Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged tactics

Rss Feed Group items tagged

Paul Merrell

The Virtue of Subtlety: A U.S. Strategy Against the Islamic State - 0 views

  • U.S. strategy is sound. It is to allow the balance of power to play out, to come in only when it absolutely must — with overwhelming force, as in Kuwait — and to avoid intervention where it cannot succeed. The tactical application of strategy is the problem. In this case the tactic is not direct intervention by the United States, save as a satisfying gesture to avenge murdered Americans. But the solution rests in doing as little as possible and forcing regional powers into the fray, then in maintaining the balance of power in this coalition. Such an American strategy is not an avoidance of responsibility. It is the use of U.S. power to force a regional solution. Sometimes the best use of American power is to go to war. Far more often, the best use of U.S. power is to withhold it. The United States cannot evade responsibility in the region. But it is enormously unimaginative to assume that carrying out that responsibility is best achieved by direct intervention. Indirect intervention is frequently more efficient and more effective.
  • The United States cannot win the game of small mosaic tiles that is emerging in Syria and Iraq. An American intervention at this microscopic level can only fail. But the principle of balance of power does not mean that balance must be maintained directly. Turkey, Iran and Saudi Arabia have far more at stake in this than the United States. So long as they believe that the United States will attempt to control the situation, it is perfectly rational for them to back off and watch, or act in the margins, or even hinder the Americans. The United States must turn this from a balance of power between Syria and Iraq to a balance of power among this trio of regional powers. They have far more at stake and, absent the United States, they have no choice but to involve themselves. They cannot stand by and watch a chaos that could spread to them. It is impossible to forecast how the game is played out. What is important is that the game begins. The Turks do not trust the Iranians, and neither is comfortable with the Saudis. They will cooperate, compete, manipulate and betray, just as the United States or any country might do in such a circumstance. The point is that there is a tactic that will fail: American re-involvement. There is a tactic that will succeed: the United States making it clear that while it might aid the pacification in some way, the responsibility is on regional powers. The inevitable outcome will be a regional competition that the United States can manage far better than the current chaos.
  • There is then the special case of the Islamic State. It is special because its emergence triggered the current crisis. It is special because the brutal murder of two prisoners on video showed a particular cruelty. And it is different because its ideology is similar to that of al Qaeda, which attacked the United States. It has excited particular American passions. To counter this, I would argue that the uprising by Iraq’s Sunni community was inevitable, with its marginalization by Nouri al-Maliki’s Shiite regime in Baghdad. That it took this particularly virulent form is because the more conservative elements of the Sunni community were unable or unwilling to challenge al-Maliki. But the fragmentation of Iraq into Shiite, Sunni and Kurdish regions was well underway before the Islamic State, and jihadism was deeply embedded in the Sunni community a long time ago. Moreover, although the Islamic State is brutal, its cruelty is not unique in the region. Syrian President Bashar al Assad and others may not have killed Americans or uploaded killings to YouTube, but their history of ghastly acts is comparable. Finally, the Islamic State — engaged in war with everyone around it — is much less dangerous to the United States than a small group with time on its hands, planning an attack. In any event, if the Islamic State did not exist, the threat to the United States from jihadist groups in Yemen or Libya or somewhere inside the United States would remain.
  • ...11 more annotations...
  • The issue is whether the United States can live with this situation or whether it must reshape it. The immediate question is whether the United States has the power to reshape it and to what extent. The American interest turns on its ability to balance local forces. If that exists, the question is whether there is any other shape that can be achieved through American power that would be superior. From my point of view, there are many different shapes that can be imagined, but few that can be achieved. The American experience in Iraq highlighted the problems with counterinsurgency or being caught in a local civil war. The idea of major intervention assumes that this time it will be different. This fits one famous definition of insanity.
  • A national strategy emerges over the decades and centuries. It becomes a set of national interests into which a great deal has been invested, upon which a great deal depends and upon which many are counting. Presidents inherit national strategies, and they can modify them to some extent. But the idea that a president has the power to craft a new national strategy both overstates his power and understates the power of realities crafted by all those who came before him. We are all trapped in circumstances into which we were born and choices that were made for us. The United States has an inherent interest in Ukraine and in Syria-Iraq. Whether we should have that interest is an interesting philosophical question for a late-night discussion, followed by a sunrise when we return to reality. These places reflexively matter to the United States. The American strategy is fixed: Allow powers in the region to compete and balance against each other. When that fails, intervene with as little force and risk as possible. For example, the conflict between Iran and Iraq canceled out two rising powers until the war ended. Then Iraq invaded Kuwait and threatened to overturn the balance of power in the region. The result was Desert Storm.
  • The American strategy is fixed: Allow powers in the region to compete and balance against each other. When that fails, intervene with as little force and risk as possible. For example, the conflict between Iran and Iraq canceled out two rising powers until the war ended. Then Iraq invaded Kuwait and threatened to overturn the balance of power in the region. The result was Desert Storm. This strategy provides a model. In the Syria-Iraq region, the initial strategy is to allow the regional powers to balance each other, while providing as little support as possible to maintain the balance of power. It is crucial to understand the balance of power in detail, and to understand what might undermine it, so that any force can be applied effectively. This is the tactical part, and it is the tactical part that can go wrong. The strategy has a logic of its own. Understanding what that strategy demands is the hard part. Some nations have lost their sovereignty by not understanding what strategy demands. France in 1940 comes to mind. For the United States, there is no threat to sovereignty, but that makes the process harder: Great powers can tend to be casual because the situation is not existential. This increases the cost of doing what is necessary. The ground where we are talking about applying this model is Syria and Iraq. Both of these central governments have lost control of the country as a whole, but each remains a force. Both countries are divided by religion, and the religions are divided internally as well. In a sense the nations have ceased to exist, and the fragments they consisted of are now smaller but more complex entities.
  • This strategy provides a model. In the Syria-Iraq region, the initial strategy is to allow the regional powers to balance each other, while providing as little support as possible to maintain the balance of power. It is crucial to understand the balance of power in detail, and to understand what might undermine it, so that any force can be applied effectively. This is the tactical part, and it is the tactical part that can go wrong. The strategy has a logic of its own. Understanding what that strategy demands is the hard part. Some nations have lost their sovereignty by not understanding what strategy demands. France in 1940 comes to mind. For the United States, there is no threat to sovereignty, but that makes the process harder: Great powers can tend to be casual because the situation is not existential. This increases the cost of doing what is necessary. The ground where we are talking about applying this model is Syria and Iraq. Both of these central governments have lost control of the country as a whole, but each remains a force. Both countries are divided by religion, and the religions are divided internally as well. In a sense the nations have ceased to exist, and the fragments they consisted of are now smaller but more complex entities.
  • There is then the special case of the Islamic State. It is special because its emergence triggered the current crisis. It is special because the brutal murder of two prisoners on video showed a particular cruelty. And it is different because its ideology is similar to that of al Qaeda, which attacked the United States. It has excited particular American passions. To counter this, I would argue that the uprising by Iraq’s Sunni community was inevitable, with its marginalization by Nouri al-Maliki’s Shiite regime in Baghdad. That it took this particularly virulent form is because the more conservative elements of the Sunni community were unable or unwilling to challenge al-Maliki. But the fragmentation of Iraq into Shiite, Sunni and Kurdish regions was well underway before the Islamic State, and jihadism was deeply embedded in the Sunni community a long time ago. Moreover, although the Islamic State is brutal, its cruelty is not unique in the region. Syrian President Bashar al Assad and others may not have killed Americans or uploaded killings to YouTube, but their history of ghastly acts is comparable. Finally, the Islamic State — engaged in war with everyone around it — is much less dangerous to the United States than a small group with time on its hands, planning an attack. In any event, if the Islamic State did not exist, the threat to the United States from jihadist groups in Yemen or Libya or somewhere inside the United States would remain.
  • The issue is whether the United States can live with this situation or whether it must reshape it. The immediate question is whether the United States has the power to reshape it and to what extent. The American interest turns on its ability to balance local forces. If that exists, the question is whether there is any other shape that can be achieved through American power that would be superior. From my point of view, there are many different shapes that can be imagined, but few that can be achieved. The American experience in Iraq highlighted the problems with counterinsurgency or being caught in a local civil war. The idea of major intervention assumes that this time it will be different. This fits one famous definition of insanity.
  • Because the Islamic State operates to some extent as a conventional military force, it is vulnerable to U.S. air power. The use of air power against conventional forces that lack anti-aircraft missiles is a useful gambit. It shows that the United States is doing something, while taking little risk, assuming that the Islamic State really does not have anti-aircraft missiles. But it accomplishes little. The Islamic State will disperse its forces, denying conventional aircraft a target. Attempting to defeat the Islamic State by distinguishing its supporters from other Sunni groups and killing them will founder at the first step. The problem of counterinsurgency is identifying the insurgent. There is no reason not to bomb the Islamic State’s forces and leaders. They certainly deserve it. But there should be no illusion that bombing them will force them to capitulate or mend their ways. They are now part of the fabric of the Sunni community, and only the Sunni community can root them out. Identifying Sunnis who are anti-Islamic State and supplying them with weapons is a much better idea. It is the balance-of-power strategy that the United States follows, but this approach doesn’t have the dramatic satisfaction of blowing up the enemy. That satisfaction is not trivial, and the United States can certainly blow something up and call it the enemy, but it does not address the strategic problem. In the first place, is it really a problem for the United States?
  • There is no reason not to bomb the Islamic State’s forces and leaders. They certainly deserve it. But there should be no illusion that bombing them will force them to capitulate or mend their ways. They are now part of the fabric of the Sunni community, and only the Sunni community can root them out. Identifying Sunnis who are anti-Islamic State and supplying them with weapons is a much better idea. It is the balance-of-power strategy that the United States follows, but this approach doesn’t have the dramatic satisfaction of blowing up the enemy. That satisfaction is not trivial, and the United States can certainly blow something up and call it the enemy, but it does not address the strategic problem. In the first place, is it really a problem for the United States? The American interest is not stability but the existence of a dynamic balance of power in which all players are effectively paralyzed so that no one who would threaten the United States emerges. The Islamic State had real successes at first, but the balance of power with the Kurds and Shia has limited its expansion, and tensions within the Sunni community diverted its attention. Certainly there is the danger of intercontinental terrorism, and U.S. intelligence should be active in identifying and destroying these threats. But the re-occupation of Iraq, or Iraq plus Syria, makes no sense. The United States does not have the force needed to occupy Iraq and Syria at the same time. The demographic imbalance between available forces and the local population makes that impossible.
  • The danger is that other Islamic State franchises might emerge in other countries. But the United States would not be able to block these threats as well as the other countries in the region. Saudi Arabia must cope with any internal threat it faces not because the United States is indifferent, but because the Saudis are much better at dealing with such threats. In the end, the same can be said for the Iranians. Most important, it can also be said for the Turks. The Turks are emerging as a regional power. Their economy has grown dramatically in the past decade, their military is the largest in the region, and they are part of the Islamic world. Their government is Islamist but in no way similar to the Islamic State, which concerns Ankara. This is partly because of Ankara’s fear that the jihadist group might spread to Turkey, but more so because its impact on Iraqi Kurdistan could affect Turkey’s long-term energy plans.
  • The United States cannot win the game of small mosaic tiles that is emerging in Syria and Iraq. An American intervention at this microscopic level can only fail. But the principle of balance of power does not mean that balance must be maintained directly. Turkey, Iran and Saudi Arabia have far more at stake in this than the United States. So long as they believe that the United States will attempt to control the situation, it is perfectly rational for them to back off and watch, or act in the margins, or even hinder the Americans. The United States must turn this from a balance of power between Syria and Iraq to a balance of power among this trio of regional powers. They have far more at stake and, absent the United States, they have no choice but to involve themselves. They cannot stand by and watch a chaos that could spread to them. It is impossible to forecast how the game is played out. What is important is that the game begins. The Turks do not trust the Iranians, and neither is comfortable with the Saudis. They will cooperate, compete, manipulate and betray, just as the United States or any country might do in such a circumstance. The point is that there is a tactic that will fail: American re-involvement. There is a tactic that will succeed: the United States making it clear that while it might aid the pacification in some way, the responsibility is on regional powers. The inevitable outcome will be a regional competition that the United States can manage far better than the current chaos.
  • U.S. strategy is sound. It is to allow the balance of power to play out, to come in only when it absolutely must — with overwhelming force, as in Kuwait — and to avoid intervention where it cannot succeed. The tactical application of strategy is the problem. In this case the tactic is not direct intervention by the United States, save as a satisfying gesture to avenge murdered Americans. But the solution rests in doing as little as possible and forcing regional powers into the fray, then in maintaining the balance of power in this coalition. Such an American strategy is not an avoidance of responsibility. It is the use of U.S. power to force a regional solution. Sometimes the best use of American power is to go to war. Far more often, the best use of U.S. power is to withhold it. The United States cannot evade responsibility in the region. But it is enormously unimaginative to assume that carrying out that responsibility is best achieved by direct intervention. Indirect intervention is frequently more efficient and more effective.
  •  
    The article is by the Chairman of Stratfor, a private intelligence company. I don't agree with its analysis because I am decidedly non-interventionist. But this article should be required reading for all who have fallen for the war fever being spread by the War Party for full-scale military invasion of Iraq and Syria. The article at least lays a sound basis for a large degree of restraint.
Paul Merrell

