Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged remote-viewing

Rss Feed Group items tagged

Gary Edwards

Learn Remote Viewing - Major Ed Dames - 0 views

  •  
    Check out the prediciton on the Japanese earthquake-tsunami-nuclear reactor meltdown!  A bullseye if ever there was one. \excerpt:  WHAT IS REMOTE VIEWING AND HOW DOES IT WORK? The CIA and U.S. Army recently declassified a mind protocol called Remote Viewing (RV) that unlocks the unconscious mind's inherent ability to obtain knowledge about any person, place, thing or even in the past, present or future. This technique was proven to work so well, the military used it in real-world operations. Due to security leaks in the program, RV was forced into declassification and revealed to the public. It took a team of scientific researchers over 20 years with millions of federally funded dollars to discover the secrets behind unlocking the inhertant abilities of the human unconscious.
Paul Merrell

See for yourself: Aerial and panoramic views show devastation in Gaza | The Electronic ... - 0 views

  • A total of 2,168 people were killed, 521 of them children, during Israel’s 51-day bombardment of the Gaza Strip that ended in a ceasefire agreement on 26 August. Such images help us to understand the reality behind the shocking statistics about the physical destruction: 108,000 people have had their homes destroyed or severely damaged and will need permanent rehousing, according to the UN Office for the Coordination of Humanitarian Affairs (UN OCHA). As the ceasefire allows for more in-depth assessments “it is clear that the scale of damage is unprecedented, with approximately 13 percent of the housing stock affected,” UN OCHA says. “Five percent of the housing stock is uninhabitable – an estimated 18,000 housing units have been either destroyed or severely damaged.” This on top of a shortage of 71,000 housing units before the Israeli attack. Since there is no functioning airport in Gaza and Israel controls the skies, many people have wondered how the aerial video was taken. Another video published by MediaTown in March shows the company’s crew demonstrating their use of a quadcopter remote control aircraft similar to this one to make a video:
  • The photojournalist Lewis Whyld created the “The Gaza War Map,” a website that allows the viewer to see panoramic scenes of various places in Gaza.
  • The viewer can select and virtually stand in any of 20 sites in Gaza from Rafah in the south to Beit Hanoun in the north and see a 360-degree view of the destruction all around. Short of being in Gaza it is an effective way to get a sense of the scale of devastation Israeli bombing has caused. Try it yourself.
  • ...3 more annotations...
  • The United Nations Institute for Training and Research (UNITAR) has published a series of satellite images showing areas of Gaza before and after the Israeli bombardment. Such maps are used by international agencies to make overall damage assessments. For instance, using satellite images, the UN estimated that as of 25 July, the Israeli bombardment had completely destroyed 700 structures and severely damaged 316 others in (a “structure” might be an individual house or an entire apartment block with a number of individual units) in the eastern Gaza City districts of Shujaiya, Tuffah and Shaaf (see the PDF below).
  • For instance, using satellite images, the UN estimated that as of 25 July, the Israeli bombardment had completely destroyed 700 structures and severely damaged 316 others in (a “structure” might be an individual house or an entire apartment block with a number of individual units) in the eastern Gaza City districts of Shujaiya, Tuffah and Shaaf (see the PDF below).
  • UN OCHA has published another invaluable resource, the Gaza Crisis Atlas. Viewable online, it contains numerous maps and satellite images with neighborhood-by-neighborhood information about the destruction in Gaza.
  •  
    No blood and gore in any of these. Just a useful collection of video, satellite photos, and maps of the aftermath of summer 2014's Israeli military devastation of Gaza, the world's most densely populated area. Some of the satellite photos have before and after views of the destruction. The only worse devastation of urban areas that I have seen are photos of Dresden and Berlin at the end of World War II. So much for Israel's claims of careful targeting using precision methods of delivery. Wide areas of utter devastation. Using weapons and funds provided by the U.S.  I'm thinking about launching a political action for the U.S. to pay for Gaza reconstruction and humanitarian relief and to deduct that expense from Israel's annual $3 billion in U.S. military aid.  Contrary to widely republished Israeli propaganda, Israel, not Hamas, started this mess. http://america.aljazeera.com/opinions/2014/7/israel-hamas-palestiniansconflictunitedstatesinternationallaw.html  see also Adam Horowitz and Phil Weiss, Claim that Hamas killed 3 teens is turning out to be the WMD of Gaza onslaught, Mondoweiss (26 July 2014),
Gary Edwards

100th Anniversary of the Beginning of the End? (Part 1) - The Patriot Post - 1 views

  • I take the Oath of John Galt and put action to it: "I swear by my life and my love of it, that I will never live for the sake of another person, nor ask another to live their life for me."
  • In this dark day of the former republic, I stand in Resistance to the premier means of acquisition by the State, the Income Tax.
  • "They that can give up essential liberty to purchase a little temporary safety, deserve neither liberty nor safety." (Ben Franklin)
  • ...2 more annotations...
  • "A Constitution of Government once changed from Freedom, can never be restored. Liberty, once lost, is lost forever." (John Adams)
  • "Our cause is noble; it is the cause of mankind!" (George Washington)
  •  
    Excellent history of how America lost it's Constitutional Republic.  The author tags the first progressive (marxist/socialist) President, Woodrow Wilson, as the culprit.  In 1913 Wilson shoved through the 16th and 17th Amendments.  He also pushed through the midnight express known as the Federal Reserve.  And as if that was not enough damage, he pushed for the "League of Nations" - a precursor to the present day United Nations Globalist New World Order. Oh yeah, the first progressive president also jacked us into humanities first World War. Wilson was a Manchurian stooge for the Globalist Rothschild Banksters, and the USA Bankster contingent led by Rockefeller, Morgan and Carnegie.   Note that in the election of 1896, the Banksters banked the corporatist McKinley against the GOLD standard populist, William Jennings Bryan.  McKinley was assassinated in 1901, and his VP, Teddy Roosevelt, became President.  Roosevelt successfully went after the Robber Bankster Barons; Rockefeller, Carnegie and Morgan, passing the Sherman Anti Trust laws and bringing the criminal corporations to trial.  This set the stage for the Bankster coup in 1913, where, with the election of Wilson the Banksters ended the great Consttitutional Republic and ushered in a century of ever encroaching socialist tyranny. ........................... excerpt: "One hundred years ago, our federal government, under control of the progressive Woodrow Wilson, took actions that have since become a disaster for these United States. Looking back, these actions were the beginning of what could be the end of our Constitutional Republic. With progressives in control in 2013, similar actions are underway that could complete a sinister view by progressives then and now to "transform" us into something our Founders never intended, and most Americans through the years never wanted and still don't. In 1913 our Constitution was amended by the ratification of two amendments, the Sixteenth and Seventeenth, an
Gary Edwards

Great Privacy Essay: Fourth Amendment Doctrine in the Era of Total Surveillance | CIO - 0 views

  •  
    "'Failing Expectations: Fourth Amendment Doctrine in the Era of Total Surveillance' is a thought-provoking essay written by a Fordham University law professor about how the reasonable expectation test for privacy is failing to protect us. Add into our networked world the third-party doctrine and we have little protection against unreasonable searches and seizures."
  •  
    It doesn't detract substantially from the essay's central thesis, but an important part of the learned professor's heartfelt desires were delivered in a Supreme Court decision just decided, after the essay was published, Reilly v. California, http://www.supremecourt.gov/opinions/13pdf/13-132_8l9c.pdf The Court held in relevant part: "We also reject the United States' final suggestion that officers should always be able to search a phone's call log, as they did in Wurie's case. The Government relies on Smithv. Maryland, 442 U. S. 735 (1979), which held that no warrant was required to use a pen register at telephone company premises to identify numbers dialed by a particular caller. The Court in that case, however, concluded that the use of a pen register was not a "search" at all under the Fourth Amendment. See id., at 745-746. There is no dispute here that the officers engaged in a search of Wurie's cell phone. Moreover, call logs typically contain more than just phone numbers; they include any identifying information that an individual might add, such as the label "my house" in Wurie's case." The effect there was to confine Smith v. Maryland, the foundation of the third-party doctrine, to its particular facts. In other words, the third-party doctrine is now confined to connected telephone numbers, the connect time, and the duration of the call. If any other metadata is gathered, such as location data, the third-party doctrine no longer applies. When you read the rest of the Reilly decision, you see a unanimous Supreme Court shooting down one government defense after another that have been used in the NSA's defense to mass telecommunications surveillance. But most interestingly, the Court unmistakably has laid the groundwork for a later decision drastically cutting back on digital surveillance without a search warrant based on particularized probable cause to believe that evidence of a specific crime has occurred and that the requested sear
Paul Merrell

US v. Comprehensive Drug Testing, Inc., 621 F. 3d 1162 - Court of Appeals, 9th Circuit ... - 0 views

