Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged national-security-threat

Rss Feed Group items tagged

Paul Merrell

IPS - Climate Change Now Seen as Security Threat Worldwide | Inter Press Service - 0 views

  • WASHINGTON, Mar 22 2013 (IPS) - Defence establishments around the world increasingly see climate change as posing potentially serious threats to national and international security, according to a review of high-level statements by the world’s governments released here Thursday. The review, “The Global Security Defense Index on Climate Change: Preliminary Results,” found that nearly three out of four governments for which relevant information is available view the possible effects of climate change as a serious national security issue.
  • It found that the wealthy developed countries of North America, Europe and East Asia, including China, have made the most progress in integrating climate change into their national security strategies.
Paul Merrell

Regional Leaders Back Venezuela at Panama Summit as US Blocks Final Declaration | venez... - 0 views

  • Regional leaders flocked to Panama City this past weekend for the VII Summit of the Americas, which has been widely hailed as a victory for left-leaning and progressive forces in the region, particularly Venezuela and Cuba.  The summit was marked by the historic presence of Cuba whose president Raul Castro addressed his counterparts and held face to face talks with Barack Obama, the first Cuban leader to do so since the socialist nation's US-imposed expulsion from the Organization of American States in 1962.
  • However, the much anticipated rapprochement between the two nations was largely upstaged by regional leaders' near uniform rejection of President Obama's March 9 Executive Order labeling Venezuela a "national security threat", which has been condemned by all 33 nations of the CELAC  (Community of Latin American and Caribbean States) and other regional bodies.  While positively noting the steps taken by Obama to reestablish bilateral ties with Cuba, Castro nonetheless criticized the US president for his aggressive measures against Venezuela. 
  • During his speech before the summit, Bolivian president Evo Morales slammed US imperial intervention in the region. "We don't want more Monroes in our continent, nor more Truman doctrine, nor more Reagan doctrine, nor more Bush doctrine. We don't want any more presidential decrees nor more executive orders declaring us threats to their country." 
  • ...6 more annotations...
  • "One point was important: health as a human right, and the U.S. government did not accept that health should be considered a human right [...] President Obama did not accept the document,” explained Bolivia's first indigenous president.  The previous Summit of the Americas held in Colombia in 2012 likewise failed to issue a final document due to US rejection of language opposing its blockade against Cuba. 
  • The Venezuelan head of state also named several key issues he called on Obama to address in the context of bilateral talks, including US refusal to "recognize our Revolution", the White House's Executive Decree, the US embassy's role in destabilization efforts, as well as US support for anti-government groups operating from US soil. 
  • Towards the close of the summit, the US and Canada blocked the approval of a final declaration backed by the 33 other nations of the region, which was the result of four months of prior negotiations. The final declaration requires approval by consensus and the two North American nations opposed several points in the draft document, including health as a human right, technology transfers to developing countries, an end to electronic espionage, and the repeal of Obama's Executive Order.  The US-Canadian veto was criticized by Bolivian President Evo Morales. 
  • Despite repeated calls throughout the summit for President Obama to repeal his Executive Order targeting Venezuela, the US administration has dug in its heels, refusing to repeal the decree.  Assistant Secretary of State for Western Hemisphere Affairs Roberta Jacobson stated on Saturday that although her government did not consider Venezuela a "threat", the Executive Order would not be repealed given that "it's something that's already been implemented."  The comments follow similar contradictory remarks by Barack Obama on Thursday who also denied that Venezuela posed a threat to the United States, an admission which has been hailed as a victory by President Nicolas Maduro, who initiated a petition campaign that has collected 13 million signatures against the Executive Order.
  • "We do not believe that Venezuela poses a threat to the United States, nor does the United States threaten the Venezuelan government," clarified Obama in an interview with EFE.  Nonetheless, the US leader indicated no intention of repealing the Executive Order, going on to justify the sanctions imposed on Venezuela, which are allegedly aimed at "discouraging human rights violations and corruption.”
  • The White House's Executive Order has over the past month ignited a global backlash against US aggression, a reaction which has been lamented by Jacobson.   “I am disappointed that there were not more countries to defend [the sanctions]. They were not made to harm Venezuelans or the Venezuelan government,” noted the Assistant Secretary of State.
Paul Merrell

How a false witness helped the CIA make a case for torture | Al Jazeera America - 0 views

  • Buried amid details of “rectal rehydration” and waterboarding that dominated the headlines over last week’s Senate Intelligence Committee findings was an alarming detail: Both the committee’s summary report and its rebuttal by the CIA admit that a source whose claims were central to the July 2004 resumption of the torture program  — and, almost certainly, to authorizing the Internet dragnet collecting massive amounts of Americans’ email metadata — fabricated claims about an election year plot. Both the torture program and President Bush's warrantless wiretap program, Stellar Wind, were partly halted from March through June of 2004. That March, Assistant Attorney General Jack Goldsmith prepared to withdraw Pentagon authorization for torture, amid growing concern following the publication of pictures of detainee abuse at Iraq's Abu Ghraib, and a May 2004 CIA inspector general report criticizing a number of aspects of the Agency's interrogation program. On June 4, 2004, CIA Director George Tenet suspended the use of torture techniques.
  • During the same period, the DOJ lawyers who pushed to stop torture were also persuading President George W. Bush to halt aspects of Stellar Wind, a program that conducted warrantless wiretapping of Americans’ communications inside the U.S., on top of the Internet metadata. After a dramatic confrontation in the hospital room of Attorney General John Ashcroft on March 10, 2004, acting Attorney General Jim Comey and Goldsmith informed Bush there was no legal basis for parts of the program. Ultimately, Bush agreed to modify aspects of it, in part by halting the collection of Internet metadata. But even as Bush officials suspended that part of the program on March 26, they quickly set about finding legal cover for its resumption. One way they did so was by pointing to imminent threats — such as a planned election-season attack — in the United States.
  • The CIA in March 2004 received reporting from a source the torture report calls "Asset Y,” who said a known Al-Qaeda associate in Pakistan, Janat Gul — whom CIA at the time believed was a key facilitator — had set up a meeting between Asset Y and Al-Qaeda's finance chief, and was helping plan attacks inside the United States timed to coincide with the November 2004 elections. According to the report, CIA officers immediately expressed doubts about the veracity of the information they’d been given by Asset Y. A senior CIA officer called the report "vague" and "worthless in terms of actionable intelligence." He noted that Al Qaeda had already issued a statement “emphasizing a lack of desire to strike before the U.S. election” and suggested that since Al-Qaeda was aware that “threat reporting causes panic in Washington” and inevitably results in leaks, planting a false claim of an election season attack would be a good way for the network to test whether Asset Y was working for its enemies. Another officer, assigned to the group hunting Osama bin Laden, also expressed doubts. In its rebuttal to the Senate report, the CIA argues the agency was right to take seriously Asset Y’s reporting , in spite of those initial doubts. The CIA wrote numerous reports about the claim “even as we worked to resolve the inconsistencies.” Reports from detainee Hassan Ghul, who was captured in January 2004, supported the possibility that a cell of Al-Qaeda members in Pakistan’s tribal areas might be planning a plot of which he was unaware. And the CIA corroborated other parts of Asset Y's reporting.
  • ...5 more annotations...
  • Still, the CIA had one further reason for doubting claims that Gul was at the center of an Al-Qaeda election-year plot. Ghu told the CIA about an attempt by Gul, in the fall of 2003, to sell anti-aircraft missiles to Al-Qaeda; the Qaeda figure in Ghul’s story didn't even want to work with Gul. And Ghul later learned Gul was probably lying about his ability to acquire the missiles.
  • Nevertheless, the CIA took seriously Asset Y’s claim that Gul was involved in an election plot and moved quickly to gain custody of him after his arrest by Pakistan in June 2004. Even before CIA rendered Gul to its custody, Tenet started lobbying to get torture techniques reapproved for his interrogation. On June 29, Tenet wrote National Security Adviser Condoleezza Rice seeking approval to once again use some of the techniques whose use he suspended less than four weeks earlier, in the hope of gathering information on the election season plot. "Given the magnitude of the danger posed by the pre-election plot and Gul's almost certain knowledge of any intelligence about that plot” Tenet wrote, relying on Asset Y's claims, “I request the fastest possible resolution of the above issues." On July 20, according to the report, top administration officials gave CIA verbal approval to get back into the torture business. Ashcroft stated that most previously approved interrogation techniques would not violate U.S. law on July 22 (though not waterboarding). And by the end of July, CIA started coaxing DOJ to approve other techniques — such as slapping someone in the stomach or hosing them down with cold water or limiting their food — which had already been used by the CIA but never officially approved by DOJ.
  • At the same time, the government was also using the ostensible election-season plot, among others, to persuade the Foreign Intelligence Surveillance Court (FISC) – the secret court that approves domestic spying on Americans – to authorize the Internet dragnet. After Bush halted the Internet dragnet on March 26, his aides began working with FISC presiding judge Colleen Kollar-Kotelly to find a way to use FISA authority -- normally been used to access records for a single phone or Internet account -- to collect Internet metadata in bulk. They provided a series of briefings, including one attended by Terrorist Threat Integration Center head John Brennan and CIA Director George Tenet, to explain the threat. In addition, they provided what – under Stellar Wind – analysts called a “scary memo,” summarizing all the threats facing the country to underscore the urgency of the program. Tenet's declaration included as an appendix to an application submitted in the days before July 14, 2004, laid out the threats CIA and others were fighting that summer.
  • Judge Kollar-Kotelly invoked Tenet's material in a redacted section of her opinion authorizing the phone dragnet, pointing to it as a key reason to permit collection of what she called “enormous” amounts of data from innocent Americans.
  • Soon after the reauthorization of the torture and the Internet dragnet, the CIA realized ASSET Y's story wasn't true. By September, an officer involved in Janat Gul's interrogation observed, “we lack credible information that ties him to pre-election threat information or direct operational planning against the United States, at home or abroad.” In October, CIA reassessed ASSET Y, and found him to be deceptive. When pressured, ASSET Y admitted had had made up the story of a meeting set up by Gul. ASSET Y blamed his CIA handler for pressuring him for intelligence, leading him to lie about the meeting. By 2005, CIA had concluded that ASSET Y was a fabricator, and Janat Gul was a “rather poorly educated village man [who is] quite lazy [who] was looking to make some easy money for little work and he was easily persuaded to move people and run errands for folks on our target list” (though the Agency wasn't always forthright about the judgment to DOJ). The torture program, which was resumed in part because of a perceived urgency of extracting information from Gul on a plot that didn't exist, continued for several more years. The Internet dragnet continued under FISC authorization, on and off, until December 2011. And several other still active NSA programs, including the phone dragnet, relied on Kollar-Kotelly's earlier authorization as precedents – the case for which had also been derived, in part, from one long discredited fabricator.
Gary Edwards

