Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged separation-of-powers

Rss Feed Group items tagged

Paul Merrell

Little consensus within administration on how to stop fall of Aleppo to Assad - The Was... - 0 views

  • There is no consensus within the administration about what the United States can or should do to try to bring a halt to the killing and stop what appears to be the increasingly inevitable fall of Aleppo, Syria’s largest city, to government forces.
  • But last Thursday, as the discussion moved up the chain to a contentious White House meeting of national security principals, top defense officials made clear that their position had not changed. They advised a possible increase in weapons aid to opposition fighters but said the United States should focus its own military firepower on the anti-Islamic State mission rather than risk a direct confrontation with Russia. Asked about the perception of a double shift, a senior defense official said the Pentagon’s position had not changed. “We still believe there are a number of ways to bolster the opposition and not compromise the anti-Islamic State mission,” this official said.
  • But others felt that they had been spun by the defense leadership. Amid increasing internal tension, one senior administration official insisted that both the Syrian opposition and U.S. allies have pressed for a continuation of negotiations and discouraged talk of military intervention. Obama’s position on the subject, this official said, has been “consistent. We do not believe there is a military solution to this conflict. There are any number of challenges that come with applying military force in this context.” In Obama’s recent speech at the United Nations, the official noted, Obama repeated that “there’s no ultimate military victory to be won” in Syria. Instead, Obama said, “we’re going to have to pursue the hard work of diplomacy that aims to stop the violence, and deliver aid to those in need, and support those who pursue a political settlement.” No proposals have been presented to Obama for a decision, and some in the administration think the White House is willing to let time run out on Aleppo, in part to preserve options for a new administration.
  • ...6 more annotations...
  • De Mistura has predicted that if Russian and Syrian air attacks and artillery bombardment do not stop, the city will fall before the end of the year; the U.S. intelligence community assesses that it could be a matter of weeks.
  • An estimated 275,000 civilians, one-third of them children, and 10,000 rebels are surrounded in the eastern side of the city, now under constant aerial attack
  • While Aleppo is the proximate prize sought by the government and its Russian backers, at least 50,000 opposition fighters — many of whom owe their training, weapons and inspiration in large part to the United States — remain in pockets spread across western Syria. Many of those forces have been advised and supplied by the CIA, whose director, John Brennan, is said to favor military action or, at the very least, dispatching more and better weapons to the opposition, particularly if Aleppo is lost. That decision, which would allow the rebels to continue to fight a guerrilla war, or to defend those pockets of the country still in opposition hands, might not be the administration’s to make. Allied governments in the region, including Qatar, Turkey and, to a lesser extent, Saudi Arabia, have long advocated for increased support for the rebels and could decide on their own to send more sophisticated armaments — some of which, including shoulder-launched antiaircraft weapons, the United States has refused to make available on the grounds that they could end up in the wrong hands.
  • As they assess Russian President Vladi­mir Putin’s goals in Syria, intelligence officials think he is less interested in an outright military victory than in being able to set the terms for a settlement that ensures Assad’s survival. But at least in the short term, they believe, the big winner may be the Front for the Conquest of Syria, the al-Qaeda affiliate formerly known as Jabhat al-Nusra. The jihadist group, which U.S. officials have said is planning “external operations” against the United States, has grown in strength and respect as a formidable, well-equipped fighting force against Assad. While senior White House aides are said to be opposed to U.S. military action, one other official who is said to have argued in favor of a military response is Samantha Power, the U.S. ambassador to the United Nations,
  • Echoing the arguments for accountability in the book, “A Problem From Hell,” Kerry last week publicly called for Russia and Syria to be investigated for war crimes for the targeted killing of civilians and wanton destruction in Aleppo and beyond. On Friday, Moscow described Kerry’s call as “propaganda” and repeated its assertion that the United States, by failing to separate rebel forces from the targetable terrorists it insists control Aleppo, is to blame for the failure of the cease-fire. According to international-law experts, however, the likelihood of a war crimes prosecution of either country is virtually nonexistent. Neither Russia nor Syria belongs to the treaty-based International Criminal Court, and a referral to its jurisdiction would require a resolution by the U.N. Security Council, a body in which Russia holds a veto. At the same time, both the ICC and the International Court of Justice, the United Nations’ judicial branch, are designed to prosecute individuals rather than states.
  • “The law of war crimes is individual and personal,” said Kenneth Anderson, a law professor at American University. “Talk of war crimes trials by itself is not serious,” Anderson said. “It’s an evasion of policy by a state that does not want to have to respond to the concerted actions of another state, another two states.”
  •  
    The WaPo statistics on the number of people surrounded in East Aleppo are way off. Most of the city is government controlled, but WaPo uses the city's entire population as the number of surrounded people. Best estimates for the number surrounded in the cauldron are in the neighborhood of 10,000 fighters and 20,000 of their camp followers. Let's hope that Obama has a sane moment and doesn't buckle to the chickenhawk pressure.
Paul Merrell

Congress Can Now Cut the Pay of Individual Civil Servants - 0 views

  • This week, congressional Republicans gave themselves the power to slash the annual salary of any individual federal worker to as low as $1 — and the budget of any individual federal program right down to zero. They executed this attack on the independence of the civil service by reviving an obscure provision enacted by Congress in 1876: The Holman Rule, named after the Indiana congressman who devised it, empowers any member of Congress to submit an amendment to an appropriations bill that targets the funding of a specific government program or employee. The rule was devised before the advent of a nonpolitical, career civil service and was rarely invoked in the modern era. In 1983, Democratic speaker Tip O’Neill laid it to rest. For the past three decades, Congress has had the power to slash any agency’s overall budget, but not to target specific projects or civil servants for funding cuts or downsizing. @media (min-width: 1024px) { .ad.vp-1024-plus { display: block; } } Until now. “This is a big rule change inside there that allows people to get at places they hadn’t before,” House Majority Leader Kevin McCarthy told reporters this week. “All agencies should be held accountable and tested in a manner and this is an avenue to allow them to do it.” This big change flew under the radar when it was enacted Tuesday, as congressional Republicans’ (quickly forfeited) attempt to gut the House ethics office sucked up all available media attention. But the Holman Rule could prove more consequential, particularly if the GOP proves eager to deploy its new weapon.
  •  
    That will last until the first case hits the federal courts. Huge separation of powers issue along with the Equal Protection Clause.
Paul Merrell

Obama Issues Threats To Russia And NATO -- Paul Craig Roberts - PaulCraigRoberts.org - 0 views

  • The Obama regime has issued simultaneous threats to the enemy it is making out of Russia and to its European NATO allies on which Washington is relying to support sanctions on Russia. This cannot end well. As even Americans living in a controlled media environment are aware, Europeans, South Americans, and Chinese are infuriated that the National Stasi Agency is spying on their communications. NSA’s affront to legality, the US Constitution, and international diplomatic norms is unprecedented. Yet, the spying continues, while Congress sits sucking its thumb and betraying its oath to defend the Constitution of the United States. In Washington mumbo-jumbo from the executive branch about “national security” suffices to negate statutory law and Constitutional requirements. Western Europe, seeing that the White House, Congress and the Federal Courts are impotent and unable to rein-in the Stasi Police State, has decided to create a European communication system that excludes US companies in order to protect the privacy of European citizens and government communications from the Washington Stasi.
  • The Obama regime, desperate that no individual and no country escape its spy net, denounced Western Europe’s intention to protect the privacy of its communications as “a violation of trade laws.” Obama’s US Trade Representative, who has been negotiating secret “trade agreements” in Europe and Asia that give US corporations immunity to the laws of all countries that sign the agreements, has threatened WTO penalties if Europe’s communications network excludes the US companies that serve as spies for NSA. Washington in all its arrogance has told its most necessary allies that if you don’t let us spy on you, we will use WTO to penalize you. So there you have it. The rest of the world now has the best possible reason to exit the WTO and to avoid the Trans-Pacific and Trans-Atlantic “trade agreements.” The agreements are not about trade. The purpose of these “trade agreements” is to establish the hegemony of Washington and US corporations over other countries. In an arrogant demonstration of Washington’s power over Europe, the US Trade Representative warned Washington’s NATO allies: “US Trade Representative will be carefully monitoring the development of any such proposals” to create a separate European communication network. http://rt.com/news/us-europe-nsa-snowden-549/ Washington is relying on the Chancellor of Germany, the President of France, and the Prime Minister of the UK to place service to Washington above their countries’ communications privacy.
  • It has dawned on the Russian government that being a part of the American dollar system means that Russia is open to being looted by Western banks and corporations or by individuals financed by them, that the ruble is vulnerable to being driven down by speculators in the foreign exchange market and by capital outflows, and that dependence on the American international payments system exposes Russia to arbitrary sanctions imposed by the “exceptional and indispensable country.” Why it took the Russian government so long to realize that the dollar payments system puts countries under Washington’s thumb is puzzling.
  • ...2 more annotations...
  • Now that the Russian government understands that Russia must depart the dollar system in order to protect Russian sovereignty, President Putin has entered into barter/ruble oil deals with China and Iran. However, Washington objects to Russia abandoning the dollar international payment system. Zero Hedge, a more reliable news source than the US print and TV media, reports that Washington has conveyed to both Russia and Iran that a non-dollar oil deal would trigger US sanctions. http://www.zerohedge.com/news/2014-04-04/us-threatens-russia-sanctions-over-petrodollar-busting-deal Washington’s objection to the Russian/Iranian deal made it clear to all governments that Washington uses the dollar-based international payments system as a means of control. Why should countries accept an international payments system that infringes their sovereignty? What would happen if instead of passively accepting the dollar as the means of international payment, countries simply left the dollar system? The value of the dollar would fall and so would Washington’s power. Without the power that the dollar’s role as world reserve currency gives the US to pay its bills by printing money, the US could not maintain its aggressive military posture or its payoffs to foreign governments to do its bidding. Washington would be just another failed empire, whose population can barely make ends meet, while the One Percent who comprise the mega-rich compete with 200-foot yachts and $750,000 fountain pins. The aristocracy and the serfs. That is what America has already become. A throwback to the feudal era. It is only a matter of time before it is universally recognized that the US is a failed state. Let’s pray this recognition occurs before the arrogant inhabitants of Washington blow up the world in pursuit of hegemony over others.
  • Washington’s provocative military moves against Russia are reckless and dangerous. The buildup of NATO air, ground, and naval forces on Russia’s borders in violation of the 1997 NATO-Russian treaty and the Montreux Convention naturally strike the Russian government as suspicious, especially as the buildups are justified on the basis of lies that Russia is about to invade Poland, the Baltic States, and Moldova in addition to Ukraine. These lies are transparent. The Russian Foreign Minister Sergey Lavrov has asked NATO for an explanation, stating: “We are not only expecting answers, but answers that will be based fully on respect for the rules we agreed on.” http://rt.com/news/lavrov-ukraine-nato-convention-069/ Anders Fogh Rasmussen, Washington’s puppet installed as NATO figurehead who is no more in charge of NATO than I am, responded in a way guaranteed to raise Russian anxieties. Rasmussen dismissed the Russian Foreign Minister’s request for explanation as “propaganda and disinformation.” Clearly, what we are experiencing are rising tensions caused by Washington and NATO. These tensions are in addition to the tensions arising from Washington’s coup in Ukraine. These reckless and dangerous actions have destroyed the Russian government’s trust in the West and are moving the world toward war. Little did the protesters in Kiev, called into the streets by Washington’s NGOs, realize that their foolishness was setting the world on a path to armageddon.
Paul Merrell

