Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged police-investigation

Rss Feed Group items tagged

Paul Merrell

NSA Data Will Soon Be Used By Domestic Law Enforcement - 0 views

  • If you’re reading this, then I’m willing to bet that you’ve been called many different names throughout your life. If I were to hazard a guess, I would say they were names like kook, paranoid, conspiracy theorist, alarmist, insane, or gullible. And after this week, you can go by a new name: Vindicated. I’m of course talking about recent revelations from the NSA. Long before Edward Snowden came along, it was no secret that the NSA was spying on everyone without good cause. Anyone who believed that fact was called a conspiracy theorist, but their fears were eventually validated. These same people also understood that the NSA’s surveillance powers would never be used exclusively against terrorists and hostile governments. The power they have is just too tempting for any government. If various government agencies weren’t using the NSA’s surveillance apparatus to solve domestic crimes, it was only a matter of time before it was used for just that.
  • And again, they called us conspiracy theorists for believing that. And again, we were right all long. A while back, we noted a report showing that the “sneak-and-peek” provision of the Patriot Act that was alleged to be used only in national security and terrorism investigations has overwhelmingly been used in narcotics cases. Now the New York Times reports that National Security Agency data will be shared with other intelligence agencies like the FBI without first applying any screens for privacy. The ACLU of Massachusetts blog Privacy SOS explains why this is important: What does this rule change mean for you? In short, domestic law enforcement officials now have access to huge troves of American communications, obtained without warrants, that they can use to put people in cages. FBI agents don’t need to have any “national security” related reason to plug your name, email address, phone number, or other “selector” into the NSA’s gargantuan data trove. They can simply poke around in your private information in the course of totally routine investigations. And if they find something that suggests, say, involvement in illegal drug activity, they can send that information to local or state police. That means information the NSA collects for purposes of so-called “national security” will be used by police to lock up ordinary Americans for routine crimes.
  • Anybody who knows anything about how governments work, should not surprised. You can’t give them any kind of power, and expect them to use it responsibly. You can’t give them any stipulations. Eventually they’ll find a legal loophole to work around any limitations that have been placed on them. In other news, the Pentagon admitted this week that they’ve been deploying military drones over the United States for domestic surveillance purposes. Much like the NSA’s surveillance apparatus, we were assured that drones were for terrorists in faraway lands. Nothing so Orwellian would ever be used against ordinary American citizens at home. Yet here we are, with more to come.
  •  
    The Privacy Act, 5 U.S.C. 552a, provides in relevant part: "(a)(4) the term "record" means any item, collection, or grouping of information about an individual that is maintained by an agency, including, but not limited to, his education, financial transactions, medical history, and criminal or employment history and that contains his name, or the identifying number, symbol, or other identifying particular assigned to the individual, such as a finger or voice print or a photograph[.] ... "(b) Conditions of Disclosure.-No agency shall disclose any record which is contained in a system of records by any means of communication to any person, or to another agency, except pursuant to a written request by, or with the prior written consent of, the individual to whom the record pertains, unless disclosure of the record would be- ... "(7) to another agency or to an instrumentality of any governmental jurisdiction within or under the control of the United States for a civil or criminal law enforcement activity if the activity is authorized by law, and if the head of the agency or instrumentality has made a written request to the agency which maintains the record specifying the particular portion desired and the law enforcement activity for which the record is sought[.]" So a separate written request for each "portion" of any individual record that describes the "law enforcement activity for which the record is sought[.]" That doesn't sound like the contemplated unfettered access to bulk raw data. And it gets even better, with a right to sue for any violation, attorney fees and expenses, and a statutory minimum of $1,000 damages per violation just for winning the case.  
Paul Merrell

Data-sharing among US law agencies amounts to 'organised chaos' - report | World news |... - 0 views

  • The sharing of crucial intelligence about counter-terrorism between the FBI, the Department of Homeland Security and local police departments takes place through a patchwork process that amounts to “organized chaos”, according to a new report. The report, released Tuesday by the Brennan Center for Justice, a public-policy institute at New York University law school that has a track record of being skeptical of government surveillance, found inconsistent rules, inadequate oversight, apparent wastefulness and insufficient regard for civil liberties nationwide. “This poorly organized system not only wastes time and resources; it also risks masking reliable intelligence that could be crucial to an investigation,” the report says, warning that a “din of data” is overwhelming law enforcement.
  • The Brennan Center report examined 16 major police departments across the US, along with 19 affiliated “fusion centers” – controversial data-sharing pools between federal, state and local agencies – and 14 of the FBI’s joint terrorism task force partnerships with police.
  • Despite efforts by the Department of Homeland Security, most of the fusion centers operate with “minimal oversight, or no oversight whatsoever”, the report found. Out of 19 centers reviewed, only five require independent audits of retained data.
  • ...3 more annotations...
  • Fusion centers have been the subject of criticism from both civil libertarians and powerful elected officials. A 2012 investigation by the bipartisan Senate permanent subcommittee on investigations of more than 80,000 fusion center documents could not find any contribution the centers had made to “disrupt[ing] an active terrorist plot”. DHS disputes the results of that investigation, as do several legislators on committees overseeing the department. Senator Tom Coburn, an Oklahoman who serves as the top Republican on the Senate government reform and homeland security committee, has emerged as a leading legislative critic of fusion centers and joint terrorism task forces, for many of the same reasons detailed in the Brennan Center report. After a government inquiry indicated many federal data-sharing efforts were duplicative, Coburn issued a statement in April calling them “a vital component of national security”, but adding, “that is not an excuse to waste taxpayer funds”.
  • And all that information is on top of the fruits of the NSA’s vast data collection efforts, which are not entirely off limits to federal law enforcement. The controversial bulk collection of Americans’ phone data has been repeatedly described by the NSA as a tool to aid the FBI in detecting domestic terrorism activity. NSA deputy director John C Inglis recently stated that the FBI cannot search directly through the NSA’s data troves, but the agency shares telephone metadata with the bureau following searches through its databases based on “reasonable articulable suspicion” of connections to specific terrorist organizations.
  • The Brennan Center report did not specifically analyze law enforcement tower dumps, but Price called the reports of them alarming. “This is another indication of the vast trove of information that state and local police are collecting about law abiding Americans,” Price said. “To date, that information does not appear to be particularly useful in preventing terror attacks.”
  •  
    The ongoing federalization of state and local law enforcement continues unabated. Today's "fusion centers" have antecedents in the regional "intelligence centers" begun under the guise of Reagan's War on Drugs™, but shifted into a much higher gear under the guise of Bush II's War on Terror™.
Paul Merrell

Cy Vance's Proposal to Backdoor Encrypted Devices Is Riddled With Vulnerabilities | Jus... - 0 views

