Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged modified

Rss Feed Group items tagged

Paul Merrell

FBI sharply increases use of Patriot Act provision to collect US citizens' records - Op... - 0 views

  • The FBI has dramatically increased its use of a controversial provision of the Patriot Act to secretly obtain a vast store of business records of U.S. citizens under President Barack Obama, according to recent Justice Department reports to Congress. The bureau filed 212 requests for such data to a national security court last year – a 1,000-percent increase from the number of such requests four years earlier, the reports show. Follow @openchannelblog The FBI’s increased use of the Patriot Act’s “business records” provision — and the wide ranging scope of its requests -- is getting new scrutiny in light of last week’s disclosure that that the provision was used to obtain a top-secret national security order requiring telecommunications companies to turn over records of millions of telephone calls. Advertise | AdChoices Taken together, experts say, those revelations show the government has broadly interpreted the Patriot Act provision as enabling it to collect data not just on specific individuals, but on millions of Americans with no suspected terrorist connections. And it shows that the Foreign Intelligence Surveillance Court  accepted that broad interpretation of the law.
  • “That they were using this (provision) to do mass collection of data is definitely the biggest surprise,” said Robert Chesney, a top national security lawyer at the University of Texas Law School. “Most people who followed this closely were not aware they were doing this.  We’ve gone from producing records for a particular investigation to the production of all records for a massive pre-collection database. It’s incredibly sweeping.”  
  • But little-noticed statements by FBI Director Robert Mueller in recent years – as well as interviews with former senior law enforcement officials – hint at what Chesney calls a largely unnoticed “sea change” in the way the U.S. government collects data for terrorism and other national security investigations.
  • ...5 more annotations...
  • The Patriot Act provision, known as Section 215, allows the FBI to require the production of business records and any other “tangible things” -- including “books, records, papers, documents and other items,” for an authorized terrorism or foreign intelligence investigation. The Patriot Act was a broad expansion of law enforcement powers enacted by Congress with overwhelming bipartisan support in the aftermath of the Sept. 11, 2001, terrorist attacks. In addition to Section 215, other provisions expanded the FBI’s power to issue so-called “national security letters,” requiring individuals and business to turn over a more limited set of records without any court order at all.  Advertise | AdChoices In contrast to standard grand jury subpoenas, material obtained under both Section 215 orders and national security letters must be turned over under so-called “gag orders” that forbid the business or institution that receives the order from notifying its customers or publicly referring to the matter.
  • From the earliest days of the Patriot Act, Section 215 was among the most hotly disputed of its provisions. Critics charged the language – “tangible things” -- was so broad that it would even permit the FBI to obtain library and bookstore records to inspect what citizens were reading.Ashcroft confronted criticismLargely to tamp down those concerns, then-Attorney General John Ashcroft declassified information about the FBI’s use of the provision in September 2003, saying in a statement that “the number of times Section 215 has been used to date is zero.” Ashcroft added that he was releasing the information “to counter the troubling amount of public distortion and misinformation” about Section 215. But in the years since, the FBI’s use of Section 215 quietly exploded, with virtually no public notice or debate. In 2009, as part of an annual report to Congress, the Justice Department reported there had been 21 applications for business records to the Foreign Intelligence Surveillance Court (FISC) under Section 215 – all of which were granted, though nine were modified by the court. (The reports do not explain how or why the orders were modified.) 
  • In 2010, the number of requests jumped to 205 (all again granted, with 176 modified.) In the latest report filed on April 30, the department reported there had been 212 such requests in 2012 – all approved by the court, but 200 of them modified.These sharp increase in the use of Section 215 has drawn little attention until now because the number of national security letters (NSLs) issued by the bureau has been so much greater -- 15,229 in 2012. But FBI Director Mueller, in little-noticed written responses to Congress two years ago, explained that the bureau was encountering resistance from telecommunications companies in turning over “electronic communication transaction” records in response to national security letters.“Beginning in late 2009, certain electronic communications service providers no longer honored NSLs to obtain” records because of what their lawyers cited as “an ambiguity” in the law. (What Mueller didn’t say was this came at a time when all the major telecommunications companies were still facing lawsuits over their cooperation with the government on surveillance programs.) As a result, Mueller said, the FBI had switched over to demanding the same data under Section 215. “This change accounts for a significant increase in the volume of business records requests,” Mueller wrote.
  • Saying they wanted to put an end to “secret law,  eight U.S. senators — led by Sens. Jeff Merkley, D-Ore., and Mike Lee, R-Utah — on Tuesday introduced a bill to require the Justice Department to declassify national security court decisions that have permitted the use of the “business records” provision for such purposes.
  • The motion also asks the court to consider the constitutionality of the “gag order” written into Section 215.“There should be no room for secret law,” said Jameel Jaffer, the ACLU’s deputy legal director, adding that disclosure of the FISC rulings is essential if the debate Obama called for is to take place. “The public has a right to know what limits apply to the government’s surveillance authority, and what safeguards are in place to protect individual privacy.” 
Paul Merrell

