Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged mail

Rss Feed Group items tagged

4More

4Chan Claims To Have Fabricated Anti-Trump Report As A Hoax | Zero Hedge - 0 views

  • In a story that is getting more surreal by the minute, a post on 4Chan now claims that the infamous "golden showers" scene in the unverified 35-page dossier, allegedly compiled by a British intelligence officer, was a hoax and fabricated by a member of the chatboard as "fanfiction", then sent to Rick Wilson, who proceeded to send it to the CIA, which then put it in their official classified intelligence report on the election. Here is 4Chan's explanation of how the story came to light: >/pol/acks mailed fanfiction to anti-trump pundit Rick Wilson about trump making people piss on a bed obama slept in >he thought it was real and gave it to the CIA >the central intelligence agency of the united states of america put this in their official classified intelligence report on russian involvement in the election >donald trump and obama have both read this pol/acks fanfiction >the cia has concluded that the russian plans to blackmail trump with this story we made up just let that sink in what we have become.
  • nd a summary posted on pastebin: On january 10, Buzzfeed posted a story under the byline of Ken Bensinger, Mark Schoofs and Miriam elder titled “these reports Allege Trump Has Deep Ties To Russia” and posted a link to a document alleging, among other things, that russia has been cultivating trump for 5+ years, that trump has been in constant contact with the kremlin for information on his opponents, and perhaps most inflammatory, that there are many recorded instances of blackmail of trump in sexual misconduct. A prominent claim is that trump rented the presidential suite of the Ritz Carlton Hotel in moscow, where he knew that the Obamas had slept in; he them hired a number of prostitutes to perform a 'golden shower' (pissplay) on the bed and in the room. https://www.buzzfeed.com/kenbensinger/these-reports-allege-trump-has-dee...https://assets.documentcloud.org/documents/3259984/Trump-Intelligence-Al...   Noted #nevertrump voice Rick Wilson later commented on twitter, stating that the report “gave a new meaning to Wikileaks” (https://twitter.com/TheRickWilson/status/818982395202379777) and that the report was the reason everybody was fighting so hard against the election of Trump. (https://twitter.com/TheRickWilson/status/818983514335047680)   The remarkable thing? It's all fake. And not only fake; it's a prank perpetuated by 4chan, on Rick Wilson himself. A post on 4chan on october 26 stated “mfw managed to convince CTR and certain (((journalists))) on Twitter there'll be an October surprise on Trump this Friday” along with a picture of a smug face with a hash name. http://archive.4plebs.org/pol/thread/94704894/#94705224   on november 1, a person without a picture but is assumed to be the same person posted “So they took what I told Rick Wilson and added a Russian spy angle to it. They still believe it. Guys, they're truly fucking desperate - there's no remaining Trump scandal that's credible.” https://archive.4plebs.org/pol/thread/95568919/#95571329  
  • al media, a person with the same smug grin face, and the same hash title for the picture, stated “I didn't think they'd take it so far.” http://boards.4chan.org/pol/thread/106514445#p106520376   This story has taken on something of a life of it's own. Going through Rick Wilson's twitter, you can find many different stories from the time that he had shown the story to a wide number of anti-trump news sources, trying to find a news organization that would actually publish the story. During that time period, he referred to it often as 'the thing', and often playing coy with followers on the content with the story with anybody who was not also a #Nevertrumper. Unconfirmed sources has people as high up as John McCain giving the story to FBI Director James Comey to attempt to verify the story. Given that Rick Wilson runs in Establishment circles, it is not an impossible scenario that long-serving senators are falling for what amounts to a 4chan troll trump supporter creating an ironic October Surprise out of wholecloth to punk a GOPe pundit who derogatorily referred to them as single men who masturbate to anime. While this entire incident is laughable, and even more so if the 4Chan account is accurate, what makes it quite tragic, is that it is no longer possible to dismiss the "fake news" angle to an intelligence report. And if the CIA is compromised, what is left for "news outlets" like CNN and BuzzFeed, which were all too eager to run with the story without any attempt at verification?
  •  
    It's must read.
2More

Trump conducts his own sting operation to ensnare intelligence briefers | Daily Mail On... - 0 views

  • President-elect Donald Trump, after growing suspicious that intelligence officials were leaking news about their classified briefings with him, says he conducted a sting operation to try to prove top spies were behind the leaks.Trump revealed the extraordinary scheme to try to entrap the senior spies in a furious press conference where he suggested the intelligence community had been behind salacious and totally unproven allegations against him.‘I think it’s pretty sad when intelligence reports get leaked out to the press. First of all, it’s illegal. These are classified and certified meetings and reports,’ Trump said during a press conference at Trump Tower – his first since getting elected.Then he revealed the details of the stealthy sting he says he conducted on the nation’s senior spooks.‘I’ll tell you what does happen. I have many meetings with intelligence. And every time I meet, people are reading about it,' Trump complained, possibly referencing reports on his classified briefings, which he has chosen not to receive daily.
  • 'Somebody’s leaking them out,’ Trump said, after inveighing against leaks generally.‘So I said, "Maybe it’s my office. Maybe my office." Because I’ve got a lot of people … Maybe it’s them?’‘What I did, is I said I won’t tell anyone. I’m going to have a meeting, and I won’t tell anybody about my meeting with intelligence,’ Trump continued.He even shielded one of his closest aides from word of the meeting. ‘Nobody knew – not even Rhona, my executive assistant for years. She didn’t know – I didn’t tell her. Nobody knew,’ Trump continued – drawing laughter from collected family members and staff.Having set the trap, Trump says the word leaked anyway.‘The meeting was held. They left, and immediately the word got out that I had a meeting. So, I don’t want that. It’s very unfair to the country. It’s very unfair to our country what’s happening,’ he said.
1More

FBI Chief Under Fire Again With Justice Department Probe - Bloomberg - 0 views

  • New questions were raised Thursday about whether FBI Director James Comey will be able to keep his job after the Justice Department’s internal watchdog opened an investigation into his handling of Hillary Clinton’s use of a private e-mail server.The investigation by the department’s inspector general will examine whether the Federal Bureau of Investigation failed to follow appropriate procedures and improperly released information about the Clinton probe -- renewing scrutiny of one of the most contested developments of the 2016 election campaign.
1More

Former Icelandic minister claims FBI tried to frame Julian Assange | Daily Mail Online - 0 views

  • Ögmundur Jonasson said US authorities first told him in June 2011 that there was an 'imminent attack' on Iceland's government databases But when they arrived in August, Jonasson claims the FBI 'sought Iceland's cooperation to frame Assange and WikiLeaks' Jonasson said he then immediately kicked them out of Iceland The story was widely reported on in 2013, but Jonasson made no mention of the US trying to frame Assange It became known that the mission was part of a 'wide-ranging investigation' into Assange and WikiLeaks Jonnason said himself he made it clear he is on 'Assange and WikiLeaks' side'
8More

