm has “pursued a bitterly contested and contentious litigation in an unrelated lawsuit against ExxonMobil … which could result in a substantial fee award if Cohen Milstein’s client were to prevail.”
  • That raises “substantial doubts about whether that firm should be permitted to serve as the ‘disinterested prosecutor’ whose impartiality is demanded by law and expected by the public.”
  • ...6 more annotations...
  • ExxonMobil asks the Texas court to declare that the “issuance and mailing of the subpoena” violates various provisions of the U.S. Constitution, federal law, and the Texas Constitution.
  • . According to The Washington Free Beacon, “a small coalition of prominent climate change activists and political operatives” met on Jan. 8 in a closed door meeting at the Rockefeller Family Fund in Manhattan. Their agenda: taking down oil giant ExxonMobil through a coordinated campaign of legal action, divestment efforts, and political pressure.”
  • A copy of the agenda from that meeting states that two of the common goals of these activists are to “establish in public’s mind [sic.] that Exxon is a corrupt institution that has pushed humanity (and all creation) toward climate chaos and grave harm” and to “delegitimize them as a political actor.” Part of the discussion of their grand strategy was how to include “industry associations, scientists and front groups” in their targeting. And at the top of their list for “legal actions & related campaigns” was state “AGs.”
  • That last goal was apparently put into action. According to Fox News, a series of emails obtained by the Energy & Environmental Legal Institute showed communications between some of these same anti-fossil fuel activists and the attorneys general that are part of this “Green” coalition against climate change dissenters.
  • Some of them secretly briefed state attorneys general before their March press conference on arguments they could present to justify “climate change litigation” and the “imperative of taking action now.” The attorneys general and their staff tried to hide this discussion and coordination with the activists by “using a ‘Common Interest Agreement’… [that] sought to protect as privileged the discussions about defending President Obama’s controversial global warming rules, and going after political opponents using the Racketeer Influenced and Corrupt Organizations Act.”
  • Some state attorneys general have criticized the dangerous and misguided efforts of their inquisitorial peers. As Louisiana Attorney General Jeff Landry correctly states, they are using “prosecutorial weapons to intimidate critics, silence free speech, or chill the robust exchange of ideas” about a public policy issue. And it is just as malevolent as the burning of books in the society depicted by Bradbury in “Fahrenheit 451.”
  •  
    "In Ray Bradbury's classic dystopian novel, "Fahrenheit 451," a future society criminalizes the possession of books and burns them in order to suppress any dissenting ideas, opinions, and views. Today, we have state attorneys general trying to implement their own version of "Fahrenheit 451" to criminalize dissent over a disputed, unproven scientific theory: man-induced climate change. Recently, the attorney general of the Virgin Islands, Claude Walker, unleashed a subpoena on the Competitive Enterprise Institute seeking 10 years' worth of research and communications about climate change. It turns out that same Grand Inquisitor, Claude Walker, has hit ExxonMobil with a similar subpoena that seeks all of that company's communications, conversations, and correspondence with 88 conservative and libertarian think tanks, foundations, and universities, and 54 individual researchers, scientists, and writers."
Paul Merrell

The White House Has Been Covering Up the Presidency's Role in Torture for Years - The I... - 0 views

  • On May 10, 2013, John Brennan presented CIA’s response to the Senate Intelligence Committee Torture Report to the President. Official White House Photo by Pete Souza. The fight between the CIA and the Senate Intelligence Committee over the Committee’s Torture Report – which Dan Froomkin covered here – has now zeroed in on the White House. Did the White House order the CIA to withdraw 920 documents from a server made available to Committee staffers, as Senator Dianne Feinstein says the agency claimed in 2010? Were those documents – perhaps thousands of them – pulled in deference to a White House claim of executive privilege, as Senator Mark Udall and then CIA General Counsel Stephen Preston suggested last fall? And is the White House continuing to withhold 9,000 pages of documents without invoking privilege, as McClatchy reported yesterday? We can be sure about one thing: The Obama White House has covered up the Bush presidency’s role in the torture program for years. Specifically, from 2009 to 2012, the administration went to extraordinary lengths to keep a single short phrase, describing President Bush’s authorization of the torture program, secret.
  • As Steven Aftergood, director of the Federation of American Scientists Project on Government Secrecy, noted  in 2009 – shortly after Hayden revealed that torture started as a covert operation – this means there should be a paper trail implicating President Bush in the torture program. “[T]here should be a Presidential ‘finding’ authorizing the program,” he said, “and [] such a finding should have been provided to Congressional overseers.” The National Security Act dictates that every covert operation must be supported by a written declaration finding that the action is necessary and important to the national security. The Congressional Intelligence committees – or at least the Chair and Ranking Member – should receive notice of the finding. But there is evidence that those Congressional overseers were never told that the finding the president signed on September 17, 2001 authorized torture. For example, a letter from then ranking member of the House Intelligence Committee, Jane Harman, to the CIA’s General Counsel following her first briefing on torture asked: “Have enhanced techniques been authorized and approved by the President?” The CIA’s response at the time was simply that “policy as well as legal matters have been addressed within the Executive Branch.”
  • Nevertheless, the finding does exist. The CIA even disclosed its existence in response to the ACLU FOIA, describing it as “a 14-page memorandum dated 17 September 2001 from President Bush to the Director of the CIA pertaining to the CIA’s authorization to detain terrorists.” In an order in the ACLU suit, Judge Alvin K. Hellerstein confirmed that the declaration was “intertwined with” the administration’s effort to keep the language in the Tenet document hidden. When the administration succeeded in keeping that short phrase secret, all effort to release the declaration also ended.
  • ...4 more annotations...
  • The White House’s fight to keep the short phrase describing Bush’s authorization of the torture program hidden speaks to its apparent ambivalence over the torture program. Even after President Obama released the DOJ memos authorizing torture – along with a damning CIA Inspector General Report and a wide range of documents revealing bureaucratic discussions within the CIA about torture – the White House still fought the release of the phrase that would have made it clear that the CIA conducted this torture at the order of the president. And it did so with a classified declaration from Jones that would have remained secret had Judge Hellerstein not insisted it be made public. As Aftergood noted, such White House intervention in a FOIA suit is rare. “The number of times that a national security advisor has filed a declaration in a FOIA lawsuit is vanishingly small,” he said. “It almost never happens.” But as ACLU Deputy Legal Director Jameel Jaffer noted of the finding, “It was the original authority for the CIA’s secret prisons and for the agency’s rendition and torture program, and apparently it was the authority for the targeted killing program as well.  It was the urtext.  It’s remarkable that after all this time it’s still secret.”
  • Enduring confusion about this particular finding surely exists because of its flexible nature. As Bob Woodward described in Bush at War, CIA Director Tenet asked President Bush to sign “a broad intelligence order permitting the CIA to conduct covert operations without having to come back for formal approval for each specific operation.” As Jane Mayer described in The Dark Side, such an order not only gave the CIA flexibility, it also protected the President. “To give the President deniability, and to keep him from getting his hands dirty, the finding called for the President to delegate blanket authority to Tenet to decide on a case-by-case basis whom to kill, whom to kidnap, whom to detain and interrogate, and how.” When George Tenet signed written guidelines for the CIA’s torture program in 2003, however, he appeared to have deliberately deprived the President of that deniability by including the source of CIA’s authorization – presumably naming the President – in a document interrogators would see. You can’t blame the CIA Director, after all; Tenet signed the Guidelines just as CIA’s Inspector General and DOJ started to review the legality of the torture tactics used against detainees like Abd al-Rahim al-Nashiri, who was threatened with a drill and a gun in violation of DOJ’s ban on mock executions.
  • President Obama’s willingness to go to such lengths to hide this short phrase may explain the White House’s curious treatment of potentially privileged documents with the Senate now – describing President Bush’s authorization of the torture program and its seemingly contradictory stance supporting publishing the Torture Report while thwarting its completion by withholding privileged documents. After all, the documents in question, like the reference to the presidential finding, may deprive the President of plausible deniability. Furthermore, those documents may undermine one of the conclusions of the Torture Report. According to Senator Ron Wyden, the Senate Torture Report found that “the CIA repeatedly provided inaccurate information about its interrogation program to the White House.” Perhaps the documents reportedly withheld by the White House undermine this conclusion, and instead show that the CIA operated with the full consent and knowledge of at least some people within the White House. Finally, the White House’s sensitivity about documents involved in the torture program may stem from the structure of the finding. As John Rizzo made clear, the finding authorizes not just torturing, but killing, senior al Qaeda figures. Bob Woodward even reported that that CIA would carry out that killing using Predator drones, a program CIA still conducts. And in fact, when the Second Circuit ultimately ruled to let the White House to keep the authorization phrase secret, it did so because the phrase also relates to “a highly classified, active intelligence activity” and “pertains to intelligence activities unrelated to the discontinued [torture] program.” Given what we know about the September 17, 2001 finding, that may well refer to President Obama’s still active drone program.
  • In any case, the White House’s seemingly contradictory statements about the Torture Report might best be understood by its past treatment of CIA documents. By releasing the DOJ memos and other materials, the White House provided what seemed to be unprecedented transparency about what the CIA had done. But all the while it was secretly hiding language describing what the White House has done.
  •  
    See also U.N. Convention Against Torture, which the U.S. is a party to. http://www.un.org/documents/ga/res/39/a39r046.htm
Paul Merrell

Paul starts new drone war | TheHill - 0 views

  • Sen. Rand Paul has warned Senate Majority Leader Harry Reid (D-Nev.) that he will place a hold on one of President Obama’s appellate court nominees because of his role in crafting the legal basis for Obama’s drone policy.Paul, the junior Republican senator from Kentucky, has informed Reid he will object to David Barron’s nomination to the 1st Circuit Court of Appeals, unless the Justice Department makes public the memos he authored justifying the killing of an American citizen in Yemen.ADVERTISEMENTThe American Civil Liberties Union supports Paul’s objection, giving some Democratic lawmakers extra incentive to support a delay to Barron’s nomination, which could come to the floor in the next two weeks.Barron, formerly a lawyer in the Justice Department’s Office of Legal Counsel, penned at least one secret legal memo approving the September 2011 drone strike that killed Anwar al-Awlaki, a radical Muslim cleric whom intelligence officials accused of planning terrorist attacks against the United States.
Paul Merrell

UN Report Finds Mass Surveillance Violates International Treaties and Privacy Rights - ... - 0 views

