Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged mass-surveillance

Rss Feed Group items tagged

Paul Merrell

NSA slides explain the PRISM data-collection program - The Washington Post - 0 views

  •  
    Washington Post page of all slides disclosed thus far regarding the Prism database, and more. 
Paul Merrell

CIA's Financial Spying Bags Data on Americans - WSJ.com - 0 views

  • The Central Intelligence Agency is building a vast database of international money transfers that includes millions of Americans' financial and personal data, officials familiar with the program say. The program, which collects information from U.S. money-transfer companies including Western Union, is carried out under the same provision of the Patriot Act that enables the National Security Agency to collect nearly all American phone records, the officials said. Like the NSA program, the mass collection of financial...
Paul Merrell

Western Union shares fall on reported CIA news: Associated Press Business News - MSN Money - 0 views

  • (AP) - Western Union slumped 5 percent in trading Friday following a report by the Wall Street Journal that the CIA is building a database of international money transfer data.The report, citing unnamed officials familiar with the program, says the program collects information from U.S. money-transfer companies including Western Union. It is carried out under the same provision of the Patriot Act that enables the National Security Agency to collect nearly all American phone records.The mass collection of financial data includes millions of Americans' financial and personal data.
  • The CIA is barred from targeting Americans in its intelligence collection. But as a foreign-intelligence agency, it can conduct domestic operations for foreign intelligence purposes. The CIA program is meant to fill what U.S. officials see as an important gap in their ability to track terrorist financing world-wide, officials told the newspaper.Western Union said last month it would be spending about 4 percent of its revenue in 2014 on compliance with rules under the Patriot Act, the Treasury Department's Office of Foreign Assets Control and other anti-money-laundering and terrorist-financing requirements.Company spokesman Dan Díaz said that Western Union collects consumer information to comply with the Bank Secrecy Act and other laws. In doing so, the company also protect customers' privacy and works to prevent consumer fraud.Shares of The Western Union Co. fell 90 cents to $16.55 by late afternoon amid a broader market uptick.
Paul Merrell

Ed Markey letters from cellphone companies: How often AT&T, T-mobile give the governmen... - 0 views

  • Cellphones are the spies in our pockets, gathering information about whom we befriend, what we say, where we go, and what we read. That’s why Sen. Edward Markey, D-Mass., recently asked the nation’s major cellphone companies to disclose how frequently they receive requests from law enforcement for customer call records—including the content of communications, numbers dialed, websites visited, and location data. Sometimes police have a warrant, sometimes they don’t. Seven companies provided information in response to the inqury. The letters Markey received, which were covered today in the Boston Globe, Washington Post, and New York Times, show that the quantity of requests for these records is staggering. T-Mobile and AT&T together received nearly 600,000 requests for customer information in 2012. AT&T has to employ more than 100 full-time workers to process them. And police demand for our call records is growing rapidly, with requests to Verizon doubling in the last five years.
  • he companies keep records of where you have traveled in the past and can track you in real time—so law enforcement can do it, too. In some ways having a police officer track you in real time electronically is even worse, because you never know when it’s happening. Historical records can be even more sensitive than real-time tracking, stretching back for months or even years, and reveal your daily routine and every deviation from it.
  • Unfortunately, according to the companies’ letters, some of them appear to be handing over the content of our digital communications without a warrant. AT&T discloses stored texts or voicemails that are older than 180 days old with a subpoena—no court supervision or probable cause required. In one bright spot, T-Mobile requires a warrant for texts and voicemails. The letters also show that in its search for evidence about a handful of guilty people, law enforcement often obtains the data of hundreds or thousands of innocent people. For example, through a technique known as “tower dumps,” law enforcement agents can see all of the cellphones using a particular tower in a given time range. There were approximately 9,000 tower dumps reported in 2012 (with not all companies reporting). What happens to that data? Could it be used for future investigations? No one really knows, because there are no clear policies in place, and the people whose data is turned over are never notified.
  •  
    Note that this is about requests from *law enforcement," not from the federal spy agencies. 
Paul Merrell

