Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged police-recommendation

Rss Feed Group items tagged

Paul Merrell

Israeli Police Recommend Netanyahu Be Indicted For Bribery | Zero Hedge - 0 views

  • Update: Bibi has responded, and - well - you see he was only stealing because it was in the country's interest: NETANYAHU SAYS HIS ONLY MOTIVE IS TO ADVANCE NATIONAL INTERESTS It gets better: NETANYAHU: POLICE RECOMMENDATIONS HAVE NO PLACE IN DEMOCRACY And then, denial, with the usual diversion that any attack on Netanyahu is an attack on Israel itself: NETANYAHU SAYS `TODAY IS NO DIFFERENT FROM ANY DAY' NETANYAHU SAYS INVESTIGATIONS AIM TO TOPPLE HIS GOVERNMENT NETANYAHU: POLICE RECOMMENDATIONS HAVE NO PLACE IN DEMOCRACY Spoken just like any corrupt politicians
  • After a 14-month-long investigation, Israeli police have reportedly recommended that Prime Minister Benjamin Netanyahu be indicted on charges of bribery and breach of trust.
  • As The Jerusalem Post reports, police say they have found enough evidence to recommend the state’s prosecution to indict Netanyahu in Case 1000, the “gifts affair" and Case 2000, the "Yediot Aharanot Affair." In Case 1000, the “gifts affair,” it is alleged that Netanyahu improperly accepted expensive gifts from different businessmen. In Case 2000, the “Yediot Aharonot affair,” Netanyahu allegedly negotiated with publisher Arnon “Noni” Mozes for favorable coverage of himself in Yediot Aharonot in exchange for support of a bill to weaken Israel Hayom, the largest circulation Hebrew-language paper and Yediot’s biggest competitor. At this stage, the prosecution and Attorney-General Avichai Mandelblit will examine the evidence that police collected throughout the investigations, and will later decide whether to actually indict the prime minister or not. Netanyahu will not be required at this point to resign from office. The law says that only after a peremptory Supreme Court verdict (meaning after an appeal was submitted and rejected), the prime minister must resign from office.
Paul Merrell

The Pentagon's slush fund is arming a War Zone on Main Street. Let's end the local-cop ... - 0 views

  • What many other communities across America have learned since is that we're living in what the writer Radley Balko calls the age of the "warrior cop". And when warrior cops want a straight-outta-Baghdad toy, it's increasingly and unnecessarily simple for them to use a federally enabled slush-fund to wreak havoc – particularly against minorities, and even at a pumpkin festival. It's also pretty simple to start accounting for all the high-tech violence."Before another small town's police force gets a $700,000 gift from the Defense Department that it can't maintain or manage," Rep Hank Johnson of Georgia told me this week, "we need to press pause and revisit the merits of a militarized America."
  • The ACLU released a devastating report this week examining more than 800 incidents of Swat team deployments conducted by 20 law enforcement agencies between 2010 and 2013. It's a small sample of the estimated 45,000 deployments that occur in the US each year (up from 1,400% from the '80s), but the report reveals a picture of law enforcement as flash-bang assault unit, with hardly an actual suspect in harm's way: pandemonium in a baby's crib; a grandfather of 12 killed by a discharged gun; Swat officers gunning down a mother as she died, child in her arms. According to the ACLU study, 79% of the incidents surveyed involved a Swat team searching a person's home, and more than 62% of the cases involved searches for drugs. That's not what Swat teams were made for.America is winding down wars abroad – depending on what the hell happens in Iraq, of course – but we are fueling an addiction to armed conflict here at home.As Balko notes in his book, The Rise of the Warrior Cop, "America's cops have increasingly come to resemble ground troops."
  • But the federal government has been enabling even more localized branches of law enforcement to get its hands on heavy-duty artillery for the last 20 years, when the Reagan administration formalized the Pentagon's so-called 1033 Program. It sends "excess" military equipment to local police departments, and combined with the Homeland Security operation that provides grants to purchase such equipment, we've got a veritable firearms sale funnelling from Washington on down to the local station house. And when local law enforcement is making hundreds of thousands of dollars off seized drug money – sometimes illegally – you've got the makings of a War Zone on Main Street.Rep Johnson has plans to introduce a bill that would reform the 1033 Program, which donated at least $500bn per year in military gear to virtually every police department in the country. "We not only lack serious oversight and accountability," Johnson wrote me in an email on Tuesday, "but we need some parameters put in place for what is appropriate." His legislation would put limitations on the transfer of certain kinds of military-grade equipment, and require the Pentagon to account for transfers of all such equipment in an annual report to Congress.
  • ...1 more annotation...
  • The ACLU also made several recommendations in its report – state laws to restrain Swat teams, plus transparency and strict oversight – that all make sense, as do training sessions for more of our trigger-happy "rescue" officers. But this was perhaps the most endemic part of that report:Overall, 42% of people impacted by a Swat deployment to execute a search warrant were black and 12% were Latino. This means that of the people impacted by deployments for warrants, at least 54% were minorities.Whether this is by accident or design, the racial reality of America's militarized law enforcement offers yet another compelling reason why the dangerous trend of warrior-style policing needs to be re-examined – and then reversed.When the first Swat team was deployed in the late '60s, its target was a single remaining cell of the Black Panthers. Nearly half a century later, all the nation's a theater, and we are merely the pumpkin eaters – with half a million bucks worth of smashing, exploding, high-artillery gear for the taking.
Paul Merrell

Netanyahu questioned by police for third time in alleged corruption probe - Israel News... - 0 views

  • Prime Minister Benjamin Netanyahu was questioned by police investigators at his residence in Jerusalem on Friday morning regarding two pending investigations against him. One case, known as Case 1000, involves allegations that he illegally accepted valuable gifts for himself and his family from business figures, notably Australian billionaire James Packer and Israeli Hollywood film producer Arnon Milchan. The other, Case 2000, relates to conversations between the prime minister and the publisher of the Yedioth Aharonoth daily, Arnon Mozes, where Netanyahu allegedly offered to pursue legislation benefitting Mozes' news business in exchange for favorable news coverage for the prime minister. Mozes was questioned again on that case by police on Thursday.
  • Police have concluded that the corruption investigations of Prime Minister Benjamin Netanyahu have yielded sufficient evidence to confirm that he committed at least some of the crimes of which he is suspected.   A senior legal source said that some of the suspicions in the graft case were found to be backed up by conclusive evidence. This reinforces assessments that police will recommend bringing charges against Netanyahu. In internal discussions, members of the national fraud unit tasked with investigating Netanyahu say they are confident about the evidence they have collected, especially with regard to the graft case. With respect to Case 2000, there is no dispute regarding the evidence but there is not yet consensus regarding the legal significance of the evidence.
Paul Merrell

Cy Vance's Proposal to Backdoor Encrypted Devices Is Riddled With Vulnerabilities | Jus... - 0 views

  • Less than a week after the attacks in Paris — while the public and policymakers were still reeling, and the investigation had barely gotten off the ground — Cy Vance, Manhattan’s District Attorney, released a policy paper calling for legislation requiring companies to provide the government with backdoor access to their smartphones and other mobile devices. This is the first concrete proposal of this type since September 2014, when FBI Director James Comey reignited the “Crypto Wars” in response to Apple’s and Google’s decisions to use default encryption on their smartphones. Though Comey seized on Apple’s and Google’s decisions to encrypt their devices by default, his concerns are primarily related to end-to-end encryption, which protects communications that are in transit. Vance’s proposal, on the other hand, is only concerned with device encryption, which protects data stored on phones. It is still unclear whether encryption played any role in the Paris attacks, though we do know that the attackers were using unencrypted SMS text messages on the night of the attack, and that some of them were even known to intelligence agencies and had previously been under surveillance. But regardless of whether encryption was used at some point during the planning of the attacks, as I lay out below, prohibiting companies from selling encrypted devices would not prevent criminals or terrorists from being able to access unbreakable encryption. Vance’s primary complaint is that Apple’s and Google’s decisions to provide their customers with more secure devices through encryption interferes with criminal investigations. He claims encryption prevents law enforcement from accessing stored data like iMessages, photos and videos, Internet search histories, and third party app data. He makes several arguments to justify his proposal to build backdoors into encrypted smartphones, but none of them hold water.
  • Before addressing the major privacy, security, and implementation concerns that his proposal raises, it is worth noting that while an increase in use of fully encrypted devices could interfere with some law enforcement investigations, it will help prevent far more crimes — especially smartphone theft, and the consequent potential for identity theft. According to Consumer Reports, in 2014 there were more than two million victims of smartphone theft, and nearly two-thirds of all smartphone users either took no steps to secure their phones or their data or failed to implement passcode access for their phones. Default encryption could reduce instances of theft because perpetrators would no longer be able to break into the phone to steal the data.
  • Vance argues that creating a weakness in encryption to allow law enforcement to access data stored on devices does not raise serious concerns for security and privacy, since in order to exploit the vulnerability one would need access to the actual device. He considers this an acceptable risk, claiming it would not be the same as creating a widespread vulnerability in encryption protecting communications in transit (like emails), and that it would be cheap and easy for companies to implement. But Vance seems to be underestimating the risks involved with his plan. It is increasingly important that smartphones and other devices are protected by the strongest encryption possible. Our devices and the apps on them contain astonishing amounts of personal information, so much that an unprecedented level of harm could be caused if a smartphone or device with an exploitable vulnerability is stolen, not least in the forms of identity fraud and credit card theft. We bank on our phones, and have access to credit card payments with services like Apple Pay. Our contact lists are stored on our phones, including phone numbers, emails, social media accounts, and addresses. Passwords are often stored on people’s phones. And phones and apps are often full of personal details about their lives, from food diaries to logs of favorite places to personal photographs. Symantec conducted a study, where the company spread 50 “lost” phones in public to see what people who picked up the phones would do with them. The company found that 95 percent of those people tried to access the phone, and while nearly 90 percent tried to access private information stored on the phone or in other private accounts such as banking services and email, only 50 percent attempted contacting the owner.
  • ...8 more annotations...
  • In addition to his weak reasoning for why it would be feasible to create backdoors to encrypted devices without creating undue security risks or harming privacy, Vance makes several flawed policy-based arguments in favor of his proposal. He argues that criminals benefit from devices that are protected by strong encryption. That may be true, but strong encryption is also a critical tool used by billions of average people around the world every day to protect their transactions, communications, and private information. Lawyers, doctors, and journalists rely on encryption to protect their clients, patients, and sources. Government officials, from the President to the directors of the NSA and FBI, and members of Congress, depend on strong encryption for cybersecurity and data security. There are far more innocent Americans who benefit from strong encryption than there are criminals who exploit it. Encryption is also essential to our economy. Device manufacturers could suffer major economic losses if they are prohibited from competing with foreign manufacturers who offer more secure devices. Encryption also protects major companies from corporate and nation-state espionage. As more daily business activities are done on smartphones and other devices, they may now hold highly proprietary or sensitive information. Those devices could be targeted even more than they are now if all that has to be done to access that information is to steal an employee’s smartphone and exploit a vulnerability the manufacturer was required to create.
  • Privacy is another concern that Vance dismisses too easily. Despite Vance’s arguments otherwise, building backdoors into device encryption undermines privacy. Our government does not impose a similar requirement in any other context. Police can enter homes with warrants, but there is no requirement that people record their conversations and interactions just in case they someday become useful in an investigation. The conversations that we once had through disposable letters and in-person conversations now happen over the Internet and on phones. Just because the medium has changed does not mean our right to privacy has.
  • Vance attempts to downplay this serious risk by asserting that anyone can use the “Find My Phone” or Android Device Manager services that allow owners to delete the data on their phones if stolen. However, this does not stand up to scrutiny. These services are effective only when an owner realizes their phone is missing and can take swift action on another computer or device. This delay ensures some period of vulnerability. Encryption, on the other hand, protects everyone immediately and always. Additionally, Vance argues that it is safer to build backdoors into encrypted devices than it is to do so for encrypted communications in transit. It is true that there is a difference in the threats posed by the two types of encryption backdoors that are being debated. However, some manner of widespread vulnerability will inevitably result from a backdoor to encrypted devices. Indeed, the NSA and GCHQ reportedly hacked into a database to obtain cell phone SIM card encryption keys in order defeat the security protecting users’ communications and activities and to conduct surveillance. Clearly, the reality is that the threat of such a breach, whether from a hacker or a nation state actor, is very real. Even if companies go the extra mile and create a different means of access for every phone, such as a separate access key for each phone, significant vulnerabilities will be created. It would still be possible for a malicious actor to gain access to the database containing those keys, which would enable them to defeat the encryption on any smartphone they took possession of. Additionally, the cost of implementation and maintenance of such a complex system could be high.
  • Vance also suggests that the US would be justified in creating such a requirement since other Western nations are contemplating requiring encryption backdoors as well. Regardless of whether other countries are debating similar proposals, we cannot afford a race to the bottom on cybersecurity. Heads of the intelligence community regularly warn that cybersecurity is the top threat to our national security. Strong encryption is our best defense against cyber threats, and following in the footsteps of other countries by weakening that critical tool would do incalculable harm. Furthermore, even if the US or other countries did implement such a proposal, criminals could gain access to devices with strong encryption through the black market. Thus, only innocent people would be negatively affected, and some of those innocent people might even become criminals simply by trying to protect their privacy by securing their data and devices. Finally, Vance argues that David Kaye, UN Special Rapporteur for Freedom of Expression and Opinion, supported the idea that court-ordered decryption doesn’t violate human rights, provided certain criteria are met, in his report on the topic. However, in the context of Vance’s proposal, this seems to conflate the concepts of court-ordered decryption and of government-mandated encryption backdoors. The Kaye report was unequivocal about the importance of encryption for free speech and human rights. The report concluded that:
  • States should promote strong encryption and anonymity. National laws should recognize that individuals are free to protect the privacy of their digital communications by using encryption technology and tools that allow anonymity online. … States should not restrict encryption and anonymity, which facilitate and often enable the rights to freedom of opinion and expression. Blanket prohibitions fail to be necessary and proportionate. States should avoid all measures that weaken the security that individuals may enjoy online, such as backdoors, weak encryption standards and key escrows. Additionally, the group of intelligence experts that was hand-picked by the President to issue a report and recommendations on surveillance and technology, concluded that: [R]egarding encryption, the U.S. Government should: (1) fully support and not undermine efforts to create encryption standards; (2) not in any way subvert, undermine, weaken, or make vulnerable generally available commercial software; and (3) increase the use of encryption and urge US companies to do so, in order to better protect data in transit, at rest, in the cloud, and in other storage.
  • The clear consensus among human rights experts and several high-ranking intelligence experts, including the former directors of the NSA, Office of the Director of National Intelligence, and DHS, is that mandating encryption backdoors is dangerous. Unaddressed Concerns: Preventing Encrypted Devices from Entering the US and the Slippery Slope In addition to the significant faults in Vance’s arguments in favor of his proposal, he fails to address the question of how such a restriction would be effectively implemented. There is no effective mechanism for preventing code from becoming available for download online, even if it is illegal. One critical issue the Vance proposal fails to address is how the government would prevent, or even identify, encrypted smartphones when individuals bring them into the United States. DHS would have to train customs agents to search the contents of every person’s phone in order to identify whether it is encrypted, and then confiscate the phones that are. Legal and policy considerations aside, this kind of policy is, at the very least, impractical. Preventing strong encryption from entering the US is not like preventing guns or drugs from entering the country — encrypted phones aren’t immediately obvious as is contraband. Millions of people use encrypted devices, and tens of millions more devices are shipped to and sold in the US each year.
  • Finally, there is a real concern that if Vance’s proposal were accepted, it would be the first step down a slippery slope. Right now, his proposal only calls for access to smartphones and devices running mobile operating systems. While this policy in and of itself would cover a number of commonplace devices, it may eventually be expanded to cover laptop and desktop computers, as well as communications in transit. The expansion of this kind of policy is even more worrisome when taking into account the speed at which technology evolves and becomes widely adopted. Ten years ago, the iPhone did not even exist. Who is to say what technology will be commonplace in 10 or 20 years that is not even around today. There is a very real question about how far law enforcement will go to gain access to information. Things that once seemed like merely science fiction, such as wearable technology and artificial intelligence that could be implanted in and work with the human nervous system, are now available. If and when there comes a time when our “smart phone” is not really a device at all, but is rather an implant, surely we would not grant law enforcement access to our minds.
  • Policymakers should dismiss Vance’s proposal to prohibit the use of strong encryption to protect our smartphones and devices in order to ensure law enforcement access. Undermining encryption, regardless of whether it is protecting data in transit or at rest, would take us down a dangerous and harmful path. Instead, law enforcement and the intelligence community should be working to alter their skills and tactics in a fast-evolving technological world so that they are not so dependent on information that will increasingly be protected by encryption.
Paul Merrell