How the NSA Plans to Infect 'Millions' of Computers with Malware - The Intercept - 0 views

  • Top-secret documents reveal that the National Security Agency is dramatically expanding its ability to covertly hack into computers on a mass scale by using automated systems that reduce the level of human oversight in the process. The classified files – provided previously by NSA whistleblower Edward Snowden – contain new details about groundbreaking surveillance technology the agency has developed to infect potentially millions of computers worldwide with malware “implants.” The clandestine initiative enables the NSA to break into targeted computers and to siphon out data from foreign Internet and phone networks. The covert infrastructure that supports the hacking efforts operates from the agency’s headquarters in Fort Meade, Maryland, and from eavesdropping bases in the United Kingdom and Japan. GCHQ, the British intelligence agency, appears to have played an integral role in helping to develop the implants tactic.
  • The NSA began rapidly escalating its hacking efforts a decade ago. In 2004, according to secret internal records, the agency was managing a small network of only 100 to 150 implants. But over the next six to eight years, as an elite unit called Tailored Access Operations (TAO) recruited new hackers and developed new malware tools, the number of implants soared to tens of thousands. To penetrate foreign computer networks and monitor communications that it did not have access to through other means, the NSA wanted to go beyond the limits of traditional signals intelligence, or SIGINT, the agency’s term for the interception of electronic communications. Instead, it sought to broaden “active” surveillance methods – tactics designed to directly infiltrate a target’s computers or network devices. In the documents, the agency describes such techniques as “a more aggressive approach to SIGINT” and says that the TAO unit’s mission is to “aggressively scale” these operations. But the NSA recognized that managing a massive network of implants is too big a job for humans alone.
  • “One of the greatest challenges for active SIGINT/attack is scale,” explains the top-secret presentation from 2009. “Human ‘drivers’ limit ability for large-scale exploitation (humans tend to operate within their own environment, not taking into account the bigger picture).” The agency’s solution was TURBINE. Developed as part of TAO unit, it is described in the leaked documents as an “intelligent command and control capability” that enables “industrial-scale exploitation.”
  • ...10 more annotations...
  • TURBINE was designed to make deploying malware much easier for the NSA’s hackers by reducing their role in overseeing its functions. The system would “relieve the user from needing to know/care about the details,” the NSA’s Technology Directorate notes in one secret document from 2009. “For example, a user should be able to ask for ‘all details about application X’ and not need to know how and where the application keeps files, registry entries, user application data, etc.” In practice, this meant that TURBINE would automate crucial processes that previously had to be performed manually – including the configuration of the implants as well as surveillance collection, or “tasking,” of data from infected systems. But automating these processes was about much more than a simple technicality. The move represented a major tactical shift within the NSA that was expected to have a profound impact – allowing the agency to push forward into a new frontier of surveillance operations. The ramifications are starkly illustrated in one undated top-secret NSA document, which describes how the agency planned for TURBINE to “increase the current capability to deploy and manage hundreds of Computer Network Exploitation (CNE) and Computer Network Attack (CNA) implants to potentially millions of implants.” (CNE mines intelligence from computers and networks; CNA seeks to disrupt, damage or destroy them.)
  • But not all of the NSA’s implants are used to gather intelligence, the secret files show. Sometimes, the agency’s aim is disruption rather than surveillance. QUANTUMSKY, a piece of NSA malware developed in 2004, is used to block targets from accessing certain websites. QUANTUMCOPPER, first tested in 2008, corrupts a target’s file downloads. These two “attack” techniques are revealed on a classified list that features nine NSA hacking tools, six of which are used for intelligence gathering. Just one is used for “defensive” purposes – to protect U.S. government networks against intrusions.
  • The NSA has a diverse arsenal of malware tools, each highly sophisticated and customizable for different purposes. One implant, codenamed UNITEDRAKE, can be used with a variety of “plug-ins” that enable the agency to gain total control of an infected computer. An implant plug-in named CAPTIVATEDAUDIENCE, for example, is used to take over a targeted computer’s microphone and record conversations taking place near the device. Another, GUMFISH, can covertly take over a computer’s webcam and snap photographs. FOGGYBOTTOM records logs of Internet browsing histories and collects login details and passwords used to access websites and email accounts. GROK is used to log keystrokes. And SALVAGERABBIT exfiltrates data from removable flash drives that connect to an infected computer. The implants can enable the NSA to circumvent privacy-enhancing encryption tools that are used to browse the Internet anonymously or scramble the contents of emails as they are being sent across networks. That’s because the NSA’s malware gives the agency unfettered access to a target’s computer before the user protects their communications with encryption. It is unclear how many of the implants are being deployed on an annual basis or which variants of them are currently active in computer systems across the world.
  • Infiltrating cellphone networks, however, is not all that the malware can be used to accomplish. The NSA has specifically tailored some of its implants to infect large-scale network routers used by Internet service providers in foreign countries. By compromising routers – the devices that connect computer networks and transport data packets across the Internet – the agency can gain covert access to monitor Internet traffic, record the browsing sessions of users, and intercept communications. Two implants the NSA injects into network routers, HAMMERCHANT and HAMMERSTEIN, help the agency to intercept and perform “exploitation attacks” against data that is sent through a Virtual Private Network, a tool that uses encrypted “tunnels” to enhance the security and privacy of an Internet session.
  • Eventually, the secret files indicate, the NSA’s plans for TURBINE came to fruition. The system has been operational in some capacity since at least July 2010, and its role has become increasingly central to NSA hacking operations. Earlier reports based on the Snowden files indicate that the NSA has already deployed between 85,000 and 100,000 of its implants against computers and networks across the world, with plans to keep on scaling up those numbers. The intelligence community’s top-secret “Black Budget” for 2013, obtained by Snowden, lists TURBINE as part of a broader NSA surveillance initiative named “Owning the Net.” The agency sought $67.6 million in taxpayer funding for its Owning the Net program last year. Some of the money was earmarked for TURBINE, expanding the system to encompass “a wider variety” of networks and “enabling greater automation of computer network exploitation.”
  • Before it can extract data from an implant or use it to attack a system, the NSA must first install the malware on a targeted computer or network. According to one top-secret document from 2012, the agency can deploy malware by sending out spam emails that trick targets into clicking a malicious link. Once activated, a “back-door implant” infects their computers within eight seconds. There’s only one problem with this tactic, codenamed WILLOWVIXEN: According to the documents, the spam method has become less successful in recent years, as Internet users have become wary of unsolicited emails and less likely to click on anything that looks suspicious. Consequently, the NSA has turned to new and more advanced hacking techniques. These include performing so-called “man-in-the-middle” and “man-on-the-side” attacks, which covertly force a user’s internet browser to route to NSA computer servers that try to infect them with an implant.
  • To perform a man-on-the-side attack, the NSA observes a target’s Internet traffic using its global network of covert “accesses” to data as it flows over fiber optic cables or satellites. When the target visits a website that the NSA is able to exploit, the agency’s surveillance sensors alert the TURBINE system, which then “shoots” data packets at the targeted computer’s IP address within a fraction of a second. In one man-on-the-side technique, codenamed QUANTUMHAND, the agency disguises itself as a fake Facebook server. When a target attempts to log in to the social media site, the NSA transmits malicious data packets that trick the target’s computer into thinking they are being sent from the real Facebook. By concealing its malware within what looks like an ordinary Facebook page, the NSA is able to hack into the targeted computer and covertly siphon out data from its hard drive. A top-secret animation demonstrates the tactic in action.
  • The TURBINE implants system does not operate in isolation. It is linked to, and relies upon, a large network of clandestine surveillance “sensors” that the agency has installed at locations across the world.
  • The NSA’s headquarters in Maryland are part of this network, as are eavesdropping bases used by the agency in Misawa, Japan and Menwith Hill, England. The sensors, codenamed TURMOIL, operate as a sort of high-tech surveillance dragnet, monitoring packets of data as they are sent across the Internet. When TURBINE implants exfiltrate data from infected computer systems, the TURMOIL sensors automatically identify the data and return it to the NSA for analysis. And when targets are communicating, the TURMOIL system can be used to send alerts or “tips” to TURBINE, enabling the initiation of a malware attack. The NSA identifies surveillance targets based on a series of data “selectors” as they flow across Internet cables. These selectors, according to internal documents, can include email addresses, IP addresses, or the unique “cookies” containing a username or other identifying information that are sent to a user’s computer by websites such as Google, Facebook, Hotmail, Yahoo, and Twitter. Other selectors the NSA uses can be gleaned from unique Google advertising cookies that track browsing habits, unique encryption key fingerprints that can be traced to a specific user, and computer IDs that are sent across the Internet when a Windows computer crashes or updates.
  • Documents published with this article: Menwith Hill Station Leverages XKeyscore for Quantum Against Yahoo and Hotmail Five Eyes Hacking Large Routers NSA Technology Directorate Analysis of Converged Data Selector Types There Is More Than One Way to Quantum NSA Phishing Tactics and Man in the Middle Attacks Quantum Insert Diagrams The NSA and GCHQ’s QUANTUMTHEORY Hacking Tactics TURBINE and TURMOIL VPN and VOIP Exploitation With HAMMERCHANT and HAMMERSTEIN Industrial-Scale Exploitation Thousands of Implants
  •  
    *Very* long article. Only small portions quoted.
Paul Merrell