  • Less than a week after the attacks in Paris — while the public and policymakers were still reeling, and the investigation had barely gotten off the ground — Cy Vance, Manhattan’s District Attorney, released a policy paper calling for legislation requiring companies to provide the government with backdoor access to their smartphones and other mobile devices. This is the first concrete proposal of this type since September 2014, when FBI Director James Comey reignited the “Crypto Wars” in response to Apple’s and Google’s decisions to use default encryption on their smartphones. Though Comey seized on Apple’s and Google’s decisions to encrypt their devices by default, his concerns are primarily related to end-to-end encryption, which protects communications that are in transit. Vance’s proposal, on the other hand, is only concerned with device encryption, which protects data stored on phones. It is still unclear whether encryption played any role in the Paris attacks, though we do know that the attackers were using unencrypted SMS text messages on the night of the attack, and that some of them were even known to intelligence agencies and had previously been under surveillance. But regardless of whether encryption was used at some point during the planning of the attacks, as I lay out below, prohibiting companies from selling encrypted devices would not prevent criminals or terrorists from being able to access unbreakable encryption. Vance’s primary complaint is that Apple’s and Google’s decisions to provide their customers with more secure devices through encryption interferes with criminal investigations. He claims encryption prevents law enforcement from accessing stored data like iMessages, photos and videos, Internet search histories, and third party app data. He makes several arguments to justify his proposal to build backdoors into encrypted smartphones, but none of them hold water.
  • Before addressing the major privacy, security, and implementation concerns that his proposal raises, it is worth noting that while an increase in use of fully encrypted devices could interfere with some law enforcement investigations, it will help prevent far more crimes — especially smartphone theft, and the consequent potential for identity theft. According to Consumer Reports, in 2014 there were more than two million victims of smartphone theft, and nearly two-thirds of all smartphone users either took no steps to secure their phones or their data or failed to implement passcode access for their phones. Default encryption could reduce instances of theft because perpetrators would no longer be able to break into the phone to steal the data.
  • Vance argues that creating a weakness in encryption to allow law enforcement to access data stored on devices does not raise serious concerns for security and privacy, since in order to exploit the vulnerability one would need access to the actual device. He considers this an acceptable risk, claiming it would not be the same as creating a widespread vulnerability in encryption protecting communications in transit (like emails), and that it would be cheap and easy for companies to implement. But Vance seems to be underestimating the risks involved with his plan. It is increasingly important that smartphones and other devices are protected by the strongest encryption possible. Our devices and the apps on them contain astonishing amounts of personal information, so much that an unprecedented level of harm could be caused if a smartphone or device with an exploitable vulnerability is stolen, not least in the forms of identity fraud and credit card theft. We bank on our phones, and have access to credit card payments with services like Apple Pay. Our contact lists are stored on our phones, including phone numbers, emails, social media accounts, and addresses. Passwords are often stored on people’s phones. And phones and apps are often full of personal details about their lives, from food diaries to logs of favorite places to personal photographs. Symantec conducted a study, where the company spread 50 “lost” phones in public to see what people who picked up the phones would do with them. The company found that 95 percent of those people tried to access the phone, and while nearly 90 percent tried to access private information stored on the phone or in other private accounts such as banking services and email, only 50 percent attempted contacting the owner.
  • ...8 more annotations...
  • In addition to his weak reasoning for why it would be feasible to create backdoors to encrypted devices without creating undue security risks or harming privacy, Vance makes several flawed policy-based arguments in favor of his proposal. He argues that criminals benefit from devices that are protected by strong encryption. That may be true, but strong encryption is also a critical tool used by billions of average people around the world every day to protect their transactions, communications, and private information. Lawyers, doctors, and journalists rely on encryption to protect their clients, patients, and sources. Government officials, from the President to the directors of the NSA and FBI, and members of Congress, depend on strong encryption for cybersecurity and data security. There are far more innocent Americans who benefit from strong encryption than there are criminals who exploit it. Encryption is also essential to our economy. Device manufacturers could suffer major economic losses if they are prohibited from competing with foreign manufacturers who offer more secure devices. Encryption also protects major companies from corporate and nation-state espionage. As more daily business activities are done on smartphones and other devices, they may now hold highly proprietary or sensitive information. Those devices could be targeted even more than they are now if all that has to be done to access that information is to steal an employee’s smartphone and exploit a vulnerability the manufacturer was required to create.
  • Privacy is another concern that Vance dismisses too easily. Despite Vance’s arguments otherwise, building backdoors into device encryption undermines privacy. Our government does not impose a similar requirement in any other context. Police can enter homes with warrants, but there is no requirement that people record their conversations and interactions just in case they someday become useful in an investigation. The conversations that we once had through disposable letters and in-person conversations now happen over the Internet and on phones. Just because the medium has changed does not mean our right to privacy has.
  • Vance attempts to downplay this serious risk by asserting that anyone can use the “Find My Phone” or Android Device Manager services that allow owners to delete the data on their phones if stolen. However, this does not stand up to scrutiny. These services are effective only when an owner realizes their phone is missing and can take swift action on another computer or device. This delay ensures some period of vulnerability. Encryption, on the other hand, protects everyone immediately and always. Additionally, Vance argues that it is safer to build backdoors into encrypted devices than it is to do so for encrypted communications in transit. It is true that there is a difference in the threats posed by the two types of encryption backdoors that are being debated. However, some manner of widespread vulnerability will inevitably result from a backdoor to encrypted devices. Indeed, the NSA and GCHQ reportedly hacked into a database to obtain cell phone SIM card encryption keys in order defeat the security protecting users’ communications and activities and to conduct surveillance. Clearly, the reality is that the threat of such a breach, whether from a hacker or a nation state actor, is very real. Even if companies go the extra mile and create a different means of access for every phone, such as a separate access key for each phone, significant vulnerabilities will be created. It would still be possible for a malicious actor to gain access to the database containing those keys, which would enable them to defeat the encryption on any smartphone they took possession of. Additionally, the cost of implementation and maintenance of such a complex system could be high.
  • Vance also suggests that the US would be justified in creating such a requirement since other Western nations are contemplating requiring encryption backdoors as well. Regardless of whether other countries are debating similar proposals, we cannot afford a race to the bottom on cybersecurity. Heads of the intelligence community regularly warn that cybersecurity is the top threat to our national security. Strong encryption is our best defense against cyber threats, and following in the footsteps of other countries by weakening that critical tool would do incalculable harm. Furthermore, even if the US or other countries did implement such a proposal, criminals could gain access to devices with strong encryption through the black market. Thus, only innocent people would be negatively affected, and some of those innocent people might even become criminals simply by trying to protect their privacy by securing their data and devices. Finally, Vance argues that David Kaye, UN Special Rapporteur for Freedom of Expression and Opinion, supported the idea that court-ordered decryption doesn’t violate human rights, provided certain criteria are met, in his report on the topic. However, in the context of Vance’s proposal, this seems to conflate the concepts of court-ordered decryption and of government-mandated encryption backdoors. The Kaye report was unequivocal about the importance of encryption for free speech and human rights. The report concluded that:
  • States should promote strong encryption and anonymity. National laws should recognize that individuals are free to protect the privacy of their digital communications by using encryption technology and tools that allow anonymity online. … States should not restrict encryption and anonymity, which facilitate and often enable the rights to freedom of opinion and expression. Blanket prohibitions fail to be necessary and proportionate. States should avoid all measures that weaken the security that individuals may enjoy online, such as backdoors, weak encryption standards and key escrows. Additionally, the group of intelligence experts that was hand-picked by the President to issue a report and recommendations on surveillance and technology, concluded that: [R]egarding encryption, the U.S. Government should: (1) fully support and not undermine efforts to create encryption standards; (2) not in any way subvert, undermine, weaken, or make vulnerable generally available commercial software; and (3) increase the use of encryption and urge US companies to do so, in order to better protect data in transit, at rest, in the cloud, and in other storage.
  • The clear consensus among human rights experts and several high-ranking intelligence experts, including the former directors of the NSA, Office of the Director of National Intelligence, and DHS, is that mandating encryption backdoors is dangerous. Unaddressed Concerns: Preventing Encrypted Devices from Entering the US and the Slippery Slope In addition to the significant faults in Vance’s arguments in favor of his proposal, he fails to address the question of how such a restriction would be effectively implemented. There is no effective mechanism for preventing code from becoming available for download online, even if it is illegal. One critical issue the Vance proposal fails to address is how the government would prevent, or even identify, encrypted smartphones when individuals bring them into the United States. DHS would have to train customs agents to search the contents of every person’s phone in order to identify whether it is encrypted, and then confiscate the phones that are. Legal and policy considerations aside, this kind of policy is, at the very least, impractical. Preventing strong encryption from entering the US is not like preventing guns or drugs from entering the country — encrypted phones aren’t immediately obvious as is contraband. Millions of people use encrypted devices, and tens of millions more devices are shipped to and sold in the US each year.
  • Finally, there is a real concern that if Vance’s proposal were accepted, it would be the first step down a slippery slope. Right now, his proposal only calls for access to smartphones and devices running mobile operating systems. While this policy in and of itself would cover a number of commonplace devices, it may eventually be expanded to cover laptop and desktop computers, as well as communications in transit. The expansion of this kind of policy is even more worrisome when taking into account the speed at which technology evolves and becomes widely adopted. Ten years ago, the iPhone did not even exist. Who is to say what technology will be commonplace in 10 or 20 years that is not even around today. There is a very real question about how far law enforcement will go to gain access to information. Things that once seemed like merely science fiction, such as wearable technology and artificial intelligence that could be implanted in and work with the human nervous system, are now available. If and when there comes a time when our “smart phone” is not really a device at all, but is rather an implant, surely we would not grant law enforcement access to our minds.
  • Policymakers should dismiss Vance’s proposal to prohibit the use of strong encryption to protect our smartphones and devices in order to ensure law enforcement access. Undermining encryption, regardless of whether it is protecting data in transit or at rest, would take us down a dangerous and harmful path. Instead, law enforcement and the intelligence community should be working to alter their skills and tactics in a fast-evolving technological world so that they are not so dependent on information that will increasingly be protected by encryption.
Paul Merrell

George Galloway badly injured in street attack | Politics | The Guardian - 0 views

  • Respect MP George Galloway was taken to hospital with a suspected broken jaw on Friday night after being attacked in the street.Police arrested a British man over the incident, which is believed to have been prompted by comments Galloway has made about Israel in past weeks.The 60-year-old was posing for pictures in Notting Hill, London, on Friday evening when a man lashed out at him, his spokesman said. Galloway gave a statement to police after a man aged 39 was arrested."George was posing for pictures with people and this guy just attacked him, leapt on him and started punching him," his spokesman said."It appears to be connected with his comments about Israel because the guy was shouting about the Holocaust. George is badly bruised but OK. He has bruising to his head and face and is in pretty bad shape."
  • Last week, the MP was interviewed by police under caution after he was accused of inciting racial hatred by declaring his constituency, Bradford West, an "Israel-free zone".In a speech he gave in Leeds on 2 August he said: "We don't want any Israeli goods; we don't want any Israeli services; we don't want any Israeli academics coming to the university or the college; we don't even want any Israeli tourists to come to Bradford, even if any of them had thought of doing so."Galloway called the police investigation into him a "monumental – and monumentally expensive – waste of police time".
  • In 2008, Galloway was injured after a man threw a rubber stress ball at his head while he was campaigning. A 32-year-old man was cautioned by police over that incident.
  •  
    Zionists are getting a bit touchy these days about Israel being subject to a rapidly growing global Boycott, Sanctions, and Divestment ("BSD") movement. Galloway is a UK leader in that movement and a well-spoken critic of Israel's treatment of Palestinians.
Paul Merrell

Perfect Timing? ISIS Re-Tweets Threats Against Police | nsnbc international - 0 views

  • The New York City Police Department (NYPD) has reportedly put their officers on high alert after a video attributed to the Islamic State of Syria and Iraq (ISIS) was tweeted on social media threatening law enforcement in the US, France, Australia, and Canada. This video posted by an alleged ISIS spokesperson, was followed by the message: “Strike their police, security, and intelligence members, as well as their treacherous agents.” Interestingly, the video tweeted was a “re-release [of] a September 2014 message”.
  • One mainstream media outlet claims to have “obtained” an instructional email from an unidentified member of the Sergeants Benevolent Association (SBA) stating: “If you are assigned to a fixed post, do not sit together in the RMP [police car]. At least one officer must stand outside the vehicle at all times. Pay attention to your surroundings. Officers must pay close attention to approaching vehicles . . . Pay close attention to people as they approach. Look for their hands.” At the time, the Federal Bureau of Investigations (FBI) and the Department of Homeland Security (DHS) published similar warnings to police departments in the US, warning that the message “is consistent with previous threats that ISIS and others, including al Qaeda, have issued.” In October of last year, former Secretary of State Hillary Clinton commented speaking at the Economic Club reiterating the US intelligence community’s cries about the Islamic State of Iraq and Syria (ISIS).
  • Clinton said: “It’s a serious threat because this is the best-funded, most professional, expansionist jihadist military force that we have ever seen. This is far more advanced and far richer than al-Qaeda ever was.”
  •  
    A caution that the article's author, Susanne Posel, is not into fact-checking and frequently dispenses incorrect information.
Paul Merrell