Feds operated yet another secret metadata database until 2013 | Ars Technica - 0 views

  • In a new court filing, the Department of Justice revealed that it kept a secret database of telephone metadata—with one party in the United States and another abroad—that ended in 2013. The three-page partially-redacted affidavit from a top Drug Enforcement Agency (DEA) official, which was filed Thursday, explained that the database was authorized under a particular federal drug trafficking statute. The law allows the government to use "administrative subpoenas" to obtain business records and other "tangible things." The affidavit does not specify which countries records were included, but specifically does mention Iran. This database program appears to be wholly separate from the National Security Agency’s metadata program revealed by Edward Snowden, but it targets similar materials and is collected by a different agency. The Wall Street Journal, citing anonymous sources, reported Friday that this newly-revealed program began in the 1990s and was shut down in August 2013.
  • The criminal case involves an Iranian-American man named Shantia Hassanshahi, who is accused of violating the American trade embargo against Iran. His lawyer, Mir Saied Kashani, told Ars that the government has clearly abused its authority. "They’ve converted this from a war on drugs to a war on privacy," he said. "[Hassanshahi] is not accused of any drug crime but they used this drug enforcement information to gather information against him, that's contrary to the law, and we will revisit that. We will bring motions in the court and we will appeal if necessary." Neither the DEA nor the Department of Justice immediately responded to Ars' query as to whether this program is continuing under a different authority.
  • The story begins in 2011, when a Department of Homeland Security (DHS) agent received a tip about someone who might be in violation of American sanctions against Iran. The source provided an e-mail from an Iranian businessman, Manoucher Sheiki, who was involved in acquiring power grid equipment. A second Homeland Security agent, Joshua Akronowitz, wrote in a 2013 affidavit that he searched Sheiki’s Iranian phone number in this database, but declined to explain exactly what kind of database it was. Akronowitz found that the Iranian number came up exactly one time in the database, and was linked to an 818 number, based in Los Angeles County. That number turned out to be the Google Voice number of Hassanshahi. DHS then subpoenaed Google, and got Hassanshahi’s call log and later, metadata on his Gmail account. By early 2012, the agency found out that he was set to return to Los Angeles from Iran. At LAX Airport, customs agents seized his phone, laptop, thumb drives, camcorder, and SIM cards and sent them to Homeland Security. Last year, Kashani, Hassanshahi’s lawyer, argued that this evidence should be suppressed on account that it was the "fruit of the poisonous tree"—obtained via illicit means. In support of his arguments, Kashani cited an important ongoing NSA-related lawsuit, Klayman v. Obama, which remains the only instance where a judge has order the NSA metadata program to be shut down—that order was stayed pending an appeal. (Earlier this month, Ars explored Klayman and other pending notable surveillance cases.)
  • ...3 more annotations...
  • In a December 2014 opinion in the Hassanshahi case, US District Judge Rudolph Contreras allowed the evidence, but also required that the government provide a "declaration summarizing the contours of the law enforcement database used by Homeland Security Investigations to discover Hassanshahi’s phone number, including any limitations on how and when the database may be used." To comply with the judge’s order, Robert Patterson, the assistant special agent in charge of the DEA, wrote in the Thursday filing: As noted, this database was a federal law enforcement database. It could be used to query a telephone number where federal law enforcement officials had a reasonable articulable suspicion that the telephone number at issue was related to an ongoing federal criminal investigation. The Iranian number was determined to meet this standard based on specific information indicating that the Iranian number was being used for the purpose of importing technological goods to Iran in violation of United States law. Previously, the government had not revealed exactly how it began its investigation of Hassanshahi, and only referred cryptically to "[DHS]-accessible law enforcement databases," in Akronowitz’ 2013 and  2014 affidavits.
  • Similarly, other privacy-minded legal experts questioned the government’s tactics in this new revelation. "We just don’t know about the scope of these things, and that’s what’s disturbing," Andrew Crocker, a legal fellow at the Electronic Frontier Foundation, told Ars. His colleague, Hanni Fakhoury, an EFF attorney who used to be a federal public defender, added that he was "not surprised." "Bulk surveillance technologies and the dangerous legal theories that are used to support them trickle down, and here's a prime example of that," he wrote by e-mail. "The DEA's mandate is of course important but not at the level of national security where as you know there are serious legal questions about the propriety of this collection of phone metadata. And if the DEA has a program like this, it wouldn't surprise me if other agencies do too for other sorts of records the government has claimed it can collect with a subpoena (like bank records)."
  • Patrick Toomey, an attorney with the American Civil Liberties Union, chimed in to say that this indeed was a clear example of government overreach. "This disclosure underscores how the government has expanded its use of bulk collection far beyond the NSA and the national-security context, to rely on mass surveillance in ordinary criminal investigations," he said by e-mail. "It’s now clear that multiple government agencies have tracked the calls that Americans make to their parents and relatives, friends, and business associates overseas, all without any suspicion of wrongdoing," Toomey continued. "The DEA program shows yet again how strained and untenable legal theories have been used to secretly justify the surveillance of millions of innocent Americans using laws that were never written for that purpose."
  •  
    The authorizing statute clearly limits the scope of the administrative subpoena authority to drug related criminal investigations. "In any investigation relating to his functions under this subchapter with respect to controlled substances, listed chemicals, tableting machines, or encapsulating machines, the Attorney General may subpena witnesses, compel the attendance and testimony of witnesses, and require the production of any records (including books, papers, documents, and other tangible things which constitute or contain evidence) which the Attorney General finds relevant or material to the investigation."
Paul Merrell

Amend the Federal Reserve: We Need a Central Bank that Serves Main Street | Global Rese... - 0 views

  • December 23rd marks the 100th anniversary of the Federal Reserve. Dissatisfaction with its track record has prompted calls to audit the Fed and end the Fed.  At the least, Congress needs to amend the Fed, modifying the Federal Reserve Act to give the central bank the tools necessary to carry out its mandates. The Federal Reserve is the only central bank with a dual mandate. It is charged not only with maintaining low, stable inflation but with promoting maximum sustainable employment. Yet unemployment remains stubbornly high, despite four years of radical tinkering with interest rates and quantitative easing (creating money on the Fed’s books). After pushing interest rates as low as they can go, the Fed has admitted that it has run out of tools. At an IMF conference on November 8, 2013, former Treasury Secretary Larry Summers suggested that since near-zero interest rates were not adequately promoting people to borrow and spend, it might now be necessary to set interest at below zero. This idea was lauded and expanded upon by other ivory-tower inside-the-box thinkers, including Paul Krugman. Negative interest would mean that banks would charge the depositor for holding his deposits rather than paying interest on them. Runs on the banks would no doubt follow, but the pundits have a solution for that: move to a cashless society, in which all money would be electronic. “This would make it impossible to hoard cash outside the bank,” wrote Danny Vinik in Business Insider, “allowing the Fed to cut interest rates to below zero, spurring people to spend more.”
  • Business Week quotes Douglas Holtz-Eakin, a former director of the Congressional Budget Office: “We’ve had four years of extraordinarily loose monetary policy without satisfactory results, and the only thing they come up with is we need more?” Paul Craig Roberts, former Assistant Secretary of the Treasury, calls the idea “harebrained.” He is equally skeptical of quantitative easing, the Fed’s other tool for stimulating the economy. Roberts points to Andrew Huszar’s explosive November 11th Wall Street Journal article titled “Confessions of a Quantitative Easer,” in which Huszar says that QE was always intended to serve Wall Street, not Main Street.  Huszar’s assignment at the Fed was to manage the purchase of $1.25 trillion in mortgages with dollars created on a computer screen. He says he resigned when he realized that the real purpose of the policy was to drive up the prices of the banks’ holdings of debt instruments, to provide the banks with trillions of dollars at zero cost with which to lend and speculate, and to provide the banks with “fat commissions from brokering most of the Fed’s QE transactions.”
  • Bernanke created debt-free money and bought government debt with it, returning the interest to the Treasury. The result was interest-free credit, a good deal for the government. But the problem, says Lounsbury, is that: The helicopters dropped all the money into a hole in the ground (excess reserve accounts) and very little made its way into the economy.  It was essentially a rearrangement of the balance sheets of the creditor nation with little impact on the debtor nation. . . . The fatal flaw of QE is that it delivers money to the accounts of the creditors and does nothing for the accounts of the debtors. Bad debts remain unserviced and the debt crisis continues.
  • ...2 more annotations...
  • Bernanke delivered the money to the creditors because that was all the Federal Reserve Act allowed. If the Fed is to fulfill its mandate, it clearly needs more tools; and that means amending the Act.  Harvard professor Ken Rogoff, who spoke at the November 2013 IMF conference before Larry Summers, suggested several possibilities; and one was to broaden access to the central bank, allowing anyone to have an ATM at the Fed. Rajiv Sethi, Barnard/Columbia Professor of Economics, expanded on this idea in a blog titled “The Payments System and Monetary Transmission.” He suggested making the Federal Reserve the repository for all deposit banking. This would make deposit insurance unnecessary; it would eliminate the need to impose higher capital requirements; and it would allow the Fed to implement monetary policy by targeting debtor rather than creditor balance sheets. Instead of returning its profits to the Treasury, the Fed could do a helicopter drop directly into consumer bank accounts, stimulating demand in the consumer economy. John Lounsbury expanded further on these ideas. He wrote in Econintersect that they would open a pathway for investment banking and depository banking to be separated from each other, analogous to that under Glass-Steagall. Banks would no longer be too big to fail, since they could fail without destroying the general payment system of the economy. Lounsbury said the central bank could operate as a true public bank and repository for all federal banking transactions, and it could operate in the mode of a postal savings system for the general populace.
  • The Federal Reserve Act was drafted by bankers to create a banker’s bank that would serve their interests. It is their own private club, and its legal structure keeps all non-members out.  A century after the Fed’s creation, a sober look at its history leads to the conclusion that it is a privately controlled institution whose corporate owners use it to direct our entire economy for their own ends, without democratic influence or accountability.  Substantial changes are needed to transform the Fed, and these will only come with massive public pressure. Congress has the power to amend the Fed – just as it did in 1934, 1958 and 2010. For the central bank to satisfy its mandate to promote full employment and to become an institution that serves all the people, not just the 1%, the Fed needs fundamental reform.
  •  
    In my view, the Fed is beyond salvage. It needs abolition, not a new role. The Constitution grants Congress the power to mint and coin money, not a group of rent-seeking banksters. 
Paul Merrell