iSpy: The CIA Campaign to Steal Apple's Secrets - 0 views

  • ESEARCHERS WORKING with the Central Intelligence Agency have conducted a multi-year, sustained effort to break the security of Apple’s iPhones and iPads, according to top-secret documents obtained by The Intercept. The security researchers presented their latest tactics and achievements at a secret annual gathering, called the “Jamboree,” where attendees discussed strategies for exploiting security flaws in household and commercial electronics. The conferences have spanned nearly a decade, with the first CIA-sponsored meeting taking place a year before the first iPhone was released. By targeting essential security keys used to encrypt data stored on Apple’s devices, the researchers have sought to thwart the company’s attempts to provide mobile security to hundreds of millions of Apple customers across the globe. Studying both “physical” and “non-invasive” techniques, U.S. government-sponsored research has been aimed at discovering ways to decrypt and ultimately penetrate Apple’s encrypted firmware. This could enable spies to plant malicious code on Apple devices and seek out potential vulnerabilities in other parts of the iPhone and iPad currently masked by encryption.
  • The CIA declined to comment for this story. The security researchers also claimed they had created a modified version of Apple’s proprietary software development tool, Xcode, which could sneak surveillance backdoors into any apps or programs created using the tool. Xcode, which is distributed by Apple to hundreds of thousands of developers, is used to create apps that are sold through Apple’s App Store. The modified version of Xcode, the researchers claimed, could enable spies to steal passwords and grab messages on infected devices. Researchers also claimed the modified Xcode could “force all iOS applications to send embedded data to a listening post.” It remains unclear how intelligence agencies would get developers to use the poisoned version of Xcode. Researchers also claimed they had successfully modified the OS X updater, a program used to deliver updates to laptop and desktop computers, to install a “keylogger.”
  • Other presentations at the CIA conference have focused on the products of Apple’s competitors, including Microsoft’s BitLocker encryption system, which is used widely on laptop and desktop computers running premium editions of Windows. The revelations that the CIA has waged a secret campaign to defeat the security mechanisms built into Apple’s devices come as Apple and other tech giants are loudly resisting pressure from senior U.S. and U.K. government officials to weaken the security of their products. Law enforcement agencies want the companies to maintain the government’s ability to bypass security tools built into wireless devices. Perhaps more than any other corporate leader, Apple’s CEO, Tim Cook, has taken a stand for privacy as a core value, while sharply criticizing the actions of U.S. law enforcement and intelligence agencies. “If U.S. products are OK to target, that’s news to me,” says Matthew Green, a cryptography expert at Johns Hopkins University’s Information Security Institute. “Tearing apart the products of U.S. manufacturers and potentially putting backdoors in software distributed by unknowing developers all seems to be going a bit beyond ‘targeting bad guys.’ It may be a means to an end, but it’s a hell of a means.”
Paul Merrell

What GOP Senators Don't Understand About Iran | Al Jazeera America - 0 views

  • There’s a charming naiveté to the open letter [PDF] by 47 Republican senators that condescendingly seeks to explain features of the U.S. constitutional system to Iran’s leaders that they otherwise “may not fully understand.” The missive warns that, with respect to “your nuclear negotiations with our government ... any agreement regarding your nuclear-weapons program that is not approved by the Congress” could be revoked by the next president “with the stroke of a pen and future Congresses could modify the terms of the agreement at any time.”
  • Beyond the amusing inaccuracies about U.S. parliamentary order, it seems there are some features of the nuclear negotiations that the signatory senators don’t fully understand — not only on the terms of the deal, but also on who would be party to an agreement. There are no negotiations on Iran’s “nuclear-weapons program” because the world’s intelligence agencies (including those of the U.S. and Israel) do not believe Iran is currently building nuclear weapons, nor has it made a strategic decision to use its civilian nuclear infrastructure to produce a bomb. An active Iranian nuclear-weapons program would render moot the current negotiations, because Iran would be in fundamental violation of the Nuclear Non-Proliferation Treaty (NPT). As things stand, Tehran remains within the terms of the NPT, which allows nuclear technology for peaceful purposes, but monitors member states to prevent weaponization. Tehran and the IAEA remain in dispute over full compliance with all transparency requirements of the NPT, particularly over alleged previous research into weapons design. But Iran’s nuclear facilities remain under constant monitoring by international inspectors who certify that no nuclear material is being diverted.
  • The current negotiations are focused on strengthening verifiable safeguards against weaponization over-and-above those required by the NPT, yet the Republican-led Congress, egged on by Israeli Prime Minister Benjamin Netanyahu, is warning that those goals are insufficient, and the terms and time-frame of the deal are unacceptable. The key element missing from the GOP Senators’ letter, however, is that the deal is not being negotiated between Iran and the United States; it is being negotiated between Iran and the P5+1 group, in which the U.S. is joined by Britain, France, Germany, Russia and China. Even if the U.S. is the key player in that group, the deal being pursued reflects an international consensus — the same consensus that has made sanctions against Iran so effective. This was likely in the mind of Iran’s foreign minister, Javad Zarif, who dismissed the letter as “of no legal value” and a “propaganda ploy.” Zarif noted that the deal would indeed be an international agreement adopted by the U.N. Security Council, which a new administration would be obliged to uphold — and that any attempt by the White House or Congress to abrogate, unilaterally modify or impede such an agreement would be a breach of U.S. obligations. 
  •  
    "Zarif noted that the deal would indeed be an international agreement adopted by the U.N. Security Council, which a new administration would be obliged to uphold - and that any attempt by the White House or Congress to abrogate, unilaterally modify or impede such an agreement would be a breach of U.S. obligations." Apparently, I was wrong. I thought Obama would work around the demand for Congressional input by letting the other P5+1 members ink the deal but the U.S. not signing. But a U.N. Security Council Resolution is even stronger medicine for the War Party, since the SC has the power to forbid economic sanctions as well. Take that, Mr. Netanyahu and Mr. Boehner!
  •  
    Could anything make it more clear that Netanyahu's speech to Congress was only to aid in his reelection in Israel? Israel has been briefed on the negotiations all along, so Netanyahu surely knew that the goal was a Security Council resolution that Congress could not affect. And while admittedly, the fact that it was a Security Council Resolution in the making was not widely known, are we to believe that the Speaker of the House of Representatives did not know that too? So are now not down to the entire spectacle of Netanyahu's speech being political, Netanyahu electioneering and Boehner mud-slinging the President?
Paul Merrell

