Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged reveals

Rss Feed Group items tagged

Gary Edwards

Bernanke Scolds Congress/Keeps Bailouts Details Secret | Greg Hunter's USAWatchdog - 0 views

  • The Fed was sued by financial news network Bloomberg two years ago.  Bloomberg wants the Fed to reveal which banks received $2 trillion in bailout money and why.  Bloomberg won the case and the Fed appealed.  Bloomberg, also, won the appeal in March 2010!  The precedent setting case would force the Fed to reveal the details of secret bank bailouts–including $500 billion given to foreign financial firms!!    In a Bloomberg story earlier this week, lawyers representing the Federal Reserve (which is made up in part by big U.S. banks) said, “U.S. commercial banks will take their fight against disclosure of Federal Reserve (documents) in 2008 to the Supreme Court if necessary . . .”  Lawyers representing the Fed say they are worried that if details of trillions of dollars in bailouts are revealed, it could cause another financial meltdown.  General Council for the Fed, Paul Saltzman, says, “Our member banks are very concerned about real-time disclosure of information that could cause a run on the banks.”  This is another story, with dire implications, the mainstream media is ignoring.  (Click here for the complete Bloomberg story)
  •  
    This article has two parts.  The first is Bernanke's waarnign to Congress that the Federal debt is out of control and they need to raise taxes AND cut spending.  The second part however is far more interesting.  Author Greg Hunter describes the Bloomberg Media court quest to force the Fed to reveal which banks received $2 trillion in bailout money and why.  Bernanke of course is fighting in the courts to keep this secret.   excerpts:  Earlier this week, Fed Chief Ben Bernanke told Congress to basically raise taxes and cut the federal budget.  The inference was, if Congress doesn't get its financial house in order, it will be their fault if the economy tanks.  Here is how Bernanke actually said it, ". . . Maintaining the confidence of the public and the financial markets requires policy makers more decisively to put the budget on a sustainable fiscal balance."   Bernanke also said the federal debt ". . .is already expected to be greater than 70%" of Gross Domestic Product, ". . . at the end of 2012."  And if that is not bad enough, Bernanke said that by 2020, ". . .federal debt would balloon to more than 100% of GDP," provided  taxes are not raised and budgets are not cut.  The Fed was sued by financial news network Bloomberg two years ago.  Bloomberg wants the Fed to reveal which banks received $2 trillion in bailout money and why.  Bloomberg won the case and the Fed appealed.  Bloomberg, also, won the appeal in March 2010!  The precedent setting case would force the Fed to reveal the details of secret bank bailouts-including $500 billion given to foreign financial firms!!    In a Bloomberg story earlier this week, lawyers representing the Federal Reserve (which is made up in part by big U.S. banks) said, "U.S. commercial banks will take their fight against disclosure of Federal Reserve (documents) in 2008 to the Supreme Court if necessary . . ."  Lawyers representing the Fed say they are worried that if details of tril
Paul Merrell

Top-Secret Document Reveals NSA Spied On Porn Habits As Part Of Plan To Discredit 'Radi... - 0 views

  • WASHINGTON -- The National Security Agency has been gathering records of online sexual activity and evidence of visits to pornographic websites as part of a proposed plan to harm the reputations of those whom the agency believes are radicalizing others through incendiary speeches, according to a top-secret NSA document. The document, provided by NSA whistleblower Edward Snowden, identifies six targets, all Muslims, as “exemplars” of how “personal vulnerabilities” can be learned through electronic surveillance, and then exploited to undermine a target's credibility, reputation and authority. The NSA document, dated Oct. 3, 2012, repeatedly refers to the power of charges of hypocrisy to undermine such a messenger. “A previous SIGINT" -- or signals intelligence, the interception of communications -- "assessment report on radicalization indicated that radicalizers appear to be particularly vulnerable in the area of authority when their private and public behaviors are not consistent,” the document argues. Among the vulnerabilities listed by the NSA that can be effectively exploited are “viewing sexually explicit material online” and “using sexually explicit persuasive language when communicating with inexperienced young girls.”
  • The Director of the National Security Agency -- described as "DIRNSA" -- is listed as the "originator" of the document. Beyond the NSA itself, the listed recipients include officials with the Departments of Justice and Commerce and the Drug Enforcement Administration. "Without discussing specific individuals, it should not be surprising that the US Government uses all of the lawful tools at our disposal to impede the efforts of valid terrorist targets who seek to harm the nation and radicalize others to violence," Shawn Turner, director of public affairs for National Intelligence, told The Huffington Post in an email Tuesday. Yet Jameel Jaffer, deputy legal director of the American Civil Liberties Union, said these revelations give rise to serious concerns about abuse. "It's important to remember that the NSA’s surveillance activities are anything but narrowly focused -- the agency is collecting massive amounts of sensitive information about virtually everyone," he said. "Wherever you are, the NSA's databases store information about your political views, your medical history, your intimate relationships and your activities online," he added. "The NSA says this personal information won't be abused, but these documents show that the NSA probably defines 'abuse' very narrowly."
  • None of the six individuals targeted by the NSA is accused in the document of being involved in terror plots. The agency believes they all currently reside outside the United States. It identifies one of them, however, as a "U.S. person," which means he is either a U.S. citizen or a permanent resident. A U.S. person is entitled to greater legal protections against NSA surveillance than foreigners are. Stewart Baker, a one-time general counsel for the NSA and a top Homeland Security official in the Bush administration, said that the idea of using potentially embarrassing information to undermine targets is a sound one. "If people are engaged in trying to recruit folks to kill Americans and we can discredit them, we ought to," said Baker. "On the whole, it's fairer and maybe more humane" than bombing a target, he said, describing the tactic as "dropping the truth on them." Any system can be abused, Baker allowed, but he said fears of the policy drifting to domestic political opponents don't justify rejecting it. "On that ground you could question almost any tactic we use in a war, and at some point you have to say we're counting on our officials to know the difference," he said.
  • ...6 more annotations...
  • In addition to analyzing the content of their internet activities, the NSA also examined the targets' contact lists. The NSA accuses two of the targets of promoting al Qaeda propaganda, but states that surveillance of the three English-speakers’ communications revealed that they have "minimal terrorist contacts." In particular, “only seven (1 percent) of the contacts in the study of the three English-speaking radicalizers were characterized in SIGINT as affiliated with an extremist group or a Pakistani militant group. An earlier communications profile of [one of the targets] reveals that 3 of the 213 distinct individuals he was in contact with between 4 August and 2 November 2010 were known or suspected of being associated with terrorism," the document reads. The document contends that the three Arabic-speaking targets have more contacts with affiliates of extremist groups, but does not suggest they themselves are involved in any terror plots. Instead, the NSA believes the targeted individuals radicalize people through the expression of controversial ideas via YouTube, Facebook and other social media websites. Their audience, both English and Arabic speakers, "includes individuals who do not yet hold extremist views but who are susceptible to the extremist message,” the document states. The NSA says the speeches and writings of the six individuals resonate most in countries including the United Kingdom, Germany, Sweden, Kenya, Pakistan, India and Saudi Arabia.
  • The NSA possesses embarrassing sexually explicit information about at least two of the targets by virtue of electronic surveillance of their online activity. The report states that some of the data was gleaned through FBI surveillance programs carried out under the Foreign Intelligence and Surveillance Act. The document adds, "Information herein is based largely on Sunni extremist communications." It further states that "the SIGINT information is from primary sources with direct access and is generally considered reliable." According to the document, the NSA believes that exploiting electronic surveillance to publicly reveal online sexual activities can make it harder for these “radicalizers” to maintain their credibility. "Focusing on access reveals potential vulnerabilities that could be even more effectively exploited when used in combination with vulnerabilities of character or credibility, or both, of the message in order to shape the perception of the messenger as well as that of his followers," the document argues. An attached appendix lists the "argument" each surveillance target has made that the NSA says constitutes radicalism, as well the personal "vulnerabilities" the agency believes would leave the targets "open to credibility challenges" if exposed.
  • One target's offending argument is that "Non-Muslims are a threat to Islam," and a vulnerability listed against him is "online promiscuity." Another target, a foreign citizen the NSA describes as a "respected academic," holds the offending view that "offensive jihad is justified," and his vulnerabilities are listed as "online promiscuity" and "publishes articles without checking facts." A third targeted radical is described as a "well-known media celebrity" based in the Middle East who argues that "the U.S perpetrated the 9/11 attack." Under vulnerabilities, he is said to lead "a glamorous lifestyle." A fourth target, who argues that "the U.S. brought the 9/11 attacks on itself" is said to be vulnerable to accusations of “deceitful use of funds." The document expresses the hope that revealing damaging information about the individuals could undermine their perceived "devotion to the jihadist cause." The Huffington Post is withholding the names and locations of the six targeted individuals; the allegations made by the NSA about their online activities in this document cannot be verified. The document does not indicate whether the NSA carried out its plan to discredit these six individuals, either by communicating with them privately about the acquired information or leaking it publicly. There is also no discussion in the document of any legal or ethical constraints on exploiting electronic surveillance in this manner.
  • While Baker and others support using surveillance to tarnish the reputation of people the NSA considers "radicalizers," U.S. officials have in the past used similar tactics against civil rights leaders, labor movement activists and others. Under J. Edgar Hoover, the FBI harassed activists and compiled secret files on political leaders, most notably Martin Luther King, Jr. The extent of the FBI's surveillance of political figures is still being revealed to this day, as the bureau releases the long dossiers it compiled on certain people in response to Freedom of Information Act requests following their deaths. The information collected by the FBI often centered on sex -- homosexuality was an ongoing obsession on Hoover's watch -- and information about extramarital affairs was reportedly used to blackmail politicians into fulfilling the bureau's needs. Current FBI Director James Comey recently ordered new FBI agents to visit the Martin Luther King, Jr. Memorial in Washington to understand "the dangers in becoming untethered to oversight and accountability."
  • James Bamford, a journalist who has been covering the NSA since the early 1980s, said the use of surveillance to exploit embarrassing private behavior is precisely what led to past U.S. surveillance scandals. "The NSA's operation is eerily similar to the FBI's operations under J. Edgar Hoover in the 1960s where the bureau used wiretapping to discover vulnerabilities, such as sexual activity, to 'neutralize' their targets," he said. "Back then, the idea was developed by the longest serving FBI chief in U.S. history, today it was suggested by the longest serving NSA chief in U.S. history." That controversy, Bamford said, also involved the NSA. "And back then, the NSA was also used to do the eavesdropping on King and others through its Operation Minaret. A later review declared the NSA’s program 'disreputable if not outright illegal,'" he said. Baker said that until there is evidence the tactic is being abused, the NSA should be trusted to use its discretion. "The abuses that involved Martin Luther King occurred before Edward Snowden was born," he said. "I think we can describe them as historical rather than current scandals. Before I say, 'Yeah, we've gotta worry about that,' I'd like to see evidence of that happening, or is even contemplated today, and I don't see it."
  • Jaffer, however, warned that the lessons of history ought to compel serious concern that a "president will ask the NSA to use the fruits of surveillance to discredit a political opponent, journalist or human rights activist." "The NSA has used its power that way in the past and it would be naïve to think it couldn't use its power that way in the future," he said.
  •  
    By Glenn Greenwald, Ryan Gallagher, and Ryan Grim, 26 November 2013. I will annotate later. But this is by far the most important NSA disclosure from Edward Snowden's leaked documents thus far. A report originated by Gen. Alexander himself revealing COINTELPRO like activities aimed at destroying the reputations of non-terrorist "radicalizers," including one "U.S. person." This is exactly the kind of repressive activity that the civil libertarians among us warn about. 
  •  
    By Glenn Greenwald, Ryan Gallagher, and Ryan Grim, 26 November 2013. I will annotate later. But this is by far the most important NSA disclosure from Edward Snowden's leaked documents thus far. A report originated by Gen. Alexander himself revealing COINTELPRO like activities aimed at destroying the reputations of non-terrorist "radicalizers," including one "U.S. person." This is exactly the kind of repressive activity that the civil libertarians among us warn about. 
Gary Edwards

Take A Break From The Snowden Drama For A Reminder Of What He's Revealed So Far - Forbes - 0 views