US to UN Human Rights Committee: Move Along, Nothing to See Here | American Civil Liber... - 0 views

  • Yesterday the United States gave the U.N. Human Rights Committee its one year follow-up report on progress made to implement four priority recommendations made by the committee a year ago. The independent human rights experts had reviewed the United States' compliance with a major human rights treaty, the International Covenant on Civil and Political Rights (ICCPR). They found the U.S. coming up short in many areas, including accountability for torture, privacy and surveillance, Guantánamo, and gun violence. Yesterday’s disappointing 15-page submission does provide some information on Justice Department investigations regarding police misconduct, including the recent Ferguson report. But, there was nothing on accountability measures taken in the aftermath of the release of the Senate report on the CIA torture program. The need for Attorney General Eric Holder to appoint a special prosecutor remains as glaring as ever.
  • The submission notes that the Senate report’s 500-page executive summary was “declassified with minimal redactions to protect national security,” but it failed to commit to release the entire report (which the ACLU is currently fighting for in a FOIA lawsuit). And while the submission states that the U.S. “supports transparency and has taken steps to ensure that it never resorts to the use of those [harsh interrogation] techniques again,” there is no mention of any concrete actions taken to criminally investigate CIA torture, especially in light of the new information made public in the report about the brutality of the CIA’s methods, and its lies to Congress, the media, and the public about its torture program. Under the ICCPR and the Convention Against Torture, the U.S. has an obligation to effectively, independently, and impartially investigate all cases of unlawful killing or torture, as well as arbitrary detention or enforced disappearance. The U.S. also has an international legal obligation to appropriately prosecute perpetrators – including high-level policymakers.
  • The U.S. submission mentions the investigation by Justice Department prosecutor John Durham, which he closed in 2012 without any charges being filed. But, the submission fails to provide detailed information on the precise scope of Durham’s mandate. We remain concerned that the investigation may have focused on instances in which interrogators overstepped limits set by senior officials, rather than on the culpability of senior officials themselves. It also remains unclear whether investigators interviewed any prisoners who were subjected to the CIA torture program. During the November 2014 review of the United States before the U.N. Committee Against Torture in Geneva, the committee raised concerns, based on letters and accounts from torture victims or their attorneys, indicating that Durham had never interviewed any detainees. The U.S. delegation responded that it had interviewed 96 persons as part of the investigation, but it did not indicate whether any of the prisoners who were subjected to abuse and torture were amongst those interviewed.
  • ...1 more annotation...
  • A comprehensive criminal investigation by the U.S. government would dissuade future government officials from ordering or using torture and abuse. Failure to conduct an independent criminal investigation not only flouts international law but it also undermines America’s ability to advocate for human rights abroad and compromises Americans’ faith in the rule of law at home. The ACLU and other human rights groups have until May 1st to submit “shadow reports” to the Human Rights Committee, which will subsequently assess and grade U.S. implementation of the key priority recommendations.  The Obama administration can still avoid a low grade by responding to domestic and international calls to appoint a special prosecutor to conduct a comprehensive criminal investigation of the tactics described in the Senate torture report, including all acts authorizing or ordering acts of torture and other abuses and provide redress to victims of torture.  
Paul Merrell

Canadian Spies Collect Domestic Emails in Secret Security Sweep - The Intercept - 0 views

  • Canada’s electronic surveillance agency is covertly monitoring vast amounts of Canadians’ emails as part of a sweeping domestic cybersecurity operation, according to top-secret documents. The surveillance initiative, revealed Wednesday by CBC News in collaboration with The Intercept, is sifting through millions of emails sent to Canadian government agencies and departments, archiving details about them on a database for months or even years. The data mining operation is carried out by the Communications Security Establishment, or CSE, Canada’s equivalent of the National Security Agency. Its existence is disclosed in documents obtained by The Intercept from NSA whistleblower Edward Snowden. The emails are vacuumed up by the Canadian agency as part of its mandate to defend against hacking attacks and malware targeting government computers. It relies on a system codenamed PONY EXPRESS to analyze the messages in a bid to detect potential cyber threats.
  • Last year, CSE acknowledged it collected some private communications as part of cybersecurity efforts. But it refused to divulge the number of communications being stored or to explain for how long any intercepted messages would be retained. Now, the Snowden documents shine a light for the first time on the huge scope of the operation — exposing the controversial details the government withheld from the public. Under Canada’s criminal code, CSE is not allowed to eavesdrop on Canadians’ communications. But the agency can be granted special ministerial exemptions if its efforts are linked to protecting government infrastructure — a loophole that the Snowden documents show is being used to monitor the emails. The latest revelations will trigger concerns about how Canadians’ private correspondence with government employees are being archived by the spy agency and potentially shared with police or allied surveillance agencies overseas, such as the NSA. Members of the public routinely communicate with government employees when, for instance, filing tax returns, writing a letter to a member of parliament, applying for employment insurance benefits or submitting a passport application.
  • Chris Parsons, an internet security expert with the Toronto-based internet think tank Citizen Lab, told CBC News that “you should be able to communicate with your government without the fear that what you say … could come back to haunt you in unexpected ways.” Parsons said that there are legitimate cybersecurity purposes for the agency to keep tabs on communications with the government, but he added: “When we collect huge volumes, it’s not just used to track bad guys. It goes into data stores for years or months at a time and then it can be used at any point in the future.” In a top-secret CSE document on the security operation, dated from 2010, the agency says it “processes 400,000 emails per day” and admits that it is suffering from “information overload” because it is scooping up “too much data.” The document outlines how CSE built a system to handle a massive 400 terabytes of data from Internet networks each month — including Canadians’ emails — as part of the cyber operation. (A single terabyte of data can hold about a billion pages of text, or about 250,000 average-sized mp3 files.)
  • ...1 more annotation...
  • The agency notes in the document that it is storing large amounts of “passively tapped network traffic” for “days to months,” encompassing the contents of emails, attachments and other online activity. It adds that it stores some kinds of metadata — data showing who has contacted whom and when, but not the content of the message — for “months to years.” The document says that CSE has “excellent access to full take data” as part of its cyber operations and is receiving policy support on “use of intercepted private communications.” The term “full take” is surveillance-agency jargon that refers to the bulk collection of both content and metadata from Internet traffic. Another top-secret document on the surveillance dated from 2010 suggests the agency may be obtaining at least some of the data by covertly mining it directly from Canadian Internet cables. CSE notes in the document that it is “processing emails off the wire.”
  •  
    " CANADIAN SPIES COLLECT DOMESTIC EMAILS IN SECRET SECURITY SWEEP BY RYAN GALLAGHER AND GLENN GREENWALD @rj_gallagher@ggreenwald YESTERDAY AT 2:02 AM SHARE TWITTER FACEBOOK GOOGLE EMAIL PRINT POPULAR EXCLUSIVE: TSA ISSUES SECRET WARNING ON 'CATASTROPHIC' THREAT TO AVIATION CHICAGO'S "BLACK SITE" DETAINEES SPEAK OUT WHY DOES THE FBI HAVE TO MANUFACTURE ITS OWN PLOTS IF TERRORISM AND ISIS ARE SUCH GRAVE THREATS? NET NEUTRALITY IS HERE - THANKS TO AN UNPRECEDENTED GUERRILLA ACTIVISM CAMPAIGN HOW SPIES STOLE THE KEYS TO THE ENCRYPTION CASTLE Canada's electronic surveillance agency is covertly monitoring vast amounts of Canadians' emails as part of a sweeping domestic cybersecurity operation, according to top-secret documents. The surveillance initiative, revealed Wednesday by CBC News in collaboration with The Intercept, is sifting through millions of emails sent to Canadian government agencies and departments, archiving details about them on a database for months or even years. The data mining operation is carried out by the Communications Security Establishment, or CSE, Canada's equivalent of the National Security Agency. Its existence is disclosed in documents obtained by The Intercept from NSA whistleblower Edward Snowden. The emails are vacuumed up by the Canadian agency as part of its mandate to defend against hacking attacks and malware targeting government computers. It relies on a system codenamed PONY EXPRESS to analyze the messages in a bid to detect potential cyber threats. Last year, CSE acknowledged it collected some private communications as part of cybersecurity efforts. But it refused to divulge the number of communications being stored or to explain for how long any intercepted messages would be retained. Now, the Snowden documents shine a light for the first time on the huge scope of the operation - exposing the controversial details the government withheld from the public. Under Canada's criminal code, CSE is no
Paul Merrell

Tomgram: Alfred McCoy, It's About Blackmail, Not National Security | TomDispatch - 0 views