Liberty in the Breach - 0 views

  •  
    Stick to the Constitution and your principles become a matter of individual liberty.  Put your personal principles ahead of the Constitution, and big government socialist and establishment trough feeders will paint your wagon with the tyranny of conservative social, Christian, and national security "values". So goes my response to the Red State article: "Principle as Political Liability - even as Reagan understood it".  The article was written at the height of Obama's assault on Santorum.  Pretty cheeky stuff, even for Obama.  With Romney, Obama went all out with a class warfare assault.  Even went so far as to marshal an army of brown and purple shirt anarchist occupying and protesting the very same Banksters who funded Obama in 2008, and have been taking huge bailouts and kickbacks at the taxpayers expense ever since.  Today Santorum is the threat, so Obama has switched to religious warfare and the supposed threat of conservative Christian values to socialist civil liberties.  Awful stuff.  Especially when Obama is busy trying to convince independents that not only is he a Christian, but Christ himself would support the peculiar social marxism - bankster crony corrupt corporatism combination that defines Obammunism. The point i tried to make is that of a recent discovery having a great impact on my own political, economic and philosophical identification; my conversion from that of a long time Reagan conservative to that of a Reagan libertarian.   My "discovery" was that the Constitution champions only one "value" - that of individual liberty and the necessary cornerstones needed for limited governance based on ordered liberty.  The threat any principled position based on conservative values holds is that conservatives will try to burn those values into Federal law, policy and regulatory practice.  
Paul Merrell

Bill Clinton and the Bogus Iranian Threat The Future of Freedom Foundation - 0 views

  • Tragically, President George H.W. Bush passed up a chance for a rapprochement with Iran because, after the Soviet Union imploded, the national-security apparatus needed a new threat to stave off budget cutters in Congress. Iran became the “manufactured crisis,” according to author Gareth Porter’s new book by that title. Doubly tragic, Bush’s successor, Bill Clinton, compounded the dangerous folly by hyping the bogus threat. Why? That might be a good question for progressives to ask possible presidential candidate Hillary Clinton, who enjoys basking in her husband’s supposed presidential successes. Porter writes, That ramping up of pressure on Iran by the Clinton administration was still driven by the same bureaucratic incentives that had appeared at the end of the Cold War, but it shifted into overdrive because it was linked to support of the Israeli government’s drive to portray Iran as the great threat to peace in the world. Clinton’s advisers saw the threat of nuclear proliferation as the path to beefing up the national-security apparatus. It was perfect for justifying new weapons systems and a continuing role as world policeman.
  • Moreover, the military focus on Iran, Porter adds, “dovetailed with the Clinton administration’s move to align its Iran policy with that of the Israeli government of Prime Minister Yitzhak Rabin.” Before assuming power, Clinton signaled his intention to be “more explicitly pro-Israel than the Bush administration had been.” To that end, he selected Martin Indyk as his campaign’s Middle East adviser. Indyk had been an adviser to former Israeli prime minister Yitzhak Shamir; a researcher at the chief pro-Israel lobbying organization, the American Israel Public Affairs Committee; and cofounder of AIPAC’s spinoff think tank, the Washington Institute for Near East Policy. (Today, Indyk is President Obama’s chief envoy to the failed U.S.-sponsored Israeli-Palestinian talks.) The Clinton administration implemented the “dual containment” policy against Iraq and Iran. But Porter reports that Robert Pelletreau, the Middle East policymaker in the State Department, acknowledges “that it was ‘pretty much accepted in Washington’ that the policy had originated in Israel.”
Paul Merrell

DoJ Creates Special Dept to Deal with Growing Domestic Extremism Threat | nsnbc interna... - 0 views

  • John Carlin, Department of Justice assistant attorney general and head of the national security division, spoke at George Washington University (GWU) about concerns over mounting threats posed by violent extremists within the US which has prompted the creation of a special counsel position to deal with these issues.
  • Carlin told the audience that “the domestic terrorism counsel would not only help oversee the prosecution of cases but also would develop plans to intervene when the threat of violence is imminent.” The DoJ expressed concern over the “staggeringly broad” threat to national security posed by domestic extremists “motivated by anti-government animus, eco-radicalism and racism have created a new urgency for federal and local law enforcement authorities.” Carlin said: “No single ideology governs hate and extremism. Nevertheless, we see commonalities among those who wish to do us harm. This gives us important information as we shape our deterrence and disruption strategies. Across the spectrum of extremist ideologies, two related traits emerge: first, the prevalence of lone offender attacks that do not require a terrorist network; and second, the increasing number of disaffected people inspired to violence who communicate their hate-filled views over the Internet and through social media.’’
  • The deputy attorney general said: “White supremacists represent the most violent. The Charleston shooter, who had a manifesto laying out a racist worldview, is just one example. His actions followed earlier deadly shooting sprees by white supremacists in Kansas, Wisconsin and elsewhere.’’ Along with white supremacists, Carlin said: “Adherents to the sovereign citizen ideology believe they don’t have to answer to any government authority, including courts, taxing entities or law enforcement. And although most sovereign citizens peacefully espouse these views, some sovereign citizen extremists resort to violence.’’ Foundational concerns about domestic terrorism can be found in the 2010 report Rightwing Extremism, wherein domestic extremists, particularly white supremacists, were proposed to be the newest and most dangerous threat to the US since al-Qaeda.
  •  
    To get a glimmer of just how ridiculous this DoJ initiative is, skim http://www.washingtonsblog.com/2014/08/youre-nine-times-likely-killed-police-officer-terrorist.html Talk about misplaced priorities. 
Paul Merrell

The CIA Just Declassified the Document That Supposedly Justified the Iraq Invasion | VI... - 0 views