  • Here’s a recap of Snowden’s leaked documents published so far, in my own highly subjective order of importance.
  • The publication of Snowden’s leaks began with a top secret order from the Foreign Intelligence Surveillance Court (FISC) sent to Verizon on behalf of the NSA, demanding the cell phone records of all of Verizon Business Network Services’ American customers for the three month period ending in July. The order, obtained by the Guardian, sought only the metadata of those millions of users’ calls–who called whom when and from what locations–but specifically requested Americans’ records, disregarding foreigners despite the NSA’s legal restrictions that it may only surveil non-U.S. persons. Senators Saxby Chambliss and Diane Feinstein defended the program and said it was in fact a three-month renewal of surveillance practices that had gone for seven years.
  • A leaked executive order from President Obama shows the administration asked intelligence agencies to draw up a list of potential offensive cyberattack targets around the world. The order, which suggests targeting “systems, processes and infrastructure” states that such offensive hacking operations “can offer unique and unconventional capabilities to advance U.S. national objectives around the world with little or no warning to the adversary or target and with potential effects ranging from subtle to severely damaging.” The order followed repeated accusations by the U.S. government that China has engaged in state-sponsored hacking operations, and was timed just a day before President Obama’s summit with Chinese President Xi Jinping.
  • ...6 more annotations...
  • Another leaked slide deck revealed a software tool called Boundless Informant, which the NSA appears to use for tracking the origin of data it collects. The leaked materials included a map produced by the program showing the frequency of data collection in countries around the world. While Iran, Pakistan and Jordan appeared to be the most surveilled countries according to the map, it also pointed to significant data collection from the United States.
  • In a congressional hearing, NSA director Keith Alexander argued that the kind of surveillance of Americans’ data revealed in that Verizon order was necessary to for archiving purposes, but was rarely accessed and only with strict oversight from Foreign Intelligence Surveillance Court judges. But another secret document published by the Guardian revealed the NSA’s own rules for when it makes broad exceptions to its foreign vs. U.S. persons distinction, accessing Americans’ data and holding onto it indefinitely. Those exceptions include anytime Americans’ data is judged to be “significant foreign intelligence” information or information about a crime that has been or is about to be committed, any data “involved in the unauthorized disclosure of national security information,” or necessary to “assess a communications security vulnerability.” Any encrypted data that the NSA wants to crack can also be held indefinitely, regardless of whether its American or foreign origin.
  • Documents leaked to the Guardian revealed a five-year-old British intelligence scheme to tap transatlantic fiberoptic cables to gather data. A program known as Tempora, created by the U.K.’s NSA equivalent Government Communications Headquarters (GCHQ) has for the last 18 months been able to store huge amounts of that raw data for up to 30 days. Much of the data is shared with the NSA, which had assigned 250 analysts to sift through it as of May of last year.
  • Another GCHQ project revealed to the Guardian through leaked documents intercepted the communications of delegates to the G20 summit of world leaders in London in 2009. The scheme included monitoring the attendees’ phone calls and emails by accessing their Blackberrys, and even setting up fake Internet cafes that used keylogging software to surveil them.
  • Snowden showed the Hong Kong newspaper the South China Morning Post documents that it said outlined extensive hacking of Chinese and Hong Kong targets by the NSA since 2009, with 61,000 targets globally and “hundreds” in China. Other SCMP stories based on Snowden’s revelations stated that the NSA had gained access to the Chinese fiberoptic network operator Pacnet as well as Chinese mobile phone carriers, and had gathered large quantities of Chinese SMS messages.
  • The Guardian’s Glenn Greenwald has said that Snowden provided him “thousands” of documents, of which “dozens” are newsworthy. And Snowden himself has said he’d like to expose his trove of leaks to the global media so that each country’s reporters can decide whether “U.S. network operations against their people should be published.” So regardless of where Snowden ends up, expect more of his revelations to follow.
  •  
    Nice tight summary
Paul Merrell

Smoking gun emails reveal 'deal in blood' George Bush and Tony Blair made as they secre... - 0 views

  • A bombshell White House memo has revealed for the first time details of the ‘deal in blood’ forged by George Bush and Tony Blair over the Iraq War.The damning memo, from secretary of state Colin Powell to president George Bush, was written on March 28, 2002, a week before Bush’s famous summit with Blair at his Crawford ranch in Texas.The Powell document, headed ‘Secret... Memorandum for the President’, lifts the lid on how Blair and Bush secretly plotted the war behind closed doors at Crawford. In it, Powell tells Bush that Blair ‘will be with us’ on military action. Powell assures the president: ‘The UK will follow our lead’.The classified document also discloses that Blair agreed to act as a glorified spin doctor for the president by presenting ‘public affairs lines’ to convince a skeptical public that Saddam had Weapons of Mass Destruction - when none existed.In return, the president would flatter Blair’s ego and give the impression that Britain was not America’s poodle but an equal partner in the ‘special relationship’. 
  • The sensational leak shows that Blair had given an unqualified pledge to sign up to the conflict a year before the invasion started.It flies in the face of the UK Prime Minister’s public claims at the time that he was seeking a diplomatic solution to the crisis.He told voters: ‘We’re not proposing military action’ - in direct contrast to what the secret email now reveals. 
  • The disclosure is certain to lead for calls for Sir John Chilcot to reopen his inquiry into the Iraq War if, as is believed, he has not seen the Powell memo.A second explosive memo from the same cache also reveals how Bush used ‘spies’ in the Labour Party to help him to manipulate British public opinion in favor of the war.The documents, obtained by The Mail on Sunday, are part of a batch of secret emails held on the private server of Democratic presidential candidate Hillary Clinton which U.S. courts have forced her to reveal.Former UK Conservative shadow home secretary David Davis said: ‘The memos prove in explicit terms what many of us have believed all along: Tony Blair effectively agreed to act as a frontman for American foreign policy in advance of any decision by the House of Commons or the British Cabinet.
  • ...8 more annotations...
  • ‘He was happy to launder George Bush’s policy on Iraq and sub-contract British foreign policy to another country without having the remotest ability to have any real influence over it. And in return for what?'For George Bush pretending Blair was a player on the world stage to impress voters in the UK when the Americans didn’t even believe it themselves’.Davis was backed by a senior diplomat with close knowledge of Blair-Bush relations who said: ‘This memo shows beyond doubt for the first time Blair was committed to the Iraq War before he even set foot in Crawford.'And it shows how the Americans planned to make Blair look an equal partner in the special relationship to bolster his position in the UK.’Blair’s spokesman insisted last night that Powell’s memo was ‘consistent with what he was saying publicly at the time’.The former Prime Minister has always hotly denied the claim that the two men signed a deal ‘in blood’ at Crawford to embark on the war, which started on March 20, 2003. Powell says to Bush: ‘He will present to you the strategic, tactical and public affairs lines that he believes will strengthen global support for our common cause,’ adding that Blair has the presentational skills to ‘make a credible public case on current Iraqi threats to international peace’.Five months after the summit, Downing Street produced the notorious ‘45 minutes from doom’ dossier on Saddam Hussein’s supposed Weapons of Mass Destruction. After Saddam was toppled, the dossier’s claims were exposed as bogus.Nowhere in the memo is a diplomatic route suggested as the preferred option.
  • Instead, Powell says that Blair will also advise on how to ‘handle calls’ for the ‘blessing’ of the United Nations Security Council, and to ‘demonstrate that we have thought through “the day after” ’ – in other words, made adequate provision for a post-Saddam Iraq.Critics of the war say that the lack of post-conflict planning has contributed to the loss of more than 100,000 lives since the invasion – and a power vacuum which has contributed to the rise of Islamic State terrorism.Significantly, Powell warns Bush that Blair has hit ‘domestic turbulence’ for being ‘too pro-U.S. in foreign and security policy, too arrogant and “presidential” ’, which Powell points out is ‘not a compliment in the British context’.Powell also reveals that the splits in Blair’s Cabinet were deeper than was realized: he says that apart from Foreign Secretary Jack Straw and Defence Secretary Geoff Hoon, ‘Blair’s Cabinet shows signs of division, and the British public are unconvinced that military action is warranted now’.Powell says that although Blair will ‘stick with us on the big issues’, he wants to minimisze the ‘political price’ he would have to pay: ‘His voters will look for signs that Britain and America are truly equity partners in the special relationship.’The president certainly did his best to flatter Blair’s ego during the Crawford summit, where he was the first world leader to be invited into Bush’s sanctuary for two nights.
  • Mystery has long surrounded what was discussed at Crawford as advisers were kept out of a key meeting between the two men.Sir Christopher Meyer, who was present in Crawford as Britain’s ambassador to the U.S., told Chilcot that his exclusion meant he was ‘not entirely clear to this day... what degree of convergence was, if you like, signed in blood at the Crawford ranch’.But in public comments during his time at Crawford, Blair denied that Britain was on an unstoppable path to war.‘This is a matter for considering all the options’, he said. ‘We’re not proposing military action at this point in time’.
  • During his appearance before the Chilcot inquiry in January 2010, Blair denied that he had struck a secret deal with Bush at Crawford to overthrow Saddam. Blair said the two men had agreed on the need to confront the Iraqi dictator, but insisted they did not get into ‘specifics’.‘The one thing I was not doing was dissembling in that position,’ he told Chilcot.‘The position was not a covert position, it was an open position. This isn’t about a lie or a conspiracy or a deceit or a deception. It’s a decision. What I was saying... was “We are going to be with you in confronting and dealing with this threat.” ’Pressed on what he thought Bush took from their meeting, he said the president had realized Britain would support military action if the diplomatic route had been exhausted.In his memoirs, Blair again said it was ‘a myth’ he had signed a promise ‘in blood’ to go to war, insisting: ‘I made no such commitment’.Critics who claimed that Blair acted as the ‘poodle’ of the US will point to a reference in Mr Powell’s memo to the fact Mr Blair ‘readily committed to deploy 1,700 commandos’ to Afghanistan ‘even though his experts warn that British forces are overstretched’.The decision made the previous October in the wake of the September 11 attacks led to widespread concern that the UK was entering an open-ended commitment to a bloody conflict in Afghanistan – a concern many critics now say was well-founded.
  • Mr Powell’s memo goes on to say that a recent move by the U.S. to protect its steel industry with tariffs, which had damaged UK exports, was a ‘bitter blow’ for Blair, but he was prepared to ‘insulate our broader relationship from this and other trade disputes’.The memo was included in a batch of 30,000 emails which were received by Mrs Clinton on her private server when she was US Secretary of State between 2009 and 2013.Another document included in the email batch is a confidential briefing for Powell prepared by the U.S. Embassy in London, shortly before the Crawford summit.The memo, dated ‘April 02’, includes a detailed assessment of the effect on Blair’s domestic position if he backs US military action.The document says: ‘A sizeable number of his [Blair’s] MPs remain at present opposed to military action against Iraq... some would favor shifting from a policy of containment of Iraq if they had recent (and publicly usable) proof that Iraq is developing WMD/missiles... most seem to want some sort of UN endorsement for military action.‘Blair’s challenge now is to judge the timing and evolution of America’s Iraq policy and to bring his party and the British people on board.'There have been a few speculative pieces in the more feverish press about Labor [sic] unease re Iraq policy… which have gone on to identify the beginnings of a challenge to Blair’s leadership of the party.
  • 'Former Cabinet member Peter Mandelson, still an insider, called it all "froth". Nonetheless, this is the first time since the 1997 election that such a story is even being printed’.The paper draws on information given to it by Labour ‘spies’, whose identities have been hidden.It states: ‘[name redacted] told us the intention of those feeding the story is not to bring down Blair but to influence him on the Iraq issue’.‘Some MPs would endorse action if they had proof that Iraq has continued to develop WMD since UN inspectors left.‘More would follow if convinced that Iraq has succeeded in developing significant WMD capability and the missiles to deliver it.'Many more would follow if they see compelling evidence that Iraq intends and plans to use such weapons. A clear majority would support military action if Saddam is implicated in the 9/11 attacks or other egregious acts of terrorism’.‘Blair has proved an excellent judge of political timing, and he will need to be especially careful about when to launch a ramped-up campaign to build support for action against Iraq.'He will want neither to be too far in front or behind US policy... if he waits too long, then the keystone of any coalition we wish to build may not be firmly in place. No doubt these are the calculations that Blair hopes to firm up when he meets the President’.A spokesperson for Blair said: ‘This is consistent with what Blair was saying publicly at the time and with Blair’s evidence given to the Chilcot Inquiry’.
  • Stunning memo proves Blair signed up for Iraq even before Americans - comment by former shadow home secretary David DavisThis is one of the most astonishing documents I have ever read.It proves in explicit terms what many of us have believed all along: Tony Blair effectively agreed to act as a front man for American foreign policy in advance of any decision by the House of Commons or the British Cabinet.He was happy to launder George Bush’s policy on Iraq and sub-contract British foreign policy to another country without having the remotest ability to have any real influence over it.And in return for what? For George Bush pretending Blair was a player on the world stage to impress voters in the UK when the Americans didn’t even believe it themselves.Blair was content to cynically use Britain’s international reputation for honest dealing in diplomacy, built up over many years, as a shield against worldwide opprobrium for Bush’s ill-considered policy.Judging from this memorandum, Blair signed up for the Iraq War even before the Americans themselves did. It beggars belief.
  • Blair was telling MPs and voters back home that he was still pursuing a diplomatic solution while Colin Powell was telling President Bush: ‘Don’t worry, George, Tony is signed up for the war come what may – he’ll handle the PR for you, just make him look big in return.’It should never be forgotten that a minimum of 120,000 people died as a direct result of the Iraq War.What is truly shocking is the casualness of it all, such as the reference in the memo to ‘the day after’ – meaning the day after Saddam would be toppled.The offhand tone gives the game away: it is patently obvious nobody thought about ‘the day after’ when Bush and Blair met in Crawford.And they gave it no more thought right through to the moment ‘the day after’ came about a year later when Saddam’s statue fell to the ground.We saw the catastrophic so-called ‘de-Baathification’ of Iraq, with the country’s entire civil and military structure dismantled, leading to years of bloodshed and chaos. It has infected surrounding countries to this day and created the vacuum into which Islamic State has stepped.This may well be the Iraq ‘smoking gun’ we have all been looking for.
Paul Merrell