  • For more than six months, Edward Snowden’s revelations about the National Security Agency (NSA) have been pouring out from the Washington Post, the New York Times, the Guardian, Germany’s Der Spiegel, and Brazil’s O Globo, among other places.  Yet no one has pointed out the combination of factors that made the NSA’s expanding programs to monitor the world seem like such a slam-dunk development in Washington.  The answer is remarkably simple.  For an imperial power losing its economic grip on the planet and heading into more austere times, the NSA’s latest technological breakthroughs look like a bargain basement deal when it comes to projecting power and keeping subordinate allies in line -- like, in fact, the steal of the century.  Even when disaster turned out to be attached to them, the NSA’s surveillance programs have come with such a discounted price tag that no Washington elite was going to reject them.
  • What exactly was the aim of such an unprecedented program of massive domestic and planetary spying, which clearly carried the risk of controversy at home and abroad? Here, an awareness of the more than century-long history of U.S. surveillance can guide us through the billions of bytes swept up by the NSA to the strategic significance of such a program for the planet’s last superpower. What the past reveals is a long-term relationship between American state surveillance and political scandal that helps illuminate the unacknowledged reason why the NSA monitors America’s closest allies. Not only does such surveillance help gain intelligence advantageous to U.S. diplomacy, trade relations, and war-making, but it also scoops up intimate information that can provide leverage -- akin to blackmail -- in sensitive global dealings and negotiations of every sort. The NSA’s global panopticon thus fulfills an ancient dream of empire. With a few computer key strokes, the agency has solved the problem that has bedeviled world powers since at least the time of Caesar Augustus: how to control unruly local leaders, who are the foundation for imperial rule, by ferreting out crucial, often scurrilous, information to make them more malleable.
  • Once upon a time, such surveillance was both expensive and labor intensive. Today, however, unlike the U.S. Army’s shoe-leather surveillance during World War I or the FBI’s break-ins and phone bugs in the Cold War years, the NSA can monitor the entire world and its leaders with only 100-plus probes into the Internet’s fiber optic cables. This new technology is both omniscient and omnipresent beyond anything those lacking top-secret clearance could have imagined before the Edward Snowden revelations began.  Not only is it unimaginably pervasive, but NSA surveillance is also a particularly cost-effective strategy compared to just about any other form of global power projection. And better yet, it fulfills the greatest imperial dream of all: to be omniscient not just for a few islands, as in the Philippines a century ago, or a couple of countries, as in the Cold War era, but on a truly global scale. In a time of increasing imperial austerity and exceptional technological capability, everything about the NSA’s surveillance told Washington to just “go for it.”  This cut-rate mechanism for both projecting force and preserving U.S. global power surely looked like a no-brainer, a must-have bargain for any American president in the twenty-first century -- before new NSA documents started hitting front pages weekly, thanks to Snowden, and the whole world began returning the favor.
  • ...12 more annotations...
  • As the gap has grown between Washington’s global reach and its shrinking mailed fist, as it struggles to maintain 40% of world armaments (the 2012 figure) with only 23% of global gross economic output, the U.S. will need to find new ways to exercise its power far more economically. As the Cold War took off, a heavy-metal U.S. military -- with 500 bases worldwide circa 1950 -- was sustainable because the country controlled some 50% of the global gross product. But as its share of world output falls -- to an estimated 17% by 2016 -- and its social welfare costs climb relentlessly from 4% of gross domestic product in 2010 to a projected 18% by 2050, cost-cutting becomes imperative if Washington is to survive as anything like the planet’s “sole superpower.” Compared to the $3 trillion cost of the U.S. invasion and occupation of Iraq, the NSA’s 2012 budget of just $11 billion for worldwide surveillance and cyberwarfare looks like cost saving the Pentagon can ill-afford to forego. Yet this seeming “bargain” comes at what turns out to be an almost incalculable cost. The sheer scale of such surveillance leaves it open to countless points of penetration, whether by a handful of anti-war activists breaking into an FBI field office in Media, Pennsylvania, back in 1971 or Edward Snowden downloading NSA documents at a Hawaiian outpost in 2012.
  • In October 2001, not satisfied with the sweeping and extraordinary powers of the newly passed Patriot Act, President Bush ordered the National Security Agency to commence covert monitoring of private communications through the nation's telephone companies without the requisite FISA warrants. Somewhat later, the agency began sweeping the Internet for emails, financial data, and voice messaging on the tenuous theory that such “metadata” was “not constitutionally protected.” In effect, by penetrating the Internet for text and the parallel Public Switched Telephone Network (PSTN) for voice, the NSA had gained access to much of the world’s telecommunications. By the end of Bush’s term in 2008, Congress had enacted laws that not only retrospectively legalized these illegal programs, but also prepared the way for NSA surveillance to grow unchecked. Rather than restrain the agency, President Obama oversaw the expansion of its operations in ways remarkable for both the sheer scale of the billions of messages collected globally and for the selective monitoring of world leaders.
  • By 2012, the centralization via digitization of all voice, video, textual, and financial communications into a worldwide network of fiber optic cables allowed the NSA to monitor the globe by penetrating just 190 data hubs -- an extraordinary economy of force for both political surveillance and cyberwarfare.
  • With a few hundred cable probes and computerized decryption, the NSA can now capture the kind of gritty details of private life that J. Edgar Hoover so treasured and provide the sort of comprehensive coverage of populations once epitomized by secret police like East Germany’s Stasi. And yet, such comparisons only go so far. After all, once FBI agents had tapped thousands of phones, stenographers had typed up countless transcripts, and clerks had stored this salacious paper harvest in floor-to-ceiling filing cabinets, J. Edgar Hoover still only knew about the inner-workings of the elite in one city: Washington, D.C.  To gain the same intimate detail for an entire country, the Stasi had to employ one police informer for every six East Germans -- an unsustainable allocation of human resources. By contrast, the marriage of the NSA’s technology to the Internet’s data hubs now allows the agency’s 37,000 employees a similarly close coverage of the entire globe with just one operative for every 200,000 people on the planet
  • Through the expenditure of $250 million annually under its Sigint Enabling Project, the NSA has stealthily penetrated all encryption designed to protect privacy. “In the future, superpowers will be made or broken based on the strength of their cryptanalytic programs,” reads a 2007 NSA document. “It is the price of admission for the U.S. to maintain unrestricted access to and use of cyberspace.” By collecting knowledge -- routine, intimate, or scandalous -- about foreign leaders, imperial proconsuls from ancient Rome to modern America have gained both the intelligence and aura of authority necessary for dominion over alien societies. The importance, and challenge, of controlling these local elites cannot be overstated. During its pacification of the Philippines after 1898, for instance, the U.S. colonial regime subdued contentious Filipino leaders via pervasive policing that swept up both political intelligence and personal scandal. And that, of course, was just what J. Edgar Hoover was doing in Washington during the 1950s and 1960s.
  • Indeed, the mighty British Empire, like all empires, was a global tapestry woven out of political ties to local leaders or “subordinate elites” -- from Malay sultans and Indian maharajas to Gulf sheiks and West African tribal chiefs. As historian Ronald Robinson once observed, the British Empire spread around the globe for two centuries through the collaboration of these local leaders and then unraveled, in just two decades, when that collaboration turned to “non-cooperation.” After rapid decolonization during the 1960s transformed half-a-dozen European empires into 100 new nations, their national leaders soon found themselves the subordinate elites of a spreading American global imperium. Washington suddenly needed the sort of private information that could keep such figures in line. Surveillance of foreign leaders provides world powers -- Britain then, America now -- with critical information for the exercise of global hegemony. Such spying gave special penetrating power to the imperial gaze, to that sense of superiority necessary for dominion over others.  It also provided operational information on dissidents who might need to be countered with covert action or military force; political and economic intelligence so useful for getting the jump on allies in negotiations of all sorts; and, perhaps most important of all, scurrilous information about the derelictions of leaders useful in coercing their compliance.
  • In late 2013, the New York Times reported that, when it came to spying on global elites, there were “more than 1,000 targets of American and British surveillance in recent years,” reaching down to mid-level political actors in the international arena. Revelations from Edward Snowden’s cache of leaked documents indicate that the NSA has monitored leaders in some 35 nations worldwide -- including Brazilian president Dilma Rousseff, Mexican presidents Felipe Calderón and Enrique Peña Nieto, German Chancellor Angela Merkel, and Indonesia’s president Susilo Bambang Yudhoyono.  Count in as well, among so many other operations, the monitoring of “French diplomatic interests” during the June 2010 U.N. vote on Iran sanctions and “widespread surveillance” of world leaders during the Group 20 summit meeting at Ottawa in June 2010. Apparently, only members of the historic “Five Eyes” signals-intelligence alliance (Australia, Canada, New Zealand, and Great Britain) remain exempt -- at least theoretically -- from NSA surveillance. Such secret intelligence about allies can obviously give Washington a significant diplomatic advantage. During U.N. wrangling over the U.S. invasion of Iraq in 2002-2003, for example, the NSA intercepted Secretary-General Kofi Anan’s conversations and monitored the “Middle Six” -- Third World nations on the Security Council -- offering what were, in essence, well-timed bribes to win votes. The NSA’s deputy chief for regional targets sent a memo to the agency’s Five Eyes allies asking “for insights as to how membership is reacting to on-going debate regarding Iraq, plans to vote on any related resolutions [..., and] the whole gamut of information that could give U.S. policymakers an edge in obtaining results favorable to U.S. goals.”
  • Indicating Washington’s need for incriminating information in bilateral negotiations, the State Department pressed its Bahrain embassy in 2009 for details, damaging in an Islamic society, on the crown princes, asking: “Is there any derogatory information on either prince? Does either prince drink alcohol? Does either one use drugs?” Indeed, in October 2012, an NSA official identified as “DIRNSA,” or Director General Keith Alexander, proposed the following for countering Muslim radicals: “[Their] vulnerabilities, if exposed, would likely call into question a radicalizer’s devotion to the jihadist cause, leading to the degradation or loss of his authority.” The agency suggested that such vulnerabilities could include “viewing sexually explicit material online” or “using a portion of the donations they are receiving… to defray personal expenses.” The NSA document identified one potential target as a “respected academic” whose “vulnerabilities” are “online promiscuity.”
  • Just as the Internet has centralized communications, so it has moved most commercial sex into cyberspace. With an estimated 25 million salacious sites worldwide and a combined 10.6 billion page views per month in 2013 at the five top sex sites, online pornography has become a global business; by 2006, in fact, it generated $97 billion in revenue. With countless Internet viewers visiting porn sites and almost nobody admitting it, the NSA has easy access to the embarrassing habits of targets worldwide, whether Muslim militants or European leaders. According to James Bamford, author of two authoritative books on the agency, “The NSA's operation is eerily similar to the FBI's operations under J. Edgar Hoover in the 1960s where the bureau used wiretapping to discover vulnerabilities, such as sexual activity, to ‘neutralize’ their targets.”
  • Indeed, whistleblower Edward Snowden has accused the NSA of actually conducting such surveillance.  In a December 2013 letter to the Brazilian people, he wrote, “They even keep track of who is having an affair or looking at pornography, in case they need to damage their target's reputation.” If Snowden is right, then one key goal of NSA surveillance of world leaders is not U.S. national security but political blackmail -- as it has been since 1898. Such digital surveillance has tremendous potential for scandal, as anyone who remembers New York Governor Eliot Spitzer’s forced resignation in 2008 after routine phone taps revealed his use of escort services; or, to take another obvious example, the ouster of France’s budget minister Jérôme Cahuzac in 2013 following wire taps that exposed his secret Swiss bank account. As always, the source of political scandal remains sex or money, both of which the NSA can track with remarkable ease.
  • By starting a swelling river of NSA documents flowing into public view, Edward Snowden has given us a glimpse of the changing architecture of U.S. global power. At the broadest level, Obama’s digital “pivot” complements his overall defense strategy, announced in 2012, of reducing conventional forces while expanding into the new, cost-effective domains of space and cyberspace. While cutting back modestly on costly armaments and the size of the military, President Obama has invested billions in the building of a new architecture for global information control. If we add the $791 billion expended to build the Department of Homeland Security bureaucracy to the $500 billion spent on an increasingly para-militarized version of global intelligence in the dozen years since 9/11, then Washington has made a $1.2 trillion investment in a new apparatus of world power.
  • So formidable is this security bureaucracy that Obama’s recent executive review recommended the regularization, not reform, of current NSA practices, allowing the agency to continue collecting American phone calls and monitoring foreign leaders into the foreseeable future. Cyberspace offers Washington an austerity-linked arena for the exercise of global power, albeit at the cost of trust by its closest allies -- a contradiction that will bedevil America’s global leadership for years to come. To update Henry Stimson: in the age of the Internet, gentlemen don't just read each other’s mail, they watch each other’s porn. Even if we think we have nothing to hide, all of us, whether world leaders or ordinary citizens, have good reason to be concerned.
Paul Merrell

2014 Press Release - NSA Announces New Civil Liberties and Privacy Officer" - 0 views

  • GEN Keith Alexander - Commander, U.S. Cyber Command/Director, NSA/Chief, CSS - announced today that well-known privacy expert Rebecca Richards will serve as the National Security Agency's new Civil Liberties and Privacy Officer. She most recently worked as the Senior Director for Privacy Compliance at the Department of Homeland Security.
  • Selected to lead the new NSA Civil Liberties and Privacy Office at the agency's Fort Meade headquarters, Ms. Richards' primary job will be to provide expert advice to the Director and oversight of NSA's civil liberties and privacy related activities. She will also develop measures to further strengthen NSA's privacy protections.
  •  
    Softball Interview here. . I wasn't really expecting Obama to reach out to the ACLU and EFF for a good civil liberties lawyer recommendation, but this appointment is lame, the former Director of Privacy for Dept. of Homeland Security, those wonderful folk who keep the homeland safe from terra-ists. The airport gropers, secret no-fly listers, and masters of border protection, where all Constitutional privacy rights do not apply, per the Supreme Court., the coordinators of our glorious "fusion centers," the provisioners of funding for armored cars and surveillance equipment for local police, etc. A sample from her interview linked above that I transcribed (omitting all the umhs and ahs): "When you think about NSA, privacy there for them was privacy of its employees, about contractors, about the average person walking down the street - it was not as concentrated on, this is the big collection that we're getting through these means, and so what this job does is that it brings it up under direct reports to the director of NSA and it is just as a focal point, to bring all of those and -- I walked in the building and people were already asking questions so ..." Heaven help us; has this lassie's brain yet matured to the point of completing her first sentence? This is the lady who is going to keep Admiral Rogers on the straight and narrow path of respecting our civil liberties? I suspect not.  I may return to this inarticulate and non-assertive young lady in later posts. Let it suffice for now to observe that the Dept. of Homeland Security, whose raison d'etre is a virtually non-existent terrorist threat manufactured by the politics of fear, has not exactly been a champion of the People's civil liberties. Moreover, I've had recent occasion to dig rather deeply into exactly what it is that Privacy Officers do and don't do. Telling heads of agencies that they cannot lawfully do what they want to do is no
Paul Merrell

US criticised by UN for human rights failings on NSA, guns and drones | World news | th... - 0 views