Top-Secret Document Reveals NSA Spied On Porn Habits As Part Of Plan To Discredit 'Radi... - 0 views

  • WASHINGTON -- The National Security Agency has been gathering records of online sexual activity and evidence of visits to pornographic websites as part of a proposed plan to harm the reputations of those whom the agency believes are radicalizing others through incendiary speeches, according to a top-secret NSA document. The document, provided by NSA whistleblower Edward Snowden, identifies six targets, all Muslims, as “exemplars” of how “personal vulnerabilities” can be learned through electronic surveillance, and then exploited to undermine a target's credibility, reputation and authority. The NSA document, dated Oct. 3, 2012, repeatedly refers to the power of charges of hypocrisy to undermine such a messenger. “A previous SIGINT" -- or signals intelligence, the interception of communications -- "assessment report on radicalization indicated that radicalizers appear to be particularly vulnerable in the area of authority when their private and public behaviors are not consistent,” the document argues. Among the vulnerabilities listed by the NSA that can be effectively exploited are “viewing sexually explicit material online” and “using sexually explicit persuasive language when communicating with inexperienced young girls.”
  • The Director of the National Security Agency -- described as "DIRNSA" -- is listed as the "originator" of the document. Beyond the NSA itself, the listed recipients include officials with the Departments of Justice and Commerce and the Drug Enforcement Administration. "Without discussing specific individuals, it should not be surprising that the US Government uses all of the lawful tools at our disposal to impede the efforts of valid terrorist targets who seek to harm the nation and radicalize others to violence," Shawn Turner, director of public affairs for National Intelligence, told The Huffington Post in an email Tuesday. Yet Jameel Jaffer, deputy legal director of the American Civil Liberties Union, said these revelations give rise to serious concerns about abuse. "It's important to remember that the NSA’s surveillance activities are anything but narrowly focused -- the agency is collecting massive amounts of sensitive information about virtually everyone," he said. "Wherever you are, the NSA's databases store information about your political views, your medical history, your intimate relationships and your activities online," he added. "The NSA says this personal information won't be abused, but these documents show that the NSA probably defines 'abuse' very narrowly."
  • None of the six individuals targeted by the NSA is accused in the document of being involved in terror plots. The agency believes they all currently reside outside the United States. It identifies one of them, however, as a "U.S. person," which means he is either a U.S. citizen or a permanent resident. A U.S. person is entitled to greater legal protections against NSA surveillance than foreigners are. Stewart Baker, a one-time general counsel for the NSA and a top Homeland Security official in the Bush administration, said that the idea of using potentially embarrassing information to undermine targets is a sound one. "If people are engaged in trying to recruit folks to kill Americans and we can discredit them, we ought to," said Baker. "On the whole, it's fairer and maybe more humane" than bombing a target, he said, describing the tactic as "dropping the truth on them." Any system can be abused, Baker allowed, but he said fears of the policy drifting to domestic political opponents don't justify rejecting it. "On that ground you could question almost any tactic we use in a war, and at some point you have to say we're counting on our officials to know the difference," he said.
  • ...6 more annotations...
  • In addition to analyzing the content of their internet activities, the NSA also examined the targets' contact lists. The NSA accuses two of the targets of promoting al Qaeda propaganda, but states that surveillance of the three English-speakers’ communications revealed that they have "minimal terrorist contacts." In particular, “only seven (1 percent) of the contacts in the study of the three English-speaking radicalizers were characterized in SIGINT as affiliated with an extremist group or a Pakistani militant group. An earlier communications profile of [one of the targets] reveals that 3 of the 213 distinct individuals he was in contact with between 4 August and 2 November 2010 were known or suspected of being associated with terrorism," the document reads. The document contends that the three Arabic-speaking targets have more contacts with affiliates of extremist groups, but does not suggest they themselves are involved in any terror plots. Instead, the NSA believes the targeted individuals radicalize people through the expression of controversial ideas via YouTube, Facebook and other social media websites. Their audience, both English and Arabic speakers, "includes individuals who do not yet hold extremist views but who are susceptible to the extremist message,” the document states. The NSA says the speeches and writings of the six individuals resonate most in countries including the United Kingdom, Germany, Sweden, Kenya, Pakistan, India and Saudi Arabia.
  • The NSA possesses embarrassing sexually explicit information about at least two of the targets by virtue of electronic surveillance of their online activity. The report states that some of the data was gleaned through FBI surveillance programs carried out under the Foreign Intelligence and Surveillance Act. The document adds, "Information herein is based largely on Sunni extremist communications." It further states that "the SIGINT information is from primary sources with direct access and is generally considered reliable." According to the document, the NSA believes that exploiting electronic surveillance to publicly reveal online sexual activities can make it harder for these “radicalizers” to maintain their credibility. "Focusing on access reveals potential vulnerabilities that could be even more effectively exploited when used in combination with vulnerabilities of character or credibility, or both, of the message in order to shape the perception of the messenger as well as that of his followers," the document argues. An attached appendix lists the "argument" each surveillance target has made that the NSA says constitutes radicalism, as well the personal "vulnerabilities" the agency believes would leave the targets "open to credibility challenges" if exposed.
  • One target's offending argument is that "Non-Muslims are a threat to Islam," and a vulnerability listed against him is "online promiscuity." Another target, a foreign citizen the NSA describes as a "respected academic," holds the offending view that "offensive jihad is justified," and his vulnerabilities are listed as "online promiscuity" and "publishes articles without checking facts." A third targeted radical is described as a "well-known media celebrity" based in the Middle East who argues that "the U.S perpetrated the 9/11 attack." Under vulnerabilities, he is said to lead "a glamorous lifestyle." A fourth target, who argues that "the U.S. brought the 9/11 attacks on itself" is said to be vulnerable to accusations of “deceitful use of funds." The document expresses the hope that revealing damaging information about the individuals could undermine their perceived "devotion to the jihadist cause." The Huffington Post is withholding the names and locations of the six targeted individuals; the allegations made by the NSA about their online activities in this document cannot be verified. The document does not indicate whether the NSA carried out its plan to discredit these six individuals, either by communicating with them privately about the acquired information or leaking it publicly. There is also no discussion in the document of any legal or ethical constraints on exploiting electronic surveillance in this manner.
  • While Baker and others support using surveillance to tarnish the reputation of people the NSA considers "radicalizers," U.S. officials have in the past used similar tactics against civil rights leaders, labor movement activists and others. Under J. Edgar Hoover, the FBI harassed activists and compiled secret files on political leaders, most notably Martin Luther King, Jr. The extent of the FBI's surveillance of political figures is still being revealed to this day, as the bureau releases the long dossiers it compiled on certain people in response to Freedom of Information Act requests following their deaths. The information collected by the FBI often centered on sex -- homosexuality was an ongoing obsession on Hoover's watch -- and information about extramarital affairs was reportedly used to blackmail politicians into fulfilling the bureau's needs. Current FBI Director James Comey recently ordered new FBI agents to visit the Martin Luther King, Jr. Memorial in Washington to understand "the dangers in becoming untethered to oversight and accountability."
  • James Bamford, a journalist who has been covering the NSA since the early 1980s, said the use of surveillance to exploit embarrassing private behavior is precisely what led to past U.S. surveillance scandals. "The NSA's operation is eerily similar to the FBI's operations under J. Edgar Hoover in the 1960s where the bureau used wiretapping to discover vulnerabilities, such as sexual activity, to 'neutralize' their targets," he said. "Back then, the idea was developed by the longest serving FBI chief in U.S. history, today it was suggested by the longest serving NSA chief in U.S. history." That controversy, Bamford said, also involved the NSA. "And back then, the NSA was also used to do the eavesdropping on King and others through its Operation Minaret. A later review declared the NSA’s program 'disreputable if not outright illegal,'" he said. Baker said that until there is evidence the tactic is being abused, the NSA should be trusted to use its discretion. "The abuses that involved Martin Luther King occurred before Edward Snowden was born," he said. "I think we can describe them as historical rather than current scandals. Before I say, 'Yeah, we've gotta worry about that,' I'd like to see evidence of that happening, or is even contemplated today, and I don't see it."
  • Jaffer, however, warned that the lessons of history ought to compel serious concern that a "president will ask the NSA to use the fruits of surveillance to discredit a political opponent, journalist or human rights activist." "The NSA has used its power that way in the past and it would be naïve to think it couldn't use its power that way in the future," he said.
  •  
    By Glenn Greenwald, Ryan Gallagher, and Ryan Grim, 26 November 2013. I will annotate later. But this is by far the most important NSA disclosure from Edward Snowden's leaked documents thus far. A report originated by Gen. Alexander himself revealing COINTELPRO like activities aimed at destroying the reputations of non-terrorist "radicalizers," including one "U.S. person." This is exactly the kind of repressive activity that the civil libertarians among us warn about. 
  •  
    By Glenn Greenwald, Ryan Gallagher, and Ryan Grim, 26 November 2013. I will annotate later. But this is by far the most important NSA disclosure from Edward Snowden's leaked documents thus far. A report originated by Gen. Alexander himself revealing COINTELPRO like activities aimed at destroying the reputations of non-terrorist "radicalizers," including one "U.S. person." This is exactly the kind of repressive activity that the civil libertarians among us warn about. 
Paul Merrell

Report reveals 9 Israel lobby tactics to silence students | The Electronic Intifada - 0 views