  • The United Nations’ top official for counter-terrorism and human rights (known as the “Special Rapporteur”) issued a formal report to the U.N. General Assembly today that condemns mass electronic surveillance as a clear violation of core privacy rights guaranteed by multiple treaties and conventions. “The hard truth is that the use of mass surveillance technology effectively does away with the right to privacy of communications on the Internet altogether,” the report concluded. Central to the Rapporteur’s findings is the distinction between “targeted surveillance” — which “depend[s] upon the existence of prior suspicion of the targeted individual or organization” — and “mass surveillance,” whereby “states with high levels of Internet penetration can [] gain access to the telephone and e-mail content of an effectively unlimited number of users and maintain an overview of Internet activity associated with particular websites.” In a system of “mass surveillance,” the report explained, “all of this is possible without any prior suspicion related to a specific individual or organization. The communications of literally every Internet user are potentially open for inspection by intelligence and law enforcement agencies in the States concerned.”
  • Mass surveillance thus “amounts to a systematic interference with the right to respect for the privacy of communications,” it declared. As a result, “it is incompatible with existing concepts of privacy for States to collect all communications or metadata all the time indiscriminately.” In concluding that mass surveillance impinges core privacy rights, the report was primarily focused on the International Covenant on Civil and Political Rights, a treaty enacted by the General Assembly in 1966, to which all of the members of the “Five Eyes” alliance are signatories. The U.S. ratified the treaty in 1992, albeit with various reservations that allowed for the continuation of the death penalty and which rendered its domestic law supreme. With the exception of the U.S.’s Persian Gulf allies (Saudi Arabia, UAE and Qatar), virtually every major country has signed the treaty. Article 17 of the Covenant guarantees the right of privacy, the defining protection of which, the report explained, is “that individuals have the right to share information and ideas with one another without interference by the State, secure in the knowledge that their communication will reach and be read by the intended recipients alone.”
  • The report’s key conclusion is that this core right is impinged by mass surveillance programs: “Bulk access technology is indiscriminately corrosive of online privacy and impinges on the very essence of the right guaranteed by article 17. In the absence of a formal derogation from States’ obligations under the Covenant, these programs pose a direct and ongoing challenge to an established norm of international law.” The report recognized that protecting citizens from terrorism attacks is a vital duty of every state, and that the right of privacy is not absolute, as it can be compromised when doing so is “necessary” to serve “compelling” purposes. It noted: “There may be a compelling counter-terrorism justification for the radical re-evaluation of Internet privacy rights that these practices necessitate. ” But the report was adamant that no such justifications have ever been demonstrated by any member state using mass surveillance: “The States engaging in mass surveillance have so far failed to provide a detailed and evidence-based public justification for its necessity, and almost no States have enacted explicit domestic legislation to authorize its use.”
  • ...5 more annotations...
  • Instead, explained the Rapporteur, states have relied on vague claims whose validity cannot be assessed because of the secrecy behind which these programs are hidden: “The arguments in favor of a complete abrogation of the right to privacy on the Internet have not been made publicly by the States concerned or subjected to informed scrutiny and debate.” About the ongoing secrecy surrounding the programs, the report explained that “states deploying this technology retain a monopoly of information about its impact,” which is “a form of conceptual censorship … that precludes informed debate.” A June report from the High Commissioner for Human Rights similarly noted “the disturbing lack of governmental transparency associated with surveillance policies, laws and practices, which hinders any effort to assess their coherence with international human rights law and to ensure accountability.” The rejection of the “terrorism” justification for mass surveillance as devoid of evidence echoes virtually every other formal investigation into these programs. A federal judge last December found that the U.S. Government was unable to “cite a single case in which analysis of the NSA’s bulk metadata collection actually stopped an imminent terrorist attack.” Later that month, President Obama’s own Review Group on Intelligence and Communications Technologies concluded that mass surveillance “was not essential to preventing attacks” and information used to detect plots “could readily have been obtained in a timely manner using conventional [court] orders.”
  • Three Democratic Senators on the Senate Intelligence Committee wrote in The New York Times that “the usefulness of the bulk collection program has been greatly exaggerated” and “we have yet to see any proof that it provides real, unique value in protecting national security.” A study by the centrist New America Foundation found that mass metadata collection “has had no discernible impact on preventing acts of terrorism” and, where plots were disrupted, “traditional law enforcement and investigative methods provided the tip or evidence to initiate the case.” It labeled the NSA’s claims to the contrary as “overblown and even misleading.” While worthless in counter-terrorism policies, the UN report warned that allowing mass surveillance to persist with no transparency creates “an ever present danger of ‘purpose creep,’ by which measures justified on counter-terrorism grounds are made available for use by public authorities for much less weighty public interest purposes.” Citing the UK as one example, the report warned that, already, “a wide range of public bodies have access to communications data, for a wide variety of purposes, often without judicial authorization or meaningful independent oversight.”
  • The report was most scathing in its rejection of a key argument often made by American defenders of the NSA: that mass surveillance is justified because Americans are given special protections (the requirement of a FISA court order for targeted surveillance) which non-Americans (95% of the world) do not enjoy. Not only does this scheme fail to render mass surveillance legal, but it itself constitutes a separate violation of international treaties (emphasis added): The Special Rapporteur concurs with the High Commissioner for Human Rights that where States penetrate infrastructure located outside their territorial jurisdiction, they remain bound by their obligations under the Covenant. Moreover, article 26 of the Covenant prohibits discrimination on grounds of, inter alia, nationality and citizenship. The Special Rapporteur thus considers that States are legally obliged to afford the same privacy protection for nationals and non-nationals and for those within and outside their jurisdiction. Asymmetrical privacy protection regimes are a clear violation of the requirements of the Covenant.
  • That principle — that the right of internet privacy belongs to all individuals, not just Americans — was invoked by NSA whistleblower Edward Snowden when he explained in a June, 2013 interview at The Guardian why he disclosed documents showing global surveillance rather than just the surveillance of Americans: “More fundamentally, the ‘US Persons’ protection in general is a distraction from the power and danger of this system. Suspicionless surveillance does not become okay simply because it’s only victimizing 95% of the world instead of 100%.” The U.N. Rapporteur was clear that these systematic privacy violations are the result of a union between governments and tech corporations: “States increasingly rely on the private sector to facilitate digital surveillance. This is not confined to the enactment of mandatory data retention legislation. Corporates [sic] have also been directly complicit in operationalizing bulk access technology through the design of communications infrastructure that facilitates mass surveillance. ”
  • The latest finding adds to the growing number of international formal rulings that the mass surveillance programs of the U.S. and its partners are illegal. In January, the European parliament’s civil liberties committee condemned such programs in “the strongest possible terms.” In April, the European Court of Justice ruled that European legislation on data retention contravened EU privacy rights. A top secret memo from the GCHQ, published last year by The Guardian, explicitly stated that one key reason for concealing these programs was fear of a “damaging public debate” and specifically “legal challenges against the current regime.” The report ended with a call for far greater transparency along with new protections for privacy in the digital age. Continuation of the status quo, it warned, imposes “a risk that systematic interference with the security of digital communications will continue to proliferate without any serious consideration being given to the implications of the wholesale abandonment of the right to online privacy.” The urgency of these reforms is underscored, explained the Rapporteur, by a conclusion of the United States Privacy and Civil Liberties Oversight Board that “permitting the government to routinely collect the calling records of the entire nation fundamentally shifts the balance of power between the state and its citizens.”
Paul Merrell

Data Pirates of the Caribbean: The NSA Is Recording Every Cell Phone Call in the Bahama... - 0 views