  • The US came under sharp criticism at the UN human rights committee in Geneva on Thursday for a long list of human rights abuses that included everything from detention without charge at Guantánamo, drone strikes and NSA surveillance, to the death penalty, rampant gun violence and endemic racial inequality.At the start of a two-day grilling of the US delegation, the committee’s 18 experts made clear their deep concerns about the US record across a raft of human rights issues. Many related to faultlines as old as America itself, such as guns and race.Other issues were relative newcomers. The experts raised questions about the National Security Agency’s surveillance of digital communications in the wake of Edward Snowden’s revelations. It also intervened in this week’s dispute between the CIA and US senators by calling for declassification and release of the 6,300-page report into the Bush administration’s use of torture techniques and rendition that lay behind the current CIA-Senate dispute.The committee is charged with upholding the International Covenant on Civil and Political Rights (ICCPR), a UN treaty that the US ratified in 1992. The current exercise, repeated every five years, is a purely voluntarily review, and the US will face no penalties should it choose to ignore the committee’s recommendations, which will appear in a final report in a few weeks’ time.
  • But the US is clearly sensitive to suggestions that it fails to live up to the human rights obligations enshrined in the convention – as signalled by the large size of its delegation to Geneva this week. And as an act of public shaming, Thursday’s encounter was frequently uncomfortable for the US.The US came under sustained criticism for its global counter-terrorism tactics, including the use of unmanned drones to kill al-Qaida suspects, and its transfer of detainees to third countries that might practice torture, such as Algeria. Committee members also highlighted the Obama administration’s failure to prosecute any of the officials responsible for permitting waterboarding and other “enhanced interrogation” techniques under the previous administration.Walter Kälin, a Swiss international human rights lawyer who sits on the committee, attacked the US government’s refusal to recognise the convention’s mandate over its actions beyond its own borders. The US has asserted since 1995 that the ICCPR does not apply to US actions beyond its borders - and has used that “extra-territoriality” claim to justify its actions in Guantánamo and in conflict zones.
  • This world is an unsafe place,” Kälin said. “Will it not become even more dangerous if any state would be willing to claim that international law does not prevent them from committing human rights violations abroad?”Kälin went on to express astonishment at some of America’s more extreme domestic habits. He pointed to the release this week in Louisiana of Glenn Ford, the 144th person on death row in the US to be exonerated since 1973, saying: “One hundred and forty-four cases of people wrongfully convicted to death is a staggering number.”Pointing out the disproportional representation of African Americans on death rows, he added: “Discrimination is bad, but it is absolutely unacceptable when it leads to death.”
  • ...1 more annotation...
  • Among the other issues that came under the committee’s withering gaze were:· the proliferation of stand-your-ground gun laws· enduring racial disparities in the justice system, including large numbers of black prisoners serving longer sentences than whites;· mistreatment of mentally-ill and juvenile prisoners;· segregation in schools;· high levels of homelessness and criminalization of homeless people;· racial profiling by police, including the mass surveillance of Muslim communities by the New York police department.
Gary Edwards

REVEALING QUOTES ON THE GOALS OF PSYCHIATRY AND PSYCHOLOGY - 0 views

  • Psychiatry's Views on Conservatives "In August 2003, the National Institute of Mental Health (NIMH) and the National Science Foundation (NSF) announced the results of their $1.2 million taxpayer-funded study. It stated, essentially, that traditionalists are mentally disturbed. Scholars from the Universities of Maryland, California at Berkeley, and Stanford had determined that social conservatives, in particular, suffer from ‘mental rigidity,’ ‘dogmatism,’ and ‘uncertainty avoidance,’ together with associated indicators for mental illness."
  • Psychiatry's Views on Education "Every child in America entering school at the age of five is insane because he comes to school with certain allegiances to our founding fathers, toward our elected officials, toward his parents, toward a belief in a supernatural being, and toward the sovereignty of this nation as a separate entity. It’s up to you as teachers to make all these sick children well – by creating the international child of the future"
  • Teaching school children to read was a "perversion" and high literacy rate bred "the sustaining force behind individualism."
  • ...59 more annotations...
  • You see, one of the effects of self-esteem (Values Clarification) programs is that you are no longer obliged to tell the truth if you don’t feel like it. You don’t have to tell the truth because if the truth you have to tell is about your own failure then your self-esteem will go down and that is unthinkable."
  • The social psychologist of the future will have a number of classes of school children on whom they will try different methods of producing an unshakable conviction that snow is black. Various results will soon be arrived at: first, that influences of the home are 'obstructive' and verses set to music and repeatedly intoned are very effective ..
  • When the technique has been perfected, every government that has been in charge of education for more than one generation will be able to control its subjects securely without the need of armies or policemen."
  • "…through schools of the world we shall disseminate a new conception of government – one that will embrace all of the collective activities of men; one that will postulate the need for scientific control and operation of economic activities in the interests of all people."
  • "Education does not mean teaching people to know what they do not know – it means teaching them to behave as they do not behave." 
  • "This is the idea where we drop subject matter and we drop Carnegie Unites (grading from A-F) and we just let students find their way, keeping them in school until they manifest the politically correct attitudes.
  • "I regard myself as one of the most dangerous enemies of religion" Sigmund Freud
  • "Education is thus a most power ally of humanism, and every public school is a school of humanism. What can the theistic Sunday school, meeting for an hour once a week, and teaching only a fraction of the children, do to stem the tide of a five-day program of humanistic teachings?"
  • "Despite rapid progress in the right direction, the program of the average elementary school has been primarily devoted to teaching the fundamental subjects, the three R’s, and closely related disciplines… Artificial exercises, like drills on phonetics, multiplication tables, and formal writing movements, are used to a wasteful degree. Subjects such as arithmetic, language, and history include content that is intrinsically of little value. Nearly every subject is enlarged unwisely to satisfy the academic ideal of thoroughness… Elimination of the unessential by scientific study, then, is one step in improving the curriculum."
  • "We can therefore justifiably stress our particular point of view with regard to the proper development of the human psyche, even though our knowledge be incomplete. We must aim to make it permeate every educational activity in our national life…. We have made a useful attack upon a number of professions. The two easiest of them naturally are the teaching profession and the Church: the two most difficult are law and medicine."
  • "...a student attains 'higher order thinking' when he no longer believes in right or wrong"
  • "A large part of what we call good teaching is a teacher´s ability to obtain affective objectives by challenging the student's fixed beliefs.  …a large part of what we call teaching is that the teacher should be able to use education to reorganize a child's thoughts, attitudes, and feelings."  
  • "Education should aim at destroying free will so that after pupils are thus schooled they will be incapable throughout the rest of their lives of thinking or acting otherwise than as their school masters would have wished
  • Psychiatry's Views on Religion "Religion (is) a universal obsessional neurosis." Sigmund Freud, defining spiritual belief
  • "The educational system should be a sieve, through which all the children of a country are passed. It is highly desirable that no child escape inspection."
  • "The soul or consciousness, which played the leading part in the past, now is of very little importance; in any case both are deprived of their main functions and glory to such an extent that only the names remain. Behaviorism sang their funeral dirge while materialism – the smiling heir – arranges a suitable funeral for them.
  • "…humanists still believe that traditional theism, especially faith in the prayer-hearing God, assumed to love and care for persons, to hear and understand their prayers, and to be able to do something about them, is an unproved and outmoded faith." "
  • "We can therefore justifiably stress our particular point of view with regard to the proper development of the human psyche, even though our knowledge be incomplete. We must aim to make it permeate every educational activity in our national life…. We have made a useful attack upon a number of professions. The two easiest of them naturally are the teaching profession and the Church: the two most difficult are law and medicine."
  • We shall not solve the problems of alcoholism and juvenile delinquency by increasing a sense of responsibility. It is the environment which is 'responsible' for the objectionable behavior, and it is the environment, not some attribute of the individual, which must be changed.
  • Psychiatry's Views on Creating a Slave Society "We can choose to use our growing knowledge to enslave people in ways never dreamed of before, depersonalizing them, controlling them by means so carefully selected that they will perhaps never be aware of their loss of personhood."
  • Teaching school children to read was a "perversion" and high literacy rate bred "the sustaining force behind individualism."
  • "It will of course, be understood that directly or indirectly, soon or late, every advance in the sciences of human nature will contribute to our success in controlling human nature and changing it to the advantage of the common wheel." Edward Thorndike, Key Psychology Theorist, member of the "Eugenics Committee of the USA"
  • "We need a program of psychosurgery for political control of our society. The purpose is physical control of the mind. Everyone who deviates from the given norm can be surgically mutilated.
  • The individual may think that the most important reality is his own existence, but this is only his personal point of view. . . Man does not have the right to develop his own mind. . . . We must electronically control the brain. Someday armies and generals will be controlled by electronic stimulation of the brain." 
  • "Education should aim at destroying free will so that after pupils are thus schooled they will be incapable throughout the rest of their lives of thinking or acting otherwise than as their school masters would have wished
  • "One of the least understood strategies of the world revolution now moving rapidly toward its goal is the use of mind control as a major means of obtaining the consent of the people who will be subjects of the New World Order."
  • "Those of us who work in this field see a developing potential for nearly a total control of human emotional status, mental functioning, and will to act. These human phenomena can be started, stopped or eliminated by the use of various types of chemical substances. What we can produce with our science now will affect the entire society." A "utopia" could be found – providing "a sense of stability and certainty, whether realistic or not."
  • "To achieve world government, it is necessary to remove from the minds of men their individualism, loyalty to family traditions, national patriotism and religious dogmas..."
  • Some packages even include instructions on how to deal with parents and others who object. Stripping away psychological defenses can be done through assignments to keep diaries to be discussed in group sessions, and through role-playing assignments, both techniques used in the original brainwashing programs in China under Mao. Thomas Sowell, writing in Forbes, 1991
  • "The State is the absolute reality and the individual himself has objective existence, truth and morality only in his capacity as a member of the State." Hegel (who influenced Karl Marx)
  • Psychiatry's Views on America "America is a mistake, admittedly a gigantic mistake, but a mistake nevertheless." Sigmund Freud America is the most grandiose experiment the world has seen, but, I am afraid, it is not going to be a success. Sigmund Freud
  • "To achieve world government, it is necessary to remove from the minds of men their individualism, loyalty to family traditions, national patriotism and religious dogmas...
  • "One of the least understood strategies of the world revolution now moving rapidly toward its goal is the use of mind control as a major means of obtaining the consent of the people who will be subjects of the New World Order."
  • Freud on Marxism "The strength of Marxism obviously does not lie in its view of history or in the prophecies about the future which it bases upon that view, but in its clear insight into the determining influence which is exerted by the economic conditions of man upon his intellectual, ethical and artistic reactions." Sigmund Freud
  • Basically, all that is necessary to revoke all the constitutional rights of any citizen is to accuse him of being mentally-ill."
  • John A. Stormer, "None Dare Call it Treason"
  • "Old conventions, customs and values… to be challenged… The aim should be to control not only nature, but human nature." He recommended two slogans for "spreading world-wide the gospel of mental hygiene": "To learn to think internationally" and "The necessity to disarm the mind." Dr. J.R. Lord, psychiatrist
  • "Public life, politics and industry should all of them be within our sphere of influence…. If we are to infiltrate the professional and social activities of other people I think we must imitate the Totalitarians and organize some kind of fifth column activity!  If better ideas on mental health are to progress and spread we, as the salesmen, must lose our identity… Let us all, therefore, very secretly be ‘fifth columnists.’"
  • The techniques of brainwashing developed in totalitarian countries are routinely used in psychological conditioning programs imposed on school children.
  • These include emotional shock and desensitization, psychological isolation from sources of support, stripping away defenses, manipulative cross-examination of the individual’s underlying moral values by psychological rather than rational means. These techniques are not confined to separate courses or programs...they are not isolated idiosyncracies of particular teachers. They are products of numerous books and other educational materials in programs packaged by organizations that sell such curricula to administrators and teach the techniques to teachers.
  • "If all else fails, punishable behavior may be made less likely by changing physiological conditions. Hormones may be used to change sexual behavior, surgery (as in lobotomy) to control violence, tranquilizers to control aggression, and appetite depressants to control overeating." Harvard psychologist B.F. Skinner in "Beyond Freedom and Dignity"
  • We must learn to recognize them for what they are - possessors of no special knowledge of the human psyche, who have, nonetheless, chosen to earn their living from the dissemination of the myth that they do indeed know how the mind works". Psychiatrist Garth Wood, M.D., in "The Myth of Neurosis", 1986
  • These terms indicate only approval or disapproval of some aspect of a person's mentality (thinking, emotions, or behavior). Psychiatrist E. Fuller Torrey, in "The Death of Psychiatry", 1974
  • "The very term ['mental disease'] is nonsensical, a semantic mistake. The two words cannot go together except metaphorically; you can no more have a mental 'disease' than you can have a purple idea or a wise space". Similarly, there can no more be a "mental illness" than there can be a "moral illness." The words "mental" and "illness" do not go together logically. Mental "illness" does not exist, and neither does mental "health."
  • By calling the harmless 'insane', (who statistics prove to be no more violence-prone than the average citizen, unless hopelessly deranged by damaging psychiatric 'treatment'), dangerous and justifying their own existence by the 'need' to deal with that inflated 'danger', the mad-doctors themselves pose the greatest threat to liberty, property and democracy in our times."
  • Citizens for Higher Ethical Standards in Medicine
  • "Mental illness is often used as an ad homonym to discredit the individual. This has been a common use of psychiatric diagnosis in psychiatry in Russia. " ... there are two main groups [of schizophrenia patients] ... 1) people admitted to the mental hospital long before they had been political dissenters ... 2. others who ... have put forward complex social and economic theories as alternatives to orthodox Marxism..."  Wing, cited in "Pseudoscience in Psychology", by Dr. Szasz, p. 126
  • "It is no measure of health to be well adjusted to a profoundly sick society.." J. Krishnamurti
  • "...the subject which will be of most importance politically is Mass Psychology.... The populace will not be allowed to know how its convictions were generated. When the technique has been perfected, every government that has been in charge of education for a generation will be able to control its subjects securely without the need of armies or policemen. As yet there is only one country which has succeeded in creating this politician’s paradise."   The Impact of Science on Society by Bertrand Russell
  • "A Trojan horse full of dangerous psycho-fantasies has been professionally prepared for us by Christian psychiatrists and psychologists...  At the base, such therapies stand upon dogma, not scientific observations, and the dogma is the odious one of Freud and his followers who were some of the century's most anti-Christ teachers.  No amount of well-intentioned refinement of deadly doctrines will make them clean for Christians." Dr. Hilton P. Terrell, M.D
  • "Contrary to the popular public conception, this happenstance is NOT a form of health care, but the result of a fraudulent system being granted police powers by the State.
  • "Psychotherapy may be known in the future as the greatest hoax of the twentieth century."
  • "Nearly half a century has passed since Watson proclaimed his manifesto. Today, apart from a few minor reservations, the vast majority of psychologists, both in this country and in America, still follow his lead. The result, as a cynical onlooker might be tempted to say, is that psychology, having first bargained away its soul and then gone out of its mind, seems now, as it faces an untimely end, to have lost all consciousness." 
  • "Advocates of psychiatric drugs often claim that the medications improve learning and the ability to benefit from psychotherapy, but the contrary is true.  There are no drugs that improve mental function, self-understanding, or human relations.  Any drug that affects mental processes does so by impairing them."
  • "In the 14-year period between 1950 and 1964, more American deaths occurred in state and county mental institutions than in all of the nation's armed conflicts beginning with the Revolutionary War and ending with the Persian Gulf War.  Between 1965 and 1990, the total number of mental-hospital inpatient deaths exceeded the number of battle deaths in the same wars by 70 percent.  Inpatient deaths topped out at 1,103,000 during this 25-year period, compared with 650,563 recorded deaths in battles."
  • Kelly Patricia O’Meara: "The Forgotten Dead of St. Elizabeth's", Insight Magazine, June 16, 2001
  • "The similarities between street drug abuse and psychotropic prescription drug use are disturbing. Both types are toxic. Both can cause psychosis, damage the brain and other organs, and even cause death. And neither type of mind-altering drugs, legal or illegal, treats disease. It's important to recognize that the only significant difference between many prescription psychotropic drugs and street drugs such as "speed" and "downers" is that prescription drugs are legal."
  • Neuro-psychiatrist Sydney Walker in "Dose of Sanity"
  • "Clearly this business of treating minds, particularly this big business of treating young minds, has not policed itself, and has no incentive to put a stop to the kinds of fraudulent and unethical practices that are going on."
Paul Merrell