CNN apologizes for commentator who called WikiLeaks founder a 'pedophile' | McClatchy DC - 0 views

  • In fact, the pedophile allegation has little to do with Assange’s plight that has kept him in the embassy in London, which involves incidents in Stockholm in the summer of 2010.
  • Rather, it is a bizarre tale involving a Houston-based dating website and its global and well-funded efforts to discredit Assange around the globe. The byzantine saga involves disconnected telephones and mystery websites. The website, toddandclare.com, launched and ramped up its efforts against Assange during the U.S. presidential campaign, as WikiLeaks released hacked emails related to the campaign of Democratic nominee Hillary Clinton.Whoever is behind the dating site has marshaled significant resources to target Assange, enough to gain entry into a United Nations body, operate in countries in Europe, North America and the Caribbean, conduct surveillance on Assange’s lawyer in London, obtain the fax number of Canada’s prime minister and seek to prod a police inquiry in the Bahamas.The dating site’s campaign sought to thwart WikiLeaks’ efforts and discredit Assange, who played a role in a presidential campaign season that deeply divided the U.S. electorate and illuminated Russia as a major cyber adversary of the U.S. government.One part of toddandclare’s two-pronged campaign put a megaphone to unproven charges that Assange made contact with a young Canadian girl in the Bahamas through the internet with the intention of molesting her. The second part sought to entangle him in a plan to receive $1 million from the Russian government.
  • WikiLeaks claims the dating site is “a highly suspicious and likely fabricated” company. In turn, the company has lashed out at Assange and “his despicable activities against American national security,” and warned journalists to “check with your libel lawyers first before printing anything that could impact or endanger innocent people’s lives.”For nearly two months after the October allegations, toddandclare.com went off line. But it recently reappeared, repeating charges about the 8-year-old Canadian girl. The website did not immediately respond Thursday to a new query from McClatchy, and no respondent in the past has given a name or allowed telephone contact.The online company paints itself as all-American. Online material says its founders, Todd and Clare Hammond, “are an average American couple from Michigan, who met in the eighth grade.” In 2011, the company says, the Christian couple started an email dating service, and “have married 3,000 couples to date.” Their online network began in 2015, and a statement it filed to a U.N. body says it has “100,000+ female singles” in six countries. The company’s operating address is a warehouse loading dock in Houston. Its mail goes to a Houston drop box. Its phone numbers no longer work. WikiLeaks says Texas officials tell it the entity is not registered there either under toddandclare.com or a parent company, T&C Network Solutions.A person who answered emails to the website in November declined to identify him or herself.
  • ...5 more annotations...
  • The people behind toddandclare.com persuaded a U.N. body known as the Global Compact to give it status as a participant in May, and it submitted an eight-page report to the U.N. group Oct. 4 carefully laying out its allegations against Assange. The firm was delisted by the U.N. body eight days later amid controversy over its claims. The report was later taken off the internet. An Australian lawyer, Melinda Taylor, said the report’s precise language raised additional suspicions at WikiLeaks, where she assists Assange in human rights litigation.“This is not a report that’s been drafted by a dating agency. It’s highly legalistic and very structured. It’s the language of someone who has drafted complex legal submissions,” she said.Under Todd Hammond’s name, the report alleged that Assange’s Swedish lawyer had reached out in June to offer Assange’s services on a campaign against rape in exchange for an undisclosed amount of bitcoin. It said the two sides held two videoconferences.Then came the bombshell: It said the company had ended ties with Assange following “pedophile crimes” he had committed in the Bahamas in late September. It charged that the victim was the 8-year-old daughter of a Canadian couple on a monthlong yachting vacation. The father went to police in Nassau on Sept. 28, the report claimed, charging that his family held video and chat logs showing Assange “internet grooming” the child and “propositioning the 8-year-old juvenile ‘to perform oral and anal sex acts.’ ”It said Assange made a connection to the child’s 22-year-old sister, who was a client of the online dating site, from his refuge in London, eventually gaining access to the young girl.
  • An assistant commissioner for the Royal Bahamas Police Force, Stephen Dean, said “there is no investigation” into any such incident and that the police have received no evidence that such an incident occurred.“We got a phone call of someone giving us some information. But we never had a face-to-face. It could have been a hoax,” Dean said. “We don’t know.”If someone were in possession of video or chat logs about a pedophile crime, he or she did not provide them to Bahamian police, Dean said, which he said would be odd: “If you have something so significant, I think you’d want to leave a report.”Assange’s Swedish lawyer, Per Samuelson, wrote to the U.N. body on Oct. 10 alleging that Hammond’s report against Assange was “entirely false” in all its facets and that he had had no contact with the dating site or Hammond.Even as authorities in the Bahamas dismissed the report, the dating site sent a fax Oct. 17 to Canadian Prime Minister Justin Trudeau saying the Canadian family had fled the Bahamas due to “anti-white, racist abuse by Bahamian police.”“Julian Assange ... has started a smear campaign to claim our dating company is behind an elaborate scam. It is fully to be expected. Pedophiles are devious and cunning,” the fax said.The company said it would “continue to protect the family’s identity, until either the (Royal Bahamas Police Force) conduct a proper investigation, or hell freezes over. Whichever comes first.”
  • The fax was signed, “The Todd and Clare Team,” and left no way to contact the firm.While the founders of toddandclare.com say they’ve been in the matchmaking business since 2011, their internet presence dates only to September 2015 and really got going only early last year. Those who have done work for the company say they were kept at arm’s length.By summer, in the run-up to what many expected to be an “October surprise” from WikiLeaks to make an impact on the U.S. election, toddandclare.com began moving against Assange in multiple countries simultaneously. The DNC and a cyber-threat intelligence firm it had hired, CrowdStrike, were already fingering Russia as behind the hacks that would provide the fodder for WikiLeaks. They’d said in June that Russian hackers had access to DNC servers for about a year.A company representative, identifying herself as Hannah Hammond, emailed Assange’s Swedish and British legal agents offering $1 million for him to appear in a five-minute tongue-in-cheek television advertisement. In a subsequent exchange Sept. 19, the representative wrote that “the source of the $1,000,000 is the Russian government.”In a curious twist, she offered what she said were three facts about Assange’s London attorney that are “unknown to the public,” including details inside her home and an event in her son’s life, suggesting a capability to conduct surveillance.Taylor, the Assange lawyer, said the details appeared “to create the impression that the members of his team were under close surveillance and/or to bolster the bona fides of the claim that the offer was linked to a State. Its inclusion does appear quite menacing.”
  • A lawyer identifying himself only as “James” responded the next day, slamming the offer as an “elaborate scam designed to entrap” Assange and embarrass him for ties to Russia.The dating site representative sought to pull the veil off “James.”“Julian: We know it’s you writing. The offer expires at midnight, October 31st 2016,” she wrote back on Sept. 21, according to copies of the emails posted by WikiLeaks on its website.By early October, toddandclare.com went on the offensive. It filed a civil complaint in a British court against Assange, seeking 295 pounds sterling – about $359 – in damages because it said it could no longer use his services due to the “child sex offenses in Nassau.”The suit, said Taylor, Assange’s lawyer, “seems to be designed to evade defamation law in the U.K. They’ve put highly noxious information knowing that it would be made public.”The global tussle between the online dating company and WikiLeaks went public in mid-October when the anti-secrecy group voiced public doubt on whether toddandclare.com actually existed, or served only as a vehicle to attack Assange.
  • The announcement opened the gates for a disparate crew of internet sleuths – some motivated by hatred of Clinton and others impelled by support for WikiLeaks – to probe into the history of toddandclare.com, suspicious that the dating site might be an undercover operation with links to the Clinton campaign.Posting their findings on the discussion websites like Reddit.com, they unearthed some curious coincidences. A perusal into the archives of the internet revealed that the Hammonds had once occupied a San Francisco building later rented to a company, Premise Data, whose co-founder has ties to Clinton and her top supporters.Moreover, a telephone number once registered to a Todd Hammond later was registered to a former Premise employee, Aaron Dunn, although with a different area code.Premise co-founder David Soloff said such findings could only be coincidences.“I want to reiterate that Premise has no connection with this case. And beyond confirming that Aaron Dunn worked at Premise until 2014, I don’t know the answer to any of your questions,” Soloff wrote in an email.
3More