  • The National Security Agency is secretly intercepting, recording, and archiving the audio of virtually every cell phone conversation on the island nation of the Bahamas. According to documents provided by NSA whistleblower Edward Snowden, the surveillance is part of a top-secret system – code-named SOMALGET – that was implemented without the knowledge or consent of the Bahamian government. Instead, the agency appears to have used access legally obtained in cooperation with the U.S. Drug Enforcement Administration to open a backdoor to the country’s cellular telephone network, enabling it to covertly record and store the “full-take audio” of every mobile call made to, from and within the Bahamas – and to replay those calls for up to a month. SOMALGET is part of a broader NSA program called MYSTIC, which The Intercept has learned is being used to secretly monitor the telecommunications systems of the Bahamas and several other countries, including Mexico, the Philippines, and Kenya. But while MYSTIC scrapes mobile networks for so-called “metadata” – information that reveals the time, source, and destination of calls – SOMALGET is a cutting-edge tool that enables the NSA to vacuum up and store the actual content of every conversation in an entire country.
  • All told, the NSA is using MYSTIC to gather personal data on mobile calls placed in countries with a combined population of more than 250 million people. And according to classified documents, the agency is seeking funding to export the sweeping surveillance capability elsewhere. The program raises profound questions about the nature and extent of American surveillance abroad. The U.S. intelligence community routinely justifies its massive spying efforts by citing the threats to national security posed by global terrorism and unpredictable rival nations like Russia and Iran. But the NSA documents indicate that SOMALGET has been deployed in the Bahamas to locate “international narcotics traffickers and special-interest alien smugglers” – traditional law-enforcement concerns, but a far cry from derailing terror plots or intercepting weapons of mass destruction.
  • By targeting the Bahamas’ entire mobile network, the NSA is intentionally collecting and retaining intelligence on millions of people who have not been accused of any crime or terrorist activity. Nearly five million Americans visit the country each year, and many prominent U.S. citizens keep homes there, including Sen. Tom Harkin (D-Iowa), Bill Gates, and Oprah Winfrey.
  • ...12 more annotations...
  • The Intercept has confirmed that as of 2013, the NSA was actively using MYSTIC to gather cell-phone metadata in five countries, and was intercepting voice data in two of them. Documents show that the NSA has been generating intelligence reports from MYSTIC surveillance in the Bahamas, Mexico, Kenya, the Philippines, and one other country, which The Intercept is not naming in response to specific, credible concerns that doing so could lead to increased violence. The more expansive full-take recording capability has been deployed in both the Bahamas and the unnamed country. MYSTIC was established in 2009 by the NSA’s Special Source Operations division, which works with corporate partners to conduct surveillance. Documents in the Snowden archive describe it as a “program for embedded collection systems overtly installed on target networks, predominantly for the collection and processing of wireless/mobile communications networks.”
  • If an entire nation’s cell-phone calls were a menu of TV shows, MYSTIC would be a cable programming guide showing which channels offer which shows, and when. SOMALGET would be the DVR that automatically records every show on every channel and stores them for a month. MYSTIC provides the access; SOMALGET provides the massive amounts of storage needed to archive all those calls so that analysts can listen to them at will after the fact. According to one NSA document, SOMALGET is “deployed against entire networks” in the Bahamas and the second country, and processes “over 100 million call events per day.”
  • When U.S. drug agents need to tap a phone of a suspected drug kingpin in another country, they call up their counterparts and ask them set up an intercept. To facilitate those taps, many nations – including the Bahamas – have hired contractors who install and maintain so-called lawful intercept equipment on their telecommunications. With SOMALGET, it appears that the NSA has used the access those contractors developed to secretly mine the country’s entire phone system for “signals intelligence” –recording every mobile call in the country. “Host countries,” the document notes, “are not aware of NSA’s SIGINT collection.” “Lawful intercept systems engineer communications vulnerabilities into networks, forcing the carriers to weaken,” says Christopher Soghoian, the principal technologist for the American Civil Liberties Union. “Host governments really should be thinking twice before they accept one of these Trojan horses.”
  • The DEA has long been in a unique position to help the NSA gain backdoor access to foreign phone networks. “DEA has close relationships with foreign government counterparts and vetted foreign partners,” the manager of the NSA’s drug-war efforts reported in a 2004 memo. Indeed, with more than 80 international offices, the DEA is one of the most widely deployed U.S. agencies around the globe. But what many foreign governments fail to realize is that U.S. drug agents don’t confine themselves to simply fighting narcotics traffickers. “DEA is actually one of the biggest spy operations there is,” says Finn Selander, a former DEA special agent who works with the drug-reform advocacy group Law Enforcement Against Prohibition. “Our mandate is not just drugs. We collect intelligence.” What’s more, Selander adds, the NSA has aided the DEA for years on surveillance operations. “On our reports, there’s drug information and then there’s non-drug information,” he says. “So countries let us in because they don’t view us, really, as a spy organization.”
  • When U.S. drug agents wiretap a country’s phone networks, they must comply with the host country’s laws and work alongside their law enforcement counterparts. “The way DEA works with our allies – it could be Bahamas or Jamaica or anywhere – the host country has to invite us,” says Margolis. “We come in and provide the support, but they do the intercept themselves.” The Bahamas’ Listening Devices Act requires all wiretaps to be authorized in writing either by the minister of national security or the police commissioner in consultation with the attorney general. The individuals to be targeted must be named. Under the nation’s Data Protection Act, personal data may only be “collected by means which are both lawful and fair in the circumstances of the case.” The office of the Bahamian data protection commissioner, which administers the act, said in a statement that it “was not aware of the matter you raise.” Countries like the Bahamas don’t install lawful intercepts on their own. With the adoption of international standards, a thriving market has emerged for private firms that are contracted by foreign governments to install and maintain lawful intercept equipment. Currently valued at more than $128 million, the global market for private interception services is expected to skyrocket to more than $970 million within the next four years, according to a 2013 report from the research firm Markets and Markets.
  • The proliferation of private contractors has apparently provided the NSA with direct access to foreign phone networks. According to the documents, MYSTIC draws its data from “collection systems” that were overtly installed on the telecommunications systems of targeted countries, apparently by corporate “partners” cooperating with the NSA. One NSA document spells out that “the overt purpose” given for accessing foreign telecommunications systems is “for legitimate commercial service for the Telco’s themselves.” But the same document adds: “Our covert mission is the provision of SIGINT,” or signals intelligence.
  • According to the NSA documents, MYSTIC targets calls and other data transmitted on  Global System for Mobile Communications networks – the primary framework used for cell phone calls worldwide. In the Philippines, MYSTIC collects “GSM, Short Message Service (SMS) and Call Detail Records” via access provided by a “DSD asset in a Philippine provider site.” (The DSD refers to the Defence Signals Directorate, an arm of Australian intelligence. The Australian consulate in New York declined to comment.) The operation in Kenya is “sponsored” by the CIA, according to the documents, and collects “GSM metadata with the potential for content at a later date.” The Mexican operation is likewise sponsored by the CIA. The documents don’t say how or under what pretenses the agency is gathering call data in those countries. In the Bahamas, the documents say, the NSA intercepts GSM data that is transmitted over what is known as the “A link”–or “A interface”–a core component of many mobile networks. The A link transfers data between two crucial parts of GSM networks – the base station subsystem, where phones in the field communicate with cell towers, and the network subsystem, which routes calls and text messages to the appropriate destination. “It’s where all of the telephone traffic goes,” says the former engineer.
  • “I seriously don’t think that would be your run-of-the-mill legal interception equipment,” says the former engineer, who worked with hardware and software that typically maxed out at 1,000 intercepts. The NSA, by contrast, is recording and storing tens of millions of calls – “mass surveillance,” he observes, that goes far beyond the standard practices for lawful interception recognized around the world. The Bahamas Telecommunications Company did not respond to repeated phone calls and emails.
  • If the U.S. government wanted to make a case for surveillance in the Bahamas, it could point to the country’s status as a leading haven for tax cheats, corporate shell games, and a wide array of black-market traffickers. The State Department considers the Bahamas both a “major drug-transit country” and a “major money laundering country” (a designation it shares with more than 60 other nations, including the U.S.). According to the International Monetary Fund, as of 2011 the Bahamas was home to 271 banks and trust companies with active licenses. At the time, the Bahamian banks held $595 billion in U.S. assets. But the NSA documents don’t reflect a concerted focus on the money launderers and powerful financial institutions – including numerous Western banks – that underpin the black market for narcotics in the Bahamas. Instead, an internal NSA presentation from 2013 recounts with pride how analysts used SOMALGET to locate an individual who “arranged Mexico-to-United States marijuana shipments” through the U.S. Postal Service.
  • The presentation doesn’t say whether the NSA shared the information with the DEA. But the drug agency’s Special Operations Divison has come under fire for improperly using classified information obtained by the NSA to launch criminal investigations – and then creating false narratives to mislead courts about how the investigations began. The tactic – known as parallel construction – was first reported by Reuters last year, and is now under investigation by the Justice Department’s inspector general. So: Beyond a desire to bust island pot dealers, why would the NSA choose to apply a powerful collection tool such as SOMALGET against the Bahamas, which poses virtually no threat to the United States? The answer may lie in a document that characterizes the Bahamas operation as a “test bed for system deployments, capabilities, and improvements” to SOMALGET. The country’s small population – fewer than 400,000 residents – provides a manageable sample to try out the surveillance system’s features. Since SOMALGET is also operational in one other country, the Bahamas may be used as a sort of guinea pig to beta-test improvements and alterations without impacting the system’s operations elsewhere. “From an engineering point of view it makes perfect sense,” says the former engineer. “Absolutely.”
  • SOMALGET operates under Executive Order 12333, a Reagan-era rule establishing wide latitude for the NSA and other intelligence agencies to spy on other countries, as long as the attorney general is convinced the efforts are aimed at gathering foreign intelligence. In 2000, the NSA assured Congress that all electronic surveillance performed under 12333 “must be conducted in a manner that minimizes the acquisition, retention, and dissemination of information about unconsenting U.S. persons.” In reality, many legal experts point out, the lack of judicial oversight or criminal penalties for violating the order render the guidelines meaningless. “I think it would be open, whether it was legal or not,” says German, the former FBI agent. “Because we don’t have all the facts about how they’re doing it. For a long time, the NSA has been interpreting their authority in the broadest possible way, even beyond what an objective observer would say was reasonable.” “An American citizen has Fourth Amendment rights wherever they are,” adds Kurt Opsahl, an attorney with the Electronic Frontier Foundation. “Nevertheless, there have certainly been a number of things published over the last year which suggest that there are broad, sweeping programs that the NSA and other government agencies are doing abroad that sweep up the communications of Americans.”
  • Legal or not, the NSA’s covert surveillance of an entire nation suggests that it will take more than the president’s tepid “limits” to rein in the ambitions of the intelligence community. “It’s almost like they have this mentality – if we can, we will,” says German. “There’s no analysis of the long-term risks of doing it, no analysis of whether it’s actually worth the effort, no analysis of whether we couldn’t take those resources and actually put them on real threats and do more good.” It’s not surprising, German adds, that the government’s covert program in the Bahamas didn’t remain covert. “The undermining of international law and international cooperation is such a long-term negative result of these programs that they had to know would eventually be exposed, whether through a leak, whether through a spy, whether through an accident,” he says. “Nothing stays secret forever. It really shows the arrogance of these agencies – they were just going to do what they were going to do, and they weren’t really going to consider any other important aspects of how our long-term security needs to be addressed.”
  •  
    Words fail me.
Paul Merrell

US wants to withhold information on justification for using drones to kill Americans ov... - 0 views

  • The U.S. government, citing possible "exceptionally grave harm to national security," told a federal appeals court it wants to give the public less information about its legal justification for using drones to kill Americans suspected of terrorism overseas. The Justice Department, Department of Defense and Central Intelligence Agency made the request in papers submitted late Thursday to the 2nd U.S. Circuit Court of Appeals in Manhattan. The document outlining the justification was sought through a Freedom of Information request by The New York Times and the American Civil Liberties Union. In April, a three-judge panel of the court ordered the memo released.
  • Lawyers for the government said they were not appealing the order but instead were demanding additional redactions to protect national security and to prevent damage to the government's ability to engage in confidential deliberations and to seek confidential legal advice. It asked that the full 2nd Circuit consider the request if the three-judge panel turned it down. It also suggested that the request be sent to the lower court for further review of specific changes the government was requesting. Lawyers for the Times and ACLU said Friday that the government's continued delays regarding the document are cheating the public of a fully informed and fair debate over the highly classified "targeted-killing" program.
  • David E. McCraw, vice president and assistant general counsel of The New York Times Co., said in an email: "The government raised all these points before and lost. After two and a half years of litigation, it's time for the delays to stop so the American people can fully participate in the debate on this important issue."
Paul Merrell

Watchdog Group Sues Trump Administration, Seeking Legal Rationale Behind Syria Strike -... - 0 views

  • A month after President Trump ordered a military strike on the Syrian regime as punishment for using chemical weapons, his administration has yet to offer a rationale for what lawful authority he had to carry out the attack.Now, a government watchdog group run by former Obama administration lawyers is suing to force the Trump administration to disclose its legal theory — or concede that it launched the April 6 attack without thinking about the law. While the attack attracted bipartisan support as a political and policy matter, its legal basis was disputed.The United States had no self-defense rationale, and neither Congress nor the United Nations Security Council authorized the attack, raising questions about the scope and limits of Mr. Trump’s power as a matter of domestic law and the United States’ power as a matter of international law. The Trump administration has not answered them.On Monday, the watchdog group, Protect Democracy, filed a lawsuit under the Freedom of Information Act for all emails, memos and other records discussing Mr. Trump’s legal authority to launch the strike.
Paul Merrell