  • Lawyers have responded to nearly 300 incidents of “censorship, punishment, or other burdening of advocacy for Palestinian rights” filed by Palestine solidarity activists on more than 65 US campuses in the last year and a half. Palestine Legal and the Center for Constitutional Rights (CCR) detail the assault in a new 124-page report, “The Palestine Exception to Free Speech: A Movement Under Attack in the US.” “As the movement for Palestinian rights is growing in the US, so too are concerted efforts to silence any and all criticism of Israel,” said Radhika Sainath, staff attorney with Palestine Legal and cooperating counsel with CCR. A video featuring students and members of faculty who have experienced silencing, repression and intimidation was also released by Palestine Legal and CCR and can be viewed above.
  • The report, which is the first of its kind, documents the suppression of Palestine advocacy in the US and identifies nine separate tactics Israel lobby groups use to crush Palestine solidarity activism — especially on campuses. The groups say that 85 percent of the hundreds of incidents to which Palestine Legal has responded since 2014 involving the targeting of students and scholars “include baseless legal complaints, administrative disciplinary actions, firings, harassment and false accusations of terrorism and anti-Semitism.” Such tactics have a chilling effect on speech, the report says. “These strategies … [result in] intimidating or deterring Palestinian solidarity activists from speaking out. The fear of punishment or career damage discourages many activists from engaging in activities that could be perceived as critical of Israel,” the report says. Sainath told The Electronic Intifada that “on the one hand, we’ve seen that peoples’ lives and reputations have been destroyed because of speaking out critically about Israel’s policies — one example is professor Steven Salaita, [whose story] is covered in the report.” Salaita was fired from the University of Illinois after he expressed his criticism of Israel’s attack on Gaza in the summer of 2014.
  • Meanwhile, lawyers and students say they are bracing for an array of dirty tactics being planned by Israel lobby groups. Earlier this year, Republican party mega-donor Sheldon Adelson, along with Haim Saban, billionaire supporter of the Democratic party, poured tens of millions of dollars into Israel lobby groups on campus with the explicit intent of suppressing Palestine rights-based organizing. “One of the things that we’re concerned about and preparing for is a wave of anti-boycott legislation,” Sainath said, “as well as increased efforts to stop students from introducing referendums or resolutions for Palestinian rights.”
  • ...2 more annotations...
  • Also today, Jewish Voice for Peace (JVP) released a 79-page report, “Stifling Dissent: How Israel’s Defenders Use False Charges of Anti-Semitism to Limit the Debate over Israel on Campus.” It lays out in detail the methods that Israel lobby groups use to stifle debate about Palestine. It also includes numerous case studies and accounts of employment discrimination against US professors who have been targeted for their political views on Israel. Tallie Ben-Daniel, academic advisory council coordinator for JVP, told The Electronic Intifada that the report grew out of concerns over “the climate of repression” around speech critical of Israel, especially following Salaita’s firing.
  • Ben-Daniel said that young Jews “are more critical of Israeli state policy than ever before, and are building coalitions through their Palestine solidarity work — and yet are silenced by the very organizations that are supposed to represent them on campus.” One section of JVP’s report “details how Jewish students are subjected to a political litmus test on Israel in order to participate in Jewish institutional life on campus.” Organizations such as Hillel, JVP points out, demand that their members abide by guidelines which prohibit co-sponsoring or supporting events of speakers who are critical of Israeli policies and who support the Palestinian-led boycott, divestment and sanctions (BDS) campaign. Ben-Daniel added that JVP’s report “only tallies the cases that gained national attention — there are innumerable more Jewish students who in all probability do not participate in institutional Jewish campus life because of this litmus test.” JVP says that the report is meant to educate and provide resources to students and faculty alike who may be facing repression or silencing on campus and in classrooms.
  •  
    A sign that BDS is beginning to make Israeli government truly worried about economic impacts, the Adelson/Saban big donations for anti-BDS work on U.S. college campuses. 
Paul Merrell

In the Democratic Echo Chamber, Inconvenient Truths Are Recast as Putin Plots - 0 views

  • Donald Trump, for reasons I’ve repeatedly pointed out, is an extremist, despicable, and dangerous candidate, and his almost-certain humiliating defeat is less than a month away. So I realize there is little appetite in certain circles for critiques of any of the tawdry and sometimes fraudulent journalistic claims and tactics being deployed to further that goal. In the face of an abusive, misogynistic, bigoted, scary, lawless authoritarian, what’s a little journalistic fraud or constant fearmongering about subversive Kremlin agents between friends if it helps to stop him? But come January, Democrats will continue to be the dominant political faction in the U.S. — more so than ever — and the tactics they are now embracing will endure past the election, making them worthy of scrutiny. Those tactics now most prominently include dismissing away any facts or documents that reflect negatively on their leaders as fake, and strongly insinuating that anyone who questions or opposes those leaders is a stooge or agent of the Kremlin, tasked with a subversive and dangerously un-American mission on behalf of hostile actors in Moscow. To see how extreme and damaging this behavior has become, let’s just quickly examine two utterly false claims that Democrats over the past four days — led by party-loyal journalists — have disseminated and induced thousands of people, if not more, to believe. On Friday, WikiLeaks published its first installment of emails obtained from the account of Clinton campaign chair John Podesta. Despite WikiLeaks’ perfect, long-standing record of only publishing authentic documents, MSNBC’s favorite ex-intelligence official, Malcolm Nance, within hours of the archive’s release, posted a tweet claiming — with zero evidence and without citation to a single document in the WikiLeaks archive — that it was compromised with fakes:
  • As you can see, more than 4,000 people have re-tweeted this “Official Warning.” That includes not only random Clinton fans but also high-profile Clinton-supporting journalists, who by spreading it around gave this claim their stamp of approval, intentionally leading huge numbers of people to assume the WikiLeaks archive must be full of fakes, and its contents should therefore simply be ignored. Clinton’s campaign officials spent the day fueling these insinuations, strongly implying that the documents were unreliable and should thus be ignored. Poof: Just like that, unpleasant facts about Hillary Clinton disappeared, like a fairy protecting frightened children by waving her magic wand and sprinkling her dust over a demon, causing it to scatter away. Except the only fraud here was Nance’s claim, not any of the documents published by WikiLeaks. Those were all real. Indeed, at Sunday night’s debate, when asked directly about the excerpts of her Wall Street speeches found in the release, Clinton herself confirmed their authenticity. And news outlets such as the New York Times and AP reported — and continue to report — on their contents without any caveat that they may be frauds. No real print journalists or actual newsrooms (as opposed to campaign operatives masquerading as journalists) fell for this scam, so this tactic did not prevent reporting from being done.
  •  
    Glenn Greenwald chastises Dems for claiming leaked Clintone emails are forgeries.
Paul Merrell

The Legend of the Phoenix - 0 views

  • It would seem the CIA has gone back into their archives, blown the dust off the Phoenix Program, and put it into play again as the “Drone War.” The similarities with the Drone War are readily evident to anyone old enough to know of the Phoenix Program. For those who aren’t old enough or who have forgotten, the Phoenix Program is usually referred to as an assassination program and was the subject of investigation by the Senate’s “Church Committee.” Indisputably, thousands of South Vietnamese civilians were killed under this CIA directed program.
  • Phoenix was far more than a mere assassination program , however. It was a Counter-Insurgency, COIN, program, using the tactic of counter-terrorism, including assassination, against the insurgent’s so-called infrastructure. This was the Vietnamese civilian population in which the insurgent, the Viet Cong guerilla, operated and from some of whom they drew their support. To the U.S., these civilians were the Viet Cong Infrastructure, the VCI. And the VCI was the target to be terrorized by any means necessary in the hope that they would turn against the Viet Cong. The VCI would have included the families, close and extended kinship groups, of alleged active Viet Cong combatants, fellow villagers, and other Vietnamese civilians who were not actively opposed to the Viet Cong. Some of this “support” was voluntary and some coerced. As the Phoenix Program went on, with its assassinations, torture practices, and “disappearances,” more support became voluntary as Vietnamese peasants turned against the U.S. and the South Vietnamese government as a result of the program. An error in identification of a victim was irrelevant to those in control of the program, the CIA, as it still served the purpose of terrorizing the civilian population, which was the true purpose of the program.
  • For the Viet Cong, this was a classic example of achieving the guerilla’s goal of having a civilian population turn against a government by a government’s own harsh over-reaction to the guerilla threat. Today, a guerilla and the people whom they are amongst are deemed “terrorists” if they find themselves on the wrong side of a domestic conflict that the U.S. has taken a side in, such as Yemen. As we saw in Libya, and see in Syria, these guerillas can become instant U.S. allies who must be supported, if, or when, the U.S. makes policy changes. But unless those U.S. policy changes occur, these groups remain part of the global terrorist network of “associated forces” with al Qaeda, in the eyes of CIA and military officials, and targeted with drones. From the relatively large number of civilian victims of drone attacks as claimed by residents of Pakistan’s Federally Administered Tribal Areas (FATA) and the political party, Pakistan Tehreek Insaf (PTI), this Drone Program has all the hallmarks of the Phoenix Program.
  • ...1 more annotation...
  • Without more transparency by the government, no other conclusion can be drawn that the reason we see so many civilians killed by drones, while denying it as John Brennan did, is because we are targeting civilians as the “infrastructure.” While Anwar al-Awlaki was declared to be an “operational leader,” with the extremely elastic category of “infrastructure” as used in Vietnam, his “operational” activity may have only been “spreading antigovernment propaganda and rumors,” as the Rand Corporation put it, which led to his extrajudicial execution. How many other American citizens might that reach?
  •  
    Spot on analysis by a retired Navy lawyer who knows his U.S. military history.The striking parallels he points to between contemporary U.S. drone terrorism and the notorious Viet Nam War Phoenix Program terrorism are no accident. Among the super-hawks of the War Party, there has been a persistent meme that the U.S. military suffered no defeat in Viet Nam, that the vaunted "counter-insurgency" strategy and tactics were working, and that the war was lost by politicians and the American public who lost the nerve to continue the war.  If you put your blinders on firmly enough to pretend that the North and South Vietnamese were separate people, there's an element of truth to that myth. The South Vietnamese Viet Cong guerrillas were decimated by 1970. But the North and South Vietnamese were in fact one people of a single nation, who had united to defeat and evict the French military force. The division into two nations was to have been only a one-year thing, prelude to national election of a government for a reunited Viet Nam. It was the U.S. puppet government of the South that, realizing they could not win the election, reneged on allowing it in the South.  Long before the Viet Cong became a shadow of its former force, the Vietnamese from the North had responded to the betrayal of the treaty by sending North Vietnamese regular army troops ("NVA") to the South, spearheaded by the same battle-hardened men who had defeated the French. And the U.S. military was well and truly overwhelmed by the NVA's strategy and tactics, forced to retreat into strongholds from which they ventured only in force. The NVA's Tet Offensive in 1968 failed to succeed in the effort to capture multiple Vietnamese cities concurrently. But the number, weaponry, and power of their force caused Lyndon Johnson to realize that the U.S. generals had been lying to him, that the U.S. was not on the brink of victory, and that there was a very long slog ahead with an unknown outcome if the U.S. continu
Paul Merrell

Obama's NSA 'reforms' are little more than a PR attempt to mollify the public | Glenn G... - 0 views