  • Concluding Thoughts
  • This case well illustrates both the challenges faced by modern law enforcement in retrieving information it needs to pursue and prosecute wrongdoers, and the threat to the privacy of innocent parties from a vigorous criminal investigation. At the time of Tamura, most individuals and enterprises kept records in their file cabinets or similar physical facilities. Today, the same kind of data is usually stored electronically, often far from the premises. Electronic storage facilities intermingle data, making them difficult to retrieve without a thorough understanding of the filing and classification systems used—something that can often only be determined by closely analyzing the data in a controlled environment. Tamura involved a few dozen boxes and was considered a broad seizure; but even inexpensive electronic storage media today can store the equivalent of millions of pages of information. 1176*1176 Wrongdoers and their collaborators have obvious incentives to make data difficult to find, but parties involved in lawful activities may also encrypt or compress data for entirely legitimate reasons: protection of privacy, preservation of privileged communications, warding off industrial espionage or preventing general mischief such as identity theft. Law enforcement today thus has a far more difficult, exacting and sensitive task in pursuing evidence of criminal activities than even in the relatively recent past. The legitimate need to scoop up large quantities of data, and sift through it carefully for concealed or disguised pieces of evidence, is one we've often recognized. See, e.g., United States v. Hill, 459 F.3d 966 (9th Cir.2006).
  • This pressing need of law enforcement for broad authorization to examine electronic records, so persuasively demonstrated in the introduction to the original warrant in this case, see pp. 1167-68 supra, creates a serious risk that every warrant for electronic information will become, in effect, a general warrant, rendering the Fourth Amendment irrelevant. The problem can be stated very simply: There is no way to be sure exactly what an electronic file contains without somehow examining its contents—either by opening it and looking, using specialized forensic software, keyword searching or some other such technique. But electronic files are generally found on media that also contain thousands or millions of other files among which the sought-after data may be stored or concealed. By necessity, government efforts to locate particular files will require examining a great many other files to exclude the possibility that the sought-after data are concealed there. Once a file is examined, however, the government may claim (as it did in this case) that its contents are in plain view and, if incriminating, the government can keep it. Authorization to search some computer files therefore automatically becomes authorization to search all files in the same sub-directory, and all files in an enveloping directory, a neighboring hard drive, a nearby computer or nearby storage media. Where computers are not near each other, but are connected electronically, the original search might justify examining files in computers many miles away, on a theory that incriminating electronic data could have been shuttled and concealed there.
  • ...3 more annotations...
  • The advent of fast, cheap networking has made it possible to store information at remote third-party locations, where it is intermingled with that of other users. For example, many people no longer keep their email primarily on their personal computer, and instead use a web-based email provider, which stores their messages along with billions of messages from and to millions of other people. Similar services exist for photographs, slide shows, computer code and many other types of data. As a result, people now have personal data that are stored with that of innumerable strangers. Seizure of, for example, Google's email servers to look for a few incriminating messages could jeopardize the privacy of millions. It's no answer to suggest, as did the majority of the three-judge panel, that people can avoid these hazards by not storing their data electronically. To begin with, the choice about how information is stored is often made by someone other than the individuals whose privacy would be invaded by the search. Most people have no idea whether their doctor, lawyer or accountant maintains records in paper or electronic format, whether they are stored on the premises or on a server farm in Rancho Cucamonga, whether they are commingled with those of many other professionals 1177*1177 or kept entirely separate. Here, for example, the Tracey Directory contained a huge number of drug testing records, not only of the ten players for whom the government had probable cause but hundreds of other professional baseball players, thirteen other sports organizations, three unrelated sporting competitions, and a non-sports business entity—thousands of files in all, reflecting the test results of an unknown number of people, most having no relationship to professional baseball except that they had the bad luck of having their test results stored on the same computer as the baseball players.
  • Second, there are very important benefits to storing data electronically. Being able to back up the data and avoid the loss by fire, flood or earthquake is one of them. Ease of access from remote locations while traveling is another. The ability to swiftly share the data among professionals, such as sending MRIs for examination by a cancer specialist half-way around the world, can mean the difference between death and a full recovery. Electronic storage and transmission of data is no longer a peculiarity or a luxury of the very rich; it's a way of life. Government intrusions into large private databases thus have the potential to expose exceedingly sensitive information about countless individuals not implicated in any criminal activity, who might not even know that the information about them has been seized and thus can do nothing to protect their privacy. It is not surprising, then, that all three of the district judges below were severely troubled by the government's conduct in this case. Judge Mahan, for example, asked "what ever happened to the Fourth Amendment? Was it ... repealed somehow?" Judge Cooper referred to "the image of quickly and skillfully moving the cup so no one can find the pea." And Judge Illston regarded the government's tactics as "unreasonable" and found that they constituted "harassment." Judge Thomas, too, in his panel dissent, expressed frustration with the government's conduct and position, calling it a "breathtaking expansion of the `plain view' doctrine, which clearly has no application to intermingled private electronic data." Comprehensive Drug Testing, 513 F.3d at 1117.
  • Everyone's interests are best served if there are clear rules to follow that strike a fair balance between the legitimate needs of law enforcement and the right of individuals and enterprises to the privacy that is at the heart of the Fourth Amendment. Tamura has provided a workable framework for almost three decades, and might well have sufficed in this case had its teachings been followed. We have updated Tamura to apply to the daunting realities of electronic searches. We recognize the reality that over-seizing is an inherent part of the electronic search process and proceed on the assumption that, when it comes to the seizure of electronic records, this will be far more common than in the days of paper records. This calls for greater vigilance on the part of judicial officers in striking the right balance between the government's interest in law enforcement and the right of individuals to be free from unreasonable searches and seizures. The process of segregating electronic data that is seizable from that which is not must not become a vehicle for the government to gain access to data which it has no probable cause to collect.
  •  
    From a Ninth U.S. Circuit Court of Appeals en banc ruling in 2010. The Court's holding was that federal investigators had vastly overstepped the boundaries of multiple subpoenas and a search warrant --- and the Fourth Amendment --- by seizing records of a testing laboratory and reviewing them for information not described in the warrant or the subpoenas. At issue in this particular case was the government's use of a warrant that found probable cause to believe that the records contained evidence that steroids had been found in the urine of ten major league baseball players but searched the seized records for urine tests of other baseball players. The Court upheld the lower courts' rulings that the government was required to return all records other than those relevant to the ten players identified in the warrant. (The government had instead used the records of other player's urine tests to issue subpoenas for evidence relevant to those players potential use of steroids.) This decision cuts very heavily against the notion that the Fourth Amendment allows the bulk collection of private information about millions of Americans with or without a warrantor court order on the theory that some of the records *may* later become relevant to a lawful investigation.   Or rephrased, here is the en banc decision of the largest federal court of appeals (as many judges as most other federal appellate courts combined), in direct disagreement with the FISA Court orders allowing bulk collection of telephone records and bulk "incidental" collection of Americans' telephone conversations on the theory that the records *might* become relevant to national security investigations. Yet none of the FISA judges in any of the FISA opinions published thus far even cited, let alone distinguished, this Ninth Circuit en banc decision. Which says a lot of the quality of the legal research performed by the FISA Court judges. However, this precedent is front and center in briefs filed with the Ni
Paul Merrell

Documents Reveal N.S.A. Campaign Against Encryption - Document - NYTimes.com - 0 views

  • (U) HTTPS – HTTP traffic secured inside an SSL/TLS session, indicated by the https:// URL, commonly using TCP port 443 (U) IPSEC -- IPSec, or IP Security, is the Internet Engineering Task Force (IETF) standard for layer 3 real-time communication security. IPSec allows two hosts (or two gateways) to establish a secure connection, sometimes called a tunnel. All traffic is protected at the network layer. (U) SSH – Secure Shell. A common protocol used for secure remote computer access (U) SSL – Secure Sockets Layer. Commonly used to provide secure network communication. Widely used on the internet to provide secure web browsing, webmail, instant messaging, electronic commerce, etc. (U) TLS – Transport Layer Security. The follow-on to SSL, SSLv3 and TLSv1.0 are nearly identical. (U) VoIP – Voice over Internet Protocol. A general term for the using IP networks to make voice phone calls. The application layer protocol can be standards-based (e.g., H.323, SIP), or proprietary (e.g., Skype). (U) VPN – Virtual Private Network. A private network that makes use of the public telecommunications infrastructure, maintaining privacy via the use of a tunneling protocol and security procedures that typically include encryption. Common protocols include IPSEC and PPTP.
  •  
    An "example" non-exclusive list of encryption standards that the "patriots" at the NSA have compromised.  Select the "Bullrun Briefing Sheet" tab to view.
Gary Edwards

» EXCLUSIVE: Snowden Level Documents Reveal Stealth DHS Spy Grid Alex Jones' ... - 0 views

