Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged mobile

Rss Feed Group items tagged

Paul Merrell

How anti-Muslim are Americans? Data points to extent of Islamophobia | US news | The Gu... - 0 views

  • Who exactly was Donald Trump appealing to when he called on Monday for a “total and complete shutdown of Muslims entering the United States”? Quite a few people, according to a YouGov poll conducted earlier this year which found that 55% of surveyed Americans had an “unfavorable” opinion of Islam. Looking more closely at those respondents, Islamophobic sentiments are more common among Americans who are 45 and older, those who are Republican and those who are white.
  • Attitudes toward Islam and attitudes toward Muslims should be considered separately – however, studies suggests that the two overlap considerably, as many people fail to distinguish between the two. In 2014, Pew Research Center published a large study about American attitudes towards individuals of different faiths. Over 3,000 US respondents were asked to rate members of religious groups using a “feeling thermometer” that ranged from 0 to 100: 0 indicated the coldest, most negative possible rating and 100 the warmest, most positive rating. Muslims scored just 40. That score excludes Muslim respondents’ views about other Muslims. The only other group to fare similarly badly were atheists as rated by religious respondents – they too scored 40. There is however an important difference between those two scores: there are far more atheists in America than there are Muslims. Since the Census Bureau is prohibited by law from asking about religious affiliation, Pew surveys are the main source on America’s religious makeup. Their 2015 data shows that 3% of Americans identify as atheist (as well as 4% who say they’re agnostic and 16% who say they’re nothing in particular). By contrast, just under 1% of Americans identify as Muslim – although estimates vary widely and are partly dependent on Muslims’ willingness to identify with the label to interviewers.
  • Those two percentages – the number of Americans who dislike Muslims and the number of Americans who are Muslim – suggest that Trump would not have had the same receptive audience had he singled out members of any other religious group. So far, much of Trump’s anti-Muslim rhetoric has focused on security. That’s smart. When Brits were asked this year what words they think of when they hear the word Muslim, their most common responses were “terror”, “terrorism” and “terrorist”. It’s also relevant that when individuals (again often white, often Republican) were trying to undermine Barack Obama’s credibility in 2004 and claim that he could not be trusted, they said he was a secret Muslim. What sounded like an accusation only increased in frequency once Obama became a presidential candidate. As of September this year, 29% of Americans (and 43% of Republicans) still believe that Obama is a Muslim, according to a poll by CNN and the Opinion Research Corporation.
Paul Merrell

Spies and internet giants are in the same business: surveillance. But we can stop them ... - 0 views

  • On Tuesday, the European court of justice, Europe’s supreme court, lobbed a grenade into the cosy, quasi-monopolistic world of the giant American internet companies. It did so by declaring invalid a decision made by the European commission in 2000 that US companies complying with its “safe harbour privacy principles” would be allowed to transfer personal data from the EU to the US. This judgment may not strike you as a big deal. You may also think that it has nothing to do with you. Wrong on both counts, but to see why, some background might be useful. The key thing to understand is that European and American views about the protection of personal data are radically different. We Europeans are very hot on it, whereas our American friends are – how shall I put it? – more relaxed.
  • Given that personal data constitutes the fuel on which internet companies such as Google and Facebook run, this meant that their exponential growth in the US market was greatly facilitated by that country’s tolerant data-protection laws. Once these companies embarked on global expansion, however, things got stickier. It was clear that the exploitation of personal data that is the core business of these outfits would be more difficult in Europe, especially given that their cloud-computing architectures involved constantly shuttling their users’ data between server farms in different parts of the world. Since Europe is a big market and millions of its citizens wished to use Facebook et al, the European commission obligingly came up with the “safe harbour” idea, which allowed companies complying with its seven principles to process the personal data of European citizens. The circle having been thus neatly squared, Facebook and friends continued merrily on their progress towards world domination. But then in the summer of 2013, Edward Snowden broke cover and revealed what really goes on in the mysterious world of cloud computing. At which point, an Austrian Facebook user, one Maximilian Schrems, realising that some or all of the data he had entrusted to Facebook was being transferred from its Irish subsidiary to servers in the United States, lodged a complaint with the Irish data protection commissioner. Schrems argued that, in the light of the Snowden revelations, the law and practice of the United States did not offer sufficient protection against surveillance of the data transferred to that country by the government.
  • The Irish data commissioner rejected the complaint on the grounds that the European commission’s safe harbour decision meant that the US ensured an adequate level of protection of Schrems’s personal data. Schrems disagreed, the case went to the Irish high court and thence to the European court of justice. On Tuesday, the court decided that the safe harbour agreement was invalid. At which point the balloon went up. “This is,” writes Professor Lorna Woods, an expert on these matters, “a judgment with very far-reaching implications, not just for governments but for companies the business model of which is based on data flows. It reiterates the significance of data protection as a human right and underlines that protection must be at a high level.”
  • ...2 more annotations...
  • This is classic lawyerly understatement. My hunch is that if you were to visit the legal departments of many internet companies today you would find people changing their underpants at regular intervals. For the big names of the search and social media worlds this is a nightmare scenario. For those of us who take a more detached view of their activities, however, it is an encouraging development. For one thing, it provides yet another confirmation of the sterling service that Snowden has rendered to civil society. His revelations have prompted a wide-ranging reassessment of where our dependence on networking technology has taken us and stimulated some long-overdue thinking about how we might reassert some measure of democratic control over that technology. Snowden has forced us into having conversations that we needed to have. Although his revelations are primarily about government surveillance, they also indirectly highlight the symbiotic relationship between the US National Security Agency and Britain’s GCHQ on the one hand and the giant internet companies on the other. For, in the end, both the intelligence agencies and the tech companies are in the same business, namely surveillance.
  • And both groups, oddly enough, provide the same kind of justification for what they do: that their surveillance is both necessary (for national security in the case of governments, for economic viability in the case of the companies) and conducted within the law. We need to test both justifications and the great thing about the European court of justice judgment is that it starts us off on that conversation.
Paul Merrell

America's new, more 'usable', nuclear bomb in Europe | World news | The Guardian - 0 views

  • The $8 billion upgrade to the US B61 nuclear bomb has been widely condemned as an awful lot of money to spend on an obsolete weapon. As an old fashioned ‘dumb’ bomb it has no role in US or NATO nuclear doctrine, but the upgrade has gone ahead anyway, in large part as a result of lobbying by the nuclear weapons laboratories. In non-proliferation terms however the only thing worse than a useless bomb is a ‘usable’ bomb. Apart from the stratospheric price, the most controversial element of the B61 upgrade is the replacement of the existing rigid tail with one that has moving fins that will make the bomb smarter and allow it to be guided more accurately to a target. Furthermore, the yield can be adjusted before launch, according to the target. The modifications are at the centre of a row between anti-proliferation advocates and the government over whether the new improved B61-12 bomb is in fact a new weapon, and therefore a violation of President Obama’s undertaking not to make new nuclear weapons. His administration’s 2010 Nuclear Posture Review said life extension upgrades to the US arsenal would “not support new military missions or provide for new military capabilities.”
  • The issue has a particular significance for Europe where a stockpile of 180 B61’s is held in six bases in five countries. If there is no change in that deployment by the time the upgraded B61-12’s enter the stockpile in 2024, many of them will be flown out to the bases in Belgium, the Netherlands, Germany, Italy and Turkey. The row has had a semantic tone, revolving on what the definition of ‘new’ is, but arguably the only definition that counts is whether the generals and officials responsible for dropping bombs, view its role in a different light as a result of its refurbishment. Referring to the B61-12’s enhanced accuracy on a recent PBS Newshour television programme, the former head of US Strategic Command, General James Cartwright, made this striking remark: If I can drive down the yield, drive down, therefore, the likelihood of fallout, etc, does that make it more usable in the eyes of some — some president or national security decision-making process? And the answer is, it likely could be more usable.
  • In general, it is not a good thing to see the words ‘nuclear bomb’ and ‘usable’ anywhere near each other. Yet they seem to share space in the minds of some of America’s military leaders, as Hans Kristensen of the Federation of American Scientists, points out. Cartwright’s confirmation follows General Norton Schwartz, the former U.S. Air Force Chief of Staff, who in 2014 assessed that the increased accuracy would have implications for how the military thinks about using the B61. “Without a doubt. Improved accuracy and lower yield is a desired military capability. Without a question,” he said. The great thing about nuclear weapons was that their use was supposed to be unthinkable and they were therefore a deterrent to contemplation of a new world war. Once they become ‘thinkable’ we are in a different, and much more dangerous, universe.
  •  
    Oh, Lord, please save this planet from idiocy in high places. 
Paul Merrell

Violence in Israel and the Palestinian territories - the Guardian briefing | News | The... - 0 views