Kremlin 'covered up the murder of a former KGB chief' | Daily Mail Online - 0 views

  • The Kremlin may have covered up the murder of a former KGB chief accused of helping ex-MI6 spy Christopher Steele to pull together the notorious dossier on Donald Trump.Oleg Erovinkin served as a general in the KGB and was found dead on Boxing Day in the back of his car in Moscow.It has been claimed he died of a heart attack, but an expert on Russian security threats believes he was murdered for his role in the explosive dossier.  The suspected murder victim was close to former deputy prime minister Igor Sechin, who is named throughout the leaked memo, according to the Telegraph.Erovinkin is understood to have been an important link between Sechin and leader of the Kremlin Vladimir Putin.Agent Steele's dossier, which was made public earlier this month, noted how he had a source close to Sechin.
  • He said the source had revealed alleged links between the US President's supporters and Moscow. At the time of Erovinkin's death, Russian state-run RIA Novosti news agency said his body was found in a black Lexus and that a major investigation was underway in the area. His body was sent to the morgue, which returned no cause of death, and the investigation continues. Local media reports suggested he was killed as a result of foul play, but it was later claimed he died of a heart attack. Christo Grozev, an expert on Russia-related security threats, wrote in a blog post, that he believes Erovinkin was Mr Steele's dossier source. He wrote that he has no doubt the dossier was on Putin's desk at the time the suspected victim died. 'Whichever is true,' he wrote, 'He would have had a motive to seek – and find the mole.
  • 'He would have had to conclude that Erovinkin was at least a person of interest.' The so-called dirty dossier states that in 2013 Trump hired prostitutes to urinate on the bed of the Presidential Suite at the Moscow Ritz Carlton, where he knew Barack and Michelle Obama had previously stayed.It says: 'Trump's unorthodox behavior in Russia over the years had provided the authorities there with enough embarrassing material on the now Republican presidential candidate to be able to blackmail him if they so wished.'The document states that Trump had declined 'sweetener' real estate deals in Russia that the Kremlin lined up in order to cultivate him.The business proposals were said to be 'in relation to the ongoing 2018 World Cup soccer tournament'The dossier claimed that the Russian regime had been 'cultivating, supporting and assisting Trump for at least five years'.According to the document, one source even claimed that 'the Trump operation was both supported and directed by Russian President Vladimir Putin' with the aim being to 'sow discord'.The report claims that Russian President Vladimir Putin himself had endorsed moves to encourage 'splits and divisions in the West.The dossier was handed over to the FBI in August although the information was also passed from the former MI6 agent to John McCain through an intermediary.McCain then handed the document over to FBI Director James Comey.
3More

Spicer defends decision to limit press briefing | TheHill - 0 views

  • White House press secretary Sean Spicer defended the decision Friday to bar several news organizations from covering his question-and-answer session with press, saying the Trump administration would "push back" on "false narratives." In an audio recording from the gaggle published by Politico, Spicer defends his decision to bar outlets including CNN and The New York Times, saying "we had a pool and then we expanded it, we added some folks to come cover it." Moments later the press secretary said that the White House will "aggressively push back" against "false stories." ADVERTISEMENT"It was my decision to decide to expand the pool. We are going to aggressively push back. We're just not going to sit back and let, you know, false narratives, false stories, inaccurate facts get out there," he said. The White House barred several news organization from the gaggle, including CNN, The New York Times, The Hill, Politico, BuzzFeed, the Daily Mail, BBC, the Los Angeles Times and the New York Daily News.
  • The gaggle, which was held inside Spicer's West Wing office instead of the regular White House briefing room, was held hours after Trump slammed "fake news" media during a speech at the Conservative Political Action Conference (CPAC). "A few days ago I called the fake news the enemy of the people, and they are — they are the enemy of the people," Trump maintained. The White House Friday specifically pushed back against reports that chief of staff Reince Priebus had asked the FBI to dispute news stories about Trump aides' ties to Russia. Spicer went back and forth with several reporters about those particular reports with journalists in the off-camera meeting. 
  •  
    The White House has discriminated among press members with access for a very long time. E.g., the Obama White House's ban on Helen Thomas a couple of years back after she was wrongfully accused of an anti-semitic statement by neoconvervative attack dogs. I don't know any legal theory under which the banned media organizations could try to litigate the decision. But note that the ban applies to some of the very biggest among the presstitute media. This will be a fun story to watch as it unfolds.
2More

Wikileaks Releases "NightSkies 1.2": Proof CIA Bugs "Factory Fresh" iPhones | Zero Hedge - 0 views

  • The latest leaks from WikiLeaks' Vault 7 is titled “Dark Matter” and claims that the CIA has been bugging “factory fresh” iPhones since at least 2008 through suppliers.
  • And here is the full press release from WikiLeaks: Today, March 23rd 2017, WikiLeaks releases Vault 7 "Dark Matter", which contains documentation for several CIA projects that infect Apple Mac Computer firmware (meaning the infection persists even if the operating system is re-installed) developed by the CIA's Embedded Development Branch (EDB). These documents explain the techniques used by CIA to gain 'persistence' on Apple Mac devices, including Macs and iPhones and demonstrate their use of EFI/UEFI and firmware malware.   Among others, these documents reveal the "Sonic Screwdriver" project which, as explained by the CIA, is a "mechanism for executing code on peripheral devices while a Mac laptop or desktop is booting" allowing an attacker to boot its attack software for example from a USB stick "even when a firmware password is enabled". The CIA's "Sonic Screwdriver" infector is stored on the modified firmware of an Apple Thunderbolt-to-Ethernet adapter.   "DarkSeaSkies" is "an implant that persists in the EFI firmware of an Apple MacBook Air computer" and consists of "DarkMatter", "SeaPea" and "NightSkies", respectively EFI, kernel-space and user-space implants.   Documents on the "Triton" MacOSX malware, its infector "Dark Mallet" and its EFI-persistent version "DerStake" are also included in this release. While the DerStake1.4 manual released today dates to 2013, other Vault 7 documents show that as of 2016 the CIA continues to rely on and update these systems and is working on the production of DerStarke2.0.   Also included in this release is the manual for the CIA's "NightSkies 1.2" a "beacon/loader/implant tool" for the Apple iPhone. Noteworthy is that NightSkies had reached 1.2 by 2008, and is expressly designed to be physically installed onto factory fresh iPhones. i.e the CIA has been infecting the iPhone supply chain of its targets since at least 2008.   While CIA assets are sometimes used to physically infect systems in the custody of a target it is likely that many CIA physical access attacks have infected the targeted organization's supply chain including by interdicting mail orders and other shipments (opening, infecting, and resending) leaving the United States or otherwise.
4More