Canada Casts Global Surveillance Dragnet Over File Downloads - The Intercept - 0 views

  • Canada’s leading surveillance agency is monitoring millions of Internet users’ file downloads in a dragnet search to identify extremists, according to top-secret documents. The covert operation, revealed Wednesday by CBC News in collaboration with The Intercept, taps into Internet cables and analyzes records of up to 15 million downloads daily from popular websites commonly used to share videos, photographs, music, and other files. The revelations about the spying initiative, codenamed LEVITATION, are the first from the trove of files provided by National Security Agency whistleblower Edward Snowden to show that the Canadian government has launched its own globe-spanning Internet mass surveillance system. According to the documents, the LEVITATION program can monitor downloads in several countries across Europe, the Middle East, North Africa, and North America. It is led by the Communications Security Establishment, or CSE, Canada’s equivalent of the NSA. (The Canadian agency was formerly known as “CSEC” until a recent name change.)
  • The latest disclosure sheds light on Canada’s broad existing surveillance capabilities at a time when the country’s government is pushing for a further expansion of security powers following attacks in Ottawa and Quebec last year. Ron Deibert, director of University of Toronto-based Internet security think tank Citizen Lab, said LEVITATION illustrates the “giant X-ray machine over all our digital lives.” “Every single thing that you do – in this case uploading/downloading files to these sites – that act is being archived, collected and analyzed,” Deibert said, after reviewing documents about the online spying operation for CBC News. David Christopher, a spokesman for Vancouver-based open Internet advocacy group OpenMedia.ca, said the surveillance showed “robust action” was needed to rein in the Canadian agency’s operations.
  • In a top-secret PowerPoint presentation, dated from mid-2012, an analyst from the agency jokes about how, while hunting for extremists, the LEVITATION system gets clogged with information on innocuous downloads of the musical TV series Glee. CSE finds some 350 “interesting” downloads each month, the presentation notes, a number that amounts to less than 0.0001 per cent of the total collected data. The agency stores details about downloads and uploads to and from 102 different popular file-sharing websites, according to the 2012 document, which describes the collected records as “free file upload,” or FFU, “events.” Only three of the websites are named: RapidShare, SendSpace, and the now defunct MegaUpload.
  • ...3 more annotations...
  • “The specific uses that they talk about in this [counter-terrorism] context may not be the problem, but it’s what else they can do,” said Tamir Israel, a lawyer with the University of Ottawa’s Canadian Internet Policy and Public Interest Clinic. Picking which downloads to monitor is essentially “completely at the discretion of CSE,” Israel added. The file-sharing surveillance also raises questions about the number of Canadians whose downloading habits could have been swept up as part of LEVITATION’s dragnet. By law, CSE isn’t allowed to target Canadians. In the LEVITATION presentation, however, two Canadian IP addresses that trace back to a web server in Montreal appear on a list of suspicious downloads found across the world. The same list includes downloads that CSE monitored in closely allied countries, including the United Kingdom, United States, Spain, Brazil, Germany and Portugal. It is unclear from the document whether LEVITATION has ever prevented any terrorist attacks. The agency cites only two successes of the program in the 2012 presentation: the discovery of a hostage video through a previously unknown target, and an uploaded document that contained the hostage strategy of a terrorist organization. The hostage in the discovered video was ultimately killed, according to public reports.
  • LEVITATION does not rely on cooperation from any of the file-sharing companies. A separate secret CSE operation codenamed ATOMIC BANJO obtains the data directly from internet cables that it has tapped into, and the agency then sifts out the unique IP address of each computer that downloaded files from the targeted websites. The IP addresses are valuable pieces of information to CSE’s analysts, helping to identify people whose downloads have been flagged as suspicious. The analysts use the IP addresses as a kind of search term, entering them into other surveillance databases that they have access to, such as the vast repositories of intercepted Internet data shared with the Canadian agency by the NSA and its British counterpart Government Communications Headquarters. If successful, the searches will return a list of results showing other websites visited by the people downloading the files – in some cases revealing associations with Facebook or Google accounts. In turn, these accounts may reveal the names and the locations of individual downloaders, opening the door for further surveillance of their activities.
  • Canada’s leading surveillance agency is monitoring millions of Internet users’ file downloads in a dragnet search to identify extremists, according to top-secret documents. The covert operation, revealed Wednesday by CBC News in collaboration with The Intercept, taps into Internet cables and analyzes records of up to 15 million downloads daily from popular websites commonly used to share videos, photographs, music, and other files. The revelations about the spying initiative, codenamed LEVITATION, are the first from the trove of files provided by National Security Agency whistleblower Edward Snowden to show that the Canadian government has launched its own globe-spanning Internet mass surveillance system. According to the documents, the LEVITATION program can monitor downloads in several countries across Europe, the Middle East, North Africa, and North America. It is led by the Communications Security Establishment, or CSE, Canada’s equivalent of the NSA. (The Canadian agency was formerly known as “CSEC” until a recent name change.)
Paul Merrell

The Ukraine Crisis and Vladimir Putin: A New Financial System Free from Wall Street and... - 0 views

  • This is the big secret that now cannot be covered anymore. The governments of the US and the European countries are NOT independent entities, they are not sovereign. They do not have the will or even the ability to act on behalf of their people. They are controlled by powerful banking interests. They have been taken over by two financial centers that do not care for the real economy. They pursue only speculation and looting. In response on March 4th the economic adviser to Putin, Sergey Glazyev declared openly that if the financial vultures persisted, Russia would create on the spot an independent financial system which is separate from that of the US Dollar. Glazyev explained to the vampires: ‘We have wonderful economic and trade relations with our Southern and Eastern partners. We will find a way not just to eliminate our dependence on the US but also profit from these sanctions….If sanctions are applied against Russia’s state structures we will have to move into other currencies and create our own settlement system. We will be forced to recognize the impossibility of repayment of the loans that the US banks gave to Russian state structures. Indeed, sanctions are a double-edged weapon, and if the US chooses to freeze our assets, then our equities and liabilities in dollars will also be frozen…’
  • On March 18, the spokesperson for the Kremlin, Dmitry Peskov, stated that Russia would switch to new partners in case of economic sanctions being imposed by the European Union and the United States. He highlighted that the modern world isn’t unipolar and Russia has strong ties with other states as well, though Russia wants to remain in good relations with its Western partners, especially with the EU due to the volume of trade and joint projects. Those “new partners” are not really new since Russia has been closely interconnected with them for almost 13 years. This is all about the so-called BRICS organization, consisting of Brazil, Russia, India, China and South Africa. BRICS represents 42 percent of the world’s population and about a quarter of the world’s economy, which means that this bloc of states is an important global actor. The BRICS countries are like-minded in regard to supporting the principles of international law, the central role of the UN Security Council and the principles of the non-use of force in international relations; this is why they are so actively performing in the sphere of settling regional conflicts. However, the cooperation between Brazil, Russia, India, China and South Africa goes beyond political aspects and is also demonstrated by dynamic trade and multiple projects in different areas. Today, in total, there are more than 20 formats of cooperation within the BRICS which are being developing. For example, in February the member-states came to an agreement about 11 possible projects of scientific and technical cooperation, from aeronautics to bio- and nanotechnology.
  • This strategy is known as the Financial Nuclear Option. It could lead to the end of the predatory looting system of Wall Street. The ‘Southern and Eastern partners’ Glazyev is talking about are clearly the members of the BRICS, Brazil, Russia, India, China, South Africa, the sane part of the world economy, the future. And it is  exactly  what the official spokesman of the Kremlin, Dmitry Peskov indicated in an interview to the BBC: “Sanctions against Russia could be the final trigger that will force many countries to create a new independent financial system based on the real economy. The world is changing rapidly. How many civilizations grew and died in the course of history? Who will be able to resist the pressure of dying systems and indicate to the people the road toward the future?”  The possibility of a new financial system independent from the collapsing dollar empire, as consequence of anti Russia sanctions was also emphasized by an authoritative the Russian media including  RT. (See:http://rt.com/op-edge/russia-switches-to-brics-sanctions-357/) …Western sanctions might push Russia to deepen cooperation with BRICS states, in particular, to strengthen its ties with China, which will possibly turn out to be a big catastrophe for the US and the EU some time later.
  • ...1 more annotation...
  • In order to modernize the global economic system, at the center of which stand the US and the EU, the leaders of Brazil, Russia, India, China and South Africa have created the BRICS Stock Alliance and are creating their own development bank to finance large infrastructure projects. On the whole, despite fierce criticism of BRICS as an organization with no future, it is developing and increasing cooperation with its members and, in fact, BRICS is showing pretty good results. With the suspension of Russia’s participation in G8 and the strengthening of economic sanctions against Russia, specific industries may be targeted, including limits on imported commodities. While the West seeks to hit Russia hard, it is important to notice that Russia is ready to switch to other markets, including BRICS, with a view to expanding its trade.
Paul Merrell

"Secret Scheme To Manipulate The Price Of Silver" - Lawsuits Against Banks Proceed | In... - 1 views