Revealed: How the Nsa Targets Italy - 0 views

  • A special unit operating under cover and protected by diplomatic immunity, assigned to a very sensitive mission: to spy on the communication of the Italian leadership. That is what top secret documents leaked by Edward Snowden and published in Italy exclusively by l'Espresso in collaboration with "la Repubblica" reveal. A file mentions the "Special Collection Service " (SCS) sites in Rome and in Milan, the very same service which, according to the German weekly "Der Spiegel ", spied on the mobile phone of the German Chancellor, Angela Merkel. "Special Collection Sites", reads the file published today by l'Espresso, "provide considerable perishable intelligence on leadership communications largely facilitated by site presence within a national capital". These documents are very important because they contradict recent statements by the Italian Prime Minister reassuring the Italian Parliament. Speaking to the Chamber of Deputies four weeks ago, Enrico Letta said: "Based on the analysis conducted by our intelligence services and our international contacts, we are not aware that the security of the communications of the Italian government and embassies has been compromised, nor are we aware that the privacy of Italian citizens has been compromised". These top secret documents tell a different story, however.
  • The Special Collection Service is likely one of the most sensitive units in U.S. intelligence. The service deploys teams under diplomatic cover, operating in US embassies around the world to control friendly and enemy governments. The top secret NSA document examined by l'Espresso reveals that "in 1988 [SCS] had 88 sites, our peak". The SCS is assigned to a special mission: monitoring the communications of the political, and likely economical, leaders of host nations. For this reason, SCS teams operate within the heart of power: in embassies and consulates, working in close collaboration with the CIA. Also in Rome, in the US embassy located in via Veneto, from those very same roofs which witnessed the Dolce Vita. Snowden's files reveal that, at least until 2010, the Special Collection Service maintained two sites in Italy: one in Rome, a base staffed with agents, and one in Milan, the capital of the Italian economy where, according to a file dated 2010 and originally published in Der Spiegel, the SCS would run an unmanned site. Two sites in a relatively small country like Italy is unusual: only in Germany -- a prime target for NSA in Europe -- does SCS maintain two bases.
  • NSA's mass spying activities did not target our leadership and diplomacy alone, but it possibly also targeted millions of Italian citizens. A file on the top secret programme "Boundless Informant" that is labeled "Italy" reveals that between December 10, 2012 and January 9, 2013, the NSA collected the metadata for 45.893.570 telephone calls. Estimates close to this figure had already circulated, but now the actual document indicates the penetration of this monitoring. All of the metadata gathered in our country between December 10^th and January 9^th 2013 as reflected on this slide relate to phone communication, unlike the slides published in Germany and France, where internet communication metadata were targeted as well.
  • ...1 more annotation...
  • The Snowden file examined by l'Espresso reveals that the collection of phone metadata in Italy between December 10, 2012 and January 9, 2013 reached over four million metadata per day during the period of political crisis that culminated in the resignation of the Mario Monti government.
Paul Merrell

U.S. surveillance architecture includes collection of revealing Internet, phone metadat... - 0 views

  • On March 12, 2004, acting attorney general James B. Comey and the Justice Department’s top leadership reached the brink of resignation over electronic surveillance orders that they believed to be illegal. President George W. Bush backed down, halting secret foreign-intelligence-gathering operations that had crossed into domestic terrain. That morning marked the beginning of the end of STELLARWIND, the cover name for a set of four surveillance programs that brought Americans and American territory within the domain of the National Security Agency for the first time in decades. It was also a prelude to new legal structures that allowed Bush and then President Obama to reproduce each of those programs and expand their reach.What exactly STELLARWIND did has never been disclosed in an unclassified form. Which parts of it did Comey approve? Which did he shut down? What became of the programs when the crisis passed and Comey, now Obama’s expected nominee for FBI director, returned to private life?Authoritative new answers to those questions, drawing upon a classified NSA history of STELLARWIND and interviews with high-ranking intelligence officials, offer the clearest map yet of the Bush-era programs and the NSA’s contemporary U.S. operations.STELLARWIND was succeeded by four major lines of intelligence collection in the territorial United States, together capable of spanning the full range of modern telecommunications, according to the interviews and documents.
  • Two of the four collection programs, one each for telephony and the Internet, process trillions of “metadata” records for storage and analysis in systems called MAINWAY and MARINA, respectively. Metadata includes highly revealing information about the times, places, devices and participants in electronic communication, but not its contents. The bulk collection of telephone call records from Verizon Business Services, disclosed this month by the British newspaper the Guardian, is one source of raw intelligence for MAINWAY.The other two types of collection, which operate on a much smaller scale, are aimed at content. One of them intercepts telephone calls and routes the spoken words to a system called ­NUCLEON.For Internet content, the most important source collection is the PRISM project reported on June 6 by The Washington Post and the Guardian. It draws from data held by Google, Yahoo, Microsoft and other Silicon Valley giants, collectively the richest depositories of personal information in history.
  • The debate has focused on two of the four U.S.-based collection programs: PRISM, for Internet content, and the comprehensive collection of telephone call records, foreign and domestic, that the Guardian revealed by posting a classified order from the Foreign Intelligence Surveillance Court to Verizon Business Services.The Post has learned that similar orders have been renewed every three months for other large U.S. phone companies, including Bell South and AT&T, since May 24, 2006. On that day, the surveillance court made a fundamental shift in its approach to Section 215 of the Patriot Act, which permits the FBI to compel production of “business records” that are relevant to a particular terrorism investigation and to share those in some circumstances with the NSA. Henceforth, the court ruled, it would define the relevant business records as the entirety of a telephone company’s call database.The Bush administration, by then, had been taking “bulk metadata” from the phone companies under voluntary agreements for more than four years. The volume of information overwhelmed the MAINWAY database, according to a classified report from the NSA inspector general in 2009. The agency spent $146 million in supplemental counterterrorism funds to buy new hardware and contract support — and to make unspecified payments to the phone companies for “collaborative partnerships.”When the New York Times revealed the warrantless surveillance of voice calls, in December 2005, the telephone companies got nervous. One of them, unnamed in the report, approached the NSA with a request. Rather than volunteer the data, at a price, the “provider preferred to be compelled to do so by a court order,” the report said. Other companies followed suit. The surveillance court order that recast the meaning of business records “essentially gave NSA the same authority to collect bulk telephony metadata from business records that it had” under Bush’s asserted authority alone.
  • ...3 more annotations...
  • Telephone metadata was not the issue that sparked a rebellion at the Justice Department, first by Jack Goldsmith of the Office of Legal Counsel and then by Comey, who was acting attorney general because John D. Ashcroft was in intensive care with acute gallstone pancreatitis. It was Internet metadata.At Bush’s direction, in orders prepared by David Addington, the counsel to Vice President Richard B. Cheney, the NSA had been siphoning e-mail metadata and technical records of Skype calls from data links owned by AT&T, Sprint and MCI, which later merged with Verizon.For reasons unspecified in the report, Goldsmith and Comey became convinced that Bush had no lawful authority to do that.MARINA and the collection tools that feed it are probably the least known of the NSA’s domestic operations, even among experts who follow the subject closely. Yet they probably capture information about more American citizens than any other, because the volume of e-mail, chats and other Internet communications far exceeds the volume of standard telephone calls.The NSA calls Internet metadata “digital network information.” Sophisticated analysis of those records can reveal unknown associates of known terrorism suspects. Depending on the methods applied, it can also expose medical conditions, political or religious affiliations, confidential business negotiations and extramarital affairs.What permits the former and prevents the latter is a complex set of policies that the public is not permitted to see.
  • In the urgent aftermath of Sept. 11, 2001, with more attacks thought to be imminent, analysts wanted to use “contact chaining” techniques to build what the NSA describes as network graphs of people who represented potential threats.The legal challenge for the NSA was that its practice of collecting high volumes of data from digital links did not seem to meet even the relatively low requirements of Bush’s authorization, which allowed collection of Internet metadata “for communications with at least one communicant outside the United States or for which no communicant was known to be a citizen of the United States,” the NSA inspector general’s report said.Lawyers for the agency came up with an interpretation that said the NSA did not “acquire” the communications, a term with formal meaning in surveillance law, until analysts ran searches against it. The NSA could “obtain” metadata in bulk, they argued, without meeting the required standards for acquisition.Goldsmith and Comey did not buy that argument, and a high-ranking U.S. intelligence official said the NSA does not rely on it today.As soon as surveillance data “touches us, we’ve got it, whatever verbs you choose to use,” the official said in an interview. “We’re not saying there’s a magic formula that lets us have it without having it.”
  • When Comey finally ordered a stop to the program, Bush signed an order renewing it anyway. Comey, Goldsmith, FBI Director Robert S. Mueller III and most of the senior Bush appointees in the Justice Department began drafting letters of resignation.Then-NSA Director Michael V. Hayden was not among them. According to the inspector general’s classified report, Cheney’s lawyer, Addington, placed a phone call and “General Hayden had to decide whether NSA would execute the Authorization without the Attorney General’s signature.” He decided to go along.The following morning, when Mueller told Bush that he and Comey intended to resign, the president reversed himself.Three months later, on July 15, the secret surveillance court allowed the NSA to resume bulk collection under the court’s own authority. The opinion, which remains highly classified, was based on a provision of electronic surveillance law, known as “pen register, trap and trace,” that was written to allow law enforcement officers to obtain the phone numbers of incoming and outgoing calls from a single telephone line.
  •  
    Note particularly the mention that the FISA Court decision to throw the doors open for government snooping was based on "pen register, trap and trace" law. As suspected, now we are into territory dealt with by the Supreme Court in the pre-internet days of 1979 In Smith v. Maryland, 442 U.S. 735 (1979), More about that next, in a bookmark also tagged with "pen-register".
Gary Edwards

The Biggest Price-Fixing Scandal Ever - and the VESTS Solution - 0 views

  •  
    excerpt: Uber financial investigative journalist Matt Taibbi has discovered what we too realized when we began to scrutinize the financial industry. In his latest article, he writes, "Everything Is Rigged: The Biggest Price-Fixing Scandal Ever." The article's cut line is, "The Illuminati were amateurs. The second huge financial scandal of the year reveals the real international conspiracy: There's no price the big banks can't fix." Taibbi's incredulity is evident throughout the article, as well it should be. The interest-rate swap market is part of the larger derivatives market that totals over one billion TRILLION dollars............................... "Given the endless financial scandals that keep sweeping across the industry, it is fairly obvious that this regulatory system needs a good deal of improvement. In fact, I think that it may be no coincidence that so much is being revealed now. The idea is surely to create the conditions for another international regulatory effort that will end up further controlling what is left of free-market capital raising. It is a global game for globalists. The game is to regulate everything and then to position oneself above the regulations and above the governments that wield them. This gives you tremendous power over everyone else. One of the tools being used to whip up sentiment for a larger regulatory revisiting is scandal and more scandal. There have been revelations of so-called crooked practices in a number of areas lately, mostly in the area of industry pricing. It turns out that many standard prices are set via indications of interest rather than outright competition. We can see the same system at work in the gold market, where a small group of wise men set the price for physical gold every day. And now, as Taibbi and others have revealed, the dysfunctional system also affects interest rate swaps. This has incensed Taibbi, who opens his article as follows: Conspiracy theorists of the world, believers in the
Gary Edwards