A Distorted Lens Justifying An Illegitimate Ukrainian Government - 0 views

  • Support it or oppose it, a coup d’état took place in Kiev after an EU-brokered agreement was signed by the Ukrainian government and the mainstream opposition on Feb. 21. The agreement called for power sharing between both sides through the formation of a national unity government and for an end to the opposition-led street protests in Kiev. President Viktor Yanukovych ordered the Ukrainian police and security forces to withdraw from their positions, and even earlier, he had made multiple concessions to the opposition leadership. Instead of keeping its end of the bargain, the Ukrainian mainstream opposition executed a coup through the use of violence by organized ultra-nationalist gangs, which some analysts have compared to stay-behinds or secretive militias that were created by NATO during the Cold War. These armed ultra-nationalist groups took over administrative bodies in Ukraine and fought until they managed to oust the Ukrainian government and opened the path for opposition leaders to take power on Feb. 25. The Ukrainian mainstream opposition used the EU-brokered agreement, which the Brussels-based European Commission deliberately refused to enforce, as a means of justifying the formation of a coup-imposed government.
  • In the absence of almost half the Ukrainian Verkhovna Rada, or Ukrainian Parliament, the opposition parties began to arbitrarily pass unconstitutional laws. They also unconstitutionally selected Oleksandr/Aleksandr Valentynovych Turchynov as the acting president of Ukraine before President Viktor Yanukovych was even impeached. Intimidation and violence were additionally used to secure the cooperation of any disagreeing parliamentarians or state officials in Kiev. Saying that the ultra-nationalists and fascists are marginal elements, the mainstream media networks in North America and the European Union have simply dismissed the armed ultra-nationalist groups involved in the coup that are presently integrated into the putsch regime running Kiev. The militant ultra-nationalists, however, are very influential and amassing power under the illegal premiership of Arseniy Yatsenyuk.  Yatsenyuk, himself, is from Yulia Tymoshenko’s notoriously corrupt All-Ukrainian Union Fatherland Party (Batkivshchyna) and essentially a U.S. and EU appointee. There is even a pre-coup leaked telephone interception, likely either recorded by the intelligence services of Russia or Ukraine, in which U.S. Assistant Secretary of State Victory Nuland says that Yatsenyuk will be appointed as the prime minister of the Ukrainian government that the U.S. is putting together.
  • It is unlikely that Yatsenyuk and the loosely-knit alliance of the governing parties that ran Ukraine under the Yushchenko-Tymoshenko governments, foreign-based Ukrainians, and the forces behind the Orange Revolution that form the Orangist camp which he belongs to could have gotten back into power in Ukraine without pressure, the use of force and foreign backing. Yatsenyuk was even threatened and booed by the Ukrainians gathered at Independence Square when it was announced that he would be appointed as the prime minister of the post-coup government. A vast segment of the protesters made it clear that Tymoshenko, Yatsenyuk’s party leader, was no alternative to the ousted President Viktor Yanukovych in their eyes, either, when it was announced that she wanted to run for prime minister. The Orangists do not have the support of a majority of the population, nor did they form the parliamentary majority in the Verkhovna Rada. Their Orangist president, Viktor Yushchenko, only got 5 percent of the vote in January 2010, in a show of no-confidence, whereas Viktor Yanukovych won the first and second rounds of the presidential elections in 2010. According to Victoria Nuland, the U.S. has also poured $5 billion into “democracy promotion” inside Ukraine. This is U.S. State Department doublespeak for politicized funding that Washington has sent to Ukraine to organize the Orange Revolution and its Euromaidan sequel or what can frankly be described as regime change.
  • ...10 more annotations...
  • To rule Ukraine once more, the Orangists and their foreign backers have used and manipulated the ultra-nationalist elements of the population — some of which are openly anti-European Union — as their foot soldiers in an application of force against their democratically-elected opponents. Despite their views, the ultra-nationalists are actually more honest than the Orangist liberal figures like Arseniy Yatsenyuk. Unlike the misleading and utterly corrupt Orangist leaders, the ultra-nationalists do not hide their agendas and platforms.
  • The ultra-nationalists have inconsolably anti-Russian attitudes. Many of them also dislike a vast spectrum of other groups, including Jews, Armenians, Roma, Poles, Tatars, supporters of the Party of Regions and communists. In this context, it should come as no surprise that one of the first decisions that the post-coup regime in Kiev made was to remove the legal status of the Russian language as the regional language of half of Ukraine. Right Sector is, itself, a coalition of militant ultra-nationalists. These militants were instrumental in fighting government forces and taking over both government buildings in Kiev and regional governments in the western portion of Ukraine. Despite the protests of First Deputy Defense Minister Oleynik, Deputy Defense Minister Mozharovskiy and Defense Minister Babenk, Arseniy Yatsenyuk’s post-coup government has even given the ultra-nationalist opposition militias official status within the Ukrainian military and security forces. Yatsenyuk and the Orangists also dismissed all the officials that protested that the move would fracture the country and make the political divide in Ukraine irreversible.
  • Several members of Svoboda have been given key cabinet and government posts. One of the two junior deputy prime ministers, or assistant deputy prime ministers, is Oleksandr Sych. The ministry of agriculture and food has been given for management to Ihor Shvaika. The environment and natural resources ministry has been assigned to Andry/Andriy Mokhnyk. The defense minister is Ihor Tenyukh, a former admiral in the Ukrainian Navy who obstructed Russian naval movements in Sevastopol during the Russo-Georgian War over South Ossetia and who was later dismissed by the Ukrainian government for insubordination. Oleh Makhnitsky, another member of Svoboda, has been assigned as the new prosecutor-general of Ukraine by the coup government. Andry Parubiy, one of the founders of Svoboda, is now the post-coup secretary of the National Security and Defense Council of Ukraine (RNBO). He was the man controlling the so-called “Euromaidan security forces” that fought government forces in Kiev. His job as secretary is to represent the president and act on his behalf in coordinating and implementing the RNBO’s decisions. As a figure, Parubiy clearly illustrates how the mainstream opposition in Ukraine is integrated with the ultra-nationalists. Parubiy is an Orangist and was a leader in the Orange Revolution. He has changed parties several times. After founding Svoboda, he joined Viktor Yushchenko’s Our Ukraine before joining Yulia Tymoshenko’s Fatherland Party and being elected as one of the Fatherland Party’s deputies, or members of parliament.
  • While the mainstream media in North America and the EU look the other way about the ultra-nationalists in the coup government in Kiev, the facts speak for themselves. Both the EU and the U.S. governments have rubbed their elbows with the ultra-nationalists. Oleh Tyahnybok, the leader of Svoboda (formerly the Social Nationalist Party of Ukraine), was even part of the opposition triumvirate that all the U.S. and EU officials visiting Kiev met with while performing their political pilgrimages to Ukraine to encourage the protesters to continue with their demonstrations and riots demanding Euro-Atlantic integration. Svoboda has popularly been described as a neo-Nazi grouping. The World Jewish Congress has demanded that Svoboda be banned. The ultra-nationalist party was even condemned by the EU’s own European Parliament, which passed a motion on Dec. 13, 2012 categorically condemning Svoboda.
  • The ultra-nationalists are such an integral part of the mainstream opposition that the U.S.-supported Orangist president of Ukraine, Viktor Yushchenko, posthumously awarded the infamous Nazi collaborator Stepan Bandera the title and decoration of the “Hero of Ukraine” in 2010. Foreign audiences, however, would not know that if they relied on reportage from the likes of the U.S. state-run Radio Free Europe, which tried to protect Yushchenko because he wanted to reorient Ukraine toward the U.S. and EU. Parubiy also lobbied the European Parliament not to oppose Yushchenko’s decision. Other smaller ultra-nationalists parties were also given government posts, and several of the independent cabinet members are also aligned to these parties. Dmytro Yarosh from Right Sector (Pravyi Sektor) is the deputy secretary of the RNBO, and the Trizub Party was given the education ministry. Trizub had Sergey Kvit appointed to the post of education minister.
  • The role of the ultra-nationalists in executing the coup has been essentially ignored by the mainstream media in North America and the EU. The roots of the bloodshed in Kiev have been ignored, too. The shootings of protesters by snipers have simply been presented as the vile actions of the Ukrainian government, never taking into consideration the agitation of the armed ultra-nationalist gangs and the mainstream opposition leaders for a conflict. According to a leaked telephone conversation on Feb. 26 between Estonian Foreign Minister Urmas Paet and European Union Commissionaire Catherine Ashton, which was leaked by the Security Service of Ukraine (SBU) , the snipers who shot at protesters and police in Kiev were allegedly hired by Ukrainian opposition leaders. Estonian Foreign Minister Paet made the statements on the basis of details he was given by one of the head doctors of the medical team of the anti-government protests, Olga Bogomolets, an opponent of Viktor Yanukovych’s government who wanted it removed from power. Paet tells Ashton the following first: “There is now stronger and stronger understanding that behind the snipers, it was not Yanukovych, but it was somebody from the new coalition.” This is also corroborated by the fact that Yanukovych actually had ordered the Ukrainian riot police and security forces not to use lethal force.
  • The Estonian official then mentions that it was verified to him that the same snipers were killing people on both sides. He tells Ashton the following: “And second, what was quite disturbing, this same Olga [Bogomolets] told as well that all the evidence shows that the people who were killed by snipers from both sides, among policemen and then people from the streets, that they were the same snipers killing people from both sides.” Another important point that Paet makes to Ashton is the following: “[Dr. Olga Bogomolets] then also showed me some photos she said that as a medical doctor she can say that it is the same handwriting, the same type of bullets, and it’s really disturbing that now the new coalition, that they don’t want to investigate what exactly happened.” Past reports that the mainstream media were hostile to the ousted Ukrainian government also raise serious questions that corroborate what has been said about the snipers intentionally killing protesters to instigate regime change.
  • The Telegraph reported on Feb. 20 that “[a]t least three of the bodies displayed single bullet wounds to the heads,” and “were shot in the head, the neck or the heart. None were shot anywhere else like in the legs.” This means that the snipers were making kill shots by design, which seems like the last thing that the Ukrainian government would want to do when it was trying to appease the protesters and bring calm to Kiev. The Ukrainian journalist Alexey Yaroshevsky’s account of the sniper shootings is also worth noting, and it is backed up by footage taken by his Russian crew in Kiev.  Their footage shows armed opposition members running away from the scene of the shooting of anti-government protesters. What comes across as unusual is that the armed members of the opposition were constantly agitating to start firefights at every opportunity that they could get.
  • The commandant of the SSU, Major-General Oleksandr Yakimenko, has testified that his counter-intelligence forces were monitoring the CIA in Ukraine during the protests. According to the SSU, the CIA was active on the ground in Kiev and collaborating with a small circle of opposition figures. Yakimenko has also said that it was not the police or government forces that fired on the protesters, but snipers from the Philharmonic Building that was controlled by the opposition leader Andriy Parubiy, which he asserts was interacting with the CIA. Speaking to the Russian media, Yakimenko said that 20 men wearing “special combat clothes” and carrying “sniper rifle cases, as well as AKMs with scopes” ran out of the opposition-controlled Philharmonic Building and split into two groups of 10 people, with one taking position at the Ukraine Hotel. The anti-government protesters even saw this and asked Ukrainian police to pursue them, and even figures from Right Sector and Svoboda asked Yakimenko’s SSU to investigate and apprehend them, but Parubiy prevented it. Major-General Yakimenko has categorically stated that opposition leaders were behind the shootings. Following the release of the conversation between Paet and Ashton, the Estonian Foreign Ministry confirmed that the leak was authentic, whereas the European Commission kept silent. The mainstream media in North America and the EU either ignored it or said very little. The Telegraph even claimed that Dr. Bogomolets told it that she had not treated any government forces even though she contradicts this directly in an interview with CNN where says she treated military personnel.
  • CNN, on the other hand, quickly glossed over the story, giving it only enough attention to create the impression that the network is fairly covering the news. Opting not to give the story the airtime that it deserved, CNN instead posted it on its webpage. The conversation is immediately discredited, undermined and dismissed in the first sentence of the article, which is attributed to Foreign Minister Paet: “Don’t read too much into the conversation.” The article was deliberately structured by CNN to undermine the important information that would challenge the narrative that the U.S. mainstream media have been painting. The title, sub-titles and opening sentences of most texts act as microcosms or summaries of the articles, and in many cases, readers evaluate or decide to read the articles on the basis of what these texts communicate. Moreover, the first sentence of the article sets the tempo for readers and and influences their opinion, too. Although anyone who listens to the conversation between Paet and Ashton and considers the evidence that is being discussed would realize just how important the news was, the message being set forth by CNN was a dismissive one.
Paul Merrell