  • Litigation alleging that Deutsche Bank, Bank of Nova Scotia and HSBC Plc illegally fixed the price of silver were centralised in a Manhattan federal court yesterday. The banks have been accused of rigging the price of billions of dollars in silver to the detriment of investors globally. Lawsuits filed by investors since July over the allegations were consolidated yesterday in the U.S. District Court for the Southern District of New York, following an order issued last Thursday by the U.S. Judicial Panel on Multidistrict Litigation, a special body of federal judges that decides when and where to consolidate related lawsuits. The banks abused their position of controlling the daily silver fix to reap illegitimate profit from trading, hurting other investors in the silver market who use the benchmark in billions of dollars of transactions, according to the suit. Investors claim, the banks unlawfully manipulated silver and silver futures.
  • The U.S. Judicial Panel on Multidistrict Litigation ruled that the cases should be handled by U.S. District Judge Valerie Caproni in Manhattan, who is already overseeing similar litigation over alleged gold price fixing. Three lawsuits were originally filed in Manhattan, and two were filed in Brooklyn. The plaintiffs in the Brooklyn lawsuits had sought to have the litigation consolidated there. The banks had also asked that the litigation be consolidated in Brooklyn, in the Eastern District of New York. However, the multidistrict litigation panel said Manhattan made more sense because the defendants all had corporate offices there and also because the cases involved issues similar to the gold litigation. The plaintiffs allege that the banks abused their power as participants in the silver fix, a London based benchmark pricing method dating back to the Victorian era, in which banks fixed silver prices once a day by phone. In August, the system was replaced by a new benchmark system administered by the CME (Chicago Mercantile Exchange) and Thomson Reuters.
  • HSBC spokesman Neil Brazil declined to comment and representatives of the other banks did not immediately respond to requests for comment. This follows the initiation of similar actions against some bullion banks for alleged gold price manipulation earlier this year. The three named banks, Deutsche Bank, Bank of Nova Scotia, and HSBC are alleged to have abused their position at the LBMA to profit from inside knowledge. The fixing of the price of silver is a daily operation where banks on the panel of the LBMA agree on a price for the precious metals which are then used throughout the financial, jewellery and mining industries throughout the day. It is alleged that some of the banks who fix the price, position themselves advantageously in the silver market before the price is made public. “Defendants have a strong financial incentive to establish positions in both physical silver and silver derivatives prior to the public release of silver fixing results, allowing them to reap large illegitimate profits,” plaintiff Scott Nicholson told the AFP. Separately, Bullion Desk reported yesterday that JPMorgan Chase Bank is now the fifth accredited member of the silver pricing benchmark, the LBMA has confirmed, with others parties “in the pipeline”, a spokesman said.
  • ...2 more annotations...
  • The American multinational bank which has been the subject of silver manipulation allegations by Max Keiser and others, took part in its first silver benchmarking session yesterday. A spokesperson said they had completed “strict regulatory controls” for accredited members.. JP Morgan becomes the fifth member, alongside HSBC Bank USA, Mitsui & Co Precious Metals, the Bank of Nova Scotia – ScotiaMocatta and UBS AG. Furthermore, the LBMA has confirmed that several other parties are also in the process of joining the list, subject to passing regulatory requirements. Several Chinese banks have expressed interest in participating in the new global price setting mechanism for silver, according to the head of the LBMA. The LBMA ushered in a new era of electronic benchmarking for London’s precious metals market in August when an algorithm was used for the first time to set the benchmark price for silver after recent scandals regarding price fixing and concerns about the nature of the gold and silver fix. It will be interesting to see if Chinese banks partake in the new fix process as the concern is that the fixes remain the play things of certain western banks and are not representative of global physical demand and supply of actual gold and silver bullion.
  • Manipulation of the silver market was covered in a recently released ‘Get REAL’ Special on Silver presented by Jan Skoyles. Mark O’Byrne of Goldcore.com was interviewed and the interview was an in depth look at this silver market today.
Paul Merrell

Distrust of US surveillance threatens data deal | TheHill - 0 views

  • European privacy regulators are putting U.S. surveillance practices under the microscope, this time with a crucial transatlantic data deal hanging in the balance.Legal and privacy advocates say European nations are poised to strike down the deal if they decide the U.S. hasn't done enough to reform its spying programs.The new test comes after the European Commission and the Commerce Department — after months of tense negotiations — reached a deal this week permitting Facebook, Google and thousands of other companies to continue legally handling Europeans’ personal data.ADVERTISEMENTCritics though have long warned that unless the U.S. overhauls its privacy and national security laws, there is no legal framework that can stand up in European court, where privacy is considered a fundamental right under the EU Charter.A working group of 28 EU nations’ data protection authorities — domestic entities separate from the Commission that will be in charge of enforcing the new agreement — may now cast the deciding vote.The group is spending the next few months picking through the so-called Privacy Shield agreement to determine if it adequately protects the personal data of European citizens.
  • “The Commission has said, ‘We’re satisfied. We believe them. We believe the U.S. has substantially changed its practices,’ and they are no longer going off the [Edward] Snowden revelations in the media,” said Susan Foster, a privacy attorney at Mintz Levin who works in both the EU and the U.S.“Whether the working group will go along with it is another question.”The privacy advocate whose complaint against Facebook brought down the Privacy Shield’s 15-year-old predecessor agreement is already questioning the new deal’s validity.“With all due respect ... a couple of letters by the outgoing Obama administration is by no means a legal basis to guarantee the fundamental rights of 500 million European users in the long run, when there is explicit U.S. law allowing mass surveillance,” Max Schrems of Austria said in a statement Tuesday.The United States has been fighting against the perception that it tramples on civil liberties after ex-National Security Agency contractor Edward Snowden revealed the breadth of the agency’s snooping.One sticking point in the Privacy Shield negotiations was over the scope of an exception allowing surveillance for national security purposes.
  • In announcing the deal, Commission officials insisted that the U.S. had provided “detailed written assurances” that surveillance of Europeans’ data by intelligence agencies would be subject to appropriate limitations.“The U.S. has clarified that they do not carry out indiscriminate surveillance of Europeans,” Andrus Ansip, Vice President for the Digital Single Market on the European Commission, said Tuesday.The U.S. has also agreed to create an office in the State Department, to address complaints from EU citizens who feel their data has been inappropriately accessed by intelligence authorities.Complicating the working group’s approval of the deal is the hodgepodge of competing regulators in Europe. Each nation has an agency in charge of its own country’s regulation. Some countries — such as Germany — are seen as tougher on privacy than others, like France or the U.K.While some countries consider U.S. privacy protections to be satisfactory, in others they are seen as woefully inadequate.
  • ...2 more annotations...
  • Defenders of U.S. intelligence practices often point to France and the U.K., arguing they are equally intrusive with their citizens' data.A recent public report “pretty clearly documented that the protections are patchy, vary hugely and are nonexistent in some of the countries,” Foster noted.Privacy advocates dismiss those arguments.“You cannot pick the worst member state, like the U.K., and claim you are ‘equivalent’ to that,” Schrems said Tuesday. “First, this is not a price [sic] you want to win, secondly you have to meet the standards of the European Court of Justice, EU law and the EU Charter of Fundamental Rights — not the standard of the worst member state.”The U.S. has made significant reforms to federal spying powers under the Obama administration.The Privacy and Civil Liberties Oversight Board — a small bipartisan watchdog — on Friday said the government has begun addressing each of the nearly two-dozen recommendations it made following Snowden's revelations.“[I]mportant measures have been taken to enhance the protection of Americans’ privacy and civil liberties and to strengthen the transparency of the government’s surveillance efforts, without jeopardizing our counterterrorism efforts,” the five-member board said.
  • But whether European countries believe those changes are sufficient to sign off on the Privacy Shield is uncertain. Each of the EU’s 28 member states must approve the deal before it can be finalized.“A lot of this is going to come down to whether the data protection authorities are persuaded by the U.S.’s portrayal of the cumulative protections given to European citizens and the cumulative carving back on the NSA surveillance programs,” Foster said.If the European working group is not satisfied with the assurances from the Commerce Department, the consequences could be dire. Businesses fear a chilling of transatlantic trade, valued at $1 trillion in 2014.The most likely outcome, experts say, would be a patchwork of country-to-country regulations that would make it extremely expensive for companies to comply.Legislative changes in the U.S. seem unlikely. Congress is close to passing a privacy law considered crucial to getting seeing the Privacy Shield approved. But the bill — which gives EU citizens the right to sue in U.S. courts over the misuse of personal data — has sparked controversy on Capitol Hill.Some lawmakers are expressing frustration that the EU has used the threat of enforcement action against U.S. companies to push Congress to make more concessions.“It’s been hard enough to get the Judicial Redress Act passed — if they’re going to make more demands on Congress, there won’t be a lot of willing listeners here,” Sen. Chris Murphy (D-Conn.) told The Hill on Thursday.
Paul Merrell