  • In response to political scandal and public outrage, official Washington repeatedly uses the same well-worn tactic. It is the one that has been hauled out over decades in response to many of America's most significant political scandals. Predictably, it is the same one that shaped President Obama's much-heralded Friday speech to announce his proposals for "reforming" the National Security Agency in the wake of seven months of intense worldwide controversy.The crux of this tactic is that US political leaders pretend to validate and even channel public anger by acknowledging that there are "serious questions that have been raised". They vow changes to fix the system and ensure these problems never happen again. And they then set out, with their actions, to do exactly the opposite: to make the system prettier and more politically palatable with empty, cosmetic "reforms" so as to placate public anger while leaving the system fundamentally unchanged, even more immune than before to serious challenge.
  • In response to political scandal and public outrage, official Washington repeatedly uses the same well-worn tactic. It is the one that has been hauled out over decades in response to many of America's most significant political scandals. Predictably, it is the same one that shaped President Obama's much-heralded Friday speech to announce his proposals for "reforming" the National Security Agency in the wake of seven months of intense worldwide controversy.The crux of this tactic is that US political leaders pretend to validate and even channel public anger by acknowledging that there are "serious questions that have been raised". They vow changes to fix the system and ensure these problems never happen again. And they then set out, with their actions, to do exactly the opposite: to make the system prettier and more politically palatable with empty, cosmetic "reforms" so as to placate public anger while leaving the system fundamentally unchanged, even more immune than before to serious challenge.This scam has been so frequently used that it is now easily recognizable.
  •  
    Glenn Greenwald offers his take on Obama's NSA "reform" speech.
Paul Merrell

When the CIA's Empire Struck Back | Global Research - 0 views

  • In the mid-1970s, Rep. Otis Pike led a brave inquiry to rein in the excesses of the national security state. But the CIA and its defenders accused Pike of recklessness and vowed retaliation, assigning him to a political obscurity that continued to his recent death. Otis Pike, who headed the House of Representatives’ only wide-ranging and in-depth investigation into intelligence agency abuses in the 1970s, died on Jan. 20. A man who should have received a hero’s farewell passed with barely a mention. To explain the significance of what he did, however, requires a solid bit of back story.
  • Rep. Otis Pike, D-New York, took over what became known as the “Pike Committee.” Under Pike, the committee put some real teeth into the investigation, so much so that Ford’s White House and the CIA went on a public-relations counterattack, accusing the panel and its staff of recklessness. The CIA’s own historical review acknowledged as much:
  • “The final draft report of the Pike Committee reflected its sense of frustration with the Agency and the executive branch. Devoting an entire section of the report to describing its experience, the committee characterized Agency and White House cooperation as ‘virtually nonexistent.’ The report asserted that the executive branch practiced ‘footdragging, stonewalling, and deception’ in response to committee requests for information. It told the committee only what it wanted the committee to know. It restricted the dissemination of the information and ducked penetrating questions.”
  • ...3 more annotations...
  • Essentially, the CIA and the White House forbade the Pike report’s release by leaning on friendly members of Congress to suppress the report, which a majority agreed to do. But someone leaked a copy to CBS News reporter Daniel Schorr, who took it to the Village Voice, which published it on Feb. 16, 1976. Mitchell Rogovin, the CIA’s Special Counsel for Legal Affairs, threatened Pike’s staff director, saying, “Pike will pay for this, you wait and see … We [the CIA] will destroy him for this. … There will be political retaliation. Any political ambitions in New York that Pike had are through. We will destroy him for this.” And, indeed, Pike’s political career never recovered. Embittered and disillusioned by the failure of Congress to stand up to the White House and the CIA, Pike did not seek reelection in 1978 and retired into relative obscurity.
  • But what did Pike’s report say that was so important to generate such hostility? The answer can be summed up with the opening line from the report: “If this Committee’s recent experience is any test, intelligence agencies that are to be controlled by Congressional lawmaking are, today, beyond the lawmaker’s scrutiny.” In other words, Otis Pike was our canary in the coal mine, warning us that the national security state was literally out of control, and that lawmakers were powerless against it. Pike’s prophetic statement was soon ratified by the fact that although former CIA Director Richard Helms was charged with perjury for lying to Congress about the CIA’s cooperation with ITT in the overthrow of Chilean President Salvador Allende, Helms managed to escape with a suspended sentence and a  $2,000 fine.
  • As Pike’s committee report stated: “These secret agencies have interests that inherently conflict with the open accountability of a political body, and there are many tools and tactics to block and deceive conventional Congressional checks. Added to this are the unique attributes of intelligence — notably, ‘national security,’ in its cloak of secrecy and mystery — to intimidate Congress and erode fragile support for sensitive inquiries. “Wise and effective legislation cannot proceed in the absence of information respecting conditions to be affected or changed. Nevertheless, under present circumstances, inquiry into intelligence activities faces serious and fundamental shortcomings. “Even limited success in exercising future oversight requires a rethinking of the powers, procedures, and duties of the overseers. This Committee’s path and policies, its plus and minuses, may at least indicate where to begin.” The Pike report revealed the tactics that the intelligence agencies had used to prevent oversight, noting the language was “always the language of cooperation” but the result was too often “non-production.” In other words, the agencies assured Congress of cooperation, while stalling, moving slowly, and literally letting the clock run out on the investigation. The Pike Committee, alone among the other investigations, refused to sign secrecy agreements with the CIA, charging that as the representatives of the people they had authority over the CIA, not the other way around.
  •  
    The Senate's Church Committee gets all the publicity but the House Pike Committee did much of the heavy lifting in the mid-1970s investigation of spy agency abuse. This is a good solid overview of that committee's work in historical context and a troubling reminder that the NSA's current confrontational tactics with Congress are nothing new.
Paul Merrell

CIA's Ex-No. 2 Says ISIS 'Learned From Snowden' - The Daily Beast - 0 views

  • That is not a consensus view within the U.S. intelligence community, where officials have been divided over how much ISIS really learned from the Snowden leaks that it didn’t already know. The group didn’t begin seizing territory in Iraq until a year after the leaks began. And last year, a U.S. intelligence official with access to information about ISIS’s current tactics told The Daily Beast that while the group had “likely learned a lot” from the Snowden leaks, “many of their forces are familiar with the U.S. from their time in AQI, [and] they have adapted well to avoiding detection.”
  • “Within weeks of the leaks, terrorist organizations around the world were already starting to modify their actions in light of what Snowden disclosed. Communications sources dried up, tactics were changed,” Morell writes. Among the most damaging leaks, he adds, was one that described a program that collects foreigners’ emails as they move through equipment in the United States.Terrorist groups, including ISIS, have since shifted their communications to more “secure” platforms, are using encryption, or “are avoiding electronic communications altogether.”“ISIS was one of those terrorist groups that learned from Snowden, and it is clear that his actions played a role in the rise of ISIS,” Morell writes.
  • Edward Snowden’s leaks about U.S. intelligence operations “played a role in the rise of ISIS.” That’s the explosive new allegation from the former deputy director of the CIA, Michael Morell, who was among the United States’ most senior intelligence officials when Snowden began providing highly classified documents to journalists in 2013. U.S. intelligence officials have long argued that Snowden’s disclosures provided valuable insights to terrorist groups and nation-state adversaries, including China and Russia, about how the U.S. monitors communications around the world. But in his new memoir, to be published next week, Morell raises the stakes of that debate by directly implicating Snowden in the expansion of ISIS, which broke away from al Qaeda and has conquered large swaths of territory in Iraq and Syria.
  • ...3 more annotations...
  • Edward Snowden’s leaks about U.S. intelligence operations “played a role in the rise of ISIS.” That’s the explosive new allegation from the former deputy director of the CIA, Michael Morell, who was among the United States’ most senior intelligence officials when Snowden began providing highly classified documents to journalists in 2013. U.S. intelligence officials have long argued that Snowden’s disclosures provided valuable insights to terrorist groups and nation-state adversaries, including China and Russia, about how the U.S. monitors communications around the world. But in his new memoir, to be published next week, Morell raises the stakes of that debate by directly implicating Snowden in the expansion of ISIS, which broke away from al Qaeda and has conquered large swaths of territory in Iraq and Syria. 
  • “Within weeks of the leaks, terrorist organizations around the world were already starting to modify their actions in light of what Snowden disclosed. Communications sources dried up, tactics were changed,” Morell writes. Among the most damaging leaks, he adds, was one that described a program that collects foreigners’ emails as they move through equipment in the United States.Terrorist groups, including ISIS, have since shifted their communications to more “secure” platforms, are using encryption, or “are avoiding electronic communications altogether.”“ISIS was one of those terrorist groups that learned from Snowden, and it is clear that his actions played a role in the rise of ISIS,” Morell writes.
  • That is not a consensus view within the U.S. intelligence community, where officials have been divided over how much ISIS really learned from the Snowden leaks that it didn’t already know. The group didn’t begin seizing territory in Iraq until a year after the leaks began. And last year, a U.S. intelligence official with access to information about ISIS’s current tactics told The Daily Beast that while the group had “likely learned a lot” from the Snowden leaks, “many of their forces are familiar with the U.S. from their time in AQI, [and] they have adapted well to avoiding detection.”
  •  
    Keep in mind that ISIL is a U.S. creation. And that just about everything that CIA and NSA do violates the laws of the nation in which they act and is antithetical to our form of government.   
Paul Merrell

Tomgram: Gregoire Chamayou, Hunting Humans by Remote Control | TomDispatch - 0 views

  • It was during the Vietnam War that the U.S. Air Force, to counteract the Soviet surface-to-air missiles that had inflicted heavy casualties on it, invested in reconnaissance drones nicknamed “Lightning Bugs,” produced by Ryan Aeronautical. An American official explained that “these RPVs [remotely piloted vehicles] could help prevent aircrews from becoming casualties or prisoners… With RPVs, survival is not the driving factor.” Once the war was over, those machines were scrapped. By the late 1970s, the development of military drones had been practically abandoned in the United States. However, it continued elsewhere. Israel, which had inherited a few of these machines, recognized their potential tactical advantages. In 1973, the Israel Defense Forces (IDF), facing off against Egypt, ran up against the tactical problem of surface-to-air missiles. After losing around 30 planes in the first hours of the Yom Kippur War, Israeli aviation changed its tactics. They decided to send out a wave of drones in order to mislead enemy defenses: “After the Egyptians fired their initial salvo at the drones, the manned strikes were able to attack while the Egyptians were reloading.” This ruse enabled Israel to assume mastery of the skies. In 1982, similar tactics were employed against the Syrians in the Bekaa Valley. Having first deployed their fleet of Mastiff and Scout drones, the Israelis then sent out decoy planes that were picked up by enemy radar. The Syrians activated their surface-to-air missiles, to no effect whatsoever. The drones, which had been observing the scene from the sky, easily detected the positions of the antiaircraft batteries and relayed them to the Israeli fighter planes, which then proceeded to annihilate them.
  • The drones were used for other purposes as well: “Two days after a terrorist bomb destroyed the [U.S.] Marine Barracks in Beirut in October 1983, Marine Commandant Gen. P.X. Kelley secretly flew to the scene. No word of his arrival was leaked. Yet, across the border, Israeli intelligence officers watched live television images of Kelley arriving and inspecting the barracks. They even zoomed the picture in tight, placing cross hairs directly on his head. Hours later, in Tel Aviv, the Israelis played back the tape for the shocked Marine general. The scene, they explained, was transmitted by a Mastiff RPV circling out of sight above the barracks.” This was just one of a series of minor events that combined to encourage the relaunch of American drone production in the 1980s. “All I did,” confessed Al Ellis, the father of the Israeli drones, “was take a model airplane, put a camera in it, and take the pictures… But that started an industry.”
  • But it would take a “‘different kind of war’ to make the Predator into a predator.” No more than a few months before September 11, 2001, officers who had seen the Predator at work in Kosovo had the idea of experimentally equipping it with an antitank missile. Writes Bill Yenne in his history of the drone, “On February 16, 2001, during tests at Nellis Air Force Base, a Predator successfully fired a Hellfire AGM114C into a target. The notion of turning the Predator into a predator had been realized. No one could imagine that, before the year was out, the Predator would be preying upon live targets in Afghanistan.” Barely two months after the outbreak of hostilities in Afghanistan, George Bush was in a position to declare: “The conflict in Afghanistan has taught us more about the future of our military than a decade of blue ribbon panels and think-tank symposiums. The Predator is a good example… Now it is clear the military does not have enough unmanned vehicles.”
Paul Merrell