  • “The NMS also collects information about every Wi‐Fi client accessing the network, including its MAC address, IP address, signal intensity, data rate and traffic status,” the document reads. “Additional NMS features include a fault management system for issuing alarms and logging events according to a set of customizable filtering rules, along with centralized and version‐controlled remote updating of the Aruba Mesh Operating System software.”
  •  
    It just keeps getting better ............... excerpt: "The wireless mesh network, which allows for private communication between wireless devices including cell phones and laptops, was built by California-based Aruba Networks, a major provider of next-generation mobile network access solutions. Labeled by their intersection location such as "1st&University" and "2nd& Seneca," the multiple network devices are easily detected in Seattle's downtown area through a simple Wi-Fi enabled device, leading many residents to wonder if they are being detected in return. "How accurately can it geo-locate and track the movements of your phone, laptop, or any other wireless device by its MAC address? Can the network send that information to a database, allowing the SPD to reconstruct who was where at any given time, on any given day, without a warrant? Can the network see you now?" asked Seattle newspaper The Stranger. According to reports from Kiro 7 News, the mesh network devices can capture a mobile user's IP address, mobile device type, apps used, current location and even historical location down to the last 1,000 places visited. So far Seattle police have been tight-lipped about the network's roll-out, even denying that the system is operational. Several groups including the ACLU have submitted requests to learn the programs intended use, but days have turned to months as the mesh network continues its advancement. According to The Stranger's investigation, Seattle Police detective Monty Moss claims the department has no plans to use the mesh network for surveillance… unless given approval by city council. Despite a recently passed ordinance requiring all potential surveillance equipment to be given city council approval and public review within 30 days of its implementation, the network has remained shrouded in secrecy. Unknown to the public until now, information regarding the system has been hiding in plain view since last February at minimum. Diagr
Paul Merrell

Catalog Reveals NSA Has Back Doors for Numerous Devices - SPIEGEL ONLINE - 0 views

  • When it comes to modern firewalls for corporate computer networks, the world's second largest network equipment manufacturer doesn't skimp on praising its own work. According to Juniper Networks' online PR copy, the company's products are "ideal" for protecting large companies and computing centers from unwanted access from outside. They claim the performance of the company's special computers is "unmatched" and their firewalls are the "best-in-class." Despite these assurances, though, there is one attacker none of these products can fend off -- the United States' National Security Agency.
  • Specialists at the intelligence organization succeeded years ago in penetrating the company's digital firewalls. A document viewed by SPIEGEL resembling a product catalog reveals that an NSA division called ANT has burrowed its way into nearly all the security architecture made by the major players in the industry -- including American global market leader Cisco and its Chinese competitor Huawei, but also producers of mass-market goods, such as US computer-maker Dell.
  • The specialists at ANT, which presumably stands for Advanced or Access Network Technology, could be described as master carpenters for the NSA's department for Tailored Access Operations (TAO). In cases where TAO's usual hacking and data-skimming methods don't suffice, ANT workers step in with their special tools, penetrating networking equipment, monitoring mobile phones and computers and diverting or even modifying data. Such "implants," as they are referred to in NSA parlance, have played a considerable role in the intelligence agency's ability to establish a global covert network that operates alongside the Internet. Some of the equipment available is quite inexpensive. A rigged monitor cable that allows "TAO personnel to see what is displayed on the targeted monitor," for example, is available for just $30. But an "active GSM base station" -- a tool that makes it possible to mimic a mobile phone tower and thus monitor cell phones -- costs a full $40,000. Computer bugging devices disguised as normal USB plugs, capable of sending and receiving data via radio undetected, are available in packs of 50 for over $1 million.
  • ...3 more annotations...
  • These NSA agents, who specialize in secret back doors, are able to keep an eye on all levels of our digital lives -- from computing centers to individual computers, and from laptops to mobile phones. For nearly every lock, ANT seems to have a key in its toolbox. And no matter what walls companies erect, the NSA's specialists seem already to have gotten past them. This, at least, is the impression gained from flipping through the 50-page document. The list reads like a mail-order catalog, one from which other NSA employees can order technologies from the ANT division for tapping their targets' data. The catalog even lists the prices for these electronic break-in tools, with costs ranging from free to $250,000. In the case of Juniper, the name of this particular digital lock pick is "FEEDTROUGH." This malware burrows into Juniper firewalls and makes it possible to smuggle other NSA programs into mainframe computers. Thanks to FEEDTROUGH, these implants can, by design, even survive "across reboots and software upgrades." In this way, US government spies can secure themselves a permanent presence in computer networks. The catalog states that FEEDTROUGH "has been deployed on many target platforms."
  • The ANT division doesn't just manufacture surveillance hardware. It also develops software for special tasks. The ANT developers have a clear preference for planting their malicious code in so-called BIOS, software located on a computer's motherboard that is the first thing to load when a computer is turned on. This has a number of valuable advantages: an infected PC or server appears to be functioning normally, so the infection remains invisible to virus protection and other security programs. And even if the hard drive of an infected computer has been completely erased and a new operating system is installed, the ANT malware can continue to function and ensures that new spyware can once again be loaded onto what is presumed to be a clean computer. The ANT developers call this "Persistence" and believe this approach has provided them with the possibility of permanent access. Another program attacks the firmware in hard drives manufactured by Western Digital, Seagate, Maxtor and Samsung, all of which, with the exception of the latter, are American companies. Here, too, it appears the US intelligence agency is compromising the technology and products of American companies.
  • Other ANT programs target Internet routers meant for professional use or hardware firewalls intended to protect company networks from online attacks. Many digital attack weapons are "remotely installable" -- in other words, over the Internet. Others require a direct attack on an end-user device -- an "interdiction," as it is known in NSA jargon -- in order to install malware or bugging equipment. There is no information in the documents seen by SPIEGEL to suggest that the companies whose products are mentioned in the catalog provided any support to the NSA or even had any knowledge of the intelligence solutions. "Cisco does not work with any government to modify our equipment, nor to implement any so-called security 'back doors' in our products," the company said in a statement. Contacted by SPIEGEL reporters, officials at Western Digital, Juniper Networks and Huawei also said they had no knowledge of any such modifications. Meanwhile, Dell officials said the company "respects and complies with the laws of all countries in which it operates." Many of the items in the software solutions catalog date from 2008, and some of the target server systems that are listed are no longer on the market today. At the same time, it's not as if the hackers within the ANT division have been sleeping on the job. They have continued to develop their arsenal. Some pages in the 2008 catalog, for example, list new systems for which no tools yet exist. However, the authors promise they are already hard at work developing new tools and that they will be "pursued for a future release."
  •  
    Oh, great. My router and all of my hard drives have NSA backdoors in them. And my BIOS on the Linux box may be infected with a backdoor. What are the odds that NSA has not developed similar capability for the UEFI on our two newer Windows boxes? 
Paul Merrell

Testosterone Pit - Home - The Other Reason Why IBM Throws A Billion At Linux ... - 0 views

  • IBM announced today that it would throw another billion at Linux, the open-source operating system, to run its Power System servers. The first time it had thrown a billion at Linux was in 2001, when Linux was a crazy, untested, even ludicrous proposition for the corporate world. So the moolah back then didn’t go to Linux itself, which was free, but to related technologies across hardware, software, and service, including things like sales and advertising – and into IBM’s partnership with Red Hat which was developing its enterprise operating system, Red Hat Enterprise Linux. “It helped start a flurry of innovation that has never slowed,” said Jim Zemlin, executive director of the Linux Foundation. IBM claims that the investment would “help clients capitalize on big data and cloud computing with modern systems built to handle the new wave of applications coming to the data center in the post-PC era.” Some of the moolah will be plowed into the Power Systems Linux Center in Montpellier, France, which opened today. IBM’s first Power Systems Linux Center opened in Beijing in May. IBM may be trying to make hay of the ongoing revelations that have shown that the NSA and other intelligence organizations in the US and elsewhere have roped in American tech companies of all stripes with huge contracts to perfect a seamless spy network. They even include physical aspects of surveillance, such as license plate scanners and cameras, which are everywhere [read.... Surveillance Society: If You Drive, You Get Tracked].
  • Then another boon for IBM. Experts at the German Federal Office for Security in Information Technology (BIS) determined that Windows 8 is dangerous for data security. It allows Microsoft to control the computer remotely through a “special surveillance chip,” the wonderfully named Trusted Platform Module (TPM), and a backdoor in the software – with keys likely accessible to the NSA and possibly other third parties, such as the Chinese. Risks: “Loss of control over the operating system and the hardware” [read.... LEAKED: German Government Warns Key Entities Not To Use Windows 8 – Links The NSA.
  • It would be an enormous competitive advantage for an IBM salesperson to walk into a government or corporate IT department and sell Big Data servers that don’t run on Windows, but on Linux. With the Windows 8 debacle now in public view, IBM salespeople don’t even have to mention it. In the hope of stemming the pernicious revenue decline their employer has been suffering from, they can politely and professionally hype the security benefits of IBM’s systems and mention in passing the comforting fact that some of it would be developed in the Power Systems Linux Centers in Montpellier and Beijing. Alas, Linux too is tarnished. The backdoors are there, though the code can be inspected, unlike Windows code. And then there is Security-Enhanced Linux (SELinux), which was integrated into the Linux kernel in 2003. It provides a mechanism for supporting “access control” (a backdoor) and “security policies.” Who developed SELinux? Um, the NSA – which helpfully discloses some details on its own website (emphasis mine): The results of several previous research projects in this area have yielded a strong, flexible mandatory access control architecture called Flask. A reference implementation of this architecture was first integrated into a security-enhanced Linux® prototype system in order to demonstrate the value of flexible mandatory access controls and how such controls could be added to an operating system. The architecture has been subsequently mainstreamed into Linux and ported to several other systems, including the Solaris™ operating system, the FreeBSD® operating system, and the Darwin kernel, spawning a wide range of related work.
  • ...1 more annotation...
  • Among a slew of American companies who contributed to the NSA’s “mainstreaming” efforts: Red Hat. And IBM? Like just about all of our American tech heroes, it looks at the NSA and other agencies in the Intelligence Community as “the Customer” with deep pockets, ever increasing budgets, and a thirst for technology and data. Which brings us back to Windows 8 and TPM. A decade ago, a group was established to develop and promote Trusted Computing that governs how operating systems and the “special surveillance chip” TPM work together. And it too has been cooperating with the NSA. The founding members of this Trusted Computing Group, as it’s called facetiously: AMD, Cisco, Hewlett-Packard, Intel, Microsoft, and Wave Systems. Oh, I almost forgot ... and IBM. And so IBM might not escape, despite its protestations and slick sales presentations, the suspicion by foreign companies and governments alike that its Linux servers too have been compromised – like the cloud products of other American tech companies. And now, they’re going to pay a steep price for their cooperation with the NSA. Read...  NSA Pricked The “Cloud” Bubble For US Tech Companies
Gary Edwards