What's Scarier: Terrorism, or Governments Blocking Websites in its Name? - The Intercept - 0 views

  • Forcibly taking down websites deemed to be supportive of terrorism, or criminalizing speech deemed to “advocate” terrorism, is a major trend in both Europe and the West generally. Last month in Brussels, the European Union’s counter-terrorism coordinator issued a memo proclaiming that “Europe is facing an unprecedented, diverse and serious terrorist threat,” and argued that increased state control over the Internet is crucial to combating it. The memo noted that “the EU and its Member States have developed several initiatives related to countering radicalisation and terrorism on the Internet,” yet argued that more must be done. It argued that the focus should be on “working with the main players in the Internet industry [a]s the best way to limit the circulation of terrorist material online.” It specifically hailed the tactics of the U.K. Counter-Terrorism Internet Referral Unit (CTIRU), which has succeeded in causing the removal of large amounts of material it deems “extremist”:
  • In addition to recommending the dissemination of “counter-narratives” by governments, the memo also urged EU member states to “examine the legal and technical possibilities to remove illegal content.” Exploiting terrorism fears to control speech has been a common practice in the West since 9/11, but it is becoming increasingly popular even in countries that have experienced exceedingly few attacks. A new extremist bill advocated by the right-wing Harper government in Canada (also supported by Liberal Party leader Justin Trudeau even as he recognizes its dangers) would create new crimes for “advocating terrorism”; specifically: “every person who, by communicating statements, knowingly advocates or promotes the commission of terrorism offences in general” would be a guilty and can be sent to prison for five years for each offense. In justifying the new proposal, the Canadian government admits that “under the current criminal law, it is [already] a crime to counsel or actively encourage others to commit a specific terrorism offence.” This new proposal is about criminalizing ideas and opinions. In the government’s words, it “prohibits the intentional advocacy or promotion of terrorism, knowing or reckless as to whether it would result in terrorism.”
  • If someone argues that continuous Western violence and interference in the Muslim world for decades justifies violence being returned to the West, or even advocates that governments arm various insurgents considered by some to be “terrorists,” such speech could easily be viewed as constituting a crime. To calm concerns, Canadian authorities point out that “the proposed new offence is similar to one recently enacted by Australia, that prohibits advocating a terrorist act or the commission of a terrorism offence-all while being reckless as to whether another person will engage in this kind of activity.” Indeed, Australia enacted a new law late last year that indisputably targets political speech and ideas, as well as criminalizing journalism considered threatening by the government. Punishing people for their speech deemed extremist or dangerous has been a vibrant practice in both the U.K. and U.S. for some time now, as I detailed (coincidentally) just a couple days before free speech marches broke out in the West after the Charlie Hebdo attacks. Those criminalization-of-speech attacks overwhelmingly target Muslims, and have resulted in the punishment of such classic free speech activities as posting anti-war commentary on Facebook, tweeting links to “extremist” videos, translating and posting “radicalizing” videos to the Internet, writing scholarly articles in defense of Palestinian groups and expressing harsh criticism of Israel, and even including a Hezbollah channel in a cable package.
  • ...2 more annotations...
  • Beyond the technical issues, trying to legislate ideas out of existence is a fool’s game: those sufficiently determined will always find ways to make themselves heard. Indeed, as U.S. pop star Barbra Streisand famously learned, attempts to suppress ideas usually result in the greatest publicity possible for their advocates and/or elevate them by turning fringe ideas into martyrs for free speech (I have zero doubt that all five of the targeted sites enjoyed among their highest traffic dates ever today as a result of the French targeting). But the comical futility of these efforts is exceeded by their profound dangers. Who wants governments to be able to unilaterally block websites? Isn’t the exercise of this website-blocking power what has long been cited as reasons we should regard the Bad Countries — such as China and Iran — as tyrannies (which also usually cite “counterterrorism” to justify their censorship efforts)?
  • s those and countless other examples prove, the concepts of “extremism” and “radicalizing” (like “terrorism” itself) are incredibly vague and elastic, and in the hands of those who wield power, almost always expand far beyond what you think it should mean (plotting to blow up innocent people) to mean: anyone who disseminates ideas that are threatening to the exercise of our power. That’s why powers justified in the name of combating “radicalism” or “extremism” are invariably — not often or usually, but invariably — applied to activists, dissidents, protesters and those who challenge prevailing orthodoxies and power centers. My arguments for distrusting governments to exercise powers of censorship are set forth here (in the context of a prior attempt by a different French minister to control the content of Twitter). In sum, far more damage has been inflicted historically by efforts to censor and criminalize political ideas than by the kind of “terrorism” these governments are invoking to justify these censorship powers. And whatever else may be true, few things are more inimical to, or threatening of, Internet freedom than allowing functionaries inside governments to unilaterally block websites from functioning on the ground that the ideas those sites advocate are objectionable or “dangerous.” That’s every bit as true when the censors are in Paris, London, and Ottawa, and Washington as when they are in Tehran, Moscow or Beijing.
Paul Merrell

Belgium on "Red Alert": Gov Suspects Terrorist Attack including Chemical Weapon - nsnbc... - 0 views

  • The Belgian OCAM Crisis Center and the government raised the country’s “terror alert” to the highest level, warning about the imminent risk for a terrorist attack. The measure comes one week after the attacks in Paris that claimed 129 lives and injured hundreds. Experts warn about the possible use of a chemical weapon.
  • The OCAM and the Belgian government announced a “red alert” for Brussels and the region around Brussels, warning that a serious terrorist attack may be imminent. The Belgian Interior Ministry issued a statement, saying: “The analysis shows a serious and imminent threat requiring specific security measures as well as detailed recommendations to the population.” The Belgian capital resembles a city under siege with police and military deployed while a large number of citizens have been scared into staying at home and avoiding public places as much as possible. The OCAM, in fact, called on residents in Brussels and the region around the city to avoid crowded places including transport hubs.
  • Several Belgian security analysts warned about the risk of the possible use of an improvised chemical weapon. Within this context it is noteworthy that chemical weapons attacks in Syria, especially that in the Damascus suburb East Ghouta, has been proven to have been carried out by the Saudi Arabian intelligence asset Liwa-al-Islam. The attack implicated the highest levels of Saudi and US governments, military and intelligence services. Belgium hosts the headquarters of the North Atlantic Treaty Organization (NATO / OTAN) as well as the European Union (EU). Belgian officials declined to provide additional information about the alleged imminent threat, stating that there was a need for time to allow for the ongoing police and judicial investigation to take its course. Hours before the announcement of the “red alert” authorities charged a third “unnamed” suspect who had been arrested the day before for involvement in the terrorist attacks in Paris on Friday, November 13.
Paul Merrell

Loopholes, Filing Failures, and Lax Enforcement: How the Foreign Agents Registration Ac... - 0 views

  • Why This Matters The Foreign Agents Registration Act requires American lobbyists working on behalf of foreign clients to disclose significantly more information about their activities than what is required of domestic lobbyists. This includes the actual documents used to influence policy makers, called informational materials. These materials include draft legislation, speeches, press releases and more, all created to influence U.S. policy. But the lobbyists do not always follow the letter of the law and enforcement by the Justice Department has been lax in recent years. Furthermore, the law itself seems to have loopholes that make enforcement difficult if not impossible. The Foreign Agents Registration Act is intended to bring transparency into the world of foreign lobbying. But when American lobbyists working on behalf of foreign interests fail to follow the law, or the Justice Department fails to enforce it, the American people are left in the dark.
  • Why This Matters The Foreign Agents Registration Act requires American lobbyists working on behalf of foreign clients to disclose significantly more information about their activities than what is required of domestic lobbyists. This includes the actual documents used to influence policy makers, called informational materials. These materials include draft legislation, speeches, press releases and more, all created to influence U.S. policy. But the lobbyists do not always follow the letter of the law and enforcement by the Justice Department has been lax in recent years. Furthermore, the law itself seems to have loopholes that make enforcement difficult if not impossible. The Foreign Agents Registration Act is intended to bring transparency into the world of foreign lobbying. But when American lobbyists working on behalf of foreign interests fail to follow the law, or the Justice Department fails to enforce it, the American people are left in the dark.
  • Executive Summary The Foreign Agents Registration Act (FARA) requires that all American citizens working to influence U.S. policy on behalf of foreign governments register with the Department of Justice and to disclose information on any and all political activity in which they engaged for foreign clients. This includes filing, within 48 hours, any informational materials disseminated to two or more people.
  • ...7 more annotations...
  • Table of Contents Executive SummaryIntroductionBackgroundWhat the Foreign Influence Database ShowsEgypt: A Case Study Of Foreign InfluenceSame-Day ContributionsSystemic Foreign InfluenceQuid Pro Quo or Coincidence?Foreign Money and the LawLax Compliance with and Enforcement of FARAEnforcementConclusionRecommendationsEndnotes
  • The law requires lobbyists for foreign interests to plainly and conspicuously identify themselves as such in any materials distributed in the course of their lobbying—for example, emails, other correspondence, or publications. We found that many documents filed with the Justice Department lack this identification statement; furthermore, many lobbyists admitted that they did not comply with this requirement. More than half (51 percent) of the registrants we examined in a sample from 2010 checked a box on a the semi-annual Justice Department questionnaire saying they had filed informational materials, and checked another box saying they had not met the legal requirement that they identify themselves in those materials as working on behalf of foreign interests. Toby Moffett, a former Member of Congress from Connecticut who is now Chairman of the Moffett Group and one of its registered lobbyists, told POGO that “Around the edges there’s a lot of loosey-goosey stuff going on. People representing foreign interests and not reporting.”[4] But even when lobbyists do report to the Justice Department, the information they provide is not easily accessible to the public. Astonishingly, informational materials are not available online, despite the fact that the Justice Department has an electronic filing system. Instead, these documents are kept in an office at the Justice Department that is only open for four hours each weekday. Hard copies of the documents are kept in folders that are often disorganized and susceptible to misfiling. This archaic system undermines the intended transparency of the law.
  • We set out to determine the extent to which lobbyists for foreign interests were filing lobbying materials at the Justice Department within the required time frame. Based on a review of filings made in 2012, in those instances where it was possible to answer the question, POGO estimates that almost half—46 percent—were filed late. Fifteen percent were filed more than 30 business days after they were distributed, and 12 percent were filed more than 100 business days after they were distributed. In many instances, the Justice Department would be hard pressed to enforce the filing deadline. Based on the records the Department maintains to enforce the law, we found that in more than a quarter (26 percent) of the 2012 filings, it was impossible to determine whether the lobbyists complied. For example, in many cases, the records did not show when the lobbyists disseminated the materials to the targets of their lobbying. In a glaring omission, the law does not require lobbyists to provide that information. Without it, there may be no way for the government or the public to know whether lobbying materials were filed on time.
  • Though federal law bars foreign money from U.S. political campaigns, there appears to be a gray area in the law that can let in such money indirectly. POGO found many instances in which members of lobbying firms made political contributions to Members of Congress on the same day that those firms were lobbying the Members of Congress or their legislative staffs on behalf of foreign clients.[1] Lobbyists who fail to comply with certain FARA requirements may have little to fear from the Justice Department. “The cornerstone of the Registration Unit’s enforcement efforts is encouraging voluntary compliance,” a Justice Department website says.[2] When lobbyists do not voluntarily comply, the Justice Department rarely uses one of the key tools at its disposal to enforce the law—seeking a court injunction. A representative of the Department’s FARA unit told POGO: “While the FARA statute and regulations authorize the pursuit of formal legal proceedings, such as injunctive remedy options, the FARA Unit [has] not pursued injunctive remedy options recently and has instead utilized other mechanisms to achieve compliance.”[3] It appears that some registered foreign agents have been distributing materials but not filing them with the Justice Department. It’s unclear the extent to which that illustrates a lack of compliance with the law or loopholes in the law. In the process of researching this report, POGO noticed that many more lobbyists were registering as foreign agents than had filed informational materials that we could locate at the FARA office. To determine what was happening, we looked at a sampling of questionnaires that the Justice Department requires registered agents to complete every six months. Some checked one box indicating they had distributed materials and another box stating they did not file them with the FARA office.
  • The Project On Government Oversight examined thousands of these materials spanning four years, as well as additional public records related to the Justice Department’s oversight of lobbyists for foreign interests. We found that lobbyists for foreign interests have routinely failed to comply with the law—a failure that prevents journalists and watchdogs from scrutinizing the lobbying activities while foreign interests are trying to influence U.S. policy. We found a pattern of lax enforcement of FARA requirements by the Justice Department. We found that the Justice Department office responsible for administering the law is a record-keeping mess. And we found loopholes in the law that often makes it difficult if not impossible for the government to police compliance or to discipline lobbyists who fail to comply. Here are some highlights of our investigation:
  • When lobbyists for foreign interests do not follow the law, when the U.S. government fails to enforce it, and when the Justice Department makes it difficult for the American people to access records to which they are legally entitled, the public is left in the dark. To bring more transparency to this opaque realm, POGO has made four years of informational materials available for the first time online with our Foreign Influence Database, allowing the public to see how lobbyists attempt to influence American policies on behalf of their foreign clients.
  • With the release of the Foreign Influence Database, the Project On Government Oversight (POGO) is making years of documents from this key set of FARA filings electronically available for the first time. The materials were previously only available in hard copy at the FARA Registration Unit in Washington, DC, which is only open to the public from 11am to 3pm on weekdays.[12] In this digital age it is surprising that these materials could not be read online and are instead stored in file folders, where they are disorganized and susceptible to misfiling. Even those that were electronically filed by the registrants are not available to the public in an electronic format. POGO’s database includes informational materials filed in 2009, 2010, 2011, and 2012.[13]
  •  
    POGO does thorough work and doesn't let up until it gets results. Forcing DoJ to puts its foreign agents registration materials online should be a fairly trivial battle. The real war, though, will be forcing better enforcement. The new database is at http://www.pogo.org/tools-and-data/foreign-influence-database/ I punched up the word "Israel" and came up with 113 documents in the search results. Each search hit lists the name of the nation involved that the lobbying was done for. Of those 113 document hits, only two were for the nation of Israel, both for its Ministry of Tourism. The rest were by other nations who had mentioned Israel in their lobbying materials.  Now that is fairly incredible, given that Israel outright controls Congress when it comes to Middle East policy.  The last administration to attempt to do something about Israeli lobbyists not registering was the the Kennedy Administration. The result was that the major Israeli lobbying group disbanded and was promptly reformed under a new corporate charter and name. That was the very last attempt at enforcing the Foreign Agents Registration Act against Israel's lobbyists in the U.S., despite the fact that the reformed group, AIPAC, has even been caught more than once being passed highly classified U.S. documents by double agents working inside the U.S. military establishment. The leakers went to prison but the AIPACers were never prosecuted. AIPAC rules.  
Paul Merrell