'Billionaire gave Netanyahus cigars, champagne worth hundreds of thousands' | The Times... - 0 views

  • corruption investigation into Prime Minister Benjamin Netanyahu is reportedly addressing suspicions the premier and his wife illicitly accepted cigars worth hundreds of thousands of shekels and champagne from a Hollywood billionaire.
  • Channel 2 news reported Thursday evening that Netanyahu received the cigars from acclaimed American-Israeli producer Arnon Milchan over the last seven-eight years. His wife, Sara, received bottles of pink champagne worth hundreds of shekels apiece during that period, the TV report said.
  • Netanyahu is known as a connoisseur of fine cigars, and Channel 2 noted rumors the prime minister smokes tens of thousands of shekels’ worth of them each month. Police questioned Netanyahu under caution for a second time Thursday, in a five-hour-long session at his Jerusalem residence that lasted late into the evening, about suspicions he accepted gifts from foreign businessmen. Police announced afterward that they had also interrogated another, unnamed suspect in the case earlier in the week. Some reports said this second suspect was Milchan. Police had interviewed the prime minister on Monday for three hours, during which Netanyahu admitted that he had received gifts from businessmen, but insisted they were entirely legal exchanges, his lawyer said.
  • ...2 more annotations...
  • Attorney Yaakov Weinroth told Channel 2 news Tuesday that the two businessmen in question were old friends of the prime minister, and the gifts being looked into were “the smallest of trifles.” He alleged that unnamed rivals of the prime minister were lodging false complaints against him, citing as evidence the closing of four other probes into alleged financial improprieties by the prime minister. Sources close to Netanyahu have pointed out that Milchan — whose films include “Fight Club” and “Pretty Woman” — sits on the board of Channel 10, which the prime minister has previously tried to shutter. Channel 10 is also partially owned by US billionaire and World Jewish Congress president Ronald Lauder, who has also been questioned by police in connection with the case. Lauder, whose family founded the Estee Lauder cosmetics giant, has long been seen as an ally of Netanyahu.
  • Netanyahu has also acknowledged receiving money from French tycoon Arnaud Mimran, who was sentenced to eight years in prison in France over a scam involving the trade of carbon emissions permits and taxes on them. The Prime Minister’s Office said Netanyahu received $40,000 in contributions from Mimran in 2001, when he was not in office, as part of a fund for public activities, including appearances abroad to promote Israel. Netanyahu has denied any wrongdoing, saying repeatedly that “there will be nothing because there is nothing.”
Paul Merrell

Edward Snowden: NSA whistleblower answers reader questions | World news | guardian.co.uk - 0 views

  • The 29-year-old former NSA contractor and source of the Guardian's NSA files coverage will – with the help of Glenn Greenwald – take your questions today on why he revealed the NSA's top-secret surveillance of US citizens, the international storm that has ensued, and the uncertain future he now faces. Ask him anything.
  • I did not reveal any US operations against legitimate military targets. I pointed out where the NSA has hacked civilian infrastructure such as universities, hospitals, and private businesses because it is dangerous. These nakedly, aggressively criminal acts are wrong no matter the target. Not only that, when NSA makes a technical mistake during an exploitation operation, critical systems crash. Congress hasn't declared war on the countries - the majority of them are our allies - but without asking for public permission, NSA is running network operations against them that affect millions of innocent people. And for what? So we can have secret access to a computer in a country we're not even fighting? So we can potentially reveal a potential terrorist with the potential to kill fewer Americans than our own Police? No, the public needs to know the kinds of things a government does in its name, or the "consent of the governed" is meaningless.
  • I was debriefed by Glenn and his peers over a number of days, and not all of those conversations were recorded. The statement I made about earnings was that $200,000 was my "career high" salary. I had to take pay cuts in the course of pursuing specific work. Booz was not the most I've been paid.
  • ...17 more annotations...
  • 1) More detail on how direct NSA's accesses are is coming, but in general, the reality is this: if an NSA, FBI, CIA, DIA, etc analyst has access to query raw SIGINT databases, they can enter and get results for anything they want. Phone number, email, user id, cell phone handset id (IMEI), and so on - it's all the same. The restrictions against this are policy based, not technically based, and can change at any time. Additionally, audits are cursory, incomplete, and easily fooled by fake justifications. For at least GCHQ, the number of audited queries is only 5% of those performed.
  • Obama's campaign promises and election gave me faith that he would lead us toward fixing the problems he outlined in his quest for votes. Many Americans felt similarly. Unfortunately, shortly after assuming power, he closed the door on investigating systemic violations of law, deepened and expanded several abusive programs, and refused to spend the political capital to end the kind of human rights violations like we see in Guantanamo, where men still sit without charge.
  • All I can say right now is the US Government is not going to be able to cover this up by jailing or murdering me. Truth is coming, and it cannot be stopped
  • NSA likes to use "domestic" as a weasel word here for a number of reasons. The reality is that due to the FISA Amendments Act and its section 702 authorities, Americans’ communications are collected and viewed on a daily basis on the certification of an analyst rather than a warrant. They excuse this as "incidental" collection, but at the end of the day, someone at NSA still has the content of your communications. Even in the event of "warranted" intercept, it's important to understand the intelligence community doesn't always deal with what you would consider a "real" warrant like a Police department would have to, the "warrant" is more of a templated form they fill out and send to a reliable judge with a rubber stamp.
  • Glenn Greenwald follow up: When you say "someone at NSA still has the content of your communications" - what do you mean? Do you mean they have a record of it, or the actual content? Both. If I target for example an email address, for example under FAA 702, and that email address sent something to you, Joe America, the analyst gets it. All of it. IPs, raw data, content, headers, attachments, everything. And it gets saved for a very long time - and can be extended further with waivers rather than warrants.
  • What are your thoughts on Google's and Facebook's denials? Do you think that they're honestly in the dark about PRISM, or do you think they're compelled to lie? Perhaps this is a better question to a lawyer like Greenwald, but: If you're presented with a secret order that you're forbidding to reveal the existence of, what will they actually do if you simply refuse to comply (without revealing the order)? Answer: Their denials went through several revisions as it become more and more clear they were misleading and included identical, specific language across companies. As a result of these disclosures and the clout of these companies, we're finally beginning to see more transparency and better details about these programs for the first time since their inception. They are legally compelled to comply and maintain their silence in regard to specifics of the program, but that does not comply them from ethical obligation. If for example Facebook, Google, Microsoft, and Apple refused to provide this cooperation with the Intelligence Community, what do you think the government would do? Shut them down?
  • Some skepticism exists about certain of your claims, including this: I, sitting at my desk, certainly had the authorities to wiretap anyone, from you, or your accountant, to a federal judge, to even the President if I had a personal email. Do you stand by that, and if so, could you elaborate? Answer: Yes, I stand by it. US Persons do enjoy limited policy protections (and again, it's important to understand that policy protection is no protection - policy is a one-way ratchet that only loosens) and one very weak technical protection - a near-the-front-end filter at our ingestion points. The filter is constantly out of date, is set at what is euphemistically referred to as the "widest allowable aperture," and can be stripped out at any time. Even with the filter, US comms get ingested, and even more so as soon as they leave the border. Your protected communications shouldn't stop being protected communications just because of the IP they're tagged with. More fundamentally, the "US Persons" protection in general is a distraction from the power and danger of this system. Suspicionless surveillance does not become okay simply because it's only victimizing 95% of the world instead of 100%. Our founders did not write that "We hold these Truths to be self-evident, that all US Persons are created equal."
  • Edward, there is rampant speculation, outpacing facts, that you have or will provide classified US information to the Chinese or other governments in exchange for asylum. Have/will you? Answer: This is a predictable smear that I anticipated before going public, as the US media has a knee-jerk "RED CHINA!" reaction to anything involving HK or the PRC, and is intended to distract from the issue of US government misconduct. Ask yourself: if I were a Chinese spy, why wouldn't I have flown directly into Beijing? I could be living in a palace petting a phoenix by now.
  • US officials say this every time there's a public discussion that could limit their authority. US officials also provide misleading or directly false assertions about the value of these programs, as they did just recently with the Zazi case, which court documents clearly show was not unveiled by PRISM. Journalists should ask a specific question: since these programs began operation shortly after September 11th, how many terrorist attacks were prevented SOLELY by information derived from this suspicionless surveillance that could not be gained via any other source? Then ask how many individual communications were ingested to acheive that, and ask yourself if it was worth it. Bathtub falls and police officers kill more Americans than terrorism, yet we've been asked to sacrifice our most sacred rights for fear of falling victim to it. Further, it's important to bear in mind I'm being called a traitor by men like former Vice President Dick Cheney. This is a man who gave us the warrantless wiretapping scheme as a kind of atrocity warm-up on the way to deceitfully engineering a conflict that has killed over 4,400 and maimed nearly 32,000 Americans, as well as leaving over 100,000 Iraqis dead. Being called a traitor by Dick Cheney is the highest honor you can give an American, and the more panicked talk we hear from people like him, Feinstein, and King, the better off we all are. If they had taught a class on how to be the kind of citizen Dick Cheney worries about, I would have finished high school.
  • Is encrypting my email any good at defeating the NSA survelielance? Id my data protected by standard encryption? Answer: Encryption works. Properly implemented strong crypto systems are one of the few things that you can rely on. Unfortunately, endpoint security is so terrifically weak that NSA can frequently find ways around it. 
  • Binney, Drake, Kiriakou, and Manning are all examples of how overly-harsh responses to public-interest whistle-blowing only escalate the scale, scope, and skill involved in future disclosures. Citizens with a conscience are not going to ignore wrong-doing simply because they'll be destroyed for it: the conscience forbids it. Instead, these draconian responses simply build better whistleblowers. If the Obama administration responds with an even harsher hand against me, they can be assured that they'll soon find themselves facing an equally harsh public response. This disclosure provides Obama an opportunity to appeal for a return to sanity, constitutional policy, and the rule of law rather than men. He still has plenty of time to go down in history as the President who looked into the abyss and stepped back, rather than leaping forward into it. I would advise he personally call for a special committee to review these interception programs, repudiate the dangerous "State Secrets" privilege, and, upon preparing to leave office, begin a tradition for all Presidents forthwith to demonstrate their respect for the law by appointing a special investigator to review the policies of their years in office for any wrongdoing. There can be no faith in government if our highest offices are excused from scrutiny - they should be setting the example of transparency. 
  • What would you say to others who are in a position to leak classified information that could improve public understanding of the intelligence apparatus of the USA and its effect on civil liberties?
  • This country is worth dying for.
  • My question: given the enormity of what you are facing now in terms of repercussions, can you describe the exact moment when you knew you absolutely were going to do this, no matter the fallout, and what it now feels like to be living in a post-revelation world? Or was it a series of moments that culminated in action? I think it might help other people contemplating becoming whistleblowers if they knew what the ah-ha moment was like. Again, thanks for your courage and heroism. Answer: I imagine everyone's experience is different, but for me, there was no single moment. It was seeing a continuing litany of lies from senior officials to Congress - and therefore the American people - and the realization that that Congress, specifically the Gang of Eight, wholly supported the lies that compelled me to act. Seeing someone in the position of James Clapper - the Director of National Intelligence - baldly lying to the public without repercussion is the evidence of a subverted democracy. The consent of the governed is not consent if it is not informed.
  • Regarding whether you have secretly given classified information to the Chinese government, some are saying you didn't answer clearly - can you give a flat no? Answer: No. I have had no contact with the Chinese government. Just like with the Guardian and the Washington Post, I only work with journalists.
  • So far are things going the way you thought they would regarding a public debate? – tikkamasala Answer: Initially I was very encouraged. Unfortunately, the mainstream media now seems far more interested in what I said when I was 17 or what my girlfriend looks like rather than, say, the largest program of suspicionless surveillance in human history.
  • Thanks to everyone for their support, and remember that just because you are not the target of a surveillance program does not make it okay. The US Person / foreigner distinction is not a reasonable substitute for individualized suspicion, and is only applied to improve support for the program. This is the precise reason that NSA provides Congress with a special immunity to its surveillance.
  •  
    I particularly liked this Snowden observation as an idea for a constitutional amendment: "This disclosure provides Obama an opportunity to appeal for a return to sanity, constitutional policy, and the rule of law rather than men. He still has plenty of time to go down in history as the President who looked into the abyss and stepped back, rather than leaping forward into it. I would advise he personally call for a special committee to review these interception programs, repudiate the dangerous "State Secrets" privilege, and, upon preparing to leave office, begin a tradition for all Presidents forthwith to demonstrate their respect for the law by appointing a special investigator to review the policies of their years in office for any wrongdoing. There can be no faith in government if our highest offices are excused from scrutiny - they should be setting the example of transparency. " Repeal of the State Secrets privilege would require a constitutional amendment because the Supreme Court decided back when that it is inherent in the President's power as commander in chief of the military forces. In other words, neither Congress nor the courts can second-guess such claims, a huge contributing factor in the over-classification of government records when the real reason is to protect bureaucrats from embarrassment, civil rights suits, and criminal prosecution. It is no accident that we have an Executive Branch that is out-of-control, waging dictatorial powers under the protection of the State Secrets privilege. 
Paul Merrell