ITAR-TASS: World - WTO approves Bali package of agreements - 0 views

  • World Trade Organization member countries have approved the Bali package of agreements. The decision was traditionally taken by a consensus. The countries officially adopted the agreement on trade procedures, five agrarian documents, including a food security agreement and a declaration on export competition, and four documents to support least developed countries. The Bali package forms a basis to conclude the Doha round of WTO talks, deadlocked since 2008, to liberalize world trade. The talks are aimed at lowering tariffs on trade in agricultural products and industrial goods.
  •  
    I haven't been keeping up lately on the Doha Round of trade agreement negotiations. But generally speaking, the WTO series of trade agreements have been of, by, and for moneyed interests. Which is why their get-togethers get picketed a lot. Money talks at the WTO; not mere mortals.  When this round concludes, there will be in the U.S. a very large package of treaties delivered to the Senate for ratification, followed by ratification conditioned on the President certifying that certain Congressional limitations have been achieved, whereupon enabling legislation will automatically kick in. For example, the Trade Agreements Act of 1979, 19 U.S.C. 2501, et seq., , ushered in the following: [to be filled in on Diigo because the list is so long].  
  •  
    List of WTO (and one agreement with Hungary) Agreements ratified and enabled by the Trade Agreements Act of 1979: (1) The Agreement on Implementation of Article VII of the General Agreement on Tariffs and Trade (relating to customs valuation). (2) The Agreement on Government Procurement. (3) The Agreement on Import Licensing Procedures. (4) The Agreement on Technical Barriers to Trade (relating to product standards). (5) The Agreement on Interpretation and Application of Articles VI, XVI, and XXIII of the General Agreement on Tariffs and Trade (relating to subsidies and countervailing measures). (6) The Agreement on Implementation of Article VI of the General Agreement on Tariffs and Trade (relating to antidumping measures). (7) The International Dairy Arrangement. (8) Certain bilateral agreements on cheese, other dairy products, and meat. (9) The Arrangement Regarding Bovine Meat. (10) The Agreement on Trade in Civil Aircraft. (11) Texts Concerning a Framework for the Conduct of World Trade. (12) Certain Bilateral Agreements to Eliminate the Wine-Gallon Method of Tax and Duty Assessment. (13) Certain other agreements to be reflected in Schedule XX of the United States to the General Agreement on Tariffs and Trade, including Agreements- (A) to Modify United States Watch Marking Requirements, and to Modify United States Tariff Nomenclature and Rates of Duty for Watches, (B) to Provide Duty-Free Treatment for Agricultural and Horticultural Machinery, Equipment, Implements, and Parts Thereof, and (C) to Modify United States Tariff Nomenclature and Rates of Duty for Ceramic Tableware.
Paul Merrell

Washington's Blog - Business, Investing, Economy, Politics, World News, Energy, Environ... - 0 views

  • A poll released today shows that Americans across the political spectrum hate the Patriot Act and NSA spying. The bipartisan polling team – made up of Global Strategy Group and G Public Strategies – found (edited for readability): By nearly a 2:1 margin (60% modify, 34% preserve), Americans believe the Patriot Act should not be reauthorized in its current form. With broad, bipartisan support across all ages, ideologies and political parties, voters are rejecting the argument that the Patriot Act should be preserved with no changes because of potential terrorist threats. Millennials (65% modify) and Independent men (75% modify), in particular, are driving the push for modification to limit government surveillance. By more than 4:1 (82% concerned, 18% not concerned), voters find it concerning that the United States government is collecting and storing the personal information of Americans, including 31% who are extremely concerned and 25% who are very concerned.
  • Over three quarters of voters found four different examples of government spying personally concerning to them. The government accessing personal communications, information or records without a judge’s permission (83%) and using that information for things other than stopping terrorist attacks (83%) were the two most concerning examples to voters. Specific arguments made in favor of adding more protections for Americans around privacy, also proved to be convincing to voters. 84% of voters said it was a convincing argument that local police and the FBI should have a warrant to search phone and email records, further confirming that Americans believe that individual privacy rights should be more strongly protected. Additionally, 81% of voters were convinced more protections were needed on account of companies providing loopholes in their services to make surveillance easier for the government.
  • This jibes with previous polls showing that Americans: Value privacy over anti-terror protections Don’t believe the NSA And are now more afraid of our own government than terrorists
Gary Edwards

Obama's secret TPP scheme will criminalize saving seeds, push biotech patent monopolies... - 0 views

  • TPP will allow evil corporations like Monsanto to rule over national governments One major aim of TPP is to punish countries that attempt to mandate the labeling of genetically-modified organisms (GMOs) or ban them outright. Key provisions in the international decree would allow corporations like Monsanto to actually sue governments for trying to protect their people against GMOs, all in the name of fostering "free trade."Farmers would also be prohibited from saving seeds under the plan as countries are forcibly grafted into a regulatory paradigm governed by patent monopolies. Although not every country attending the TPP meetings is on board with this agenda, the stated goal is to force all negotiating parties to make patents on plants available as well as to protect plant varieties under the 1991 Protection of New Varieties of Plants Act (UPOV 1991).
  • "The TPP will eliminate all nation states as the ruling authority and it will be supplanted by corporate authority," adds Hodges. "This will be made possible because of an obscure provision of the TPP known as the Investor State Dispute Settlement (ISDS).""ISDS allows corporations to sue governments, for any government action (at any level, including local government level) which hinders a corporation's future profits. Literally, Monsanto could provably be poisoning the entire population of a nation and the nation could do nothing which might result in the loss of profits to Monsanto."
  • The existing patent monopoly provisions of UPOV 1991 combined with TPP's even stricter one will create an agricultural nightmare for farmers who wish to grow clean, patent-free foods as well as save the seeds of their crops year after year. This will hit poorer farmers particularly hard. The new-found power of multinational corporations under TPP to dictate the agricultural destinies of signatory countries represents yet another plank in the establishment of corporations eventually holding absolute control over food.
  • ...1 more annotation...
  • "[T]he new TPP language will prohibit farmers from saving and exchanging many varieties of seeds -- a practice vital to the livelihood and welfare of traditional farming communities -- and most likely increase multinational control of the farming industry in TPP nations," reads a review of TPP's provisions published in the Harvard Law School Human Rights Journal.
  •  
    "TPP will allow evil corporations like Monsanto to rule over national governments One major aim of TPP is to punish countries that attempt to mandate the labeling of genetically-modified organisms (GMOs) or ban them outright. Key provisions in the international decree would allow corporations like Monsanto to actually sue governments for trying to protect their people against GMOs, all in the name of fostering "free trade." Farmers would also be prohibited from saving seeds under the plan as countries are forcibly grafted into a regulatory paradigm governed by patent monopolies. Although not every country attending the TPP meetings is on board with this agenda, the stated goal is to force all negotiating parties to make patents on plants available as well as to protect plant varieties under the 1991 Protection of New Varieties of Plants Act (UPOV 1991). "
Gary Edwards