FBI Source: Clinton Foundation Can Bring Down Entire Government » Alex Jones'... - 1 views

  •  
    "The Clinton Foundation is a "massive spider web of connections and money laundering implicating hundreds of high-level people," according to an anonymous insider who revealed why the FBI stopped short of indicting Hillary Clinton. Before FBI Director James Comey announced the FBI wouldn't recommend pressing charges against Clinton, an insider with "intimate knowledge of the inner workings of the Clinton case" hosted an little-publicized AMA session on 4Chan, and the statements he made on July 2 corroborate with later developments of the scandal. "There is enough for her and the entire government to be brought down," he revealed. "People do not realize how enormous this whole situation actually is." "Whether she will be [indicted] or not depends on how much info others involved gets out, and there are a lot of people involved." Since then, both the FBI and the DOJ declined to press charges against Clinton, and other sources revealed the Clinton Foundation is now under scrutiny. "The problem is with the Clinton Foundation as I mentioned, which you should just imagine as a massive spider web of connections and money laundering implicating hundreds of high-level people," the source said. "Though I do not have a high opinion of Hillary, she is just a piece - albeit a big piece - of this massive sh*tstorm." Those implicated extends to the Justice Dept. "The DOJ is most likely looking to save itself," he continued. "Find everyone involved in the Clinton Foundation, from its donors to its Board of Directors, and imagine they are all implicated." This would explain why Bill Clinton forced himself on Attorney General Loretta Lynch's plane at the Phoenix Sky Harbor International Airport last week; Clinton insider Larry Nichols said blackmail was likely involved. "Bill Clinton met with Lynch, and he was there to assure her that when Hillary gets to be president she'll be able to keep her job," said Nichols on the Alex Jones Sh
Paul Merrell

Snowden document shows Canada set up spy posts for NSA - Politics - CBC News - 0 views

  • A top secret document retrieved by American whistleblower Edward Snowden reveals Canada has set up covert spying posts around the world and conducted espionage against trading partners at the request of the U.S. National Security Agency. The leaked NSA document being reported exclusively by CBC News reveals Canada is involved with the huge American intelligence agency in clandestine surveillance activities in “approximately 20 high-priority countries."
  • Sections of the document with the highest classification make it clear in some instances why American spymasters are particularly keen about enlisting their Canadian counterparts, the Communications Security Establishment Canada. "CSEC shares with the NSA their unique geographic access to areas unavailable to the U.S," the document says. The briefing paper describes a "close co-operative relationship" between the NSA and its Canadian counterpart, the Communications Security Establishment Canada, or CSEC — a relationship "both sides would like to see expanded and strengthened. "The intelligence exchange with CSEC covers worldwide national and transnational targets."
  • The briefing notes make it clear that Canada plays a very robust role in intelligence-gathering around the world in a way that has won respect from its American equivalents.
  • ...5 more annotations...
  • The intimate Canada-U.S. electronic intelligence relationship dates back more than 60 years. Most recently, another Snowden document reported by CBC News showed the two agencies co-operated to allow the NSA to spy on the G20 summit of international leaders in Toronto in 2010. But what the latest secret document reveals for the first time is just how expansive Canada's international espionage activities have become.
  • The NSA document depicts CSEC as a sophisticated, capable and highly respected intelligence partner involved in all manner of joint spying missions, including setting up listening posts at the request of the Americans. "CSEC offers resources for advanced collection, processing and analysis, and has opened covert sites at the request of NSA," the document states.
  • Aside from compromising the actual intelligence operation, Wark says, an exposed spy mission can imperil Canada's other diplomatic operations — "the political contacts, the trade contacts, the generation of goodwill between the countries and any sense of co-operation." Wark says if a country feels targeted by a Canadian embassy, it can put everyone working there under a cloud of suspicion: “Are they really diplomats or are they spies?” As a result of those risks, Wark says, approval for CSEC to establish a covert spying post at the request of the NSA would have to come from the ministerial level of the Canadian government — or even from the prime minister himself.
  • Canada and the U.S. have long shared security intelligence with sister agencies in the U.K., Australia and New Zealand – the so-called "Five Eyes" partnership. But the latest secret Snowden missive shows CSEC and the NSA becoming physically intertwined. "Co-operative efforts include the exchange of liaison officers and integrees," the document reveals, a reference to CSEC operatives working inside the NSA, and vice-versa. It notes the NSA also supplies much of the computer hardware and software CSEC uses for encryption, decoding and other state-of-the-art essentials of electronic spying needed for "collection, processing and analytic efforts."
  • CSEC employs about 2,000 people, has an annual budget of roughly $450 million and will soon move into an architecturally spectacular new Ottawa headquarters costing Canadian taxpayers almost $1.2 billion. By comparison, the NSA employs an estimated 40,000 people plus thousands of private contractors, and spends over $40 billion a year NSA whistleblower Drake says the problem is that both CSEC and the NSA lack proper oversight, and without it, they have morphed into runaway surveillance. "There is a clear and compelling danger to democracy in Canada by virtue of how far these secret surveillance operations have gone."
  •  
    "'Co-operative efforts include the exchange of liaison officers and integrees,'the document reveals, a reference to CSEC operatives working inside the NSA, and vice-versa." And that fact raises potential U.S. Privacy Act issues. Under the Privacy Act, all U.S. agencies are prohibited from sharing information containing personal identifiers of U.S. citizens with any foreign government and requires that agencies make full disclosure to all persons  whose rights are thus violated. The Act also creates a cause of action for redress by the federal courts, with a minimum $1,500 damages plus attorney's fees and litigation expenses. Note that the other NSA documents show that NSA is sharing U.S. citizens' information that includes personal identifiers with Israeli intelligence. The NSA has been by another statute excused from compliance with some portions of the Privacy Act but not those discussed above.
Paul Merrell

Why Today's Landmark Court Victory Against Mass Surveillance Matters | American Civil L... - 0 views

  • In a landmark victory for privacy, a federal appeals court ruled unanimously today that the mass phone-records program exposed two years ago by NSA whistleblower Edward Snowden is illegal because it goes far beyond what Congress ever intended to permit when it passed Section 215 of the Patriot Act. The ruling in ACLU v. Clapper is enormously significant, and not only because the program in question — the first to be revealed by Edward Snowden — is at the heart of a legislative reform effort playing out right now, or because it sparked the most significant debate about government surveillance in decades. The decision could also affect many other laws the government has stretched to the breaking point in order to justify dragnet collection of Americans’ sensitive information. Under the program, revealed in the Guardian on June 5, 2013, telecommunications companies hand over to the NSA, on a daily basis, records relating to the calls of all of their customers. Those records include information about who called whom, when, and for how long. The ACLU sued the NSA over the program just days after it was revealed, and we took the case to the Second Circuit Court of Appeals after it was dismissed by a district court.
  • A few points on what makes the decision so important. 1. It recognizes that Section 215 of the Patriot Act does not authorize the government to collect information on such a massive scale.
  • 2. The decision’s significance extends far beyond the phone records program alone. It implicates other mass spying programs that we have learned about in the past two years and — almost certainly ­— others that the government continues to conceal from the public. For example, we know that the Drug Enforcement Administration, for decades, employed a similar definition of “relevance” to amass logs of every call made from the United States to as many as 116 different countries. The same theory was also used to justify the collection of email metadata. Both those programs have been discontinued, but the legal reasoning hasn’t, and it could very well be the basis for programs the government has never acknowledged to the public, including the CIA’s bulk collection of Americans’ financial records.
  • ...3 more annotations...
  • 3. Metadata is incredibly sensitive and revealing. The government has long argued that the phone records program doesn’t reveal the contents of calls, and as such, it is not an invasion of privacy. But metadata, especially in aggregate, can be just as revealing as content, painting a detailed picture of a person’s life. 
  • 4. The importance of adversarial review. The court recognized that public, adversarial litigation concerning the lawfulness of this spying program was vitally important to its decision — and it drew a direct contrast to the secret, one-sided proceedings that occur in the Foreign Intelligence Surveillance Court.
  • 5. The congressional reforms under consideration just don’t cut it. Ahead of Section 215’s sunset on June 1, Sen. Majority Leader Mitch McConnell (R-Ky.) is trying to push through a straight reauthorization of the provision, extending its life by another five years. After today’s decision came down, he took to the floor to defend the program — a position altogether at odds with the appeals court decision, with the conclusions of multiple executive-branch review groups who found the program hasn’t been effective in stopping terrorism, and with the clear consensus that supports far-reaching surveillance reform. Another bill in play (which the ACLU neither supports nor opposes), the USA Freedom Act of 2015, doesn’t go nearly far enough, most notably in ensuring that the government cannot engage in broad collection of innocent Americans’ private information.
Gary Edwards

The Daily Bell - Occupy Wall Street Demands Global UN Tax and Worldwide G20 Protest - 0 views

  •  
    Occupy's busting out on a new path ... So Adbusters is asking people all around the world to march on Oct. 29. "We want to send a clear message that we the people want to slow down this global casino." And Adbusters does have one specific demand, a 1 percent tax on financial-sector transactions (perhaps stocks, bonds, foreign-currency trades and derivatives). Some form of that idea, known as the "Robin Hood" tax, has been around for a while and might actually fly. - Jerry Large/Seattle Times Dominant Social Theme: We want justice for the world and the UN will give it to us. Free-Market Analysis: Kalle Lasn, founder of Adbusters magazine, based in Vancouver, B.C. - the magazine that issued the call for the initial Occupy Wall Street protests - has called on people to protest the upcoming G20 while demanding a one-percent tax on financial transactions. The revenue raised would be enormous and the lingering question is where this incredible revenue stream would be directed. The answer is obvious to those who follow what we call "directed history." The intention is likely to fund the UN as part of a final push to rationalize and perfect the initial stages of true world government. As we have written before, the movement toward world government is happening very quickly now. The ramifications are enormous and people who write off these protests as spontaneous and short-lived are not grasping what is taking place, in our humble opinion. The financial sales tax has been around for a very long time but has found its most recent voice in a column by Jerry Large of the Seattle Times. He recently gained an exclusive interview with Kalle Lasn, who sounds as if he hopes that a large protest on Oct 29th will mark the beginning of a push for such a tax. What's going on is pure one-worldism, an OWS ideology that is gradually revealing itself in dribs and drabs. It is one reason that that the OWS leaders have made no specific demands. They have hoped to create a momentu
Paul Merrell

Edward Snowden: NSA whistleblower answers reader questions | World news | guardian.co.uk - 0 views