  • Thirteen years ago, the intelligence community concluded in a 93-page classified document used to justify the invasion of Iraq that it lacked "specific information" on "many key aspects" of Iraqi President Saddam Hussein's weapons of mass destruction (WMD) programs.But that's not what top Bush administration officials said during their campaign to sell the war to the American public. Those officials, citing the same classified document, asserted with no uncertainty that Iraq was actively pursuing nuclear weapons, concealing a vast chemical and biological weapons arsenal, and posing an immediate and grave threat to US national security. Congress eventually concluded that the Bush administration had "overstated" its dire warnings about the Iraqi threat, and that the administration's claims about Iraq's WMD program were "not supported by the underlying intelligence reporting." But that underlying intelligence reporting — contained in the so-called National Intelligence Estimate (NIE) that was used to justify the invasion — has remained shrouded in mystery until now.
  • The CIA released a copy of the NIE in 2004 in response to a Freedom of Information Act (FOIA) request, but redacted virtually all of it, citing a threat to national security. Then last year, John Greenewald, who operates The Black Vault, a clearinghouse for declassified government documents, asked the CIA to take another look at the October 2002 NIE to determine whether any additional portions of it could be declassified.The agency responded to Greenewald this past January and provided him with a new version of the NIE, which he shared exclusively with VICE News, that restores the majority of the prewar Iraq intelligence that has eluded historians, journalists, and war critics for more than a decade. (Some previously redacted portions of the NIE had previously been disclosed in congressional reports.)
  • For the first time, the public can now read the hastily drafted CIA document [pdf below] that led Congress to pass a joint resolution authorizing the use of military force in Iraq, a costly war launched March 20, 2003 that was predicated on "disarming" Iraq of its (non-existent) WMD, overthrowing Saddam Hussein, and "freeing" the Iraqi people.A report issued by the government funded think-tank RAND Corporation last December titled "Blinders, Blunders and Wars" said the NIE "contained several qualifiers that were dropped…. As the draft NIE went up the intelligence chain of command, the conclusions were treated increasingly definitively."
  • ...1 more annotation...
  • Thirteen years ago, the intelligence community concluded in a 93-page classified document used to justify the invasion of Iraq that it lacked "specific information" on "many key aspects" of Iraqi President Saddam Hussein's weapons of mass destruction (WMD) programs.But that's not what top Bush administration officials said during their campaign to sell the war to the American public. Those officials, citing the same classified document, asserted with no uncertainty that Iraq was actively pursuing nuclear weapons, concealing a vast chemical and biological weapons arsenal, and posing an immediate and grave threat to US national security. 
  •  
    Confirmation that the intelligence was being fixed around the goal, but also that Bush2 and his administration stretched even that intelligence report beyond recognition. 
Paul Merrell

Lawmaker Says There More To NSA Spying - Business Insider - 0 views

  • A House Democrat said information revealed about the National Security Agency's secret surveillance programs are "the tip of the iceberg," Daniel Strauss of The Hill reports. "I think it's just broader than most people even realize, and I think that's, in one way, what astounded most of us, too," Rep. Loretta Sanchez (D-Calif.) told C-SPAN's "Washington Journal" after a classified briefing with national security officials. Rep. Joe Barton (R-Texas), who also attended the meeting, said that the NSA "violated the spirit of the law when it started collecting data from everyone in the country just because technology now makes that possible.” Barton added that "in America ... You don’t target everyone and violate their 4th Amendment rights just because of a handful of threats. But that is exactly what is happening at the NSA ... it is wrong and it needs to stop now.” More from Sanchez: "I don't know if there are other leaks, if there's more information somewhere, if somebody else is going to step up, but I will tell you that I believe it's the tip of the iceberg."
  • A House Democrat said information revealed about the National Security Agency's secret surveillance programs are "the tip of the iceberg," Daniel Strauss of The Hill reports. "I think it's just broader than most people even realize, and I think that's, in one way, what astounded most of us, too," Rep. Loretta Sanchez (D-Calif.) told C-SPAN's "Washington Journal" after a classified briefing with national security officials. Rep. Joe Barton (R-Texas), who also attended the meeting, said that the NSA "violated the spirit of the law when it started collecting data from everyone in the country just because technology now makes that possible.” Barton added that "in America ... You don’t target everyone and violate their 4th Amendment rights just because of a handful of threats. But that is exactly what is happening at the NSA ... it is wrong and it needs to stop now.”
  • Glenn Greenwald of the Guardian, who has served as a conduit for Snowden's leaks, recently said that there will me many more "significant revelations that have not yet been heard." Greenwald told The New York Times that he received “thousands” of classified documents — “dozens” of which are newsworthy — from the the 29-year-old ex-Booz Allen employee who was contracted by the NSA. Sanchez said that what lawmakers learned "is significantly more than what is out in the media today," which is interesting when considering previous reports by journalists and whistleblowers.
  • ...2 more annotations...
  • Here's a rundown of the reports and the allegations: In 2006 NSA insiders told Leslie Cauley of USA Today that the NSA has been collecting almost all U.S. phone records since shortly after 9/11. In 2010 Dana Priest and William Arkin of The Washington Post reported that "collection systems at the [NSA] intercept and store 1.7 billion emails, phone calls, and other types of communications" every day. According to a 2007 lawsuit, Verizon built a fiber optic cable to give the "access to all communications flowing through the carrier’s operations center." In April 2012 Wired's James Bamford reported how the U.S. government hired two secretive Israeli companies to wiretap AT&T. AT&T engineer Mark Klein discovered the "secret room" at AT&T central office in San Francisco, through which the NSA actively "vacuumed up Internet and phone-call data from ordinary Americans with the cooperation of AT&T" through the wiretapping rooms, emphasizing that "much of the data sent through AT&T to the NSA was purely domestic." Former NSA executive and whistleblower Thomas Drake testified that the NSA is using Israeli-made hardware to "seize and save all personal electronic communications."
  • A classified program called Prism, leaked by Snowden, appears to acquire information from the servers of nine of the biggest internet companies. The Washington Post reported that the government's orders "serve as one-time blanket approvals for data acquisition and surveillance on selected foreign targets for periods of as long as a year." NSA Whistleblower William Binney that the NSA began using the program he built (i.e. ThinThread) to use communications data for creating, in real time, profiles of nearly all Americans so that the government is "able to monitor what people are doing" and who they are doing it with. In July the Foreign Intelligence Surveillance Court (FISC), established to "hear applications for and grant orders approving electronic surveillance," found that the NSA violated the Fourth Amendment's restriction against unreasonable searches and seizures "on at least one occasion." BONUS: In March CIA Chief Technology Officer Ira "Gus" Hunt said: "It is really very nearly within our grasp to be able to compute on all human generated information." If there is "significantly more" to the NSA's domestic snooping, then we're all ears and eyes.
Gary Edwards

Google News - 0 views

  •  
    WOW!!! Incredible presentation concerning the history of Freedom vs. Tyranny. WOW!! If ever there's a MUST Watch, this is it. Very impressive and sweeping comparison of how authoritarian collectivist seize power in a free society and establish their tyrannies. My notes are listed below: How to recognize potential tyrants and keep them from seizing power. The urge to save humanity is always used to justify those who want to rule humanity. - ML Menken Daniel Webster on the Constitution Obstacles to Tyranny : Limited powers of government .... Due Process .... Presumption of Innocence .... Freedom to Dissent .... Armed Populace: The right to be Armed! Due Process .... 5th Amendment .... Emergency powers. there is no authorization in the US Constitution to suspend Due Process or any aspect of the Bill of Rights .... Asset Seizure Laws for criminal activities (alleged - without warrant or court order) .... Eminent Domain: seizure of private property for government uses: 2005 Kelo vs New London seizure based on jobs (economy) and tax revenue possibilities. .... 6th Amendment - right to trial by jury : plea bargaining admonition based on facing the awesome power of the government to prosecute no matter what - intimidation and threat of personal destruction. .... Forced confessions through plea bargaining. .... Indefinite detention without trial or charges: President has power to kill or issue orders without warrant, charges or trial .... Presumption of Innocence: Probable Cause .... Random stops at Border check points. 5th Amendment protections violated .... Sobriety Check Points: 4th and 5th Amendments violated - no presumption of innocence .... Random detention and questioning: airport security pat downs, housing projects, bus transportation .... The Right to Privacy: financial transactions and the IRS audit (without warrant or accusation) .... Warrant-less Spying .... Agents writing their own search warrants .... Snatch and Peek Freedom to Disse
Paul Merrell

Popular Security Software Came Under Relentless NSA and GCHQ Attacks - The Intercept - 0 views