I Am a Peaceful AR-15 Assault Rifle Owner | Casey Research - 0 views

  •  
    ""Firearms stand next in importance to the constitution itself. They are the American people's liberty teeth and keystone under independence … from the hour the Pilgrims landed to the present day, events, occurances and tendencies prove that to ensure peace security and happiness, the rifle and pistol are equally indispensable … the very atmosphere of firearms anywhere restrains evil interference - they deserve a place of honor with all that's good." George Washington I can't think of any reason I need to own my AR-15 assault[1] rifle. I don't pretend to need it for self defense. I also own several handguns. Any one of my handguns would be adequate to allow me an opportunity to defend myself, or another person, from virtually any act of aggression by another individual. Indeed, I could have easily halted any of the recent gun based rampages, by any of those deranged lunatics, with just one of my handguns. I wish I had been there. I have needlessly and peacefully owned my AR-15 for many years. I keep my AR-15 securely locked in a gun safe in the very same home where my young children live. My children are aware of my AR-15. Like many other things in life, I have taught my children about guns. Recently, some of my kids attended a private gun safety class given by a highly experienced gun expert. I enjoyed watching my kids learn about my AR-15. I admit being a bit nostalgic about my AR-15. I spent lots of time learning about every aspect of the AR-15 when I was in Marine Corps boot camp at Parris Island, South Carolina. I also carried an AR-15 when I served my country in Operation Desert Storm in Saudi Arabia. I had it with me when I lived in a dirt hole on the border of Kuwait. It is the weapon I know better than any other. I own lots of dangerous things I don't need. I don't need my highly modified 600+ hp Z06 Corvette, or my Harley Davidson motorcycle, or that crazy looking knife I sometimes jokingly say was imported directly from the Klingon Empire.[2] Al
Gary Edwards

The Money Masters - 0 views

  •  
    ""The purpose of this financial crisis is to take down the U.S. dollar as the stable datum of planetary finance and, in the midst of the resulting confusion, put in its place a Global Monetary Authority [GMA - run directly by international bankers freed of any government control] -a planetary financial control organization"- Bruce Wiseman *The U.S did modify these rules somewhat a year after the devastation had taken place here, but the rules are still fully in place in the rest of the world and the results are appalling. "The powers of financial capitalism had a far-reaching plan, nothing less than to create a world system of financial control in private hands able to dominate the political system of each country and the economy of the world as a whole… Their secret is that they have annexed from governments, monarchies, and republics the power to create the world's money…" .- Prof. Carroll Quigley renowned, late Georgetown macro-historian (mentioned by former President Clinton in his first nomination acceptance speech), author of Tragedy and Hope. "He [Carroll Quigley] was one of the last great macro-historians who traced the development of civilization…with an awesome capability." - Dr. Peter F. Krogh, Dean of the School of Foreign Service (Georgetown) The Two Step Plan to National Economic Reform and Recovery 1. Directs the Treasury Department to issue U.S. Notes (like Lincoln's Greenbacks; can also be in electronic deposit format) to pay off the National debt. 2. Increases the reserve ratio private banks are required to maintain from 10% to 100%, thereby terminating their ability to create money, while simultaneously absorbing the funds created to retire the national debt."
Paul Merrell

Catalog Reveals NSA Has Back Doors for Numerous Devices - SPIEGEL ONLINE - 0 views

  • When it comes to modern firewalls for corporate computer networks, the world's second largest network equipment manufacturer doesn't skimp on praising its own work. According to Juniper Networks' online PR copy, the company's products are "ideal" for protecting large companies and computing centers from unwanted access from outside. They claim the performance of the company's special computers is "unmatched" and their firewalls are the "best-in-class." Despite these assurances, though, there is one attacker none of these products can fend off -- the United States' National Security Agency.
  • Specialists at the intelligence organization succeeded years ago in penetrating the company's digital firewalls. A document viewed by SPIEGEL resembling a product catalog reveals that an NSA division called ANT has burrowed its way into nearly all the security architecture made by the major players in the industry -- including American global market leader Cisco and its Chinese competitor Huawei, but also producers of mass-market goods, such as US computer-maker Dell.
  • The specialists at ANT, which presumably stands for Advanced or Access Network Technology, could be described as master carpenters for the NSA's department for Tailored Access Operations (TAO). In cases where TAO's usual hacking and data-skimming methods don't suffice, ANT workers step in with their special tools, penetrating networking equipment, monitoring mobile phones and computers and diverting or even modifying data. Such "implants," as they are referred to in NSA parlance, have played a considerable role in the intelligence agency's ability to establish a global covert network that operates alongside the Internet. Some of the equipment available is quite inexpensive. A rigged monitor cable that allows "TAO personnel to see what is displayed on the targeted monitor," for example, is available for just $30. But an "active GSM base station" -- a tool that makes it possible to mimic a mobile phone tower and thus monitor cell phones -- costs a full $40,000. Computer bugging devices disguised as normal USB plugs, capable of sending and receiving data via radio undetected, are available in packs of 50 for over $1 million.
  • ...3 more annotations...
  • These NSA agents, who specialize in secret back doors, are able to keep an eye on all levels of our digital lives -- from computing centers to individual computers, and from laptops to mobile phones. For nearly every lock, ANT seems to have a key in its toolbox. And no matter what walls companies erect, the NSA's specialists seem already to have gotten past them. This, at least, is the impression gained from flipping through the 50-page document. The list reads like a mail-order catalog, one from which other NSA employees can order technologies from the ANT division for tapping their targets' data. The catalog even lists the prices for these electronic break-in tools, with costs ranging from free to $250,000. In the case of Juniper, the name of this particular digital lock pick is "FEEDTROUGH." This malware burrows into Juniper firewalls and makes it possible to smuggle other NSA programs into mainframe computers. Thanks to FEEDTROUGH, these implants can, by design, even survive "across reboots and software upgrades." In this way, US government spies can secure themselves a permanent presence in computer networks. The catalog states that FEEDTROUGH "has been deployed on many target platforms."
  • The ANT division doesn't just manufacture surveillance hardware. It also develops software for special tasks. The ANT developers have a clear preference for planting their malicious code in so-called BIOS, software located on a computer's motherboard that is the first thing to load when a computer is turned on. This has a number of valuable advantages: an infected PC or server appears to be functioning normally, so the infection remains invisible to virus protection and other security programs. And even if the hard drive of an infected computer has been completely erased and a new operating system is installed, the ANT malware can continue to function and ensures that new spyware can once again be loaded onto what is presumed to be a clean computer. The ANT developers call this "Persistence" and believe this approach has provided them with the possibility of permanent access. Another program attacks the firmware in hard drives manufactured by Western Digital, Seagate, Maxtor and Samsung, all of which, with the exception of the latter, are American companies. Here, too, it appears the US intelligence agency is compromising the technology and products of American companies.
  • Other ANT programs target Internet routers meant for professional use or hardware firewalls intended to protect company networks from online attacks. Many digital attack weapons are "remotely installable" -- in other words, over the Internet. Others require a direct attack on an end-user device -- an "interdiction," as it is known in NSA jargon -- in order to install malware or bugging equipment. There is no information in the documents seen by SPIEGEL to suggest that the companies whose products are mentioned in the catalog provided any support to the NSA or even had any knowledge of the intelligence solutions. "Cisco does not work with any government to modify our equipment, nor to implement any so-called security 'back doors' in our products," the company said in a statement. Contacted by SPIEGEL reporters, officials at Western Digital, Juniper Networks and Huawei also said they had no knowledge of any such modifications. Meanwhile, Dell officials said the company "respects and complies with the laws of all countries in which it operates." Many of the items in the software solutions catalog date from 2008, and some of the target server systems that are listed are no longer on the market today. At the same time, it's not as if the hackers within the ANT division have been sleeping on the job. They have continued to develop their arsenal. Some pages in the 2008 catalog, for example, list new systems for which no tools yet exist. However, the authors promise they are already hard at work developing new tools and that they will be "pursued for a future release."
  •  
    Oh, great. My router and all of my hard drives have NSA backdoors in them. And my BIOS on the Linux box may be infected with a backdoor. What are the odds that NSA has not developed similar capability for the UEFI on our two newer Windows boxes? 
Gary Edwards

