Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged twitter

Rss Feed Group items tagged

14More

How the NSA Plans to Infect 'Millions' of Computers with Malware - The Intercept - 0 views

  • Top-secret documents reveal that the National Security Agency is dramatically expanding its ability to covertly hack into computers on a mass scale by using automated systems that reduce the level of human oversight in the process. The classified files – provided previously by NSA whistleblower Edward Snowden – contain new details about groundbreaking surveillance technology the agency has developed to infect potentially millions of computers worldwide with malware “implants.” The clandestine initiative enables the NSA to break into targeted computers and to siphon out data from foreign Internet and phone networks. The covert infrastructure that supports the hacking efforts operates from the agency’s headquarters in Fort Meade, Maryland, and from eavesdropping bases in the United Kingdom and Japan. GCHQ, the British intelligence agency, appears to have played an integral role in helping to develop the implants tactic.
  • The NSA began rapidly escalating its hacking efforts a decade ago. In 2004, according to secret internal records, the agency was managing a small network of only 100 to 150 implants. But over the next six to eight years, as an elite unit called Tailored Access Operations (TAO) recruited new hackers and developed new malware tools, the number of implants soared to tens of thousands. To penetrate foreign computer networks and monitor communications that it did not have access to through other means, the NSA wanted to go beyond the limits of traditional signals intelligence, or SIGINT, the agency’s term for the interception of electronic communications. Instead, it sought to broaden “active” surveillance methods – tactics designed to directly infiltrate a target’s computers or network devices. In the documents, the agency describes such techniques as “a more aggressive approach to SIGINT” and says that the TAO unit’s mission is to “aggressively scale” these operations. But the NSA recognized that managing a massive network of implants is too big a job for humans alone.
  • “One of the greatest challenges for active SIGINT/attack is scale,” explains the top-secret presentation from 2009. “Human ‘drivers’ limit ability for large-scale exploitation (humans tend to operate within their own environment, not taking into account the bigger picture).” The agency’s solution was TURBINE. Developed as part of TAO unit, it is described in the leaked documents as an “intelligent command and control capability” that enables “industrial-scale exploitation.”
  • ...10 more annotations...
  • TURBINE was designed to make deploying malware much easier for the NSA’s hackers by reducing their role in overseeing its functions. The system would “relieve the user from needing to know/care about the details,” the NSA’s Technology Directorate notes in one secret document from 2009. “For example, a user should be able to ask for ‘all details about application X’ and not need to know how and where the application keeps files, registry entries, user application data, etc.” In practice, this meant that TURBINE would automate crucial processes that previously had to be performed manually – including the configuration of the implants as well as surveillance collection, or “tasking,” of data from infected systems. But automating these processes was about much more than a simple technicality. The move represented a major tactical shift within the NSA that was expected to have a profound impact – allowing the agency to push forward into a new frontier of surveillance operations. The ramifications are starkly illustrated in one undated top-secret NSA document, which describes how the agency planned for TURBINE to “increase the current capability to deploy and manage hundreds of Computer Network Exploitation (CNE) and Computer Network Attack (CNA) implants to potentially millions of implants.” (CNE mines intelligence from computers and networks; CNA seeks to disrupt, damage or destroy them.)
  • But not all of the NSA’s implants are used to gather intelligence, the secret files show. Sometimes, the agency’s aim is disruption rather than surveillance. QUANTUMSKY, a piece of NSA malware developed in 2004, is used to block targets from accessing certain websites. QUANTUMCOPPER, first tested in 2008, corrupts a target’s file downloads. These two “attack” techniques are revealed on a classified list that features nine NSA hacking tools, six of which are used for intelligence gathering. Just one is used for “defensive” purposes – to protect U.S. government networks against intrusions.
  • The NSA has a diverse arsenal of malware tools, each highly sophisticated and customizable for different purposes. One implant, codenamed UNITEDRAKE, can be used with a variety of “plug-ins” that enable the agency to gain total control of an infected computer. An implant plug-in named CAPTIVATEDAUDIENCE, for example, is used to take over a targeted computer’s microphone and record conversations taking place near the device. Another, GUMFISH, can covertly take over a computer’s webcam and snap photographs. FOGGYBOTTOM records logs of Internet browsing histories and collects login details and passwords used to access websites and email accounts. GROK is used to log keystrokes. And SALVAGERABBIT exfiltrates data from removable flash drives that connect to an infected computer. The implants can enable the NSA to circumvent privacy-enhancing encryption tools that are used to browse the Internet anonymously or scramble the contents of emails as they are being sent across networks. That’s because the NSA’s malware gives the agency unfettered access to a target’s computer before the user protects their communications with encryption. It is unclear how many of the implants are being deployed on an annual basis or which variants of them are currently active in computer systems across the world.
