Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged media-surveillance

Rss Feed Group items tagged

Paul Merrell

Canadian risks prison for not giving up phone's passcode - Yahoo News - 0 views

  • Montreal (AFP) - A Canadian charged for refusing to give border agents his smartphone passcode was expected Thursday to become the first to test whether border inspections can include information stored on devices.Alain Philippon, 38, risks up to a year in prison and a fine of up to Can$25,000 (US$20,000) if convicted of obstruction.He told local media that he refused to provide the passcode because he considered information on his smartphone to be "personal."Philippon was transiting through the port city of Halifax on his way home from a Caribbean vacation on Monday when he was selected for an in-depth exam.
  • "Philippon refused to divulge the passcode for his cell phone, preventing border services officers from their duties," Canada Border Services Agency said in an email.The agency insists that the Customs Act authorizes its officers to examine "all goods and conveyances including electronic devices, such as cell phones and laptops."But, according to legal experts, the issue of whether a traveler must reveal the password for an electronic device at a border crossing has not been tested in court. "(It's) one thing for them to inspect it, another thing for them to compel you to help them," Rob Currie, director of the Law and Technology Institute at Dalhousie University, told public broadcaster CBC.Philippon is scheduled to appear in court on May 12.
Paul Merrell

After Brit spies 'snoop' on families' lawyers, UK govt admits: We flouted human rights ... - 0 views

  • The British government has admitted that its practice of spying on confidential communications between lawyers and their clients was a breach of the European Convention on Human Rights (ECHR). Details of the controversial snooping emerged in November: lawyers suing Blighty over its rendition of two Libyan families to be tortured by the late and unlamented Gaddafi regime claimed Her Majesty's own lawyers seemed to have access to the defense team's emails. The families' briefs asked for a probe by the secretive Investigatory Powers Tribunal (IPT), a move that led to Wednesday's admission. "The concession the government has made today relates to the agencies' policies and procedures governing the handling of legally privileged communications and whether they are compatible with the ECHR," a government spokesman said in a statement to the media, via the Press Association. "In view of recent IPT judgments, we acknowledge that the policies applied since 2010 have not fully met the requirements of the ECHR, specifically Article 8. This includes a requirement that safeguards are made sufficiently public."
  • The guidelines revealed by the investigation showed that MI5 – which handles the UK's domestic security – had free reign to spy on highly private and sensitive lawyer-client conversations between April 2011 and January 2014. MI6, which handles foreign intelligence, had no rules on the matter either until 2011, and even those were considered void if "extremists" were involved. Britain's answer to the NSA, GCHQ, had rules against such spying, but they too were relaxed in 2011. "By allowing the intelligence agencies free rein to spy on communications between lawyers and their clients, the Government has endangered the fundamental British right to a fair trial," said Cori Crider, a director at the non-profit Reprieve and one of the lawyers for the Libyan families. "For too long, the security services have been allowed to snoop on those bringing cases against them when they speak to their lawyers. In doing so, they have violated a right that is centuries old in British common law. Today they have finally admitted they have been acting unlawfully for years."
  • Crider said it now seemed probable that UK snoopers had been listening in on the communications over the Libyan case. The British government hasn't admitted guilt, but it has at least acknowledged that it was doing something wrong – sort of. "It does not mean that there was any deliberate wrongdoing on the part of the security and intelligence agencies, which have always taken their obligation to protect legally privileged material extremely seriously," the government spokesman said. "Nor does it mean that any of the agencies' activities have prejudiced or in any way resulted in an abuse of process in any civil or criminal proceedings. The agencies will now work with the independent Interception of Communications Commissioner to ensure their policies satisfy all of the UK's human rights obligations." So that's all right, then.
  •  
    If you follow the "November" link you'[l learn that yes, indeed, the UK government lawyers were happily getting the content of their adversaries privileged attorney-client communications. Conspicuously, the promises of reform make no mention of what is surely a disbarment offense in the U.S. I doubt that it's different in the UK. Discovery rules of procedure strictly limit how parties may obtain information from the other side. Wiretapping the other side's lawyers is not a permitted from of discovery. Hopefully, at least the government lawyers in the case in which the misbehavior was discovered have been referred for disciplinary action.  
Paul Merrell