  • The 29-year-old former NSA contractor and source of the Guardian's NSA files coverage will – with the help of Glenn Greenwald – take your questions today on why he revealed the NSA's top-secret surveillance of US citizens, the international storm that has ensued, and the uncertain future he now faces. Ask him anything.
  • I did not reveal any US operations against legitimate military targets. I pointed out where the NSA has hacked civilian infrastructure such as universities, hospitals, and private businesses because it is dangerous. These nakedly, aggressively criminal acts are wrong no matter the target. Not only that, when NSA makes a technical mistake during an exploitation operation, critical systems crash. Congress hasn't declared war on the countries - the majority of them are our allies - but without asking for public permission, NSA is running network operations against them that affect millions of innocent people. And for what? So we can have secret access to a computer in a country we're not even fighting? So we can potentially reveal a potential terrorist with the potential to kill fewer Americans than our own Police? No, the public needs to know the kinds of things a government does in its name, or the "consent of the governed" is meaningless.
  • I was debriefed by Glenn and his peers over a number of days, and not all of those conversations were recorded. The statement I made about earnings was that $200,000 was my "career high" salary. I had to take pay cuts in the course of pursuing specific work. Booz was not the most I've been paid.
  • ...17 more annotations...
  • 1) More detail on how direct NSA's accesses are is coming, but in general, the reality is this: if an NSA, FBI, CIA, DIA, etc analyst has access to query raw SIGINT databases, they can enter and get results for anything they want. Phone number, email, user id, cell phone handset id (IMEI), and so on - it's all the same. The restrictions against this are policy based, not technically based, and can change at any time. Additionally, audits are cursory, incomplete, and easily fooled by fake justifications. For at least GCHQ, the number of audited queries is only 5% of those performed.
  • Obama's campaign promises and election gave me faith that he would lead us toward fixing the problems he outlined in his quest for votes. Many Americans felt similarly. Unfortunately, shortly after assuming power, he closed the door on investigating systemic violations of law, deepened and expanded several abusive programs, and refused to spend the political capital to end the kind of human rights violations like we see in Guantanamo, where men still sit without charge.
  • All I can say right now is the US Government is not going to be able to cover this up by jailing or murdering me. Truth is coming, and it cannot be stopped
  • NSA likes to use "domestic" as a weasel word here for a number of reasons. The reality is that due to the FISA Amendments Act and its section 702 authorities, Americans’ communications are collected and viewed on a daily basis on the certification of an analyst rather than a warrant. They excuse this as "incidental" collection, but at the end of the day, someone at NSA still has the content of your communications. Even in the event of "warranted" intercept, it's important to understand the intelligence community doesn't always deal with what you would consider a "real" warrant like a Police department would have to, the "warrant" is more of a templated form they fill out and send to a reliable judge with a rubber stamp.
  • Glenn Greenwald follow up: When you say "someone at NSA still has the content of your communications" - what do you mean? Do you mean they have a record of it, or the actual content? Both. If I target for example an email address, for example under FAA 702, and that email address sent something to you, Joe America, the analyst gets it. All of it. IPs, raw data, content, headers, attachments, everything. And it gets saved for a very long time - and can be extended further with waivers rather than warrants.
  • What are your thoughts on Google's and Facebook's denials? Do you think that they're honestly in the dark about PRISM, or do you think they're compelled to lie? Perhaps this is a better question to a lawyer like Greenwald, but: If you're presented with a secret order that you're forbidding to reveal the existence of, what will they actually do if you simply refuse to comply (without revealing the order)? Answer: Their denials went through several revisions as it become more and more clear they were misleading and included identical, specific language across companies. As a result of these disclosures and the clout of these companies, we're finally beginning to see more transparency and better details about these programs for the first time since their inception. They are legally compelled to comply and maintain their silence in regard to specifics of the program, but that does not comply them from ethical obligation. If for example Facebook, Google, Microsoft, and Apple refused to provide this cooperation with the Intelligence Community, what do you think the government would do? Shut them down?
  • Some skepticism exists about certain of your claims, including this: I, sitting at my desk, certainly had the authorities to wiretap anyone, from you, or your accountant, to a federal judge, to even the President if I had a personal email. Do you stand by that, and if so, could you elaborate? Answer: Yes, I stand by it. US Persons do enjoy limited policy protections (and again, it's important to understand that policy protection is no protection - policy is a one-way ratchet that only loosens) and one very weak technical protection - a near-the-front-end filter at our ingestion points. The filter is constantly out of date, is set at what is euphemistically referred to as the "widest allowable aperture," and can be stripped out at any time. Even with the filter, US comms get ingested, and even more so as soon as they leave the border. Your protected communications shouldn't stop being protected communications just because of the IP they're tagged with. More fundamentally, the "US Persons" protection in general is a distraction from the power and danger of this system. Suspicionless surveillance does not become okay simply because it's only victimizing 95% of the world instead of 100%. Our founders did not write that "We hold these Truths to be self-evident, that all US Persons are created equal."
  • Edward, there is rampant speculation, outpacing facts, that you have or will provide classified US information to the Chinese or other governments in exchange for asylum. Have/will you? Answer: This is a predictable smear that I anticipated before going public, as the US media has a knee-jerk "RED CHINA!" reaction to anything involving HK or the PRC, and is intended to distract from the issue of US government misconduct. Ask yourself: if I were a Chinese spy, why wouldn't I have flown directly into Beijing? I could be living in a palace petting a phoenix by now.
  • US officials say this every time there's a public discussion that could limit their authority. US officials also provide misleading or directly false assertions about the value of these programs, as they did just recently with the Zazi case, which court documents clearly show was not unveiled by PRISM. Journalists should ask a specific question: since these programs began operation shortly after September 11th, how many terrorist attacks were prevented SOLELY by information derived from this suspicionless surveillance that could not be gained via any other source? Then ask how many individual communications were ingested to acheive that, and ask yourself if it was worth it. Bathtub falls and police officers kill more Americans than terrorism, yet we've been asked to sacrifice our most sacred rights for fear of falling victim to it. Further, it's important to bear in mind I'm being called a traitor by men like former Vice President Dick Cheney. This is a man who gave us the warrantless wiretapping scheme as a kind of atrocity warm-up on the way to deceitfully engineering a conflict that has killed over 4,400 and maimed nearly 32,000 Americans, as well as leaving over 100,000 Iraqis dead. Being called a traitor by Dick Cheney is the highest honor you can give an American, and the more panicked talk we hear from people like him, Feinstein, and King, the better off we all are. If they had taught a class on how to be the kind of citizen Dick Cheney worries about, I would have finished high school.
  • Is encrypting my email any good at defeating the NSA survelielance? Id my data protected by standard encryption? Answer: Encryption works. Properly implemented strong crypto systems are one of the few things that you can rely on. Unfortunately, endpoint security is so terrifically weak that NSA can frequently find ways around it. 
  • Binney, Drake, Kiriakou, and Manning are all examples of how overly-harsh responses to public-interest whistle-blowing only escalate the scale, scope, and skill involved in future disclosures. Citizens with a conscience are not going to ignore wrong-doing simply because they'll be destroyed for it: the conscience forbids it. Instead, these draconian responses simply build better whistleblowers. If the Obama administration responds with an even harsher hand against me, they can be assured that they'll soon find themselves facing an equally harsh public response. This disclosure provides Obama an opportunity to appeal for a return to sanity, constitutional policy, and the rule of law rather than men. He still has plenty of time to go down in history as the President who looked into the abyss and stepped back, rather than leaping forward into it. I would advise he personally call for a special committee to review these interception programs, repudiate the dangerous "State Secrets" privilege, and, upon preparing to leave office, begin a tradition for all Presidents forthwith to demonstrate their respect for the law by appointing a special investigator to review the policies of their years in office for any wrongdoing. There can be no faith in government if our highest offices are excused from scrutiny - they should be setting the example of transparency. 
  • What would you say to others who are in a position to leak classified information that could improve public understanding of the intelligence apparatus of the USA and its effect on civil liberties?
  • This country is worth dying for.
  • My question: given the enormity of what you are facing now in terms of repercussions, can you describe the exact moment when you knew you absolutely were going to do this, no matter the fallout, and what it now feels like to be living in a post-revelation world? Or was it a series of moments that culminated in action? I think it might help other people contemplating becoming whistleblowers if they knew what the ah-ha moment was like. Again, thanks for your courage and heroism. Answer: I imagine everyone's experience is different, but for me, there was no single moment. It was seeing a continuing litany of lies from senior officials to Congress - and therefore the American people - and the realization that that Congress, specifically the Gang of Eight, wholly supported the lies that compelled me to act. Seeing someone in the position of James Clapper - the Director of National Intelligence - baldly lying to the public without repercussion is the evidence of a subverted democracy. The consent of the governed is not consent if it is not informed.
  • Regarding whether you have secretly given classified information to the Chinese government, some are saying you didn't answer clearly - can you give a flat no? Answer: No. I have had no contact with the Chinese government. Just like with the Guardian and the Washington Post, I only work with journalists.
  • So far are things going the way you thought they would regarding a public debate? – tikkamasala Answer: Initially I was very encouraged. Unfortunately, the mainstream media now seems far more interested in what I said when I was 17 or what my girlfriend looks like rather than, say, the largest program of suspicionless surveillance in human history.
  • Thanks to everyone for their support, and remember that just because you are not the target of a surveillance program does not make it okay. The US Person / foreigner distinction is not a reasonable substitute for individualized suspicion, and is only applied to improve support for the program. This is the precise reason that NSA provides Congress with a special immunity to its surveillance.
  •  
    I particularly liked this Snowden observation as an idea for a constitutional amendment: "This disclosure provides Obama an opportunity to appeal for a return to sanity, constitutional policy, and the rule of law rather than men. He still has plenty of time to go down in history as the President who looked into the abyss and stepped back, rather than leaping forward into it. I would advise he personally call for a special committee to review these interception programs, repudiate the dangerous "State Secrets" privilege, and, upon preparing to leave office, begin a tradition for all Presidents forthwith to demonstrate their respect for the law by appointing a special investigator to review the policies of their years in office for any wrongdoing. There can be no faith in government if our highest offices are excused from scrutiny - they should be setting the example of transparency. " Repeal of the State Secrets privilege would require a constitutional amendment because the Supreme Court decided back when that it is inherent in the President's power as commander in chief of the military forces. In other words, neither Congress nor the courts can second-guess such claims, a huge contributing factor in the over-classification of government records when the real reason is to protect bureaucrats from embarrassment, civil rights suits, and criminal prosecution. It is no accident that we have an Executive Branch that is out-of-control, waging dictatorial powers under the protection of the State Secrets privilege. 
Gary Edwards

George Soros Hacked, Connections To Global 'Dissident Groups' Revealed - 1 views

  • The documents are from multiple departments of Soros’ organizations. Soros’ the Open Society Foundations seems to be the group with the most documents in the leak. Files come from sections representing almost all geographical regions in the world, from the USA, to Europe, Eurasia, Asia, Latin, America, Africa, the World Bank “the President’s Office”, as well as an unknown entity named SOUK. As the Daily Caller notes, there are documents dating from at least 2008 to 2016. Documents in the leak range from research papers such as “EUROPEAN CRISIS: Key Developments of the Past 48 Hours” focusing on the impact of the refugee crisis, to a document titled “The Ukraine debate in Germany“, to an update specific financials of grants. They reveal work plans, strategies, priorities and other activities by Soros, and include reports on European elections, migration and asylum in Europe.
  •  
    "Last Thursday, as Bloomberg was gingerly setting the stage, and the preemptive damage control for what was about to be a historic leak, it did everything in its power to deflect attention from the key topic, namely that prominent liberal billionaire and Hillary supporter, George Soros had been hacked and countless documents were about to be leaked, and instead focus on the alleged identity of the hackers, the so-called DCLeaks, which - like all other "experts" - it positioned as yet another Russian government-sponsored operation. To this we had one retort: "Far more important than the inane speculation on the hackers' identity, is the now official disclosure - and warning - that Soros himself was hacked. Bloomberg writes that Open Society Foundations, the Soros group, reported the breach to the Federal Bureau of Investigation in June, according to spokeswoman Laura Silber, who added that an investigation by a security firm found the intrusion was limited to an intranet system used by board members, staff and foundation partners." And, sure enough, over the weekend that is precisely what DCLeaks revealed as it disclosed over two thousand internal documents from groups run by George Soros were leaked online Saturday after hackers infiltrated the groups. The 2,576 files were released by DCLeaks, a website which claims to be "launched by the American hacktivists who respect and appreciate freedom of speech, human rights and government of the people.""
  •  
    The leaked documents are here. http://soros.dcleaks.com/
Gary Edwards

BOMBSHELL! Jim Garrow Reveals Career As Covert CIA Operative, Says Breitbart ... - 1 views

  •  
    Links to radio interview. Excerpts below: "As a long-time friend and guest on NTEB Radio, we know Dr. Garrow to be a previous Nobel Peace Prize nominee and executive director of the Bethune Institute's Pink Pagoda Girls school and rescue outreach in China. But on our show tonight, Dr. Garrow made the amazing revelation that he had, in fact, right up until this past Wednesday night at midnight, spent 45 years as a covert CIA operative. Garrow said that as a result of his "litmus test" statement in January, he was outed from the agency by Obama, and forced to accept early retirement. But the revelations didn't stop there. In addition to revealing that Andrew Breitbart had been killed under orders from Obama administration officials, he also said that spy thriller novelist Tom Clancy had also be killed in much the same way, and for the same reasons. Garrow said that Clancy had been spoon fed inside information for years from covert operatives for his novels, and he knew too much. Interestingly, when asked about where he got his ideas for his novels, Clancy had said this before he died: ""I hang my hat on getting as many things right as I can," Mr. Clancy once said in an interview. "I've made up stuff that's turned out to be real - that's the spooky part." NY Times A little too real, as it turns out. Dr. Garrow said the reason no autopsy was performed for the first 5 days is that it 'takes that long for the chemicals he was poisoned with to work their way out of his body'. Lastly, he revealed that Obama's administration was made up of Marxist Muslims who all take their orders from Senior Adviser to the President, Iranian-born Valerie Jarrett. Dr. Garrow said that it is well known to intelligence agencies all over the world that Obama is a foreign plant who was placed on the path to the presidency by ultra-rich Saudi nationals This is why, Garrow said, that all of Obama's education records have been permanently sealed. Garrow p
Paul Merrell