Activists Take Credit for Notorious FBI Raid That Spilled Secrets-Forty-two Years Ago |... - 0 views

  • It’s a mystery I covered from the start and now it has been solved. A big breaking story this morning features startling revelations about the infamous raid by antiwar activists on the FBI office in Media, Pennsylvania, (yes, that’s the name) in 1971, on the night of the Ali-Frazier “fight of the century,” who are finally exposing themselves in a new book and film. The book is by the Washington Post reporter who received some of the leak files back then, Betty Medsger. The activists, none of them household names then or now, cleared out all the files there that day and this led to the first big scoops on illegal FBI surveillance and the notorious COINTELPRO program, which we covered so widely at Crawdaddy that decade. One of the perps even waved to Edward Snowden on the Today show today and said, “Hi, from one whistleblower to another.” And The New York Times has now posted a thirteen-minute video.
  • Of course, by 1971, there had been rumors and personal reports about undercover FBI snooping, including use of electronic surveillance, for years but with little black-and-white official evidence. Hell, we even had a break-in at the Crawdaddy office that seemed suspicious and, as a longtime (if minor) antiwar activist, I always figured I might have drawn some official attention. But the Media raid proved incredibly valuable, even as it made many of us more paranoid. Indeed, as NBC reports: Among the stolen files: plans to enhance “paranoia” among “New Left” groups by instilling fears that “there is an FBI agent behind every mailbox.” Another instructed agents in the Philadelphia area to monitor the “clientele” of “Afro-American type bookstores” and recruit informants among the “the Negro militant movement.” The raid and its results didn’t immediately stop COINTELPRO, then run by good old Deep Throat himself, Mark Felt.
  • the Media raid had finally produced some of the aims sought by the burglars. From NBC: “These documents were explosive,” said Medsger, who was the first reporter to write about them after receiving a batch of the files anonymously in the mail. Her book traces how the stolen files led to a landmark Senate investigation of intelligence and law enforcement agency abuses by the late Idaho Sen. Frank Church, and eventually to new Justice Department guidelines that barred the bureau from conducting investigations based on First Amendment protected political activity. After the burglary, said Medsger, “The FBI was never the same.” Glenn Greenwald weighs in on today’s revelations. He is, of course, supportive of the 1971 action.
  •  
    The New York Times video is worth watching for its historical footage and the linked post by Glenn Greenwald adds valuable perspective about the failure of NYT and the LA Times to do anything with the documents. Only the Washington Post pushed the story. One might wonder if these days, any mainstream media might have covered the Snowden documents had The Guardian not told The Washington Post that the Guardian was going to run with the story regardless. 
4More

'We can't let Israel determine when and where U.S. goes to war,' says Feinstein, but Hi... - 0 views

  • the new Iran sanctions bill that would kill Obama’s historic deal with Iran. And today’s bottom line is, Opposition to the warmongers is firming up. Jim Lobe reports that Senator Feinstein’s speech (above) may have killed AIPAC’s hopes of passing the new sanctions with a veto-proof Senate majority, at least until the AIPAC policy conference in the spring. Lobe notes that financial incentives to block the Iran deal also affect media: Tuesday’s floor speech by Senate Intelligence Committee Chair Dianne Feinstein could bury AIPAC’s hopes of winning passage of what I have called the Kirk-Menendez Wag the Dog Act of 2013…at least for the next month or so. The speech, which was remarkably comprehensive in rebutting virtually every argument made by AIPAC and the 59 co-sponsors in favor of the bill, comes amid a surprising spate of newspaper editorials against the bill, particularly given the dearth of actual news coverage about it. Newspapers that have taken position against the legislation in just the last few days include the Minneapolis Star Tribune, USA Today, the New York Times, and the often-neoconservative-leaning Washington Post. As cash-poor as they are, newspapers are still less susceptible to the kind of pressure exerted by AIPAC and its associated PACs that are able to provide — or deny — substantial cash for political campaigns.
  • So is the new Jeff Bezos/Washington Post showing a little vertebrae? And what about the new Chris Hughes/New Republic. Ryan Cooper has a piece up there trashing Cory Booker as a warmonger.
  • Recall that the newspaper editorials denouncing the bill as a march toward war followed a forceful White House statement that called out the warmongers: “The American people have been clear that they prefer a peaceful resolution to this issue. If certain members of Congress want the United States to take military action, they should be up front with the American public and say so,” said security aide Bridget Meehan. That put AIPAC supporter Steny Hoyer on the defensive. Politico:
  •  
    Whether the new sanctions bill passes or not, we have a watershed moment: Members of Congress and mainstream media have finally summoned the courage to tell the Israel Lobby "no" in public.  The obvious sources of that courage are polls showing that over 80 per cent of Americans oppose war with Iran.  The Israel Lobby's control of Congress has been airtight over the last few decades. Those who voted against the Israel Lobby's wishes faced massive campaign contributions to their opponents in the next election. Only relatively few members of Congress were secure enough in their seats to vote "no."
3More

Remember when Obama said the NSA wasn't "actually abusing" its powers? He was wrong. - 1 views

  • At a news conference Friday, President Obama insisted that the threat of NSA abuses was mostly theoretical: If you look at the reports, even the disclosures that Mr. Snowden’s put forward, all the stories that have been written, what you’re not reading about is the government actually abusing these programs and, you know, listening in on people’s phone calls or inappropriately reading people’s e-mails. What you’re hearing about is the prospect that these could be abused. Now part of the reason they’re not abused is because they’re — these checks are in place, and those abuses would be against the law and would be against the orders of the FISC [Foreign Intelligence Surveillance Court]. Today our colleague Barton Gellman released new documents that contradicted Obama’s claims. Gellman obtained an audit of the NSA’s compliance record from NSA leaker Snowden earlier this summer. The audit, dated May 2012, counted 2,776 incidents in the preceding 12 months where the agency engaged in “unauthorized collection, storage, access to or distribution of legally protected communications.” The audit only covered issues at NSA facilities in the D.C. and Fort Meade areas.
  • Obama said that wasn’t supposed to happen because it would be “against the orders of the FISC.” So why didn’t the judges on the court catch these abuses? In another story broken by The Post today, the chief of the Foreign Intelligence Surveillance Act (FISA) Court admits he doesn’t actually have the capability to investigate the compliance record of NSA surveillance programs:
  • Under the FISA regime, the government doesn’t have to seek permission for individual surveillance targets. Instead, it seeks FISC approval for broad schemes of surveillance like PRISM and the phone records program. But that makes it extremely difficult for the FISC to check the court’s work, since the NSA can — and, apparently, did — hide misconduct from the court that’s supposedly supervising its activities.
1More