Nemtsov's Killers Also Planned to Kill Putin - 0 views

  • FSB source to "Komsomolskaya Pravda": "the customer of Nemtsov's murder was preparing an assassination of Vladimir Putin" The main suspect in the organization of the high-profile crime - is a commander of the Ukrainian battalion in the name of Dzhokhar Dudayev, Adam Osmayev. The correspondent of "Komsomolskaya Pravda" met with the FSB agent, who is part of the team investigating the murder of Boris Nemtsov. In an exclusive interview he spoke about the new details of the crime and named the most likely customer of the murder.
  • Today the investigators have irrefutable proof that all persons detained on suspicion of murder of the politician are the perpetrators, - said our source in the FSB. First of all, billing (data about calls and movements of the subscriber. - Ed.) from their mobile phones showed that they conducted surveillance of Nemtsov before the murder, following him closely. The suspects were tracked with their phones at the location where Nemtsov was present with his phone. During the murder all the detainees "were in the area": some under the bridge, some in a car, some nearby. Zaur Dadaev pulled the trigger. He first made a confession, and then, on the advice of his lawyers, took it back. But it changes nothing, the investigation has already collected compelling evidence of his guilt. I will not give details of how this was done. The pistol was thrown into the river after the crime, it was later recovered by divers. That Zaur Dadaev immediately said to the TV cameras: "I love prophet Muhammad" - is just a cover. There was no religious motive for the killings. They cynically carried out an order. They are far from devout Muslims. In fact, just real gangsters. And the most important thing. The executor of the murder was in close contact with Adam Osmaev, who recently became the commander of the Ukrainian battalion in the name of Dzhokhar Dudayev. They met, talked a lot on the phone. Zaur Dadaev and his cronies worked with Osmaev on Ukrainian affairs. And also with Chechens, who fought on the territory of Ukraine for the new regime. Zaur Dadaev was listed in the battalion "North" ("Sever") of the Chechen Interior Ministry, but while serving in it, in fact, was engaged in activities against Russia. He was associated with Osmaev by a certain relationship and mutual obligations.
  • The evidence is still being gathered. But I can say that today the main suspected customer of Nemtsov's murder is Adam Osmayev.
  • ...6 more annotations...
  • Adam Osmayev was previously suspected in the attempt to organize the 2012 assassination of Vladimir Putin, at that time a Prime Minister and presidential candidate. Osmayev  planned to blow up Putin's motorcade, which was confirmed by a video, found in his laptop, of Prime Minister's motorcade travelling through Moscow. Then Osmaev cooperated with the investigation - admitted he came to Odessa from the United Arab Emirates with instructions from field commander Doku Umarov. But in court Osmayev refused to testify, claiming he gave his testimony after a beating. His lawyers wrote a complaint to the Prosecutor's office and the European Court of Human Rights. - Osmaev failed to get to Putin himself, but it seems that he did not calm down, - says our source in the FSB. - And later the most accessible target to attack the President was selected - Boris Nemtsov. Nemtsov lately was not seen as an active member of the opposition, was no competition to Putin, but his name was known. The choice of a sacrificial lamb was quite successful. The gangsters do not stop at anything. And gangsters involved in politics is a devilish blend.
  • - The perpetrators were told to execute the order in the place where it was committed, - continues our source. - Another words not just to kill him in the alley, but do it in the heart of Moscow across from the Kremlin - deliberately to cause outrage around the world. Before the crime they received the advance payment, it was agreed that the remainder of the money for the "job" will be transferred to their bank account. - Why did they have to kill Nemtsov, who spoke out against Putin's policies? It turns out, they had killed their ideological ally! - [Ultra-] Nationalists and criminals will not stop at anything. To kill their ally for them is not a question of morality. Nemtsov became a bargaining chip. The goal was - to slander Russia, to show it in a bad light, to prevent peace in Donbass (especially after talks with Merkel and Hollande). To show the President of Russia in the eyes of the world community as the "ultimate evil" - to show: look, how he strangled the opposition. The world just began to warm up to Putin's politics, which he is following in relation to Ukraine. And this cynical murder of Nemtsov has caused a wave of discontent, fueled by the world media. The American and European press immediately began to show this murder in their own light, placing the responsibility on the President of Russia.