White House defends 'Cuban Twitter' to stir unrest - Yahoo News - 0 views

  • The Obama administration defended its creation of a Twitter-like Cuban communications network to undermine the communist government, declaring the secret program was "invested and debated" by Congress and wasn't a covert operation that required White House approval.
  • But two senior Democrats on congressional intelligence and judiciary committees said Thursday they had known nothing about the effort, which one of them described as "dumb, dumb, dumb." A showdown with that senator's panel is expected next week, and the Republican chairman of a House oversight subcommittee said that it, too, would look into the program.An Associated Press investigation found that the network was built with secret shell companies and financed through a foreign bank. The project, which lasted more than two years and drew tens of thousands of subscribers, sought to evade Cuba's stranglehold on the Internet with a primitive social media platform.First, the network was to build a Cuban audience, mostly young people. Then, the plan was to push them toward dissent.
  • Yet its users were neither aware it was created by a U.S. agency with ties to the State Department, nor that American contractors were gathering personal data about them, in the hope that the information might be used someday for political purposes.It is unclear whether the scheme was legal under U.S. law, which requires written authorization of covert action by the president as well as congressional notification. White House spokesman Jay Carney said he was not aware of individuals in the White House who had known about the program.
  • ...9 more annotations...
  • USAID's top official, Rajiv Shah, is scheduled to testify on Tuesday before the Senate Appropriations State Department and Foreign Operations Subcommittee, on the agency's budget. The subcommittee's chairman, Patrick Leahy, a Democrat, is the senator who called the project "dumb, dumb, dumb" during an appearance Thursday on MSNBC.The administration said early Thursday that it had disclosed the initiative to Congress — Carney said the program had been "debated in Congress" — but hours later the narrative had shifted to say that the administration had offered to discuss funding for it with the congressional committees that approve federal programs and budgets."We also offered to brief our appropriators and our authorizers," said State Department spokeswoman Marie Harf. She added that she was hearing on Capitol Hill that many people support these kinds of democracy promotion programs. And some lawmakers did speak up on that subject. But by late Thursday no members of Congress had acknowledged being aware of the Cuban Twitter program earlier than this week.
  • Harf described the program as "discreet" but said it was in no way classified or covert. Harf also said the project, dubbed ZunZuneo, did not rise to a level that required the secretary of state to be notified. Neither former Secretary of State Hillary Rodham Clinton nor John Kerry, the current occupant of the office, was aware of ZunZuneo, she said.In his prior position as chairman of the Senate Foreign Relations Committee, Kerry had asked congressional investigators to examine whether or not U.S. democracy promotion programs in Cuba were operated according to U.S. laws, among other issues. The resulting report, released by the Government Accountability Office in January 2013, does not examine whether or not the programs were covert. It does not say that any U.S. laws were broken.The GAO report does not specifically refer to ZunZuneo, but does note that USAID programs included "support for the development of independent social networking platforms."
  • "I know they said we were notified," Leahy told AP. "We were notified in the most oblique way, that nobody could understand it. I'm going to ask two basic questions: Why weren't we specifically told about this if you're asking us for money? And secondly, whose bright idea was this anyway?"The Republican chairman of a House oversight subcommittee said his panel will be looking into the project, too."That is not what USAID should be doing," said Rep. Jason Chaffetz, the Republican chairman of the House Oversight and Government Reform National Security Subcommittee. "USAID is flying the American flag and should be recognized around the globe as an honest broker of doing good. If they start participating in covert, subversive activities, the credibility of the United States is diminished."
  • At minimum, details uncovered by the AP appear to muddy the USAID's longstanding claims that it does not conduct covert actions, and the details could undermine the agency's mission to deliver aid to the world's poor and vulnerable — an effort that requires the trust and cooperation of foreign governments.Leahy and Rep. C.A. Dutch Ruppersberger, the top Democrat on the House Intelligence Committee, said they were unaware of ZunZuneo.
  • USAID and its contractors went to extensive lengths to conceal Washington's ties to the project, according to interviews and documents obtained by the AP. They set up front companies in Spain and the Cayman Islands to hide the money trail, and recruited CEOs without telling them they would be working on a U.S. taxpayer-funded project."There will be absolutely no mention of United States government involvement," according to a 2010 memo from Mobile Accord Inc., one of the project's creators. "This is absolutely crucial for the long-term success of the service and to ensure the success of the Mission."ZunZuneo was publicly launched shortly after the 2009 arrest in Cuba of American contractor Alan Gross. He was imprisoned after traveling repeatedly to the country on a separate, clandestine USAID mission to expand Internet access using sensitive technology that only governments use.The AP obtained more than 1,000 pages of documents about the ZunZuneo project's development. It independently verified the project's scope and details in the documents through publicly available databases, government sources and interviews with those involved.
  • The social media project began after Washington-based Creative Associates International obtained a half-million Cuban cellphone numbers. It was unclear to the AP how the numbers were obtained, although documents indicate they were done so illicitly from a key source inside the country's state-run provider. Project organizers used those numbers to start a subscriber base.ZunZuneo's organizers wanted the social network to grow slowly to avoid detection by the Cuban government. Eventually, documents and interviews reveal, they hoped the network would reach critical mass so that dissidents could organize "smart mobs" — mass gatherings called at a moment's notice — that could trigger political demonstrations, or "renegotiate the balance of power between the state and society."At a 2011 speech at George Washington University, Clinton said the U.S. helps people in "oppressive Internet environments get around filters." Noting Tunisia's role in the Arab Spring, she said people used technology to help "fuel a movement that led to revolutionary change."Suzanne Hall, then a State Department official working on Clinton's social media efforts, helped spearhead an attempt to get Twitter founder Jack Dorsey to take over the ZunZuneo project, documents indicate. Dorsey declined to comment.
  • The estimated $1.6 million spent on ZunZuneo was publicly earmarked for an unspecified project in Pakistan, public government data show, but those documents don't reveal where the funds were actually spent.ZunZuneo's organizers worked hard to create a network that looked like a legitimate business, including the creation of a companion website — and marketing campaign — so users could subscribe and send their own text messages to groups of their choice."Mock ad banners will give it the appearance of a commercial enterprise," one written proposal obtained by the AP said. Behind the scenes, ZunZuneo's computers were also storing and analyzing subscribers' messages and other demographic information, including gender, age, "receptiveness" and "political tendencies." USAID believed the demographics on dissent could help it target its other Cuba programs and "maximize our possibilities to extend our reach."
  • Executives set up a corporation in Spain and an operating company in the Cayman Islands — a well-known British offshore tax haven — to pay the company's bills so the "money trail will not trace back to America," a strategy memo said. Disclosure of that connection would have been a catastrophic blow, they concluded, because it would undermine the service's credibility with subscribers and get it shut down by the Cuban government.Similarly, subscribers' messages were funneled through two other countries — and never through American-based computer servers.Denver-based Mobile Accord considered at least a dozen candidates to head the European front company. One candidate, Francoise de Valera, told the AP she was told nothing about Cuba or U.S. involvement.
  • James Eberhard, Mobile Accord's CEO and a key player in the project's development, declined to comment. Creative Associates referred questions to USAID.For more than two years, ZunZuneo grew, reaching at least 40,000 subscribers. But documents reveal the team found evidence Cuban officials tried to trace the text messages and break into the ZunZuneo system. USAID told the AP that ZunZuneo stopped in September 2012 when a government grant ended.
  •  
    More coming related to this story.
Paul Merrell

The U.S. Has REPEATEDLY Defaulted | Washington's Blog - 2 views

  • It’s a Myth that the U.S. Has Never Defaulted On Its Debt Some people argue that countries can’t default.  But that’s false. It is widely stated that the U.S. government has never defaulted.  However, that is also a myth.
  •  
    Excellent article Paul! But it left me in tears. The bastardos are destroying the currency. Quick Count of The U.S. defaulting on its debt obligations: ... Continental Currency in 1779 ... Domestic debt between 1782 through 1790 ... Greenbacks in 1862 ... Liberty Bonds in 1934 ... 1933 Dollar to GOLD devaluation (1/35 th per ounce) ... 1971 Nixon ends GOLD backing of dollar, violating the terms of the Bretton Woods Agreement ... 1979 Treasury defaults, refusing to redeem maturing treasury bonds The only thing keeping the American Economy going is the massive rush to convert the fiat currency the Federal Reserve is churning out into hard assets; like land and corporate stock. In 2008 the Federal Reserve Bankster Cartel pumped $29 Trillion into the world banking system. They continue to pump $85 Billion per month into Bankster financial markets, buying up bad mortgage paper and backstopping the many insured derivatives scams now unwinding. The Banksters were bust in 2008, but are now flush with more dollars than anyone knows what to do with. Instead of "loaning" this money out, and investing in traditional business productivity, they use the freshly minted dollars to purchase hard assets. Business loans would provide profit based on interest - a gambit that requires confidence in the value of the dollar since the dollar is the measure of the economic reward. The purchase of hard assets is different. The "value" is not in the profitability of the investment, as measured in fiat currency. The value is in hard asset and any future economic power that asset holds through the expected currency crash. The only mystery here is that of military might. How do the banksters and global elites protect their assets in the future collapse they have made certain? Oh wait - private security companies capable of waging war. It's no accident that the early geopolitical energy wars of the 21st century saw a massive buildup of private corporate military and i
Paul Merrell

NSA Whistleblower: Snowden Never Had Access to the "Juiciest" Intelligence Documents | ... - 0 views