U.S. 'planned to launch chemical weapon attack on Syria and blame it on Assad' | Mail O... - 0 views

  •  
    From the Marbux diigo collection - Check out the date on this report: January 29th, 2013. The email is dated December 25th, 2012. "Leaked emails have allegedly proved that the White House gave the green light to a chemical weapons attack in Syria that could be blamed on Assad's regime and in turn, spur international military action in the devastated country. A report released on Monday contains an email exchange between two senior officials at British-based contractor Britam Defence where a scheme 'approved by Washington' is outlined explaining that Qatar would fund rebel forces in Syria to use chemical weapons. Barack Obama made it clear to Syrian president Bashar al-Assad last month that the U.S. would not tolerate Syria using chemical weapons against its own people."
3More

Has the NSA Wiretapping Violated Attorney-Client Privilege? | The Nation - 0 views

  • The first time Adis Medunjanin tried to call Robert C. Gottlieb in mid-2009, Gottlieb was out of the office. Medunjanin was agitated. He had to speak to an attorney. Gottlieb’s assistant told him Gottlieb would be back soon. When Medunjanin spoke to the lawyer a little later, he was told he might need legal representation. He thought he might be under investigation. Over the next six months and in forty-two phone calls, Medunjanin sought legal advice from Gottlieb. When he was arrested in January 2010 on charges that he tried to bomb the New York subway, it was Gottlieb who defended him, receiving security clearance to review government documents pertinent to the case in the process. Gottlieb was preparing Medunjanin’s defense when a federal officer in charge of information distribution e-mailed him that there was new classified information he needed to review at the US Eastern District Court in Brooklyn. “I went over to the Brooklyn Federal courthouse, went up to the secured room, gained entry with the secret security codes, opened the file cabinet that is also secure and in the second drawer was a CD,” Gottlieb told me. On that CD were recordings of every single one of his forty-two phone calls with Medunjanin before he was taken into custody and indicted on January 7, 2010.
  • Such calls are normally sacrosanct under the principle of attorney-client privilege, the ability to speak confidentially with your lawyer. But a leak to The Guardian last summer of National Security Agency (NSA) procedures that are supposed to protect privileged calls showed that some attorney-client privileged calls are not subject to internal rules that detail the instances when a wiretap should be turned off. A later version of the procedures declassified by the NSA last August contains the same language. These “minimization” procedures, as they are known, are the rules and regulations for wiretaps under the Foreign Intelligence Surveillance Act (FISA). They tell NSA agents when they can listen, and when they have to turn the tap off, when they can record and when they should not be recording. There are rules for which kinds of communications can be monitored—for example, domestic communications are off limits, although communications from agents of foreign powers and suspected terrorists don’t count as domestic—and there is a section that provides for the protection of attorney-client calls.
  • Section four of the declassified 2011 guidelines is the part of that document that governs wiretapping attorney-client calls. At first glance, it seems quite clear: when the agent realizes that he or she is monitoring an attorney-client communication, “monitoring of that communication will cease and the communication will be identified as an attorney-client communication in a log maintained for that purpose.” But given a second reading, section four doesn’t apply to all attorney-client calls. It provides only for the minimization (and protection) of the calls of “a person who is known to be under criminal indictment in the United States”—someone who has already been charged under US law. This is because indicted persons have a Sixth Amendment right to counsel. People who aren’t indicted don’t have this right, and so their calls are not minimized. When I asked an NSA press officer, Vanee’ M. Vines, how attorney-client privilege was protected, she referred me to the Department of Justice. I left several messages, but the DOJ never contacted me back.
2More

Bush Lets U.S. Spy on Callers Without Courts - New York Times - 0 views

  • Months after the Sept. 11 attacks, President Bush secretly authorized the National Security Agency to eavesdrop on Americans and others inside the United States to search for evidence of terrorist activity without the court-approved warrants ordinarily required for domestic spying, according to government officials. Under a presidential order signed in 2002, the intelligence agency has monitored the international telephone calls and international e-mail messages of hundreds, perhaps thousands, of people inside the United States without warrants over the past three years in an effort to track possible "dirty numbers" linked to Al Qaeda, the officials said. The agency, they said, still seeks warrants to monitor entirely domestic communications. The previously undisclosed decision to permit some eavesdropping inside the country without court approval was a major shift in American intelligence-gathering practices, particularly for the National Security Agency, whose mission is to spy on communications abroad. As a result, some officials familiar with the continuing operation have questioned whether the surveillance has stretched, if not crossed, constitutional limits on legal searches.
  •  
    This is the 2005 article that alerted the nation to the fact that the Bush II Administration had, shortly after 9-11-2001, authorized the NSA to conduct warrantless electronic eavesdropping on Americans. It would later emerge that veteran NSA intelligence analyst Russell Tice, the first NSA whistleblower, was a key source for the article. http://en.wikipedia.org/wiki/Russ_Tice Post-Snowden disclosures, Tice went public with even more detail, disclosing that the NSA has also wiretapped top officials in all three branches of government, as well as non-government targets in the U.S. http://www.washingtonsblog.com/2013/06/nsa-whistleblower-nsa-spying-on-and-blackmailing-high-level-government-officials-and-military-officers.html (for the quoted portions, begin listening at about 44 minutes into the podcast). The third from last paragraph in the article discusses a 2002 Justice Department brief in which DoJ argued that "the Constitution vests in the President inherent authority to conduct warrantless intelligence surveillance (electronic or otherwise) of foreign powers or their agents, and Congress cannot by statute extinguish that constitutional authority." That brief is archived at the FAS web site. https://www.fas.org/irp/agency/doj/fisa/092502sup.html (it's an amazingly arrogant document). 
5More

Leaked conversation about Ukraine fans U.S.-Russian tensions - The Globe and Mail - 0 views