  • - Will Osmaev be charged? - Now everything is in the stage of investigation and evidence collection. Some of the evidence we already gathered, but I don't want to tell everything in order not to hinder the investigation.
  • What was Adam Osmayev "famous" for... In 2007 in Moscow on the eve of Victory Day a terrorist attack was averted - explosives were found in a parked car. A native of Grozny, Adam Osmayev, a suspect in the case, was arrested in absentia by the Lefortovsky district court of Moscow and declared for international search. The investigation found that Osmayev with a group of Chechens and Ingush was also preparing an assassination on May 9 of the head of Chechnya, Ramzan Kadyrov. According to the press, after that Osmayev was hiding in the UK, where he was contacted by associates of Doku Umarov and was offered to organize a new terrorist attack. Adam agreed and went to Ukraine with a fake passport. In 2012, he was arrested after an explosion in a rented apartment - the terrorist was preparing homemade bombs. Osman and his "right hand", a Kazakh citizen, Ilya Pyanzin, admitted: they were preparing an assassination of the head of the government of Russian Federation, Vladimir Putin. The suspects also reported that they recruited fighters for future terrorist attacks in Russia. But later they took back their testimony.
  • Russia demanded to extradite Adam Osmayev, however, the European Court of Human Rights had blocked it, declaring: "In Russia the detainee may be subjected to torture". Pyanzin eventually was extradited to Russia, and in September 2013 he was sentenced to ten years in a colony with a strict regime. On November 18, 2014, the court of Odessa declared a sentence for Osmaev: 2 years and 9 months imprisonment. He was released in the courtroom "for lack of evidence of preparation of assassination" - he was credited the time he already spent in jail. The court room reacted to the sentence of Osmaev with applause, and he, in turn, encouraged them to "protect Ukraine". In February of this year Osmayev headed the Ukrainian battalion  in the name of Dzhokhar Dudayev, succeeding the general, deceased under Debaltsevo, Isa Munaev. 
  • OFFICIAL COMMENT Dmitry Peskov: In the coming days, the prosecutors will announce the motives for the murder "We hope that in the coming days all legal formalities will be completed and prosecutors will announce their versions of the murder, will name those who are behind this," said the President's press secretary Dmitry Peskov to the journalists of "AP", answering the question about the prospects of completing the investigation of the murder of Boris Nemtsov.
  •  
    According to this translated-from-Russian Pravda report, the investigation of the Boris Nemtsov assassination in Russia is closing in on the commander of a Ukrainian battalion, Adam Osmayev, as the person who set in motion the assassination by a professional hit team that had also been tasked to assassinate Vladimir Putin. In other words, a false flag attack on Nemtsov to make Russia look bad, to be followed up by killing the Russian Prime Minister.  The pseudonym reportedly used by Osmayev in Ukraine is Dzhokar Dudayev. That is the name of the first President of the Chechen Republic of Ichkeria, a breakaway state in the North Caucasus. Wikpedia says, "Dudayev was killed on 21 April 1996, by two laser-guided missiles when he was using a satellite phone, after his location was detected by a Russian reconnaissance aircraft, which intercepted his phone call." http://goo.gl/67qPVR  In comments by the translator that I did not highlight, she speculates that the trail may lead further to the CIA and SBU, which is roughly the Ukrainian equivalent of the CIA. See also this 2014 article, http://www.interfax.com/newsinf.asp?id=488090 (.) That article reports, inter alia, that the CIA had personnel working within the SBU between 2006-10 and that CIA had been provided with the personnel files of Ukraine "special services" officers. If true, that would mean that CIA had penetrated SBU long before the coup and may in fact have been in control of SBU. Approximately the first paragraph of this article was reported by the Kyev Post, without mention of the CIA officials working within SBU. http://goo.gl/9HX1n
  •  
    Correction: I misunderstood the translation. The plot to kill Putin happened in 2012 and Adam Osmayev was allegedly tied to it. I have no information that the other defendants in the present incident were involved with that. Also, Dzhokar Dudayev is not a pseudonym used by Osmayev but instead the name of his militia battalion in Ukraine. It's composed of "international" volunteers, one might suspect largely of Chechnyans. I'll be bookmarking another article soon that makes more sense of all this. Osmayev is himself Chechnyan.
Paul Merrell