  • NSA whistleblower Russel Tice was a key source in the 2005 New York Times report that blew the lid off the Bush administration’s use of warrantless wiretapping. Tice told PBS and other media that the NSA is spying on – and blackmailing – top government officials and military officers, including Supreme Court Justices, highly-ranked generals, Colin Powell and other State Department personnel, and many other top officials:
  • He says the NSA started spying on President Obama when he was a candidate for Senate:
  • Many of Tice’s allegations have been confirmed by other government whistleblowers. And see this. Washington’s Blog called Tice to find out more about what he saw when he was at NSA.
  • ...8 more annotations...
  • NSA Has Hidden Its Most Radical Surveillance Operations … Even from People Like Snowden Who Had General “Code Word” Clearance WASHINGTON’S BLOG: Glenn Greenwald – supposedly, in the next couple of days or weeks – is going to disclose, based on NSA documents leaked by Snowden, that the NSA is spying on all sorts of normal Americans … and that the spying is really to crush dissent.  [Background here, here and here.] Does Snowden even have documents which contain the information which you’ve seen? RUSSELL TICE:  The answer is no. WASHINGTON’S BLOG: So you saw handwritten notes. And what Snowden was seeing were electronic files …?
  • RUSSELL TICE: Think of it this way.  Remember I told you about the NSA doing everything they could to make sure that the information from 40 years ago – from spying on Frank Church and Lord knows how many other Congressman that they were spying on – was hidden? Now do you think they’re going to put that information into Powerpoint slides that are easy to explain to everybody what they’re doing? They would not even put their own NSA designators on the reports [so that no one would know that] it came from the NSA.  They made the reports look like they were Humint (human intelligence) reports.  They did it to hide the fact that they were NSA and they were doing the collection. That’s 40 years ago.  [The NSA and other agencies are still doing "parallel construction", "laundering" information to hide the fact that the information is actually from mass NSA surveillance.] Now, what NSA is doing right now is that they’re taking the information and they’re putting it in a much higher security level.  It’s called “ECI” - Exceptionally Controlled Information  – and it’s called the black program … which I was a specialist in, by the way. I specialized in black world – DOD and IC (Intelligence Community) – programs, operations and missions … in “VRKs”, “ECIs”, and “SAPs”, “STOs”. SAP equals Special Access Program. It’s highly unlikely Mr. Snowden had any access to these. STO equals Special Technical Operations  It’s highly unlikely Mr. Snowden had any access to these.
  • Now in that world – the ECI/VRK world – everything in that system is classified at a higher level and it has its own computer systems that house it.  It’s totally separate than the system which Mr. Snowden was privy to, which was called the “JWICS”: Joint Worldwide Intelligence Communications System.  The JWICS system is what everybody at NSA has access to.  Mr Snowden had Sys Admin [systems administrator] authority for the JWICS. And you still have to have TS/SCI clearance [i.e. Top Secret/ Sensitive Compartmented Information - also known as “code word” - clearance] to get on the JWICS. But the ECI/VRK systems are much higher [levels of special compartmentalized clearance] than the JWICS. And you have to be in the black world to get that [clearance]. ECI = Exceptionally Controlled Information. I do not believe Mr. Snowden had any access to these ECI controlled networks). VRK = Very Restricted Knowledge. I do not believe Mr. Snowden had any access to these VRK controlled networks. These programs typically have, at the least, a requirement of 100 year or until death, ’till the person first being “read in” [i.e. sworn to secrecy as part of access to the higher classification program] can talk about them.  [As an interesting sidenote, the Washington Times reported in 2006 that – when Tice offered to testify to Congress about this illegal spying – he was informed by the NSA that the Senate and House intelligence committees were not cleared to hear such information.]
  • It’s very compartmentalized and – even with stuff that they had – you might have something at NSA, that there’s literally 40 people at NSA that know that it’s going on in the entire agency. When the stuff came out in the New York Times [the first big spying story, which broke in 2005] – and I was a source of information for the New York Times –   that’s when President Bush made up that nonsense about the “terrorist surveillance program.” By the way, that never existed. That was made up. There was no such thing beforehand. It was made up … to try to placate the American people. The NSA IG (Inspector General) – who was not cleared for this – all of a sudden is told he has to do an investigation on this; something he has no information or knowledge of. So what they did, is they took a few documents and they downgraded [he classification level of the documents] – just a few – and gave them to them to placate this basic whitewash investigation.
  • Snowden’s Failure To Understand the Most Important Documents RUSSELL TICE: Now, if Mr. Snowden were to find the crossover, it would be those documents that were downgraded to the NSA’s IG. The stuff that I saw looked like a bunch of alphanumeric gobbledygook.  Unless you have an analyst to know what to look for – and believe me, I think that what Snowden’s done is great – he’s not an intelligence analyst.  So he would see something like that, and he wouldn’t know what he’s looking at. But that would be “the jewels”. And the key is, you wouldn’t know it’s the jewels unless you were a diamond miner and you knew what to look for. Because otherwise, there’s a big lump of rock and you don’t know there’s a diamond in there. I worked special programs. And the way I found out is that I was working on a special operation, and I needed information from NSA … from another unit. And when I went to that unit and I said “I need this information”, and I dealt with [satellite spy operations], and I did that in the black world. I was a special operations officer. I would literally go do special missions that were in the black world where I would travel overseas and do spooky stuff.
  • Cheney Was Running the Show WASHINGTON’S BLOG: You said in one of your interviews that Dick Cheney ordered the intercepts that you found in the burn bags [the bags of documents which were slated to be destroyed because they were so sensitive]. Is that right … and if so, how do you know that? RUSSELL TICE: I did not know one way or the other until I talked to a very senior person at NSA who – much later – wanted to have a meeting with me. And we had a covert, clandestine style meeting. And that’s when this individual told me that the whole thing was being directed and was coming from the vice president’s office … Cheney, through his lawyer David Addington. WASHINGTON’S BLOG:  It sounds like it wasn’t going through normal routes?  It’s not like Cheney or Addington made formal requests to the NSA … through normal means? RUSSELL TICE: No, not normal at all. All on the sly … all “sneaky pete” under the table, in the evening when most NSA employees are gone for the day. This is all being done in the evenings … between like 7 [at night] and midnight.
  • NSA Is Spying On CONTENT as Well as Metadata WASHINGTON’S BLOG: And from what you and others have said, it’s content as well as metadata? RUSSELL TICE: Of course it is. Of course. [Background. But see this.] NSA Spying On Journalists, Congress, Admirals, Lawyers … RUSSELL TICE: In 2009, I told [reporters] that they were going after journalists and news organizations and reporters and such. I never read text of Congressman’s conversations. What I had was information – sometimes hand-written – of phone numbers of Congressmen, their wives, their children, their staffers, their home numbers, their cellphone numbers, their phone numbers of their residence back in Oregon or whatever state they’re from, and their little offices back in their state. Or an Admiral and his wife, and his kids and his staffers …
  • The main thing I saw more than anything else were lawyers and law firms. I saw more lawyers or law firms being wiretapped than anything else. These are the phone numbers I saw written. And then I would see those numbers incorporated into those lists with the columns of information about the phone number, and the serial number and the banks of recorders and digital converters and the data storage devices. I could see handwritten phone numbers and notes, sometimes with names, sometimes not.
  •  
    Whistleblower Russell Tice says that there are super-classified domestic surveillance records that Edward Snowden, Congressional oversight committees, and the NSA Inspector-General did not have access to. Must-read.
Paul Merrell

M of A - Nusra On The Run - Trump Induces First Major Policy Change On Syria - 0 views

  • The first significant step of the new administration comes while Trump is not even in offices. Obama, selfishly concerned with his historic legacy, suddenly makes a 180 degree turn and starts to implement Trump polices. Lets consider the initial position: Asked about Aleppo in an October debate with Clinton, Trump said it was a humanitarian disaster but the city had "basically" fallen. Clinton, he said, was talking in favor of rebels without knowing who they were. The rebels fighting Assad in western Syria include nationalists fighting under the Free Syrian Army banner, some of them trained in a CIA-backed program, and jihadists such as the group formerly known as the al Qaeda-linked Nusra Front. The Obama administration, through the CIA led by Saudi asset John Brennan, fed weapons, training and billions of dollars to "moderate rebels". These then turned around (vid) and either gave the CIA gifts to al-Qaeda in Syria (aka Jabhat al Nusra) or joined it themselves. The scheme was no secret at all and Russia as well as Syria pointed this out several times. The Russian foreign Minister Lavrov negotiated with the U.S. Secretary of State Kerry who promised to separate the "moderate rebels" from al-Qaeda. But Kerry never delivered. Instead he falsely accuse Russia of committing atrocities that never happened. The CIA kept the upper hand within the Obama administration and continued its nefarious plans. That changed the day the president-elect Trump set foot into the White House. While Obama met Trump in the oval office, new policies, prepared beforehand, were launched. The policies were held back until after the election and would likely not have been revealed or implemented if Clinton had won.
  • The U.S. declared that from now on it will fight against al-Qaeda in Syria: President Obama has ordered the Pentagon to find and kill the leaders of an al-Qaeda-linked group in Syria that the administration had largely ignored until now and that has been at the vanguard of the fight against the Syrian government, U.S. officials said. That shift is likely to accelerate once President-elect Donald Trump takes office. ... possibly in direct cooperation with Moscow. ...U.S. officials who opposed the decision to go after al-Nusra’s wider leadership warned that the United States would effectively be doing the Assad government's bidding by weakening a group on the front line of the counter-Assad fight. ... Defense Secretary Ashton B. Carter and other Pentagon leaders initially resisted the idea of devoting more Pentagon surveillance aircraft and armed drones against al-Nusra.
  • Ash Carter is, together with John Brennan, the major anti-Russian force in the Obama administration. He is a U.S. weapon industry promoter and the anti-Russia campaign, which helps to sell U.S. weapons to NATO allies in Europe, is largely of his doing. He saw al-Qaeda in Syria as a welcome proxy force against Russia. But Obama has now shut down that policy. We are not yet sure that this is for good but the above Washington Post account is not the only signal: The U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) took action today to disrupt al-Nusrah Front’s military, recruitment, and financing operations. Specifically, OFAC designated four key al-Nusrah Front leaders – Abdallah Muhammad Bin-Sulayman al-Muhaysini, Jamal Husayn Zayniyah, Abdul Jashari, and Ashraf Ahmad Fari al-Allak – pursuant to Executive Order (E.O.) 13224, which targets terrorists and those providing support to terrorists or acts of terrorism. ... These designations were taken in coordination with the U.S. Department of State, which today named Jabhat Fath al Sham as an alias of al-Nusrah Front – al-Qa’ida’s affiliate in Syria. ... Abdallah Muhammad Bin-Sulayman al-Muhaysini was designated for acting for or on behalf of, and providing support and services to or in support of, al-Nusrah Front. This is a major change in U.S. policy. Nusra will from now on be on the run not only from Russian and Syrian attacks but also from the intelligence and military capabilities of the United States. The newly designated Al-Muhaysini, a Saudi cleric, is Nusra's chief ideologue in Syria. Some considered him the new Osama Bin-Laden.
  • ...2 more annotations...
  • Hadi Abdullah, friend of the designated al-Qaeda terrorist Muhaysini, just received the 2016 Press Freedom Price from the CIA/Soros financed "regime change" influence operation Reporters Without Borders. Might this mean that Hadi Abdullah is himself a CIA assets? He would not be the first such "journalist" in Syria. Obama, obviously as a direct consequence of the Trump election, now ordered the Pentagon to wage war on al-Qaeda in Syria just as the Russians do. This after five years of nearly unlimited U.S. support for al-Qaeda and its "moderate" Syrian affiliates. It is not yet know what new orders, if any, Obama gave to the CIA. Will the CIA follow these policies or will it (again) try to counter the Pentagon policies in Syria? It is unusual that the WaPo report above about this new direction includes no commenting voice from the CIA. Why is such missing? Russia and Syria will welcome the new Obama policies should they come to fruit on the ground. Hillary Clinton had planned and announced to widen the conflict in Syria and with Russia and Iran. Obama would surely not have acted against such policies if she had been elected. But with Trump winning and thereby a new policy on the horizon he now changed course to a direction that will provide "continuity" when Trump takes over. Not only is Trump kicking a black family out of its longtime limewashed home, he also ends U.S. government support for the disenfranchised Jihadis in Syria and elsewhere. This even months before taking office. He really is the menace we have all been warned about.
  • UPDATE: This interview in today's WSJ confirms that Trump is still in the pro-Syrian/anti-Jihadist camp that is opposed to Obama's original policy: Donald Trump, in Exclusive Interview, Tells WSJ He Is Willing to Keep Parts of Obama Health Law He said he got a “beautiful” letter from Russian President Vladimir Putin, adding that a phone call between them is scheduled shortly. ... Although he wasn’t specific, Mr. Trump suggested a shift away from what he said was the current Obama administration policy of attempting to find moderate Syrian opposition groups to support in the civil war there. “I’ve had an opposite view of many people regarding Syria,” he said. He suggested a sharper focus on fighting Islamic State, or ISIS, in Syria, rather than on ousting Syrian President Bashar al-Assad. “My attitude was you’re fighting Syria, Syria is fighting ISIS, and you have to get rid of ISIS. Russia is now totally aligned with Syria, and now you have Iran, which is becoming powerful, because of us, is aligned with Syria. … Now we’re backing rebels against Syria, and we have no idea who these people are.” If the U.S. attacks Mr. Assad, Mr. Trump said, “we end up fighting Russia, fighting Syria.”
  •  
    I think b has it right here; this is Trump impact on U.S. foreign policy. And the fact the Trump is going full bore on al Nurah and ISIL suggests that Trump is not so strongly pro-Israel as he's been made out to be. (Israel's right-wing leadership has been very strongly anti-Assad.)
Gary Edwards