  • Israel and the occupied Palestinian territories have been convulsed by a wave of escalating violence in recent days. The lethal tensions ratcheted up sharply last Thursday when a married couple, Jewish settlers from Neria in the northern West Bank, were shot and killed in a car in front of their four children near Beit Furik, allegedly by members of a five-man Hamas cell who were subsequently arrested. Two more Israelis were stabbed and killed in Jerusalem’s Old City on Saturday by a Palestinian youth, who was shot dead at the scene. On Sunday, an 18-year-old Palestinian was shot dead by Israeli forces in clashes near the West Bank town of Tulkarem. The mounting friction has seen attacks by settlers on Palestinians, clashes between Palestinians and Israeli security forces and attempted attacks continue. On Wednesday. there were incidents in Jerusalem, where a Palestinian woman stabbed an Israeli man who then shot and seriously wounded her in the Old City, the southern Israeli city of Kiryat Gat, where a Palestinian was killed after reportedly trying to seize a gun from a soldier and stabbing him, and when a female Israeli settler’s car was stoned near Beit Sahour, which adjoins Bethlehem, in an incident in which it appears other settlers fired on Palestinians, seriously injuring a youth.
  • On the Palestinian side, anger escalated earlier this week after a 13-year-old boy in Bethlehem’s Aida refugee camp was shot and killed by an Israeli sniper in an incident the Israeli military has claimed was “unintentional” as soldiers were aiming at another individual.
  • Jerusalem has remained tense now for almost a year. Most analysts blame the recent heightened tension on several factors. Key among them has been the issue of the religious site in Jerusalem known to Muslims as al-Haram al-Sharif, or the Noble Sanctuary, and Jews as the Temple Mount. A long-running campaign by some fundamentalist Jews and their supporters for expanding their rights to worship in the Al-Aqsa mosque compound on the Temple Mount, supported by rightwing members of Israeli prime minister Binyamin Netanyahu’s own cabinet, has raised the suspicion – despite repeated Israeli denials – that Israel intends to change the precarious status quo for the site, which has been governed under the auspices of the Jordanian monarchy since 1967.
  • ...6 more annotations...
  • Recent Israeli police actions at the site scandalised the Muslim world and raised tensions. Israel has also banned two volunteer Islamic watch groups – male and female – accusing them of harassing Jews during the hours they are allowed to visit. That has combined with the lack of a peace process and growing resentment and frustration in Palestinian society aimed at both Israel and the Palestinian president, Mahmoud Abbas, and the Palestinian Authority. Israel has complained in recent weeks of an increase in stone throwing and molotov cocktail attacks on West Bank roads and in areas adjoining mainly Palestinian areas of Jerusalem, where an elderly motorist died after crashing his car during an alleged stoning attack. In response, Netanyahu and his cabinet have loosened live-fire regulations over the use of .22 calibre bullets on Palestinian demonstrators. Although described by Israel as “less lethal”, it is this type of ammunition that killed 13-year-old Abdul Rahman Shadi on Monday.
  • Part of the problem is the leadership on both sides. Netanyahu leads a rightwing/far-right coalition with the smallest of majorities. Several cabinet ministers support the settler movement and have publicly criticised him for not cracking down harder on Palestinian protest. Netanyahu’s weakness is reflected on the Palestinian side, where the ageing Abbas is seen as isolated, frustrated and increasingly out of step with other members of the Palestinian leadership, who would like a tougher line against Israel over continued settlement building and the absence of any peace process.
  • In his recent speech to the UN general assembly, Abbas went further than he had ever done before in threatening to end what he claims is Palestine’s unilateral adherence to the Oslo accords, which he said Israel refuses to honour. “We cannot continue to be bound by these signed agreements with Israel and Israel must assume fully its responsibilities of an occupying power,” he said. Abbas, however, stopped short of ending security cooperation between Israel and Palestinian security forces – mainly aimed at Hamas on the West Bank – and asked the UN for international protection. His speech at the United Nations has been seen as a move to placate growing discontents in Palestinian society. Both Abbas and Netanyahu are now both engaged in a delicate balancing act, trying to avoid further escalation that would be detrimental to both while trying not to lose the support of key constituencies. On Abbas’s side, that has meant ordering Palestinian factions and security forces to desist from joining the conflict, while on Netanyahu’s side it has seen numerous warnings of harsh measures – many of which have been repeatedly announced.
  • Nentanyahu does not want to risk a position where Abbas ends security cooperation and in the local jargon “hands back the keys” – in other words revokes the Oslo accords and insists on Israel once again taking full responsibility for administering the occupied territories. For his part, Abbas is said to see a limited popular uprising as useful because of the message it delivers to both Israel and the international community of the mounting risks of a moribund peace process and how serious things could become if security cooperation were to end.
  • At the end of the last round of the peace process last year, US diplomats warned about this potential outcome and Washington has largely withdrawn from a guiding role, exhausted by the lack of progress and frustrated with Netanyahu. Despite the Palestinian desire for a new multilateral international approach, it has failed to materialise as have any US guarantees to Abbas that they intend to advance the peace process. While Syria, migration and Russia are preoccupying western governments, Israel and Palestine have been largely left to their own devices.
  • Flare-ups of violence have a habit of coming and going but hopes that this one is coming to an end appear premature for now. However, the likelihood of the current violence fading away still remains the strongest bet. The biggest risk is a miscalculation by either side, which is out of the hands of either leader, that would alter the dynamics. Individuals on both sides have led some of the worst attacks: Jewish extremists in the summer burning three members of a Palestinian family to death, and “lone wolf attacks” launched by Palestinians angry about al-Aqsa and other issues. With neither side having a clear exit strategy, there is a risk is that Netanyahu and Abbas are being led by events rather than leading.
Paul Merrell

Blair and Bush went to war in Iraq despite South Africa's WMD assurances, book states |... - 0 views

  • Tony Blair went to war in Iraq despite a report by South African experts with unique knowledge of the country that showed it did not possess weapons of mass destruction, according to a book published on Sunday.
  • God, Spies and Lies, by South African journalist John Matisonn, describes how then president Thabo Mbeki tried in vain to convince both Blair and President George W Bush that toppling Saddam Hussein in 2003 would be a terrible mistake. Mbeki’s predecessor, Nelson Mandela, also tried to convince the American leader, but was left fuming that “President Bush doesn’t know how to think”. The claim was this week supported by Mbeki’s office, which confirmed that he pleaded with both leaders to heed the WMD experts and even offered to become their intermediary with Saddam in a bid to maintain peace. South Africa had a special insight into Iraq’s potential for WMD because the apartheid government’s own biological, chemical and nuclear weapons programme in the 1980s led the countries to collaborate. The programme was abandoned after the end of white minority rule in 1994 but the expert team, known as Project Coast, was put back together by Mbeki to investigate the US and UK assertion that Saddam had WMD – the central premise for mounting an invasion.
  • Mbeki, who enjoyed positive relations with both Blair and Saddam, asked for the team to be granted access. “Saddam agreed, and gave the South African team the freedom to roam unfettered throughout Iraq,” writes Matisonn, who says he drew on sources in Whitehall and the South African cabinet. “They had access to UN intelligence on possible WMD sites. The US, UK and UN were kept informed of the mission and its progress.” The experts put their prior knowledge of the facilities to good use, Matisonn writes. “They already knew the terrain, because they had travelled there as welcome guests of Saddam when both countries were building WMD.” On their return, they reported that there were no WMDs in Iraq. “They knew where the sites in Iraq had been, and what they needed to look like. But there were now none in Iraq.”
  • ...1 more annotation...
  • In January 2003, Mbeki, who succeeded Mandela as president, sent a team to Washington to explain the findings, but with little success. Mbeki himself then met Blair for three hours at Chequers on 1 February, the book relates. He warned that the wholesale removal of Saddam’s Ba’ath party could lead to a national resistance to the occupying coalition forces. But with huge military deployments already under way, Blair’s mind was clearly made up. When Frank Chikane, director-general in the president’s office, realised that the South Africans would be ignored, it was “one of the greatest shocks of my life”, he later wrote in a memoir. Matisonn adds: “Mandela, now retired, had tried as well. On Iraq, if not other issues, Mandela and Mbeki were on the same page. Mandela phoned the White House and asked for Bush. Bush fobbed him off to [Condoleezza] Rice. Undeterred, Mandela called former President Bush Sr, and Bush Sr called his son the president to advise him to take Mandela’s call. Mandela had no impact. He was so incensed he gave an uncomfortable comment to the cameras: ‘President Bush doesn’t know how to think,’ he said with visible anger.”
  •  
    'President Bush doesn't know how to think,' 
Paul Merrell

Homan Square revealed: how Chicago police 'disappeared' 7,000 people | US news | The Gu... - 0 views