  • Ukraine’s protest standoff came dangerously close to becoming a direct confrontation between Russia and the United States on Thursday as shockingly unguarded words from Washington and Moscow officials reached public ears, either voluntarily or otherwise.A recording of a phone conversation between two senior U.S. diplomatic officials, in which they discussed their efforts to influence the membership of the Ukrainian government that would be formed to replace the one dismissed under protester pressure by President Viktor Yanukovych, was leaked to the public – almost certainly by an intelligence agency – just as one of Russian President Vladimir Putin’s top aides issued a direct threat to the United States over its involvement in Ukrainian affairs.
  • Mr. Yanukovych’s explicitly pro-Russian government has long been accused of being a puppet of Mr. Putin – especially after it abandoned a European Union open-borders treaty in November to instead endorse a trade-and-aid deal with Russia, a move that angered many Ukrainians and provoked the protests that have convulsed the nation for two months.But now, with the leak of the apparently bugged State Department call, the Kremlin and Mr. Yanukovych have new ammunition with which it can accuse the protesters of being puppets of U.S. and European agendas.
  • The call, if it is genuine, was posted on YouTube by an anonymous source on Tuesday under the headline “puppets of Maidan,” a reference to the protests in Kiev’s central square. It was then linked on Twitter by Russian government officials on Thursday – exactly as U.S. and European Union officials were descending on Kiev to try to broker a resignation, a new election and a constitutional change from Mr. Yanukovych.The voices the audio resemble those of Assistant Secretary of State Victoria Nuland and Geoffrey Pyatt, the U.S. ambassador to Ukraine. They appear to be talking about their preference of political party leaders to form a new Ukrainian government, and about their efforts, including several phone calls to Mr. Yanukovych by Vice President Joe Biden, to influence that outcome. The EU was prepared to begin negotiating government-opposition talks toward a new government on Friday.Much of the call is devoted to efforts to keep Ukrainian liberal parties in government, and to prevent right-wing ultranationalist parties, which have been prominent in the protest movement, from gaining influence.
  • ...2 more annotations...
  • “I’m just thinking in terms of sort of the process moving ahead, we want to keep the moderate democrats together,” Mr. Pyatt says at one point. Ms. Nulund explicitly endorses moderate opposition party leader Arseniy Yatseniuk and argues that “what he needs” is fellow opposition leaders Vitali Klitschko, a former boxer with a populist style, and Oleh Tiahnybok, a far-right leader whose party is known for intolerance.“I think Yats [Yatseniuk] is the guy who’s got the economic experience, the governing experience … what he needs is Klitsch and Tiahnybok on the outside,” she adds. Mr. Pyatt says: “Let me work on Klitschko, and I think we get a Western personality to come out here and midwife this thing.”And then Ms. Nuland says, a propos of nothing: “And you know, fuck the EU.” This was an apparent reference to the EU’s hesitancy to threaten to impose sanctions on the Yanukovych government, something the U.S. – and Canada – have done. On Thursday, the European Parliament voted to impose limited sanctions, including the stripping of visas, on Ukrainian officials directly responsible for violence.
  • Sergei Glazyev, a top adviser to the Russian president, said that U.S. “interference” contravened a 1994 treaty that granted Ukraine its independence from the Soviet Union and guaranteed that outside nations would not intervene. Russian leaders, he told the paper, “are obliged to intervene when conflict situations of this nature arise.”Asked if violence should be used to remove the protesters, Mr. Glazyev said: “As for starting to use force, in a situation where the authorities face an attempted coup d’état, they simply have no other course of action. Otherwise, the country will be plunged into chaos.”
2More

Breaking News on EFF Victory: Appeals Court Holds that Email Privacy Protected by Fourt... - 0 views

  • In a landmark decision issued today in the criminal appeal of U.S. v. Warshak, the Sixth Circuit Court of Appeals has ruled that the government must have a search warrant before it can secretly seize and search emails stored by email service providers. Closely tracking arguments made by EFF in its amicus brief, the court found that email users have the same reasonable expectation of privacy in their stored email as they do in their phone calls and postal mail.
  •  
    From 2010, an important decision by the Sixth Circuit. 
7More

Catalog Reveals NSA Has Back Doors for Numerous Devices - SPIEGEL ONLINE - 0 views

  • When it comes to modern firewalls for corporate computer networks, the world's second largest network equipment manufacturer doesn't skimp on praising its own work. According to Juniper Networks' online PR copy, the company's products are "ideal" for protecting large companies and computing centers from unwanted access from outside. They claim the performance of the company's special computers is "unmatched" and their firewalls are the "best-in-class." Despite these assurances, though, there is one attacker none of these products can fend off -- the United States' National Security Agency.
  • Specialists at the intelligence organization succeeded years ago in penetrating the company's digital firewalls. A document viewed by SPIEGEL resembling a product catalog reveals that an NSA division called ANT has burrowed its way into nearly all the security architecture made by the major players in the industry -- including American global market leader Cisco and its Chinese competitor Huawei, but also producers of mass-market goods, such as US computer-maker Dell.
  • The specialists at ANT, which presumably stands for Advanced or Access Network Technology, could be described as master carpenters for the NSA's department for Tailored Access Operations (TAO). In cases where TAO's usual hacking and data-skimming methods don't suffice, ANT workers step in with their special tools, penetrating networking equipment, monitoring mobile phones and computers and diverting or even modifying data. Such "implants," as they are referred to in NSA parlance, have played a considerable role in the intelligence agency's ability to establish a global covert network that operates alongside the Internet. Some of the equipment available is quite inexpensive. A rigged monitor cable that allows "TAO personnel to see what is displayed on the targeted monitor," for example, is available for just $30. But an "active GSM base station" -- a tool that makes it possible to mimic a mobile phone tower and thus monitor cell phones -- costs a full $40,000. Computer bugging devices disguised as normal USB plugs, capable of sending and receiving data via radio undetected, are available in packs of 50 for over $1 million.
  • ...3 more annotations...
  • These NSA agents, who specialize in secret back doors, are able to keep an eye on all levels of our digital lives -- from computing centers to individual computers, and from laptops to mobile phones. For nearly every lock, ANT seems to have a key in its toolbox. And no matter what walls companies erect, the NSA's specialists seem already to have gotten past them. This, at least, is the impression gained from flipping through the 50-page document. The list reads like a mail-order catalog, one from which other NSA employees can order technologies from the ANT division for tapping their targets' data. The catalog even lists the prices for these electronic break-in tools, with costs ranging from free to $250,000. In the case of Juniper, the name of this particular digital lock pick is "FEEDTROUGH." This malware burrows into Juniper firewalls and makes it possible to smuggle other NSA programs into mainframe computers. Thanks to FEEDTROUGH, these implants can, by design, even survive "across reboots and software upgrades." In this way, US government spies can secure themselves a permanent presence in computer networks. The catalog states that FEEDTROUGH "has been deployed on many target platforms."
  • The ANT division doesn't just manufacture surveillance hardware. It also develops software for special tasks. The ANT developers have a clear preference for planting their malicious code in so-called BIOS, software located on a computer's motherboard that is the first thing to load when a computer is turned on. This has a number of valuable advantages: an infected PC or server appears to be functioning normally, so the infection remains invisible to virus protection and other security programs. And even if the hard drive of an infected computer has been completely erased and a new operating system is installed, the ANT malware can continue to function and ensures that new spyware can once again be loaded onto what is presumed to be a clean computer. The ANT developers call this "Persistence" and believe this approach has provided them with the possibility of permanent access. Another program attacks the firmware in hard drives manufactured by Western Digital, Seagate, Maxtor and Samsung, all of which, with the exception of the latter, are American companies. Here, too, it appears the US intelligence agency is compromising the technology and products of American companies.
  • Other ANT programs target Internet routers meant for professional use or hardware firewalls intended to protect company networks from online attacks. Many digital attack weapons are "remotely installable" -- in other words, over the Internet. Others require a direct attack on an end-user device -- an "interdiction," as it is known in NSA jargon -- in order to install malware or bugging equipment. There is no information in the documents seen by SPIEGEL to suggest that the companies whose products are mentioned in the catalog provided any support to the NSA or even had any knowledge of the intelligence solutions. "Cisco does not work with any government to modify our equipment, nor to implement any so-called security 'back doors' in our products," the company said in a statement. Contacted by SPIEGEL reporters, officials at Western Digital, Juniper Networks and Huawei also said they had no knowledge of any such modifications. Meanwhile, Dell officials said the company "respects and complies with the laws of all countries in which it operates." Many of the items in the software solutions catalog date from 2008, and some of the target server systems that are listed are no longer on the market today. At the same time, it's not as if the hackers within the ANT division have been sleeping on the job. They have continued to develop their arsenal. Some pages in the 2008 catalog, for example, list new systems for which no tools yet exist. However, the authors promise they are already hard at work developing new tools and that they will be "pursued for a future release."
  •  
    Oh, great. My router and all of my hard drives have NSA backdoors in them. And my BIOS on the Linux box may be infected with a backdoor. What are the odds that NSA has not developed similar capability for the UEFI on our two newer Windows boxes? 
5More