War Comes Home: The Excessive Militarization of American Policing | American Civil Libe... - 0 views

  • All across the country, heavily armed SWAT teams are raiding people’s homes in the middle of the night, often just to search for drugs. It should enrage us that people have needlessly died during these raids, that pets have been shot, and that homes have been ravaged. Our neighborhoods are not warzones, and police officers should not be treating us like wartime enemies. Any yet, every year, billions of dollars’ worth of military equipment flows from the federal government to state and local police departments. Departments use these wartime weapons in everyday policing, especially to fight the wasteful and failed drug war, which has unfairly targeted people of color. As our new report makes clear, it’s time for American police to remember that they are supposed to protect and serve our communities, not wage war on the people who live in them.
  • Nearly 80% of the SWAT raids the ACLU studied were conducted to serve search warrants, usually in drug cases. With public support for the War on Drugs at an all-time low, police are using hyper-aggressive, wartime tools and tactics to fight a war that has lost its public mandate.
  • It’s not uncommon for SWAT teams to brutalize bystanders in their search for a suspect. One family in Atlanta was woken up in the middle of the night when officers burst into their home and threw a flashbang grenade into the playpen where a toddler was sleeping. This is their story.  
  • ...3 more annotations...
  • t is widely known that policing tactics across the country often unfairly target communities of color. According to our investigation, the use of paramilitary weapons and tactics appears to be no different. These maps show the distribution of SWAT raids by racial composition of neighborhoods in two cities, but this trend is echoed nationwide. Read the complete report for more.
  • Hyper-aggressive policing won’t go away simply by identifying a couple “bad apples” or dismissing the problem as a few isolated instances. As this map makes clear, excessive militarization is a nationwide trend.
  • Not every situation requires 20 heavily armed SWAT officers and an armored personnel carrier. And yet, we collected reports of full deployments to homes where no contraband was found, where there was no clear reason for thinking the people inside would be armed or awake, and where children and the elderly were present. We need to ensure that hyper-aggressive tools and tactics are only used in situations where they are truly necessary to protect people. It’s also time to push for greater transparency and ensure that the federal government is not incentivizing the militarization of our state and local police.
Paul Merrell

Documents Reveal Canada's Secret Hacking Tactics - The Intercept - 0 views

  • Canada’s electronic surveillance agency has secretly developed an arsenal of cyberweapons capable of stealing data and destroying adversaries’ infrastructure, according to newly revealed classified documents. Communications Security Establishment, or CSE, has also covertly hacked into computers across the world to gather intelligence, breaking into networks in Europe, Mexico, the Middle East and North Africa, the documents show. The revelations, reported Monday by CBC News in collaboration with The Intercept, shine a light for the first time on how Canada has adopted aggressive tactics to attack, sabotage and infiltrate targeted computer systems. The latest disclosures come as the Canadian government debates whether to hand over more powers to its spies to disrupt threats as part of the controversial anti-terrorism law, Bill C-51.
  • Christopher Parsons, a surveillance expert at the University of Toronto’s Citizen Lab, told CBC News that the new revelations showed that Canada’s computer networks had already been “turned into a battlefield without any Canadian being asked: Should it be done? How should it be done?” According to documents obtained by The Intercept from National Security Agency whistleblower Edward Snowden, CSE has a wide range of powerful tools to perform “computer network exploitation” and “computer network attack” operations. These involve hacking into networks to either gather intelligence or to damage adversaries’ infrastructure, potentially including electricity, transportation or banking systems. The most well-known example of a state-sponsored “attack” operation involved the use of Stuxnet, a computer worm that was reportedly developed by the United States and Israel to sabotage Iranian nuclear facilities. One document from CSE, dated from 2011, outlines the range of methods the Canadian agency has at its disposal as part of a “cyber activity spectrum” to both defend against hacking attacks and to perpetrate them. CSE says in the document that it can “disable adversary infrastructure,” “control adversary infrastructure,” or “destroy adversary infrastructure” using the attack techniques. It can also insert malware “implants” on computers to steal data.
  • According to one top-secret NSA briefing paper, dated from 2013, Canada is considered an important player in global hacking operations. Under the heading “NSA and CSEC cooperate closely in the following areas,” the paper notes that the agencies work together on “active computer network access and exploitation on a variety of foreign intelligence targets, including CT [counter terrorism], Middle East, North Africa, Europe, and Mexico.” (The NSA had not responded to a request for comment at time of publication. The agency has previously told The Intercept that it “works with foreign partners to address a wide array of serious threats, including terrorist plots, the proliferation of weapons of mass destruction, and foreign aggression.”) Notably, CSE has gone beyond just adopting a range of tools to hack computers. According to the Snowden documents, it has a range of “deception techniques” in its toolbox. These include “false flag” operations to “create unrest,” and using so-called “effects” operations to “alter adversary perception.” A false-flag operation usually means carrying out an attack, but making it look like it was performed by another group — in this case, likely another government or hacker. Effects operations can involve sending out propaganda across social media or disrupting communications services. The newly revealed documents also reveal that CSE says it can plant a “honeypot” as part of its deception tactics, possibly a reference to some sort of bait posted online that lures in targets so that they can be hacked or monitored.
  • ...1 more annotation...
  • The apparent involvement of CSE in using the deception tactics suggests it is operating in the same area as a secretive British unit known as JTRIG, a division of the country’s eavesdropping agency, Government Communications Headquarters, or GCHQ. Last year, The Intercept published documents from Snowden showing that the JTRIG unit uses a range of effects operations to manipulate information online, such as by rigging the outcome of online polls, sending out fake messages on Facebook across entire countries, and posting negative information about targets online to damage their reputations.
Paul Merrell

Why Did the Saudi Regime and Other Gulf Tyrannies Donate Millions to the Clinton Founda... - 0 views

  • As the numerous and obvious ethical conflicts surrounding the Clinton Foundation receive more media scrutiny, the tactic of Clinton-loyal journalists is to highlight the charitable work done by the foundation, and then insinuate — or even outright state — that anyone raising these questions is opposed to its charity. James Carville announced that those who criticize the foundation are “going to hell.” Other Clinton loyalists insinuated that Clinton Foundation critics are indifferent to the lives of HIV-positive babies or are anti-gay bigots. That the Clinton Foundation has done some good work is beyond dispute. But that fact has exactly nothing to do with the profound ethical problems and corruption threats raised by the way its funds have been raised. Hillary Clinton was America’s chief diplomat, and tyrannical regimes such as the Saudis and Qataris jointly donated tens of millions of dollars to an organization run by her family and operated in its name, one whose works has been a prominent feature of her public persona. That extremely valuable opportunity to curry favor with the Clintons, and to secure access to them, continues as she runs for president.
  • The claim that this is all just about trying to help people in need should not even pass a laugh test, let alone rational scrutiny. To see how true that is, just look at who some of the biggest donors are. Although it did not give while she was secretary of state, the Saudi regime by itself has donated between $10 million and $25 million to the Clinton Foundation, with donations coming as late as 2014, as she prepared her presidential run. A group called “Friends of Saudi Arabia,” co-founded “by a Saudi Prince,” gave an additional amount between $1 million and $5 million. The Clinton Foundation says that between $1 million and $5 million was also donated by “the State of Qatar,” the United Arab Emirates, and the government of Brunei. “The State of Kuwait” has donated between $5 million and $10 million. Theoretically, one could say that these regimes — among the most repressive and regressive in the world — are donating because they deeply believe in the charitable work of the Clinton Foundation and want to help those in need. Is there a single person on the planet who actually believes this? Is Clinton loyalty really so strong that people are going to argue with a straight face that the reason the Saudi, Qatari, Kuwaiti and Emirates regimes donated large amounts of money to the Clinton Foundation is because those regimes simply want to help the foundation achieve its magnanimous goals?
  • All those who wish to argue that the Saudis donated millions of dollars to the Clinton Foundation out of a magnanimous desire to aid its charitable causes, please raise your hand. Or take the newfound casting of the Clinton Foundation as a champion of LGBTs, and the smearing of its critics as indifferent to AIDS. Are the Saudis also on board with these benevolent missions? And the Qataris and Kuwaitis?
  • ...4 more annotations...
  • Which is actually more homophobic: questioning the Clinton Foundation’s lucrative relationship to those intensely anti-gay regimes, or cheering and defending that relationship? All the evidence points to the latter. But whatever else is true, it is a blatant insult to everyone’s intelligence to claim that the motive of these regimes in transferring millions to the Clinton Foundation is a selfless desire to help them in their noble work. Another primary project of the Clinton Foundation is the elimination of wealth inequality, which “leads to significant economic disparities, both within and among countries, and prevents underserved populations from realizing their potential.” Who could possibly maintain that the reason the Qatari and Emirates regimes donated millions to the Clinton Foundation was their desire to eliminate such economic oppression?
  • It doesn’t exactly take a jaded disposition to doubt that these donations from some of the world’s most repressive regimes are motivated by a desire to aid the Clinton Foundation’s charitable work. To the contrary, it just requires basic rationality. That’s particularly true given that these regimes “have donated vastly more money to the Clinton Foundation than they have to most other large private charities involved in the kinds of global work championed by the Clinton family.” For some mystifying reason, they seem particularly motivated to transfer millions to the Clinton Foundation but not the other charities around the world doing similar work. Why might that be? What could ever explain it? Some Clinton partisans, unwilling to claim that Gulf tyrants have charity in their hearts when they make these donations to the Clinton Foundation, have settled on a different tactic: grudgingly acknowledging that the motive of these donations is to obtain access and favors, but insisting that no quid pro quo can be proven. In other words, these regimes were tricked: They thought they would get all sorts of favors through these millions in donations, but Hillary Clinton was simply too honest and upstanding of a public servant to fulfill their expectations. The reality is that there is ample evidence uncovered by journalists suggesting that regimes donating money to the Clinton Foundation received special access to and even highly favorable treatment from the Clinton State Department. But it’s also true that nobody can dispositively prove the quid pro quo. Put another way, one cannot prove what was going on inside Hillary Clinton’s head at the time that she gave access to or otherwise acted in the interests of these donor regimes: Was she doing it as a favor in return for those donations, or simply because she has a proven affinity for Gulf State and Arab dictators, or because she was merely continuing decades of U.S. policy of propping up pro-U.S. tyrants in the region?
  • While this “no quid pro quo proof” may be true as far as it goes, it’s extremely ironic that Democrats have embraced it as a defense of Hillary Clinton. After all, this has long been the primary argument of Republicans who oppose campaign finance reform, and indeed, it was the primary argument of the Citizens United majority, once depicted by Democrats as the root of all evil. But now, Democrats have to line up behind a politician who, along with her husband, specializes in uniting political power with vast private wealth, in constantly exploiting the latter to gain the former, and vice versa. So Democrats are forced to jettison all the good-government principles they previously claimed to believe and instead are now advocating the crux of the right-wing case against campaign finance reform: that large donations from vested factions are not inherently corrupting of politics or politicians. Indeed, as I documented in April, Clinton-defending Democrats have now become the most vocal champions of the primary argument used by the Citizens United majority. “We now conclude,” wrote Justice Anthony Kennedy for the Citizens United majority, “that independent expenditures, including those made by corporations, do not give rise to corruption or the appearance of corruption.” That is now exactly the argument Clinton loyalists are spouting to defend the millions in donations from tyrannical regimes (as well as Wall Street banks and hedge funds): Oh, there’s no proof there’s any corruption going on with all of this money. The elusive nature of quid pro quo proof — now the primary Democratic defense of Clinton — has also long been the principal argument wielded by the most effective enemy of campaign finance reform, GOP Sen. Mitch McConnell. This is how USA Today, in 1999, described the arguments of McConnell and his GOP allies when objecting to accusations from campaign finance reform advocates that large financial donations are corrupting:
  • So if you want to defend the millions of dollars that went from tyrannical regimes to the Clinton Foundation as some sort of wily, pragmatic means of doing good work, go right ahead. But stop insulting everyone’s intelligence by pretending that these donations were motivated by noble ends. Beyond that, don’t dare exploit LGBT rights, AIDS, and other causes to smear those who question the propriety of receiving millions of dollars from the world’s most repressive, misogynistic, gay-hating regimes. Most important, accept that your argument in defense of all these tawdry relationships — that big-money donations do not necessarily corrupt the political process or the politicians who are their beneficiaries — has been and continues to be the primary argument used to sabotage campaign finance reform. Given who their candidate is, Democrats really have no choice but to insist that these sorts of financial relationships are entirely proper (needless to say, Goldman Sachs has also donated millions to the Clinton Foundation, but Democrats proved long ago they don’t mind any of that when they even insisted that it was perfectly fine that Goldman Sachs enriched both Clintons personally with numerous huge speaking fees — though Democrats have no trouble understanding why Trump’s large debts to Chinese banks and Goldman Sachs pose obvious problems). But — just as is true of their resurrecting a Cold War template and its smear tactics against their critics — the benefits derived from this tactic should not obscure how toxic it is and how enduring its consequences will likely be.
Paul Merrell