Flautre accuses Erdoğan with being 'irresponsible' in corruption scandal - To... - 0 views

  • Hélène Flautre, the co-chairwoman of the EU-Turkey Joint Parliamentary Committee, released a statement on Saturday in which she criticized Turkish Prime Minister Recep Tayyip Erdoğan with being “irresponsible” for accusing those who investigate the recent corruption probe. "I observe the recent developments in Turkey with extreme vigilance, which greatly affect the credit of Prime Minister. In his statements, he accuses those who investigating the probe rather than require light on serious allegations of corruption involving his family is irresponsible. Allegations are certainly not findings, and justice must now continue its work in serenity and independence,” Flautre said. Flautre's statement came after the Council of State's decision on Friday to cancel the Erdoğan government's executive order requiring police and prosecutors to notify their superiors of all investigations, effectively giving the government advance warning of what should be secret investigations.
  • “This is a serious political crisis and the European Union must stand firmly on the side of the defense of the rule of law, avoiding any exploitation of the situation,” her statement added. After the cancellation of the order by the Council of State on Friday, Erdoğan said he would prosecute Turkey's top judicial body if he had the authority because it “committed a crime.” Erdoğan claimed the Supreme Board of Judges and Prosecutors (HSYK) has committed a crime by issuing a statement about a judicial police regulation while it was being assessed at the Council of State. On Thursday, the HSYK has harshly criticized the new judicial police regulation, saying that it is in violation of the Turkish Constitution. The Erdoğan government's interference into and pressure on the judiciary was met with a huge backlash from opposition parties, bar associations, advocacy groups and the media. It has raised concerns of an attempted government cover-up of the corruption probe that has implicated prominent people in the business community and government.
Paul Merrell

FBI says search warrants not needed to use "stingrays" in public places | Ars Technica - 0 views

  • The Federal Bureau of Investigation is taking the position that court warrants are not required when deploying cell-site simulators in public places. Nicknamed "stingrays," the devices are decoy cell towers that capture locations and identities of mobile phone users and can intercept calls and texts. The FBI made its position known during private briefings with staff members of Senate Judiciary Committee Chairman Patrick Leahy (D-Vt.) and Sen. Chuck Grassley (R-Iowa). In response, the two lawmakers wrote Attorney General Eric Holder and Homeland Security chief Jeh Johnson, maintaining they were "concerned about whether the FBI and other law enforcement agencies have adequately considered the privacy interests" of Americans. According to the letter, which was released last week: For example, we understand that the FBI’s new policy requires FBI agents to obtain a search warrant whenever a cell-site simulator is used as part of a FBI investigation or operation, unless one of several exceptions apply, including (among others): (1) cases that pose an imminent danger to public safety, (2) cases that involve a fugitive, or (3) cases in which the technology is used in public places or other locations at which the FBI deems there is no reasonable expectation of privacy.
  • The letter was prompted in part by a Wall Street Journal report in November that said the Justice Department was deploying small airplanes equipped with cell-site simulators that enabled "investigators to scoop data from tens of thousands of cellphones in a single flight, collecting their identifying information and general location." The bureau's position on Americans' privacy isn't surprising. The Obama Administration has repeatedly maintained that the public has no privacy in public places. It began making that argument as early as 2010, when it told a federal appeals court that the authorities should be allowed to affix GPS devices on vehicles and track a suspect's every move without court authorization. The Supreme Court, however, eventually ruled that warrants are required. What's more, the administration has argued that placing a webcam with pan-and-zoom capabilities on a utility pole to spy on a suspect at his or her residence was no different from a police officer's observation from the public right-of-way. A federal judge last month disagreed with the government's position, tossing evidence gathered by the webcam that was operated from afar.
  • In their letter, Leahy and Grassley complained that little is known about how stingrays, also known as ISMI catchers, are used by law enforcement agencies. The Harris Corp., a maker of the devices from Florida, includes non-disclosure clauses with buyers. Baltimore authorities cited a non-disclosure agreement to a judge in November as their grounds for refusing to say how they tracked a suspect's mobile phone. They eventually dropped charges rather than disclose their techniques. Further, sometimes the authorities simply lie to judges about their use or undertake other underhanded methods to prevent the public from knowing that the cell-site simulators are being used.
  • ...1 more annotation...
  • Hanni Fakhoury, an attorney for the Electronic Frontier Foundation, said some states and judges are pushing back against stingrays. "In Tacoma, judges now require police (to) specifically note they plan to use an IMSI catcher and promise not to store data collected from people who are not investigation targets," he said. "The Florida and Massachusetts state supreme courts ruled warrants were necessary for real-time cell phone tracking. Nine states—Colorado, Illinois, Indiana, Maryland, Minnesota, Tennessee, Utah, Virginia, and Wisconsin—passed laws specifically requiring police to use a warrant to track a cell phone in real time."
  •  
    Is there any problem here that couldn't be cured by discharge and public flogging for any government official caught using information derived from a stingray?
Paul Merrell

Israeli Attorney General Opens Inquiry Into Netanyahu Amid Police Investigation - Israe... - 0 views

  • Attorney General Avichai Mendelblit has instructed that an investigation related to Prime Minister Benjamin Netanyahu be opened, his office said on Sunday.
  • On Friday, Israeli media reported that the latest police investigation into Netanyahu's affairs involves suspicions of money laundering on a wide-scale. The suspicion pertains to the alleged transfer of "large sums" to either Netanyahu or one of his family members and is not linked to campaign or political funding, Channel 2's senior diplomatic correspondent Amnon Abramovich said. Israel's Channel 2 reported Saturday the investigation focuses on funds allegedly received by a Netanyahu family member. The report said the alleged funds were not used for political purposes.
Paul Merrell

Israeli Attorney General Opens Inquiry Into Netanyahu Amid Police Investigation - Israe... - 0 views

  • Attorney General Avichai Mendelblit has instructed that an investigation related to Prime Minister Benjamin Netanyahu be opened, his office said on Sunday.
  • On Friday, Israeli media reported that the latest police investigation into Netanyahu's affairs involves suspicions of money laundering on a wide-scale. The suspicion pertains to the alleged transfer of "large sums" to either Netanyahu or one of his family members and is not linked to campaign or political funding, Channel 2's senior diplomatic correspondent Amnon Abramovich said. Israel's Channel 2 reported Saturday the investigation focuses on funds allegedly received by a Netanyahu family member. The report said the alleged funds were not used for political purposes.
Paul Merrell