  • The National Security Agency and its British counterpart, Government Communications Headquarters, have worked to subvert anti-virus and other security software in order to track users and infiltrate networks, according to documents from NSA whistleblower Edward Snowden. The spy agencies have reverse engineered software products, sometimes under questionable legal authority, and monitored web and email traffic in order to discreetly thwart anti-virus software and obtain intelligence from companies about security software and users of such software. One security software maker repeatedly singled out in the documents is Moscow-based Kaspersky Lab, which has a holding registered in the U.K., claims more than 270,000 corporate clients, and says it protects more than 400 million people with its products. British spies aimed to thwart Kaspersky software in part through a technique known as software reverse engineering, or SRE, according to a top-secret warrant renewal request. The NSA has also studied Kaspersky Lab’s software for weaknesses, obtaining sensitive customer information by monitoring communications between the software and Kaspersky servers, according to a draft top-secret report. The U.S. spy agency also appears to have examined emails inbound to security software companies flagging new viruses and vulnerabilities.
  • The efforts to compromise security software were of particular importance because such software is relied upon to defend against an array of digital threats and is typically more trusted by the operating system than other applications, running with elevated privileges that allow more vectors for surveillance and attack. Spy agencies seem to be engaged in a digital game of cat and mouse with anti-virus software companies; the U.S. and U.K. have aggressively probed for weaknesses in software deployed by the companies, which have themselves exposed sophisticated state-sponsored malware.
  • The requested warrant, provided under Section 5 of the U.K.’s 1994 Intelligence Services Act, must be renewed by a government minister every six months. The document published today is a renewal request for a warrant valid from July 7, 2008 until January 7, 2009. The request seeks authorization for GCHQ activities that “involve modifying commercially available software to enable interception, decryption and other related tasks, or ‘reverse engineering’ software.”
  • ...9 more annotations...
  • The NSA, like GCHQ, has studied Kaspersky Lab’s software for weaknesses. In 2008, an NSA research team discovered that Kaspersky software was transmitting sensitive user information back to the company’s servers, which could easily be intercepted and employed to track users, according to a draft of a top-secret report. The information was embedded in “User-Agent” strings included in the headers of Hypertext Transfer Protocol, or HTTP, requests. Such headers are typically sent at the beginning of a web request to identify the type of software and computer issuing the request.
  • According to the draft report, NSA researchers found that the strings could be used to uniquely identify the computing devices belonging to Kaspersky customers. They determined that “Kaspersky User-Agent strings contain encoded versions of the Kaspersky serial numbers and that part of the User-Agent string can be used as a machine identifier.” They also noted that the “User-Agent” strings may contain “information about services contracted for or configurations.” Such data could be used to passively track a computer to determine if a target is running Kaspersky software and thus potentially susceptible to a particular attack without risking detection.
  • Another way the NSA targets foreign anti-virus companies appears to be to monitor their email traffic for reports of new vulnerabilities and malware. A 2010 presentation on “Project CAMBERDADA” shows the content of an email flagging a malware file, which was sent to various anti-virus companies by François Picard of the Montréal-based consulting and web hosting company NewRoma. The presentation of the email suggests that the NSA is reading such messages to discover new flaws in anti-virus software. Picard, contacted by The Intercept, was unaware his email had fallen into the hands of the NSA. He said that he regularly sends out notification of new viruses and malware to anti-virus companies, and that he likely sent the email in question to at least two dozen such outfits. He also said he never sends such notifications to government agencies. “It is strange the NSA would show an email like mine in a presentation,” he added.
  • The NSA presentation goes on to state that its signals intelligence yields about 10 new “potentially malicious files per day for malware triage.” This is a tiny fraction of the hostile software that is processed. Kaspersky says it detects 325,000 new malicious files every day, and an internal GCHQ document indicates that its own system “collect[s] around 100,000,000 malware events per day.” After obtaining the files, the NSA analysts “[c]heck Kaspersky AV to see if they continue to let any of these virus files through their Anti-Virus product.” The NSA’s Tailored Access Operations unit “can repurpose the malware,” presumably before the anti-virus software has been updated to defend against the threat.
  • The Project CAMBERDADA presentation lists 23 additional AV companies from all over the world under “More Targets!” Those companies include Check Point software, a pioneering maker of corporate firewalls based Israel, whose government is a U.S. ally. Notably omitted are the American anti-virus brands McAfee and Symantec and the British company Sophos.
  • As government spies have sought to evade anti-virus software, the anti-virus firms themselves have exposed malware created by government spies. Among them, Kaspersky appears to be the sharpest thorn in the side of government hackers. In the past few years, the company has proven to be a prolific hunter of state-sponsored malware, playing a role in the discovery and/or analysis of various pieces of malware reportedly linked to government hackers, including the superviruses Flame, which Kaspersky flagged in 2012; Gauss, also detected in 2012; Stuxnet, discovered by another company in 2010; and Regin, revealed by Symantec. In February, the Russian firm announced its biggest find yet: the “Equation Group,” an organization that has deployed espionage tools widely believed to have been created by the NSA and hidden on hard drives from leading brands, according to Kaspersky. In a report, the company called it “the most advanced threat actor we have seen” and “probably one of the most sophisticated cyber attack groups in the world.”
  • Hacks deployed by the Equation Group operated undetected for as long as 14 to 19 years, burrowing into the hard drive firmware of sensitive computer systems around the world, according to Kaspersky. Governments, militaries, technology companies, nuclear research centers, media outlets and financial institutions in 30 countries were among those reportedly infected. Kaspersky estimates that the Equation Group could have implants in tens of thousands of computers, but documents published last year by The Intercept suggest the NSA was scaling up their implant capabilities to potentially infect millions of computers with malware. Kaspersky’s adversarial relationship with Western intelligence services is sometimes framed in more sinister terms; the firm has been accused of working too closely with the Russian intelligence service FSB. That accusation is partly due to the company’s apparent success in uncovering NSA malware, and partly due to the fact that its founder, Eugene Kaspersky, was educated by a KGB-backed school in the 1980s before working for the Russian military.
  • Kaspersky has repeatedly denied the insinuations and accusations. In a recent blog post, responding to a Bloomberg article, he complained that his company was being subjected to “sensationalist … conspiracy theories,” sarcastically noting that “for some reason they forgot our reports” on an array of malware that trace back to Russian developers. He continued, “It’s very hard for a company with Russian roots to become successful in the U.S., European and other markets. Nobody trusts us — by default.”
  • Documents published with this article: Kaspersky User-Agent Strings — NSA Project CAMBERDADA — NSA NDIST — GCHQ’s Developing Cyber Defence Mission GCHQ Application for Renewal of Warrant GPW/1160 Software Reverse Engineering — GCHQ Reverse Engineering — GCHQ Wiki Malware Analysis & Reverse Engineering — ACNO Skill Levels — GCHQ
Paul Merrell