Obama is getting 'trolled' by the Islamic State | The Japan Times - 0 views

  • ut yourself into the mindset of the insurgents. Their enemies are the existing governments of the countries they seek to occupy: Syria, Iraq, possibly Jordan, certainly Saudi Arabia and the Gulf states. But — again, like al-Qaida in the early 2000s — they have a more formidable adversary: moderation.
  • To survive and expand, radical jihadists don’t need all, or even most, Muslims to join the fight. But they do require the tacit consent of the governed in the areas they control, and the political sympathy that prompts donors to send them the financial contributions that allow them to our new recruits and hold their territory — factors that fuel legitimacy.
  • Until recently, most Muslims — including most Sunnis — didn’t buy it. Hundreds of millions of them drank, smoked, failed to pray regularly, and envied the liberalism and economic power of the West.
  • ...6 more annotations...
  • As radicals and fundamentalists, the Islamic State’ Manichean worldview portrays the West, and especially the United States and Britain, and their Middle Eastern client states — obviously Israel most of all — as monsters hell-bent on the oppression of Muslims, the exploitation and appropriation of Muslim lands, using moral corruption and godless capitalism as means toward global domination at their expense.
  • The genius of 9/11 was to provoke the United States and its allies into behaving exactly like the monsters al-Qaida and other jihadist groups had long argued they were. The invasions of Afghanistan and Iraq, brazenly embracing torture, mass kidnappings and opening a gulag archipelago of secret prisons everywhere from Eastern Europe to Guantanamo to jail ships floating in the Indian Ocean, as well as the brazen disregard for innocent civilians demonstrated by Bush and Obama’s willy-nilly drone program, convinced countless fence sitters and former moderates to join the militants, cut them a check, or at least look the other way. By the end of the Bush years, the U.S. was wildly unpopular, viewed as “violent” and “selfish” throughout the Muslim world.
  • We got trolled.
  • The tactics Obama plans to use against the Islamic State are more of the same. Once again, U.S. warplanes and remote-controlled killer air robots will rain death upon people,the vast majority of whom were innocent and had nothing to do with the group responsible for beheading those poor journalists.
  • Once again, although we will on occasion succeed in killing some No. 1 or No. 2 “top terrorist,” we will lose this battle for hearts and minds because (a) the nature of guerrilla warfare is that no leader is indispensable and anyone can and will be replaced, and (b) each civilian death will generate thousands of fierce lifelong enemies — yes, some family members and many friends, but most of all the one group of people American pundits and journalists rarely reference when discussing “collateral damage” — ordinary people, there and in the region and around the world, who react with disgust and rage at our cruelty.
  • Ironically, the very same emotions that triggered America’s latest tumble into the Islamist trap.
  •  
    "U.S. President Barack Obama's reaction to the videos of two American freelance journalists getting beheaded by Islamist militants gives me the uncomfortable feeling that the American people are getting punk'd - again. The same thing happened 13 years ago last week, when a dozen and a half Muslim fundamentalists attacked our financial and political capitals using our own planes. The hijackers got exactly the reaction that they wanted: overreaction. "
Paul Merrell

Israel Won't Stop Spying on the U.S. - 0 views

  • Whatever happened to honor among thieves? When the National Security Agency was caught eavesdropping on German Chancellor Angela Merkel’s cell phone, it was considered a rude way to treat a friend. Now U.S. intelligence officials are saying—albeit very quietly, behind closed doors on Capitol Hill—that our Israeli “friends” have gone too far with their spying operations here. According to classified briefings on legislation that would lower visa restrictions on Israeli citizens, Jerusalem’s efforts to steal U.S. secrets under the cover of trade missions and joint defense technology contracts have “crossed red lines.”  Israel’s espionage activities in America are unrivaled and unseemly, counterspies have told members of the House Judiciary and Foreign Affairs committees, going far beyond activities by other close allies, such as Germany, France, the U.K. and Japan. A congressional staffer familiar with a briefing last January called the testimony “very sobering…alarming…even terrifying.” Another staffer called it “damaging.”  The Jewish state’s primary target: America’s industrial and technical secrets. 
  • “No other country close to the United States continues to cross the line on espionage like the Israelis do,” said a former congressional staffer who attended another classified briefing in late 2013, one of several in recent months given by officials from the Department of Homeland Security (DHS), the State Department, the FBI and the National Counterintelligence Directorate. 
  • “I don’t think anyone was surprised by these revelations,” the former aide said. “But when you step back and hear…that there are no other countries taking advantage of our security relationship the way the Israelis are for espionage purposes, it is quite shocking. I mean, it shouldn’t be lost on anyone that after all the hand-wringing over [Jonathan] Pollard, it’s still going on.” Israel and pro-Israel groups in America have long lobbied U.S. administrations to free Pollard, a former U.S. naval intelligence analyst serving a life sentence since 1987 for stealing tens of thousands of secrets for Israel. (U.S. counterintelligence officials suspect that Israel traded some of the Cold War-era information to Moscow in exchange for the emigration of Russian Jews.) After denying for over a decade that Pollard was its paid agent, Israel apologized and promised not to spy on U.S. soil again. Since then, more Israeli spies have been arrested and convicted by U.S. courts. 
  • ...4 more annotations...
  • I.C. Smith, a former top FBI counterintelligence specialist during the Pollard affair, tells Newsweek, “In the early 1980s, dealing with the Israelis was, for those assigned that area, extremely frustrating. The Israelis were supremely confident that they had the clout, especially on the Hill, to basically get [away] with just about anything. This was the time of the Criteria Country List—later changed to the National Security Threat List—and I found it incredible that Taiwan and Vietnam, for instance, were on [it], when neither country had conducted activities that remotely approached the Pollard case, and neither had a history of, or a comparable capability to conduct, such activities.” While all this was going on, Israel was lobbying hard to be put on the short list of countries (38 today) whose citizens don’t need visas to visit here.  Until recently, the major sticking point was the Jewish state’s discriminatory and sometimes harsh treatment of Arab-Americans and U.S. Palestinians seeking to enter Israel. It has also failed to meet other requirements for the program, such as promptly and regularly reporting lost and stolen passports, officials say—a problem all the more pressing since Iranians were found to have boarded the missing Malaysia Airlines flight with stolen passports. 
  • “But this is the first time congressional aides have indicated that intelligence and national security concerns also are considerations in weighing Israel’s admission into the visa waiver program,” Jonathan Broder, the foreign and defense editor for CQ Roll Call, a Capitol Hill news site, wrote last month. He quoted a senior House aide as saying, “The U.S. intelligence community is concerned that adding Israel to the visa waiver program would make it easier for Israeli spies to enter the country.” The Israelis “thought they could just snap their fingers” and get friends in Congress to legislate visa changes, a Hill aide said, instead of going through the required hoops with DHS.
  • Congressional aides snorted at the announcement. “The Israelis haven’t done s**t to get themselves into the visa waiver program,” the former congressional aide said, echoing the views of two other House staffers working on the issue. “I mean, if the Israelis got themselves into this visa waiver program and if we were able to address this [intelligence community] concern—great, they’re a close ally, there are strong economic and cultural links between the two countries, it would be wonderful if more Israelis could come over here without visas. I’m sure it would spur investment and tourist dollars in our economy and so on and so forth. But what I find really funny is they haven’t done s**t to get into the program. They think that their friends in Congress can get them in, and that’s not the case. Congress can lower one or two of the barriers, but they can’t just legislate the Israelis in.” The path to visa waivers runs through DHS and can take years to navigate.
  • Israel is not even close to meeting those standards, a congressional aide said. “You’ve got to have machine-readable passports in place—the e-passports with a data chip in them. The Israelis have only just started to issue them to diplomats and senior officials and so forth, and that probably won’t be rolled out to the rest of their population for another 10 years.” But U.S. counterspies will get the final word. And since Israel is as likely to stop spying here as it is to give up matzo for Passover, the visa barriers are likely to stay up. As Paul Pillar, the CIA’s former national intelligence officer for the Near East and South Asia, told Newsweek, old habits are hard to break: Zionists were dispatching spies to America before there even was an Israel, to gather money and materials for the cause and later the fledgling state. Key components for Israel’s nuclear bombs were clandestinely obtained here. “They’ve found creative and inventive ways,” Pillar said, to get what they want. “If we give them free rein to send people over here, how are we going to stop that?” the former congressional aide asked. “They’re incredibly aggressive. They’re aggressive in all aspects of their relationship with the United States. Why would their intelligence relationship with us be any different?”
Paul Merrell