  • Police “disappeared” more than 7,000 people at an off-the-books interrogation warehouse in Chicago, nearly twice as many detentions as previously disclosed, the Guardian can now reveal.
  • From August 2004 to June 2015, nearly 6,000 of those held at the facility were black, which represents more than twice the proportion of the city’s population. But only 68 of those held were allowed access to attorneys or a public notice of their whereabouts, internal police records show. The new disclosures, the result of an ongoing Guardian transparency lawsuit and investigation, provide the most detailed, full-scale portrait yet of the truth about Homan Square, a secretive facility that Chicago police have described as little more than a low-level narcotics crime outpost where the mayor has said police “follow all the rules”. The police portrayals contrast sharply with those of Homan Square detainees and their lawyers, who insist that “if this could happen to someone, it could happen to anyone”. A 30-year-old man named Jose, for example, was one of the few detainees with an attorney present when he surrendered to police. He said officers at the warehouse questioned him even after his lawyer specifically told them he would not speak.
  • “The Fillmore and Homan boys,” Jose said, referring to police and the facility’s cross streets, “don’t play by the rules.” According to an analysis of data disclosed to the Guardian in late September, police allowed lawyers access to Homan Square for only 0.94% of the 7,185 arrests logged over nearly 11 years. That percentage aligns with Chicago police’s broader practice of providing minimal access to attorneys during the crucial early interrogation stage, when an arrestee’s constitutional rights against self-incrimination are most vulnerable. But Homan Square is unlike Chicago police precinct houses, according to lawyers who described a “find-your-client game” and experts who reviewed data from the latest tranche of arrestee records obtained by the Guardian.
  • ...9 more annotations...
  • The narcotics, vice and anti-gang units operating out of Homan Square, on Chicago’s west side, take arrestees to the nondescript warehouse from all over the city: police data obtained by the Guardian and mapped against the city grid show that 53% of disclosed arrestees come from more than 2.5 miles away from the warehouse. No contemporaneous public record of someone’s presence at Homan Square is known to exist. Nor are any booking records generated at Homan Square, as confirmed by a sworn deposition of a police researcher in late September, further preventing relatives or attorneys from finding someone taken there.
  • But those documents do not tell the entire story of Homan Square. Chicago police have not disclosed any figures at all on people who were detained at Homan Square but never ultimately charged. Nor has it released any information about detentions or arrests before September 2004, claiming that information is burdensome to produce because it is not digital. (Chicago purchased the warehouse in 1995.) “It’s hard to believe that 7,185 arrests is an accurate number of arrestees at Homan Square,” said the University of Chicago’s Futterman. “Even if it were true that less than 1% of Homan arrestees were given access to counsel, that would be abhorrent in and of itself.”
  • 11.8% of detainees in the Homan Square logs were Hispanic, compared with 28.9% of the population. 5.5% of the detainees were white, compared with 31.7% of the population. Of the 68 people who Chicago police claim had access to counsel at Homan Square, however, 45% were black, 26% were Hispanic and another 26% were white.
  • Twenty-two people have told the Guardian that Chicago police kept them at Homan Square for hours and even days. They describe pressure from officers to become informants, and all but two – both white – have said the police denied them phone calls to alert relatives or attorneys of their whereabouts. Their accounts point to violations of police directives, which say police must “complete the booking process” regardless of their interest in interrogating a suspect and must also “allow the arrestee to make a reasonable number of telephone calls to an attorney, family member or friend”, usually within “the first hour” of detention. The most recent disclosure of Homan Square data provides the scale behind those accounts: the demographic trends within the 7,185 disclosed arrests at the warehouse are now far more vast than what the Guardian reported in August after launching the transparency lawsuit – but are consistently disproportionate in terms of race and constitutional access to legal counsel. 82.2% of people detained at Homan Square were black, compared with 32.9% of the Chicago population.
  • Despite the lack of booking and minimal attorney access at Homan Square, it is not a facility for detaining and interrogating the most violent of Chicago’s criminals. Drug possession charges were eventually levied in 5,386 of the disclosed Homan Square arrests, or 74.9%; heroin accounted for 35.4% of those, with marijuana next at 22.3%. The facility’s use by police has intensified in recent years. Nearly 65% of documented Homan Square arrests since August 2004 took place in the five years since Rahm Emanuel, formerly Barack Obama’s top aide, became mayor. (The Guardian has filed a Foia request with Emanuel’s office to disclose the extent of its involvement in Homan Square.) The 68 documented attorney visits are actually slightly higher, statistically speaking, than the extremely minimal legal access Chicago police provide suspects in custody during the initial stages of their arrest. The 2014 citywide total at declared police stations, according to First Defense Legal Aid, was 0.3%. On face value, the lawyer visit rate at Homan Square, according to the newly disclosed documents, was 0.9% over nearly 11 years.
  • Chicago attorneys say they are not routinely turned away from police precinct houses, as they are at Homan Square. The warehouse is also unique in not generating public records of someone’s detention there, permitting police to effectively hide detainees from their attorneys. “Try finding a phone number for Homan to see if anyone’s there. You can’t, ever,” said Gaeger. “If you’re laboring under the assumption that your client’s at Homan, there really isn’t much you can do as a lawyer. You’re shut out. It’s guarded like a military installation.”
  • “Often,” Futterman continued, “prisoners aren’t entered into the central booking system until they’re being processed – which doesn’t occur at Homan Square. They’re supposed to begin that processing right away, under CPD procedures, and at Homan Square the reality is, that isn’t happening or is happening sporadically and inconsistently, which leads to the whole find-your-client game.”
  • According to police, when they took a woman the Guardian will identify as Chevoughn to Homan Square in May 2007 regarding a theft, they allowed her attorney to see her. Chevoughn says that never happened. “I was there a very long time, maybe eight to 10 hours,” said Chevoughn, who remembered being “petrified”, particularly as police questioned her in what she calls a “cage”. “I went to Harrison and Kedzie,” Chevoughn said, referring to the cross streets of central booking. “That’s where I slept. It’s where they did fingerprinting, all that crap. That’s when my attorney came.”
  • Police arrested another man, whom the Guardian will call Anthony, in 2006 on charges of starting a garbage fire, and moved him to Homan Square. Police identified him as receiving an attorney there. But Anthony told the Guardian: “That’s not true.”
  •  
    It's good to see The Guardian following through on this story.
Paul Merrell

Harder for Americans to Rise From Lower Rungs - NYTimes.com - 0 views

  • Benjamin Franklin did it. Henry Ford did it. And American life is built on the faith that others can do it, too: rise from humble origins to economic heights. “Movin’ on up,” George Jefferson-style, is not only a sitcom song but a civil religion.
  • But many researchers have reached a conclusion that turns conventional wisdom on its head: Americans enjoy less economic mobility than their peers in Canada and much of Western Europe. The mobility gap has been widely discussed in academic circles, but a sour season of mass unemployment and street protests has moved the discussion toward center stage. Former Senator Rick Santorum of Pennsylvania, a Republican candidate for president, warned this fall that movement “up into the middle income is actually greater, the mobility in Europe, than it is in America.” National Review, a conservative thought leader, wrote that “most Western European and English-speaking nations have higher rates of mobility.” Even Representative Paul D. Ryan, a Wisconsin Republican who argues that overall mobility remains high, recently wrote that “mobility from the very bottom up” is “where the United States lags behind.”
  • Liberal commentators have long emphasized class, but the attention on the right is largely new.
  • ...2 more annotations...
  • At least five large studies in recent years have found the United States to be less mobile than comparable nations. A project led by Markus Jantti, an economist at a Swedish university, found that 42 percent of American men raised in the bottom fifth of incomes stay there as adults. That shows a level of persistent disadvantage much higher than in Denmark (25 percent) and Britain (30 percent) — a country famous for its class constraints. Meanwhile, just 8 percent of American men at the bottom rose to the top fifth. That compares with 12 percent of the British and 14 percent of the Danes.
  • Despite frequent references to the United States as a classless society, about 62 percent of Americans (male and female) raised in the top fifth of incomes stay in the top two-fifths, according to research by the Economic Mobility Project of the Pew Charitable Trusts. Similarly, 65 percent born in the bottom fifth stay in the bottom two-fifths. By emphasizing the influence of family background, the studies not only challenge American identity but speak to the debate about inequality. While liberals often complain that the United States has unusually large income gaps, many conservatives have argued that the system is fair because mobility is especially high, too: everyone can climb the ladder. Now the evidence suggests that America is not only less equal, but also less mobile.
Gary Edwards

America Is Exhibiting All of the Signs of a Failing Empire Washington's Blog - 1 views