Angela Merkel under pressure to reveal all about US spying agreement | World news | The... - 0 views

  • Angela Merkel’s reputation as an unassailable chancellor is under threat amid mounting pressure for her to reveal how much she knew about a German-supported US spying operation on European companies and officials. The onus on her government to deliver answers over the spying scandal has only increased with the Austrian government’s announcement that it has filed a legal complaint against an unnamed party over “covert intelligence to the detriment of Austria”. EADS, now Airbus, one of the companies known to have been spied on by the BND – Germany’s foreign intelligence agency – is also taking legal action, saying it will file a complaint with prosecutors in Germany. The BND stands accused of spying on behalf of America’s NSA on European companies such as EADS, as well as the French presidency and the EU commission. There are also suspicions that German government workers and journalists were spied on.
  • The scandal has already strained relations within Merkel’s grand coalition, with many observers commenting that Gabriel was seeing the affair as a chance to make political gains. Political observers were lining up to remark that the crisis is the single most critical of Merkel’s decade in government and could even lead to her and her government’s downfall.
  • While Merkel appeared to have remained relatively unscathed by the scandal until now, an opinion poll showed that most Germans believed the trustworthiness of the three-times chancellor was now seriously at stake. 62% of Germans said her credibility was in doubt, according to the poll, carried out by the Insa institute, while 18% said it was not. Merkel told Radio Bremen in an interview that she was prepared to speak out over the allegations to a parliamentary committee. “I will testify there and justify myself to them where it is required,” she told the broadcaster.
  • ...5 more annotations...
  • Sigmar Gabriel, the deputy chancellor and economy minister, who is also the leader of the SPD, upped the ante still further by relaying a conversation he had with Merkel in which he asked her twice if the government had evidence of economic espionage, and she said no. He added that if it emerged Germany had been involved in helping the NSA spy on companies, it would greatly strain relations between business and the government and “put a large burden on the trust the economy has in government behaviour”.
  • The Social Democrats (SPD), Merkel’s government partners, along with Germany’s federal public prosecutor, Harald Range, are demanding the release of a list of “selectors” – 40,000 search terms used in the spying operations – the results of which were passed on to the NSA. “The list must be published and only then is clarification possible,” said Christine Lambrecht, parliamentary head of the SPD faction. Merkel has so far refused to allow its release. Her spokesman, Steffen Seibert, said she would make a decision on whether or not to do so only “once consultations with the American partners are completed”. Thomas de Maizière, the interior minister and a close Merkel confidante, is under even more pressure than the chancellor over allegations he lied about what he knew of BND/NSA cooperation. On Wednesday he answered questions on the affair to a parliamentary committee investigating the row, but only in camera and in a bug-proof room. Among other alleged shortcomings over the affair, he stands accused of failing to act when the BND informed him of the espionage activities in 2008 when he was Merkel’s chief of staff. He has repeatedly been portrayed in the tabloid media with a Pinocchio nose.
  • But the scandal has its roots much further back than Merkel’s own government, harking to a time when Europe was gripped by the cold war. Both the US and the UK, as victors of the second world war who had Germany under close supervision, ran spying networks from Germany, most notably from Bad Aibling in Bavaria, the biggest listening station outside the US and Britain. Officially, the US withdrew its operations in 2004. But unofficially it stayed there under an agreement in which Germany agreed to hand over its intelligence findings in return for the highly sophisticated technology the US was able to provide. The events of 9/11 and the revelations that three of the pilots had lived in Germany undetected only served to increase the pressure the US was able to put on Germany that its presence was necessary. Bad Aibling, officially now solely a BND listening facility, was the post used by the NSA in the current scandal.
  • The affair has underlined just how dependent Germany still is on the US and to a lesser extent the UK, on issues of intelligence and defence. Their desire for still-closer cooperation culminated in Operation Monkey Shoulder (named after a blend of three different types of malt whiskys) involving the BND, NSA and MI6, Spiegel recently revealed. With such a background, the German government has to appear to be criticising the US at the same time as underlining the importance of cooperation. Merkel, who appeared to be hugely at odds with the US government when it was revealed in 2013 that the NSA’s mass intelligence operation included tapping her mobile phone, has so far responded in a characteristically vague and flat manner. While acknowledging that allies should not spy on each other, she has stressed that spying’s most important role is to prevent terrorist attacks. “The government will do everything to guarantee the ability of the intelligence services,” she said on Monday. “Taking terrorist threats into account, that ability is only possible in cooperation with other agencies. That very much includes the NSA, as well as others.”
  • Commenting on the crisis, Spiegel magazine called it the “biggest challenge that the ‘Merkel Regime’ has had to face”, and potentially the “turning point of her chancellorship”. “She enjoys such trust because many Germans feel she looks after the country’s needs and their own very well. But the scandal … could cause the foundations of her power to crumble,” the magazine said.
Paul Merrell

DEA Global Surveillance Dragnet Exposed; Access to Data Likely Continues - The Intercept - 0 views

  • Secret mass surveillance conducted by the Drug Enforcement Administration is falling under renewed scrutiny after fresh revelations about the broad scope of the agency’s electronic spying. On Tuesday, USA Today reported that for more than two decades, dating back to 1992, the DEA and the Justice Department “amassed logs of virtually all telephone calls from the USA to as many as 116 countries linked to drug trafficking.” Citing anonymous current and former officials “involved with the operation,” USA Today reported that Americans’ calls were logged between the United States and targeted countries and regions including Canada, Mexico, and Central and South America.
  • The DEA’s data dragnet was apparently shut down by Attorney General Eric Holder in September 2013. But on Wednesday, following USA Today’s report, Human Rights Watch launched a lawsuit against the DEA over its bulk collection of phone records and is seeking a retrospective declaration that the surveillance was unlawful. The latest revelations shine more light on the broad scope of the DEA’s involvement in mass surveillance programs, which can be traced back to a secret program named “Project Crisscross” in the early 1990s, as The Intercept previously revealed. Documents from National Security Agency whistleblower Edward Snowden, published by The Intercept in August last year, showed that the DEA was involved in collecting and sharing billions of phone records alongside agencies such as the NSA, the CIA and the FBI.
  • The vast program reported on by USA Today shares some of the same hallmarks of Project Crisscross: it began in the early 1990s, was ostensibly aimed at gathering intelligence about drug trafficking, and targeted countries worldwide, with focus on Central and South America. It is also reminiscent of the so-called Hemisphere Project, a DEA operation revealed in September 2013 by The New York Times, which dated as far back as 1987, and used subpoenas to collect vast amounts of international call records every day. There is crossover, too, with a DEA database called DICE, revealed by Reuters in August 2013, which reportedly contains phone and Internet communication records gathered by the DEA through subpoenas and search warrants nationwide. The precise relationship between Crisscross, DICE, Hemisphere and the surveillance program revealed by USA Today is unclear. Whether or not they were part of a single overarching operation, the phone records and other data collected by each were likely accessible to DEA agents through the same computer interfaces and search and analysis tools.
  • ...3 more annotations...
  • A Justice Department spokesman told Reuters Wednesday that “all of the information has been deleted” and that the DEA was “no longer collecting bulk telephony metadata from U.S. service providers.” What the spokesman did not say is that the DEA has access to troves of phone records from multiple sources — and not all of them are obtained from U.S. service providers. As The Intercept’s reporting on Project Crisscross revealed, the DEA has had large-scale access to data covertly collected by the NSA, CIA and other agencies for years. According to NSA documents obtained by Snowden, the DEA can sift through billions of metadata records collected by other agencies about emails, phone calls, faxes, Internet chats and text messages using systems named ICREACH and CRISSCROSS/PROTON.
  • Notably, the DEA spying reported by USA Today encompassed phone records collected by the DEA using administrative subpoenas to obtain data from phone companies without the approval of a judge. The phone records collected by the agency as part of Project Hemisphere and the data stored on the DICE system were also collected through subpoenas and warrants. But ICREACH alone was designed to handle two to five billion new records every day — the majority of them not collected using any conventional search warrant or a subpoena. Instead, most of the data accessible to the DEA through ICREACH is vacuumed up by the NSA using Executive Order 12333, a controversial Reagan-era presidential directive that underpins several NSA bulk surveillance operations that monitor communications overseas. The 12333 surveillance takes place with no court oversight and has received minimal Congressional scrutiny because it is targeted at foreign, not domestic, communication networks.
  • This means that some of the DEA’s access to mass surveillance data — records collected in bulk through subpoenas or warrants — may have been shut down by Holder in 2013. But it is likely that the agency still has the ability to tap into other huge data repositories, and questions remain about how that access is being used.
  •  
    How many ways do I love thee? ... Just a few minutes. I have to consult my haystacks.  'Twas on August 20, 1982 when Ronald Reagan formally declered "War on Drugs," thereby sweeping U.S. Drug Enforcement Administration records under the umbrella of "national security" secrets. Concurrently, a document was produced by the White House that mentioned that the forerunners of today's "fusion centers" would be created to begin trawling government databases for information to wage that war, including medical records held by the then-Veterans Administration. I''ve been keeping an eye on those rascals ever since. Believe me, we have merely scratched the surface of a very few of the Feds' "haystacks." There are very many to go before they're all rooted out into the sunlight.  
Paul Merrell

Erdogan's Dirty Dangerous ISIS Games | nsnbc international - 0 views

  • Turkey is a beautiful land, rich in resources, with many highly intelligent and warm people. It also happens to have a President who seems intent on destroying his once-proud nation. More and more details are coming to light revealing that the Islamic State in Iraq and Syria, variously known as ISIS, IS or Daesh, is being fed and kept alive by Recep Tayyip Erdoğan, the Turkish President and by his Turkish intelligence service, including MIT, the Turkish CIA. Turkey, as a result of Erdoğan’s pursuit of what some call a Neo-Ottoman Empire fantasies that stretch all the way to China, Syria and Iraq, threatens not only to destroy Turkey but much of the Middle East if he continues on his present path.
  • In October 2014 US Vice President Joe Biden told a Harvard gathering that Erdoğan’s regime was backing ISIS / ISIL with “hundreds of millions of dollars and thousands of tons of weapons…” Biden later apologized clearly for tactical reasons to get Erdogan’s permission to use Turkey’s Incirlik Air Base for airstrikes against ISIS in Syria, but the dimensions of Erdoğan’s backing for ISIS since revealed is far, far more than Biden hinted. ISIS militants were trained by US, Israeli and now it emerges, by Turkish special forces at secret bases in Konya Province inside the Turkish border to Syria, over the past three years. Erdoğan’s involvement in ISIS goes much deeper. At a time when Washington, Saudi Arabia and even Qatar appear to have cut off their support for ISIS, they remaining amazingly durable. The reason appears to be the scale of the backing from Erdoğan and his fellow neo-Ottoman Sunni Islam Prime Minister, Ahmet Davutoğlu. Nice Family Business The prime source of money feeding ISIS these days is sale of Iraqi oil from the Mosul region oilfields where they maintain a stronghold. The son of Erdoğan it seems is the man who makes the export sales of ISIS-controlled oil possible. Bilal Erdoğan owns several maritime companies. He has allegedly signed contracts with European operating companies to carry Iraqi stolen oil to different Asian countries. The Turkish government buys Iraqi plundered oil which is being produced from the Iraqi seized oil wells. Bilal Erdoğan’s maritime companies own special wharfs in Beirut and Ceyhan ports that are transporting ISIS’ smuggled crude oil in Japan-bound oil tankers.
  • In addition to son Bilal’s illegal and lucrative oil trading for ISIS, Sümeyye Erdoğan, the daughter of the Turkish President apparently runs a secret hospital camp inside Turkey just over the Syrian border where Turkish army trucks daily being in scores of wounded ISIS Jihadists to be patched up and sent back to wage the bloody Jihad in Syria, according to the testimony of a nurse who was recruited to work there until it was discovered she was a member of the Alawite branch of Islam, the same as Syrian President Bashar al-Assad who Erdoğan seems hell-bent on toppling. Turkish citizen Ramazan Başol, captured this month by Kurdish People’s Defence Units,YPG, as he attempted to join ISIS from Konya province, told his captors that said he was sent to ISIS by the ‘İsmail Ağa Sect,’ a strict Turkish Islam sect reported to be tied to Recep Erdoğan. Başol said the sect recruits members and provides logistic support to the radical Islamist organization. He added that the Sect gives jihad training in neighborhoods of Konya and sends those trained here to join ISIS gangs in Syria. According to French geopolitical analyst, Thierry Meyssan, Recep Erdoğan “organised the pillage of Syria, dismantled all the factories in Aleppo, the economic capital, and stole the machine-tools. Similarly, he organised the theft of archeological treasures and set up an international market in Antioch…with the help of General Benoît Puga, Chief of Staff for the Elysée, he organised a false-flag operation intended to provoke the launching of a war by the Atlantic Alliance – the chemical bombing of la Ghoutta in Damascus, in August 2013. “
  • ...1 more annotation...
  • Meyssan claims that the Syria strategy of Erdoğan was initially secretly developed in coordination with former French Foreign Minister Alain Juppé and Erdoğan’s then Foreign Minister Ahmet Davutoğlu, in 2011, after Juppe won a hesitant Erdoğan to the idea of supporting the attack on traditional Turkish ally Syria in return for a promise of French support for Turkish membership in the EU. France later backed out, leaving Erdoğan to continue the Syrian bloodbath largely on his own using ISIS. Gen. John R. Allen, an opponent of Obama’s Iran peace strategy, now US diplomatic envoy coordinating the coalition against the Islamic State, exceeded his authorized role after meeting with Erdoğan and “promised to create a « no-fly zone » ninety miles wide, over Syrian territory, along the whole border with Turkey, supposedly intended to help Syrian refugees fleeing from their government, but in reality to apply the « Juppé-Wright plan ». The Turkish Prime Minister, Ahmet Davutoğlu, revealed US support for the project on the TV channel A Haber by launching a bombing raid against the PKK.” Meyssan adds. There are never winners in war and Erdoğan’s war against Syria’s Assad demonstrates that in bold. Turkey and the world deserve better. Ahmet Davutoğlu’s famous “Zero Problems With Neighbors” foreign policy has been turned into massive problems with all neighbors due to the foolish ambitions of Erdoğan and his gang.
Paul Merrell