Tomgram: Engelhardt, Who Rules Washington? | TomDispatch - 0 views

  • As every schoolchild knows, there are three check-and-balance branches of the U.S. government: the executive, Congress, and the judiciary. That’s bedrock Americanism and the most basic high school civics material. Only one problem: it’s just not so. During the Cold War years and far more strikingly in the twenty-first century, the U.S. government has evolved.  It sprouted a fourth branch: the national security state, whose main characteristic may be an unquenchable urge to expand its power and reach.  Admittedly, it still lacks certain formal prerogatives of governmental power.  Nonetheless, at a time when Congress and the presidency are in a check-and-balance ballet of inactivity that would have been unimaginable to Americans of earlier eras, the Fourth Branch is an ever more unchecked and unbalanced power center in Washington.  Curtained off from accountability by a penumbra of secrecy, its leaders increasingly are making nitty-gritty policy decisions and largely doing what they want, a situation illuminated by a recent controversy over the possible release of a Senate report on CIA rendition and torture practices.
  • All of this is or should be obvious, but remains surprisingly unacknowledged in our American world. The rise of the Fourth Branch began at a moment of mobilization for a global conflict, World War II.  It gained heft and staying power in the Cold War of the second half of the twentieth century, when that other superpower, the Soviet Union, provided the excuse for expansion of every sort.  Its officials bided their time in the years after the fall of the Soviet Union, when “terrorism” had yet to claim the landscape and enemies were in short supply.  In the post-9/11 era, in a phony “wartime” atmosphere, fed by trillions of taxpayer dollars, and under the banner of American “safety,” it has grown to unparalleled size and power.  So much so that it sparked a building boom in and around the national capital (as well as elsewhere in the country).  In their 2010 Washington Post series “Top Secret America,” Dana Priest and William Arkin offered this thumbnail summary of the extent of that boom for the U.S. Intelligence Community: “In Washington and the surrounding area,” they wrote, “33 building complexes for top-secret intelligence work are under construction or have been built since September 2001. Together they occupy the equivalent of almost three Pentagons or 22 U.S. Capitol buildings -- about 17 million square feet of space.”  And in 2014, the expansion is ongoing.
  • In this century, a full-scale second “Defense Department,” the Department of Homeland Security, was created.  Around it has grown up a mini-version of the military-industrial complex, with the usual set of consultants, K Street lobbyists, political contributions, and power relations: just the sort of edifice that President Eisenhower warned Americans about in his famed farewell address  in 1961.  In the meantime, the original military-industrial complex has only gained strength and influence. Increasingly, post-9/11, under the rubric of “privatization,” though it should more accurately have been called “corporatization,” the Pentagon took a series of crony companies off to war with it.  In the process, it gave “capitalist war” a more literal meaning, thanks to its wholesale financial support of, and the shrugging off of previously military tasks onto, a series of warrior corporations. Meanwhile, the 17 members of the U.S. Intelligence Community -- yes, there are 17 major intelligence outfits in the national security state -- have been growing, some at prodigious rates.  A number of them have undergone their own versions of corporatization, outsourcing many of their operations to private contractors in staggering numbers, so that we now have “capitalist intelligence” as well.  With the fears from 9/11 injected into society and the wind of terrorism at their backs, the Intelligence Community has had a remarkably free hand to develop surveillance systems that are now essentially “watching” everyone -- including, it seems, other branches of the government.
  • ...4 more annotations...
  • From the Pentagon to the Department of Homeland Security to the labyrinthine world of intelligence, the rise to power of the national security state has been a spectacle of our time.  Whenever news of its secret operations begins to ooze out, threatening to unnerve the public, the White House and Congress discuss “reforms” which will, at best, modestly impede the expansive powers of that state within a state.  Generally speaking, its powers and prerogatives remain beyond constraint by that third branch of government, the non-secret judiciary.  It is deferred to with remarkable frequency by the executive branch and, with the rarest of exceptions, it has been supported handsomely with much obeisance and few doubts by Congress. And also keep in mind that, of the four branches of government, only two of them -- an activist Supreme Court and the national security state -- seem capable of functioning in a genuine policymaking capacity at the moment.
  • In that light, let’s turn to a set of intertwined events in Washington that have largely been dealt with in the media as your typical tempest in a teapot, a catfight among the vested and powerful.  I’m talking about the various charges and countercharges, anger, outrage, and irritation, as well as news of acts of seeming illegality now swirling around a 6,300-page CIA “torture report” produced but not yet made public by the Senate Intelligence Committee.  This ongoing controversy reveals a great deal about the nature of the checks and balances on the Fourth Branch of government in 2014.
  • Fourteen years into the twenty-first century, we’re so used to this sort of thing that we seldom think about what it means to let the CIA -- accused of a variety of crimes -- be the agency to decide what exactly can be known by the public, in conjunction with a deferential White House.  The Agency’s present director, it should be noted, has been a close confidant and friend of the president and was for years his key counterterrorism advisor.  To get a sense of what all this really means, you need perhaps to imagine that, in 2004, the 9/11 Commission was forced to turn its report over to Osama bin Laden for vetting and redaction before releasing it to the public.  Extreme as that may sound, the CIA is no less a self-interested party. And this interminable process has yet to end, although the White House is supposed to release something, possibly heavily redacted, as early as this coming week or perhaps in the dog days of August.
  • The fact is that, for the Fourth Branch, this remains the age of impunity.  Hidden in a veil of secrecy, bolstered by secret law and secret courts, surrounded by its chosen corporations and politicians, its power to define policy and act as it sees fit in the name of American safety is visibly on the rise.  No matter what setbacks it experiences along the way, its urge to expand and control seems, at the moment, beyond staunching.  In the context of the Senate’s torture report, the question at hand remains: Who rules Washington?
  •  
    The indefatigable and perceptive Tom Englehardt finds formally secret features of the Dark State revealed in the ongoing political jockeying involving the CIA's torture, black prisons, and extarordinary rendition program. 
Paul Merrell