White House defends 'Cuban Twitter' to stir unrest - Yahoo News - 0 views

  • The Obama administration defended its creation of a Twitter-like Cuban communications network to undermine the communist government, declaring the secret program was "invested and debated" by Congress and wasn't a covert operation that required White House approval.
  • But two senior Democrats on congressional intelligence and judiciary committees said Thursday they had known nothing about the effort, which one of them described as "dumb, dumb, dumb." A showdown with that senator's panel is expected next week, and the Republican chairman of a House oversight subcommittee said that it, too, would look into the program.An Associated Press investigation found that the network was built with secret shell companies and financed through a foreign bank. The project, which lasted more than two years and drew tens of thousands of subscribers, sought to evade Cuba's stranglehold on the Internet with a primitive social media platform.First, the network was to build a Cuban audience, mostly young people. Then, the plan was to push them toward dissent.
  • Yet its users were neither aware it was created by a U.S. agency with ties to the State Department, nor that American contractors were gathering personal data about them, in the hope that the information might be used someday for political purposes.It is unclear whether the scheme was legal under U.S. law, which requires written authorization of covert action by the president as well as congressional notification. White House spokesman Jay Carney said he was not aware of individuals in the White House who had known about the program.
  • ...9 more annotations...
  • USAID's top official, Rajiv Shah, is scheduled to testify on Tuesday before the Senate Appropriations State Department and Foreign Operations Subcommittee, on the agency's budget. The subcommittee's chairman, Patrick Leahy, a Democrat, is the senator who called the project "dumb, dumb, dumb" during an appearance Thursday on MSNBC.The administration said early Thursday that it had disclosed the initiative to Congress — Carney said the program had been "debated in Congress" — but hours later the narrative had shifted to say that the administration had offered to discuss funding for it with the congressional committees that approve federal programs and budgets."We also offered to brief our appropriators and our authorizers," said State Department spokeswoman Marie Harf. She added that she was hearing on Capitol Hill that many people support these kinds of democracy promotion programs. And some lawmakers did speak up on that subject. But by late Thursday no members of Congress had acknowledged being aware of the Cuban Twitter program earlier than this week.
  • Harf described the program as "discreet" but said it was in no way classified or covert. Harf also said the project, dubbed ZunZuneo, did not rise to a level that required the secretary of state to be notified. Neither former Secretary of State Hillary Rodham Clinton nor John Kerry, the current occupant of the office, was aware of ZunZuneo, she said.In his prior position as chairman of the Senate Foreign Relations Committee, Kerry had asked congressional investigators to examine whether or not U.S. democracy promotion programs in Cuba were operated according to U.S. laws, among other issues. The resulting report, released by the Government Accountability Office in January 2013, does not examine whether or not the programs were covert. It does not say that any U.S. laws were broken.The GAO report does not specifically refer to ZunZuneo, but does note that USAID programs included "support for the development of independent social networking platforms."
  • "I know they said we were notified," Leahy told AP. "We were notified in the most oblique way, that nobody could understand it. I'm going to ask two basic questions: Why weren't we specifically told about this if you're asking us for money? And secondly, whose bright idea was this anyway?"The Republican chairman of a House oversight subcommittee said his panel will be looking into the project, too."That is not what USAID should be doing," said Rep. Jason Chaffetz, the Republican chairman of the House Oversight and Government Reform National Security Subcommittee. "USAID is flying the American flag and should be recognized around the globe as an honest broker of doing good. If they start participating in covert, subversive activities, the credibility of the United States is diminished."
  • At minimum, details uncovered by the AP appear to muddy the USAID's longstanding claims that it does not conduct covert actions, and the details could undermine the agency's mission to deliver aid to the world's poor and vulnerable — an effort that requires the trust and cooperation of foreign governments.Leahy and Rep. C.A. Dutch Ruppersberger, the top Democrat on the House Intelligence Committee, said they were unaware of ZunZuneo.
  • USAID and its contractors went to extensive lengths to conceal Washington's ties to the project, according to interviews and documents obtained by the AP. They set up front companies in Spain and the Cayman Islands to hide the money trail, and recruited CEOs without telling them they would be working on a U.S. taxpayer-funded project."There will be absolutely no mention of United States government involvement," according to a 2010 memo from Mobile Accord Inc., one of the project's creators. "This is absolutely crucial for the long-term success of the service and to ensure the success of the Mission."ZunZuneo was publicly launched shortly after the 2009 arrest in Cuba of American contractor Alan Gross. He was imprisoned after traveling repeatedly to the country on a separate, clandestine USAID mission to expand Internet access using sensitive technology that only governments use.The AP obtained more than 1,000 pages of documents about the ZunZuneo project's development. It independently verified the project's scope and details in the documents through publicly available databases, government sources and interviews with those involved.
  • The social media project began after Washington-based Creative Associates International obtained a half-million Cuban cellphone numbers. It was unclear to the AP how the numbers were obtained, although documents indicate they were done so illicitly from a key source inside the country's state-run provider. Project organizers used those numbers to start a subscriber base.ZunZuneo's organizers wanted the social network to grow slowly to avoid detection by the Cuban government. Eventually, documents and interviews reveal, they hoped the network would reach critical mass so that dissidents could organize "smart mobs" — mass gatherings called at a moment's notice — that could trigger political demonstrations, or "renegotiate the balance of power between the state and society."At a 2011 speech at George Washington University, Clinton said the U.S. helps people in "oppressive Internet environments get around filters." Noting Tunisia's role in the Arab Spring, she said people used technology to help "fuel a movement that led to revolutionary change."Suzanne Hall, then a State Department official working on Clinton's social media efforts, helped spearhead an attempt to get Twitter founder Jack Dorsey to take over the ZunZuneo project, documents indicate. Dorsey declined to comment.
  • The estimated $1.6 million spent on ZunZuneo was publicly earmarked for an unspecified project in Pakistan, public government data show, but those documents don't reveal where the funds were actually spent.ZunZuneo's organizers worked hard to create a network that looked like a legitimate business, including the creation of a companion website — and marketing campaign — so users could subscribe and send their own text messages to groups of their choice."Mock ad banners will give it the appearance of a commercial enterprise," one written proposal obtained by the AP said. Behind the scenes, ZunZuneo's computers were also storing and analyzing subscribers' messages and other demographic information, including gender, age, "receptiveness" and "political tendencies." USAID believed the demographics on dissent could help it target its other Cuba programs and "maximize our possibilities to extend our reach."
  • Executives set up a corporation in Spain and an operating company in the Cayman Islands — a well-known British offshore tax haven — to pay the company's bills so the "money trail will not trace back to America," a strategy memo said. Disclosure of that connection would have been a catastrophic blow, they concluded, because it would undermine the service's credibility with subscribers and get it shut down by the Cuban government.Similarly, subscribers' messages were funneled through two other countries — and never through American-based computer servers.Denver-based Mobile Accord considered at least a dozen candidates to head the European front company. One candidate, Francoise de Valera, told the AP she was told nothing about Cuba or U.S. involvement.
  • James Eberhard, Mobile Accord's CEO and a key player in the project's development, declined to comment. Creative Associates referred questions to USAID.For more than two years, ZunZuneo grew, reaching at least 40,000 subscribers. But documents reveal the team found evidence Cuban officials tried to trace the text messages and break into the ZunZuneo system. USAID told the AP that ZunZuneo stopped in September 2012 when a government grant ended.
  •  
    More coming related to this story.
Paul Merrell