From Radio to Porn, British Spies Track Web Users' Online Identities - 0 views

  • HERE WAS A SIMPLE AIM at the heart of the top-secret program: Record the website browsing habits of “every visible user on the Internet.” Before long, billions of digital records about ordinary people’s online activities were being stored every day. Among them were details cataloging visits to porn, social media and news websites, search engines, chat forums, and blogs. The mass surveillance operation — code-named KARMA POLICE — was launched by British spies about seven years ago without any public debate or scrutiny. It was just one part of a giant global Internet spying apparatus built by the United Kingdom’s electronic eavesdropping agency, Government Communications Headquarters, or GCHQ. The revelations about the scope of the British agency’s surveillance are contained in documents obtained by The Intercept from National Security Agency whistleblower Edward Snowden. Previous reports based on the leaked files have exposed how GCHQ taps into Internet cables to monitor communications on a vast scale, but many details about what happens to the data after it has been vacuumed up have remained unclear.
  • Amid a renewed push from the U.K. government for more surveillance powers, more than two dozen documents being disclosed today by The Intercept reveal for the first time several major strands of GCHQ’s existing electronic eavesdropping capabilities.
  • The surveillance is underpinned by an opaque legal regime that has authorized GCHQ to sift through huge archives of metadata about the private phone calls, emails and Internet browsing logs of Brits, Americans, and any other citizens — all without a court order or judicial warrant
  • ...17 more annotations...
  • A huge volume of the Internet data GCHQ collects flows directly into a massive repository named Black Hole, which is at the core of the agency’s online spying operations, storing raw logs of intercepted material before it has been subject to analysis. Black Hole contains data collected by GCHQ as part of bulk “unselected” surveillance, meaning it is not focused on particular “selected” targets and instead includes troves of data indiscriminately swept up about ordinary people’s online activities. Between August 2007 and March 2009, GCHQ documents say that Black Hole was used to store more than 1.1 trillion “events” — a term the agency uses to refer to metadata records — with about 10 billion new entries added every day. As of March 2009, the largest slice of data Black Hole held — 41 percent — was about people’s Internet browsing histories. The rest included a combination of email and instant messenger records, details about search engine queries, information about social media activity, logs related to hacking operations, and data on people’s use of tools to browse the Internet anonymously.
  • Throughout this period, as smartphone sales started to boom, the frequency of people’s Internet use was steadily increasing. In tandem, British spies were working frantically to bolster their spying capabilities, with plans afoot to expand the size of Black Hole and other repositories to handle an avalanche of new data. By 2010, according to the documents, GCHQ was logging 30 billion metadata records per day. By 2012, collection had increased to 50 billion per day, and work was underway to double capacity to 100 billion. The agency was developing “unprecedented” techniques to perform what it called “population-scale” data mining, monitoring all communications across entire countries in an effort to detect patterns or behaviors deemed suspicious. It was creating what it said would be, by 2013, “the world’s biggest” surveillance engine “to run cyber operations and to access better, more valued data for customers to make a real world difference.”
  • A document from the GCHQ target analysis center (GTAC) shows the Black Hole repository’s structure.
  • The data is searched by GCHQ analysts in a hunt for behavior online that could be connected to terrorism or other criminal activity. But it has also served a broader and more controversial purpose — helping the agency hack into European companies’ computer networks. In the lead up to its secret mission targeting Netherlands-based Gemalto, the largest SIM card manufacturer in the world, GCHQ used MUTANT BROTH in an effort to identify the company’s employees so it could hack into their computers. The system helped the agency analyze intercepted Facebook cookies it believed were associated with Gemalto staff located at offices in France and Poland. GCHQ later successfully infiltrated Gemalto’s internal networks, stealing encryption keys produced by the company that protect the privacy of cell phone communications.
  • Similarly, MUTANT BROTH proved integral to GCHQ’s hack of Belgian telecommunications provider Belgacom. The agency entered IP addresses associated with Belgacom into MUTANT BROTH to uncover information about the company’s employees. Cookies associated with the IPs revealed the Google, Yahoo, and LinkedIn accounts of three Belgacom engineers, whose computers were then targeted by the agency and infected with malware. The hacking operation resulted in GCHQ gaining deep access into the most sensitive parts of Belgacom’s internal systems, granting British spies the ability to intercept communications passing through the company’s networks.
  • In March, a U.K. parliamentary committee published the findings of an 18-month review of GCHQ’s operations and called for an overhaul of the laws that regulate the spying. The committee raised concerns about the agency gathering what it described as “bulk personal datasets” being held about “a wide range of people.” However, it censored the section of the report describing what these “datasets” contained, despite acknowledging that they “may be highly intrusive.” The Snowden documents shine light on some of the core GCHQ bulk data-gathering programs that the committee was likely referring to — pulling back the veil of secrecy that has shielded some of the agency’s most controversial surveillance operations from public scrutiny. KARMA POLICE and MUTANT BROTH are among the key bulk collection systems. But they do not operate in isolation — and the scope of GCHQ’s spying extends far beyond them.
  • The agency operates a bewildering array of other eavesdropping systems, each serving its own specific purpose and designated a unique code name, such as: SOCIAL ANTHROPOID, which is used to analyze metadata on emails, instant messenger chats, social media connections and conversations, plus “telephony” metadata about phone calls, cell phone locations, text and multimedia messages; MEMORY HOLE, which logs queries entered into search engines and associates each search with an IP address; MARBLED GECKO, which sifts through details about searches people have entered into Google Maps and Google Earth; and INFINITE MONKEYS, which analyzes data about the usage of online bulletin boards and forums. GCHQ has other programs that it uses to analyze the content of intercepted communications, such as the full written body of emails and the audio of phone calls. One of the most important content collection capabilities is TEMPORA, which mines vast amounts of emails, instant messages, voice calls and other communications and makes them accessible through a Google-style search tool named XKEYSCORE.
  • As of September 2012, TEMPORA was collecting “more than 40 billion pieces of content a day” and it was being used to spy on people across Europe, the Middle East, and North Africa, according to a top-secret memo outlining the scope of the program. The existence of TEMPORA was first revealed by The Guardian in June 2013. To analyze all of the communications it intercepts and to build a profile of the individuals it is monitoring, GCHQ uses a variety of different tools that can pull together all of the relevant information and make it accessible through a single interface. SAMUEL PEPYS is one such tool, built by the British spies to analyze both the content and metadata of emails, browsing sessions, and instant messages as they are being intercepted in real time. One screenshot of SAMUEL PEPYS in action shows the agency using it to monitor an individual in Sweden who visited a page about GCHQ on the U.S.-based anti-secrecy website Cryptome.
  • Partly due to the U.K.’s geographic location — situated between the United States and the western edge of continental Europe — a large amount of the world’s Internet traffic passes through its territory across international data cables. In 2010, GCHQ noted that what amounted to “25 percent of all Internet traffic” was transiting the U.K. through some 1,600 different cables. The agency said that it could “survey the majority of the 1,600” and “select the most valuable to switch into our processing systems.”
  • According to Joss Wright, a research fellow at the University of Oxford’s Internet Institute, tapping into the cables allows GCHQ to monitor a large portion of foreign communications. But the cables also transport masses of wholly domestic British emails and online chats, because when anyone in the U.K. sends an email or visits a website, their computer will routinely send and receive data from servers that are located overseas. “I could send a message from my computer here [in England] to my wife’s computer in the next room and on its way it could go through the U.S., France, and other countries,” Wright says. “That’s just the way the Internet is designed.” In other words, Wright adds, that means “a lot” of British data and communications transit across international cables daily, and are liable to be swept into GCHQ’s databases.
  • A map from a classified GCHQ presentation about intercepting communications from undersea cables. GCHQ is authorized to conduct dragnet surveillance of the international data cables through so-called external warrants that are signed off by a government minister. The external warrants permit the agency to monitor communications in foreign countries as well as British citizens’ international calls and emails — for example, a call from Islamabad to London. They prohibit GCHQ from reading or listening to the content of “internal” U.K. to U.K. emails and phone calls, which are supposed to be filtered out from GCHQ’s systems if they are inadvertently intercepted unless additional authorization is granted to scrutinize them. However, the same rules do not apply to metadata. A little-known loophole in the law allows GCHQ to use external warrants to collect and analyze bulk metadata about the emails, phone calls, and Internet browsing activities of British people, citizens of closely allied countries, and others, regardless of whether the data is derived from domestic U.K. to U.K. communications and browsing sessions or otherwise. In March, the existence of this loophole was quietly acknowledged by the U.K. parliamentary committee’s surveillance review, which stated in a section of its report that “special protection and additional safeguards” did not apply to metadata swept up using external warrants and that domestic British metadata could therefore be lawfully “returned as a result of searches” conducted by GCHQ.
  • Perhaps unsurprisingly, GCHQ appears to have readily exploited this obscure legal technicality. Secret policy guidance papers issued to the agency’s analysts instruct them that they can sift through huge troves of indiscriminately collected metadata records to spy on anyone regardless of their nationality. The guidance makes clear that there is no exemption or extra privacy protection for British people or citizens from countries that are members of the Five Eyes, a surveillance alliance that the U.K. is part of alongside the U.S., Canada, Australia, and New Zealand. “If you are searching a purely Events only database such as MUTANT BROTH, the issue of location does not occur,” states one internal GCHQ policy document, which is marked with a “last modified” date of July 2012. The document adds that analysts are free to search the databases for British metadata “without further authorization” by inputing a U.K. “selector,” meaning a unique identifier such as a person’s email or IP address, username, or phone number. Authorization is “not needed for individuals in the U.K.,” another GCHQ document explains, because metadata has been judged “less intrusive than communications content.” All the spies are required to do to mine the metadata troves is write a short “justification” or “reason” for each search they conduct and then click a button on their computer screen.
  • Intelligence GCHQ collects on British persons of interest is shared with domestic security agency MI5, which usually takes the lead on spying operations within the U.K. MI5 conducts its own extensive domestic surveillance as part of a program called DIGINT (digital intelligence).
  • GCHQ’s documents suggest that it typically retains metadata for periods of between 30 days to six months. It stores the content of communications for a shorter period of time, varying between three to 30 days. The retention periods can be extended if deemed necessary for “cyber defense.” One secret policy paper dated from January 2010 lists the wide range of information the agency classes as metadata — including location data that could be used to track your movements, your email, instant messenger, and social networking “buddy lists,” logs showing who you have communicated with by phone or email, the passwords you use to access “communications services” (such as an email account), and information about websites you have viewed.
  • Records showing the full website addresses you have visited — for instance, www.gchq.gov.uk/what_we_do — are treated as content. But the first part of an address you have visited — for instance, www.gchq.gov.uk — is treated as metadata. In isolation, a single metadata record of a phone call, email, or website visit may not reveal much about a person’s private life, according to Ethan Zuckerman, director of Massachusetts Institute of Technology’s Center for Civic Media. But if accumulated and analyzed over a period of weeks or months, these details would be “extremely personal,” he told The Intercept, because they could reveal a person’s movements, habits, religious beliefs, political views, relationships, and even sexual preferences. For Zuckerman, who has studied the social and political ramifications of surveillance, the most concerning aspect of large-scale government data collection is that it can be “corrosive towards democracy” — leading to a chilling effect on freedom of expression and communication. “Once we know there’s a reasonable chance that we are being watched in one fashion or another it’s hard for that not to have a ‘panopticon effect,’” he said, “where we think and behave differently based on the assumption that people may be watching and paying attention to what we are doing.”
  • When compared to surveillance rules in place in the U.S., GCHQ notes in one document that the U.K. has “a light oversight regime.” The more lax British spying regulations are reflected in secret internal rules that highlight greater restrictions on how NSA databases can be accessed. The NSA’s troves can be searched for data on British citizens, one document states, but they cannot be mined for information about Americans or other citizens from countries in the Five Eyes alliance. No such constraints are placed on GCHQ’s own databases, which can be sifted for records on the phone calls, emails, and Internet usage of Brits, Americans, and citizens from any other country. The scope of GCHQ’s surveillance powers explain in part why Snowden told The Guardian in June 2013 that U.K. surveillance is “worse than the U.S.” In an interview with Der Spiegel in July 2013, Snowden added that British Internet cables were “radioactive” and joked: “Even the Queen’s selfies to the pool boy get logged.”
  • In recent years, the biggest barrier to GCHQ’s mass collection of data does not appear to have come in the form of legal or policy restrictions. Rather, it is the increased use of encryption technology that protects the privacy of communications that has posed the biggest potential hindrance to the agency’s activities. “The spread of encryption … threatens our ability to do effective target discovery/development,” says a top-secret report co-authored by an official from the British agency and an NSA employee in 2011. “Pertinent metadata events will be locked within the encrypted channels and difficult, if not impossible, to prise out,” the report says, adding that the agencies were working on a plan that would “(hopefully) allow our Internet Exploitation strategy to prevail.”
Paul Merrell