Remaining Snowden docs will be released to avert 'unspecified US war' - ‪Cryp... - 0 views

  • All the remaining Snowden documents will be released next month, according t‪o‬ whistle-blowing site ‪Cryptome, which said in a tweet that the release of the info by unnamed third parties would be necessary to head off an unnamed "war".‬‪Cryptome‬ said it would "aid and abet" the release of "57K to 1.7M" new documents that had been "withheld for national security-public debate [sic]". <a href="http://pubads.g.doubleclick.net/gampad/jump?iu=/6978/reg_security/front&sz=300x250%7C300x600&tile=3&c=33U7RchawQrMoAAHIac14AAAKH&t=ct%3Dns%26unitnum%3D3%26unitname%3Dwww_top_mpu%26pos%3Dtop%26test%3D0" target="_blank"> <img src="http://pubads.g.doubleclick.net/gampad/ad?iu=/6978/reg_security/front&sz=300x250%7C300x600&tile=3&c=33U7RchawQrMoAAHIac14AAAKH&t=ct%3Dns%26unitnum%3D3%26unitname%3Dwww_top_mpu%26pos%3Dtop%26test%3D0" alt=""></a> The site clarified that will not be publishing the documents itself.Transparency activists would welcome such a release but such a move would be heavily criticised by inteligence agencies and military officials, who argue that Snowden's dump of secret documents has set US and allied (especially British) intelligence efforts back by years.
  • As things stand, the flow of Snowden disclosures is controlled by those who have access to the Sn‪o‬wden archive, which might possibly include Snowden confidants such as Glenn Greenwald and Laura Poitras. In some cases, even when these people release information to mainstream media organisations, it is then suppressed by these organisations after negotiation with the authorities. (In one such case, some key facts were later revealed by the Register.)"July is when war begins unless headed off by Snowden full release of crippling intel. After war begins not a chance of release," Cryptome tweeted on its official feed."Warmongerers are on a rampage. So, yes, citizens holding Snowden docs will do the right thing," it said.
  • "For more on Snowden docs release in July watch for Ellsberg, special guest and others at HOPE, July 18-20: http://www.hope.net/schedule.html," it added.HOPE (Hackers On Planet Earth) is a well-regarded and long-running hacking conference organised by 2600 magazine. Previous speakers at the event have included Kevin Mitnick, Steve Wozniak and Jello Biafra.In other developments, ‪Cryptome‬ has started a Kickstarter fund to release its entire archive in the form of a USB stick archive. It wants t‪o‬ raise $100,000 to help it achieve its goal. More than $14,000 has already been raised.The funding drive follows a dispute between ‪Cryptome‬ and its host Network Solutions, which is owned by web.com. Access to the site was bl‪o‬cked f‪o‬ll‪o‬wing a malware infection last week. ‪Cryptome‬ f‪o‬under J‪o‬hn Y‪o‬ung criticised the host, claiming it had ‪o‬ver-reacted and had been sl‪o‬w t‪o‬ rest‪o‬re access t‪o‬ the site, which ‪Cryptome‬ criticised as a form of cens‪o‬rship.In resp‪o‬nse, ‪Cryptome‬ plans to more widely distribute its content across multiple sites as well as releasing the planned USB stick archive. ®
Paul Merrell

The Digital Hunt for Duqu, a Dangerous and Cunning U.S.-Israeli Spy Virus - The Intercept - 0 views