The Only Thing We Have to Fear Is -- The CIA | War Is A Crime .org - 0 views

  • Fifty years ago, exactly one month after John Kennedy was killed, the Washington Post published an op-ed titled “Limit CIA Role to Intelligence.” The first sentence of that op-ed on Dec. 22, 1963, read, “I think it has become necessary to take another look at the purpose and operations of our Central Intelligence Agency.” It sounded like the intro to a bleat from some liberal professor or journalist. Not so. The writer was former President Harry S. Truman, who spearheaded the establishment of the CIA 66 years ago, right after World War II, to better coordinate U.S. intelligence gathering. But the spy agency had lurched off in what Truman thought were troubling directions.
  • Is this why the President feels he cannot fire his clumsily devious Director of National Intelligence James Clapper, who had to apologize to Congress for giving “clearly erroneous” testimony in March? Is this why he allows National Security Agency Director Keith Alexander and counterparts in the FBI to continue to mislead the American people, even though the intermittent snow showers from Snowden show our senior national security officials to have lied — and to have been out of control? This may be small solace to President Obama, but there is no sign that the NSA documents that Snowden’s has released include the Senate Intelligence Committee’s 6,300-page report on CIA torture. Rather, that report, at least, seems sure to be under Obama’s and Senate Intelligence Committee chair Dianne Feinstein’s tight control.
  • But Kennedy stuck to his guns, so to speak. He fired Dulles and his co-conspirators a few months after the abortive invasion, and told a friend that he wanted to “splinter the CIA into a thousand pieces and scatter it into the winds.” The outrage was very obviously mutual.
  • ...11 more annotations...
  • Truman concluded the op-ed with an admonition that was as clear as the syntax was clumsy: “I would like to see the CIA restored to its original assignment as the intelligence arm of the President, and that whatever else it can properly perform in that special field – and that its operational duties be terminated or properly used elsewhere.” The importance and prescient nature of that admonition are even clearer today, a half-century later.
  • After Kennedy was murdered in Dallas, the patrician, well-connected Dulles got himself appointed to the Warren Commission and took the lead in shaping the investigation of JFK’s assassination. Documents in the Truman Library show that Dulles also mounted a small domestic covert action of his own to neutralize any future airing of Truman’s and Souers’s warnings about covert action.
  • As the de facto head of the Warren Commission, Dulles was perfectly positioned to protect himself and his associates, were any commissioners or investigators — or journalists — tempted to question whether Dulles and the CIA played a role in killing Kennedy. And so, the question: Did Allen Dulles and other “cloak-and-dagger” CIA operatives have a hand in John Kennedy’s assassination and in then covering it up? In my view, the best dissection of the evidence pertaining to the murder appeared in James Douglass’s 2008 book, JFK and the Unspeakable. After updating and arraying the abundant evidence, and conducting still more interviews, Douglass concludes that the answer is Yes.
  • The mainstream media had an allergic reaction to Douglass’s book and gave it almost no reviews. It is, nevertheless, still selling well. And, more important, it seems a safe bet that President Barack Obama knows what it says and maybe has even read it. This may go some way toward explaining why Obama has been so deferential to the CIA, NSA, FBI and the Pentagon. Could this be at least part of the reason he felt he had to leave the Cheney/Bush-anointed torturers, kidnappers and black-prison wardens in place, instructing his first CIA chief Leon Panetta to become, in effect, the agency’s lawyer rather than leader.
  • Sadly, those concerns that Truman expressed in that op-ed — that he had inadvertently helped create a Frankenstein monster — are as valid today as they were 50 years ago, if not more so.
  • But the timorous President has a big problem. He is acutely aware that, if released, the Senate committee report would create a firestorm – almost certainly implicating Obama’s CIA Director John Brennan and many other heavy-hitters of whom he appears to be afraid. And so Obama has allowed Brennan to play bureaucratic games, delaying release of the report for more than a year, even though its conclusions are said to closely resemble earlier findings of the CIA’s own Inspector General and the Constitution Project (see below).
  • Hat tip to the New Yorker’s Jane Mayer, who took the trouble to read the play-by-play of testimony to the Senate Intelligence Committee by former CIA General Counsel (2009-2013) Stephen W. Preston, nominated (and now confirmed) to be general counsel at the Department of Defense. Under questioning by Sen. Mark Udall, D-Colorado, Preston admitted outright that, contrary to the CIA’s insistence that it did not actively impede congressional oversight of its detention and interrogation program, “briefings to the committee included inaccurate information related to aspects of the program of express interest to Members.”
  • That “inaccurate information” apparently is thoroughly documented in the Senate Intelligence Committee report which, largely because of the CIA’s imaginative foot-dragging, cost taxpayers $40 million. Udall has revealed that the report (which includes 35,000 footnotes) contains a very long section titled “C.I.A. Representations on the C.I.A. Interrogation Program and the Effectiveness of the C.I.A.’s Enhanced Interrogation Techniques to Congress.” Preston also acknowledged that the CIA inadequately informed the Justice Department on interrogation and detention. He said, “CIA’s efforts fell well short of our current practices when it comes to providing information relevant to [the Office of Legal Counsel]’s legal analysis.”
  • As Katherine Hawkins, the senior investigator for last April’s bipartisan, independent report by the Constitution Project’s Task Force on Detainee Treatment, noted in an Oct. 18, 2013 posting, the memos from acting OLC chief, Steven Bradbury, relied very heavily on now-discredited CIA claims that “enhanced interrogation” saved lives, and that the sessions were carefully monitored by medical and psychological personnel to ensure that detainees’ suffering would not rise to the level of torture. According to Hawkins, Udall complained – and Preston admitted – that, in providing the materials requested by the committee, “the CIA removed several thousand CIA documents that the agency thought could be subjected to executive privilege claims by the President, without any decision by Obama to invoke the privilege.”
  • Worse still for the CIA, the Senate Intelligence Committee report apparently destroys the agency’s argument justifying torture on the grounds that there was no other way to acquire the needed information save through brutalization. In his answers to Udall, Preston concedes that, contrary to what the agency has argued, it can and has been established that legal methods of interrogation would have yielded the same intelligence. Is anyone still wondering why our timid President is likely to sit on the Senate Intelligence Committee report for as long as he can? Or why he will let John Brennan redact it to a fare-thee-well, if he is eventually forced to release some of it by pressure from folks who care about things like torture?
  • It does appear that the newly taciturn CIA Director Brennan has inordinate influence over the President in such matters – not unlike the influence that both DNI Clapper and NSA Director Alexander seem able to exert. In this respect, Brennan joins the dubious company of the majority of his predecessor CIA directors, as they made abundantly clear when they went to inordinate lengths to prevent their torturer colleagues from being held accountable. (Also, see “CIA Torturers Running Scared,” Sept. 20, 2009; or “Are Presidents Afraid of the CIA?” Dec. 29, 2009)
Paul Merrell

Tony Blair 'knew all about CIA secret kidnap programme' - Telegraph - 0 views

  • Tony Blair knew in detail about the CIA’s secret kidnap and interrogation programme after the September 11 attacks and was kept informed “every step of the way” by MI6, a security source has told The Telegraph. Mr Blair, the then prime minister, and Jack Straw, his foreign secretary, were fully briefed on CIA activities and were shown now infamous Bush administration legal opinions that declared “enhanced interrogation” techniques such as waterboarding and stress positions to be legal, the source said.
  • The claims come as Scotland Yard continues to investigate whether MI6 officers should face criminal charges for alleged complicity in the rendition of suspected terrorists, including two Libyan Islamists who were sent back in 2004 to Tripoli, where they were tortured.
  • The case was opened in January 2012 after documents recovered during the Libyan revolution appeared to show that Sir Mark Allen, the former head of counter-terrorism at MI6, and other agents had been complicit in the rendition of Abdel Hakim Belhadj, who was captured by the CIA with his pregnant wife and sent back to Libya. Among the documents was a memo apparently signed by Sir Mark congratulating the then Libyan intelligence chief, Moussa Koussa, on the “safe arrival” of Mr Belhadj. The Telegraph understands that MI6 has been forced to hand over top secret documents from that period to police and that senior officers who served at the time have been interviewed as part of the investigation. It is not known whether Mr Straw, who intelligence sources have indicated was fully briefed on the rendition, has also been interviewed by police.
Paul Merrell

Confessions of a drone veteran: Why using them is more dangerous than the government is... - 0 views

  • The White House sells drones strikes as legal, ethical and targeted to protect our military and innocent civilians from harm. These are questionable claims, made more dubious by the administration’s selectively leaking details of the drone program to assuage the public when reports arise of flawed legal reasoning, mistaken strikes or vastly underestimated civilian deaths.CIA director John O. Brennan also told the American public that drones “can be a wise choice because they dramatically reduce the danger to U.S. personnel, even eliminating the danger altogether.” Director Brennan is wrong.I know because I am a veteran of the drone program. I served as an Air Force imagery analyst. What I know of drone warfare is that it has dangerous, sometimes devastating, consequences for too many service members participating in the program.
Paul Merrell

5 Big Banks Expected to Plead Guilty to Felony Charges, but Punishments May Be Tempered... - 0 views

  • The Justice Department is preparing to announce that Barclays, JPMorgan Chase, Citigroup and the Royal Bank of Scotland will collectively pay several billion dollars and plead guilty to criminal antitrust violations for rigging the price of foreign currencies, according to people briefed on the matter who spoke on the condition of anonymity. Most if not all of the pleas are expected to come from the banks’ holding companies, the people said — a first for Wall Street giants that until now have had only subsidiaries or their biggest banking units plead guilty.
  • The Justice Department is also preparing to resolve accusations of foreign currency misconduct at UBS. As part of that deal, prosecutors are taking the rare step of tearing up a 2012 nonprosecution agreement with the bank over the manipulation of benchmark interest rates, the people said, citing the bank’s foreign currency misconduct as a violation of the earlier agreement. UBS A.G., the banking unit that signed the 2012 nonprosecution agreement, is expected to plead guilty to the earlier charges and pay a fine that could be as high as $500 million rather than go to trial, the people said.
  • Holding companies, while appearing to be the most important entities at the banks, are in less jeopardy of suffering the consequences of guilty pleas. Some banks worried that a guilty plea by their biggest banking units, which hold licenses that enable them to operate branches and make loans, would be riskier, two of the people briefed on the matter said. The fear, they said, centered on whether state or federal regulators might revoke those licenses in response to the pleas. Advertisement Continue reading the main story Behind the scenes in Washington, the banks’ lawyers are also seeking assurances from federal regulators — including the Securities and Exchange Commission and the Labor Department — that the banks will not be barred from certain business practices after the guilty pleas, the people said. While the S.E.C.’s five commissioners have not yet voted on the requests for waivers, which would allow the banks to conduct business as usual despite being felons, the people briefed on the matter expected a majority of commissioners to grant them.In reality, those accommodations render the plea deals, at least in part, an exercise in stagecraft. And while banks might prefer a deferred-prosecution agreement that suspends charges in exchange for fines and other concessions — or a nonprosecution deal like the one that UBS is on the verge of losing — the reputational blow of being a felon does not spell disaster.
  • ...6 more annotations...
  • The foreign exchange investigation, which centers on accusations that traders colluded to fix the price of major currencies, will test the Justice Department’s strategy for securing guilty pleas on Wall Street.
  • In the case of UBS, the bank will lose its nonprosecution agreement over interest rate manipulation, the people briefed on the matter said, a consequence of its misconduct in the foreign exchange case. It is unclear why that penalty will fall on UBS, but not on other banks suspected of manipulating both interest rates and currency prices.
  • the bank is expected to avoid pleading guilty in the foreign exchange case, the people said, though it will probably pay a fine. While UBS was unlikely to plead guilty to antitrust violations because it was the first to cooperate in the foreign exchange investigation, the bank was facing the possibility of pleading guilty to fraud charges related to the currency manipulation. The exact punishment is not yet final, the people added.The Justice Department negotiations coincide with the banks’ separate efforts to persuade the S.E.C. to issue waivers from automatic bans that occur when a company pleads guilty. If the waivers are not granted, a decision that the Justice Department does not control, the banks could face significant consequences.For example, some banks may be seeking waivers to a ban on overseeing mutual funds, one of the people said. They are also requesting waivers to ensure they do not lose their special status as “well-known seasoned issuers,” which allows them to fast-track securities offerings. For some of the banks, there is also a concern that they will lose their “safe harbor” status for making forward-looking statements in securities documents.
  • In turn, the S.E.C. asked the Justice Department to hold off on announcing the currency cases until the banks’ requests had been reviewed, one of the people said. As of Wednesday, it seemed probable that a majority of the S.E.C.’s commissioners would approve most of the waivers, which can be granted for a cause like the public good. Still, the agency’s two Democratic commissioners — Kara M. Stein and Luis A. Aguilar, who have denounced the S.E.C.’s use of waivers — might be more likely to balk.
  • Corporate prosecutions are a delicate matter, peppered with political and legal land mines. Senator Elizabeth Warren, Democrat of Massachusetts, and other liberal politicians have criticized prosecutors for treating Wall Street with kid gloves. Banks and their lawyers, however, complain about huge penalties and guilty pleas. Continue reading the main story Recent Comments AvangionQ 14 hours ago These are the sorts of crimes that take down nations, jail sentences should be mandatory. Lance Haley 14 hours ago I find this whole legal exercise not only irrational, but insulting. I am a criminal defense attorney. Punishing the shareholders and the... loomypop 14 hours ago There is much more than Irony in the reality of how America treats criminal action and punishment when the entire determination and outcome... See All Comments And lingering in the background is the case of Arthur Andersen, an accounting giant that imploded after being convicted in 2002 of criminal charges related to its work for Enron. After the firm’s collapse, and the later reversal of its conviction, prosecutors began to shift from indictments and guilty pleas to deferred-prosecution agreements. And in 2008, the Justice Department updated guidelines for prosecuting corporations, which have long included a requirement that prosecutors weigh collateral consequences like harm to shareholders and innocent employees.
  • “The collateral consequences consideration is designed to address the risk that a particular criminal charge might inflict disproportionate harm to shareholders, pension holders and employees who are not even alleged to be culpable or to have profited potentially from wrongdoing,” said Mark Filip, the Justice Department official who wrote the 2008 memo. “Arthur Andersen was ultimately never convicted of anything, but the mere act of indicting it destroyed one of the cornerstones of the Midwest’s economy.”
  •  
    In related news, the Dept. of Justice announced that it would begin using its "collateral consequences" analysis to decisions whether to charge human beings with crimes, taking into account the hardships imposed on innocent family members and other dependents if a person were sentenced to prison.  No? Sounds like corporations have more rights than human beings, yes?
Paul Merrell