Transnationalism vs. American Sovereignty « Tammy Bruce - 0 views

  •  
    excerpt: "….Transnationalists want to rewrite the laws of war, do away with the death penalty, restrict gun rights and much more-all without having to win popular majorities or heed American constitutional limits. And these advocates are making major strides under an Obama administration that is itself a hotbed of transnational legal thinking…. To be clear, transnationalism isn't a conspiratorial enterprise. In the legal academy, its advocates have openly stated their aims and means. "International law now seeks to influence political outcomes within sovereign States," Anne-Marie Slaughter, then dean of Princeton's public-affairs school, wrote in an influential 2007 essay. International law, she went on, must expand to include "domestic choices previously left to the determination of national political processes" and be able to "alter domestic politics." The preferred entry point for importing foreign norms into American law is the U.S. court system. The Yale Law School scholar Howard Koh, a transnationalist advocate, has written that "domestic courts must play a key role in coordinating U.S. domestic constitutional rules with rules of foreign and international law." Over the past two decades, activist judges have increasingly cited "evolving" international standards to overturn state laws, and Mr. Koh has suggested that foreign norms can be "downloaded" into American law in this manner…. Ms. Slaughter and Mr. Koh held top posts at the State Department during Mr. Obama's first term, and their tenures coincided with an aggressive push to ratify or recognize as customary law… a host of … progressive causes. For proof that the transnationalist threat isn't merely theoretical, look no further than the European Union…. Today over half of the regulations that affect Europeans' lives are made by administrators in Brussels, not by national legislatures. These regulations include the EU's ban, announced in May, on restau
Paul Merrell

CIA's Ex-No. 2 Says ISIS 'Learned From Snowden' - The Daily Beast - 0 views

  • That is not a consensus view within the U.S. intelligence community, where officials have been divided over how much ISIS really learned from the Snowden leaks that it didn’t already know. The group didn’t begin seizing territory in Iraq until a year after the leaks began. And last year, a U.S. intelligence official with access to information about ISIS’s current tactics told The Daily Beast that while the group had “likely learned a lot” from the Snowden leaks, “many of their forces are familiar with the U.S. from their time in AQI, [and] they have adapted well to avoiding detection.”
  • “Within weeks of the leaks, terrorist organizations around the world were already starting to modify their actions in light of what Snowden disclosed. Communications sources dried up, tactics were changed,” Morell writes. Among the most damaging leaks, he adds, was one that described a program that collects foreigners’ emails as they move through equipment in the United States.Terrorist groups, including ISIS, have since shifted their communications to more “secure” platforms, are using encryption, or “are avoiding electronic communications altogether.”“ISIS was one of those terrorist groups that learned from Snowden, and it is clear that his actions played a role in the rise of ISIS,” Morell writes.
  • Edward Snowden’s leaks about U.S. intelligence operations “played a role in the rise of ISIS.” That’s the explosive new allegation from the former deputy director of the CIA, Michael Morell, who was among the United States’ most senior intelligence officials when Snowden began providing highly classified documents to journalists in 2013. U.S. intelligence officials have long argued that Snowden’s disclosures provided valuable insights to terrorist groups and nation-state adversaries, including China and Russia, about how the U.S. monitors communications around the world. But in his new memoir, to be published next week, Morell raises the stakes of that debate by directly implicating Snowden in the expansion of ISIS, which broke away from al Qaeda and has conquered large swaths of territory in Iraq and Syria.
  • ...3 more annotations...
  • Edward Snowden’s leaks about U.S. intelligence operations “played a role in the rise of ISIS.” That’s the explosive new allegation from the former deputy director of the CIA, Michael Morell, who was among the United States’ most senior intelligence officials when Snowden began providing highly classified documents to journalists in 2013. U.S. intelligence officials have long argued that Snowden’s disclosures provided valuable insights to terrorist groups and nation-state adversaries, including China and Russia, about how the U.S. monitors communications around the world. But in his new memoir, to be published next week, Morell raises the stakes of that debate by directly implicating Snowden in the expansion of ISIS, which broke away from al Qaeda and has conquered large swaths of territory in Iraq and Syria. 
  • “Within weeks of the leaks, terrorist organizations around the world were already starting to modify their actions in light of what Snowden disclosed. Communications sources dried up, tactics were changed,” Morell writes. Among the most damaging leaks, he adds, was one that described a program that collects foreigners’ emails as they move through equipment in the United States.Terrorist groups, including ISIS, have since shifted their communications to more “secure” platforms, are using encryption, or “are avoiding electronic communications altogether.”“ISIS was one of those terrorist groups that learned from Snowden, and it is clear that his actions played a role in the rise of ISIS,” Morell writes.
  • That is not a consensus view within the U.S. intelligence community, where officials have been divided over how much ISIS really learned from the Snowden leaks that it didn’t already know. The group didn’t begin seizing territory in Iraq until a year after the leaks began. And last year, a U.S. intelligence official with access to information about ISIS’s current tactics told The Daily Beast that while the group had “likely learned a lot” from the Snowden leaks, “many of their forces are familiar with the U.S. from their time in AQI, [and] they have adapted well to avoiding detection.”
  •  
    Keep in mind that ISIL is a U.S. creation. And that just about everything that CIA and NSA do violates the laws of the nation in which they act and is antithetical to our form of government.   
Paul Merrell