  • “Is this related to what we talked about before?” Bencsáth said, referring to a previous discussion they’d had about testing new services the company planned to offer customers. “No, something else,” Bartos said. “Can you come now? It’s important. But don’t tell anyone where you’re going.” Bencsáth wolfed down the rest of his lunch and told his colleagues in the lab that he had a “red alert” and had to go. “Don’t ask,” he said as he ran out the door. A while later, he was at Bartos’ office, where a triage team had been assembled to address the problem they wanted to discuss. “We think we’ve been hacked,” Bartos said.
  • They found a suspicious file on a developer’s machine that had been created late at night when no one was working. The file was encrypted and compressed so they had no idea what was inside, but they suspected it was data the attackers had copied from the machine and planned to retrieve later. A search of the company’s network found a few more machines that had been infected as well. The triage team felt confident they had contained the attack but wanted Bencsáth’s help determining how the intruders had broken in and what they were after. The company had all the right protections in place—firewalls, antivirus, intrusion-detection and -prevention systems—and still the attackers got in.
  • Bencsáth was a teacher, not a malware hunter, and had never done such forensic work before. At the CrySyS Lab, where he was one of four advisers working with a handful of grad students, he did academic research for the European Union and occasional hands-on consulting work for other clients, but the latter was mostly run-of-the-mill cleanup work—mopping up and restoring systems after random virus infections. He’d never investigated a targeted hack before, let alone one that was still live, and was thrilled to have the chance. The only catch was, he couldn’t tell anyone what he was doing. Bartos’ company depended on the trust of customers, and if word got out that the company had been hacked, they could lose clients. The triage team had taken mirror images of the infected hard drives, so they and Bencsáth spent the rest of the afternoon poring over the copies in search of anything suspicious. By the end of the day, they’d found what they were looking for—an “infostealer” string of code that was designed to record passwords and other keystrokes on infected machines, as well as steal documents and take screenshots. It also catalogued any devices or systems that were connected to the machines so the attackers could build a blueprint of the company’s network architecture. The malware didn’t immediately siphon the stolen data from infected machines but instead stored it in a temporary file, like the one the triage team had found. The file grew fatter each time the infostealer sucked up data, until at some point the attackers would reach out to the machine to retrieve it from a server in India that served as a command-and-control node for the malware.
  • ...1 more annotation...
  • Bencsáth took the mirror images and the company’s system logs with him, after they had been scrubbed of any sensitive customer data, and over the next few days scoured them for more malicious files, all the while being coy to his colleagues back at the lab about what he was doing. The triage team worked in parallel, and after several more days they had uncovered three additional suspicious files. When Bencsáth examined one of them—a kernel-mode driver, a program that helps the computer communicate with devices such as printers—his heart quickened. It was signed with a valid digital certificate from a company in Taiwan (digital certificates are documents ensuring that a piece of software is legitimate). Wait a minute, he thought. Stuxnet—the cyberweapon that was unleashed on Iran’s uranium-enrichment program—also used a driver that was signed with a certificate from a company in Taiwan. That one came from RealTek Semiconductor, but this certificate belonged to a different company, C-Media Electronics. The driver had been signed with the certificate in August 2009, around the same time Stuxnet had been unleashed on machines in Iran.
Paul Merrell

A Readers' Guide to the Apple All Writs Act Cases | Just Security - 0 views

  • The last few weeks and months have been awash in media coverage of two cases before magistrate judges involving the federal government seeking to use the All Writs Act to compel Apple’s cooperation with ongoing criminal investigations. The older case, in the Eastern District of New York, involves a drug case where the phone’s owner has pleaded guilty to the charges against him. The more recent case, in the Central District of California, involves an iPhone used by Syed Farook, one of the alleged San Bernardino shooters. While the two cases involve different different phone models, operating systems, alleged crimes, and legal postures, they touch on similar questions related to the scope of the All Writs Act. In an attempt to create a one-stop shop for our coverage and the related documents and some useful sources, we’ve compiled this readers’ guide. We will update it as the cases progress to include the latest filings and posts, so check back for more as things unfold.
Paul Merrell