Secret documents shine light on GCSB spying in Bangladesh - National - NZ Herald News - 0 views

  • Secret documents reveal New Zealand has shared intelligence collected through covert surveillance with Bangladesh despite that country's security forces being implicated in extrajudicial killings, torture and other human rights abuses. The documents shine light on the major role played by the Government Communications Security Bureau (GCSB) in electronic spying operations conducted in the small South Asian nation. The surveillance has been used to aid the United States as part of its global counter-terrorism campaign, launched after the September 11 attacks in 2001. The New Zealand Herald analysed the documents in collaboration with US news website The Intercept, which obtained them from the NSA whistle-blower Edward Snowden.
  • Green Party co-leader Russel Norman said the spy agency was "dragging" New Zealand into human rights abuses, and the Government should stop providing intelligence assistance to Bangladesh. "All three key anti-terrorism government agencies in Bangladesh have been implicated in horrendous human rights abuses, so it is impossible to guarantee that the information passed on did not lead to innocent people being killed or tortured," Dr Norman said. "John Key has always justified the GCSB on the basis that it is there to protect the good guys, but these documents reveal that it is helping the bad guys.
  • The intelligence gathered by the GCSB staff was also being forwarded to foreign intelligence agencies, including Bangladesh's state intelligence agency. In recent years, human rights groups have issued several reports documenting Bangladeshi intelligence and security agencies' disregard for international prohibitions on torture and alleged involvement in politically motivated killings. In 2014, a case was filed in the International Criminal Court accusing the Bangladesh Government of committing crimes against humanity. The GCSB's surveillance operations in Bangladesh are among the most surprising and obscure yet revealed. Bangladesh barely registers in New Zealand foreign policy. The Ministry of Foreign Affairs and Trade website says: "Relations between New Zealand and Bangladesh remain friendly, although interaction is limited." Nonetheless, a New Zealand government source told the Herald that Bangladesh is the main focus of one of the GCSB's four analysis sections, called ICT, and has been for over a decade. ICT, the Transnational Issues section, was set up in April 2002 in the wake of the September 11 attacks to focus on terrorism threats.
  • ...5 more annotations...
  • The 2009 document reveals that there is a special collection site in the Bangladesh capital, Dhaka, for eavesdropping on local communications. New Zealand does not have a high commission or any other official building in Bangladesh in which to hide a covert listening post. The Snowden documents suggest the Dhaka unit may be located inside a US-controlled building with operations overseen by the NSA and the Central Intelligence Agency (CIA).
  • The Bangladesh spying is revealed in an April 2013 US National Security Agency (NSA) report about its relationship with New Zealand. In a section called "What Partner Provides to NSA", it says "GCSB has been the lead for the intelligence community on the Bangladesh CT [Counter-Terrorism] target since 2004." The GCSB provides "one of the key SIGINT [signals intelligence] sources of [Bangladesh counter-terrorism] reporting to the US intelligence community."
  • The intelligence gathered by the GCSB staff was being forwarded to foreign intelligence agencies. The April 2013 NSA report said the "GCSB's Bangladesh CT [counter terrorism] reporting provided unique intelligence leads that have enabled successful CT operations by Bangladesh State Intelligence Service, CIA and India over the past year". The specific Bangladesh "State Intelligence Service" referred to is not named in the document. Bangladesh has several agencies that focus on gathering intelligence, primarily including the Directorate General of Forces Intelligence (DGFI), the National Security Intelligence agency (NSI), and the police Special Branch. The lead agency that executes the country's counter-terrorism operations is the Rapid Action Battalion, or RAB. Each of these agencies has been accused of involvement in severe human rights abuses over a sustained number of years. In 2008, for instance, Human Rights Watch alleged that the Special Branch headquarters in Dhaka's Maghbazar neighbourhood was used to torture detainees.
  • In 2010, a trade union activist accused the NSI of arresting, torturing, and threatening to kill him. The same activist was found dead in unexplained circumstances two years later, his toes and feet broken, legs and body battered and bruised, and his legs apparently pierced with a sharp object. Bangladesh's intelligence agencies and main police and security forces co-operate closely. Most notably, they work together as part of a notorious centre called the Taskforce for Interrogation Cell, located inside a compound in northern Dhaka that is controlled by the RAB unit. In 2011, Britain's Guardian newspaper reported the interrogation cell was used as a place to extract information and confessions from "enemies of the state". It was described as a "torture centre" used for "deliberate and systematic" mistreatment of detainees. One British man detained there in 2009 on terrorism-related charges was allegedly hooded and strapped to a chair while a drill was driven into his right shoulder and hip.
  • Other torture methods used by Bangladeshi authorities, according to Human Rights Watch, have included "burning with acid, hammering of nails into toes ... electric shocks, beatings on legs with iron rods, beating with batons on backs after sprinkling sand on them, ice torture, finger piercing, and mock executions". In February last year, the US Government suspended its own support for the RAB, citing "gross violation of human rights" committed by the force's members. The same month, a case against the Bangladesh Government was lodged in the International Criminal Court, accusing the country's officials of waging a brutal campaign of "widespread or systematic" torture, killings, and other human rights abuses that amounted to crimes against humanity.
Paul Merrell

Memo to Potential Whistleblowers: If You See Something, Say Something | Global Research - 0 views

  • Blowing the whistle on wrongdoing creates a moral frequency that vast numbers of people are eager to hear. We don’t want our lives, communities, country and world continually damaged by the deadening silences of fear and conformity. I’ve met many whistleblowers over the years, and they’ve been extraordinarily ordinary. None were applying for halos or sainthood. All experienced anguish before deciding that continuous inaction had a price that was too high. All suffered negative consequences as well as relief after they spoke up and took action. All made the world better with their courage. Whistleblowers don’t sign up to be whistleblowers. Almost always, they begin their work as true believers in the system that conscience later compels them to challenge. “It took years of involvement with a mendacious war policy, evidence of which was apparent to me as early as 2003, before I found the courage to follow my conscience,” Matthew Hoh recalled this week.“It is not an easy or light decision for anyone to make, but we need members of our military, development, diplomatic and intelligence community to speak out if we are ever to have a just and sound foreign policy.”
  • Hoh describes his record this way: “After over 11 continuous years of service with the U.S. military and U.S. government, nearly six of those years overseas, including service in Iraq and Afghanistan, as well as positions within the Secretary of the Navy’s Office as a White House Liaison, and as a consultant for the State Department’s Iraq Desk, I resigned from my position with the State Department in Afghanistan in protest of the escalation of war in 2009.” Another former Department of State official, the ex-diplomat and retired Army colonel Ann Wright, who resigned in protest of the Iraq invasion in March 2003, is crossing paths with Hoh on Friday as they do the honors at a ribbon-cutting — half a block from the State Department headquarters in Washington — for a billboard with a picture of Pentagon Papers whistleblower Daniel Ellsberg. Big-lettered words begin by referring to the years he waited before releasing the Pentagon Papers in 1971. “Don’t do what I did,” Ellsberg says on the billboard.  “Don’t wait until a new war has started, don’t wait until thousands more have died, before you tell the truth with documents that reveal lies or crimes or internal projections of costs and dangers. You might save a war’s worth of lives.
  • The billboard – sponsored by the ExposeFacts organization, which launched this week — will spread to other prominent locations in Washington and beyond. As an organizer for ExposeFacts, I’m glad to report that outreach to potential whistleblowers is just getting started. (For details, visit ExposeFacts.org.) We’re propelled by the kind of hopeful determination that Hoh expressed the day before the billboard ribbon-cutting when he said: “I trust ExposeFacts and its efforts will encourage others to follow their conscience and do what is right.” The journalist Kevin Gosztola, who has astutely covered a range of whistleblower issues for years, pointed this week to the imperative of opening up news media. “There is an important role for ExposeFacts to play in not only forcing more transparency, but also inspiring more media organizations to engage in adversarial journalism,” he wrote. “Such journalism is called for in the face of wars, environmental destruction, escalating poverty, egregious abuses in the justice system, corporate control of government, and national security state secrecy. Perhaps a truly successful organization could inspire U.S. media organizations to play much more of a watchdog role than a lapdog role when covering powerful institutions in government.”
  • ...2 more annotations...
  • Overall, we desperately need to nurture and propagate a steadfast culture of outspoken whistleblowing. A central motto of the AIDS activist movement dating back to the 1980s – Silence = Death – remains urgently relevant in a vast array of realms. Whether the problems involve perpetual war, corporate malfeasance, climate change, institutionalized racism, patterns of sexual assault, toxic pollution or countless other ills, none can be alleviated without bringing grim realities into the light. “All governments lie,” Ellsberg says in a video statement released for the launch of ExposeFacts, “and they all like to work in the dark as far as the public is concerned, in terms of their own decision-making, their planning — and to be able to allege, falsely, unanimity in addressing their problems, as if no one who had knowledge of the full facts inside could disagree with the policy the president or the leader of the state is announcing.” Ellsberg adds: “A country that wants to be a democracy has to be able to penetrate that secrecy, with the help of conscientious individuals who understand in this country that their duty to the Constitution and to the civil liberties and to the welfare of this country definitely surmount their obligation to their bosses, to a given administration, or in some cases to their promise of secrecy.”
  • Right now, our potential for democracy owes a lot to people like NSA whistleblowers William Binney and Kirk Wiebe, and EPA whistleblower Marsha Coleman-Adebayo. When they spoke at the June 4 news conference in Washington that launched ExposeFacts, their brave clarity was inspiring. Antidotes to the poisons of cynicism and passive despair can emerge from organizing to help create a better world. The process requires applying a single standard to the real actions of institutions and individuals, no matter how big their budgets or grand their power. What cannot withstand the light of day should not be suffered in silence. If you see something, say something.
  •  
    While some governments -- my own included -- attempt to impose an Orwellian Dark State of ubiquitous secret surveillance, secret wars, the rule of oligarchs, and public ignorance, the Edward Snowden leaks fanned the flames of the countering War on Ignorance that had been kept alive by civil libertarians. Only days after the U.S. Supreme Court denied review in a case where a reporter had been ordered to reveal his source of information for a book on the Dark State under the penalties for contempt of court (a long stretch in jail), a new web site is launched for communications between sources and journalists where the source's names never need to be revealed. This article is part of the publicity for that new weapon fielded by the civil libertarian side in the War Against Ignorance.  Hurrah!
1 - 20 of 840 Next › Last »
Showing 20 items per page