Over 40 Rodent Feeding Studies Show Genetically Modified Food is Disastrous to Health |... - 0 views

  • GMO Free USA has published a listing of more than 40 rodent studies showing that animals fed GM corn and soy suffer dire results. For those who say there is no ‘science’ to prove that GMOs are unsafe, I enjoin them to peruse the following list. [1]
Paul Merrell

Victory! World's Largest Nation Bans GMO Food Crops | New Eastern Outlook - 0 views

  • Victories are to be celebrated and for the future of healthy life on our planet we all can celebrate a beautiful victory. The world’s largest nation, the Russian Federation, whose landmass spans Eurasia from the Baltic and Ukraine on the west to Vladivostock and the Pacific on her east, has formally declared all commercial planting of Genetically Modified Organisms, GMOs, to be prohibited. The issue has been subject of a heated debate for some months inside Russia. In February 2014, just days prior to the US-orchestrated coup d’etat in Ukraine, Russian Prime Minister Dmitry Medvedev created a national research project to obtain scientific information so the Government and Duma might make a decision on GMOs in Russia. Now a definitive decision has been made, and it goes against Monsanto and the US-led GMO cartel. We can say Russia’s crisis has concentrated minds on the essentials of life.
  • Russian Deputy Prime Minister Arkady Dorkovich told an international biotechnology conference in Kirov September 18, “As far as genetically-modified organisms are concerned, we have made the decision not to use any GMO in food productions.” Last year the Duma or parliament voted to make tough GMO labeling laws as a first step to the new ban in order to inform consumers of presence of GMO in various foods they buy. That was before US and EU sanctions led to Russian counter-sanctions against EU imports of agriculture products. In August 2014, the Russian government announced its bans on import from the EU and several other countries of meat, fish, dairy products, fruit and vegetables as a response to the sanctions. It produced surprising results. Since the imposition of tough Russian food import bans, Russian agriculture has undergone a spectacular rebirth.
  • This July, taking a page out of American history, the Russian government announced it was drafting a Russian “Homestead Act.” The Russian government is finalizing a bill which will give an opportunity to every Russian citizen to obtain one hectare of land, or a maximum of five hectares for a family of five, in the Russian Far East for free. They can use the land to farm, to do forestry or simply build a home and live, so long as they use the land for the first five years. After, they own the land free if the plot has been used for activities not banned by Russian laws, reported TASS. In the case of non-use the land will be confiscated and revert back to the government. Foreigners will have no right to get the free land. The new land law, if passed in the Duma, will take effect in January, 2016.
  • ...2 more annotations...
  • Food production in Russia’s under-populated far-east region is also set to boom. On September 3 in Vladivostok at the first Eastern Economic Forum, Russia’s Agriculture Ministry announced the creation of a new $10 billion agriculture development fund together with China. A number of financial institutions, including Russia’s state-owned Sberbank, will participate in its operations. The aim of the fund is to stimulate the production of 10 million tons of grain and agricultural products annually, beginning 2020.
  • A recent poll suggests there is significant interest in the offer, with some 30 million mostly young Russians ready to “go east.” Following the economic devastation of Russia during the Yeltsin era of the 1990s, eastern regions suffered economic collapse and significant depopulation as people migrated to cities to survive. Into this broader context of recent developments, the definitive government ban on growing GMO crops in the Russian Federation adds a major new attraction. Russia stands to become one of the world’s most desired producers of natural, organic non-GMO-contaminated food for the world. Today, the once-great American agriculture has been de-humanized, industrialized, by giant agribusiness concerns, and contaminated by Monsanto and GMO plants along with its deadly herbicides containing toxic glyphosate. More than 80% of all US corn is GMO and almost 100% of USA soybeans. This is no small matter. Exports of GMO soybeans and corn are allowed unlabeled, by loopholes, into the European Union as well as into China. That means that most of the meat and even farmed fish that European and Chinese consumers eat contains indirect GMO crops and toxins. In light of all this it might make sense to treat Russia a little more politely in the future if we want to eat healthy food. They are doing what we should be doing, but don’t. Why?
  •  
    5 hectares == 12.35 acres. Times 30 million Russians == 370.5 million acres less space for a home and a driveway. That's a lot of new agricultural production.  Bear in mind that Russia imported most of its food from Europe before the Ukraine sanctions. This article is about the evaporation of foreign trade that Europe will never get back.And it's about new Russian agricultural exports to China. Perhaps even about eventual exports to the U.S. for those who want a "GMO-free" label on their food. This is very bad news for Monsanto and other biotech companies in the U.S, especially a few years down the road when other countries begin importing Russian GMO-free food.  
Gary Edwards