Putin Throws Down the Gauntlet - 0 views

  • Would you be willing to defend your country against a foreign invasion? That’s all Putin is doing in Syria. He’s just preempting the tidal wave of jihadis that’ll be coming his way once the current fracas is over.  He figures it’s better to exterminate these US-backed maniacs in Syria now than face them in Chechnya, St Petersburg and Moscow sometime in the future.  Can you blame him? After all, if Washington’s strategy works in Syria, then you can bet they’ll try the same thing in Beirut, Tehran and Moscow. So what choice does Putin have? None. He has no choice.  His back is against the wall. He has to fight.  No one in Washington seems to get this. They think Putin can throw in the towel and call it “quits” at the first sign of getting bogged down. But he can’t throw in the towel because Russia’s facing an existential crisis.  If he loses, then Russia’s going to wind up on the same scrap heap as Afghanistan, Iraq or Libya. You can bet on it. So the only thing he can do is win. Period. Victory isn’t an option, it’s a necessity.
  • Of course they’ve noticed. Everyone’s noticed. Everyone knows Washington is on the warpath and its leaders have gone stark raving mad. How could they not notice? But all that’s done is focus the mind on the task at hand, and the task at hand is to whoop the tar out of the terrorists, put an end to Washington’s sick little jihadi game, and go home. That’s Russia’s plan in a nutshell.  No one is trying to cobble together the long-lost Soviet empire. That’s pure bunkum.  Russia just wants to clean up this nest of vipers and call it a day. There’s nothing more to it than that. But what if the going gets tough and Syria becomes a quagmire? That doesn’t change anything, because Russia still has to win. If that means sending ground troops to Syria, then that’s what Putin will do. If that means asymmetrical warfare, like arming the Kurds or the Yemenis, or the Taliban or even disparate anti-regime Shiites in Saudi Arabia, then he’ll do that too. Whatever it takes. This isn’t a game, it’s a fight for survival; Russia’s survival as a sovereign country. That’s what the stakes are. That’s not something Putin takes lightly.
  • The reason I ask this now is because, on Tuesday, Secretary of State John Kerry is scheduled to attend an emergency meeting in Moscow with his Russian counterpart Sergei Lavrov to discuss issues that are too sensitive to reveal to the public. There’s a lot of speculation about what the two men will talk about, but the urgency and the secrecy of the meeting suggests that the topic will be one of great importance. So allow me to make a guess about what the topic will be. When Kerry arrives in Moscow tomorrow he’ll be rushed to meeting room at the Kremlin where he’ll be joined by Lavrov, Putin, Minister of Defense Sergey Shoygu and high-ranking members from military intelligence. Then, following the initial introductions, Kerry will be shown the evidence Russian intelligence has gathered on last Sunday’s attack on a Syrian military base east of Raqqa that killed three Syrian soldiers and wounded thirteen others. The Syrian government immediately condemned the attack and accused US warplanes of conducting the operation. Later in the day,  Putin delivered an uncharacteristically-harsh and threatening statement that left no doubt that he thought the attack was a grave violation of the accepted rules of engagement and, perhaps, a declaration of war.
  • ...4 more annotations...
  • Why would an incident in the village of Ayyash in far-flung Deir Ezzor Province be so important that it would bring the two nuclear-armed adversaries to the brink of war? I’ll tell you why: It’s because there were other incidents prior to the bombing in Ayyash that laid the groundwork for the current clash. There was the ISIS downing of the Russian airliner that killed 224 Russian civilians. Two weeks after that tragedy, Putin announced at the G-20 meetings that he had gathered intelligence proving that 40 countries –including some in the G-20 itself–were involved in the funding and supporting of ISIS. This story was completely blacked out in the western media and, so far, Russia has not revealed the names of any of the countries involved. So, I ask you, dear reader, do you think the United States is on that list of ISIS supporters?
  • Then there was the downing of the Russian Su-24, a Russian bomber that was shot down by Turkish F-16s while it was carrying out its mission to exterminate terrorists in Syria. Many analysts do not believe that the   Su-24 could have been destroyed without surveillance and logistical support provided by US AWACs or US satellites. Many others scoff at the idea that Turkey would engage in such a risky plan without the go-ahead from Washington. Either way, the belief that Washington was directly involved in the downing of a Russian warplane is widespread. So, I ask you, dear reader, do you think Washington gave Turkey the greenlight? Finally, we have the aerial attack on the Syrian military base in Deir Ezzor, an attack that was either executed by US warplanes or US-coalition warplanes. Not only does the attack constitute a direct assault on the Russian-led coalition (an act of war) but the bombing raid was also carried out in tandem  with a “a full-scale ISIS offensive on the villages of Ayyash and Bgelia.”  The coordination suggests that either the US or US allies were providing  air-cover for ISIS terrorists to carry out their ground operations.  Author Alexander Mercouris– who is certainly no conspiracy nut–expands on this idea in a recent piece at Russia Insider which provides more detail on the incident. The article begins like this:
  • “Did Members of the US-Led Coalition Carry Out an Air Strike to Help ISIS? Russia Implies They Did. Russian statement appears to implicate aircraft from two member states of the US led coalition in the air strike on the Syrian military base in Deir az-Zor….This information – if it is true – begs a host of questions. Firstly, the Syrian military base that was hit by the air strike was apparently the scene of a bitter battle between the Syrian military and the Islamic State.  It seems that shortly after the air strike – and most probably as a result of it – the Islamic State’s fighters were able to storm it. Inevitably, that begs the question of whether the aircraft that carried out the air strike were providing air support to the fighters of the Islamic State. On the face of it, it looks like they were. After all, if what happened was simply a mistake, it might have been expected that the US and its allies would say as much.  If so, it is an extremely serious and worrying development, suggesting that some members of the US-led anti-Islamic State coalition are actually in league with the Islamic State.  (“Did Members of the US-Led Coalition Carry Out an Air Strike to Help ISIS?” Alexander Mercouris, Russia Insider)
  • So there it is in black and white. The Russians think someone in the US-led coalition is teaming up with ISIS. That should make for some interesting conversation when Kerry sashays into the Kremlin today. Does Kerry have any clue that Putin and his lieutenants are probably going to produce evidence that coalition warplanes were involved in the bombing of the Syrian military base?  How do you think he’ll respond to that news? Will he apologize or just stand there dumbstruck? And how will he react when Putin tells him that if a similar incident takes place in the future, Russian warplanes and anti-aircraft units are going to shoot the perpetrator down? If I am not mistaken, Kerry is in for a big surprise on Tuesday. He’s about to learn that Putin takes war very seriously and is not going to let Washington sabotage his plans for success. If Kerry’s smart, he’ll pass along that message to Obama and tell him he needs to dial it down a notch if he wants to avoid a war with Russia.
  •  
    Article published just before Kerry's meeting with Lavrov, et al, after which Kerry announced that Assad stepping down is no longer a U.S. pre-condition of negotiating peace in Syria. It's important to keep in mind here that non-interference in the internal affairs of foreign nations is a fundamental tenet of international law, one that the U.S. regime change position on Syria openly flouted, as it did in Afghanistan, Iraq, and Libya. So what is behind Kerry's suddenly-acquired respect for the right of the people of Syria to choose their own leader? Mike Whitney offers us a smorgasbord of reasons in this article, all of which boil down to Russian blackmail, a threat to go public with incredibly damning information on what the U.S. and allies have been up to in Syria. This may be a turning point in the Syrian War, since the positions of the Gulf Coast Council (Saudi Arabia, Qatar, UAE, etc.) and the salafist jihadis they have supplied to take down Assad has been unequivocal insistence that Assad agree to step down as a precondition of negotiation.  I.e., the U.S. is forking away from the Gulf Coast Council/jihadi position. How will they react? 
Paul Merrell

Facebook Now Warns Users of Government - Sponsored Hack | nsnbc international - 0 views

  • Facebook has added a new feature to warn users that there is a suspicion that their profile is under attack by a nation – state.
  • Alex Stamos, chief security officer at Facebook, posted a “notification for targeted attacks” that explains the social media site “will notify you if we believe your account has been targeted or compromised by an attacker suspected of working on behalf of a nation-state.” In order to secure a compromised account, Facebook has implemented the “additional warning … because these types of attacks tend to be more advanced and dangerous than others, and we strongly encourage affected people to take the actions necessary to secure all of their online accounts.”
  • And yet, Stamos cautions: “To protect the integrity of our methods and processes, we often won’t be able to explain how we attribute certain attacks to suspected attackers. That said, we plan to use this warning only in situations where the evidence strongly supports our conclusion.” To protect users, Facebook will turn on the “login approvals” feature. Facebook will send the compromised account user specific codes so that one particular user can access the profile from multiple locations: pc, app, or new device.
  •  
    Not good enough. It's known from the Snowden documents that NSA gets total access to Facebook accounts under FISA court orders that prohibit it from warning its users.
« First ‹ Previous 241 - 249 of 249
Showing 20 items per page