The Torture Report and the "Glomar Fig Leaf" | Just Security - 0 views

  • Buried in the SSCI’s report is an arresting passage that suggests that the CIA was quietly releasing information about the torture program to journalists while it was contending in court that release of such information to the public would compromise national security. After the April 15, 2005 National Security Principals Committee meeting, the CIA drafted an extensive document describing the CIA’s Detention and Interrogation Program for an anticipated media campaign.  CIA attorneys, discussing aspects of the campaign involving off-the-record disclosures, cautioned against attributing the information to the CIA itself.  One senior attorney stated that the proposed press briefing was “minimally acceptable, but only if not attributed to a CIA official.”  The CIA attorney continued: “This should be attributed to an ‘official knowledgeable’ about the program (or some similar obfuscation), but should not be attributed to a CIA or intelligence official.”
  • Referring to CIA efforts to deny Freedom of Information Act (FOIA) requests for previously acknowledged information, the attorney noted that, “[o]ur Glomar fig leaf is getting pretty thin.”  Another CIA attorney noted that the draft “makes the [legal] declaration I just wrote about the secrecy of the interrogation program a work of fiction.” The reference to the “Glomar fig leaf” related to an argument the CIA was making in ACLU litigation that was pending before Judge Alvin K.  Hellerstein in the Southern District of New York.  In connection with Freedom of Information Act requests we’d filed in October 2003 and June 2004, we were seeking, among other things, three documents we’d learned of from media reports: the Memorandum of Notification (MON) in which President Bush had authorized the CIA to establish black sites overseas, and two memos in which lawyers from the Office of Legal Counsel had concluded that CIA interrogators could lawfully torture prisoners in their custody.  The CIA responded with a “Glomar” response—it argued that the existence or non-existence of the three documents was a properly classified fact. 
  • As the SSCI report makes clear, CIA lawyers didn’t really believe what the agency was saying in its sworn declarations.  They understood that the sworn declarations the agency was filing in federal court were “work[s] of fiction.”  The agency was telling the courts that nothing could be disclosed about its torture program without compromising national security, but at the same time, it was providing quotations and “facts” to the media in order to persuade the public that its activities were lawful, necessary and effective. If all of this sounds familiar, it’s because the CIA is now doing precisely the same thing with respect to the targeted-killing program. To the courts, the CIA says that any disclosure about the program will gravely compromise national security.  To the media, it supplies a continuous stream of cherry-picked facts meant to cast the program in the most favorable light.
  • ...1 more annotation...
  • The SSCI report makes clear that some CIA lawyers were uncomfortable with the chasm between the agency’s representations to the court in the torture FOIA litigation and the agency’s actual conduct.  According to the SSCI, some CIA lawyers “urged that CIA leadership … ‘confront the inconsistency’ between CIA court declarations ‘about how critical it is to keep this information secret’ and the CIA ‘planning to reveal darn near the entire” program.’” Presumably those lawyers were worried about the possibility that a court would sanction the agency’s declarants; perhaps they were also worried about compliance with their own professional obligations. One wonders whether the CIA’s lawyers are worried about the same things today.
Paul Merrell

How a false witness helped the CIA make a case for torture | Al Jazeera America - 0 views

  • Buried amid details of “rectal rehydration” and waterboarding that dominated the headlines over last week’s Senate Intelligence Committee findings was an alarming detail: Both the committee’s summary report and its rebuttal by the CIA admit that a source whose claims were central to the July 2004 resumption of the torture program  — and, almost certainly, to authorizing the Internet dragnet collecting massive amounts of Americans’ email metadata — fabricated claims about an election year plot. Both the torture program and President Bush's warrantless wiretap program, Stellar Wind, were partly halted from March through June of 2004. That March, Assistant Attorney General Jack Goldsmith prepared to withdraw Pentagon authorization for torture, amid growing concern following the publication of pictures of detainee abuse at Iraq's Abu Ghraib, and a May 2004 CIA inspector general report criticizing a number of aspects of the Agency's interrogation program. On June 4, 2004, CIA Director George Tenet suspended the use of torture techniques.
  • During the same period, the DOJ lawyers who pushed to stop torture were also persuading President George W. Bush to halt aspects of Stellar Wind, a program that conducted warrantless wiretapping of Americans’ communications inside the U.S., on top of the Internet metadata. After a dramatic confrontation in the hospital room of Attorney General John Ashcroft on March 10, 2004, acting Attorney General Jim Comey and Goldsmith informed Bush there was no legal basis for parts of the program. Ultimately, Bush agreed to modify aspects of it, in part by halting the collection of Internet metadata. But even as Bush officials suspended that part of the program on March 26, they quickly set about finding legal cover for its resumption. One way they did so was by pointing to imminent threats — such as a planned election-season attack — in the United States.
  • The CIA in March 2004 received reporting from a source the torture report calls "Asset Y,” who said a known Al-Qaeda associate in Pakistan, Janat Gul — whom CIA at the time believed was a key facilitator — had set up a meeting between Asset Y and Al-Qaeda's finance chief, and was helping plan attacks inside the United States timed to coincide with the November 2004 elections. According to the report, CIA officers immediately expressed doubts about the veracity of the information they’d been given by Asset Y. A senior CIA officer called the report "vague" and "worthless in terms of actionable intelligence." He noted that Al Qaeda had already issued a statement “emphasizing a lack of desire to strike before the U.S. election” and suggested that since Al-Qaeda was aware that “threat reporting causes panic in Washington” and inevitably results in leaks, planting a false claim of an election season attack would be a good way for the network to test whether Asset Y was working for its enemies. Another officer, assigned to the group hunting Osama bin Laden, also expressed doubts. In its rebuttal to the Senate report, the CIA argues the agency was right to take seriously Asset Y’s reporting , in spite of those initial doubts. The CIA wrote numerous reports about the claim “even as we worked to resolve the inconsistencies.” Reports from detainee Hassan Ghul, who was captured in January 2004, supported the possibility that a cell of Al-Qaeda members in Pakistan’s tribal areas might be planning a plot of which he was unaware. And the CIA corroborated other parts of Asset Y's reporting.
  • ...5 more annotations...
  • Still, the CIA had one further reason for doubting claims that Gul was at the center of an Al-Qaeda election-year plot. Ghu told the CIA about an attempt by Gul, in the fall of 2003, to sell anti-aircraft missiles to Al-Qaeda; the Qaeda figure in Ghul’s story didn't even want to work with Gul. And Ghul later learned Gul was probably lying about his ability to acquire the missiles.
  • Nevertheless, the CIA took seriously Asset Y’s claim that Gul was involved in an election plot and moved quickly to gain custody of him after his arrest by Pakistan in June 2004. Even before CIA rendered Gul to its custody, Tenet started lobbying to get torture techniques reapproved for his interrogation. On June 29, Tenet wrote National Security Adviser Condoleezza Rice seeking approval to once again use some of the techniques whose use he suspended less than four weeks earlier, in the hope of gathering information on the election season plot. "Given the magnitude of the danger posed by the pre-election plot and Gul's almost certain knowledge of any intelligence about that plot” Tenet wrote, relying on Asset Y's claims, “I request the fastest possible resolution of the above issues." On July 20, according to the report, top administration officials gave CIA verbal approval to get back into the torture business. Ashcroft stated that most previously approved interrogation techniques would not violate U.S. law on July 22 (though not waterboarding). And by the end of July, CIA started coaxing DOJ to approve other techniques — such as slapping someone in the stomach or hosing them down with cold water or limiting their food — which had already been used by the CIA but never officially approved by DOJ.
  • At the same time, the government was also using the ostensible election-season plot, among others, to persuade the Foreign Intelligence Surveillance Court (FISC) – the secret court that approves domestic spying on Americans – to authorize the Internet dragnet. After Bush halted the Internet dragnet on March 26, his aides began working with FISC presiding judge Colleen Kollar-Kotelly to find a way to use FISA authority -- normally been used to access records for a single phone or Internet account -- to collect Internet metadata in bulk. They provided a series of briefings, including one attended by Terrorist Threat Integration Center head John Brennan and CIA Director George Tenet, to explain the threat. In addition, they provided what – under Stellar Wind – analysts called a “scary memo,” summarizing all the threats facing the country to underscore the urgency of the program. Tenet's declaration included as an appendix to an application submitted in the days before July 14, 2004, laid out the threats CIA and others were fighting that summer.
  • Judge Kollar-Kotelly invoked Tenet's material in a redacted section of her opinion authorizing the phone dragnet, pointing to it as a key reason to permit collection of what she called “enormous” amounts of data from innocent Americans.
  • Soon after the reauthorization of the torture and the Internet dragnet, the CIA realized ASSET Y's story wasn't true. By September, an officer involved in Janat Gul's interrogation observed, “we lack credible information that ties him to pre-election threat information or direct operational planning against the United States, at home or abroad.” In October, CIA reassessed ASSET Y, and found him to be deceptive. When pressured, ASSET Y admitted had had made up the story of a meeting set up by Gul. ASSET Y blamed his CIA handler for pressuring him for intelligence, leading him to lie about the meeting. By 2005, CIA had concluded that ASSET Y was a fabricator, and Janat Gul was a “rather poorly educated village man [who is] quite lazy [who] was looking to make some easy money for little work and he was easily persuaded to move people and run errands for folks on our target list” (though the Agency wasn't always forthright about the judgment to DOJ). The torture program, which was resumed in part because of a perceived urgency of extracting information from Gul on a plot that didn't exist, continued for several more years. The Internet dragnet continued under FISC authorization, on and off, until December 2011. And several other still active NSA programs, including the phone dragnet, relied on Kollar-Kotelly's earlier authorization as precedents – the case for which had also been derived, in part, from one long discredited fabricator.
Paul Merrell