BDS SOUTH AFRICA: ISRAEL INCHES CLOSER TO 'TIPPING POINT' OF SOUTH AFRICA-STYLE BOYCOTT... - 0 views

  • Analogies with apartheid regime in the wake of Mandela’s death could accelerate efforts to ostracize Israel. This has happened in recent days: The Dutch water company Vitens severed its ties with Israeli counterpart Mekorot; Canada’s largest Protestant church decided to boycott three Israeli companies; the Romanian government refused to send any more construction workers; and American Studies Association academics are voting on a measure to sever links with Israeli universities. Coming so shortly after the Israeli government effectively succumbed to a boycott of settlements in order to be eligible for the EU’s Horizon 2020 scientific cooperation agreement, it is hard to avoid the conclusion that the BDS (Boycott, Divestment and Sanctions) movement is picking up speed. And the writing on the wall, if anyone missed it, only got clearer and sharper in the wake of the death of Nelson Mandela.
  • When the United Nations passed its first non-binding resolution calling for a boycott of South Africa in 1962, it was staunchly opposed by a bloc of Western countries, led by Britain and the United States. But the grassroots campaign that had started with academic boycotts in the late 1950s gradually moved on to sports and entertainment and went on from there to institutional boycotts and divestment. Along the way, the anti-apartheid movement swept up larger and larger swaths of Western public opinion, eventually forcing even the most reluctant of governments, including Israel and the U.S., to join the international sanctions regime. 
  • We’re really great at knowing where thresholds are after we fall off the cliff, but that’s not very helpful,” as lake ecologist and “tipping point” researcher Stephen Carpenter told USA today in 2009.  Israel could very well be approaching such a threshold. Among the many developments that could be creating the required critical mass one can cite the passage of time since the Twin Towers attacks in September 2001, which placed Israel in the same camp as the U.S. and the West in the War on Terror; Israel’s isolation in the campaign against Iran’s nuclear programs; the disappearance of repelling archenemies such as Osama bin Laden, Muammar Gadhafi, Mahmoud Ahmadinejad and, to a lesser degree, Yasser Arafat; the relative security and lack of terror inside Israel coupled with its own persistent settlement drive; and the negative publicity generated by revelations of racism in Israeli society, the image of its rulers as increasingly rigid and right wing and the government’s own confrontations with illegal African immigrants and Israeli Bedouin, widely perceived as being tinged with bias and prejudice.  In recent days, American statesmen seem to be more alarmed about the looming danger of delegitimization than Israelis are. In remarks to both the Saban Forum and the American Joint Distribution Committee this week, Secretary of State John Kerry described delegitimization as “an existential danger." Vice President Joe Biden, speaking to the same JDC forum, went one step further: “The wholesale effort to delegitimize Israel is the most concentrated that I have seen in the 40 years I have served. It is the most serious threat in my view to Israel’s long-term security and viability.” 
  • ...1 more annotation...
  • One must always take into account the possibility of unforeseen developments that will turn things completely around. Barring that, the only thing that may be keeping Israel from crossing the threshold and “going over the cliff” in the international arena is Kerry’s much-maligned peace process, which is holding public opinion and foreign governments at bay and preventing a “tipping point” that would dramatically escalate the anti-Israeli boycott campaign.  Which only strengthens Jeffrey Goldberg’s argument in a Bloomberg article on Wednesday that Kerry is “Israel’s best friend." It also highlights, once again, how narrow-minded, shortsighted and dangerously delusional Kerry’s critics, peace process opponents and settlement champions really are (though you can rest assured that if and when the peace process collapses and Israel is plunged into South African isolation, they will be pointing their fingers in every direction but themselves.
  •  
    Note that this article's original is behind a paywall in Haaretz, one of Israel's market-leading newspapers.  There can be no questioning of the facts that: [i] the Palestinian Boycott, Divesment, and Sanctions ("BDS") movement is rapidly gaining strength globally; and [ii] that factor weighs heavily in the negotiations between Israel and Palestine for a two-state solution. Although not bluntly stated, the BSD movement's path runs directly to a single-state solution that would sweep Israel's present right-wing government from power and result in a secular state rather than a "Jewish state." And the E.U., Israel's largest export market, has promised to go even farther in sanctioning Israel than the considerable distance it has already gone if the negotiations do not result in a two state solution. Labeling all products produced wholly or in part in Israel-occupied Palestine territory is among the mildest of sanctions under discussion, a measure already adopted in two E.U. nations. The BSD Movement's success has also been marked by Israel attaining the pariah state status previously experienced by South Africa. Only the U.S., Canada, and a half-dozen or so tiny island nations closely aligned with the U.S. still vote in favor of Israel at the U.N. For example, the vote on granting Palestine U.N. observer state status was 138-9, with 41 abstentions.  The prospect of an end to the non-secular Jewish state has enormous ramifications for U.S. foreign policy, not the least of which is the influence of the Israel lobby in the U.S. that has thus far led the U.S. to three Treasury-draining wars in Southwest Asia and Northern Africa and host of minor military actions in other area nations, as well as a near-war in Syria, averted mainly via Russian diplomacy that outfoxed Secretary of State John Kerry. Time will tell whether the diplomatic outreach by Iran will succeed in averting war with the greatest military power remaining in the Mideast after Israel itself. "Protectin
Paul Merrell

U.S. House passes bill to ensure Israel can 'remove existential threats' - Diplomacy & ... - 0 views

  • The U.S. House of Representatives passed a defense authorization bill that would make it U.S. policy to take “all necessary steps” to ensure Israel is able to “remove existential threats,” among them nuclear facilities in Iran. “It is the policy of the United States to take all necessary steps to ensure that Israel possesses and maintains an independent capability to remove existential threats to its security and defend its vital national interests,” said the amendment to the National Defense Authorization Act passed Friday.
  • The amendment, initiated by Rep. Peter Roskam (R-Ill.) and first reported by Americans for Peace Now weekly legislative roundup, would require the president to report every 90 days on how the policy is being implemented. That report would identify “all aerial refueling platforms, bunker-buster munitions, and other capabilities and maintenance by Israel of a robust independent capability to remove existential security threats, including nuclear and ballistic missile facilities in Iran, and defend its vital national interests.”
  • The language must survive the reconciliation process with the Senate and then be signed by the president in order to become law. The amendment is similar to a non-binding resolution passed in April in the Senate that urged the president to provide “diplomatic, military, and economic support” to Israel should it be “compelled” to strike Iran’s suspected nuclear weapons program. The House version of the defense authorization act already included a number of Israel-related measures, including tripling Obama’s request for missile defense cooperation funding from $96 million to $284 million. The whole act passed Friday 315-108 and Roskam’s amendment passed by voice vote.
  •  
    House authorizes pre-emptive strike against the non-existent Iranian nuclear weapons.
Paul Merrell

Anti-Iranism in the Trump Administration « LobeLog - 0 views

  • In explaining the timing of Trump’s declarations, one always has to look at what he is trying to divert attention from, and right now the uproar over the anti-Muslim travel ban is no doubt involved.  But the supposed trigger for these tweets and for an anti-Iran blast that Trump’s national security adviser delivered in the White House press room was an Iranian test of a ballistic missile.  Missiles have long been used by Iran-bashers as a red herring.  Missiles of various ranges are so much integrated into conventional armed forces, and missile proliferation has gone so far in the Middle East, that it does not make sense to single out an Iranian missile test as something that, in the hyperbolic language of security adviser Flynn, are among Iranian actions that “undermine security, prosperity, and stability throughout and beyond the Middle East and place American lives at risk.” If rivals of Iran can’t develop their own missiles, they buy them.  Saudi Arabia has bought them from China.  The United Arab Emirates has bought them from North Korea.  Short of the negotiation of a comprehensive regional missile disarmament pact, Iran will have missiles. Former State Department intelligence officer Greg Thielmann highlights the most important points about this latest attempt to brew a tempest in the Iranian missile teapot.  A prohibition on Iranian missile activity incorporated in a United Nations Security Council resolution that was enacted during Barack Obama’s presidency was intended and used, just like other sanctions, as one more pressure point on Iran to induce it to negotiate restrictions on its nuclear program.  Accordingly, the later Security Council resolution enacted after negotiation of the nuclear agreement included only a hortatory clause “calling” on Iran to lay off the missile tests.  It is at best a stretch to call the latest test a “violation” of this resolution, and it certainly is not a violation of the nuclear agreement or any other agreement that Iran has signed.  As long as the nuclear agreement lives and Iran does not have nuclear weapons, Iranian ballistic missiles are of minor importance, and they do not pose a threat to U.S. interests (and this most recent test, by the way, was a failure). Thielmann summarizes as follows the environment that Iranian defense planners face, and the reasons Iranian missiles are a symptom rather than a cause of conflict and weapons proliferation in the Middle East: “During the eight-year war following Iraq’s invasion, Iran was more the victim of than the source of ballistic missiles raining down death and destruction. In spite of its large missile arsenal, Iran has no long-range ballistic missiles; three of its regional neighbors do. Iran has no nuclear warheads for its missiles; two of its regional neighbors do. Iran does not have a large and modern air force as an alternative means of projecting force as do Saudi Arabia and Israel.”
  • The other bit of allegedly “destabilizing behavior” by Iran on which Flynn focused concerned the civil war in Yemen and most recently an attack by Houthi rebels on a Saudi warship.  Flynn disregarded how whatever aid Iran gives to the Houthis pales in comparison to the direct military intervention by the Saudis and Emiratis, which is responsible for most of the civilian casualties and suffering in this war.  It would be surprising if the Houthis, or any force on the opposite side of this conflict from the Saudis, did not try to go after Saudi forces at sea as well as on land.  Flynn also disregarded how the Houthis are not obedient clients of Iran, how in the past the Houthis have ignored Iranian advice urging restraint in their operations, and how there is no evidence whatever, at least not among what is publicly known, that Iran had anything to do the attack on the Saudi ship, let alone of posing a similar threat to U.S. assets in the area.  Nor was anything said about how the major U.S. terrorist concern in Yemen—Al Qaeda in the Arabian Peninsula—is on the anti-Houthi side in this war.  Nor anything about how former president and longtime U.S. counterterrorist partner Ali Abdullah Salih has been allied with the Houthis. Flynn’s statement represents a taking sides in a local rivalry for no good reason, and in which the United States does not have a critical stake.  One of several harmful consequences of this kind of needless side-taking is to embolden those who side is taken to engage in more destructive behavior without being brought to account.  James Dorsey describes this way the destructive behavior that Riyadh is encouraged to take by the United States siding so unquestioningly with the Saudis in their rivalry with Iran: “A four-decade long, $100 billion global Saudi effort to box in, if not undermine, a post-1979 revolution Iranian system of government that it sees as an existential threat to the autocratic rule of the Al Saud family by funding ultra-conservative political and religious groups has contributed to the rise of supremacism, intolerance and anti-pluralism across the Muslim world and created potential breeding grounds of extremism.”
Paul Merrell