What Is Bitcoin - 0 views

  •  
    That GOLD! app for iOS and Android is looking pretty good :)  C'mon Tino.  Now is the time.  Link to Priced-in-gold (http://pricedingold.com) excerpt: You may be dreaming of a gold backed dollar, or just everyone carrying around clinking gold coins in their pockets, but a rising community has a different idea. It's called Bitcoin, and it's a peer-to-peer currency that can be used to exchange goods and services online, digital and otherwise, without fees. In order to get Bitcoins, you need to exchange other currencies for Bitcoins (like dollars, euros, or pounds) at places like Mt.Gox. You can also sell goods and services online for Bitcoins. Some examples of Bitcoin stores include online gaming credits, pet wear, and coffee (more examples here). OR, you can create a new 'block,' which is a series of transactions, and you will receive 50 bitcoins. This is very rare, however, and the value of creating a new block will decrease over time. The idea behind Bitcoin is that it is a peer-to-peer exchange system, with an established and predictable rate of currency production. The creation of bitcoins is restricted by an algorithm, so the currency's worth cannot be modified by any actor (banks, central banks, treasuries). Individuals are involved in "mining" for Bitcoins, but it is extremely costly and requires significant computing power. Bitcoins could theoretically act as a store of value in the event of further inflation and devaluation of the U.S. dollar or other currencies.
Paul Merrell

Iran hails 'turning point' as world powers make key nuclear concessions - Telegraph - 0 views

  • The negotiations between Iran and the five permanent members of the United Nations Security Council plus Germany ended on Wednesday with rare words of guarded optimism from both sides. "In this round of talks we have witnessed that, despite all the attitudes during the last eight months, they tried to get closer to our viewpoints," said Saeed Jalili, the lead Iranian negotiator. Praising the "positive" approach of his interlocutors, he said: "We believe this is a turning point."
  • Yesterday the US and the other countries diluted two of the three stipulations. They still insisted that Iran must stop enriching to 20 per cent, but they have relaxed their demands for the outright closure of Fordow and the export of Tehran's medium-enriched uranium. Instead, a Western diplomat said that Iran was asked to "reduce the readiness" of Fordow. This would mean "standing down" some of the cascades of centrifuges. Iran would also be able to keep enough 20 per cent uranium to fuel a civilian research reactor in Tehran.
  • Iran has taken conciliatory steps of its own, making it easier for the six countries to modify their demands. Tehran has converted 40 per cent of its medium-enriched uranium into harmless fuel rods, while only a quarter of the 2,710 centrifuges inside Fordow are operational – the same number as a year ago. But Israel fears that America and its allies will give too much away. Yesterday, Benjamin Netanyahu, the Israeli prime minister, said that only a threat of "military sanctions" would make Iran back down. "I don't think there are any other means that will make Iran heed the international community's demands," he said.
Paul Merrell

How the NSA is still harvesting your online data | World news | guardian.co.uk - 0 views

  • A review of top-secret NSA documents suggests that the surveillance agency still collects and sifts through large quantities of Americans' online data – despite the Obama administration's insistence that the program that began under Bush ended in 2011.Shawn Turner, the Obama administration's director of communications for National Intelligence, told the Guardian that "the internet metadata collection program authorized by the Fisa court was discontinued in 2011 for operational and resource reasons and has not been restarted."But the documents indicate that the amount of internet metadata harvested, viewed, processed and overseen by the Special Source Operations (SSO) directorate inside the NSA is extensive.While there is no reference to any specific program currently collecting purely domestic internet metadata in bulk, it is clear that the agency collects and analyzes significant amounts of data from US communications systems in the course of monitoring foreign targets.
  • On December 26 2012, SSO announced what it described as a new capability to allow it to collect far more internet traffic and data than ever before. With this new system, the NSA is able to direct more than half of the internet traffic it intercepts from its collection points into its own repositories. One end of the communications collected are inside the United States.The NSA called it the "One-End Foreign (1EF) solution". It intended the program, codenamed EvilOlive, for "broadening the scope" of what it is able to collect. It relied, legally, on "FAA Authority", a reference to the 2008 Fisa Amendments Act that relaxed surveillance restrictions.This new system, SSO stated in December, enables vastly increased collection by the NSA of internet traffic. "The 1EF solution is allowing more than 75% of the traffic to pass through the filter," the SSO December document reads. "This milestone not only opened the aperture of the access but allowed the possibility for more traffic to be identified, selected and forwarded to NSA repositories."
  • It continued: "After the EvilOlive deployment, traffic has literally doubled."The scale of the NSA's metadata collection is highlighted by references in the documents to another NSA program, codenamed ShellTrumpet.On December 31, 2012, an SSO official wrote that ShellTrumpet had just "processed its One Trillionth metadata record".
  • ...4 more annotations...
  • Explaining that the five-year old program "began as a near-real-time metadata analyzer … for a classic collection system", the SSO official noted: "In its five year history, numerous other systems from across the Agency have come to use ShellTrumpet's processing capabilities for performance monitoring" and other tasks, such as "direct email tip alerting."Almost half of those trillion pieces of internet metadata were processed in 2012, the document detailed: "though it took five years to get to the one trillion mark, almost half of this volume was processed in this calendar year".
  • Another SSO entry, dated February 6, 2013, described ongoing plans to expand metadata collection. A joint surveillance collection operation with an unnamed partner agency yielded a new program "to query metadata" that was "turned on in the Fall 2012". Two others, called MoonLightPath and Spinneret, "are planned to be added by September 2013."A substantial portion of the internet metadata still collected and analyzed by the NSA comes from allied governments, including its British counterpart, GCHQ.
  • An SSO entry dated September 21, 2012, announced that "Transient Thurible, a new Government Communications Head Quarters (GCHQ) managed XKeyScore (XKS) Deep Dive was declared operational." The entry states that GCHQ "modified" an existing program so the NSA could "benefit" from what GCHQ harvested."Transient Thurible metadata [has been] flowing into NSA repositories since 13 August 2012," the entry states.
  • A review of top-secret NSA documents suggests that the surveillance agency still collects and sifts through large quantities of Americans' online data – despite the Obama administration's insistence that the program that began under Bush ended in 2011.Shawn Turner, the Obama administration's director of communications for National Intelligence, told the Guardian that "the internet metadata collection program authorized by the Fisa court was discontinued in 2011 for operational and resource reasons and has not been restarted."But the documents indicate that the amount of internet metadata harvested, viewed, processed and overseen by the Special Source Operations (SSO) directorate inside the NSA is extensive.While there is no reference to any specific program currently collecting purely domestic internet metadata in bulk, it is clear that the agency collects and analyzes significant amounts of data from US communications systems in the course of monitoring foreign targets.
Paul Merrell