Argentina Prosecutor Who Accused Kirchner Had Steady Contact With US Embassy, Leaked Ca... - 0 views

  • Alberto Nisman, the prosecutor who accused Argentina's president of a cover-up plot over the 1994 bombing of a Jewish center before being found shot to death, met repeatedly with the US embassy in Buenos Aires during his investigation, leaked diplomatic cables show.Nisman gave US officials advanced notice on his procedural moves and was apparently coached by the embassy in "improving" his requests for arrest warrants for Iranians that Nisman suspected of carrying out the deadly attack against the Argentine Israeli Mutual Association, or AIMA, according to cables published by Wikileaks."Embassy can now more logically approach the [government of Argentina] about [its] anticipated next steps and ways we might be able to coordinate outreach to other governments [...] to bring attention to the warrants and pressure to bear on Iran and Hezbollah," says one US cable dated November 1, 2006, after a meeting with Nisman.The revelations are adding fodder to the entangled scandal over the AIMA center bombing, Nisman's mysterious death, and the reactions of President Cristina Fernandez de Kirchner and her government loyalists.The president and her supporters have piled doubt on Nisman's investigation, suggesting he didn't himself write the inquiry accusing Kirchner of a cover-up deal with Iran, and that he was influenced by foreign agents in his claims. Kirchner said this week that Nisman was manipulated and double-crossed by government spies plotting against her.
  • Nisman on January 16 told VICE News he had proof that Kirchner sought a back-channel deal with Iran — swapping Iranian oil for Argentine grain — in exchange for abandoning efforts to prosecute former Iranian diplomats in connection to the Jewish center bombing.Eight-five people were killed in the terror attack, which remains unsolved. Survivors and opposition forces are now blaming Kirchner's government for Nisman's death.
  • The prosecutor, who was found dead the night before making his blockbuster claim against Kirchner and her foreign minister in Argentina's Congress, is mentioned in 46 leaked US cables.In the cable from November 2006, Nisman informed US officials of the likelihood that a judge would follow his recommendations to seek charges against Iranian suspects for the bombing. American embassy officials discussed plans to inform "other governments" ahead of time, in an apparent push to make the case against the Iranians an international matter.Another cable, dated January 19, 2007, suggests the US embassy had a hand in shaping Nisman's warrant requests with Interpol, the international diplomatic police force. The cable shows US officials thought Nisman's work was shoddy and needed help.Before the Justice Department's Office of International Affairs intervened in the warrant applications, the cable says, Nisman's paperwork contained "statements that were presumptuous conclusions of guilt."Nisman took on the case of the AIMA center bombing in 2004, at the request of the then-President Nestor Kirchner, Cristina Fernandez's late husband. In his interview with VICE News — perhaps his last with a foreign news organization — Nisman denied connections with any foreign spy agencies.
  • ...4 more annotations...
  • "You won't find reports from the CIA, Mossad, or the MI5 in my files. I have no doubt that there is a link between them and the Argentine intelligence agency, but I never dealt with any foreign intelligence agencies," Nisman said, two days before he was found dead.The US embassy in Buenos Aires declined to discuss its officers' interactions with Nisman. "We will not comment on the contents of these alleged cables that purport to include classified information," an embassy spokesman told VICE News.
  • The relationship was apparently so involved that Nisman apologized for not letting then-ambassador Earl Anthony Wayne know that he would call for the arrest of former president Carlos Menem in relation to the case."AMIA Special Prosecutor Alberto Nisman called the Ambassador on May 23 to apologize for not giving the Embassy advance notice of his request for the arrest of former President Menem and other [government of Argentina] officials for their alleged roles in the cover up of the 'local connection' in the 1994 terrorist bombing of the AMIA Jewish community center," says a cable from May 2008.The prosecutor also apologized that the judicial order coincided with a visit to Argentina from the former deputy director of the FBI, John Pistole, adding it was "completely unintentional," the cable shows."He noted that he was very sorry and that he sincerely appreciates all of the [US government's] help and support and in no way meant to undermine that," the cable continues.
  • The cable also notes that US officials "have for the past two years recommended to Nisman that he focus on the perpetrators of the terrorist attack and not on the possible mishandling of the first investigation."Santiago O'Donnell, author of two books based on the cables released by Julian Assange, said in an interview that the leaked cables show the US influenced Nisman throughout his work on the AIMA bombing investigation."The embassy gave instructions to the prosecutor Nisman for him to follow the Iranian lead, and not follow other leads, like the Syrian lead, or the local connection, because that would detract from the terrorist image that the US was trying to impose on Iran," O'Donnell said.President Kirchner this week proposed in a nationally televised address to disband and reform the government's intelligence agency. In doing so, she said rogue government spies were responsible for Nisman's death. Opposition voices, meanwhile, said the reform plan for the Secretaría de Inteligencia, or SI, would further politicize the work of the embattled spy agency and make it more responsive to the president's political whims.
  • Alberto Nisman, the prosecutor who accused Argentina's president of a cover-up plot over the 1994 bombing of a Jewish center before being found shot to death, met repeatedly with the US embassy in Buenos Aires during his investigation, leaked diplomatic cables show.Nisman gave US officials advanced notice on his procedural moves and was apparently coached by the embassy in "improving" his requests for arrest warrants for Iranians that Nisman suspected of carrying out the deadly attack against the Argentine Israeli Mutual Association, or AIMA, according to cables published by Wikileaks."Embassy can now more logically approach the [government of Argentina] about [its] anticipated next steps and ways we might be able to coordinate outreach to other governments [...] to bring attention to the warrants and pressure to bear on Iran and Hezbollah," says one US cable dated November 1, 2006, after a meeting with Nisman.
  •  
    Well this is interesting. The U.S. was covertly working through an Argentinian prosecutor to topple Argentina's head of state. On the plan to reform the Argentine intelligence service, that service's subordination to the CIA was the prototype operation than led to Operation Condor, in which the CIA subverted most intelligence services in Latin America, leading to coups and the deaths and disappearnaces of hundreds of thousands Latin American citizens suspected of being left-leaning. The overthrow of the Allende government in Chile is perhaps the best known in the U.S. 
Paul Merrell

The Maidan Massacre: US Army Orders: Sow Chaos | New Eastern Outlook - 0 views

  • In a dramatic development in the trial in Kiev of several Berkut police officers accused of shooting civilians in the Maidan demonstrations in February 2014, the defence has produced two Georgians who confirm that the murders were committed by foreign snipers, at least 50 of them, operating in teams. The two Georgians, Alexander Revazishvili and Koba Nergadze have agreed to testify by video from Tbilisi, if permitted, as they feared for their lives if brought to Kiev. The defence lawyer stated, “The eyewitnesses said they had seen with their own eyes a group of people who had received weapons and cartridges and who would deliver fire afterwards from the building of the Conservatoire. Nergadze also saw snipers at the roof of Hotel Ukraine. They know the individuals personally. Besides, they know the organizers and clients and are ready to give their names, as well as the names of the perpetrators.” “In all, about fifty mercenaries arrived in Kiev then and they were involved in the events on the Maidan afterwards and fired at the protesters on February 20,” Goroshinsky went on. “The mercenaries split into groups of ten men each and were dispatched to different spots where from they delivered fire.” “Each of them [the mercenaries] received $5,000 for the job done,” he said. “In other words, these people had been brought [to Kiev] with a well-specified task to create a conflict.” https://journal-neo.org/2017/12/15/the-maidan-massacre-us-army-orders-sow-chaos/
  •  
    "In the September 2015 issue of Oriental Review, Dr. Ivan Katchanovski, at the University of Ottawa, published a devastating paper on the Maidan killings setting out in extensive detail the conclusive evidence that it was a false flag operation and that members of the present Kiev regime, including Poroshenko himself were involved in the murders, not the government forces. His paper contains all you need to know and I highly recommend it. Here is a summary of his findings: "The paper analyzes a large amount of evidence from different publicly available sources concerning this massacre and killings of specific protestors…"This academic investigation concludes that the massacre was a false flag operation, which was rationally planned and carried out with a goal of the overthrow of the government and seizure of power. It found various evidence of the involvement of an alliance of the far right organizations, specifically the Right Sector and Svoboda, and oligarchic parties, such as Fatherland. Concealed shooters and spotters were located in at least 20 Maidan-controlled buildings or areas. The various evidence that the protesters were killed from these locations include some 70 testimonies, primarily by Maidan protesters, several videos of "snipers" targeting protesters from these buildings, comparisons of positions of the specific protesters at the time of their killing and their entry wounds, and bullet impact signs. The study uncovered various videos and photos of armed Maidan "snipers" and spotters in many of these buildings. https://journal-neo.org/2017/12/15/the-maidan-massacre-us-army-orders-sow-chaos/"
Paul Merrell

The Real Blame for Deaths in Libya    :   Information Clearing House: ICH - 0 views