Tomgram: Alfred McCoy, It's About Blackmail, Not National Security | TomDispatch - 0 views

  • For more than six months, Edward Snowden’s revelations about the National Security Agency (NSA) have been pouring out from the Washington Post, the New York Times, the Guardian, Germany’s Der Spiegel, and Brazil’s O Globo, among other places.  Yet no one has pointed out the combination of factors that made the NSA’s expanding programs to monitor the world seem like such a slam-dunk development in Washington.  The answer is remarkably simple.  For an imperial power losing its economic grip on the planet and heading into more austere times, the NSA’s latest technological breakthroughs look like a bargain basement deal when it comes to projecting power and keeping subordinate allies in line -- like, in fact, the steal of the century.  Even when disaster turned out to be attached to them, the NSA’s surveillance programs have come with such a discounted price tag that no Washington elite was going to reject them.
  • What exactly was the aim of such an unprecedented program of massive domestic and planetary spying, which clearly carried the risk of controversy at home and abroad? Here, an awareness of the more than century-long history of U.S. surveillance can guide us through the billions of bytes swept up by the NSA to the strategic significance of such a program for the planet’s last superpower. What the past reveals is a long-term relationship between American state surveillance and political scandal that helps illuminate the unacknowledged reason why the NSA monitors America’s closest allies. Not only does such surveillance help gain intelligence advantageous to U.S. diplomacy, trade relations, and war-making, but it also scoops up intimate information that can provide leverage -- akin to blackmail -- in sensitive global dealings and negotiations of every sort. The NSA’s global panopticon thus fulfills an ancient dream of empire. With a few computer key strokes, the agency has solved the problem that has bedeviled world powers since at least the time of Caesar Augustus: how to control unruly local leaders, who are the foundation for imperial rule, by ferreting out crucial, often scurrilous, information to make them more malleable.
  • Once upon a time, such surveillance was both expensive and labor intensive. Today, however, unlike the U.S. Army’s shoe-leather surveillance during World War I or the FBI’s break-ins and phone bugs in the Cold War years, the NSA can monitor the entire world and its leaders with only 100-plus probes into the Internet’s fiber optic cables. This new technology is both omniscient and omnipresent beyond anything those lacking top-secret clearance could have imagined before the Edward Snowden revelations began.  Not only is it unimaginably pervasive, but NSA surveillance is also a particularly cost-effective strategy compared to just about any other form of global power projection. And better yet, it fulfills the greatest imperial dream of all: to be omniscient not just for a few islands, as in the Philippines a century ago, or a couple of countries, as in the Cold War era, but on a truly global scale. In a time of increasing imperial austerity and exceptional technological capability, everything about the NSA’s surveillance told Washington to just “go for it.”  This cut-rate mechanism for both projecting force and preserving U.S. global power surely looked like a no-brainer, a must-have bargain for any American president in the twenty-first century -- before new NSA documents started hitting front pages weekly, thanks to Snowden, and the whole world began returning the favor.
  • ...12 more annotations...
  • As the gap has grown between Washington’s global reach and its shrinking mailed fist, as it struggles to maintain 40% of world armaments (the 2012 figure) with only 23% of global gross economic output, the U.S. will need to find new ways to exercise its power far more economically. As the Cold War took off, a heavy-metal U.S. military -- with 500 bases worldwide circa 1950 -- was sustainable because the country controlled some 50% of the global gross product. But as its share of world output falls -- to an estimated 17% by 2016 -- and its social welfare costs climb relentlessly from 4% of gross domestic product in 2010 to a projected 18% by 2050, cost-cutting becomes imperative if Washington is to survive as anything like the planet’s “sole superpower.” Compared to the $3 trillion cost of the U.S. invasion and occupation of Iraq, the NSA’s 2012 budget of just $11 billion for worldwide surveillance and cyberwarfare looks like cost saving the Pentagon can ill-afford to forego. Yet this seeming “bargain” comes at what turns out to be an almost incalculable cost. The sheer scale of such surveillance leaves it open to countless points of penetration, whether by a handful of anti-war activists breaking into an FBI field office in Media, Pennsylvania, back in 1971 or Edward Snowden downloading NSA documents at a Hawaiian outpost in 2012.
  • In October 2001, not satisfied with the sweeping and extraordinary powers of the newly passed Patriot Act, President Bush ordered the National Security Agency to commence covert monitoring of private communications through the nation's telephone companies without the requisite FISA warrants. Somewhat later, the agency began sweeping the Internet for emails, financial data, and voice messaging on the tenuous theory that such “metadata” was “not constitutionally protected.” In effect, by penetrating the Internet for text and the parallel Public Switched Telephone Network (PSTN) for voice, the NSA had gained access to much of the world’s telecommunications. By the end of Bush’s term in 2008, Congress had enacted laws that not only retrospectively legalized these illegal programs, but also prepared the way for NSA surveillance to grow unchecked. Rather than restrain the agency, President Obama oversaw the expansion of its operations in ways remarkable for both the sheer scale of the billions of messages collected globally and for the selective monitoring of world leaders.
  • By 2012, the centralization via digitization of all voice, video, textual, and financial communications into a worldwide network of fiber optic cables allowed the NSA to monitor the globe by penetrating just 190 data hubs -- an extraordinary economy of force for both political surveillance and cyberwarfare.
  • With a few hundred cable probes and computerized decryption, the NSA can now capture the kind of gritty details of private life that J. Edgar Hoover so treasured and provide the sort of comprehensive coverage of populations once epitomized by secret police like East Germany’s Stasi. And yet, such comparisons only go so far. After all, once FBI agents had tapped thousands of phones, stenographers had typed up countless transcripts, and clerks had stored this salacious paper harvest in floor-to-ceiling filing cabinets, J. Edgar Hoover still only knew about the inner-workings of the elite in one city: Washington, D.C.  To gain the same intimate detail for an entire country, the Stasi had to employ one police informer for every six East Germans -- an unsustainable allocation of human resources. By contrast, the marriage of the NSA’s technology to the Internet’s data hubs now allows the agency’s 37,000 employees a similarly close coverage of the entire globe with just one operative for every 200,000 people on the planet
  • Through the expenditure of $250 million annually under its Sigint Enabling Project, the NSA has stealthily penetrated all encryption designed to protect privacy. “In the future, superpowers will be made or broken based on the strength of their cryptanalytic programs,” reads a 2007 NSA document. “It is the price of admission for the U.S. to maintain unrestricted access to and use of cyberspace.” By collecting knowledge -- routine, intimate, or scandalous -- about foreign leaders, imperial proconsuls from ancient Rome to modern America have gained both the intelligence and aura of authority necessary for dominion over alien societies. The importance, and challenge, of controlling these local elites cannot be overstated. During its pacification of the Philippines after 1898, for instance, the U.S. colonial regime subdued contentious Filipino leaders via pervasive policing that swept up both political intelligence and personal scandal. And that, of course, was just what J. Edgar Hoover was doing in Washington during the 1950s and 1960s.
  • Indeed, the mighty British Empire, like all empires, was a global tapestry woven out of political ties to local leaders or “subordinate elites” -- from Malay sultans and Indian maharajas to Gulf sheiks and West African tribal chiefs. As historian Ronald Robinson once observed, the British Empire spread around the globe for two centuries through the collaboration of these local leaders and then unraveled, in just two decades, when that collaboration turned to “non-cooperation.” After rapid decolonization during the 1960s transformed half-a-dozen European empires into 100 new nations, their national leaders soon found themselves the subordinate elites of a spreading American global imperium. Washington suddenly needed the sort of private information that could keep such figures in line. Surveillance of foreign leaders provides world powers -- Britain then, America now -- with critical information for the exercise of global hegemony. Such spying gave special penetrating power to the imperial gaze, to that sense of superiority necessary for dominion over others.  It also provided operational information on dissidents who might need to be countered with covert action or military force; political and economic intelligence so useful for getting the jump on allies in negotiations of all sorts; and, perhaps most important of all, scurrilous information about the derelictions of leaders useful in coercing their compliance.
  • In late 2013, the New York Times reported that, when it came to spying on global elites, there were “more than 1,000 targets of American and British surveillance in recent years,” reaching down to mid-level political actors in the international arena. Revelations from Edward Snowden’s cache of leaked documents indicate that the NSA has monitored leaders in some 35 nations worldwide -- including Brazilian president Dilma Rousseff, Mexican presidents Felipe Calderón and Enrique Peña Nieto, German Chancellor Angela Merkel, and Indonesia’s president Susilo Bambang Yudhoyono.  Count in as well, among so many other operations, the monitoring of “French diplomatic interests” during the June 2010 U.N. vote on Iran sanctions and “widespread surveillance” of world leaders during the Group 20 summit meeting at Ottawa in June 2010. Apparently, only members of the historic “Five Eyes” signals-intelligence alliance (Australia, Canada, New Zealand, and Great Britain) remain exempt -- at least theoretically -- from NSA surveillance. Such secret intelligence about allies can obviously give Washington a significant diplomatic advantage. During U.N. wrangling over the U.S. invasion of Iraq in 2002-2003, for example, the NSA intercepted Secretary-General Kofi Anan’s conversations and monitored the “Middle Six” -- Third World nations on the Security Council -- offering what were, in essence, well-timed bribes to win votes. The NSA’s deputy chief for regional targets sent a memo to the agency’s Five Eyes allies asking “for insights as to how membership is reacting to on-going debate regarding Iraq, plans to vote on any related resolutions [..., and] the whole gamut of information that could give U.S. policymakers an edge in obtaining results favorable to U.S. goals.”
  • Indicating Washington’s need for incriminating information in bilateral negotiations, the State Department pressed its Bahrain embassy in 2009 for details, damaging in an Islamic society, on the crown princes, asking: “Is there any derogatory information on either prince? Does either prince drink alcohol? Does either one use drugs?” Indeed, in October 2012, an NSA official identified as “DIRNSA,” or Director General Keith Alexander, proposed the following for countering Muslim radicals: “[Their] vulnerabilities, if exposed, would likely call into question a radicalizer’s devotion to the jihadist cause, leading to the degradation or loss of his authority.” The agency suggested that such vulnerabilities could include “viewing sexually explicit material online” or “using a portion of the donations they are receiving… to defray personal expenses.” The NSA document identified one potential target as a “respected academic” whose “vulnerabilities” are “online promiscuity.”
  • Just as the Internet has centralized communications, so it has moved most commercial sex into cyberspace. With an estimated 25 million salacious sites worldwide and a combined 10.6 billion page views per month in 2013 at the five top sex sites, online pornography has become a global business; by 2006, in fact, it generated $97 billion in revenue. With countless Internet viewers visiting porn sites and almost nobody admitting it, the NSA has easy access to the embarrassing habits of targets worldwide, whether Muslim militants or European leaders. According to James Bamford, author of two authoritative books on the agency, “The NSA's operation is eerily similar to the FBI's operations under J. Edgar Hoover in the 1960s where the bureau used wiretapping to discover vulnerabilities, such as sexual activity, to ‘neutralize’ their targets.”
  • Indeed, whistleblower Edward Snowden has accused the NSA of actually conducting such surveillance.  In a December 2013 letter to the Brazilian people, he wrote, “They even keep track of who is having an affair or looking at pornography, in case they need to damage their target's reputation.” If Snowden is right, then one key goal of NSA surveillance of world leaders is not U.S. national security but political blackmail -- as it has been since 1898. Such digital surveillance has tremendous potential for scandal, as anyone who remembers New York Governor Eliot Spitzer’s forced resignation in 2008 after routine phone taps revealed his use of escort services; or, to take another obvious example, the ouster of France’s budget minister Jérôme Cahuzac in 2013 following wire taps that exposed his secret Swiss bank account. As always, the source of political scandal remains sex or money, both of which the NSA can track with remarkable ease.
  • By starting a swelling river of NSA documents flowing into public view, Edward Snowden has given us a glimpse of the changing architecture of U.S. global power. At the broadest level, Obama’s digital “pivot” complements his overall defense strategy, announced in 2012, of reducing conventional forces while expanding into the new, cost-effective domains of space and cyberspace. While cutting back modestly on costly armaments and the size of the military, President Obama has invested billions in the building of a new architecture for global information control. If we add the $791 billion expended to build the Department of Homeland Security bureaucracy to the $500 billion spent on an increasingly para-militarized version of global intelligence in the dozen years since 9/11, then Washington has made a $1.2 trillion investment in a new apparatus of world power.
  • So formidable is this security bureaucracy that Obama’s recent executive review recommended the regularization, not reform, of current NSA practices, allowing the agency to continue collecting American phone calls and monitoring foreign leaders into the foreseeable future. Cyberspace offers Washington an austerity-linked arena for the exercise of global power, albeit at the cost of trust by its closest allies -- a contradiction that will bedevil America’s global leadership for years to come. To update Henry Stimson: in the age of the Internet, gentlemen don't just read each other’s mail, they watch each other’s porn. Even if we think we have nothing to hide, all of us, whether world leaders or ordinary citizens, have good reason to be concerned.
Paul Merrell