Exclusive: TSA's Secret Behavior Checklist to Spot Terrorists - The Intercept - 0 views

  • Fidgeting, whistling, sweaty palms. Add one point each. Arrogance, a cold penetrating stare, and rigid posture, two points. These are just a few of the suspicious signs that the Transportation Security Administration directs its officers to look out for — and score — in airport travelers, according to a confidential TSA document obtained exclusively by The Intercept. The checklist is part of TSA’s controversial program to identify potential terrorists based on behaviors that it thinks indicate stress or deception — known as the Screening of Passengers by Observation Techniques, or SPOT. The program employs specially trained officers, known as Behavior Detection Officers, to watch and interact with passengers going through screening. The document listing the criteria, known as the “Spot Referral Report,” is not classified, but it has been closely held by TSA and has not been previously released. A copy was provided to The Intercept by a source concerned about the quality of the program.
  • Fidgeting, whistling, sweaty palms. Add one point each. Arrogance, a cold penetrating stare, and rigid posture, two points. These are just a few of the suspicious signs that the Transportation Security Administration directs its officers to look out for — and score — in airport travelers, according to a confidential TSA document obtained exclusively by The Intercept. The checklist is part of TSA’s controversial program to identify potential terrorists based on behaviors that it thinks indicate stress or deception — known as the Screening of Passengers by Observation Techniques, or SPOT. The program employs specially trained officers, known as Behavior Detection Officers, to watch and interact with passengers going through screening.
  • The document listing the criteria, known as the “Spot Referral Report,” is not classified, but it has been closely held by TSA and has not been previously released. A copy was provided to The Intercept by a source concerned about the quality of the program. The checklist ranges from the mind-numbingly obvious, like “appears to be in disguise,” which is worth three points, to the downright dubious, like a bobbing Adam’s apple. Many indicators, like “trembling” and “arriving late for flight,” appear to confirm allegations that the program picks out signs and emotions that are common to many people who fly.
  • ...5 more annotations...
  • A TSA spokesperson declined to comment on the criteria obtained by The Intercept. “Behavior detection, which is just one element of the Transportation Security Administration’s (TSA) efforts to mitigate threats against the traveling public, is vital to TSA’s layered approach to deter, detect and disrupt individuals who pose a threat to aviation,” a spokesperson said in an emailed statement.
  • Since its introduction in 2007, the SPOT program has attracted controversy for the lack of science supporting it. In 2013, the Government Accountability Office found that there was no evidence to back up the idea that “behavioral indicators … can be used to identify persons who may pose a risk to aviation security.” After analyzing hundreds of scientific studies, the GAO concluded that “the human ability to accurately identify deceptive behavior based on behavioral indicators is the same as or slightly better than chance.” The inspector general of the Department of Homeland Security found in 2013 that TSA had failed to evaluate SPOT, and “cannot ensure that passengers at United States airports are screened objectively, show that the program is cost-effective, or reasonably justify the program’s expansion.” Despite those concerns, TSA has trained and deployed thousands of Behavior Detection Officers, and the program has cost more than $900 million since it began in 2007, according to the GAO.
  • The 92-point checklist listed in the “Spot Referral Report” is divided into various categories with a point score for each. Those categories include a preliminary “observation and behavior analysis,” and then those passengers pulled over for additional inspection are scored based on two more categories: whether they have “unusual items,” like almanacs and “numerous prepaid calling cards or cell phones,” and a final category for “signs of deception,” which include “covers mouth with hand when speaking” and “fast eye blink rate. Points can also be deducted from someone’s score based on observations about the traveler that make him or her less likely, in TSA’s eyes, to be a terrorist. For example, “apparent” married couples, if both people are over 55, have two points deducted off their score. Women over the age of 55 have one pointed deducted; for men, the point deduction doesn’t come until they reach 65. Last week, the ACLU sued TSA to obtain records related to its behavior detection programs, alleging that they lead to racial profiling. The lawsuit is based on a Freedom of Information Act request the ACLU filed last November asking for numerous documents related to the program, including the scientific justification for the program, changes to the list of behavior indicators, materials used to train officers and screen passengers, and what happens to the information collected on travelers.
  • “The TSA has insisted on keeping documents about SPOT secret, but the agency can’t hide the fact that there’s no evidence the program works,” said Hugh Handeyside, staff attorney with the ACLU National Security Project, in a statement announcing the lawsuit. Being on the lookout for suspicious behavior is a “common sense approach” that is used by law enforcement, according to TSA. “No single behavior alone will cause a traveler to be referred to additional screening or will result in a call to a law enforcement officer (LEO),” the agency said in its emailed statement. “Officers are trained and audited to ensure referrals for additional screening are based only on observable behaviors and not race or ethnicity.” One former Behavior Detection Officer manager, who asked not to be identified, said that SPOT indicators are used by law enforcement to justify pulling aside anyone officers find suspicious, rather than acting as an actual checklist for specific indicators. “The SPOT sheet was designed in such a way that virtually every passenger will exhibit multiple ‘behaviors’ that can be assigned a SPOT sheet value,” the former manager said.
  • The signs of deception and fear “are ridiculous,” the source continued. “These are just ‘catch all’ behaviors to justify BDO interaction with a passenger. A license to harass.” The observations of a TSA screener or a Behavior Detection Officer shouldn’t be the basis for referring someone to law enforcement. “The program is flawed and unnecessarily delays and harasses travelers. Taxpayer dollars would be better spent funding real police at TSA checkpoints,” the former manager said. A second former Behavior Detection Officer manager, who also asked not to be identified, told The Intercept that the program suffers from lack of science and simple inconsistency, with every airport training its officers differently. “The SPOT program is bullshit,” the manager told The Intercept. “Complete bullshit.”
  •  
    I've completely boycotted airlines in the U.S. since 2002 because I refuse to submit to the outrageous treatment by government that is now required to board a commercial airliner. If the airlines want my business, they need to start lobbying to end the politics of fear and the Gestapo tactics of government. plus pushing for an honest investigation of the 9/11/2001 incidents.  
Paul Merrell