  • The U.S. is also following the age-old recipe for imperial decline by: Creating unsustainable levels of inequality Destroying upward mobility (and see this) Incurring staggering levels of debt to finance war and luxury goods Debasing its currency Military overspending Runaway corruption Apathy and greed And the decline of the America empire is speeding up due the U.S. falling into the Thucydides trap.
  • The U.S. is also following the age-old recipe for imperial decline by: Creating unsustainable levels of inequality Destroying upward mobility (and see this) Incurring staggering levels of debt to finance war and luxury goods Debasing its currency Military overspending Runaway corruption Apathy and greed And the decline of the America empire is speeding up due the U.S. falling into the Thucydides trap.
  • The U.S. is also following the age-old recipe for imperial decline by: Creating unsustainable levels of inequality Destroying upward mobility (and see this) Incurring staggering levels of debt to finance war and luxury goods Debasing its currency Military overspending Runaway corruption Apathy and greed And the decline of the America empire is speeding up due the U.S. falling into the Thucydides trap.
  • ...2 more annotations...
  • The U.S. is also following the age-old recipe for imperial decline by: Creating unsustainable levels of inequality Destroying upward mobility (and see this) Incurring staggering levels of debt to finance war and luxury goods Debasing its currency Military overspending Runaway corruption Apathy and greed And the decline of the America empire is speeding up due the U.S. falling into the Thucydides trap.
  • The U.S. is also following the age-old recipe for imperial decline by: Creating unsustainable levels of inequality Destroying upward mobility (and see this) Incurring staggering levels of debt to finance war and luxury goods Debasing its currency Military overspending Runaway corruption Apathy and greed And the decline of the America empire is speeding up due the U.S. falling into the Thucydides trap.
  •  
    "America Is Exhibiting All of the Signs of a Failing Empire Posted on October 10, 2015 by WashingtonsBlog The American Empire Is Quickly Declining Consummate insider Colonel Lawrence Wilkerson - former chief of staff to Colin Powell, and now distinguished adjunct professor of Government and Public Policy at William & Mary - notes that the U.S. is exhibiting all of the signs of a failing empire, including: Relying on massive military force (and using gigantic complexes to support it) as the be-all and end-all of power, and belittling diplomacy Maintaining standing armies, instead of disbanding military forces between wars Using more mercenary forces than citizen troops Spending disproportionately large amounts of blood and treasure in order to counter threats on the status quo … which simply exacerbates the threat against the empire Going ethically and morally bankrupt Ending up up having bankers and financiers end up running the real power Suffering great hiccups in finance and trade The leaders no longer really believe in or follow the ideals of the founders"
  •  
    The 1 hour-25 minute video talk is well worth listening to. Col. Wilkerson is now a professor who has deeply studied the decline of empires. He speaks from deep knowledge both as a former insider and as a scholar about the state of the American Empire. But notice that the linked page has two copies of the same talk embedded. Don't bother watching both unless you want to hear it twice. :-)
Paul Merrell

Angry Birds and 'leaky' phone apps targeted by NSA and GCHQ for user data | World news ... - 0 views

  • The National Security Agency and its UK counterpart GCHQ have been developing capabilities to take advantage of "leaky" smartphone apps, such as the wildly popular Angry Birds game, that transmit users' private information across the internet, according to top secret documents.The data pouring onto communication networks from the new generation of iPhone and Android apps ranges from phone model and screen size to personal details such as age, gender and location. Some apps, the documents state, can share users' most sensitive information such as sexual orientation – and one app recorded in the material even sends specific sexual preferences such as whether or not the user may be a swinger.Many smartphone owners will be unaware of the full extent this information is being shared across the internet, and even the most sophisticated would be unlikely to realise that all of it is available for the spy agencies to collect
  • Dozens of classified documents, provided to the Guardian by whistleblower Edward Snowden and reported in partnership with the New York Times and ProPublica, detail the NSA and GCHQ efforts to piggyback on this commercial data collection for their own purposes.Scooping up information the apps are sending about their users allows the agencies to collect large quantities of mobile phone data from their existing mass surveillance tools – such as cable taps, or from international mobile networks – rather than solely from hacking into individual mobile handsets. Exploiting phone information and location is a high-priority effort for the intelligence agencies, as terrorists and other intelligence targets make substantial use of phones in planning and carrying out their activities, for example by using phones as triggering devices in conflict zones. The NSA has cumulatively spent more than $1bn in its phone targeting efforts.The disclosures also reveal how much the shift towards smartphone browsing could benefit spy agencies' collection efforts.
  • Depending on what profile information a user had supplied, the documents suggested, the agency would be able to collect almost every key detail of a user's life: including home country, current location (through geolocation), age, gender, zip code, marital status – options included "single", "married", "divorced", "swinger" and more – income, ethnicity, sexual orientation, education level, and number of children.The agencies also made use of their mobile interception capabilities to collect location information in bulk, from Google and other mapping apps. One basic effort by GCHQ and the NSA was to build a database geolocating every mobile phone mast in the world – meaning that just by taking tower ID from a handset, location information could be gleaned.A more sophisticated effort, though, relied on intercepting Google Maps queries made on smartphones, and using them to collect large volumes of location information.So successful was this effort that one 2008 document noted that "[i]t effectively means that anyone using Google Maps on a smartphone is working in support of a GCHQ system."
  • ...3 more annotations...
  • One slide from a May 2010 NSA presentation on getting data from smartphones – breathlessly titled "Golden Nugget!" – sets out the agency's "perfect scenario": "Target uploading photo to a social media site taken with a mobile device. What can we get?"The question is answered in the notes to the slide: from that event alone, the agency said it could obtain a "possible image", email selector, phone, buddy lists, and "a host of other social working data as well as location".
  • The latest disclosures could also add to mounting public concern about how the technology sector collects and uses information, especially for those outside the US, who enjoy fewer privacy protections than Americans. A January poll for the Washington Post showed 69% of US adults were already concerned about how tech companies such as Google used and stored their information.The documents do not make it clear how much of the information that can be taken from apps is routinely collected, stored or searched, nor how many users may be affected. The NSA says it does not target Americans and its capabilities are deployed only against "valid foreign intelligence targets".The documents do set out in great detail exactly how much information can be collected from widely popular apps. One document held on GCHQ's internal Wikipedia-style guide for staff details what can be collected from different apps. Though it uses Android apps for most of its examples, it suggests much of the same data could be taken from equivalent apps on iPhone or other platforms.The GCHQ documents set out examples of what information can be extracted from different ad platforms, using perhaps the most popular mobile phone game of all time, Angry Birds – which has reportedly been downloaded more than 1.7bn times – as a case study.
  • Other apps choose to transmit much more data, meaning the agency could potentially net far more. One mobile ad platform, Millennial Media, appeared to offer particularly rich information. Millennial Media's website states it has partnered with Rovio on a special edition of Angry Birds; with Farmville maker Zynga; with Call of Duty developer Activision, and many other major franchises.
  •  
    Don't miss the linked companion articles at New York Times and ProPublica. 
Paul Merrell

Data Pirates of the Caribbean: The NSA Is Recording Every Cell Phone Call in the Bahama... - 0 views