The NSA's Secret Role in the U.S. Assassination Program - The Intercept - 0 views

  • The National Security Agency is using complex analysis of electronic surveillance, rather than human intelligence, as the primary method to locate targets for lethal drone strikes – an unreliable tactic that results in the deaths of innocent or unidentified people. According to a former drone operator for the military’s Joint Special Operations Command (JSOC) who also worked with the NSA, the agency often identifies targets based on controversial metadata analysis and cell-phone tracking technologies. Rather than confirming a target’s identity with operatives or informants on the ground, the CIA or the U.S. military then orders a strike based on the activity and location of the mobile phone a person is believed to be using. The drone operator, who agreed to discuss the top-secret programs on the condition of anonymity, was a member of JSOC’s High Value Targeting task force, which is charged with identifying, capturing or killing terrorist suspects in Yemen, Somalia, Afghanistan and elsewhere. His account is bolstered by top-secret NSA documents previously provided by whistleblower Edward Snowden. It is also supported by a former drone sensor operator with the U.S. Air Force, Brandon Bryant, who has become an outspoken critic of the lethal operations in which he was directly involved in Iraq, Afghanistan and Yemen
  • The National Security Agency is using complex analysis of electronic surveillance, rather than human intelligence, as the primary method to locate targets for lethal drone strikes – an unreliable tactic that results in the deaths of innocent or unidentified people. According to a former drone operator for the military’s Joint Special Operations Command (JSOC) who also worked with the NSA, the agency often identifies targets based on controversial metadata analysis and cell-phone tracking technologies. Rather than confirming a target’s identity with operatives or informants on the ground, the CIA or the U.S. military then orders a strike based on the activity and location of the mobile phone a person is believed to be using. The drone operator, who agreed to discuss the top-secret programs on the condition of anonymity, was a member of JSOC’s High Value Targeting task force, which is charged with identifying, capturing or killing terrorist suspects in Yemen, Somalia, Afghanistan and elsewhere. His account is bolstered by top-secret NSA documents previously provided by whistleblower Edward Snowden. It is also supported by a former drone sensor operator with the U.S. Air Force, Brandon Bryant, who has become an outspoken critic of the lethal operations in which he was directly involved in Iraq, Afghanistan and Yemen.
  • In his speech at the National Defense University last May, President Obama declared that “before any strike is taken, there must be near-certainty that no civilians will be killed or injured – the highest standard we can set.” He added that, “by narrowly targeting our action against those who want to kill us and not the people they hide among, we are choosing the course of action least likely to result in the loss of innocent life.” But the increased reliance on phone tracking and other fallible surveillance tactics suggests that the opposite is true. The Bureau of Investigative Journalism, which uses a conservative methodology to track drone strikes, estimates that at least 273 civilians in Pakistan, Yemen and Somalia have been killed by unmanned aerial assaults under the Obama administration. A recent study conducted by a U.S. military adviser found that, during a single year in Afghanistan – where the majority of drone strikes have taken place – unmanned vehicles were 10 times more likely than conventional aircraft to cause civilian casualties.
  •  
    Glenn Greenwald's initial article in the new online The Intercept. 
Paul Merrell

Snowden Documents Reveal Covert Surveillance and Pressure Tactics Aimed at WikiLeaks an... - 0 views

  • Top-secret documents from the National Security Agency and its British counterpart reveal for the first time how the governments of the United States and the United Kingdom targeted WikiLeaks and other activist groups with tactics ranging from covert surveillance to prosecution. The efforts – detailed in documents provided previously by NSA whistleblower Edward Snowden – included a broad campaign of international pressure aimed not only at WikiLeaks founder Julian Assange, but at what the U.S. government calls “the human network that supports WikiLeaks.” The documents also contain internal discussions about targeting the file-sharing site Pirate Bay and hacktivist collectives such as Anonymous. One classified document from Government Communications Headquarters, Britain’s top spy agency, shows that GCHQ used its surveillance system to secretly monitor visitors to a WikiLeaks site. By exploiting its ability to tap into the fiber-optic cables that make up the backbone of the Internet, the agency confided to allies in 2012, it was able to collect the IP addresses of visitors in real time, as well as the search terms that visitors used to reach the site from search engines like Google.
  • Another classified document from the U.S. intelligence community, dated August 2010, recounts how the Obama administration urged foreign allies to file criminal charges against Assange over the group’s publication of the Afghanistan war logs. A third document, from July 2011, contains a summary of an internal discussion in which officials from two NSA offices – including the agency’s general counsel and an arm of its Threat Operations Center – considered designating WikiLeaks as “a ‘malicious foreign actor’ for the purpose of targeting.” Such a designation would have allowed the group to be targeted with extensive electronic surveillance – without the need to exclude U.S. persons from the surveillance searches.
  • In a statement to The Intercept, Assange condemned what he called “the reckless and unlawful behavior of the National Security Agency” and GCHQ’s “extensive hostile monitoring of a popular publisher’s website and its readers.” “News that the NSA planned these operations at the level of its Office of the General Counsel is especially troubling,” Assange said. “Today, we call on the White House to appoint a special prosecutor to investigate the extent of the NSA’s criminal activity against the media, including WikiLeaks, its staff, its associates and its supporters.” Illustrating how far afield the NSA deviates from its self-proclaimed focus on terrorism and national security, the documents reveal that the agency considered using its sweeping surveillance system against Pirate Bay, which has been accused of facilitating copyright violations. The agency also approved surveillance of the foreign “branches” of hacktivist groups, mentioning Anonymous by name. The documents call into question the Obama administration’s repeated insistence that U.S. citizens are not being caught up in the sweeping surveillance dragnet being cast by the NSA. Under the broad rationale considered by the agency, for example, any communication with a group designated as a “malicious foreign actor,” such as WikiLeaks and Anonymous, would be considered fair game for surveillance.
  • ...2 more annotations...
  • The system used by GCHQ to monitor the WikiLeaks website – codenamed ANTICRISIS GIRL – is described in a classified PowerPoint presentation prepared by the British agency and distributed at the 2012 “SIGDEV Conference.” At the annual gathering, each member of the “Five Eyes” alliance – the United States, United Kingdom, Canada, Australia and New Zealand – describes the prior year’s surveillance successes and challenges. In a top-secret presentation at the conference, two GCHQ spies outlined how ANTICRISIS GIRL was used to enable “targeted website monitoring” of WikiLeaks (See slides 33 and 34). The agency logged data showing hundreds of users from around the world, including the United States, as they were visiting a WikiLeaks site –contradicting claims by American officials that a deal between the U.K. and the U.S. prevents each country from spying on the other’s citizens. The IP addresses collected by GCHQ are used to identify individual computers that connect to the Internet, and can be traced back to specific people if the IP address has not been masked using an anonymity service. If WikiLeaks or other news organizations were receiving submissions from sources through a public dropbox on their website, a system like ANTICRISIS GIRL could potentially be used to help track them down. (WikiLeaks has not operated a public dropbox since 2010, when it shut down its system in part due to security concerns over surveillance.)
  • It is unclear from the PowerPoint presentation whether GCHQ monitored the WikiLeaks site as part of a pilot program designed to demonstrate its capability, using only a small set of covertly collected data, or whether the agency continues to actively deploy its surveillance system to monitor visitors to WikiLeaks. It was previously reported in The Guardian that X-KEYSCORE, a comprehensive surveillance weapon used by both NSA and GCHQ, allows “an analyst to learn the IP addresses of every person who visits any website the analyst specifies.”
  •  
    "... the Obama administration urged foreign allies to file criminal charges against Assange over the group's publication of the Afghanistan war logs." Sweden promptly launches an alleged rape investigation and Assange is forced by the UK courts to take refuge in the London embassy of Ecuador. Because of urging by the Obama administration aimed at chilling the the First Amendment rights of journalists. That should be grounds for impeachment.  
Paul Merrell

Syria war: new push against Assad being planned, reports suggest | World news | theguar... - 0 views