Revealed: How the Nsa Targets Italy - 0 views

  • A special unit operating under cover and protected by diplomatic immunity, assigned to a very sensitive mission: to spy on the communication of the Italian leadership. That is what top secret documents leaked by Edward Snowden and published in Italy exclusively by l'Espresso in collaboration with "la Repubblica" reveal. A file mentions the "Special Collection Service " (SCS) sites in Rome and in Milan, the very same service which, according to the German weekly "Der Spiegel ", spied on the mobile phone of the German Chancellor, Angela Merkel. "Special Collection Sites", reads the file published today by l'Espresso, "provide considerable perishable intelligence on leadership communications largely facilitated by site presence within a national capital". These documents are very important because they contradict recent statements by the Italian Prime Minister reassuring the Italian Parliament. Speaking to the Chamber of Deputies four weeks ago, Enrico Letta said: "Based on the analysis conducted by our intelligence services and our international contacts, we are not aware that the security of the communications of the Italian government and embassies has been compromised, nor are we aware that the privacy of Italian citizens has been compromised". These top secret documents tell a different story, however.
  • The Special Collection Service is likely one of the most sensitive units in U.S. intelligence. The service deploys teams under diplomatic cover, operating in US embassies around the world to control friendly and enemy governments. The top secret NSA document examined by l'Espresso reveals that "in 1988 [SCS] had 88 sites, our peak". The SCS is assigned to a special mission: monitoring the communications of the political, and likely economical, leaders of host nations. For this reason, SCS teams operate within the heart of power: in embassies and consulates, working in close collaboration with the CIA. Also in Rome, in the US embassy located in via Veneto, from those very same roofs which witnessed the Dolce Vita. Snowden's files reveal that, at least until 2010, the Special Collection Service maintained two sites in Italy: one in Rome, a base staffed with agents, and one in Milan, the capital of the Italian economy where, according to a file dated 2010 and originally published in Der Spiegel, the SCS would run an unmanned site. Two sites in a relatively small country like Italy is unusual: only in Germany -- a prime target for NSA in Europe -- does SCS maintain two bases.
  • NSA's mass spying activities did not target our leadership and diplomacy alone, but it possibly also targeted millions of Italian citizens. A file on the top secret programme "Boundless Informant" that is labeled "Italy" reveals that between December 10, 2012 and January 9, 2013, the NSA collected the metadata for 45.893.570 telephone calls. Estimates close to this figure had already circulated, but now the actual document indicates the penetration of this monitoring. All of the metadata gathered in our country between December 10^th and January 9^th 2013 as reflected on this slide relate to phone communication, unlike the slides published in Germany and France, where internet communication metadata were targeted as well.
  • ...1 more annotation...
  • The Snowden file examined by l'Espresso reveals that the collection of phone metadata in Italy between December 10, 2012 and January 9, 2013 reached over four million metadata per day during the period of political crisis that culminated in the resignation of the Mario Monti government.
Paul Merrell

The Top 5 Claims That Defenders of the NSA Have to Stop Making to Remain Credible | Ele... - 0 views

  • Over the past year, as the Snowden revelations have rolled out, the government and its apologists have developed a set of talking points about mass spying that the public has now heard over and over again. From the President, to Hilary Clinton to Rep. Mike Rogers, Sen. Dianne Feinstein and many others, the arguments are often eerily similar. But as we approach the one year anniversary, it’s time to call out the key claims that have been thoroughly debunked and insist that the NSA apologists retire them.  So if you hear any one of these in the future, you can tell yourself straight up: “this person isn’t credible,” and look elsewhere for current information about the NSA spying. And if these are still in your talking points (you know who you are) it’s time to retire them if you want to remain credible. And next time, the talking points should stand the test of time.
Paul Merrell