CURIA - Documents - 0 views

  • 37      It must be stated that the interference caused by Directive 2006/24 with the fundamental rights laid down in Articles 7 and 8 of the Charter is, as the Advocate General has also pointed out, in particular, in paragraphs 77 and 80 of his Opinion, wide-ranging, and it must be considered to be particularly serious. Furthermore, as the Advocate General has pointed out in paragraphs 52 and 72 of his Opinion, the fact that data are retained and subsequently used without the subscriber or registered user being informed is likely to generate in the minds of the persons concerned the feeling that their private lives are the subject of constant surveillance.
  • 43      In this respect, it is apparent from recital 7 in the preamble to Directive 2006/24 that, because of the significant growth in the possibilities afforded by electronic communications, the Justice and Home Affairs Council of 19 December 2002 concluded that data relating to the use of electronic communications are particularly important and therefore a valuable tool in the prevention of offences and the fight against crime, in particular organised crime. 44      It must therefore be held that the retention of data for the purpose of allowing the competent national authorities to have possible access to those data, as required by Directive 2006/24, genuinely satisfies an objective of general interest.45      In those circumstances, it is necessary to verify the proportionality of the interference found to exist.46      In that regard, according to the settled case-law of the Court, the principle of proportionality requires that acts of the EU institutions be appropriate for attaining the legitimate objectives pursued by the legislation at issue and do not exceed the limits of what is appropriate and necessary in order to achieve those objectives (see, to that effect, Case C‑343/09 Afton Chemical EU:C:2010:419, paragraph 45; Volker und Markus Schecke and Eifert EU:C:2010:662, paragraph 74; Cases C‑581/10 and C‑629/10 Nelson and Others EU:C:2012:657, paragraph 71; Case C‑283/11 Sky Österreich EU:C:2013:28, paragraph 50; and Case C‑101/12 Schaible EU:C:2013:661, paragraph 29).
  • 67      Article 7 of Directive 2006/24, read in conjunction with Article 4(1) of Directive 2002/58 and the second subparagraph of Article 17(1) of Directive 95/46, does not ensure that a particularly high level of protection and security is applied by those providers by means of technical and organisational measures, but permits those providers in particular to have regard to economic considerations when determining the level of security which they apply, as regards the costs of implementing security measures. In particular, Directive 2006/24 does not ensure the irreversible destruction of the data at the end of the data retention period.68      In the second place, it should be added that that directive does not require the data in question to be retained within the European Union, with the result that it cannot be held that the control, explicitly required by Article 8(3) of the Charter, by an independent authority of compliance with the requirements of protection and security, as referred to in the two previous paragraphs, is fully ensured. Such a control, carried out on the basis of EU law, is an essential component of the protection of individuals with regard to the processing of personal data (see, to that effect, Case C‑614/10 Commission v Austria EU:C:2012:631, paragraph 37).69      Having regard to all the foregoing considerations, it must be held that, by adopting Directive 2006/24, the EU legislature has exceeded the limits imposed by compliance with the principle of proportionality in the light of Articles 7, 8 and 52(1) of the Charter.
  • ...13 more annotations...
  • 58      Directive 2006/24 affects, in a comprehensive manner, all persons using electronic communications services, but without the persons whose data are retained being, even indirectly, in a situation which is liable to give rise to criminal prosecutions. It therefore applies even to persons for whom there is no evidence capable of suggesting that their conduct might have a link, even an indirect or remote one, with serious crime. Furthermore, it does not provide for any exception, with the result that it applies even to persons whose communications are subject, according to rules of national law, to the obligation of professional secrecy. 59      Moreover, whilst seeking to contribute to the fight against serious crime, Directive 2006/24 does not require any relationship between the data whose retention is provided for and a threat to public security and, in particular, it is not restricted to a retention in relation (i) to data pertaining to a particular time period and/or a particular geographical zone and/or to a circle of particular persons likely to be involved, in one way or another, in a serious crime, or (ii) to persons who could, for other reasons, contribute, by the retention of their data, to the prevention, detection or prosecution of serious offences.
  • 1        These requests for a preliminary ruling concern the validity of Directive 2006/24/EC of the European Parliament and of the Council of 15 March 2006 on the retention of data generated or processed in connection with the provision of publicly available electronic communications services or of public communications networks and amending Directive 2002/58/EC (OJ 2006 L 105, p. 54).
  • Digital Rights Ireland Ltd (C‑293/12)vMinister for Communications, Marine and Natural Resources,Minister for Justice, Equality and Law Reform,Commissioner of the Garda Síochána,Ireland,The Attorney General,intervener:Irish Human Rights Commission, andKärntner Landesregierung (C‑594/12),Michael Seitlinger,Christof Tschohl and others,
  • JUDGMENT OF THE COURT (Grand Chamber)8 April 2014 (*)(Electronic communications — Directive 2006/24/EC — Publicly available electronic communications services or public communications networks services — Retention of data generated or processed in connection with the provision of such services — Validity — Articles 7, 8 and 11 of the Charter of Fundamental Rights of the European Union)In Joined Cases C‑293/12 and C‑594/12,
  • 34      As a result, the obligation imposed by Articles 3 and 6 of Directive 2006/24 on providers of publicly available electronic communications services or of public communications networks to retain, for a certain period, data relating to a person’s private life and to his communications, such as those referred to in Article 5 of the directive, constitutes in itself an interference with the rights guaranteed by Article 7 of the Charter. 35      Furthermore, the access of the competent national authorities to the data constitutes a further interference with that fundamental right (see, as regards Article 8 of the ECHR, Eur. Court H.R., Leander v. Sweden, 26 March 1987, § 48, Series A no 116; Rotaru v. Romania [GC], no. 28341/95, § 46, ECHR 2000-V; and Weber and Saravia v. Germany (dec.), no. 54934/00, § 79, ECHR 2006-XI). Accordingly, Articles 4 and 8 of Directive 2006/24 laying down rules relating to the access of the competent national authorities to the data also constitute an interference with the rights guaranteed by Article 7 of the Charter. 36      Likewise, Directive 2006/24 constitutes an interference with the fundamental right to the protection of personal data guaranteed by Article 8 of the Charter because it provides for the processing of personal data.
  • 65      It follows from the above that Directive 2006/24 does not lay down clear and precise rules governing the extent of the interference with the fundamental rights enshrined in Articles 7 and 8 of the Charter. It must therefore be held that Directive 2006/24 entails a wide-ranging and particularly serious interference with those fundamental rights in the legal order of the EU, without such an interference being precisely circumscribed by provisions to ensure that it is actually limited to what is strictly necessary.66      Moreover, as far as concerns the rules relating to the security and protection of data retained by providers of publicly available electronic communications services or of public communications networks, it must be held that Directive 2006/24 does not provide for sufficient safeguards, as required by Article 8 of the Charter, to ensure effective protection of the data retained against the risk of abuse and against any unlawful access and use of that data. In the first place, Article 7 of Directive 2006/24 does not lay down rules which are specific and adapted to (i) the vast quantity of data whose retention is required by that directive, (ii) the sensitive nature of that data and (iii) the risk of unlawful access to that data, rules which would serve, in particular, to govern the protection and security of the data in question in a clear and strict manner in order to ensure their full integrity and confidentiality. Furthermore, a specific obligation on Member States to establish such rules has also not been laid down.
  • 60      Secondly, not only is there a general absence of limits in Directive 2006/24 but Directive 2006/24 also fails to lay down any objective criterion by which to determine the limits of the access of the competent national authorities to the data and their subsequent use for the purposes of prevention, detection or criminal prosecutions concerning offences that, in view of the extent and seriousness of the interference with the fundamental rights enshrined in Articles 7 and 8 of the Charter, may be considered to be sufficiently serious to justify such an interference. On the contrary, Directive 2006/24 simply refers, in Article 1(1), in a general manner to serious crime, as defined by each Member State in its national law.61      Furthermore, Directive 2006/24 does not contain substantive and procedural conditions relating to the access of the competent national authorities to the data and to their subsequent use. Article 4 of the directive, which governs the access of those authorities to the data retained, does not expressly provide that that access and the subsequent use of the data in question must be strictly restricted to the purpose of preventing and detecting precisely defined serious offences or of conducting criminal prosecutions relating thereto; it merely provides that each Member State is to define the procedures to be followed and the conditions to be fulfilled in order to gain access to the retained data in accordance with necessity and proportionality requirements.
  • 55      The need for such safeguards is all the greater where, as laid down in Directive 2006/24, personal data are subjected to automatic processing and where there is a significant risk of unlawful access to those data (see, by analogy, as regards Article 8 of the ECHR, S. and Marper v. the United Kingdom, § 103, and M. K. v. France, 18 April 2013, no. 19522/09, § 35).56      As for the question of whether the interference caused by Directive 2006/24 is limited to what is strictly necessary, it should be observed that, in accordance with Article 3 read in conjunction with Article 5(1) of that directive, the directive requires the retention of all traffic data concerning fixed telephony, mobile telephony, Internet access, Internet e-mail and Internet telephony. It therefore applies to all means of electronic communication, the use of which is very widespread and of growing importance in people’s everyday lives. Furthermore, in accordance with Article 3 of Directive 2006/24, the directive covers all subscribers and registered users. It therefore entails an interference with the fundamental rights of practically the entire European population. 57      In this respect, it must be noted, first, that Directive 2006/24 covers, in a generalised manner, all persons and all means of electronic communication as well as all traffic data without any differentiation, limitation or exception being made in the light of the objective of fighting against serious crime.
  • 62      In particular, Directive 2006/24 does not lay down any objective criterion by which the number of persons authorised to access and subsequently use the data retained is limited to what is strictly necessary in the light of the objective pursued. Above all, the access by the competent national authorities to the data retained is not made dependent on a prior review carried out by a court or by an independent administrative body whose decision seeks to limit access to the data and their use to what is strictly necessary for the purpose of attaining the objective pursued and which intervenes following a reasoned request of those authorities submitted within the framework of procedures of prevention, detection or criminal prosecutions. Nor does it lay down a specific obligation on Member States designed to establish such limits. 63      Thirdly, so far as concerns the data retention period, Article 6 of Directive 2006/24 requires that those data be retained for a period of at least six months, without any distinction being made between the categories of data set out in Article 5 of that directive on the basis of their possible usefulness for the purposes of the objective pursued or according to the persons concerned.64      Furthermore, that period is set at between a minimum of 6 months and a maximum of 24 months, but it is not stated that the determination of the period of retention must be based on objective criteria in order to ensure that it is limited to what is strictly necessary.
  • 52      So far as concerns the right to respect for private life, the protection of that fundamental right requires, according to the Court’s settled case-law, in any event, that derogations and limitations in relation to the protection of personal data must apply only in so far as is strictly necessary (Case C‑473/12 IPI EU:C:2013:715, paragraph 39 and the case-law cited).53      In that regard, it should be noted that the protection of personal data resulting from the explicit obligation laid down in Article 8(1) of the Charter is especially important for the right to respect for private life enshrined in Article 7 of the Charter.54      Consequently, the EU legislation in question must lay down clear and precise rules governing the scope and application of the measure in question and imposing minimum safeguards so that the persons whose data have been retained have sufficient guarantees to effectively protect their personal data against the risk of abuse and against any unlawful access and use of that data (see, by analogy, as regards Article 8 of the ECHR, Eur. Court H.R., Liberty and Others v. the United Kingdom, 1 July 2008, no. 58243/00, § 62 and 63; Rotaru v. Romania, § 57 to 59, and S. and Marper v. the United Kingdom, § 99).
  • 26      In that regard, it should be observed that the data which providers of publicly available electronic communications services or of public communications networks must retain, pursuant to Articles 3 and 5 of Directive 2006/24, include data necessary to trace and identify the source of a communication and its destination, to identify the date, time, duration and type of a communication, to identify users’ communication equipment, and to identify the location of mobile communication equipment, data which consist, inter alia, of the name and address of the subscriber or registered user, the calling telephone number, the number called and an IP address for Internet services. Those data make it possible, in particular, to know the identity of the person with whom a subscriber or registered user has communicated and by what means, and to identify the time of the communication as well as the place from which that communication took place. They also make it possible to know the frequency of the communications of the subscriber or registered user with certain persons during a given period. 27      Those data, taken as a whole, may allow very precise conclusions to be drawn concerning the private lives of the persons whose data has been retained, such as the habits of everyday life, permanent or temporary places of residence, daily or other movements, the activities carried out, the social relationships of those persons and the social environments frequented by them.
  • 32      By requiring the retention of the data listed in Article 5(1) of Directive 2006/24 and by allowing the competent national authorities to access those data, Directive 2006/24, as the Advocate General has pointed out, in particular, in paragraphs 39 and 40 of his Opinion, derogates from the system of protection of the right to privacy established by Directives 95/46 and 2002/58 with regard to the processing of personal data in the electronic communications sector, directives which provided for the confidentiality of communications and of traffic data as well as the obligation to erase or make those data anonymous where they are no longer needed for the purpose of the transmission of a communication, unless they are necessary for billing purposes and only for as long as so necessary.
  • On those grounds, the Court (Grand Chamber) hereby rules:Directive 2006/24/EC of the European Parliament and of the Council of 15 March 2006 on the retention of data generated or processed in connection with the provision of publicly available electronic communications services or of public communications networks and amending Directive 2002/58/EC is invalid.
  •  
    EU Court of Justice decision in regard to a Directive that required communications data retention by telcos/ISPs, finding the Directive invalid as a violation of the right of privacy in communications. Fairly read, paragraph 59 outlaws bulk collection of such records, i.e., it requires the equivalent of a judge-issued search warrant in the U.S. based on probable cause to believe that the particular individual's communications are a legitimate object of a search.  Note also that paragraph 67 effectively forbids transfer of any retained data outside the E.U. So a barrier for NSA sharing of data with GCHQ derived from communications NSA collects from EU communications traffic. Bye-bye, Big Data for GCHQ in the E.U. 
Paul Merrell