ThisNation.com--The United States Constitution - 0 views

  •  
    The most significant features of the U.S. Constitution are the establishment of the rule of law, the creation of a federal system with a supreme national government, the separation of governmental powers into three branches that check and balance each other, its flexibility and the establishment of a republican form of government.
Paul Merrell

Senate Foreign Relations Committee Approves ISIL AUMF and Sunset of 2001 AUMF | Just Se... - 0 views

  • On Thursday, the Senate Foreign Relations Committee approved a draft authorization for the use of military force (AUMF) against ISIL (full text) by a margin of 10-8 along party lines. The text also includes an amendment that would sunset the 2001 AUMF in three-years. Most of today’s news headlines will be focused on the authorization to fight ISIL—and we will have plenty of discussion about it at Just Security. But the sunset of the 2001 AUMF is highly significant in its own right – and it should be welcome news to a wide range of national security law experts across the political spectrum, as Jack Goldsmith, Steve Vladeck, and I discussed in an  Op-Ed in the Washington Post. (Indeed, a sunset of the 2001 AUMF is endorsed by the Principles for drafting an ISIL AUMF published at Just Security and a proposed AUMF published at Lawfare.)
  • The action on the 2001 sunset was a bit of a surprise because  Sen. Menendez’s draft ISIL AUMF did not originally include a provision to sunset the 2001 AUMF. Nor did Sen. Tim Kaine’s similar draft AUMF. Both Senators Menendez and Kaine, however, spoke strongly in favor of the amendment today (and I applaud them for that). The action on the 2001 AUMF is significant as a potential turning point in the armed conflict with Al Qaeda. In his National Defense University speech in May 2013, President Obama called for refining and eventually repealing the 2001 AUMF when conditions permit. He stated: “I look forward to engaging Congress and the American people in efforts to refine, and ultimately repeal, the [2001] AUMF’s mandate.” Placing a sunset on the 2001 AUMF has been a key plank in Harold Koh’s position, in testimony and in Just Security posts (here and here), outlining how the President can bring an eventual end to the “Forever War.” Another part of that roadmap includes disengaging from Afghanistan. It is notable that today’s decision on the 2001 sunset also comes on the heels of yesterday’s news of the closure of the detention facility at the Bagram Airfield in Afghanistan. At least these aspects of the armed conflict with Al Qaeda and the Taliban may be winding down or narrowing, albeit while the conflict with ISIL heats up.
  • Increase transparency. Neither Congress nor the American public has a clear idea whom the United States is fighting or where, especially when it comes to forces associated with al-Qaeda. Any new AUMF should require the president to identify the groups against which force is used, along with related details, regularly in a report to Congress and, unless strictly required by national security, the American people. The president should also share with Congress, and the public to the extent possible, the administration’s legal rationales for using force. Such transparency rules should also be imposed on the 2001 AUMF … Congress should also consider imposing these transparency requirements on uses of force against terrorists under the president’s Article II powers. 3) Geographic limits on ISIL AUMF Sen. Rand Paul proposed an amendment to limit the ISIL AUMF so that the authorization to use force does not apply “outside of the geographic boundaries of Iraq and Syria.” He explained that if ISIL moves some of its forces outside of Iraq and Syria, the administration could return to Congress for additional authorities. That amendment was defeated in a separate vote. With a group of seven other national security law experts, I have supported geographic limits on an ISIL AUMF, but not as restrictive as the limits that Sen. Paul proposes. Our set of Principles recommend Congress to authorize force in Iraq and Syria as well as “any other locations from which ISIL forces actively plan and/or launch attacks against the United States or Iraq.” As Sen. Paul noted, a recent study found that 60 percent of congressional force authorizations have contained geographic limitations.
  • ...2 more annotations...
  • Three points deserve special mention: 1) A caveat: “revise” not “repeal” Senators who spoke during the Committee’s meeting in favor of the amendment to sunset the 2001 AUMF did not describe the provision as an opportunity to repeal the AUMF but to “refine,” “reevaluate,” or reconsider it three years from now. 2. A missed opportunity for transparency? The ISIL AUMF includes a robust set of transparency and reporting requirements. This is good news. But, while we are in the business of applying such reporting requirements to the fight with ISIL, what’s the possible justification for not applying them to the fight with Al-Qaeda as well? As Jack Goldsmith, Steve Vladeck and I wrote in our Op-Ed (emphasis added):
  • Although Congress will likely not vote on today’s initiative before the end of the current term, there is no mistaking today’s historically significant moment with respect to both the limit on the 2001 AUMF and the authority to use force against ISIL more broadly. Today’s approval of the draft ISIL AUMF places an important marker for discussions in the 114th Congress.
Paul Merrell

Exclusive: Major nations hold talks on ending U.N. sanctions on Iran - officials | Reuters - 0 views

  • (Reuters) - Major world powers have begun talks about a United Nations Security Council resolution to lift U.N. sanctions on Iran if a nuclear agreement is struck with Tehran, a step that could make it harder for the U.S. Congress to undo a deal, Western officials said. The talks between Britain, China, France, Russia and the United States — the five permanent members of the Security Council — plus Germany and Iran, are taking place ahead of difficult negotiations that resume next week over constricting Iran's nuclear ability.Some eight U.N. resolutions - four of them imposing sanctions - ban Iran from uranium enrichment and other sensitive atomic work and bar it from buying and selling atomic technology and anything linked to ballistic missiles. There is also a U.N. arms embargo.Iran sees their removal as crucial as U.N. measures are a legal basis for more stringent U.S. and European Union measures to be enforced. The U.S. and EU often cite violations of the U.N. ban on enrichment and other sensitive nuclear work as justification for imposing additional penalties on Iran.
  • U.S. Secretary of State John Kerry told Congress on Wednesday that an Iran nuclear deal would not be legally binding, meaning future U.S. presidents could decide not to implement it. That point was emphasized in an open letter by 47 Republican senators sent on Monday to Iran's leaders asserting any deal could be discarded once President Barack Obama leaves office in January 2017.But a Security Council resolution on a nuclear deal with Iran could be legally binding, say Western diplomatic officials. That could complicate and possibly undercut future attempts by Republicans in Washington to unravel an agreement.Iran and the six powers are aiming to complete the framework of a nuclear deal by the end of March, and achieve a full agreement by June 30, to curb Iran's most sensitive nuclear activities for at least 10 years in exchange for a gradual end to all sanctions on the Islamic Republic.So far, those talks have focused on separate U.S. and European Union sanctions on Iran's energy and financial sectors, which Tehran desperately wants removed. The sanctions question is a sticking point in the talks that resume next week in Lausanne, Switzerland, between Iran and the six powers.
  • But Western officials involved in the negotiations said they are also discussing elements to include in a draft resolution for the 15-nation Security Council to begin easing U.N. nuclear-related sanctions that have been in place since December 2006."If there's a nuclear deal, and that's still a big 'if', we'll want to move quickly on the U.N. sanctions issue," an official said, requesting anonymity.The negotiations are taking place at senior foreign ministry level at the six powers and Iran, and not at the United Nations in New York.
  • ...3 more annotations...
  • A senior U.S. administration official confirmed that the discussions were underway.The official said that the Security Council had mandated the negotiations over the U.N. sanctions and therefore has to be involved. The core role in negotiations with Iran that was being played by the five permanent members meant that any understanding over U.N. sanctions would likely get endorsed by the full council, the official added.Iran rejects Western allegations it is seeking a nuclear weapons capability.Officials said a U.N. resolution could help protect any nuclear deal against attempts by Republicans in U.S. Congress to sabotage it. Since violation of U.N. demands that Iran halt enrichment provide a legal basis for sanctioning Tehran, a new resolution could make new sanction moves difficult."There is an interesting question about whether, if the Security Council endorses the deal, that stops Congress undermining the deal," a Western diplomat said.
  • Other Western officials said Republicans might be deterred from undermining any deal if the Security Council unanimously endorses it and demonstrates that the world is united in favor of a diplomatic solution to the 12-year nuclear standoff.Concerns that Republican-controlled Congress might try to derail a nuclear agreement have been fueled by the letter to Iran's leaders and a Republican invitation to Israeli Prime Minister Benjamin Netanyahu to address Congress in a March 3 speech that railed against a nuclear deal with Iran.The officials emphasized that ending all sanctions would be contingent on compliance with the terms of any deal. They added that the International Atomic Energy Agency, the Vienna-based nuclear watchdog, will play a key role in verifying Iran's compliance with any agreement.
  • Among questions facing negotiators as they seek to prepare a resolution for the Security Council is the timing and speed of lifting U.N. nuclear sanctions, including whether to present it in March if a political framework agreement is signed next week or to delay until a final deal is reached by the end-June target.
  •  
    Soundslike it's official. U.N. Security Council Resolution is the chosen route past the Israel Firsters in Congress. But notice that Reuters is saying that "Republicans" in Congress are the barrier. Is that a sign that Repubswill be painted as the bad guys here? As in Israel's wants are now a partisan issue? It's factually incorrect. Plenty of Democrats also bow toward AIPAC headquarters  five times a day while praying for Zionist campaign contributions. 
Paul Merrell