David Davis' devastating attack on our loss of privacy | Mail Online - 0 views

  • The last time the main parties got together in a closed room, did a deal and told the country there was a need to act urgently, we were on the edge of abandoning 300 years of press freedom.This time our privacy is under threat. In the name of security, the Government is fast-tracking legislation through Parliament that will allow it to collect huge quantities of our personal data. We would do well to remember the advice of Ben Franklin: ‘Those who would give up essential liberty, to purchase a little temporary safety, deserve neither liberty nor safety.’
  • The Government has engineered a ‘theatrical emergency’ – in this case terrorism and hidden paedophile rings – to ram the Data Retention and Investigatory Powers Bill through Parliament without proper debate. It is an insult to the supremacy of Parliament, to democracy and to the trust of the public.It was April 8 when the European Court of Justice struck down the Data Retention Directive for being incompatible with human rights. The Home Office has had time to put an alternative in place, so the excuses for why the legislation is being  fast-tracked are laughable.
  • It is a sad state of affairs when European courts are a greater defender of our ancient rights than Parliament and Her Majesty’s Government. Even the German Supreme Court overturned its far less invasive data collection laws for violating the privacy rights of German citizens. How far we have slipped, this birthplace of democracy, that our own judicial safeguards stand by while our hard-fought rights are stripped from us by a Government that has lost its sense of proportion in its fear of making a mistake.
  • ...3 more annotations...
  • Even the statistics already released are cause for concern.  The 2013 report of the Interception of Communications Commissioner revealed that 514,608 requests were made for data. By comparison, the most requests issued by the FBI in a year is 56,507. How can it be our intelligence agencies made nine times the number of requests for communications data than their US counterparts?
  • After the ‘dodgy dossier’ on weapons of mass destruction, the deceit on rendition and torture, and the debacle over the snooper’s charter, it is hard to be confident.Our Government has claimed that intercepted communications data was the critical evidence in 95 per cent of all serious crime cases. This would seem to go against the experience of the Metropolitan Police, which in evidence to a joint committee stated that ‘communications data is used sparingly, because it is costly and resource intensive, and because of the need to… consider the impact of collateral intrusion on innocent people’.
  • What this Government is chasing is not public security, it is protection from blame if anything goes wrong. Those are not the same thing.One person’s loss of freedom is everybody’s loss of freedom, one person’s loss of privacy is everybody’s loss of privacy. We must stand up for our rights and not succumb to the politics of fear. Otherwise we give those who hate our civilisation an easy victory, without a shot being fired.
  •  
    A UK M.P. critiques the full court press in the House of Commons for new legislation attempting to work around the EU Court of Justice ruling on electronic communication data retention laws.  Very nice essay.
Paul Merrell

Angela Merkel under pressure to reveal all about US spying agreement | World news | The... - 0 views