CISA Security Bill: An F for Security But an A+ for Spying | WIRED - 0 views

  • When the Senate Intelligence Committee passed the Cybersecurity Information Sharing Act by a vote of 14 to 1, committee chairman Senator Richard Burr argued that it successfully balanced security and privacy. Fifteen new amendments to the bill, he said, were designed to protect internet users’ personal information while enabling new ways for companies and federal agencies to coordinate responses to cyberattacks. But critics within the security and privacy communities still have two fundamental problems with the legislation: First, they say, the proposed cybersecurity act won’t actually boost security. And second, the “information sharing” it describes sounds more than ever like a backchannel for surveillance.
  • On Tuesday the bill’s authors released the full, updated text of the CISA legislation passed last week, and critics say the changes have done little to assuage their fears about wanton sharing of Americans’ private data. In fact, legal analysts say the changes actually widen the backdoor leading from private firms to intelligence agencies. “It’s a complete failure to strengthen the privacy protections of the bill,” says Robyn Greene, a policy lawyer for the Open Technology Institute, which joined a coalition of dozens of non-profits and cybersecurity experts criticizing the bill in an open letter earlier this month. “None of the [privacy-related] points we raised in our coalition letter to the committee was effectively addressed.” The central concern of that letter was how the same data sharing meant to bolster cybersecurity for companies and the government opens massive surveillance loopholes. The bill, as worded, lets a private company share with the Department of Homeland Security any information construed as a cybersecurity threat “notwithstanding any other provision of law.” That means CISA trumps privacy laws like the Electronic Communication Privacy Act of 1986 and the Privacy Act of 1974, which restrict eavesdropping and sharing of users’ communications. And once the DHS obtains the information, it would automatically be shared with the NSA, the Department of Defense (including Cyber Command), and the Office of the Director of National Intelligence.
  • In a statement posted to his website yesterday, Senator Burr wrote that “Information sharing is purely voluntary and companies can only share cyber-threat information and the government may only use shared data for cybersecurity purposes.” But in fact, the bill’s data sharing isn’t limited to cybersecurity “threat indicators”—warnings of incoming hacker attacks, which is the central data CISA is meant to disseminate among companies and three-letter agencies. OTI’s Greene says it also gives companies a mandate to share with the government any data related to imminent terrorist attacks, weapons of mass destruction, or even other information related to violent crimes like robbery and carjacking. 
  • ...2 more annotations...
  • The latest update to the bill tacks on yet another kind of information, anything related to impending “serious economic harm.” All of those vague terms, Greene argues, widen the pipe of data that companies can send the government, expanding CISA into a surveillance system for the intelligence community and domestic law enforcement. If information-sharing legislation does not include adequate privacy protections, then...It’s a surveillance bill by another name. Senator Ron Wyden
  • “CISA goes far beyond [cybersecurity], and permits law enforcement to use information it receives for investigations and prosecutions of a wide range of crimes involving any level of physical force,” reads the letter from the coalition opposing CISA. “The lack of use limitations creates yet another loophole for law enforcement to conduct backdoor searches on Americans—including searches of digital communications that would otherwise require law enforcement to obtain a warrant based on probable cause. This undermines Fourth Amendment protections and constitutional principles.”
  •  
    I read the legislation. It's as bad for privacy as described in the aritcle. And its drafting is incredibly sloppy.
Gary Edwards

CHILDREN KILLED OF KEVIN KRIM, CHIEF EXECUTIVE OF CNBC DIGITAL, AFTER RELEASING INFORMA... - 0 views

  •  
    Incredible article about the behind-the-scenes story of the nanny murder of two small children in NYC.   First, it's a staged murder meant to send a clear message to ALL media.  The children were the offspring of Kevin Krim, CEO of CNBC digital.  His website had published a story about the Spire Law Group suing an entire class of bigshot BANKSTERS for the theft of $43 TRILLION dollars of tax payer money.  Second, this involves the US Government.  The Spire allegation is that the Feds actively helped and assisted the Bankster theft. Third, the story describes the historical background of these Bankster hits, assassination and threats.  Although not covered in the article, Presidential assassinations in particular have an unmistakable link to Executive Orders that the Treasury print Silver Certificates that would compete against Bankster notes.  In one way or another, it's all about control of the money system.  This list of Presidents includes Jackson, Lincoln, Garfield, McKinley, Kennedy and Reagan. Original Press Release from the Spire Law Group:  ... http://goo.gl/ynV6O .... Wow! ................................... excerpt:: "On 10/25/2012 two corporate financial media bastions,  MarketWatch  (an affiliate of the Wall Street Journal) and CNBC, presented their readers with a bombshell.  In a too-good-to-be-true lawsuit, the top echelons of the USA's banking and civilian government had been sued for "racketeering and money laundering."  The suit requested "the return of $43 trillion to the United States Treasury."  Yes, you've read that right: 43 trillion-roughly 3 years worth of America's GDP or 3 times America's underestimate of its own national debt. The suit characterizes itself, according to these two corporate media tabloids, as the largest money laundering and racketeering lawsuit in United States History.  [It identifies] $43 trillion ($43,000,000,000,000.00) of laundered money by the 'Banksters' and their U.S. r
Paul Merrell

The Fake Terror Threat Used To Justify Bombing Syria - The Intercept - 0 views

  • As the Obama Administration prepared to bomb Syria without congressional or U.N. authorization, it faced two problems. The first was the difficulty of sustaining public support for a new years-long war against ISIS, a group that clearly posed no imminent threat to the “homeland.” A second was the lack of legal justification for launching a new bombing campaign with no viable claim of self-defense or U.N. approval. The solution to both problems was found in the wholesale concoction of a brand new terror threat that was branded “The Khorasan Group.” After spending weeks depicting ISIS as an unprecedented threat — too radical even for Al Qaeda! — administration officials suddenly began spoon-feeding their favorite media organizations and national security journalists tales of a secret group that was even scarier and more threatening than ISIS, one that posed a direct and immediate threat to the American Homeland. Seemingly out of nowhere, a new terror group was created in media lore.
Paul Merrell

CSIS asked foreign agencies to spy on Canadians, kept court in dark, judge says - 0 views

  • OTTAWA — Canada’s foremost jurist on national security law has slammed CSIS for deliberately keeping the Federal Court of Canada “in the dark” about outsourcing its spying on Canadians abroad to foreign agencies, according to a redacted version of a classified court decision made public Friday.In a thundering rebuke, Federal Court Judge Richard Mosley said the Canadian Security Intelligence Service (CSIS) purposely misled him when he granted it numerous warrants beginning in 2009 to intercept the electronic communications of unidentified Canadians abroad suspected as domestic security threats.“This was a breach of the duty of candour owed by the service and their legal advisers to the court,” Mosley said in his Further Reasons for Order.CSIS also mistakenly assigned powers to the warrants that the court never authorized and which do not exist in law, he said.“It is clear that the exercise of the court’s warrant issuing authority has been used as protective cover for activities that it has not authorized,” Mosley wrote.Furthermore, tasking foreign security intelligence services to spy on Canadians overseas “carries the risk of the detention of or other harm to a Canadian person based on that information.“Given the unfortunate history of information sharing with foreign agencies over the past decade and the reviews conducted by several royal commissions, there can be no question that the Canadian agencies are aware of those hazards. It appears to me that they are using the warrants as authorization to assume those risks.”
  • Legal observers say this case and Mosley’s scolding will harm CSIS’s credibility and raise questions about whether the service has broken Criminal Code provisions dealing with the invasion of privacy.“When a judge says the government breached its duty of candour that is a very big ‘ouch’ moment,” Craig Forcese, a national security law scholar at the University of Ottawa, wrote in a recent blog posting.At the time the first warrants were issued, CSIS told the court “on clearly stated grounds” that the electronic intercepts would be carried out from within Canada by the Communications Security Establishment Canada (CSEC), the country’s foreign signals intelligence spy service.CSIS is largely restricted to domestic spying operations. If an investigation involves the use of intrusive techniques, such as electronic intercepts, Section 21 of the CSIS Act requires it to obtain a warrant approved by a Federal Court judge to guard the Charter right to a reasonable expectation of privacy.CSEC, meanwhile, is not allowed to spy on Canadians anywhere unless it is to provide technical and operational assistance to federal law enforcement and security agencies such as CSIS.And the federal court only has jurisdiction to authorize warrants under the CSIS Act as long as the communications in question are intercepted within Canada.
  • Yet once the so-called 30-08 warrants were approved by the court, CSEC, on behalf of CSIS, turned around and handed the jobs to one or more of its partners in the “Five Eyes” intelligence-gathering alliance between Canada, the United States, Great Britain, Australia and New Zealand.Mosley found out about the situation late this summer and summoned CSIS, CSEC and government officials and lawyers to court to explain themselves. The public version of his reasons for order was released Friday.
  • ...2 more annotations...
  • Some excerpts:• “I am satisfied that a decision was made by CSIS officials in consultation with their legal advisers to strategically omit information in applications for 30-08 warrants about their intention to seek the assistance of the foreign partners. As a result, the court was led to believe that all of the interception activity would take place in or under the control of Canada.”• “The principle of comity between nations that implies the acceptance of foreign laws and procedures when Canadian officials are operating abroad ends where clear violations of international law and human rights begin. In tasking the other members of the Five Eyes to intercept the communications of the Canadian targets, CSIS and CSEC officials knew ... this would involve the breach of international law by the requested second parties.”• “There is nothing in any of the material that I have read ... that persuades me that it was the intent of Parliament to give the service authority to engage the collection resources of the second party allies to intercept the private communications of Canadians.”• “It must be made clear, in any grant of a 30-08 warrant, that the warrant does not authorize the interception of the communications of a Canadian person by any foreign service on behalf of the service either directly or through the assistance of CSEC.”• “There must be no further suggestion in any reference to the use of second party assets by CSIS and CSEC, or their legal advisers, that it is being done under the authority of a (section) 21 warrant issued by this court.”
  • Forcese, meanwhile, raises some intriguing questions:• If Five Eyes assistance was not authorized, and CSEC and CSIS nevertheless sought it, are they still protected from Criminal Code, Part VI (invasion of privacy) culpability? Culpability, he writes, is only avoided where the intercept is lawfully authorized. If the parameters of the warrant were disregarded, does that vitiate the lawful access?• If CSEC and CSIS called on Five Eyes agencies to intercept communications, was the intercept still territorial, thus satisfying the international law concerns raised in the two warrant applications?“Outsourcing an international violation does not diminish state responsibility for that international violation. In a different context, that would be like asking bounty hunters to do your kidnapping of fugitives on the territory of a foreign state. Still a violation of international law.”CSIS has a choice, Forcese concludes: “Conduct extraterritorial spying without recourse to the courts, at risk of ultimately being called to account under domestic law, or honour the federal court’s construal of international law — and CSIS’s jurisdiction — and pull in its truly international surveillance operations, potentially blinding the country’s chief security intelligence agency.
  •  
    Canadian Security Intelligence Service is in politically explosive deep doo-doo. 
Paul Merrell