  • After months of battlefield stalemate in Syria, a flurry of reports from Washington, Jerusalem, Amman and the Gulf suggests a major new clandestine effort is under way to open up a "southern front" against the regime of Bashar al-Assad.Central to the mooted plan is a renewed push to provide Syria's badly divided and often ineffectual moderate, secular rebel groups with additional funding, upgraded weapons and intelligence support.What use they may make of such support, if indeed it fully materialises, remains to be seen.The initiative, as reported in the region, is set against a backdrop of secret talks in the US last month between Susan Rice, Barack Obama's national security adviser, and Prince Mohammed bin Nayef, the Saudi interior minister in charge of covert action programmes in Syria.According to the usually well informed Washington Post columnist David Ignatius, spy chiefs from Jordan, Turkey, Qatar and other regional countries also attended the discussions, focused on making a "stronger effort" to help the rebels.
  • After months of battlefield stalemate in Syria, a flurry of reports from Washington, Jerusalem, Amman and the Gulf suggests a major new clandestine effort is under way to open up a "southern front" against the regime of Bashar al-Assad.Central to the mooted plan is a renewed push to provide Syria's badly divided and often ineffectual moderate, secular rebel groups with additional funding, upgraded weapons and intelligence support.What use they may make of such support, if indeed it fully materialises, remains to be seen.The initiative, as reported in the region, is set against a backdrop of secret talks in the US last month between Susan Rice, Barack Obama's national security adviser, and Prince Mohammed bin Nayef, the Saudi interior minister in charge of covert action programmes in Syria.
  • According to the usually well informed Washington Post columnist David Ignatius, spy chiefs from Jordan, Turkey, Qatar and other regional countries also attended the discussions, focused on making a "stronger effort" to help the rebels.This meeting has been linked in turn to last month's launching by the Free Syrian Army (FSA) of what they termed a spring offensive in the south of Syria. The offensive began days after they received new US weapons funding that may eventually total $31.4m (£18.9m), rebel commanders said.After holding back for months owing to fears that new arms might fall into the hands of al-Qaida affiliates, unidentified American officials said Congress had given closed-door approval in January for renewed cash for light weapons intended for the moderate, secular opposition in the south.The new US funding supposedly augments a fresh push by Gulf states to finance rebel operations in the southern region of Syria, which are ultimately aimed at Damascus. More than $1bn has been disbursed since last summer, much of it for weapons purchases in eastern Europe, according to Gulf government sources quoted by regional media.
  • ...1 more annotation...
  • Detailed media reports claim the operational plans, supply routes and tactics for the new push are being overseen by a secret international operations command centre in Amman staffed by military officials from 14 countries, including the US, Britain, Israel and Arab states opposed to the Assad regime."Rebel fighters and opposition members say the command centre, based in an intelligence headquarters building in Amman, channels vehicles, sniper rifles, mortars, heavy machine guns, small arms and ammunition to Free Syrian Army units," the Abu Dhabi-based National newspaper reported.Jordan denies the existence of the centre and of reportedly CIA-run rebel training facilities in northern Jordan.
Paul Merrell

The US government doesn't want you to know the cops are tracking you | Trevor Timm | Co... - 0 views

  • All across America, from Florida to Colorado and back again, the country's increasingly militarized local police forces are using a secretive technology to vacuum up cellphone data from entire neighborhoods – including from people inside their own homes – almost always without a warrant. This week, numerous investigations by major news agencies revealed the US government is now taking unbelievable measures to make sure you never find out about it. But a landmark court ruling for privacy could soon force the cops to stop, even as the Obama administration fights to keep its latest tool for mass surveillance a secret.So-called International Mobile Subscriber Identity (IMSI) catchers – more often called their popular brand name, "Stingray" – have long been the talk of the civil liberties crowd, for the indiscriminate and invasive way these roving devices conduct surveillance. Essentially, Stingrays act as fake cellphone towers (usually mounted in a mobile police truck) that police can point toward any given area and force every phone in the area to connect to it. So even if you're not making a call, police can find out who you've been calling, and for how long, as well as your precise location. As Nathan Freed Wessler of the ACLU explained on Thursday, "In one Florida case, a police officer explained in court that he 'quite literally stood in front of every door and window' with his stingray to track the phones inside a large apartment complex."
  • Yet these mass surveillance devices have largely stayed out of the public eye, thanks to the federal government and local police refusing to disclose they're using them in the first place – sometimes, shockingly, even to judges. As the Associated Press reported this week, the Obama administration has been telling local cops to keep information on Stingrays secret from members of the news media, even when it seems like local public records laws would mandate their disclosure. The AP noted:Federal involvement in local open records proceedings is unusual. It comes at a time when President Barack Obama has said he welcomes a debate on government surveillance and called for more transparency about spying in the wake of disclosures about classified federal surveillance programs.
  • Some of the government's tactics to hide Stingray from journalists and the public have been downright disturbing. After the ACLU had filed a records request for information on Stingrays, the local police force initially told them that, yes, they had the documents and to come on down to the station to look at them. But just before an ACLU rep was due to arrive, US Marshals seized the records and hid them away at another location, in what Wessler describes as "a blatant violation of state open-records laws".The federal government has used various other tactics around the country to prevent disclosure of similar information.USA Today also published a significant nationwide investigation about the Stingray problem, as well as what are known as "cellphone tower dumps". When police agencies don't have Stingrays at their disposal, they can go to cell phone providers to get the cellphone location information of everyone who has connected to a specific cell tower (which inevitably includes thousands of innocent people). The paper's John Kelly reported that one Colorado case shows cellphone tower dumps got police "'cellular telephone numbers, including the date, time and duration of any calls,' as well as numbers and location data for all phones that connected to the towers searched, whether calls were being made or not."
  • ...3 more annotations...
  • It's scary enough to think that the NSA is collecting so much information, but this mass location and metadata tracking at the local level all may be about to change. This week, the ACLU won a historic victory in the 11th Circuit Court of Appeals (serving Florida, Alabama and Georgia), which ruled that police need to get a warrant from a judge before extracting from your cellphone the location data obtained by way of a cell tower. This ruling will apply whether cops are going after one person, the whole tower and, one can assume, Stingrays. (The case was also argued by the aforementioned Wessler, who clearly is this month’s civil liberties Most Valuable Player.)This case has huge implications, and not just for the Stingrays secretly being used in Florida. It virtually guarantees the US supreme court will soon have to tackle the larger cellphone location question in some form – and whether police across the country have to finally start getting a warrant to find out where your precise location for days or weeks at a time. But as Stanford law professor Jennifer Granick wrote on Friday, it could also have an impact on NSA spying, which relies on the theory that indiscriminately collecting metadata is fair game until a court says otherwise.
  • You may be asking: how, exactly, are the local cops getting their hands on such advanced military technology? Well, the feds are, in many cases, giving away the technology for free. When the US government is not loaning police agencies their own Stingrays, the Defense Department and Homeland Security are giving federal grants to cops, which allow departments to purchase the gear at the cost of $400,000 a pop from defense contractors like Harris Corporation, which makes the Stingray brand.
  • Like Stingrays, and the NSA's phone dragnet before them, the militarization of America's local cops is a phenomenon that's only now getting widespread attention. As journalist Radley Balko, who wrote a seminal book on the subject two years ago, said this week, the Obama administration could easily limit these tactics to "cases of legitimate national security" – but has clearly chosen not to.No matter how much President Obama talks about how he has "maintained a healthy skepticism toward our surveillance programs", it seems the Most Transparent Administration in American History™ remains much more interested in maintaining a healthy, top-secret surveillance state.
Paul Merrell

Lopez not on Hunger Strike: Venezuelan Ombudsman | nsnbc international - 0 views

  • Venezuela’s chief ombudsman, Tarek William Saab, has publicly refuted international media reports that imprisoned politician, Leopoldo Lopez, has gone on hunger strike. On Sunday, international journalists took to the web to announce Lopez’s “hunger strike” after he released a video on Saturday evening in which he claimed that he and fellow jailed far right leader Daniel Ceballos, ex-mayor of San Cristobal, would refuse to eat as a form of political protest.
  • But a leaked conversation featuring Lopez suggests that the “strike” is part of yet another attempt to destabilise the Bolivarian government. Both Ceballos and Lopez were arrested in early 2014 for their role in inciting violent anti-government street mobilizations known as the “barricades” which resulted in the deaths of forty three people. The wave of street violence was later found to have been infiltrated by rightwing paramilitaries.
  • Yet an audio recording leaked on Monday by state agencies suggests that Lopez’s video is part of a wider plan to bring down the government through a combination of civil unrest and violence. In the recording, which appears to be a secret conversation between Lopez and Ceballos held prior to the release of Lopez’s video, both men can be heard concocting a strategy to deal a fatal blow to the elected government of Nicolas Maduro. The plan includes mass protests infiltrated by snipers to sow civil unrest as well as mounting camps outside of the United Nations headquarters. The strategy seems to mirror the tactics used in 2014’s violent barricades for which both men are currently under arrest.
  • ...1 more annotation...
  • The opposition Roundtable of Democratic Unity (MUD) coalition has since revealed that it will not support this coming Saturday’s march called by Lopez. In an official communique, the MUD stated that it “supports and values” the reasons behind the March, but that “circumstances” preclude their participation.
  •  
    The report involves principles of the U.S. "blue revolution" in Venezuela, a thus-far unsuccessful effort to overthrow the Venezuela Bolivarian government. Note carefully the plan to embed snipers amongst the "protestors." The deployment of snipers to give the appearance of the established government killings of protestors seems to be a staple tactic in U.S. color revolution strategy.  
Paul Merrell

Obama on CIA's post-9/11 tactics: 'We tortured some folks' - RT USA - 0 views

  • President Barack Obama made a rare acknowledgment during a Friday press briefing concerning the United States’ past use of enhanced interrogation tactics in the wake of the September 11 terrorist attacks. “In the immediate aftermath of 9/11, we did some things that were wrong. We did a whole lot of things that were right, but we tortured some folks. We did things that were contrary to our values,” Pres. Obama said near the end of a nearly hour-long press briefing at the White House in Washington, DC.
  • Earlier this week, Sen. Ron Wyden (D-Oregon) told The Daily Beast that “The American people will be profoundly disturbed about what will be revealed in this report.”
  • The word “torture” to describe the tactics used by the CIA is rarely used by government officials, but Pres. Obama has indeed condemned the agency’s past abuses before. During an address last year at the National Defense University, Obama said that, in some cases, “I believe we compromised our basic values -- by using torture to interrogate our enemies, and detaining individuals in a way that ran counter to the rule of law.” “So after I took office, we stepped up the war against Al-Qaeda but we also sought to change its course. We relentlessly targeted Al-Qaeda’s leadership. We ended the war in Iraq, and brought nearly 150,000 troops home. We pursued a new strategy in Afghanistan, and increased our training of Afghan forces. We unequivocally banned torture, affirmed our commitment to civilian courts, worked to align our policies with the rule of law and expanded our consultations with Congress,” Obama said in that address from last May.
  •  
1 - 20 of 237 Next › Last »
Showing 20 items per page