  • Angela Merkel’s reputation as an unassailable chancellor is under threat amid mounting pressure for her to reveal how much she knew about a German-supported US spying operation on European companies and officials. The onus on her government to deliver answers over the spying scandal has only increased with the Austrian government’s announcement that it has filed a legal complaint against an unnamed party over “covert intelligence to the detriment of Austria”. EADS, now Airbus, one of the companies known to have been spied on by the BND – Germany’s foreign intelligence agency – is also taking legal action, saying it will file a complaint with prosecutors in Germany. The BND stands accused of spying on behalf of America’s NSA on European companies such as EADS, as well as the French presidency and the EU commission. There are also suspicions that German government workers and journalists were spied on.
  • The scandal has already strained relations within Merkel’s grand coalition, with many observers commenting that Gabriel was seeing the affair as a chance to make political gains. Political observers were lining up to remark that the crisis is the single most critical of Merkel’s decade in government and could even lead to her and her government’s downfall.
  • While Merkel appeared to have remained relatively unscathed by the scandal until now, an opinion poll showed that most Germans believed the trustworthiness of the three-times chancellor was now seriously at stake. 62% of Germans said her credibility was in doubt, according to the poll, carried out by the Insa institute, while 18% said it was not. Merkel told Radio Bremen in an interview that she was prepared to speak out over the allegations to a parliamentary committee. “I will testify there and justify myself to them where it is required,” she told the broadcaster.
  • ...5 more annotations...
  • Sigmar Gabriel, the deputy chancellor and economy minister, who is also the leader of the SPD, upped the ante still further by relaying a conversation he had with Merkel in which he asked her twice if the government had evidence of economic espionage, and she said no. He added that if it emerged Germany had been involved in helping the NSA spy on companies, it would greatly strain relations between business and the government and “put a large burden on the trust the economy has in government behaviour”.
  • The Social Democrats (SPD), Merkel’s government partners, along with Germany’s federal public prosecutor, Harald Range, are demanding the release of a list of “selectors” – 40,000 search terms used in the spying operations – the results of which were passed on to the NSA. “The list must be published and only then is clarification possible,” said Christine Lambrecht, parliamentary head of the SPD faction. Merkel has so far refused to allow its release. Her spokesman, Steffen Seibert, said she would make a decision on whether or not to do so only “once consultations with the American partners are completed”. Thomas de Maizière, the interior minister and a close Merkel confidante, is under even more pressure than the chancellor over allegations he lied about what he knew of BND/NSA cooperation. On Wednesday he answered questions on the affair to a parliamentary committee investigating the row, but only in camera and in a bug-proof room. Among other alleged shortcomings over the affair, he stands accused of failing to act when the BND informed him of the espionage activities in 2008 when he was Merkel’s chief of staff. He has repeatedly been portrayed in the tabloid media with a Pinocchio nose.
  • But the scandal has its roots much further back than Merkel’s own government, harking to a time when Europe was gripped by the cold war. Both the US and the UK, as victors of the second world war who had Germany under close supervision, ran spying networks from Germany, most notably from Bad Aibling in Bavaria, the biggest listening station outside the US and Britain. Officially, the US withdrew its operations in 2004. But unofficially it stayed there under an agreement in which Germany agreed to hand over its intelligence findings in return for the highly sophisticated technology the US was able to provide. The events of 9/11 and the revelations that three of the pilots had lived in Germany undetected only served to increase the pressure the US was able to put on Germany that its presence was necessary. Bad Aibling, officially now solely a BND listening facility, was the post used by the NSA in the current scandal.
  • The affair has underlined just how dependent Germany still is on the US and to a lesser extent the UK, on issues of intelligence and defence. Their desire for still-closer cooperation culminated in Operation Monkey Shoulder (named after a blend of three different types of malt whiskys) involving the BND, NSA and MI6, Spiegel recently revealed. With such a background, the German government has to appear to be criticising the US at the same time as underlining the importance of cooperation. Merkel, who appeared to be hugely at odds with the US government when it was revealed in 2013 that the NSA’s mass intelligence operation included tapping her mobile phone, has so far responded in a characteristically vague and flat manner. While acknowledging that allies should not spy on each other, she has stressed that spying’s most important role is to prevent terrorist attacks. “The government will do everything to guarantee the ability of the intelligence services,” she said on Monday. “Taking terrorist threats into account, that ability is only possible in cooperation with other agencies. That very much includes the NSA, as well as others.”
  • Commenting on the crisis, Spiegel magazine called it the “biggest challenge that the ‘Merkel Regime’ has had to face”, and potentially the “turning point of her chancellorship”. “She enjoys such trust because many Germans feel she looks after the country’s needs and their own very well. But the scandal … could cause the foundations of her power to crumble,” the magazine said.
Paul Merrell

WikiLeaks - NSA Helped CIA Outmanoeuvre Europe on Torture - 0 views

  • Central to today's publication is a Top Secret NSA intercept of the communications of Foreign Minister Steinmeier. The intercept dates from just after an official visit to the United States on 29 November 2005, where FM Steinmeier met his US counterpart, Secretary of State Condoleezza Rice. According to the intercept, Steinmeier "seemed relieved that he had not received any definitive response from the U.S. Secretary of State regarding press reports of CIA flights through Germany to secret prisons in eastern Europe allegedly used for interrogating terrorism suspects." The visit occurred in the context of an escalating and ongoing scandal in Europe over clandestine "rendition flights" conducted by the Central Intelligence Agency (CIA) using the airspace and airport facilities of cooperating European countries, in which it was alleged by leading news publications that European citizens and residents had been abducted outside of any legal process and taken to secret "black site" prisons, where they could be tortured with impunity. After the scandal emerged, European governments defied their publics, continuing to cooperate with the United States while denying all knowledge of rendition flights. These denials relied heavily on the insistence of European governments that they had received confidential "diplomatic assurances" from the United States that nothing illegal was taking place. It was subsequently shown in numerous court proceedings and commissions of inquiry that the activity was illegal. At the time of Steinmeier's meeting, reports of CIA rendition flights through Germany had recently emerged, and were publicly dismissed as unconfirmed by German authorities.
  • In the years since 2005, successive investigations by human rights groups and international bodies, such as the Council of Europe, have substantiated that extraordinary rendition was indeed occurring. In 2007 the European Parliament approved a finding in a report by a special investigative committee where it was stated that Germany, among other states, aided or knew about the CIA's extraordinary rendition programme. Prior to becoming Foreign Minister in 2005, Frank-Walter Steinmeier served as Head of Chancellery (Chief of Staff) in the government of Chancellor Gerhard Schroeder, where he was responsible for coordinating the work of German intelligence agencies. In 2004, during this tenure, Khaled El-Masri, a German citizen, was abducted by the CIA and renditioned to a black site in Afghanistan where he was interrogated and tortured for four months. Eventually the CIA realised that it had the wrong "El-Masri", and dumped the German on a desolate road in Albania and began a cover-up. El-Masri's case has been substantiated and confirmed in numerous inquiries, and at the European Court of Human Rights.
  • Today's publication of the 20 target selectors adds to the previous WikiLeaks publication of 125 German numbers targeted by the NSA, showing systematic mass spying on the Chancellor and the Chancellery (All the Chancellor's Men, 8 July) and German politicians and officials handling economic, trade and financial affairs (The Euro Intercepts, 1 July).
  •  
    Hmmmm.... I don't remember anything in the Senate Intelligence Committee's published executive summary on CIA torture about the CIA getting an assist from NSA on its rendition and torture projects. 
Paul Merrell