Officials' defenses of NSA phone program may be unraveling - The Washington Post - 0 views

  • From the moment the government’s massive database of citizens’ call records was exposed this year, U.S. officials have clung to two main lines of defense: The secret surveillance program was constitutional and critical to keeping the nation safe. But six months into the controversy triggered by former NSA contractor Edward Snowden, the viability of those claims is no longer clear.
  • From the moment the government’s massive database of citizens’ call records was exposed this year, U.S. officials have clung to two main lines of defense: The secret surveillance program was constitutional and critical to keeping the nation safe. But six months into the controversy triggered by former NSA contractor Edward Snowden, the viability of those claims is no longer clear.
  • In a three-day span, those rationales were upended by a federal judge who declared that the program was probably unconstitutional and the release of a report by a White House panel utterly unconvinced that stockpiling such data had played any meaningful role in preventing terrorist attacks.Either of those developments would have been enough to ratchet up the pressure on President Obama, who must decide whether to stand behind the sweeping collection or dismantle it and risk blame if there is a terrorist attack.Beyond that dilemma for the president, the decision by U.S. District Judge Richard J. Leon and the recommendations from the review panel shifted the footing of almost every major player in the surveillance debate.NSA officials, who rarely miss a chance to cite Snowden’s status as a fugitive from the law, now stand accused of presiding over a program whose capabilities were deemed by the judge to be “Orwellian" and likely illegal. Snowden’s defenders, on the other hand, have new ammunition to argue that he is more whistleblower than traitor.
  • ...4 more annotations...
  • Similarly, U.S. officials who have dismissed NSA critics as naive about the true nature of the terrorist threat now face the findings of a panel handpicked by Obama and with access to classified files. Among its members were former deputy CIA director Michael J. Morrell and former White House counterterrorism adviser Richard A. Clarke, both of whom spent years immersed in intelligence reports on al-Qaeda.A day after the panel’s report was made public, U.S. officials said its findings had stunned senior officials at the White House as well as at U.S. intelligence services, prompting a scramble to assess the potential effect of its proposals as well as to calculate its political fallout.The president is “faced with a program that has intelligence value but also has political liabilities,” said Mark M. Lowenthal, a former senior CIA official. “Now that he has a set of recommendations from a panel he appointed, if he doesn’t follow them people are going to say, ‘are they just for show?’ Or if he does follow them, he scales back a program that he supported.”Members of the panel met with Obama on Wednesday and said he was receptive to the group’s findings.
  • “Obama didn’t say, we accept this on the spot,” Clarke said in an interview. “But we didn’t get a lot of negative feedback. They’re going to talk to the agencies and see what the agencies’ objections are and then make their decisions.”White House officials declined to comment on specific recommendations Thursday, but press secretary Jay Carney signaled that the administration remains reluctant to dismantle the data-collection program. “The program is an important tool in our efforts to combat threats against the United States and the American people,” Carney said.Several current and former U.S. officials sought to downplay the impact of the court case and the review panel, saying that their influence is likely to be offset by the work of an internal White House group made up of national security officials who are regular consumers of NSA intercepts and may be more cautious about curtailing the agency’s capabilities.
  • However, the developments this week were a reminder that the outcome may be beyond Obama’s control. Leon’s ruling set in motion a legal battle that may culminate in a ruling by the Supreme Court. The panel’s findings gave new momentum to lawmakers who have introduced legislation that would bring an end to the NSA’s bulk collection of phone records.
  • As part of their initial research, members of the review panel spent a day at NSA headquarters in Fort Meade, Md. But officials said that neither the NSA chief, Gen. Keith B. Alexander, nor Director of National Intelligence James R. Clapper was given a copy of the report in advance or a chance to comment on its findings.A DNI spokesman declined to comment, but officials said U.S. intelligence officials would evaluate the panel’s proposals and prepare material for the White House on the potential effects of implementing its recommendations.
Paul Merrell

Remarks by President Obama in Address to the United Nations General Assembly | The Whit... - 0 views

  • Remarks by President Obama in Address to the United Nations General Assembly United Nations New York, New York
  • To summarize, the United States has a hard-earned humility when it comes to our ability to determine events inside other countries.  The notion of American empire may be useful propaganda, but it isn’t borne out by America’s current policy or by public opinion.  Indeed, as recent debates within the United States over Syria clearly show, the danger for the world is not an America that is too eager to immerse itself in the affairs of other countries or to take on every problem in the region as its own.  The danger for the world is that the United States, after a decade of war -- rightly concerned about issues back home, aware of the hostility that our engagement in the region has engendered throughout the Muslim world -- may disengage, creating a vacuum of leadership that no other nation is ready to fill. I believe such disengagement would be a mistake.  I believe America must remain engaged for our own security.  But I also believe the world is better for it.  Some may disagree, but I believe America is exceptional -- in part because we have shown a willingness through the sacrifice of blood and treasure to stand up not only for our own narrow self-interests, but for the interests of all. 
  • We live in a world of imperfect choices.  Different nations will not agree on the need for action in every instance, and the principle of sovereignty is at the center of our international order.  But sovereignty cannot be a shield for tyrants to commit wanton murder, or an excuse for the international community to turn a blind eye.  While we need to be modest in our belief that we can remedy every evil, while we need to be mindful that the world is full of unintended consequences, should we really accept the notion that the world is powerless in the face of a Rwanda or Srebrenica?  If that’s the world that people want to live in, they should say so and reckon with the cold logic of mass graves. But I believe we can embrace a different future.  And if we don’t want to choose between inaction and war, we must get better -- all of us -- at the policies that prevent the breakdown of basic order.  Through respect for the responsibilities of nations and the rights of individuals.  Through meaningful sanctions for those who break the rules.  Through dogged diplomacy that resolves the root causes of conflict, not merely its aftermath.  Through development assistance that brings hope to the marginalized.  And yes, sometimes -- although this will not be enough -- there are going to be moments where the international community will need to acknowledge that the multilateral use of military force may be required to prevent the very worst from occurring.
  •  
    This just may be the speech in which Barack Obama's speechwriters managed to set a new record in presidential hypocrisy. It's long and a very depressing read for someone who is intimately familiar with the issues he discusses. I've tried to highlight only the tastiest meat of the beast. But it's worth reading the whole thing, from the traitor's pledge of undying allegiance to Israel through the announcement that nothing has changed in America other than a public that is demanding peace but won't get it from Mr. Obama. Mr. Obama's contempt for the U.N. Charter riddles his speech, a treaty that is enshrined in our own law through the Constitution's Treaty Clause, is remarkable. That charter of course forbids wars of aggression (and threats thereof) absent the authorization of all permanent members of the U.N. Security Council.  
  •  
    Related: the top 45 lies in Obama's U.N. speech: http://warisacrime.org/content/top-45-lies-obamas-speech-un
« First ‹ Previous 41 - 60 of 339 Next › Last »
Showing 20 items per page