NSA Spied on Chinese Government and Networking Firm Huawei - SPIEGEL ONLINE - 0 views

  • According to documents viewed by SPIEGEL, America'a NSA intelligence agency put considerable efforts into spying on Chinese politicians and firms. One major target was Huawei, a company that is fast becoming a major Internet player.
  • The American government conducted a major intelligence offensive against China, with targets including the Chinese government and networking company Huawei, according to documents from former NSA worker Edward Snowden that have been viewed by SPIEGEL. Among the American intelligence service's targets were former Chinese President Hu Jintao, the Chinese Trade Ministry, banks, as well as telecommunications companies. But the NSA made a special effort to target Huawei. With 150,000 employees and €28 billion ($38.6 billion) in annual revenues, the company is the world's second largest network equipment supplier. At the beginning of 2009, the NSA began an extensive operation, referred to internally as "Shotgiant," against the company, which is considered a major competitor to US-based Cisco. The company produces smartphones and tablets, but also mobile phone infrastructure, WLAN routers and fiber optic cable -- the kind of technology that is decisive in the NSA's battle for data supremacy. A special unit with the US intelligence agency succeeded in infiltrating Huwaei's network and copied a list of 1,400 customers as well as internal documents providing training to engineers on the use of Huwaei products, among other things.
  • According to a top secret NSA presentation, NSA workers not only succeeded in accessing the email archive, but also the secret source code of individual Huwaei products. Software source code is the holy grail of computer companies. Because Huawei directed all mail traffic from its employees through a central office in Shenzhen, where the NSA had infiltrated the network, the Americans were able to read a large share of the email sent by company workers beginning in January 2009, including messages from company CEO Ren Zhengfei and Chairwoman Sun Yafang. "We currently have good access and so much data that we don't know what to do with it," states one internal document. As justification for targeting the company, an NSA document claims that "many of our targets communicate over Huawei produced products, we want to make sure that we know how to exploit these products." The agency also states concern that "Huawei's widespread infrastructure will provide the PRC (People's Republic of China) with SIGINT capabilities." SIGINT is agency jargon for signals intelligence. The documents do not state whether the agency found information indicating that to be the case.
  • ...2 more annotations...
  • The operation was conducted with the involvement of the White House intelligence coordinator and the FBI. One document states that the threat posed by Huawei is "unique". The agency also stated in a document that "the intelligence community structures are not suited for handling issues that combine economic, counterintelligence, military influence and telecommunications infrastructure from one entity."
  • Editor's note: A longer version of this story will appear in German in the issue of SPIEGEL to be published on Monday.
8More

Half of Federal Agencies Still Use Outdated Freedom of Information Regulations - 0 views