Putin calls Saudi king to discuss Syria conflict - Yahoo News - 0 views

  • Russian President Vladimir Putin spoke to Saudi Arabia's King Salman about finding a solution to the Syria crisis on Saturday, just two days before he is due to address the UN on the issue, the Kremlin said. In a telephone conversation at Russia's behest, the two men "exchanged views on regional security matters, first and foremost, in the context of finding ways to settle the conflict in Syria", a statement posted to the Kremlin's website said.They also discussed "building more effective international cooperation in the fight against the so-called Islamic State and other terrorist groups", it said.A decades-long backer of the Damascus regime, Moscow has steadfastly supported President Bashar al-Assad throughout four-and-a-half years of war which have killed more than 240,000 people.Saudi Arabia is part of a US-led coalition that began an air campaign against IS in Syria last September, and insists it will never cooperate with the Assad regime.
  • Moscow's military build-up comes with Washington's own policy for fighting IS in Syria in increasing disarray.The US has a $500-million programme to train and equip vetted moderates recruited from among the rebels fighting Assad, but it has faced repeated setbacks.Washington and its allies have up until now insisted that Assad has no future in Syria, but there have been recent signs of a change, perhaps allowing him an interim role until a new government is formed.On Friday, a Russian diplomat raised the possibility of Moscow joining the Washington-led coalition against IS provided the UN Security Council gave a legal framework for its action."It is in theory possible that all those involved join the coalition if it receives the approval of the UN Security Council," Ilya Rogatchev, head of the Russian Foreign Ministry's Department for New Challenges and Threats, told AFP.
  •  
    But did Putin present Salman with an offer he couldn't refuse? How tough will Russia be with the Saudis, the major source of mercenary forces in Syria and their funding?
Paul Merrell