  • The National Security Agency is secretly intercepting, recording, and archiving the audio of virtually every cell phone conversation on the island nation of the Bahamas. According to documents provided by NSA whistleblower Edward Snowden, the surveillance is part of a top-secret system – code-named SOMALGET – that was implemented without the knowledge or consent of the Bahamian government. Instead, the agency appears to have used access legally obtained in cooperation with the U.S. Drug Enforcement Administration to open a backdoor to the country’s cellular telephone network, enabling it to covertly record and store the “full-take audio” of every mobile call made to, from and within the Bahamas – and to replay those calls for up to a month. SOMALGET is part of a broader NSA program called MYSTIC, which The Intercept has learned is being used to secretly monitor the telecommunications systems of the Bahamas and several other countries, including Mexico, the Philippines, and Kenya. But while MYSTIC scrapes mobile networks for so-called “metadata” – information that reveals the time, source, and destination of calls – SOMALGET is a cutting-edge tool that enables the NSA to vacuum up and store the actual content of every conversation in an entire country.
  • All told, the NSA is using MYSTIC to gather personal data on mobile calls placed in countries with a combined population of more than 250 million people. And according to classified documents, the agency is seeking funding to export the sweeping surveillance capability elsewhere. The program raises profound questions about the nature and extent of American surveillance abroad. The U.S. intelligence community routinely justifies its massive spying efforts by citing the threats to national security posed by global terrorism and unpredictable rival nations like Russia and Iran. But the NSA documents indicate that SOMALGET has been deployed in the Bahamas to locate “international narcotics traffickers and special-interest alien smugglers” – traditional law-enforcement concerns, but a far cry from derailing terror plots or intercepting weapons of mass destruction.
  • By targeting the Bahamas’ entire mobile network, the NSA is intentionally collecting and retaining intelligence on millions of people who have not been accused of any crime or terrorist activity. Nearly five million Americans visit the country each year, and many prominent U.S. citizens keep homes there, including Sen. Tom Harkin (D-Iowa), Bill Gates, and Oprah Winfrey.
  • ...12 more annotations...
  • The Intercept has confirmed that as of 2013, the NSA was actively using MYSTIC to gather cell-phone metadata in five countries, and was intercepting voice data in two of them. Documents show that the NSA has been generating intelligence reports from MYSTIC surveillance in the Bahamas, Mexico, Kenya, the Philippines, and one other country, which The Intercept is not naming in response to specific, credible concerns that doing so could lead to increased violence. The more expansive full-take recording capability has been deployed in both the Bahamas and the unnamed country. MYSTIC was established in 2009 by the NSA’s Special Source Operations division, which works with corporate partners to conduct surveillance. Documents in the Snowden archive describe it as a “program for embedded collection systems overtly installed on target networks, predominantly for the collection and processing of wireless/mobile communications networks.”
  • If an entire nation’s cell-phone calls were a menu of TV shows, MYSTIC would be a cable programming guide showing which channels offer which shows, and when. SOMALGET would be the DVR that automatically records every show on every channel and stores them for a month. MYSTIC provides the access; SOMALGET provides the massive amounts of storage needed to archive all those calls so that analysts can listen to them at will after the fact. According to one NSA document, SOMALGET is “deployed against entire networks” in the Bahamas and the second country, and processes “over 100 million call events per day.”
  • When U.S. drug agents need to tap a phone of a suspected drug kingpin in another country, they call up their counterparts and ask them set up an intercept. To facilitate those taps, many nations – including the Bahamas – have hired contractors who install and maintain so-called lawful intercept equipment on their telecommunications. With SOMALGET, it appears that the NSA has used the access those contractors developed to secretly mine the country’s entire phone system for “signals intelligence” –recording every mobile call in the country. “Host countries,” the document notes, “are not aware of NSA’s SIGINT collection.” “Lawful intercept systems engineer communications vulnerabilities into networks, forcing the carriers to weaken,” says Christopher Soghoian, the principal technologist for the American Civil Liberties Union. “Host governments really should be thinking twice before they accept one of these Trojan horses.”
  • The DEA has long been in a unique position to help the NSA gain backdoor access to foreign phone networks. “DEA has close relationships with foreign government counterparts and vetted foreign partners,” the manager of the NSA’s drug-war efforts reported in a 2004 memo. Indeed, with more than 80 international offices, the DEA is one of the most widely deployed U.S. agencies around the globe. But what many foreign governments fail to realize is that U.S. drug agents don’t confine themselves to simply fighting narcotics traffickers. “DEA is actually one of the biggest spy operations there is,” says Finn Selander, a former DEA special agent who works with the drug-reform advocacy group Law Enforcement Against Prohibition. “Our mandate is not just drugs. We collect intelligence.” What’s more, Selander adds, the NSA has aided the DEA for years on surveillance operations. “On our reports, there’s drug information and then there’s non-drug information,” he says. “So countries let us in because they don’t view us, really, as a spy organization.”
  • When U.S. drug agents wiretap a country’s phone networks, they must comply with the host country’s laws and work alongside their law enforcement counterparts. “The way DEA works with our allies – it could be Bahamas or Jamaica or anywhere – the host country has to invite us,” says Margolis. “We come in and provide the support, but they do the intercept themselves.” The Bahamas’ Listening Devices Act requires all wiretaps to be authorized in writing either by the minister of national security or the police commissioner in consultation with the attorney general. The individuals to be targeted must be named. Under the nation’s Data Protection Act, personal data may only be “collected by means which are both lawful and fair in the circumstances of the case.” The office of the Bahamian data protection commissioner, which administers the act, said in a statement that it “was not aware of the matter you raise.” Countries like the Bahamas don’t install lawful intercepts on their own. With the adoption of international standards, a thriving market has emerged for private firms that are contracted by foreign governments to install and maintain lawful intercept equipment. Currently valued at more than $128 million, the global market for private interception services is expected to skyrocket to more than $970 million within the next four years, according to a 2013 report from the research firm Markets and Markets.
  • The proliferation of private contractors has apparently provided the NSA with direct access to foreign phone networks. According to the documents, MYSTIC draws its data from “collection systems” that were overtly installed on the telecommunications systems of targeted countries, apparently by corporate “partners” cooperating with the NSA. One NSA document spells out that “the overt purpose” given for accessing foreign telecommunications systems is “for legitimate commercial service for the Telco’s themselves.” But the same document adds: “Our covert mission is the provision of SIGINT,” or signals intelligence.
  • According to the NSA documents, MYSTIC targets calls and other data transmitted on  Global System for Mobile Communications networks – the primary framework used for cell phone calls worldwide. In the Philippines, MYSTIC collects “GSM, Short Message Service (SMS) and Call Detail Records” via access provided by a “DSD asset in a Philippine provider site.” (The DSD refers to the Defence Signals Directorate, an arm of Australian intelligence. The Australian consulate in New York declined to comment.) The operation in Kenya is “sponsored” by the CIA, according to the documents, and collects “GSM metadata with the potential for content at a later date.” The Mexican operation is likewise sponsored by the CIA. The documents don’t say how or under what pretenses the agency is gathering call data in those countries. In the Bahamas, the documents say, the NSA intercepts GSM data that is transmitted over what is known as the “A link”–or “A interface”–a core component of many mobile networks. The A link transfers data between two crucial parts of GSM networks – the base station subsystem, where phones in the field communicate with cell towers, and the network subsystem, which routes calls and text messages to the appropriate destination. “It’s where all of the telephone traffic goes,” says the former engineer.
  • “I seriously don’t think that would be your run-of-the-mill legal interception equipment,” says the former engineer, who worked with hardware and software that typically maxed out at 1,000 intercepts. The NSA, by contrast, is recording and storing tens of millions of calls – “mass surveillance,” he observes, that goes far beyond the standard practices for lawful interception recognized around the world. The Bahamas Telecommunications Company did not respond to repeated phone calls and emails.
  • If the U.S. government wanted to make a case for surveillance in the Bahamas, it could point to the country’s status as a leading haven for tax cheats, corporate shell games, and a wide array of black-market traffickers. The State Department considers the Bahamas both a “major drug-transit country” and a “major money laundering country” (a designation it shares with more than 60 other nations, including the U.S.). According to the International Monetary Fund, as of 2011 the Bahamas was home to 271 banks and trust companies with active licenses. At the time, the Bahamian banks held $595 billion in U.S. assets. But the NSA documents don’t reflect a concerted focus on the money launderers and powerful financial institutions – including numerous Western banks – that underpin the black market for narcotics in the Bahamas. Instead, an internal NSA presentation from 2013 recounts with pride how analysts used SOMALGET to locate an individual who “arranged Mexico-to-United States marijuana shipments” through the U.S. Postal Service.
  • The presentation doesn’t say whether the NSA shared the information with the DEA. But the drug agency’s Special Operations Divison has come under fire for improperly using classified information obtained by the NSA to launch criminal investigations – and then creating false narratives to mislead courts about how the investigations began. The tactic – known as parallel construction – was first reported by Reuters last year, and is now under investigation by the Justice Department’s inspector general. So: Beyond a desire to bust island pot dealers, why would the NSA choose to apply a powerful collection tool such as SOMALGET against the Bahamas, which poses virtually no threat to the United States? The answer may lie in a document that characterizes the Bahamas operation as a “test bed for system deployments, capabilities, and improvements” to SOMALGET. The country’s small population – fewer than 400,000 residents – provides a manageable sample to try out the surveillance system’s features. Since SOMALGET is also operational in one other country, the Bahamas may be used as a sort of guinea pig to beta-test improvements and alterations without impacting the system’s operations elsewhere. “From an engineering point of view it makes perfect sense,” says the former engineer. “Absolutely.”
  • SOMALGET operates under Executive Order 12333, a Reagan-era rule establishing wide latitude for the NSA and other intelligence agencies to spy on other countries, as long as the attorney general is convinced the efforts are aimed at gathering foreign intelligence. In 2000, the NSA assured Congress that all electronic surveillance performed under 12333 “must be conducted in a manner that minimizes the acquisition, retention, and dissemination of information about unconsenting U.S. persons.” In reality, many legal experts point out, the lack of judicial oversight or criminal penalties for violating the order render the guidelines meaningless. “I think it would be open, whether it was legal or not,” says German, the former FBI agent. “Because we don’t have all the facts about how they’re doing it. For a long time, the NSA has been interpreting their authority in the broadest possible way, even beyond what an objective observer would say was reasonable.” “An American citizen has Fourth Amendment rights wherever they are,” adds Kurt Opsahl, an attorney with the Electronic Frontier Foundation. “Nevertheless, there have certainly been a number of things published over the last year which suggest that there are broad, sweeping programs that the NSA and other government agencies are doing abroad that sweep up the communications of Americans.”
  • Legal or not, the NSA’s covert surveillance of an entire nation suggests that it will take more than the president’s tepid “limits” to rein in the ambitions of the intelligence community. “It’s almost like they have this mentality – if we can, we will,” says German. “There’s no analysis of the long-term risks of doing it, no analysis of whether it’s actually worth the effort, no analysis of whether we couldn’t take those resources and actually put them on real threats and do more good.” It’s not surprising, German adds, that the government’s covert program in the Bahamas didn’t remain covert. “The undermining of international law and international cooperation is such a long-term negative result of these programs that they had to know would eventually be exposed, whether through a leak, whether through a spy, whether through an accident,” he says. “Nothing stays secret forever. It really shows the arrogance of these agencies – they were just going to do what they were going to do, and they weren’t really going to consider any other important aspects of how our long-term security needs to be addressed.”
  •  
    Words fail me.
Paul Merrell

New military draft starts in Ukraine amid intensified assault on militia-held territori... - 0 views