The Latest US and World News - USATODAY.com - 0 views

  • The U.S. government started keeping secret records of Americans' international telephone calls nearly a decade before the Sept. 11 terrorist attacks, harvesting billions of calls in a program that provided a blueprint for the far broader National Security Agency surveillance that followed.For more than two decades, the Justice Department and the Drug Enforcement Administration amassed logs of virtually all telephone calls from the USA to as many as 116 countries linked to drug trafficking, current and former officials involved with the operation said. The targeted countries changed over time but included Canada, Mexico and most of Central and South America.Federal investigators used the call records to track drug cartels' distribution networks in the USA, allowing agents to detect previously unknown trafficking rings and money handlers. They also used the records to help rule out foreign ties to the bombing in 1995 of a federal building in Oklahoma City and to identify U.S. suspects in a wide range of other investigations.The Justice Department revealed in January that the DEA had collected data about calls to "designated foreign countries." But the history and vast scale of that operation have not been disclosed until now.
  • The now-discontinued operation, carried out by the DEA's intelligence arm, was the government's first known effort to gather data on Americans in bulk, sweeping up records of telephone calls made by millions of U.S. citizens regardless of whether they were suspected of a crime. It was a model for the massive phone surveillance system the NSA launched to identify terrorists after the Sept. 11 attacks. That dragnet drew sharp criticism that the government had intruded too deeply into Americans' privacy after former NSA contractor Edward Snowden leaked it to the news media two years ago.More than a dozen current and former law enforcement and intelligence officials described the details of the Justice Department operation to USA TODAY. Most did so on the condition of anonymity because they were not authorized to publicly discuss the intelligence program, part of which remains classified.The DEA program did not intercept the content of Americans' calls, but the records — which numbers were dialed and when — allowed agents to map suspects' communications and link them to troves of other police and intelligence data. At first, the drug agency did so with help from military computers and intelligence analysts
  • The extent of that surveillance alarmed privacy advocates, who questioned its legality. "This was aimed squarely at Americans," said Mark Rumold, an attorney with the Electronic Frontier Foundation. "That's very significant from a constitutional perspective."Holder halted the data collection in September 2013 amid the fallout from Snowden's revelations about other surveillance programs. In its place, current and former officials said the drug agency sends telecom companies daily subpoenas for international calling records involving only phone numbers that agents suspect are linked to the drug trade or other crimes — sometimes a thousand or more numbers a day.Tuesday, Justice Department spokesman Patrick Rodenbush said the DEA "is no longer collecting bulk telephony metadata from U.S. service providers." A DEA spokesman declined to comment.
  • ...6 more annotations...
  • The system they built ultimately allowed the drug agency to stitch together huge collections of data to map trafficking and money laundering networks both overseas and within the USA. It allowed agents to link the call records its agents gathered domestically with calling data the DEA and intelligence agencies had acquired outside the USA. (In some cases, officials said the DEA paid employees of foreign telecom firms for copies of call logs and subscriber lists.) And it eventually allowed agents to cross-reference all of that against investigative reports from the DEA, FBI and Customs Service.
  • The result "produced major international investigations that allowed us to take some big people," Constantine said, though he said he could not identify particular cases.
  • In 1992, in the last months of Bush's administration, Attorney General William Barr and his chief criminal prosecutor, Robert Mueller, gave the DEA permission to collect a much larger set of phone data to feed into that intelligence operation.Instead of simply asking phone companies for records about calls made by people suspected of drug crimes, the Justice Department began ordering telephone companies to turn over lists of all phone calls from the USA to countries where the government determined drug traffickers operated, current and former officials said
  • The DEA obtained those records using administrative subpoenas that allow the agency to collect records "relevant or material to" federal drug investigations. Officials acknowledged it was an expansive interpretation of that authority but one that was not likely to be challenged because unlike search warrants, DEA subpoenas do not require a judge's approval. "We knew we were stretching the definition," a former official involved in the process said.Officials said a few telephone companies were reluctant to provide so much information, but none challenged the subpoenas in court. Those that hesitated received letters from the Justice Department urging them to comply.
  • A spokesman for AT&T declined to comment. Sprint spokeswoman Stephanie Vinge Walsh said only that "we do comply with all state and federal laws regarding law enforcement subpoenas."Agents said that when the data collection began, they sought to limit its use mainly to drug investigations and turned away requests for access from the FBI and the NSA. They allowed searches of the data in terrorism cases, including the bombing of a federal building in Oklahoma City that killed 168 people in 1995, helping to rule out theories linking the attack to foreign terrorists. They allowed even broader use after Sept. 11, 2001. The DEA's public disclosure of its program in January came in the case of a man charged with violating U.S. export restrictions by trying to send electrical equipment to Iran.At first, officials said the DEA gathered records only of calls to a handful of countries, focusing on Colombian drug cartels and their supply lines. Its reach grew quickly, and by the late 1990s, the DEA was logging "a massive number of calls," said a former intelligence official who supervised the program.
  • At its peak, the operation gathered data on calls to 116 countries, an official involved in reviewing the list said. Two other officials said they did not recall the precise number of countries, but it was more than 100. That gave the collection a considerable sweep; the U.S. government recognizes a total of 195 countries.
Paul Merrell

Baltimore Police Have Been Secretly Spying On Entire City From The Air - 0 views

  • Baltimore Police didn’t bother to inform the public (or anyone, for that matter) when they implemented a privately-funded mass surveillance program in January using a wide-angle camera-equipped plane flying above the city — which instantly uploaded and stored everything it recorded, just in case they needed it later. As Bloomberg’s Monte Reel reports, a small Cessna plane equipped with “a sophisticated array of cameras” capable of capturing “an area of roughly 30 square miles,” funded by an a private donor and provided by Dayton, Ohio-based Persistent Surveillance Systems, sometimes circled above the city for up to 10 hours per day recording and storing everything without anyone being privy to its presence. Since January, Reel noted, the Baltimore Police Department has been using this covert Big Brother’s eye-in-the-sky “to investigate all sorts of crimes, from property thefts to shootings.” Gone, apparently, are the days when the government’s surveillance state drew ire for attempting to ferret out potential terrorists — residents of Baltimore have been guinea pigs for an altogether more insidious spy dragnet. Persistent Surveillance Systems’ technology automatically stores all the footage on massive hard drives, making it available to law enforcement long afterward — but the idea police could access this information to solve a simple property crime is no less than alarming.
  • Particularly considering the company’s founder has an intense military background. Ross McNutt, Bloomberg reports, “is an Air Force Academy graduate, physicist, and MIT-trained astronautical engineer who in 2004 founded the Air Force’s Center for Rapid Product Development. The Pentagon asked him if he could develop something to figure out who was planting the roadside bombs that were killing and maiming American soldiers in Iraq. In 2006 he gave the military Angel Fire, a wide-area, live-feed surveillance system that could cast an unblinking eye on an entire city.” Though the technology had imperfections — even determining the gender of a person on the ground was impossible — its TiVo-like capabilities more than made up for any shortcomings. A person of interest could be followed by rewinding footage after, say, an IED exploded roadside, to track their movements — even if the cameras weren’t focused directly on the explosion at the moment it occurred. If the cameras were in the air at the time, anything that happened was fully trackable both back and forward in time. McNutt’s pitch for his technology concisely summarized, “Imagine Google Earth with TiVo capability.” Angel Fire truly evolved at the Los Alamos National Laboratory in New Mexico after 2007, when upgrades allowed for “all-weather and nighttime capabilities and then was used as the basis for another system, called Blue Devil, which coupled wide-area cameras with narrow-focus zoom lenses in the same package.”
  • Over time, after McNutt retired from the military, he worked to further improve the camera array and attended security conferences in hopes of garnering clients. After a brief but effective test run over the skies of Ciudad Juárez, Los Angeles became the first U.S. city to employ Persistent Surveillance’ system — and just as covertly as what has been taking place in Baltimore for the last eight months.
  • ...1 more annotation...
  • McNutt believes in the legitimacy of the services Persistent Surveillance can provide, and insists the technology isn’t as invasive as it might sound since individual identifying details, among other aspects, aren’t discernible, and because the every keystroke and action taken by analysts — like video footage — are logged and archived.
  •  
    Just imagine what it will be like when the bugs in the focal system are gone, which undoubtedly is a goal. Couple it with facial recognition and what do we have?
Gary Edwards

Jim Douglass: A Letter to the American People (and Myself in Particular) On the Unspeak... - 0 views