An Israeli takeover of the Palestine Authority…? - Alan Hart - 0 views

  • On the face of it that’s a silly question and the speculation it represents – that Palestinian “President” Abbas could replaced by an Israeli agent or asset – is not worthy of discussion. But before dismissing it readers might do what I did and consider two things. The first is that Mohammed Dahlan, formerly one of the most powerful Fatah leaders and almost certainly the one who administered for Israel the polonium that killed Arafat, is now putting a big effort into getting rid of Abbas by one means or another and replacing him with – guess who? – himself. In passing it is interesting to note that according to a recent report in the Israeli newspaper Ma’ariv, Netanyahu’s special envoy, Yitzhak Molcho, is in a secret dialogue with Dahlan who spends his time shuttling between Cairo and the U.A.E. where he currently lives. One assumption has to be that Netanyahu is hoping that if Dahlan became “President” of the PA he would go much further than collaborator Abbas in delivering for Israel. (Also worth noting is that Dahlan speaks fluent Hebrew. He learned to do so during his 11 spells in Israeli jails between 1981 and 1986).
  • The second consideration is Israel’s track record in successfully placing its agents inside Arab institutions and organizations at very high levels.
  • My speculation (repeat speculation) is that if Mohammed Dahlan became the “President”, he would be prepared to use force as necessary to impose Israel’s terms for peace on the Palestinians. Dahlan demonstrated his enthusiasm for doing Israeli and American dirty work when, at the request of the Bush administration, he agreed to lead a military campaign to destroy Hamas after its election victory in 2006. The Bush administration provided Dahlan with money and arms and trained his Fatah fighters in a number of Arab countries. But it all went badly wrong for Dahlan and his sponsors. Hamas got wind of what Dahlan (fronting for the Bush administration and Israel) was intending and launched an Israeli-like pre-emptive strike. It destroyed Fatah’s security forces based in the Gaza Strip (which had been Dahlan’s base) and put Fatah politically out of business there. Commenting on what had happened in the Gaza Strip, Hani al-Hassan, for many years Arafat’s crisis manager and one of his two most trusted advisers, said it was “not a war between Fatah and Hamas but between Hamas and Fatah collaborators who served the Americans and the Israelis.”
  • ...3 more annotations...
  • The Ma’ariv article I mentioned above said that Dahlan has claimed that he and not Abbas can be counted on to bring peace, and that in 2010 he reportedly sent a letter to the Obama administration in which he said, “There is no choice but to replace Abbas with someone who can deliver results.” Because Dahlan must know that Israel’s leaders are not remotely interested in peace on terms the Palestinians could accept, I think it is reasonable to assume that the result he has in mind is peace imposed on Israel’s terms – effectively a Palestinian surrender to Zionism’s will. Is a Dahlan/Israeli takeover of the PA really possible? An indication that Abbas seems to think it cannot be ruled out was his request to President Obama that he press Israel to include Marwan Barghouti in the fourth and final batch of Palestinian prisoners due to be released at the end of this month. (Prisoner release was one of the inducements to secure Abbas’s green light for Secretary of State Kerry to launch his “peace process”. But today Netanyahu is under mounting pressure from the neo-fascist tendency to the right of him to say “No” to any further prisoner releases).
  • Subsequently the Bush administration exerted heavy pressure on Abbas (which he resisted) to appoint Dahlan as his deputy. And some Palestinian officials said that the U.S. and a number of European countries had made it clear that they would like Dahlan to succeed Abbas as head of the P.A. They presumably believed then, as Netanyahu might well do today, that Dahlan as “President” would use whatever means were necessary to compel the Palestinians to make peace on Israel’s terms. Shortly after his forces were expelled from the Gaza Strip, Dahlan re-established himself in the West Bank. And thereafter tensions between his Fatah supporters and opponents grew and grew. In June 2011 he was expelled from Fatah because of the assumption that he had delivered for Israel whatever it was that poisoned Arafat. Three months later Abbas ordered a raid on Dahlan’s house and the arrest of his private armed guards. Today in exile, and consulting with his allies in Sisi’s Egypt and some Arab Gulf states as well as Israel and America, Dahlan is plotting his comeback to replace Abbas by one means or another.
  • Barghouti is by far the most popular Palestinian leader and would easily win an election to replace Abbas as “President”. And that, of course, is precisely why Israel won’t release him. So if Abbas can be bullied and bribed by Israel and the U.S. into lifting the ban on Dahlan’s return from exile to the occupied West Bank, he, Dahlan, could be in with a chance. In my view a victory for him would be the final betrayal of the Palestinian cause.
Paul Merrell

Israel decries US 'knife in back' over Palestinian govt - Yahoo News - 0 views

  • Washington's support for a new Palestinian government backed by Israel's Islamist foe Hamas, has left the Jewish state feeling betrayed, triggering a new crisis with its closest ally. Several Israeli ministers expressed public anger on Tuesday after the US State Department said it was willing to work with the new Palestinian unity government put together by the West Bank leadership and Gaza's Hamas rulers. Technocratic in nature, the new government was sworn in on Monday in front of president Mahmud Abbas, with Washington offering its backing several hours later.
  • Speaking to reporters on Monday, State Department spokeswoman Jen Psaki said the new cabinet would be judged "by its actions.""At this point, it appears that president Abbas has formed an interim technocratic government that does not include ministers affiliated with Hamas," she said. "With what we know now, we will work with this government."
  • The US endorsement was viewed as a major blow for Israeli Prime Minister Benjamin Netanyahu, who had on Sunday urged the international community not to rush into recognising the new government, which he said would only "strengthen terror."
  • ...4 more annotations...
  • "Unfortunately, American naivety has broken all records," said Communications Minister Gilad Erdan, a cabinet hardliner who is close to Netanyahu."Collaborating with Hamas, which is defined as a terror organisation in the United States, is simply unthinkable. "US capitulation to Palestinian tactics badly damages the chance of ever returning to negotiations and will cause Israel to take unilateral steps to defend its citizens from the government of terror which Abu Mazen (Abbas) has set up." Public radio said Netanyahu was feeling "betrayed and deceived," particularly as he had assured his security cabinet that US Secretary of State John Kerry had promised him Washington would not recognise the new government immediately.
  • "And it wasn't immediate -- it was five hours later that this recognition took place," the radio noted ironically. A senior political official quoted by the Israel Hayom freesheet, widely regarded as Netanyahu's mouthpiece, said the US move was "like a knife in the back." - 'Answer with annexation' - Israeli commentators said the Palestinians had chalked up a "major success" in driving a new wedge between Israel and its US ally.
  • With the peace process in tatters, hardliners within Netanyahu's rightwing coalition have been pushing for Israel to take unilateral steps such as the annexation of the main Jewish settlement blocs in the occupied West Bank.
  • The security cabinet agreed on Monday to set up a team to examine the annexation option, but Yediot Aharonot commentator Shimon Shiffer said the move was a sop to Bennett and other hardliners rather than a serious policy change.
  •  
    What's remarkable here is that Obama has apparently ratcheted down his fear of the Israel Lobby. But it's not as though Mr. Netanyahu was not warned that the world would see Israel as responsible if it blew up the Kerry-brokered negotiation between Israel and Palestine. Israel did blow it up by not delivering the last shipment of Palestinian prisoners required by the pre-negotiation agreement, attempting to gain further concessions using their release as leverage.  Palestine responded by joining a large number of U.N. treaty organizations and was thus recognized by most nations on the planet as a nation: a critically important move, because it is recognition by other nations as a nation that qualifies Palestine as a full-fledged U.N. member rather than an observer state, an application Palestine can now make at the time of its choosing. That is also important because Palestine is now positioned to join the Rome Convention that created the International Criminal Court, providing Palestine with legal standing to file war crime charges against high Israeli officials that would then obligate the Court to investigate. Palestine is holding back on that move, using it as bargaining leverage on the world stage.   Palestine also responded by forming a coalition "unity" government with Hamas, the political party that nominally rules the Gaza strip, the world's largest open-air concentration camp. At Israel's request, the U.S. had several years ago designated Hamas as a terrorist organization. But that was a purely political move. It seems that the political situation has changed. Obama is pivoting out of the Mideast as he performs his ballyhooed "pivot to Asia," which is actually a pivot to contain Russia that isn't working and a pivot to subjugate Africa and its huge store of untapped natural resources, including lots of oil. Blocking China's economic deals in Africa with military force seems to be the current top concern in the White House. Israel was already a pari
Paul Merrell

The All Writs Act, Software Licenses, and Why Judges Should Ask More Questions | Just S... - 0 views