  • However, in this political season, the Republicans want to gain some political advantage by stirring up doubts about President Barack Obama’s toughness on terrorism — and the Obama administration is looking for ways to blunt those rhetorical attacks by launching retaliatory strikes in Libya or elsewhere. Thus, it was small comfort to learn that Teflon-coated John Brennan, Obama’s counterterrorism adviser, had flown to Tripoli, hoping to unearth some interim Libyan government officials to consult with on the Benghazi attack. With the embassy’s help, he no doubt identified Libyan officials with some claim to purview over “terrorism.”
  • But Brennan is not about investigation. Retribution is his bag. It is likely that some Libyan interlocutor was brought forth who would give him carte blanche to retaliate against any and all those “suspected” of having had some role in the Benghazi murders. So, look for “surgical” drone strike or Abbottabad-style special forces attack — possibly before the Nov. 6 election — on whomever is labeled a “suspect.” Sound wild? It is. However, considering Brennan’s penchant for acting-first-thinking-later, plus the entrée and extraordinary influence he enjoys with President Obama, drone and/or special forces attacks are, in my opinion, more likely than not. (This is the same Brennan, after all, who compiles for Obama lists of nominees for assassination by drone.) If in Tuesday’s debate with ex-Massachusetts Gov. Mitt Romney, Obama is pressed, as expected on his supposed weakness in handling Benghazi, attacks on “terrorists,” real or “suspect,” become still more likely. Brennan and other White House functionaries might succeed in persuading the president that such attacks would be just what the doctor ordered for his wheezing poll numbers.
  • It was no surprise, then, that almost completely absent from the discussion at last Tuesday’s hearing was any attempt to figure out why a well-armed, well-organized group of terrorists wanted to inflict maximum damage on the U.S. consulate in Benghazi and kill the diplomats there. Were it not for Rep. Dennis Kucinich, D-Ohio, impressionable listeners would have been left with the idea that the attack had nothing to do with Washington’s hare-brained, bomb-heavy policies, from which al-Qaeda and similar terrorist groups are more beneficiary than victim, as in Libya. Not for the first time, Kucinich rose to the occasion at Tuesday’s hearing:
  • ...9 more annotations...
  • “You’d think that after ten years in Iraq and after eleven years in Afghanistan that the U.S. would have learned the consequences and the limits of interventionism. … Today we’re engaging in a discussion about the security failures of Benghazi. The security situation did not happen overnight because of a decision made by someone at the State Department. … “We owe it to the diplomatic corps, who serves our nation, to start at the beginning and that’s what I shall do. Security threats in Libya, including the unchecked extremist groups who are armed to the teeth, exist because our nation spurred on a civil war destroying the security and stability of Libya. … We bombed Libya. We destroyed their army. We obliterated their police stations … Al Qaeda expanded its presence. “Weapons are everywhere. Thousands of shoulder-to-air missiles are on the loose. Our military intervention led to greater instability in Libya. … It’s not surprising that the State Department was not able to adequately protect our diplomats from this predictable threat. It’s not surprising and it’s also not acceptable. … “We want to stop attacks on our embassies? Let’s stop trying to overthrow governments. This should not be a partisan issue. Let’s avoid the hype. Let’s look at the real situation here. Interventions do not make us safer. They do not protect our nation. They are themselves a threat to America.”
  • Congressman Kucinich went on to ask the witnesses if they knew how many shoulder-to-air missiles were on the loose in Libya. Nordstrom: “Ten to twenty thousand.”
  • In my view, counterterrorism guru Brennan shares the blame for this and other failures. But he has a strong allergy to acknowledging such responsibility. And he enjoys more Teflon protection from his perch closer to the president in the White House. The back-and-forth bickering over the tragedy in Benghazi has focused on so many trees that the forest never came into view. Not only did the hearing fall far short in establishing genuine accountability, it was bereft of vision. Without vision, the old proverb says, the people perish — and that includes American diplomats. The killings in Benghazi on Sept. 11, 2012, validate that wisdom. If the U.S. does not change the way it relates to the rest of the world, and especially to the Muslim world, more and more people will perish. If we persist on the aggressive path we are on, Americans will in no way be safer. As for our diplomats, in my view it is just a matter of time before our next embassy, consulate or residence is attacked.
  • We are told we should not speak ill of the dead. Dead consciences, though, should be fair game. In my view, the U.S. Secretary of State did herself no credit the morning after the killing of four of her employees, when she said: “I asked myself — how could this happen? How could this happen in a country we helped liberate, in a city we helped save from destruction? This question reflects just how complicated and, at times, how confounding the world can be. But we have to be clear-eyed, even in our grief.” But some things are confounding only to those suppressing their own responsibility for untold death and misery abroad. Secretary Clinton continues to preen about the U.S. role in the attack on Libya. And, of Gadhafi’s gory death, she exclaimed on camera with a joyous cackle, “We came; we saw; he died.” Can it come as a surprise to Clinton that this kind of attitude and behavior can set a tone, spawning still more violence?
  • At Tuesday’s hearing, Kucinich noted that in Libya “we intervened, absent constitutional authority.” Most of his colleagues reacted with the equivalent of a deep yawn, as though Kucinich had said something “quaint” and “obsolete.” Like most of their colleagues in the House, most Oversight Committee members continue to duck this key issue, which directly involves one of the most important powers/duties given the Congress in Article I of the Constitution. Such was their behavior last Tuesday, with most members preferring to indulge in hypocritical posturing aimed at scoring cheap political points. Palpable in that hearing room was one of the dangers our country’s Founders feared the most — that, for reasons of power, position and money, legislators might eventually be seduced into the kind of cowardice and expediency that would lead them to forfeit their power and their duty to prevent a president from making war at will. Many of those now doing their best to make political hay out of the Benghazi “scandal” are the same legislators who appealed strongly for the U.S. to bomb Libya and remove Gadhafi. This, despite it having been clear from the start that eastern Libya had become a new beachhead for al-Qaeda and other terrorists. From the start, it was highly uncertain who would fill the power vacuums in the east and in Tripoli.
  • As Congress failed to exercise its constitutional duties — to debate and vote on wars — Obama, along with his Defense Secretary Leon Panetta and Hillary Clinton, took a page out of the Bush/Cheney book and jumped into a new war. Just don’t call it war, said the White House. It’s merely a “kinetic humanitarian action.” You see, our friends in Europe covet that pure Libyan oil and Gadhafi had been a problem to the West for a long time. So, it was assumed that there would be enough anti-Gadhafi Libyans that a new “democratic” government could be created and talented diplomats, like Ambassador Christopher Stevens, could explain to “the locals” how missiles and bombs were in the long-term interest of Libyans.
  • On Libya, the Obama administration dissed Congress even more blatantly than Cheney and Bush did on Iraq, where there was at least the charade of a public debate, albeit perverted by false claims about Iraq’s WMDs and Saddam Hussein’s ties to al-Qaeda. And so Defense Secretary Panetta and Secretary of State Clinton stepped off cheerily to strike Libya with the same kind of post-war plan that Cheney, Bush, and then-Defense Secretary Donald Rumsfeld had for Iraq — none. Small wonder chaos reigns in Benghazi and other parts of the country. Can it be that privileged politicians like Clinton and Panetta and the many “one-percenters” in Congress and elsewhere really do not understand that, when the U.S. does what it did to Libya, there will be folks who don’t like it; that they will be armed; that there will be blowback; that U.S. diplomats, given an impossible task, will die?
  • Constitutionally, the craven Congress is a huge part of the problem. Only a few members of the House and Senate seem to care very much when presidents act like kings and send off troops drawn largely by a poverty draft to wars not authorized (or simply rubber-stamped) by Congress. Last Tuesday, Kucinich’s voice was alone crying in the wilderness, so to speak. (And, because of redistricting and his loss in a primary that pitted two incumbent Democrats against each other, he will not be a member of the new Congress in January.) This matters — and matters very much. At a hearing of the Senate Armed Services Committee on March 7, Sen. Jeff Sessions, R-Alabama, pursued this key issue with Panetta and Joint Chiefs Chairman Gen. Martin Dempsey. Chafing ex post facto at the unauthorized nature of the war in Libya, Sessions asked repeatedly what “legal basis” would the Obama administration rely on to do in Syria what it did in Libya. Watching that part of the testimony it seemed to me that Sessions, a conservative Southern lawyer, was not at all faking when he pronounced himself “almost breathless,” as Panetta stonewalled time after time. Panetta made it explicitly clear that the administration does not believe it needs to seek congressional approval for wars like Libya. At times he seemed to be quoting verses from the Book of Cheney.
  • Sessions: “I am really baffled … The only legal authority that’s required to deploy the U.S. military [in combat] is the Congress and the president and the law and the Constitution.” Panetta: “Let me just for the record be clear again, Senator, so there is no misunderstanding. When it comes to national defense, the president has the authority under the Constitution to act to defend this country, and we will, Sir.” (If you care about the Constitution and the rule of law, I strongly recommend that you view the entire 7-minute video clip.)
Paul Merrell

U.S. Military Operations Are Biggest Motivation for Homegrown Terrorists, FBI Study Finds - 0 views

  • A secret FBI study found that anger over U.S. military operations abroad was the most commonly cited motivation for individuals involved in cases of “homegrown” terrorism. The report also identified no coherent pattern to “radicalization,” concluding that it remained near impossible to predict future violent acts. The study, reviewed by The Intercept, was conducted in 2012 by a unit in the FBI’s counterterrorism division and surveyed intelligence analysts and FBI special agents across the United States who were responsible for nearly 200 cases, both open and closed, involving “homegrown violent extremists.” The survey responses reinforced the FBI’s conclusion that such individuals “frequently believe the U.S. military is committing atrocities in Muslim countries, thereby justifying their violent aspirations.” Online relationships and exposure to English-language militant propaganda and “ideologues” like Anwar al-Awlaki are also cited as “key factors” driving extremism. But grievances over U.S. military action ranked far above any other factor, turning up in 18 percent of all cases, with additional cases citing a “perceived war against Islam,” “perceived discrimination,” or other more specific incidents. The report notes that between 2009 and 2012, 10 out of 16 attempted or successful terrorist attacks in the United States targeted military facilities or personnel.
  • The report is titled “Homegrown Violent Extremists: Survey Confirms Key Assessments, Reveals New Insights about Radicalization.” It is dated December 20, 2012. An FBI unit called the “Americas Fusion Cell” surveyed agents responsible for 198 “current and disrupted [homegrown violent extremists],” which the report says represented a fraction of all “pending, U.S.-based Sunni extremist cases” at the time. The survey seems designed to look only at Muslim violent extremism. (The FBI declined to comment.) Agents were asked over 100 questions about their subjects in order to “identify what role, if any,” particular factors played in their radicalization — listed as “known radicalizers,” extremist propaganda, participation in web forums, family members, “affiliation with religious, student, or social organization(s) where extremist views are expressed,” overseas travel, prison or military experience, and “significant life events and/or grievances.” Among the factors that did not “significantly contribute” to radicalization, the study found, were prison time, military service, and international travel. Although, the report notes, “the FBI historically has been concerned about the potential for prison radicalization,” in fact, “survey results indicate incarceration was rarely influential.” The report ends with recommendations that agents focus their attention on web forums, social media, and other online interactions, and step up surveillance of “known radicalizers” and those who contact them.
  • The study echoes previous findings, including a 2011 FBI intelligence assessment, recently released to MuckRock through a public records request, which concluded that “a broadening U.S. military presence overseas” was a motivating factor for a rise in plotted attacks, specifically the wars in Iraq and Afghanistan. That study also found “no demographic patterns” among the plotters. “Insofar as there is an identifiable motivation in most of these cases it has to do with outrage over what is happening overseas,” says John Mueller, a senior research scientist with the Mershon Center for International Security Studies at Ohio State University and co-author of “Chasing Ghosts: The Policing of Terrorism.” “People read news reports about atrocities and become angry,” Mueller said, adding that such reports are often perceived as an attack on one’s own in-group, religion, or cultural heritage. “It doesn’t have to be information from a jihadist website that angers someone, it could be a New York Times report about a drone strike that kills a bunch of civilians in Afghanistan.”
  • ...2 more annotations...
  • Perpetrators of more recent attacks have latched onto U.S. foreign policy to justify violence. The journals of Ahmad Rahami, accused of bombings in Manhattan and New Jersey last month, cited wars in Iraq, Syria, and Afghanistan. In a 911 call, Omar Mateen, who killed 49 people in an Orlando nightclub earlier this year, claimed he acted in retaliation for a U.S. airstrike on an ISIS fighter. Dzhokhar Tsarnaev told investigators that the wars in Iraq and Afghanistan motivated his and his brother’s attack on the Boston Marathon. In many of these cases, pundits and politicians focus on the role of religion, something Marc Sageman, a former CIA officer and author of “Leaderless Jihad: Terror Networks in the Twenty-First Century,” describes as a “red herring,” citing a history of shifting ideologies used to justify terrorist acts.
  • The U.S. government has announced plans to spend millions of dollars on “Countering Violent Extremism” initiatives, which are supposed to involve community members in spotting and stopping would-be extremists. These initiatives have been criticized as discriminatory, because they have focused almost exclusively on Muslim communities while ignoring political motivations behind radicalization. “Politicians try very hard not to talk about foreign policy or military action being a major contributor to homegrown terrorism,” Sageman says, adding that government reticence to share raw data from terrorism cases with academia has hindered analysis of the subject.
Paul Merrell