PDVSA Secures $2.8 Billion Bond Swap to Avert Default - nsnbc international | nsnbc int... - 0 views

  • Venezuelan state oil company PDVSA announced Monday that creditors had accepted a proposal to exchange US$2.8 billion in bonds maturing in 2017 for $3.4 billion due in 2020. 
  • In late September, the state oil giant presented creditors with a modified offer to exchange $5.325 billion in bonds due in 2017 for securities payable at 1.22 times the principal in 2020. With the deadline for the deal fast approaching and less than half of bondholders on board, PDVSA extended the cutoff three times and threatened to default if a majority did not accept the deal. By the final deadline Monday, 52.57 percent of creditors agreed to the offer, amounting to a successful swap of 45.3 percent of bonds due in April and November 2017 equal to $2.8 billion.
  • In recent months, the Venezuelan government has repeatedly denounced what it has termed a “financial blockade” by international banks and rating agencies, which it says refuse to renegotiate the terms of debt payments and exaggerate risk ratings despite the country’s pristine payment record. In August, Citibank unexpectedly resigned as pay agent for PDVSA’s bonds in an unusual move that analysts have attributed to the possible influence of the United States government.
  • ...1 more annotation...
  • While Venezuela’s foreign reserves have fallen to a new low of $11.8 billion, rising oil prices could yield the government an additional $2.5 billion in revenue this year, reports Financial Times.
Paul Merrell

With Powerful Videos, 9/11 Families Push Congress on JASTA | 28Pages.org - 0 views

  • As the fifteenth anniversary of the 9/11 attacks draws closer, family members of those lost in the attacks are making an emotional appeal to Congress to clear the way for their lawsuit against the Kingdom of Saudi Arabia for its alleged financial and logistical support of the hijackers. In an effort led by the September 11th Advocates—five women who lost loved ones in the attacks—surviving family members and other concerned members of the public are posting videos to a Facebook page and a YouTube channel in which they urge the House of Representatives to promptly pass the Justice Against Sponsors of Terrorism Act (JASTA) when they return from summer recess on Tuesday, September 6.
  • The bill, which would modify U.S. sovereign immunity law to allow suits against foreign government sponsors of terrorism, passed the Senate by unanimous voice vote. Now, the September 11th Advocates are pressing Speaker of the House Paul Ryan and House Majority Leader Kevin McCarthy to schedule a vote on the measure before the 15th anniversary of the attacks.
  • Though the measure passed the Senate unanimously, Breitweiser says JASTA faces formidable opposition down the stretch. Saudi Arabia has warned Congress and the White House that it may be compelled to divest upwards of a $750 billion dollars in U.S. assets if the measure passes, and President Obama has expressed reluctance to sign the bill if it advances to his desk.
Paul Merrell

Wikileaks Releases "NightSkies 1.2": Proof CIA Bugs "Factory Fresh" iPhones | Zero Hedge - 0 views

  • The latest leaks from WikiLeaks' Vault 7 is titled “Dark Matter” and claims that the CIA has been bugging “factory fresh” iPhones since at least 2008 through suppliers.
  • And here is the full press release from WikiLeaks: Today, March 23rd 2017, WikiLeaks releases Vault 7 "Dark Matter", which contains documentation for several CIA projects that infect Apple Mac Computer firmware (meaning the infection persists even if the operating system is re-installed) developed by the CIA's Embedded Development Branch (EDB). These documents explain the techniques used by CIA to gain 'persistence' on Apple Mac devices, including Macs and iPhones and demonstrate their use of EFI/UEFI and firmware malware.   Among others, these documents reveal the "Sonic Screwdriver" project which, as explained by the CIA, is a "mechanism for executing code on peripheral devices while a Mac laptop or desktop is booting" allowing an attacker to boot its attack software for example from a USB stick "even when a firmware password is enabled". The CIA's "Sonic Screwdriver" infector is stored on the modified firmware of an Apple Thunderbolt-to-Ethernet adapter.   "DarkSeaSkies" is "an implant that persists in the EFI firmware of an Apple MacBook Air computer" and consists of "DarkMatter", "SeaPea" and "NightSkies", respectively EFI, kernel-space and user-space implants.   Documents on the "Triton" MacOSX malware, its infector "Dark Mallet" and its EFI-persistent version "DerStake" are also included in this release. While the DerStake1.4 manual released today dates to 2013, other Vault 7 documents show that as of 2016 the CIA continues to rely on and update these systems and is working on the production of DerStarke2.0.   Also included in this release is the manual for the CIA's "NightSkies 1.2" a "beacon/loader/implant tool" for the Apple iPhone. Noteworthy is that NightSkies had reached 1.2 by 2008, and is expressly designed to be physically installed onto factory fresh iPhones. i.e the CIA has been infecting the iPhone supply chain of its targets since at least 2008.   While CIA assets are sometimes used to physically infect systems in the custody of a target it is likely that many CIA physical access attacks have infected the targeted organization's supply chain including by interdicting mail orders and other shipments (opening, infecting, and resending) leaving the United States or otherwise.
1 - 20 of 47 Next › Last »
Showing 20 items per page