  • The Ukrainian military draft for 2015 has come into effect. It’s expected to see 100,000 people joining the army in three stages throughout the year. The self-proclaimed Donetsk republic says the process is undermining peace agreements. The first stage of the draft, starting on Tuesday, will last ninety days and will seek 50,000 recruits. Two more stages will follow in April and June. The main aim of the mobilization is said to be replacement for those on the front line in eastern Ukraine, who were recruited last year. Those eligible for draft are primarily reserve servicemen aged from 25 to 60. They are supposed to get a month of training before they actually go to the battlegrounds in eastern Ukraine. Women – mostly nurses and psychologists - are also subject to mobilization, according to the law signed by President Poroshenko on Monday. Joint Staff spokesman Vladimir Talalay has warned those dodging the draft could face up to five years behind bars.
  • The threat hasn’t prevented Ukrainians from venting their anger online at the draft campaign. Many argue mobilization is only possible after martial law has been imposed in the country. The military campaign in Ukraine’s east is officially dubbed an anti-terrorist operation, which people believe is something security forces are supposed to deal with. “While it’s anti-terror operation in Ukraine (and not war), NO!!! mobilization is possible!” a Facebook comment, cited by RIA Novosti, reads. “Declare martial law first and then mobilization.” Last year saw three waves of mobilization in Ukraine. Each was accompanied by massive protests from the draftees’ relatives.
  • Online offers of help to those wanting to avoid army service have also been rife, ranging from legal advice to selling fake medical certificates. The self-proclaimed republic of Donetsk has already slammed the new Ukrainian draft as inconsistent with the peace agreements signed in Minsk in September. The draft comes into effect as Ukrainian troops continue their massive assault on militia-held areas It started on Sunday in accordance with a presidential order.
Paul Merrell

European Lawmakers Demand Answers on Phone Key Theft - The Intercept - 0 views

  • European officials are demanding answers and investigations into a joint U.S. and U.K. hack of the world’s largest manufacturer of mobile SIM cards, following a report published by The Intercept Thursday. The report, based on leaked documents provided by NSA whistleblower Edward Snowden, revealed the U.S. spy agency and its British counterpart Government Communications Headquarters, GCHQ, hacked the Franco-Dutch digital security giant Gemalto in a sophisticated heist of encrypted cell-phone keys. The European Parliament’s chief negotiator on the European Union’s data protection law, Jan Philipp Albrecht, said the hack was “obviously based on some illegal activities.” “Member states like the U.K. are frankly not respecting the [law of the] Netherlands and partner states,” Albrecht told the Wall Street Journal. Sophie in ’t Veld, an EU parliamentarian with D66, the Netherlands’ largest opposition party, added, “Year after year we have heard about cowboy practices of secret services, but governments did nothing and kept quiet […] In fact, those very same governments push for ever-more surveillance capabilities, while it remains unclear how effective these practices are.”
  • “If the average IT whizzkid breaks into a company system, he’ll end up behind bars,” In ’t Veld added in a tweet Friday. The EU itself is barred from undertaking such investigations, leaving individual countries responsible for looking into cases that impact their national security matters. “We even get letters from the U.K. government saying we shouldn’t deal with these issues because it’s their own issue of national security,” Albrecht said. Still, lawmakers in the Netherlands are seeking investigations. Gerard Schouw, a Dutch member of parliament, also with the D66 party, has called on Ronald Plasterk, the Dutch minister of the interior, to answer questions before parliament. On Tuesday, the Dutch parliament will debate Schouw’s request. Additionally, European legal experts tell The Intercept, public prosecutors in EU member states that are both party to the Cybercrime Convention, which prohibits computer hacking, and home to Gemalto subsidiaries could pursue investigations into the breach of the company’s systems.
  • According to secret documents from 2010 and 2011, a joint NSA-GCHQ unit penetrated Gemalto’s internal networks and infiltrated the private communications of its employees in order to steal encryption keys, embedded on tiny SIM cards, which are used to protect the privacy of cellphone communications across the world. Gemalto produces some 2 billion SIM cards a year. The company’s clients include AT&T, T-Mobile, Verizon, Sprint and some 450 wireless network providers. “[We] believe we have their entire network,” GCHQ boasted in a leaked slide, referring to the Gemalto heist.
  • ...4 more annotations...
  • While Gemalto was indeed another casualty in Western governments’ sweeping effort to gather as much global intelligence advantage as possible, the leaked documents make clear that the company was specifically targeted. According to the materials published Thursday, GCHQ used a specific codename — DAPINO GAMMA — to refer to the operations against Gemalto. The spies also actively penetrated the email and social media accounts of Gemalto employees across the world in an effort to steal the company’s encryption keys. Evidence of the Gemalto breach rattled the digital security community. “Almost everyone in the world carries cell phones and this is an unprecedented mass attack on the privacy of citizens worldwide,” said Greg Nojeim, senior counsel at the Center for Democracy & Technology, a non-profit that advocates for digital privacy and free online expression. “While there is certainly value in targeted surveillance of cell phone communications, this coordinated subversion of the trusted technical security infrastructure of cell phones means the US and British governments now have easy access to our mobile communications.”
  • For Gemalto, evidence that their vaunted security systems and the privacy of customers had been compromised by the world’s top spy agencies made an immediate financial impact. The company’s shares took a dive on the Paris bourse Friday, falling $500 million. In the U.S., Gemalto’s shares fell as much 10 percent Friday morning. They had recovered somewhat — down 4 percent — by the close of trading on the Euronext stock exchange. Analysts at Dutch financial services company Rabobank speculated in a research note that Gemalto could be forced to recall “a large number” of SIM cards. The French daily L’Express noted today that Gemalto board member Alex Mandl was a founding trustee of the CIA-funded venture capital firm In-Q-Tel. Mandl resigned from In-Q-Tel’s board in 2002, when he was appointed CEO of Gemplus, which later merged with another company to become Gemalto. But the CIA connection still dogged Mandl, with the French press regularly insinuating that American spies could infiltrate the company. In 2003, a group of French lawmakers tried unsuccessfully to create a commission to investigate Gemplus’s ties to the CIA and its implications for the security of SIM cards. Mandl, an Austrian-American businessman who was once a top executive at AT&T, has denied that he had any relationship with the CIA beyond In-Q-Tel. In 2002, he said he did not even have a security clearance.
  • AT&T, T-Mobile and Verizon could not be reached for comment Friday. Sprint declined to comment. Vodafone, the world’s second largest telecom provider by subscribers and a customer of Gemalto, said in a statement, “[W]e have no further details of these allegations which are industrywide in nature and are not focused on any one mobile operator. We will support industry bodies and Gemalto in their investigations.” Deutsche Telekom AG, a German company, said it has changed encryption algorithms in its Gemalto SIM cards. “We currently have no knowledge that this additional protection mechanism has been compromised,” the company said in a statement. “However, we cannot rule out this completely.”
  • Update: Asked about the SIM card heist, White House press secretary Josh Earnest said he did not expect the news would hurt relations with the tech industry: “It’s hard for me to imagine that there are a lot of technology executives that are out there that are in a position of saying that they hope that people who wish harm to this country will be able to use their technology to do so. So, I do think in fact that there are opportunities for the private sector and the federal government to coordinate and to cooperate on these efforts, both to keep the country safe, but also to protect our civil liberties.”
  •  
    Watch for massive class action product defect litigation to be filed against the phone companies.and mobile device manufacturers.  In most U.S. jurisdictions, proof that the vendors/manufacturers  knew of the product defect is not required, only proof of the defect. Also, this is a golden opportunity for anyone who wants to get out of a pricey cellphone contract, since providing a compromised cellphone is a material breach of warranty, whether explicit or implied..   
Gary Edwards

» EXCLUSIVE: Snowden Level Documents Reveal Stealth DHS Spy Grid Alex Jones' ... - 0 views

  • “The NMS also collects information about every Wi‐Fi client accessing the network, including its MAC address, IP address, signal intensity, data rate and traffic status,” the document reads. “Additional NMS features include a fault management system for issuing alarms and logging events according to a set of customizable filtering rules, along with centralized and version‐controlled remote updating of the Aruba Mesh Operating System software.”
  •  
    It just keeps getting better ............... excerpt: "The wireless mesh network, which allows for private communication between wireless devices including cell phones and laptops, was built by California-based Aruba Networks, a major provider of next-generation mobile network access solutions. Labeled by their intersection location such as "1st&University" and "2nd& Seneca," the multiple network devices are easily detected in Seattle's downtown area through a simple Wi-Fi enabled device, leading many residents to wonder if they are being detected in return. "How accurately can it geo-locate and track the movements of your phone, laptop, or any other wireless device by its MAC address? Can the network send that information to a database, allowing the SPD to reconstruct who was where at any given time, on any given day, without a warrant? Can the network see you now?" asked Seattle newspaper The Stranger. According to reports from Kiro 7 News, the mesh network devices can capture a mobile user's IP address, mobile device type, apps used, current location and even historical location down to the last 1,000 places visited. So far Seattle police have been tight-lipped about the network's roll-out, even denying that the system is operational. Several groups including the ACLU have submitted requests to learn the programs intended use, but days have turned to months as the mesh network continues its advancement. According to The Stranger's investigation, Seattle Police detective Monty Moss claims the department has no plans to use the mesh network for surveillance… unless given approval by city council. Despite a recently passed ordinance requiring all potential surveillance equipment to be given city council approval and public review within 30 days of its implementation, the network has remained shrouded in secrecy. Unknown to the public until now, information regarding the system has been hiding in plain view since last February at minimum. Diagr
Gary Edwards