DOJ Seeks Removal Of Restrictions On Computer Search Warrants - 0 views

  • The Justice Department recently submitted proposed new rules on the procedures and practices of the department’s agencies and bureaus. Among the suggested changes is a modification of the Federal Rules of Criminal Procedure Rule 41(b), which empowers a federal court to issue a warrant allowing the federal government to conduct a search of a computer or computer network involved in a criminal investigation. Under current regulations, a warrant issued by a federal court is only valid in that court’s district. As there are 94 federal judicial districts, investigating a widespread attack may require either petitioning dozens of district courts or acting extrajudicially by not seeking a warrant. An extrajudicial investigation, however, cannot be used if criminal convictions are sought, as evidence gathered in this manner is not typically admissible in court. The Justice Department is seeking to make remote access warrants to search, seize and copy electronic information valid for all federal districts.
  • The Justice Department argues that due to the sophistication of cyber-criminals, an offending computer or computer cluster can sit in a district separate from the district where the hackers that infected the target computer anonymously are and separate from the investigators’ district. “Criminals are using multiple computers in many districts simultaneously as part of complex criminal schemes, and effectively investigating and disrupting these schemes often requires remote access to Internet-connected computers in many different districts,” wrote then-acting Assistant Attorney General Mythili Raman in a September letter to the Advisory Committee on the Criminal Rules. “Botnets are a significant threat to the public: they are used to conduct large-scale denial of service attacks, steal personal and financial data, and distribute malware designed to invade the privacy of users of the host computers,” Raman continued. In the letter, Raman cited an investigation of a child porn site that uses The Onion Router Network, or Tor, to anonymize its traffic. The Justice Department argues that it knows the site’s hosting server location, but without a warrant local to the server, the department is prevented from retrieving the server’s user records — including IP and MAC addresses. In most cases, however, law enforcement do not know the physical location of the site’s server, making it impossible to request a specific warrant.
  • In these cases, the Justice Department could request a blanket warrant. This would allow the department to set up a “zero-day” attack on the server — an attack exploiting a manufacturer-unknown or -permitted security flaw, allowing access to the system’s operating software. However, a Texas judge denied the FBI access to such a warrant, saying the Justice Department’s use of “zero-day” attacks in its investigation exposes the public and the target to unknown risks. One typical type of a “zero-day” attack is an infected email that could affect a large number of innocent people if the target used a public computer to access his email. The FBI planned to install a Remote Administration Tool, or RAT, which would distribute such emails in a partially-targeted spam mail distribution. Last year, Federal Magistrate Judge Stephen Smith of the Houston Division of the Southern District of Texas ruled that this was a gross overreach of investigatory intrusion, blocking the plan temporarily. A “zero-day” attack has the potential to activate and control the targeted computer’s peripherals, such as webcams and microphones.
  • ...2 more annotations...
  • Following this ruling, based on the assumptions that federal law enforcement fundamentally act in good faith and that there may be a legitimate need for remote exploitation of computer data, the Justice Department sought to introduce changes to the rules that would overcome Smith’s objections. The proposed change to Rule 41(b) would allow magistrate judges “… to issue a warrant to use remote access to search electronic storage media and to seize electronically stored information located within or outside that district.” The Justice Department has indicated that it wants warrants permitting multiple computers to be searched at the same time, as well as permission to search all of the email and social media accounts accessible from a single computer. Such access would constitute a violation of the Electronic Communications Privacy Act, as the government, under the act, must make demonstrate probable cause to each targeted service provider and obtain and serve a warrant for each service provider. A warrant to search every account active on a computer would be actively bypassing the act’s numerous safeguards.
  • Privacy advocates fear that this rule change would allow prosecutors and the Justice Department to seek out magistrates likely to give them their requested warrants, creating a situation in which the federal government could have a “warrant shop” with just one judge for the whole of the nation. In light of allegations of federal government over-policing — including revelations of aggressive domestic and international electronic spying by the FBI and the National Security Agency — many advocates argue that an examination of the federal government’s commitment to the Fourth Amendment is needed. “The proposed amendment would significantly expand the government’s authority to conduct remote searches of electronic storage media,” the American Civil Liberties Union wrote in a memorandum early last month. “It would also expand the government’s power to engage in computer hacking in the course of criminal investigations, including through the use of malware and other techniques that pose a risk to internet security and that raise Fourth Amendment and policy concerns. “In light of these concerns, the ACLU recommends that the Advisory Committee exercise extreme caution before granting the government new authority to remotely search individuals’ electronic data.” The rules are scheduled to be discussed at the meeting of the Judiciary’s Committee on Rules of Practice and Procedure later this month.
  •  
    The proposed rule change is at pp. 499-501 here. http://www.uscourts.gov/uscourts/RulesAndPolicies/rules/Agenda%20Books/Standing/ST2014-05.pdf#page499 (very large PDF).  This is not just about the government being granted permission to exploit vulnerabilities unknown to the computer owner; the issue arose in a case where the government sought judicial permission to implant a Trojan Horse in a suspect's computer. Moreover, the proposed rule goes far beyond the confines of that case, purporting to authorize the government to skip merrily along searching computers not specified in the warrant, along the purported botnet. To put the icing on the cake, the government wants to be relieved from the requirement that they apply for a warrant in the district in which the computer to be searched is located. ("Oh, Goody! Let's start shopping around for the judges we like instead of the ones we are now required to persuade. What? The Mississippi judge refused to sign the warrant? Oh well, let's try it with that other judge we like, the one in Gnome, Alaska.") In other words, what the government seeks is authority for "general warrants," the very evil that the 4th Amendment was designed to outlaw. Even more outrageously, the proposed rule provides in part: "For a warrant to use remote access to search electronic storage media and seize or copy electronically stored information, the officer must make reasonable efforts to serve a copy of the warrant on the person whose property *was* searched or whose information *was* seized or copied. Service may be accomplished by any means, including electronic means, reasonably calculated to reach that person." Not the use of the past tense "was." So after they have drained your computer of all its data, they may permissibly install a batch file that will display a copy of the warrant on your monitor the next time you boot your computer. With a big red lipstick imprint of a kiss imprinted in the warrant's bottom margin, no doubt
  •  
    The proposed rule change is at pp. 499-501 here. http://www.uscourts.gov/uscourts/RulesAndPolicies/rules/Agenda%20Books/Standing/ST2014-05.pdf#page499 (very large PDF).  This is not just about the government being granted permission to exploit vulnerabilities unknown to the computer owner; the issue arose in a case where the government sought judicial permission to implant a Trojan Horse in a suspect's computer. Moreover, the proposed rule goes far beyond the confines of that case, purporting to authorize the government to skip merrily along searching computers not specified in the warrant, along the purported botnet. To put the icing on the cake, the government wants to be relieved from the requirement that they apply for a warrant in the district in which the computer to be searched is located. In other words, what the government seeks is authority for "general warrants," the very evil that the 4th Amendment was designed to outlaw. Even more outrageously, the proposed rule provides in part: "For a warrant to use remote access to search electronic storage media and seize or copy electronically stored information, the officer must make reasonable efforts to serve a copy of the warrant on the person whose property *was* searched or whose information *was* seized or copied. Service may be accomplished by any means, including electronic means, reasonably calculated to reach that person." Not the use of the past tense "was." So after they have drained your computer of all its data, they may permissibly install a batch file that will display a copy of the warrant on your monitor the next time you boot your computer. With a big red lipstick imprint of a kiss imprinted at the bottom.  To be continued after this is intially posted to Diigo so the content isn't cut off.   
Paul Merrell

For sale: Systems that can secretly track where cellphone users go around the globe - T... - 0 views

  • Makers of surveillance systems are offering governments across the world the ability to track the movements of almost anybody who carries a cellphone, whether they are blocks away or on another continent. The technology works by exploiting an essential fact of all cellular networks: They must keep detailed, up-to-the-minute records on the locations of their customers to deliver calls and other services to them. Surveillance systems are secretly collecting these records to map people’s travels over days, weeks or longer, according to company marketing documents and experts in surveillance technology.
  • The world’s most powerful intelligence services, such as the National Security Agency and Britain’s GCHQ, long have used cellphone data to track targets around the globe. But experts say these new systems allow less technically advanced governments to track people in any nation — including the United States — with relative ease and precision.
  • It is unclear which governments have acquired these tracking systems, but one industry official, speaking on the condition of anonymity to share sensitive trade information, said that dozens of countries have bought or leased such technology in recent years. This rapid spread underscores how the burgeoning, multibillion-dollar surveillance industry makes advanced spying technology available worldwide. “Any tin-pot dictator with enough money to buy the system could spy on people anywhere in the world,” said Eric King, deputy director of Privacy International, a London-based activist group that warns about the abuse of surveillance technology. “This is a huge problem.”
  • ...9 more annotations...
  • Yet marketing documents obtained by The Washington Post show that companies are offering powerful systems that are designed to evade detection while plotting movements of surveillance targets on computerized maps. The documents claim system success rates of more than 70 percent. A 24-page marketing brochure for SkyLock, a cellular tracking system sold by Verint, a maker of analytics systems based in Melville, N.Y., carries the subtitle “Locate. Track. Manipulate.” The document, dated January 2013 and labeled “Commercially Confidential,” says the system offers government agencies “a cost-effective, new approach to obtaining global location information concerning known targets.”
  • tracking systems that access carrier location databases are unusual in their ability to allow virtually any government to track people across borders, with any type of cellular phone, across a wide range of carriers — without the carriers even knowing. These systems also can be used in tandem with other technologies that, when the general location of a person is already known, can intercept calls and Internet traffic, activate microphones, and access contact lists, photos and other documents. Companies that make and sell surveillance technology seek to limit public information about their systems’ capabilities and client lists, typically marketing their technology directly to law enforcement and intelligence services through international conferences that are closed to journalists and other members of the public.
  • Security experts say hackers, sophisticated criminal gangs and nations under sanctions also could use this tracking technology, which operates in a legal gray area. It is illegal in many countries to track people without their consent or a court order, but there is no clear international legal standard for secretly tracking people in other countries, nor is there a global entity with the authority to police potential abuses.
  • (Privacy International has collected several marketing brochures on cellular surveillance systems, including one that refers briefly to SkyLock, and posted them on its Web site. The 24-page SkyLock brochure and other material was independently provided to The Post by people concerned that such systems are being abused.)
  • Verint, which also has substantial operations in Israel, declined to comment for this story. It says in the marketing brochure that it does not use SkyLock against U.S. or Israeli phones, which could violate national laws. But several similar systems, marketed in recent years by companies based in Switzerland, Ukraine and elsewhere, likely are free of such limitations.
  • The tracking technology takes advantage of the lax security of SS7, a global network that cellular carriers use to communicate with one another when directing calls, texts and Internet data. The system was built decades ago, when only a few large carriers controlled the bulk of global phone traffic. Now thousands of companies use SS7 to provide services to billions of phones and other mobile devices, security experts say. All of these companies have access to the network and can send queries to other companies on the SS7 system, making the entire network more vulnerable to exploitation. Any one of these companies could share its access with others, including makers of surveillance systems.
  • Companies that market SS7 tracking systems recommend using them in tandem with “IMSI catchers,” increasingly common surveillance devices that use cellular signals collected directly from the air to intercept calls and Internet traffic, send fake texts, install spyware on a phone, and determine precise locations. IMSI catchers — also known by one popular trade name, StingRay — can home in on somebody a mile or two away but are useless if a target’s general location is not known. SS7 tracking systems solve that problem by locating the general area of a target so that IMSI catchers can be deployed effectively. (The term “IMSI” refers to a unique identifying code on a cellular phone.)
  • Verint can install SkyLock on the networks of cellular carriers if they are cooperative — something that telecommunications experts say is common in countries where carriers have close relationships with their national governments. Verint also has its own “worldwide SS7 hubs” that “are spread in various locations around the world,” says the brochure. It does not list prices for the services, though it says that Verint charges more for the ability to track targets in many far-flung countries, as opposed to only a few nearby ones. Among the most appealing features of the system, the brochure says, is its ability to sidestep the cellular operators that sometimes protect their users’ personal information by refusing government requests or insisting on formal court orders before releasing information.
  • Another company, Defentek, markets a similar system called Infiltrator Global Real-Time Tracking System on its Web site, claiming to “locate and track any phone number in the world.” The site adds: “It is a strategic solution that infiltrates and is undetected and unknown by the network, carrier, or the target.”
  •  
    The Verint company has very close ties to the Iraeli government. Its former parent company Comverse, was heavily subsidized by Israel and the bulk of its manufacturing and code development was done in Israel. See https://en.wikipedia.org/wiki/Comverse_Technology "In December 2001, a Fox News report raised the concern that wiretapping equipment provided by Comverse Infosys to the U.S. government for electronic eavesdropping may have been vulnerable, as these systems allegedly had a back door through which the wiretaps could be intercepted by unauthorized parties.[55] Fox News reporter Carl Cameron said there was no reason to believe the Israeli government was implicated, but that "a classified top-secret investigation is underway".[55] A March 2002 story by Le Monde recapped the Fox report and concluded: "Comverse is suspected of having introduced into its systems of the 'catch gates' in order to 'intercept, record and store' these wire-taps. This hardware would render the 'listener' himself 'listened to'."[56] Fox News did not pursue the allegations, and in the years since, there have been no legal or commercial actions of any type taken against Comverse by the FBI or any other branch of the US Government related to data access and security issues. While no real evidence has been presented against Comverse or Verint, the allegations have become a favorite topic of conspiracy theorists.[57] By 2005, the company had $959 million in sales and employed over 5,000 people, of whom about half were located in Israel.[16]" Verint is also the company that got the Dept. of Homeland Security contract to provide and install an electronic and video surveillance system across the entire U.S. border with Mexico.  One need not be much of a conspiracy theorist to have concerns about Verint's likely interactions and data sharing with the NSA and its Israeli equivalent, Unit 8200. 
Paul Merrell

US Navy Seals esaped punishment after reportedly beating detainees in Afghanistan - Tel... - 0 views

  • Members of the US Navy Seals brutally beat detainees in Afghanistan but escaped punishment after the abuse was reported, according to reports. US soldiers told their superiors they witnessed three Seals dropping heavy stones on detainees chests, kicking and stepping on their heads, firing weapons during an interrogation, and employing a variation of waterboarding. The Navy Seals are an elite special operations force perhaps best known for carrying out the 2011 raid that killed Osama bin Laden.
  • When the men were released later that afternoon they were bloodied and hobbling. One, Muhammad Hashem, 24, was unable to walk. He died later the same day. Specialist Walker and three fellow soldiers decided to report the incident. “It just comes down to what’s wrong and what’s right,” he told the New York Times. “You can’t squint hard enough to make this gray.” A Navy lawyer recommended that the Seals be charged with assault, and potentially face a court martial. Instead, the charges were processed in a closed disciplinary process more commonly used for minor infractions, and the men were moved to different units but faced no further punishment.
  • The beatings by the Seals and members of an Afghan militia were so severe that one man died hours later and another has lasting injuries from the 2012 incident. The interrogations followed an explosion at an Afghan Local Police (ALP) checkpoint in the village of Kalach which killed a member of the ALP militia. The militiamen, who were trained by the Seals, rounded up approximately six suspects and brought them to a US base, beating them with rifles and antennae along the way. What happened next shocked Specialist David Walker, an Army medic, and other witnesses. Instead of ending the beatings and reprimanding the ALP members, they say the three Seals joined in and even intensified the abuse.
  • ...1 more annotation...
  • Captain Robert Smith, then commander of all East Coast-based Seals and now a senior official in the department of the Navy, ultimately cleared the men of all charges. He said eyewitness accounts of what took place were inconsistent, and “did not give me enough confidence in their overall accuracy to hold the accused accountable for assaults or abuse”.
1 - 20 of 22 Next ›
Showing 20 items per page