  • “But if they’re not [authentic], then you have something of a magnitude beyond common experience that would reflect so devastatingly on our society as a whole and its corruptibility that you don’t know how to deal with it.”[4]
  • Since I began researching the assassinations of Martin Luther King, Malcolm X, and John and Robert Kennedy, I have been shocked by the obvious signature that is written across all four of them. It is the signature of what President Eisenhower identified as the military-industrial complex of our government.[6] We can read that signature at once in Dallas in the identity of the scapegoat Lee Harvey Oswald.
  • When Lee Harvey Oswald was arrested in Dallas after the assassination, he was carrying a Department of Defense ID card that is routinely issued to U.S. intelligence agents abroad. The FBI later obliterated the card by “testing” it but writer Mary La Fontaine discovered a copy of it in l992 in a Dallas Police Department photo. Oswald had been a radar operator for the CIA’s U-2 spy plane while he was a Marine stationed at Atsugi Naval Air Station in Japan. The Atsugi base served as the CIA’s center for its Far East operations. His fellow Marines David Bucknell and James Botelho said that when Oswald “defected” to the Soviet Union, he did so under the direction of U.S. intelligence.[8] The professed traitor Oswald was given a U.S.-government loan to assist his return from the USSR. When he settled in Dallas, his closest friend and mentor was longtime U.S. intelligence operative George DeMohrenschildt.
  • ...10 more annotations...
  • Fidel Castro recognized “CIA” written all over Lee Harvey Oswald and the press releases on him that were being sent around the world within minutes of the assassination. The whole Dallas set-up was obvious to someone as familiar with CIA assassination plots as Fidel Castro was.
  • The more one investigates the assassination of John Kennedy, the more one becomes immersed in the depths of U.S. intelligence. The American intelligence community was the sea around Lee Harvey Oswald, Jack Ruby, and the host of anti-Castro Cuban exiles and gun runners with whom Oswald and Ruby worked closely.
  • By the Fall of l963 John Kennedy had also decided to withdraw from Vietnam.[14] Robert McNamara in his memoir In Retrospect[15] has described the contentious October 2, l963, National Security Council meeting at which Kennedy decided, against the arguments of most of his advisors: to withdraw all U.S. forces from Vietnam by the end of l965; to withdraw l,000 U.S. troops by the end of l963; to announce this policy publicly “to set it in concrete,” which Press Secretary Pierre Salinger did at a press conference when the meeting was over.[16]
  • After JFK’s assassination, his withdrawal policy was quietly voided.[18] In light of the future consequences of Dallas, it was not only John Kennedy who was crucified on November 22, l963, but 58,000 other Americans and over three million Vietnamese, Laotians, and Cambodians.
  • Clifton Baird was a Louisville, Kentucky, police officer in l965 when he was asked to help kill Martin Luther King. On September l8, l965, Baird gave a ride home in his car to fellow Louisville officer Arlie Blair after their 3-ll pm shift. Baird parked his car in Blair’s driveway, and the two men talked. Alarmed at what Blair was saying, Clifton Baird secretly turned on a microphone hidden under his seat that was connected to a recorder in a rear speaker. What Baird taped was an offer to engage in a conspiracy to kill Dr. King. He later shared the information with author William F. Pepper who included it in his book on the King assassination Orders to Kill.[32] Blair told Baird that an organization he belonged to was willing to pay $500,000 for the death of King. Would Baird be willing to participate? Baird said he definitely would not. He urged Blair to stay away from it, too.
  • The next day at a Louisville police station, Clifton Baird saw Arlie Blair conferring with a group of police officers and FBI agents. The FBI agents had, over a period of sixteen years or more, developed a close relationship with members of the Louisville police force.
  • On September 20, l965, Baird taped a second car conversation with Blair. Blair again brought up the $500,000 bounty for King, which Baird had now connected with the FBI.
  • Myron Billett was another witness to the truth. By undergoing a conversion in his own life, Myron Billett was able to reveal that in January l968 FBI and CIA agents offered a New York Mafia leader a $l million contract to kill Martin Luther King.
  • After Dr. King was assassinated on April 4, Sam Giancana gave Myron Billett $30,000 and told him to start running: They both knew too much and were going to be killed. Giancana was in fact murdered in his Chicago home in June l975, just before he was scheduled to testify before the Church Committee concerning assassination plots. His killing took the form of a symbolic warning to other possible assassination witnesses. Giancana was shot seven times in a circle around his mouth.
  • In his Canadian Broadcasting Corporation lectures at the end of l967 (later published as The Trumpet of Conscience[39]), King’s vision went beyond even these overwhelming concerns. He saw the next step as a global nonviolent movement using escalating acts of massive civil disobedience to disrupt the entire international order and block economic and political exploitation across borders.
Paul Merrell

Eyes Over Compton: How Police Spied on a Whole City - Conor Friedersdorf - The Atlantic - 0 views

  • In a secret test of mass surveillance technology, the Los Angeles County Sheriff's Department sent a civilian aircraft* over Compton, California, capturing high-resolution video of everything that happened inside that 10-square-mile municipality. Compton residents weren't told about the spying, which happened in 2012. "We literally watched all of Compton during the times that we were flying, so we could zoom in anywhere within the city of Compton and follow cars and see people," Ross McNutt of Persistence Surveillance Systems told the Center for Investigative Reporting, which unearthed and did the first reporting on this important story. The technology he's trying to sell to police departments all over America can stay aloft for up to six hours. Like Google Earth, it enables police to zoom in on certain areas. And like TiVo, it permits them to rewind, so that they can look back and see what happened anywhere they weren't watching in real time.  If it's adopted, Americans can be policed like Iraqis and Afghanis under occupation–and at bargain price
  • Sgt. Douglas Iketani acknowledges that his agency hid the experiment to avoid public opposition. "This system was kind of kept confidential from everybody in the public,"he said. "A lot of people do have a problem with the eye in the sky, the Big Brother, so to mitigate those kinds of complaints we basically kept it pretty hush hush." That attitude ought to get a public employee summarily terminated. 
  • The CIR story reports that no police department has yet purchased this technology, not because the law enforcement community is unwilling to conduct mass surveillance of their fellow citizens without first gaining the public's consent, but because the cameras aren't yet good enough to identify the faces of individuals. It's hard to imagine that next technological barrier won't be broken soon.
Paul Merrell

Failure of the US coup d'État in Macedonia , by Thierry Meyssan - 0 views

  • Macedonia has just neutralised an armed group whose sponsors had been under surveillance for at least eight months. By doing so, it has prevented a new attempt at a coup d’État, planned by Washington for the 17th of May. The aim was to spread the chaos already infecting Ukraine into Macedonia in order to stall the passage of a Russian gas pipeline to the European Union.
  • n the 9th of May, 2015, the Macedonian police launched a dawn operation to arrest an armed group which had infiltrated the country and which was suspected of preparing a number of attacks. The police evacuated the civilian population before launching the assault.
  • The suspects opened fire, which led to a bitter firefight, leaving 14 terrorists and 8 members of the police forces dead. 30 people were taken prisoner. There were a large number of wounded
  • ...7 more annotations...
  • The Macedonian police were clearly well-informed before they launched their operation. According to the Minister for the Interior, Ivo Kotevski, the group was preparing a very important operation for the 17th May (the date of the demonstration organised by the Albanophone opposition in Skopje). The identification of the suspects has made it possible to determine that they were almost all ex-members of the UÇK (Kosovo Liberation Army) [1].
  • Among them were : • Sami Ukshini, known as « Commandant Sokoli », whose family played a historic rôle in the UÇK. • Rijai Bey, ex-bodyguard of Ramush Haradinaj (himself a drug trafficker, military head of the UÇK, then Prime Minister of Kosovo. He was twice condemned for war crimes by the International Penal Tribunal for ex-Yugoslavia, but was acquitted because 9 crucial witnesses were murdered during the trial). • Dem Shehu, currently bodyguard for the Albanophone leader and founder of the BDI party, Ali Ahmeti. • Mirsad Ndrecaj, known as the « NATO Commandant », grandson of Malic Ndrecaj, who is commander of the 132nd Brigade of the UÇK. The principal leaders of this operation, including Fadil Fejzullahu (killed during the assault), are close to the United States ambassador in Skopje, Paul Wohlers.
  • To eliminate any doubt about the identity of the operation’s sponsors, the General Secretary of NATO, Jens Stoltenberg, intervened even before the assault was over - not to declare his condemnation of terrorism and his support for the constitutional government of Macedonia, but to paint a picture of the terrorist group as a legitimate ethnic opposition : « I am following the events in Kumanovo with deep concern. I would like to express my sympathy to the families of those who were killed or wounded. It is important that all polititcal and community leaders work together to restore order and begin a transparent investigation in order to find out what happened. I am calling for everyone to show reserve and avoid any new escalation of violence, in the intersts of the nation and also the whole region. » You would have to be blind not to understand.
  • In January 2015, Macedonia foiled an attempted coup d’état organised for the head of the opposition, the social-democrat Zoran Zaev. Four peole were arrested, and Mr. Zaev had his passport confiscated, while the Atlantist press began its denunciation of an « authoritarian drift by the régime » (sic). Zoran Zaev is publicly supported by the embassies of the United States, the United Kingdom, Germany and Holland. But the only trace left of this attempted coup d’état indicates the repsponsibility of the US. On the 17th May, Zoran Zaev’s social-democrat party (SDSM) [2] was supposed to organise a demonstration. It intended to distribute 2,000 masks in order to prevent the police from identifying the terrorists taking part in the march. During the demonstration, the armed group, concealed behind their masks, were supposed to attack several institutions and launch a pseudo-« revolution » comparable to the events in Maidan Square, Kiev.
  • This coup d’État was coordinated by Mile Zechevich, an ex-employee of one of George Soros’ foundations. In order to understand Washington’s urgency to overthrow the Macedonian government, we have to go back and look at the gas pipeline war. Because international politics is a huge chess-board on which every move by any piece causes consequences for all the others.
  • The United States have been attempting to sever communications between Russia and the European Union since 2007. They managed to sabotage the projet South Stream by obliging Bulgaria to cancel its participation, but on the 1st December 2014, to everyone’s surprise, Russian President Vladimir Putin launched a new project when he succeeded in convincing his Turkish opposite number, Recep Tayyip Erdoğan, to sign an agreement with him, despite the fact that Turkey is a member of NATO [3]. It was agreed that Moscow would deliver gas to Ankara, and that in return, Ankara would deliver gas to the European Union, thus bypassing the anti-Russian embargo by Brussels. On the 18th of April 2015, the new Greek Prime Minister, Alexis Tsípras, gave his agreement that the pipeline could cross his country [4] . As for Macedonian Prime Minister Nikola Gruevski, he had already conluded discrete negotiations last March [5]. Finally, Serbia, which had been a partner in the South Stream project, indicated to the Russian Minister for Energy Aleksandar Novak, during his reception in Belgrade in April, that Serbia was ready to switch to the Turkish Stream project [6].
  • To halt the Russian project, Washington has multiplied its initiatives :  in Turkey, it is supporting the CHP against President Erdoğan, hoping this will cause him to lose the elections;  in Greece, on the 8th May, it sent Amos Hochstein, Directeur of the Bureau of Energy Ressources, to demand that the Tsípras government give up its agreement with Gazprom;  it plans – just in case – to block the route of the pipeline by placing one of its puppets in power in Macedonia;  and in Serbia, it has restarted the project for the secession of the small piece of territory - Voïvodine - which allows the junction with Hungary [7]. Last comment, but not the least: Turkish Stream will also supply Hungary and Austria, thus ending the alternative project negotiated by the United States with President Hassan Rohani (against the advice of the Revolutionary Guards) for supplying them with Iranian gas [8].
Paul Merrell

Former Agent of Swedish Security Police Dictated Amnesty Sweden's Stance against Julian... - 0 views

  • In December 2010 a close collaboration between Sweden and the CIA and FBI was exposed in the international media: an intelligence collaboration between Sweden and US agencies that was kept secret from the Swedish public, and even from the Swedish Parliament. [1] The Telegraph credited WikiLeaks for exposing the deal. [2] The revelations caused far more commotion internationally than in Sweden and, in any event, no government officials were ever held accountable for it. The Washington Post reported, quoting a Swedish Parliamentary investigation: “Although the Parliamentary investigator concluded that the Swedish security police deserved ‘extremely grave criticism’ for losing control of the operation and for being ‘remarkably submissive to the American officials,’ no Swedish officials have been charged or disciplined.” [3]
  • This article explores to what extent intelligence collaboration between Swedish and US security agencies might have relevance to, or direct intervention in, the political case of Sweden vs Assange. [4]
Gary Edwards