Updated specs released for the Blackphone secure smartphone - 1 views

  •  
    Nice video. I want one! excerpt: "SGP Technologies has released updated tech specs for its Blackphone, a smartphone designed with user privacy in mind. The device was unveiled at Mobile World Congress in February as a secure smartphone for the mass market. It will feature an NVIDIA Tegra 4i mobile processor. The Tegra 4i processor is amongst the most powerful mobile processors available, running 60 custom GPU cores and a quad-core CPU. It clocks in at a top speed of 2.3 GHz, with 2 GB of RAM. The device has a fifth core for battery saving. The Blackphone runs PrivatOS, SGP's own custom operating system based on on the KitKat version of Android. Users are provided with 16 GB of internal memory and have the option of using additional microSD storage. It features an 8 MP camera on the rear and a 5 MP front-facing camera. It also has a 4.7 in HD display with a resolution of 1280 x 720. Users can purchase the phone unlocked for use on any network or can buy it through "selected partner carriers." A number of privacy tools will be pre-installed, such as secure voice and video calling, secure text messaging and encrypted storage of contacts. Anonymous search, private browsing, secure VPN connectivity and secure cloud storage are also featured. The first pre-sales run of the Blackphone is sold out, but more devices are expected to become available from June. The Blackphone is listed for US$629. The video below provides an introduction to the Blackphone."
Paul Merrell

The Great SIM Heist: How Spies Stole the Keys to the Encryption Castle - 0 views

  • AMERICAN AND BRITISH spies hacked into the internal computer network of the largest manufacturer of SIM cards in the world, stealing encryption keys used to protect the privacy of cellphone communications across the globe, according to top-secret documents provided to The Intercept by National Security Agency whistleblower Edward Snowden. The hack was perpetrated by a joint unit consisting of operatives from the NSA and its British counterpart Government Communications Headquarters, or GCHQ. The breach, detailed in a secret 2010 GCHQ document, gave the surveillance agencies the potential to secretly monitor a large portion of the world’s cellular communications, including both voice and data. The company targeted by the intelligence agencies, Gemalto, is a multinational firm incorporated in the Netherlands that makes the chips used in mobile phones and next-generation credit cards. Among its clients are AT&T, T-Mobile, Verizon, Sprint and some 450 wireless network providers around the world. The company operates in 85 countries and has more than 40 manufacturing facilities. One of its three global headquarters is in Austin, Texas and it has a large factory in Pennsylvania. In all, Gemalto produces some 2 billion SIM cards a year. Its motto is “Security to be Free.”
  • With these stolen encryption keys, intelligence agencies can monitor mobile communications without seeking or receiving approval from telecom companies and foreign governments. Possessing the keys also sidesteps the need to get a warrant or a wiretap, while leaving no trace on the wireless provider’s network that the communications were intercepted. Bulk key theft additionally enables the intelligence agencies to unlock any previously encrypted communications they had already intercepted, but did not yet have the ability to decrypt.
  • Leading privacy advocates and security experts say that the theft of encryption keys from major wireless network providers is tantamount to a thief obtaining the master ring of a building superintendent who holds the keys to every apartment. “Once you have the keys, decrypting traffic is trivial,” says Christopher Soghoian, the principal technologist for the American Civil Liberties Union. “The news of this key theft will send a shock wave through the security community.”
  • ...2 more annotations...
  • According to one secret GCHQ slide, the British intelligence agency penetrated Gemalto’s internal networks, planting malware on several computers, giving GCHQ secret access. We “believe we have their entire network,” the slide’s author boasted about the operation against Gemalto. Additionally, the spy agency targeted unnamed cellular companies’ core networks, giving it access to “sales staff machines for customer information and network engineers machines for network maps.” GCHQ also claimed the ability to manipulate the billing servers of cell companies to “suppress” charges in an effort to conceal the spy agency’s secret actions against an individual’s phone. Most significantly, GCHQ also penetrated “authentication servers,” allowing it to decrypt data and voice communications between a targeted individual’s phone and his or her telecom provider’s network. A note accompanying the slide asserted that the spy agency was “very happy with the data so far and [was] working through the vast quantity of product.”
  • The U.S. and British intelligence agencies pulled off the encryption key heist in great stealth, giving them the ability to intercept and decrypt communications without alerting the wireless network provider, the foreign government or the individual user that they have been targeted. “Gaining access to a database of keys is pretty much game over for cellular encryption,” says Matthew Green, a cryptography specialist at the Johns Hopkins Information Security Institute. The massive key theft is “bad news for phone security. Really bad news.”
  •  
    Remember all those NSA claims that no evidence of their misbehavior has emerged? That one should never take wing again. Monitoring call content without the involvement of any court? Without a warrant? Without probable cause?  Was there even any Congressional authorization?  Wiretapping unequivocally requires a judicially-approved search warrant. It's going to be very interesting to learn the government's argument for this misconduct's legality. 
Paul Merrell

EXCLUSIVE: Snowden reveals more US cyberspying details | South China Morning Post - 0 views

  • US spies are hacking into Chinese mobile phone companies to steal text messages and attacking the servers at Tsinghua University, Edward Snowden has told the Sunday Morning Post. The latest explosive revelations about US National Security Agency cybersnooping in Hong Kong and on the mainland are based on further scrutiny and clarification of information Snowden provided on June 12. The former technician for the US Central Intelligence Agency and contractor for the National Security Agency provided documents revealing attacks on computers over a four-year period.
  • The documents listed operational details of specific attacks on computers, including internet protocol (IP) addresses, dates of attacks and whether a computer was still being monitored remotely. The Sunday Morning Post can now reveal Snowden's claims that the NSA is: Extensive hacking of major telecommunication companies in China to access text messages   Sustained attacks on network backbones at Tsinghua University, China’s premier seat of learning   Hacking of computers at the Hong Kong headquarters of Pacnet, which owns one of the most extensive fibre optic submarine cable networks in the region
  • Pacnet, which recently signed major deals with the mainland's top mobile phone companies, owns more than 46,000 kilometres of fibre-optic cables. The cables connect its regional data centres across the Asia-Pacific region, including Hong Kong, the mainland, Japan, South Korea, Singapore and Taiwan. It also has offices in the US. Snowden claims that data from Chinese mobile phone companies has been compromised, with millions of private text messages mined by the NSA. Cybersecurity experts on the mainland have long feared mobile phone companies had fallen victim to back-door attacks because they were forced to go overseas to buy core technology for their networks. In recent years, those security concerns became more vocal and as a result domestic network equipment suppliers such as Huawai, Datang and ZTE started to close the technology gap, enabling the phone companies to reduce their reliance on foreign suppliers.
  • ...1 more annotation...
  • As for the attacks at Tsinghua University, the leaked information points to the NSA hacking into the institute's servers as recently as January. Tsinghua is widely regarded as China's top education and research institute and carries out extensive work on next-generation web technologies. It is home to one of the mainland's six major network backbones, the China Education and Research Network.
Paul Merrell

EU issues guidelines on labelling products from Israeli settlements | World news | The ... - 0 views