Four librarians gagged and threatened with prison time under the Patriot Act | Police S... - 0 views

  • Using the broad powers granted under the USA PATRIOT Act, the FBI demanded that 4 librarians produce private information about library patrons’ reading habits, then used an endless gag order to force them to remain silent about the request for the rest of their lives under penalty of prison time.
  • The FBI was demanding that the library hand over private data on library patrons en masse “to protect against international terrorism.” The document that Mr. Christian was given was a so-called National Security Letter (NSL), a type of administrative subpoena for personal information — self-written by the FBI without any probable cause or judicial oversight.  The legal framework for these powerful NSLs was established by Section 505 of the USA PATRIOT Act in 2001. What’s more, Mr. Christian was placed under a perpetual gag order.  The NSL prohibited the recipient “from disclosing to any person that the F.B.I. has sought or obtained access to information or records under these provisions.”  The gag order was broad enough that it was a crime to discuss the matter to any other person — for life.  The USA PATRIOT Act allows for this suppression of speech, and issues a punishment of up to 5 years in prison for anyone caught violating the endless gag order.
  • The only reason we know about this case today is because Mr. Christian and 3 other library board members fought back in court.  
  • ...3 more annotations...
  • In fact, the librarians were even barred from attending the court hearings on the very precedent-setting lawsuit with which they were involved. 
  • “Our presence in the courtroom was declared a threat to national security,” Mr. Chase related. The gag served to legally prevent Mr. Christian from personally testifying before Congress about the effects of the USA PATRIOT Act before the law’s reauthorization in March of 2006.   It passed through Congress easily and was signed once again by President George W. Bush. Appellate judges were clearly disturbed by the breadth of the NSL gag provisions.  One appellate judge wrote, “A ban on speech and a shroud of secrecy in perpetuity are antithetical to democratic concepts and do not fit comfortably with the fundamental rights guaranteed American citizens… Unending secrecy of actions taken by government officials may also serve as a cover for possible official misconduct and/or incompetence.” Sensing a potential legal defeat, the government took the steps necessary to preserve its powers.  Only a few weeks after the USA PATRIOT Act was renewed, the FBI abandoned the Library Connection case and voluntarily lifted the librarians’ gag order.  This eliminated the possibility that the NSL provisions could be struck down in court, protecting the USA PATRIOT Act from further judicial scrutiny.  In May 2006, the four librarians broke their silence at last.
  • The result could only be considered a partial victory, however.  While the librarians had regained their freedom to speak, they no longer had legal standing to challenge the NSL provisions, meaning that the sweeping power to subpoena and gag American citizens would remain unchecked in the hands of the government — and continue to be used at an alarming rate; tens of thousands of NSLs and gag orders are issued per year in the name of fighting the so-called War on Terror.
Gary Edwards

Hating the Establishment Is Not the Same as Supporting Liberty | Foundation for Economi... - 1 views