» EXCLUSIVE: Snowden Level Documents Reveal Stealth DHS Spy Grid Alex Jones' ... - 0 views

  • “The NMS also collects information about every Wi‐Fi client accessing the network, including its MAC address, IP address, signal intensity, data rate and traffic status,” the document reads. “Additional NMS features include a fault management system for issuing alarms and logging events according to a set of customizable filtering rules, along with centralized and version‐controlled remote updating of the Aruba Mesh Operating System software.”
  •  
    It just keeps getting better ............... excerpt: "The wireless mesh network, which allows for private communication between wireless devices including cell phones and laptops, was built by California-based Aruba Networks, a major provider of next-generation mobile network access solutions. Labeled by their intersection location such as "1st&University" and "2nd& Seneca," the multiple network devices are easily detected in Seattle's downtown area through a simple Wi-Fi enabled device, leading many residents to wonder if they are being detected in return. "How accurately can it geo-locate and track the movements of your phone, laptop, or any other wireless device by its MAC address? Can the network send that information to a database, allowing the SPD to reconstruct who was where at any given time, on any given day, without a warrant? Can the network see you now?" asked Seattle newspaper The Stranger. According to reports from Kiro 7 News, the mesh network devices can capture a mobile user's IP address, mobile device type, apps used, current location and even historical location down to the last 1,000 places visited. So far Seattle police have been tight-lipped about the network's roll-out, even denying that the system is operational. Several groups including the ACLU have submitted requests to learn the programs intended use, but days have turned to months as the mesh network continues its advancement. According to The Stranger's investigation, Seattle Police detective Monty Moss claims the department has no plans to use the mesh network for surveillance… unless given approval by city council. Despite a recently passed ordinance requiring all potential surveillance equipment to be given city council approval and public review within 30 days of its implementation, the network has remained shrouded in secrecy. Unknown to the public until now, information regarding the system has been hiding in plain view since last February at minimum. Diagr
Paul Merrell

NYPD Blows Whistle on New Hillary Emails: Money Laundering, Sex Crimes with Children, C... - 1 views

  • New York Police Department detectives and prosecutors working an alleged underage sexting case against former Congressman Anthony Weiner have turned over a newly-found laptop he shared with wife Huma Abedin to the FBI with enough evidence “to put Hillary (Clinton) and her crew away for life,” NYPD sources told True Pundit. NYPD sources said Clinton’s “crew” also included several unnamed yet implicated members of Congress in addition to her aides and insiders. The NYPD seized the computer from Weiner during a search warrant and detectives discovered a trove of over 500,000 emails to and from Hillary Clinton, Abedin and other insiders during her tenure as secretary of state. The content of those emails sparked the FBI to reopen its defunct email investigation into Clinton on Friday.
  • But new revelations on the contents of that laptop, according to law enforcement sources, implicate the Democratic presidential candidate, her subordinates, and even select elected officials in far more alleged serious crimes than mishandling classified and top secret emails, sources said. NYPD sources said these new emails include evidence linking Clinton herself and associates to: Money laundering Child exploitation Sex crimes with minors (children) Perjury Pay to play through Clinton Foundation Obstruction of justice Other felony crimes NYPD detectives and a NYPD Chief, the department’s highest rank under Commissioner, said openly that if the FBI and Justice Department fail to garner timely indictments against Clinton and co- conspirators, NYPD will go public with the damaging emails now in the hands of FBI Director James Comey and many FBI field offices. “What’s in the emails is staggering and as a father, it turned my stomach,” the NYPD Chief said. “There is not going to be any Houdini-like escape from what we found. We have copies of everything. We will ship them to Wikileaks or I will personally hold my own press conference if it comes to that.”
  • The NYPD Chief said once Comey saw the alarming contents of the emails he was forced to reopen a criminal probe against Clinton. “People are going to prison,” he said. Meanwhile, FBI sources said Abedin and Weiner were cooperating with federal agents, who have taken over the non-sexting portions the case from NYPD. The husband-and-wife Clinton insiders  are both shopping for separate immunity deals, sources said. “If they don’t cooperate they are going to see long sentences,” a federal law enforcement source said. NYPD sources said Weiner or Abedin stored all the emails in a massive Microsoft Outlook program on the laptop. The emails implicate other current and former members of Congress and one high-ranking Democratic Senator as having possibly engaged in criminal activity too, sources said. Prosecutors in the office of US Attorney Preet Bharara have issued a subpoena for Weiner’s cell phones and travel records, law enforcement sources confirmed. NYPD said it planned to order the same phone and travel records on Clinton and Abedin, however, the FBI said it was in the process of requesting the identical records. Law enforcement sources are particularly interested in cell phone activity and travel to the Bahamas, U.S. Virgin Islands and other locations that sources would not divulge.
  • ...4 more annotations...
  • The new emails contain travel documents and itineraries indicating Hillary Clinton, President Bill Clinton, Weiner and multiple members of Congress and other government officials accompanied convicted pedophile billionaire Jeffrey Epstein on his Boeing 727 on multiple occasions to his private island in the U.S Virgin Islands, sources said. Epstein’s island has also been dubbed Orgy Island or Sex Slave Island where Epstein allegedly pimps out underage girls and boys to international dignitaries. Both NYPD and FBI sources confirm based on the new emails they now believe Hillary Clinton traveled as Epstein’s guest on at least six occasions, probably more when all the evidence is combed, sources said. Bill Clinton, it has been confirmed in media reports spanning recent years, that he too traveled with Epstein over 20 times to the island.
  • According to other uncovered emails, Abedin and Clinton both sent and received thousands of classified and top secret documents to personal email accounts including Weiner’s unsecured campaign web site which is managed by Democratic political consultants in Washington D.C. Weiner maintained little known email accounts that the couple shared on the website anthonyweiner.com. Weiner, a former seven-term Democratic Congressman from New York, primarily used that domain to campaign for Congress and for his failed mayoral bid of New York City. At one point, FBI sources said, Abedin and Clinton’s classified and top secret State Department documents and emails were stored in Weiner’s email on a server shared with a dog grooming service and a western Canadian bicycle shop. However, Weiner and Abedin, who is Hillary Clinton’s closest personal aide, weren’t the only people with access to the Weiner’s email account. Potentially dozens of unknown individuals had access to Abedin’s sensitive State Department emails that were stored in Weiner’s email account, FBI sources confirmed. FEC records show Weiner paid more than $92,000 of congressional campaign funds to Anne Lewis Strategies LLC to manage his email and web site. According to FBI sources, the D.C.-based political consulting firm has served as the official administrator of the anthonyweiner.com domain since 2010, the same time Abedin was working at the State Department. This means technically Weiner and Abedin’s emails, including top secret State Department emails, could have been accessed, printed, discussed, leaked, or distributed by untold numbers of personnel at the Anne Lewis consulting firm because they can control where the website and it emails are pointed, FBI sources said.
  • According to FBI sources, the bureau’s newly-minted probe into Clinton’s use and handling of emails while she served as secretary of state, has also been broadened to include investigating new email-related revelations, including: Abedin forwarded classified and top secret State Department emails to Weiner’s email Abedin stored emails, containing government secrets, in a special folder shared with Weiner warehousing over 500,000 archived State Department emails. Weiner had access to these classified and top secret documents without proper security clearance to view the records Abedin also used a personal yahoo address and her Clintonemail.com address to send/receive/store classified and top secret documents A private consultant managed Weiner’s site for the last six years, including three years when Clinton was secretary of state, and therefore, had full access to all emails as the domain’s listed registrant and administrator via Whois email contacts. Because Weiner’s campaign website is managed by the third-party consultant and political email guru, FBI agents are burdened with the task of trying to decipher just how many people had access to Weiner’s server and emails and who were these people. Or if the server was ever compromised by hackers, or other actors.
  • Abedin told FBI agents in an April interview that she didn’t know how to consistently print documents or emails from her secure Dept. of State system. Instead, she would forward the sensitive emails to her yahoo, Clintonemail.com and her email linked to Weiner. Abedin said, according to FBI documents, she would then access those email accounts via webmail from an unclassified computer system at the State Dept. and print the documents, many of which were classified and top secret, from the largely unprotected webmail portals. Clinton did not have a computer in her office on Mahogany Row at the State Dept. so she was not able to read timely intelligence unless it was printed out for her, Abedin said. Abedin also said Clinton could not operate the secure State Dept. fax machine installed in her Chappaqua, NY home without assistance. Perhaps more alarming, according to the FBI’s 302 Report detailing its interview with Abedin, none of the multiple FBI agents and Justice Department officials who conducted the interview pressed Abedin to further detail the email address linked to Weiner. There was never a follow up, according to the 302 report. But now, all that has changed, with the FBI’s decision to reopen the Clinton email investigation and the husband and wife seeking immunity deals to testify against Clinton and other associates about the contents of the laptop’s emails.
  •  
    "New York Police Department detectives and prosecutors working an alleged underage sexting case against former Congressman Anthony Weiner have turned over a newly-found laptop he shared with wife Huma Abedin to the FBI with enough evidence "to put Hillary (Clinton) and her crew away for life," NYPD sources told True Pundit. NYPD sources said Clinton's "crew" also included several unnamed yet implicated members of Congress in addition to her aides and insiders. The NYPD seized the computer from Weiner during a search warrant and detectives discovered a trove of over 500,000 emails to and from Hillary Clinton, Abedin and other insiders during her tenure as secretary of state. The content of those emails sparked the FBI to reopen its defunct email investigation into Clinton on Friday. But new revelations on the contents of that laptop, according to law enforcement sources, implicate the Democratic presidential candidate, her subordinates, and even select elected officials in far more alleged serious crimes than mishandling classified and top secret emails, sources said. NYPD sources said these new emails include evidence linking Clinton herself and associates to: Money laundering Child exploitation Sex crimes with minors (children) Perjury Pay to play through Clinton Foundation Obstruction of justice Other felony crimes NYPD detectives and a NYPD Chief, the department's highest rank under Commissioner, said openly that if the FBI and Justice Department fail to garner timely indictments against Clinton and co- conspirators, NYPD will go public with the damaging emails now in the hands of FBI Director James Comey and many FBI field offices. "What's in the emails is staggering and as a father, it turned my stomach," the NYPD Chief said. "There is not going to be any Houdini-like escape from what we found. We have copies of everything. We will ship them to Wikileaks or I will personally hold my own press conference if it comes to that." The NYPD
« First ‹ Previous 41 - 60 of 152 Next › Last »
Showing 20 items per page