  • The European Union has issued new guidelines for the labelling of products from illegal Israeli settlements in the occupied Palestinian territories, after years of deliberation and in the teeth of fierce Israeli opposition. Binyamin Netanyahu, the Israeli prime minister, made a personal appeal to a number of key European figures in the runup to the decision, in which he said the plan was discriminatory, indicative of double standards, and would embolden those who seek to “eliminate” Israel. The measures will primarily cover fruit and vegetables and should affect less than 1% of all trade from Israel to the EU, which is worth about €30bn. EU officials said existing measures for produce brought into Britain have had no negative economic effect.
  • On some products, like fruit and vegetables, the labelling referring to settlements will be mandatory, while on others it will be voluntary. Israel sees the move as a political stigma that rewards Palestinian violence and will push consumers away. It immediately summoned the EU ambassador to Israel, Lars Faaborg-Andersen, in protest. The Israeli foreign ministry said the EU has chosen “for political motives, to take an unusual and discriminatory step” at a time when Israel is facing a wave of terror. In a statement, the ministry said it was “surprised and even angered by the fact that the EU chooses to implement a double standard against Israel, while ignoring 200 territorial disputes taking place today around the world, including within [the EU] or right on [Israel’s] doorstep”. The EU’s claim that the decision was a “technical step” was baseless and cynical, the statement added.
  • Despite insisting in public that the new guidelines provide clarity to consumers, European diplomats have privately made it clear the move is designed to put pressure on Israel over its continued settlement building in the occupied territories and the absence of a peace dialogue; a sharp rise in violence between Israelis and Palestinians has claimed 90 lives in the last month. Announcing the new guidelines, a European commission official said it had “adopted this morning the Interpretative Notice on indication of origin of goods from the territories occupied by Israel since June 1967”. Although the new guidelines are expected to have little real economic impact, they do carry a political significance for Israel, not least because of the widespread agreement among European governments over their implementation. The decision to push ahead with issuing the guidelines also marks the second major defeat in a year for Netanyahu on an international stage, following his defeat over the Iran nuclear accord, amid mounting evidence of Israel’s growing international isolation.
  • ...2 more annotations...
  • Senior European officials insist that European consumers are entitled to know the source of goods previously labelled as Israeli. Israeli politicians – including Netanyahu – have made comparisons between labelling and the Nazi era, with some suggesting the move is immoral and antisemitic.
  • On Tuesday, a letter leaked to the Guardian showed that Netanyahu had written or spoken to a number of senior European figures, including European parliament president Martin Schulz, asking for their help to block the move. In a letter to Schulz, the Israeli prime minister said the move was politicised, adding that it could “lead to an actual boycott [of Israel], emboldening those who are not interested in Israeli-Palestinian peace but eliminating Israel altogether”. Since 2003, the EU has placed a numerical code on Israeli imports to allow customs to distinguish between products made within the Green Line and those that are produced beyond it. The UK adopted labelling guidelines for settlement products three years ago.
  •  
    Too mild. Under international law, the EU should do a total ban on importing all products from the Occupied Territories. 
Paul Merrell

Russia Reports Discovery of Rebel-Held Chemical Weapons at Site of Idlib Gas Attack - 0 views

  • In the aftermath of yesterday’s chemical gas attack in Syria’s Idlib Province, numerous governments – including those that have funded and armed rebels in an attempt to overthrow the Syrian government – have accused the Syrian army of being primarily responsible for the attack, despite no independent confirmation of their claim and no investigation into who was truly responsible for the tragedy. As MintPress recently reported, the only information available regarding the attack so far has come from only two sources: the White Helmets and the Syrian Observatory for Human Rights. Both groups have strong ties to pro-interventionist governments that have armed and funded rebel groups and even have ties to al-Qaeda.
  • However, pro-interventionist elements in foreign governments and within the Syrian opposition seem disinterested in obtaining valid information, jumping on initial accusations from dubious sources to support long-standing efforts to destabilize and overthrow the Syrian government. Wednesday morning, while media outlets throughout the West ran headlines calling for foreign intervention in Syria with headlines like “We Must Not Look Away,” the Russian Defense Ministry announced a surprising discovery in Khan Sheikhoun the very township where the gas attack took place. Maj. Gen. Igor Konashenkov publicly stated Wednesday morning that a warehouse in the vicinity of Khan Sheikhoun had been destroyed as part of a Syrian Air Force airstrike conducted midday Tuesday, several hours after the gas attack. According to Konashenkov, the facility produced and stored shells that contained toxic gas, many of which had been delivered to Iraq and repeatedly used there by Daesh militants and other extremists. He also pointed out that the same weapons had been used by foreign-funded rebels in Aleppo in 2016 – a conclusion derived by the analysis of samples taken by Russian military experts. He also stated that the victims of yesterday’s gas attack displayed identical symptoms to those shown by victims of the Aleppo attack. Rebels operating in the area – all of which are allied with the al-Nusra Front and Ahrar al-Sham, both al-Qaeda affiliates – have rejected Konashenkov’s claims. Hasan Haj Ali, commander of the al-Nusra affiliate Free Idlib Army rebel group, told Reuters: “all the civilians in the area know that there are no military positions there, or places for the manufacture [of weapons]. The various factions of the opposition are not capable of producing these substances.”
  • However, it was proven back in 2013 that not only were the rebels capable of producing chemical weapons, but they had used them repeatedly in both Syria and Iraq. For instance, UN officials have confirmed that anti-Assad rebels were responsible for the 2013 sarin gas attack in Ghouta, another attack that was prematurely blamed on the Assad regime. In addition, Pulitzer Prize-winning journalist Seymour Hersh established in his 2014 piece “The Red Line and the Rat Line” that rebels have long had the capacity to carry out chemical weapon attacks and that countries such as Turkey and Saudi Arabia have supplied them with such weapons. Sria’s government, by contrast, no longer has chemical weapons, a fact established by the Organization for the Prohibition of Chemical Weapons (OPCW). The organization confirmed in 2016 that all Syrian government chemical weapons had been destroyed under their supervision per Assad’s affirmation of the International Chemical Weapons Convention three years prior. OPCW’s fact-finding mission, a joint effort with the United Nations, is still active within Syria and has yet to report its findings regarding Tuesday’s attack, according to a statement released Wednesday. In addition, questions have been raised regarding the information that has come from opposition sources regarding the gas attack in Idlib, particularly the now widely-shared images purporting to show victims of yesterday’s attack.
  • ...1 more annotation...
  • As Paul Antonopoulos of Al-Masdar News wrote: […] in the above picture, the White Helmets are handling the corpses of people without sufficient safety gear, most particularly with masks mostly used, as well as no gloves. […] Within seconds of exposure to sarin, the affects [sic] of the gas begin to target the muscle and nervous system. There is an almost immediate release of the bowels and the bladder, and vomiting is induced. When sarin is used in a concentrated area, it has the likelihood of killing thousands of people. Yet, such a dangerous gas, and the White Helmets are treating bodies with little concern to their exposed skin. This has to raise questions.” While Western governments and the corporate media have already assured themselves of Assad’s guilt, this latest discovery – along with other notable evidence – suggests that the basis for this assumption is faulty at best. The warehouse was discovered less than a day prior to a UN Security Council emergency meeting over Tuesday’s gas attack, leading many pro-interventionist governments to suggest that Russia is merely trying to protect its ally from international criticism and retaliation. Though the timing could be construed as suspect, Assad – on the verge of reclaiming nearly all Syrian cities from the opposition – stands little to gain from using internationally banned weapons, while the increasingly desperate NATO-armed and funded rebels are the greatest beneficiaries from the renewed calls for foreign intervention in Syria following Tuesday’s attack. At the very least, this latest discovery of a chemical weapons warehouse demands that world leaders, pro-intervention and otherwise, must wait for a complete investigation of the incident before taking drastic action. As Antonopoulos noted: “Before the war cries begin and the denouncement of the government from high officials in power positions begin, time must be given so that all evidence can emerge.”
  •  
    As the U.S. prepares to go to war against Syria for its alleged gas attack in Idlib province ...
Gary Edwards

Bring On The Web Apps: StackMob Launches Hosted HTML5 Service | TechCrunch - 0 views

  •  
    The cloud-based platform for mobile developers is today launching hosted HTML5 services that tie to StackMob's backend, making it the first platform offering integrated HTML5. Developers can use the new service to host full HTML5 apps for desktop, tablet or mobile, or can use it to host the HTML5 running within their native apps.
Gary Edwards

How World War I Paved the Way for the Warfare State :: The Mises Economics Blog: The Ci... - 0 views

  •  
    Part ONE "by David Stockman Remarks To The Committee For The Republic, Washington DC, February 2014 (Part 1 of 6 Parts) [From David Stockman's Contra Corner.] Flask in hand, Boris Yelstin famously mounted a tank outside the Soviet Parliament in August 1991. Presently, the fearsome Red Army stood down-an outcome which 45 years of Cold War military mobilization by the West had failed to accomplish. At the time, the U.S. Warfare State's budget- counting the pentagon, spy agencies, DOE weapons, foreign aid, homeland security and veterans--was about $500 billion in today's dollars.  Now, a quarter century on from the Cold War's end, that same metric stands at $900 billion. This near doubling of the Warfare State's fiscal girth is a tad incongruous.  After all, America's war machine was designed to thwart a giant, nuclear-armed industrial state, but, alas, we now have no industrial state enemies left on the planet. The much-shrunken Russian successor to the Soviet Union, for example, has become a kleptocracy run by a clever thief who prefers stealing from his own citizens. Likewise, the Red Chinese threat consists of a re-conditioned aircraft carrier bought second-hand from a former naval power--otherwise known as the former Ukraine. China's bubble-ridden domestic economy would collapse within six weeks were it to actually bomb the 4,000 Wal-Mart outlets in America on which its mercantilist export machine utterly depends. On top of that, we've been fired as the world's policeman, al Qaeda has splintered among warlords who inhabit the armpits of the world from Yemen to Somalia and during last September's Syria war scare the American people even took away the President's keys to the Tomahawk missile batteries.  In short, the persistence of America's trillion dollar Warfare State budget needs some serious "splainin". The Great War and Its Aftermath My purpose tonight is to sketch the long story of how it all happened, starti
1 - 20 of 256 Next › Last »
Showing 20 items per page