  • You might point to the American Revolution as a contrary case. We tossed out the British monarchy and invented freedom! But think again. The war itself created a new establishment consisting of politicians, military generals, bond dealers, and influential landholders.
  • Twelve years after the Declaration of Independence, these groups got together and formed a new government that, in time, became as oppressive and restrictive — and in some ways, more so — as the one the revolutionaries overthrew. And this occurred despite the existence of classical liberal political norms and intellectual culture.
  • He has said nothing about dismantling power.
  • ...9 more annotations...
  • Indeed, he is on record with his desire to radically expand the power of the state.
  • He wants surveillance, controls on the internet, religious tests for migration, war-like tariffs, industrial planning, and autocratic foreign-policy power. He’s praised police power and toyed with ideas such as internment and killings of political enemies. His entire governing philosophy boils down to arbitrary, free-wheeling authoritarianism.
  • As for Sanders, everything that is bad about the current establishment he promises to make worse with more programs, bureaucracy, taxes, controls, and government power in order to making life fair, just, and equitable. He speaks as if he’s never heard of the failed history of socialism and certainly hasn’t learned anything from it.
  • The ideal is liberty, not the overthrow of existing elite structures as such.
  • They resist rampant populism that would lead to a pillaging of the nation that is serving them so well.
  • To understand Machiavelli, realize that his black beast was the cleric Savonarola, Florence’s quasi-dictator who led a mass movement of crazed pietists who pillaged and burned material possessions as a pathway to heaven. The Bonfire of the Vanities of 1487 was one result. This is exactly the kind of mania that establishments exist to keep at bay.
  • The main payout is the control of the state apparatus that outlives the establishment’s overthrow. It makes sense that the results will tend to be more ruthless, vengeful, and bloody than anything that came before.
  • Establishments are as Machiavelli described: stable machines that keep competitors at bay but otherwise seek to make the system work for themselves.
  • The goal should be the tearing down of power itself and its replacement by simple human rights and a society that functions according to civilized standards.
  •  
    "But there's a problem. The state power we oppose is not identical to the establishment we reject. You can overthrow the establishment and still be left with a gigantic machinery of legalized exploitation. All the agencies, laws, regulations, and powers are still in place. And now you have a problem: someone else is in charge of the state itself. You might call it a new establishment. It could be even more wicked than the one you swept away. Indeed, it usually is. Maybe always. Anatomy of the Establishment What is an establishment? It is a network of large and cooperating interest groups that have developed a stable relationship with state power. It includes finance, organized labor, public bureaucrats, government contractors, big businesses with quid pro quo relationships with regulators and politicians, political families with a strong stake in the election process, intellectuals at state-friendly think tanks and universities, and so on."
Paul Merrell

Apple's New Challenge: Learning How the U.S. Cracked Its iPhone - The New York Times - 0 views

  • Now that the United States government has cracked open an iPhone that belonged to a gunman in the San Bernardino, Calif., mass shooting without Apple’s help, the tech company is under pressure to find and fix the flaw.But unlike other cases where security vulnerabilities have cropped up, Apple may face a higher set of hurdles in ferreting out and repairing the particular iPhone hole that the government hacked.The challenges start with the lack of information about the method that the law enforcement authorities, with the aid of a third party, used to break into the iPhone of Syed Rizwan Farook, an attacker in the San Bernardino rampage last year. Federal officials have refused to identify the person, or organization, who helped crack the device, and have declined to specify the procedure used to open the iPhone. Apple also cannot obtain the device to reverse-engineer the problem, the way it would in other hacking situations.
  •  
    It would make a very interesting Freedom of Information Act case if Apple sued under that Act to force disclosure of the security hole iPhone product defect the FBI exploited. I know of no interpretation of the law enforcement FOIA exemption that would justify FBI disclosure of the information. It might be alleged that the information is the trade secret of the company that disclosed the defect and exploit to the the FBI, but there's a very strong argument that the fact that the information was shared with the FBI waived the trade secrecy claim. And the notion that government is entitled to collect product security defects and exploit them without informing the exploited product's company of the specific defect is extremely weak.  Were I Tim Cook, I would have already told my lawyers to get cracking on filing the FOIA request with the FBI to get the legal ball rolling. 
« First ‹ Previous 181 - 192 of 192
Showing 20 items per page