  • Nearly half (50 out of 101) of all federal agencies have still not updated their Freedom of Information Act regulations to comply with Congress's 2007 FOIA amendments, and even more agencies (55 of 101) have FOIA regulations that predate and ignore President Obama's and Attorney General Holder's 2009 guidance for a "presumption of disclosure," according to the new National Security Archive FOIA Audit released today to mark Sunshine Week. Congress amended the Freedom of Information Act in 2007 to prohibit agencies from charging processing fees if they missed their response deadlines, to include new online journalists in the fee waiver category for the media, to order agencies to cooperate with the new FOIA ombudsman (the Office of Government Information Services, OGIS), and to require reports of specific data on their FOIA output, among other provisions co-authored by Senators Patrick Leahy (D-VT) and John Cornyn (R-TX). But half the government has yet to incorporate these changes in their regulations, according to the latest National Security Archive FOIA Audit. After President Obama's "Day One" commitments to open government, Attorney General Eric Holder issued new FOIA guidance on March 19, 2009, declaring that agencies should adopt a "presumption of disclosure," encourage discretionary releases if there was no foreseeable harm (even if technically covered by an exemption), proactively post the records of greatest public interest online, and remove "unnecessary bureaucratic hurdles" from the FOIA process. But five years later, the Archive found a majority of agencies have old regulations that simply ignore this guidance.
  • The Archive's FOIA Audit also highlights some good news this Sunshine Week: New plans from both the House of Representatives and White House have the potential to compel delinquent agencies to update their regulations. "Both Congress and the White House now recognize the problem of outdated FOIA regulations, and that is something to celebrate," said Archive director Tom Blanton. "But new regs should not follow the Justice Department's terrible lead, they must follow the best practices already identified by the FOIA ombuds office and FOIA experts." "If and when this important FOIA reform occurs, open government watchdogs must be vigilant to ensure that the agencies' updated regulations are progressive, rather than regressive, and embrace best practices to ensure that more documents are released to requesters, more quickly" said Nate Jones, the Archive's FOIA coordinator.
  • In 2011, the back-to-back Rosemary Award-winning Department of Justice proposed FOIA regulations that would have — among many other FOIA setbacks — allowed the Department to lie to FOIA requesters, eliminated online-only publications from receiving media fee status, and made it easier to destroy records. After intense pushback by openness advocates, the DOJ temporarily pulled these regulations, and Pustay claimed, "some people misinterpreted what we were trying to do, misconstrued some of the provisions, and didn't necessarily understand some of the fee guidelines." Pustay also claimed — to an incredulous Senate Judiciary Committee — that updating FOIA regulations to conform with the 2007 OPEN Government Act was merely optional and "not required." National Security Archive director Tom Blanton warned in his own 2013 Senate testimony that these terrible "vampire" regulations were not gone for good. This year, Pustay testified that the Department of Justice has indeed resubmitted its FOIA regulations for OMB approval; their content is unknown to the public.
  • ...4 more annotations...
  • The House of Representatives recently unanimously passed the bipartisan Freedom of Information Act Implementation Act (H.R. 1211), which includes a provision compelling agencies to update their FOIA regulations. The House bill — which now awaits Senate approval — would require each agency to update its FOIA regulations "not later than 180 days after the enactment of this Act." The White House is also addressing the problem of outdated FOIA regulations, albeit in a different manner. In its latest Open Government Partnership National Action Plan, the White House has committed (on paper, at least) to creating one "core FOIA regulation and common set of practices [that] would make it easier for requesters to understand and navigate the FOIA process and easier for the Government to keep regulations up to date." Transparency watchdogs went on alert this week after the Department of Justice's Director of Information Policy Melanie Pustay announced during her Senate testimony on March 11, 2014 that, "My office is leading that project" to create the White House-backed common regulation which, she estimated will be, "a one or two year project." Despite Pustay's pledge that she would accept input from OGIS and the requester community, her Department's history of crafting FOIA regulations has been anything but stellar.
  • As the Department of Justice and other agencies have demonstrated, new regulations do not necessarily make good regulations. As such, the National Security Archive has recommended that any updated FOIA regulations must: mandate that FOIA officers embrace direct communications with requesters; require agencies to receive requests by e-mail and post all responses and documents online; direct agencies to update their FOIA processing software so documents can be posted to any online repository, including the government-sponsored FOIAonline; encourage agencies to join FOIAonline to make their FOIA processing more cost-effective and efficient; stream-line inter and intra-agency "referral" black holes — and keep requesters abreast of where their requests are if the agency does have to refer them; include language encouraging use of the OGIS, which can help requesters and agencies mediate disputes to avoid animosity and costly litigation; end the practice of using fees to discourage FOIA requesters. The Office of Government Information Services — which reviews and comments on agency regulations as they are proposed — has also compiled a list of best practices for agencies to consider while crafting regulations. These include: "let the Freedom of Information Act itself" — and its presumption for disclosure — "be your guide;" bring attorneys, FOIA processors, records managers and IT pros to the table; include your plan for records management and preservation; and alert requesters of their option to contact OGIS for mediation and dispute resolution services.
  • A useful compilation of current agency FOIA regulation language — already on the books — put together by the Center of Effective Government also includes helpful guidelines on preventing the destruction of requested records; narrowly interpreting claims of confidential business information; and clarifying fee waivers and procedures. FOIA experts are currently working to craft model, pro-transparency, CFR-ready language that agencies — or the drafters of government-wide common regulations — can use to bring agencies' Freedom of Information Act regulations up to standard. Watch this space, and then watch the Code of Federal Regulations (CFR). "As the staffer who waded through every single federal agencies' FOIA website and CFR chapter to locate their — sometimes hidden — regulations, I learned FOIA officials often say they view their FOIA requesters as customers," said Archive researcher Lauren Harper, "I think easy to find, updated model FOIA regulations are the best way for agencies to demonstrate they truly value their customer service, and the spirit of the FOIA."
  • The National Security Archive has conducted thirteen FOIA audits since 2002. Modeled after the California Sunshine Survey and subsequent state "FOI Audits," the Archive's FOIA Audits use open-government laws to test whether or not agencies are obeying those same laws. Recommendations from previous Archive FOIA Audits have led directly to laws and executive orders which have: set explicit customer service guidelines, mandated FOIA backlog reduction, assigned individualized FOIA tracking numbers, forced agencies to report the average number of days needed to process requests, and revealed the (often embarrassing) ages of the oldest pending FOIA requests. The surveys include:
  •  
    Article includes tables indicating which agencies are out of compliance with which FOIA directives. 
5More

Globe in Ukraine: Ukraine accuses Russia of staging 'military invasion' - The Globe and... - 0 views

  • Ukraine accused Russia on Saturday of having staged a “military invasion” of the country, saying Russian troops had seized one village outside Crimea and briefly landed at another.In a statement posted to its website, Ukraine’s Ministry of Foreign Affairs said 80 Russian soldiers – supported by four helicopter gunships supported by four helicopter gunships and three “armoured combat machines” – seized the town of Strilkove on Saturday. Strilkove, which is home to 1,300 people, is about 16 kilometres outside of Crimea, on a thin peninsula in adjacent Kherson oblast.
  • Earlier in the day, the Ukrainian Defence Ministry said it had “repelled” – apparently without any shots being fired – another landing by dozens of Russian paratroopers 28 kilometres further into Kherson oblast, at Arbatskaya Strelka. The Ukrainian military said its air force had been used in forcing the Russians to withdraw.The alleged incursions come one day before a referendum in Crimea, a predominantly Russian-speaking region on Ukraine’s Black Sea coast, asking its two million residents whether they wish to join the Russian Federation.The Kherson region supplies Crimea with most of its electricity, water and natural gas. The paratrooper landing at Arbatskaya Strelka appeared aimed at capturing a natural gas distribution facility there.
  • There was no immediate confirmation or denial from the Russian Foreign Ministry of the military moves outside Crimea. On Friday, Russian Foreign Minister Sergei Lavrov told U.S. Secretary of State John Kerry at a meeting in London that Moscow “has no, and cannot have, any plans to invade the southeast region of Ukraine.”If the Ukrainian accusations are correct, the incursions would mark a serious escalation of the crisis here, which began last month when pro-Western protesters in Kiev ousted the Moscow-backed government of Viktor Yanukovych.
  • ...2 more annotations...
  • Ukraine says Russia has already deployed almost 20,000 troops in Crimea, which ordinarily hosts the sailors and soldiers affiliated with Russia’s Black Sea Fleet, ahead of Sunday’s referendum. Tens of thousands more – plus artillery and tank units – are currently taking part in snap exercises in areas near Russia’s border with eastern Ukraine, while Kiev is hastily mobilizing a new National Guard to supplement its own underprepared military forces.Worries are high that Russia will decide to send troops into eastern Ukraine, which has seen violent clashes this week between pro-Russian and pro-Kiev protesters in the cities of Kharkiv and Donetsk.The Russian Foreign Ministry said Saturday that it was “receiving many appeals from peaceful citizens who are asking for protection.” The requests for Russian help “will be considered,” the ministry said.
  • Russia used its veto power at the United Nations Security Council to block a draft resolution Saturday that criticized the referendum. Thirteen of the 15 members of the Security Council supported the motion, while China abstained.
« First ‹ Previous 101 - 120 of 205 Next › Last »
Showing 20 items per page