Exxon Knew Everything There Was to Know About Climate Change by the Mid-1980s-and Denie... - 0 views

  • A few weeks before the last great international climate conference—2009, in Copenhagen—the e-mail accounts of a few climate scientists were hacked and reviewed for incriminating evidence suggesting that global warming was a charade. Eight separate investigations later concluded that there was literally nothing to “Climategate,” save a few sentences taken completely out of context—but by that time, endless, breathless media accounts about the “scandal” had damaged the prospects for any progress at the conference. Ad Policy Now, on the eve of the next global gathering in Paris this December, there’s a new scandal. But this one doesn’t come from an anonymous hacker taking a few sentences out of context. This one comes from months of careful reporting by two separate teams, one at the Pulitzer Prize–winning website Inside Climate News, and the other at the Los Angeles Times (with an assist from the Columbia Journalism School). Following separate lines of evidence and document trails, they’ve reached the same bombshell conclusion: ExxonMobil, the world’s largest and most powerful oil company, knew everything there was to know about climate change by the mid-1980s, and then spent the next few decades systematically funding climate denial and lying about the state of the science.
  •  
    Check out the links to the major article series for much more in-depth coverage.
Paul Merrell

Senate narrowly rejects new FBI surveillance | TheHill - 0 views

  • The Senate narrowly rejected expanding the FBI's surveillance powers Wednesday in the wake of the worst mass shooting in U.S. history.  Senators voted 58-38 on a procedural hurdle, with 60 votes needed to move forward. Majority Leader Mitch McConnellMitch McConnellOvernight Finance: Wall Street awaits Brexit result | Clinton touts biz support | New threat to Puerto Rico bill? | Dodd, Frank hit back The Trail 2016: Berning embers McConnell quashes Senate effort on guns MORE, who initially voted "yes," switched his vote, which allows him to potentially bring the measure back up. 
  • The Senate GOP proposal—being offered as an amendment to the Commerce, Justice and Science appropriations bill—would allow the FBI to use "national security letters" to obtain people's internet browsing history and other information without a warrant during a terrorism or federal intelligence probe.  It would also permanently extend a Patriot Act provision — currently set to expire in 2019 — meant to monitor "lone wolf" extremists.  Senate Republicans said they would likely be able to get enough votes if McConnell schedules a redo.
  • Asked if he anticipates supporters will be able to get 60 votes, Sen. John CornynJohn CornynSenate to vote on two gun bills Senate Dems rip GOP on immigration ruling Post Orlando, hawks make a power play MORE (R-Texas) separately told reporters "that's certainly my expectation." McConnell urged support for the proposal earlier Wednesday, saying it would give the FBI to "connect the dots" in terrorist investigations.  "We can focus on defeating [the Islamic State in Iraq and Syria] or we can focus on partisan politics. Some of our colleagues many think this is all some game," he said. "I believe this is a serious moment that calls for serious solutions."  But Democrats—and some Republicans—raised concerns that the changes didn't go far enough to ensure Americans' privacy.  Sen. Ron WydenRon WydenPost Orlando, hawks make a power play Democrats seize spotlight with sit-in on guns Democrats stage sit-in on House floor to push for gun vote MORE (D-Ore.) blasted his colleagues for "hypocrisy" after a gunman killed 49 people and injured dozens more during the mass shooting in Orlando, Fla. "Due process ought to apply as it relates to guns, but due process wouldn't apply as it relates to the internet activity of millions of Americans," he said ahead of Wednesday's vote. "Supporters of this amendment...have suggested that Americans need to choose between protecting our security and protecting our constitutional right to privacy." 
  • ...1 more annotation...
  • The American Civil Liberties Union (ACLU) also came out in opposition the Senate GOP proposal on Tuesday, warning it would urge lawmakers to vote against it. 
  •  
    Too close for comfort and coming around the bernd again. 
Paul Merrell

NSA 'not interested in' Americans, privacy officer claims | TheHill - 0 views

  • The National Security Agency’s internal civil liberties watchdog insisted on Thursday that the agency has no interest in spying on Americans under its controversial spying tools. “Our employees are trained to not look for U.S. persons,” NSA privacy and civil liberties officer Rebecca Richards said on Thursday.
  • “We’re not interested in those U.S. persons. We’re trying to look away from those,” she added. “Instead, we’re looking for where are our targets?”Richards’s comments came up during a Capitol Hill panel discussion about a new report on U.S. spying from the Brennan Center for Justice.The analysis looks at aspects of a presidential order that dates back to Ronald Reagan and was updated by then-President George W. Bush, called Executive Order 12333.
  • Programs under the order, which is meant to guide foreign surveillance, “have implications for Americans’ privacy that could well be greater than those of their domestic counterparts,” the organization wrote in its analysis. “The vast majority of Americans — whether wittingly or not — engage in communication that is transmitted or stored overseas.”“This reality of the digital age renders Americans’ communications and data highly vulnerable to NSA surveillance abroad.”
  • ...2 more annotations...
  • NSA surveillance under Executive Order 12333 is separate from the agency’s higher profile bulk collection of Americans’ phone records, which ended last year. It also occurs under separate legal powers than a controversial provision of the 2008 update to the Foreign Intelligence Surveillance Act, which comes up for renewal at the end of 2017.The executive order targets foreigners, but can “incidentally” pick up data about Americans if their activity on the Internet crosses international borders, Richards acknowledged.“Our procedures are designed to say: There are occasions when you are going to get U.S. persons,” she said, “and when you get those U.S. persons, here’s the rules.”
  • Richards is the agency’s first ever civil liberties officer. She was hired in early 2014, on the heels of fallout from Edward Snowden’s leaks about the spy agency. 
  •  
    Not interested. Apparently that's why NSA was turning over raw search results to Israel without filtering out "U.S. persons" data. And why they just decided to give other agencies including law enforcement access to raw search results. And why Gen. Keith Alexander personally put together a program to ruin people's reputations including a "U.S. person." And why Russell Tice said that he personally had Obama's NSA dossier in his hands when Obama was running for the U.S. Senate. And why Tice says NSA had similar dossiers on members of Congress and the justices of the U.S. Supreme Court and targeted "lots of lawyers." On and on.  Ms. Richards appears to have become a quick study in NSA's hallmark skill of lying to the public. 
Paul Merrell

Profiled From Radio to Porn, British Spies Track Web Users' Online Identities | Global ... - 0 views

  • One system builds profiles showing people’s web browsing histories. Another analyzes instant messenger communications, emails, Skype calls, text messages, cell phone locations, and social media interactions. Separate programs were built to keep tabs on “suspicious” Google searches and usage of Google Maps. The surveillance is underpinned by an opaque legal regime that has authorized GCHQ to sift through huge archives of metadata about the private phone calls, emails and Internet browsing logs of Brits, Americans, and any other citizens  all without a court order or judicial warrant.
  • The power of KARMA POLICE was illustrated in 2009, when GCHQ launched a top-secret operation to collect intelligence about people using the Internet to listen to radio shows. The agency used a sample of nearly 7 million metadata records, gathered over a period of three months, to observe the listening habits of more than 200,000 people across 185 countries, including the U.S., the U.K., Ireland, Canada, Mexico, Spain, the Netherlands, France, and Germany.
  • GCHQ’s documents indicate that the plans for KARMA POLICE were drawn up between 2007 and 2008. The system was designed to provide the agency with “either (a) a web browsing profile for every visible user on the Internet, or (b) a user profile for every visible website on the Internet.” The origin of the surveillance system’s name is not discussed in the documents. But KARMA POLICE is also the name of a popular song released in 1997 by the Grammy Award-winning British band Radiohead, suggesting the spies may have been fans. A verse repeated throughout the hit song includes the lyric, “This is what you’ll get, when you mess with us.”
  • ...3 more annotations...
  • GCHQ vacuums up the website browsing histories using “probes” that tap into the international fiber-optic cables that transport Internet traffic across the world. A huge volume of the Internet data GCHQ collects flows directly into a massive repository named Black Hole, which is at the core of the agency’s online spying operations, storing raw logs of intercepted material before it has been subject to analysis. Black Hole contains data collected by GCHQ as part of bulk “unselected” surveillance, meaning it is not focused on particular “selected” targets and instead includes troves of data indiscriminately swept up about ordinary people’s online activities. Between August 2007 and March 2009, GCHQ documents say that Black Hole was used to store more than 1.1 trillion “events”  a term the agency uses to refer to metadata records  with about 10 billion new entries added every day. As of March 2009, the largest slice of data Black Hole held  41 percent  was about people’s Internet browsing histories. The rest included a combination of email and instant messenger records, details about search engine queries, information about social media activity, logs related to hacking operations, and data on people’s use of tools to browse the Internet anonymously.
  • Throughout this period, as smartphone sales started to boom, the frequency of people’s Internet use was steadily increasing. In tandem, British spies were working frantically to bolster their spying capabilities, with plans afoot to expand the size of Black Hole and other repositories to handle an avalanche of new data. By 2010, according to the documents, GCHQ was logging 30 billion metadata records per day. By 2012, collection had increased to 50 billion per day, and work was underway to double capacity to 100 billion. The agency was developing “unprecedented” techniques to perform what it called “population-scale” data mining, monitoring all communications across entire countries in an effort to detect patterns or behaviors deemed suspicious. It was creating what it saidwould be, by 2013, “the world’s biggest” surveillance engine “to run cyber operations and to access better, more valued data for customers to make a real world difference.” HERE WAS A SIMPLE AIM at the heart of the top-secret program: Record the website browsing habits of “every visible user on the Internet.” Before long, billions of digital records about ordinary people’s online activities were being stored every day. Among them were details cataloging visits to porn, social media and news websites, search engines, chat forums, and blogs.
  • The mass surveillance operation — code-named KARMA POLICE — was launched by British spies about seven years ago without any public debate or scrutiny. It was just one part of a giant global Internet spying apparatus built by the United Kingdom’s electronic eavesdropping agency, Government Communications Headquarters, or GCHQ. The revelations about the scope of the British agency’s surveillance are contained in documents obtained by The Intercept from National Security Agency whistleblower Edward Snowden. Previous reports based on the leaked files have exposed how GCHQ taps into Internet cables to monitor communications on a vast scale, but many details about what happens to the data after it has been vacuumed up have remained unclear.
« First ‹ Previous 61 - 80 of 119 Next › Last »
Showing 20 items per page