Documents: FBI Spyware Has Been Snaring Extortionists, Hackers for Years | Threat Level... - 0 views

  • A sophisticated FBI-produced spyware program has played a crucial behind-the-scenes role in federal investigations into extortion plots, terrorist threats and hacker attacks in cases stretching back at least seven years, newly declassified documents show. As first reported by Wired.com, the software, called a "computer and internet protocol address verifier," or CIPAV, is designed to infiltrate a target’s computer and gather a wide range of information, which it secretly sends to an FBI server in eastern Virginia. The FBI’s use of the spyware surfaced in 2007 when the bureau used it to track e-mailed bomb threats against a Washington state high school to a 15-year-old student. But the documents released Thursday under the Freedom of Information Act show the FBI has quietly obtained court authorization to deploy the CIPAV in a wide variety of cases, ranging from major hacker investigations, to someone posing as an FBI agent online. Shortly after its launch, the program became so popular with federal law enforcement that Justice Department lawyers in Washington warned that overuse of the novel technique could result in its electronic evidence being thrown out of court in some cases. "While the technique is of indisputable value in certain kinds of cases, we are seeing indications that it is being used needlessly by some agencies, unnecessarily raising difficult legal questions (and a risk of suppression) without any countervailing benefit," reads a formerly-classified March 7, 2002 memo from the Justice Department’s Computer Crime and Intellectual Property Section.
  • The documents, which are heavily redacted, do not detail the CIPAV’s capabilities, but an FBI affidavit in the 2007 case indicate it gathers and reports a computer’s IP address; MAC address; open ports; a list of running programs; the operating system type, version and serial number; preferred internet browser and version; the computer’s registered owner and registered company name; the current logged-in user name and the last-visited URL. After sending the information to the FBI, the CIPAV settles into a silent "pen register" mode, in which it lurks on the target computer and monitors its internet use, logging the IP address of every server to which the machine connects. The documents shed some light on how the FBI sneaks the CIPAV onto a target’s machine, hinting that the bureau may be using one or more web browser vulnerabilities. In several of the cases outlined, the FBI hosted the CIPAV on a website, and tricked the target into clicking on a link. That’s what happened in the Washington case, according to a formerly-secret planning document for the 2007 operation. "The CIPAV will be deployed via a Uniform Resource Locator (URL) address posted to the subject’s private chat room on MySpace.com."
  • The software’s primary utility appears to be in tracking down suspects that use proxy servers or anonymizing websites to cover their tracks.
  • ...1 more annotation...
  • The documents appear to settle one of the questions the FBI declined to answer in 2007: whether the bureau obtains search warrants before using the CIPAV, or if it sometimes relies on weaker "pen register" orders that don’t require a showing of probable cause that a crime has been committed. In all the criminal cases described in the documents, the FBI sought search warrants. The records also indicate that the FBI obtained court orders from the Foreign Intelligence Surveillance Court, which covers foreign espionage and terrorism investigations, but the details are redacted. The FBI released 152 heavily-redacted pages in response to Threat Level’s FOIA request, and withheld another 623.
  •  
    The article summarizes many cases in which the CIPAV exploit was used by the FBI. But the article's closing observation that the released documents "whether the bureau obtains search warrants before using the CIPAV" stretches the evidence a bit too far, methinks. If they exist, the FBI very likely would not have produced records of incidents in which it used CIPAV without court authorization. 
Paul Merrell

GUANTANAMO BAY NAVY BASE, Cuba: Guantánamo judge to CIA: Disclose 'black site... - 0 views

  • The military judge in the USS Cole bombing case has ordered the CIA to give defense lawyers details — names, dates and places — of its secret overseas detention and interrogation of the man accused of planning the bombing, two people who have read the still-secret order said Thursday.Army Col. James L. Pohl issued the five-page order Monday. It was sealed as document 120C on the war court website Thursday morning and, according to those who have read it, orders the agency to provide a chronology of the overseas odyssey of Abd al Rahim al Nashiri, 49, from his capture in Dubai in 2002 to his arrival at Guantánamo four years later.The order sets the stage for a showdown between the CIA and a military judge, if the agency refuses to turn over the information to the prosecution for the defense teams. The order comes while the CIA fights a bitter, public battle with the Senate on its black site torture investigation.
  • The judge’s order instructs prosecutors to provide nine categories of closely guarded classified CIA information to the lawyers — including the names of agents, interrogators and medical personnel who worked at the so-called black sites. The order covers “locations, personnel and communications,” interrogation notes and cables between the black sites and headquarters that sought and approved so-called enhanced interrogation techniques, the two sources said.It does not, however, order the government to turn over Office of Legal Counsel memos that both blessed and defined the so-called Torture Program that sent CIA captives to secret interrogations across the world after the Sept. 11, 2001 attacks — out of reach of International Committee of the Red Cross delegates.“It’s a nuclear bomb that may shut down the case,” said one person who read the order and is not a part of the Cole case.
Paul Merrell

Covington & Burling Gets Eric Holder Back After 6-Year Stopover - 0 views

  • After failing to criminally prosecute any of the financial firms responsible for the market collapse in 2008, former Attorney General Eric Holder is returning to Covington & Burling, a corporate law firm known for serving Wall Street clients. The move completes one of the more troubling trips through the revolving door for a cabinet secretary. Holder worked at Covington from 2001 right up to being sworn in as attorney general in Feburary 2009. And Covington literally kept an office empty for him, awaiting his return. The Covington & Burling client list has included four of the largest banks, including Bank of America, Citigroup, JPMorgan Chase and Wells Fargo. Lobbying records show that Wells Fargo is still a client of Covington. Covington recently represented Citigroup over a civil lawsuit relating to the bank’s role in Libor manipulation.
  • Covington was also deeply involved with a company known as MERS, which was later responsible for falsifying mortgage documents on an industrial scale. “Court records show that Covington, in the late 1990s, provided legal opinion letters needed to create MERS on behalf of Fannie Mae, Freddie Mac, Bank of America, JPMorgan Chase and several other large banks,” according to an investigation by Reuters. The Department of Justice under Holder not only failed to pursue criminal prosecutions of the banks responsible for the mortage meltdown, but in fact de-prioritized investigations of mortgage fraud, making it the “lowest-ranked criminal threat,” according to an inspector general report. For insiders, the Holder decision to return to Covington was never a mystery. Timothy Hester, the chairman of Covington, told the National Law Journal that Holder’s return to the firm had been “a project” of his ever since Holder left to the join the administration in 2009. When the firm moved to a new building last year, it kept an 11th-story corner office reserved for Holder.
  • Holder’s critics charge that he made a career out of institutionalizing “Too Big to Prosecute” rules within the department. In 1999, as a deputy attorney general, Holder authored a memo arguing that officials should consider the “collateral consequences” when prosecuting corporate crimes. In 2012, Holder’s enforcement chief, Lanny Breuer, admitted during a speech to the New York City Bar Association that the department may go easy on certain corporate criminals if they believe prosecutions may disrupt financial markets or cause layoffs. “In some cases, the health of an industry or the markets are a real factor,” Breuer said. Rather than face accountability for their failures, the incentive structure of modern Washington is designed to reward both men. Breuer left the department in 2013 to rejoin Covington. Holder is set to become among the highest-earning partners at the firm, with compensation in the seven or eight figures.
‹ Previous 21 - 40 of 45 Next ›
Showing 20 items per page