  • Pending before federal magistrate judge James Orenstein is the government’s request for an order obligating Apple, Inc. to unlock an iPhone and thereby assist prosecutors in decrypting data the government has seized and is authorized to search pursuant to a warrant. In an order questioning the government’s purported legal basis for this request, the All Writs Act of 1789 (AWA), Judge Orenstein asked Apple for a brief informing the court whether the request would be technically feasible and/or burdensome. After Apple filed, the court asked it to file a brief discussing whether the government had legal grounds under the AWA to compel Apple’s assistance. Apple filed that brief and the government filed a reply brief last week in the lead-up to a hearing this morning.
  • We’ve long been concerned about whether end users own software under the law. Software owners have rights of adaptation and first sale enshrined in copyright law. But software publishers have claimed that end users are merely licensees, and our rights under copyright law can be waived by mass-market end user license agreements, or EULAs. Over the years, Granick has argued that users should retain their rights even if mass-market licenses purport to take them away. The government’s brief takes advantage of Apple’s EULA for iOS to argue that Apple, the software publisher, is responsible for iPhones around the world. Apple’s EULA states that when you buy an iPhone, you’re not buying the iOS software it runs, you’re just licensing it from Apple. The government argues that having designed a passcode feature into a copy of software which it owns and licenses rather than sells, Apple can be compelled under the All Writs Act to bypass the passcode on a defendant’s iPhone pursuant to a search warrant and thereby access the software owned by Apple. Apple’s supplemental brief argues that in defining its users’ contractual rights vis-à-vis Apple with regard to Apple’s intellectual property, Apple in no way waived its own due process rights vis-à-vis the government with regard to users’ devices. Apple’s brief compares this argument to forcing a car manufacturer to “provide law enforcement with access to the vehicle or to alter its functionality at the government’s request” merely because the car contains licensed software. 
  • This is an interesting twist on the decades-long EULA versus users’ rights fight. As far as we know, this is the first time that the government has piggybacked on EULAs to try to compel software companies to provide assistance to law enforcement. Under the government’s interpretation of the All Writs Act, anyone who makes software could be dragooned into assisting the government in investigating users of the software. If the court adopts this view, it would give investigators immense power. The quotidian aspects of our lives increasingly involve software (from our cars to our TVs to our health to our home appliances), and most of that software is arguably licensed, not bought. Conscripting software makers to collect information on us would afford the government access to the most intimate information about us, on the strength of some words in some license agreements that people never read. (And no wonder: The iPhone’s EULA came to over 300 pages when the government filed it as an exhibit to its brief.)
  • ...1 more annotation...
  • The government’s brief does not acknowledge the sweeping implications of its arguments. It tries to portray its requested unlocking order as narrow and modest, because it “would not require Apple to make any changes to its software or hardware, … [or] to introduce any new ability to access data on its phones. It would simply require Apple to use its existing capability to bypass the passcode on a passcode-locked iOS 7 phone[.]” But that undersells the implications of the legal argument the government is making: that anything a company already can do, it could be compelled to do under the All Writs Act in order to assist law enforcement. Were that the law, the blow to users’ trust in their encrypted devices, services, and products would be little different than if Apple and other companies were legally required to design backdoors into their encryption mechanisms (an idea the government just can’t seem to drop, its assurances in this brief notwithstanding). Entities around the world won’t buy security software if its makers cannot be trusted not to hand over their users’ secrets to the US government. That’s what makes the encryption in iOS 8 and later versions, which Apple has told the court it “would not have the technical ability” to bypass, so powerful — and so despised by the government: Because no matter how broadly the All Writs Act extends, no court can compel Apple to do the impossible.
Paul Merrell

BBC Protects U.K.'s Close Ally Saudi Arabia With Incredibly Dishonest and Biased Editing - 0 views

  • The BBC loves to boast about how “objective” and “neutral” it is. But a recent article, which it was forced to change, illustrates the lengths to which the British state-funded media outlet will go to protect one of the U.K. government’s closest allies, Saudi Arabia, which also happens to be one of the country’s largest arms purchasers (just this morning, the Saudi ambassador to the U.K. threatened in an op-ed that any further criticism of the Riyadh regime by Jeremy Corbyn could jeopardize the multi-layered U.K./Saudi alliance). Earlier this month, the BBC published an article describing the increase in weapons and money sent by Saudi Arabia and other Gulf regimes to anti-Assad fighters in Syria. All of that “reporting” was based on the claims of what the BBC called “a Saudi government official,” who — because he works for a government closely allied with the U.K. — was granted anonymity by the BBC and then had his claims mindlessly and uncritically presented as fact (it is the rare exception when the BBC reports adversarially on the Saudis). This anonymous “Saudi official” wasn’t whistleblowing or presenting information contrary to the interests of the regime; to the contrary, he was disseminating official information the regime wanted publicized. This was the key claim of the anonymous Saudi official (emphasis added):
  • The well-placed official, who asked not to be named, said supplies of modern, high-powered weaponry including guided anti-tank weapons would be increased to the Arab- and western-backed rebel groups fighting the forces of Syria’s President Bashar al-Assad and his Russian, Iranian and Lebanese allies. He said those groups being supplied did not include either Islamic State (IS) or al-Nusra Front, both of which are proscribed terrorist organizations. Instead, he said the weapons would go to three rebel alliances — Jaish al-Fatah (Army of Conquest), the Free Syrian Army (FSA) and the Southern Front.
  • So the Saudis, says the anonymous official, are only arming groups such as the “Army of Conquest,” but not the al Qaeda affiliate the Nusra Front. What’s the problem with this claim? It’s obvious, though the BBC would not be so impolite as to point it out: The Army of Conquest includes the Nusra Front as one of its most potent components. This is not even in remote dispute; the New York Times’ elementary explainer on the Army of Conquest from three weeks ago states:
  • ...4 more annotations...
  • The alliance consists of a number of mostly Islamist factions, including the Nusra Front, al Qaeda’s Syrian affiliate; Ahrar al-Sham, another large group; and more moderate rebel factions that have received covert arms support from the intelligence services of the United States and its allies. The Telegraph, in an early October article complaining that Russia was bombing “non-ISIL rebels,” similarly noted that the Army of Conquest (bombed by Russia) “includes a number of Islamist groups, most powerful among them Ahrar al-Sham and Jabhat al-Nusra. Jabhat al-Nusra is the local affiliate of al-Qaeda.” Even the Voice of America noted that “Russia’s main target has been the Army of Conquest, an alliance of insurgent groups that includes the al-Nusra Front, al-Qaida’s affiliate in Syria, and the hard-line Islamist group Ahrar al-Sham, as well as some less extreme Islamist groups.”
  • In other words, the claim from the anonymous Saudi official that the BBC uncritically regurgitated — that the Saudis are only arming the Army of Conquest but no groups that “include” the Nusra Front — is self-negating. A BBC reader, Ricardo Vaz, brought this contradiction to the BBC’s attention. As he told The Intercept: “The problem is that the Nusra Front is the most important faction inside the Army of Conquest. So either the Saudi official expected the BBC journalist not to know this, or he expects us to believe they can deliver weapons to factions fighting side by side with an al Qaeda affiliate and that those weapons will not make their way into Nusra’s hands. In any case, this is very close to an official admission that the Saudis (along with Qataris and Turkish) are supplying weapons to an al Qaeda affiliate. This of course is not a secret to anyone who’s paying attention.” In response to Vaz’s complaint, the BBC did not tell its readers about this vital admission. Instead, it simply edited that Saudi admission out of its article. In doing so, it made the already-misleading article so much worse, as the BBC went even further out of its way to protect the Saudis. This is what that passage now states on the current version of the article on the BBC’s site (emphasis added): He said those groups being supplied did not include either Islamic State (IS) or al-Nusra Front, both of which are proscribed terrorist organizations. Instead, he said the weapons would go to the Free Syrian Army and other small rebel groups.
  • So originally, the BBC stated that the “Saudi official” announced that the regime was arming the Army of Conquest. Once it was brought to the BBC’s attention that the Army of Conquest includes the al Qaeda affiliate Nusra Front — a direct contradiction of the Saudi official’s other claim that the Saudis are not arming Nusra — the BBC literally changed the Saudi official’s own statement, whitewashed it, to eliminate his admission that they were arming Army of Conquest. Instead, the BBC now states that the Saudis are arming “the Free Syrian Army and other small rebel groups.” The BBC simply deleted the key admission that the Saudis are arming al Qaeda.
  • But what this does highlight is just how ludicrous — how beyond parody — the 14-year-old war on terror has become, how little it has to do with its original ostensible justification. The regime with the greatest plausible proximity to the 9/11 attack — Saudi Arabia — is the closest U.S. ally in the region next to Israel. The country that had absolutely nothing to do with that attack, and which is at least as threatened as the U.S. by the religious ideology that spurred it — Iran — is the U.S.’s greatest war-on-terror adversary. Now we have a virtual admission from the Saudis that they are arming a group that centrally includes al Qaeda, while the U.S. itself has at least indirectly done the same (just as was true in Libya). And we’re actually at the point where western media outlets are vehemently denouncing Russia for bombing al Qaeda elements, which those outlets are  manipulatively referring to as “non-ISIS groups.” It’s not a stretch to say that the faction that provides the greatest material support to al Qaeda at this point is the U.S. and its closest allies. That is true even as al Qaeda continues to be paraded around as the prime need for the ongoing war. But whatever one’s views are on Syria, it’s telling indeed to watch the BBC desperately protect Saudi officials, not only by granting them anonymity to spout official propaganda, but worse, by using blatant editing games to whitewash the Saudis’ own damaging admissions, ones the BBC unwittingly published. There are many adjectives one can apply to the BBC’s behavior here: “Objective” and “neutral” are most assuredly not among them.
  •  
    Glenn Greenwald riffs on BBC's latest cover-up on behalf of the U.S. allies backing for al-Nusrah.
1 - 17 of 17
Showing 20 items per page