  • Infiltrating cellphone networks, however, is not all that the malware can be used to accomplish. The NSA has specifically tailored some of its implants to infect large-scale network routers used by Internet service providers in foreign countries. By compromising routers – the devices that connect computer networks and transport data packets across the Internet – the agency can gain covert access to monitor Internet traffic, record the browsing sessions of users, and intercept communications. Two implants the NSA injects into network routers, HAMMERCHANT and HAMMERSTEIN, help the agency to intercept and perform “exploitation attacks” against data that is sent through a Virtual Private Network, a tool that uses encrypted “tunnels” to enhance the security and privacy of an Internet session.
  • Eventually, the secret files indicate, the NSA’s plans for TURBINE came to fruition. The system has been operational in some capacity since at least July 2010, and its role has become increasingly central to NSA hacking operations. Earlier reports based on the Snowden files indicate that the NSA has already deployed between 85,000 and 100,000 of its implants against computers and networks across the world, with plans to keep on scaling up those numbers. The intelligence community’s top-secret “Black Budget” for 2013, obtained by Snowden, lists TURBINE as part of a broader NSA surveillance initiative named “Owning the Net.” The agency sought $67.6 million in taxpayer funding for its Owning the Net program last year. Some of the money was earmarked for TURBINE, expanding the system to encompass “a wider variety” of networks and “enabling greater automation of computer network exploitation.”
  • Before it can extract data from an implant or use it to attack a system, the NSA must first install the malware on a targeted computer or network. According to one top-secret document from 2012, the agency can deploy malware by sending out spam emails that trick targets into clicking a malicious link. Once activated, a “back-door implant” infects their computers within eight seconds. There’s only one problem with this tactic, codenamed WILLOWVIXEN: According to the documents, the spam method has become less successful in recent years, as Internet users have become wary of unsolicited emails and less likely to click on anything that looks suspicious. Consequently, the NSA has turned to new and more advanced hacking techniques. These include performing so-called “man-in-the-middle” and “man-on-the-side” attacks, which covertly force a user’s internet browser to route to NSA computer servers that try to infect them with an implant.
  • To perform a man-on-the-side attack, the NSA observes a target’s Internet traffic using its global network of covert “accesses” to data as it flows over fiber optic cables or satellites. When the target visits a website that the NSA is able to exploit, the agency’s surveillance sensors alert the TURBINE system, which then “shoots” data packets at the targeted computer’s IP address within a fraction of a second. In one man-on-the-side technique, codenamed QUANTUMHAND, the agency disguises itself as a fake Facebook server. When a target attempts to log in to the social media site, the NSA transmits malicious data packets that trick the target’s computer into thinking they are being sent from the real Facebook. By concealing its malware within what looks like an ordinary Facebook page, the NSA is able to hack into the targeted computer and covertly siphon out data from its hard drive. A top-secret animation demonstrates the tactic in action.
  • The TURBINE implants system does not operate in isolation. It is linked to, and relies upon, a large network of clandestine surveillance “sensors” that the agency has installed at locations across the world.
  • The NSA’s headquarters in Maryland are part of this network, as are eavesdropping bases used by the agency in Misawa, Japan and Menwith Hill, England. The sensors, codenamed TURMOIL, operate as a sort of high-tech surveillance dragnet, monitoring packets of data as they are sent across the Internet. When TURBINE implants exfiltrate data from infected computer systems, the TURMOIL sensors automatically identify the data and return it to the NSA for analysis. And when targets are communicating, the TURMOIL system can be used to send alerts or “tips” to TURBINE, enabling the initiation of a malware attack. The NSA identifies surveillance targets based on a series of data “selectors” as they flow across Internet cables. These selectors, according to internal documents, can include email addresses, IP addresses, or the unique “cookies” containing a username or other identifying information that are sent to a user’s computer by websites such as Google, Facebook, Hotmail, Yahoo, and Twitter. Other selectors the NSA uses can be gleaned from unique Google advertising cookies that track browsing habits, unique encryption key fingerprints that can be traced to a specific user, and computer IDs that are sent across the Internet when a Windows computer crashes or updates.
  • Documents published with this article: Menwith Hill Station Leverages XKeyscore for Quantum Against Yahoo and Hotmail Five Eyes Hacking Large Routers NSA Technology Directorate Analysis of Converged Data Selector Types There Is More Than One Way to Quantum NSA Phishing Tactics and Man in the Middle Attacks Quantum Insert Diagrams The NSA and GCHQ’s QUANTUMTHEORY Hacking Tactics TURBINE and TURMOIL VPN and VOIP Exploitation With HAMMERCHANT and HAMMERSTEIN Industrial-Scale Exploitation Thousands of Implants
  •  
    *Very* long article. Only small portions quoted.
5More

Attempt to jam Russian satellites carried out from Western Ukraine - RT News - 0 views

  • An attempted radio-electronic attack on Russian television satellites from the territory of Western Ukraine has been recorded by the Ministry of Communications. It comes days after Ukraine blocked Russian TV channels, a move criticized by the OSCE. Russian Ministry of Communications experts identified the exact location in Ukraine of the source of attempted jamming of Russian TV satellites’ broadcast, RIA Novosti news agency reports. The ministry noted that “people who make such decisions” to attack Russian satellites that retransmit TV signals, “should think about the consequences,” Ria reports. The ministry did not share any details of the attack.
  • On Thursday, a number of Russian state TV channels websites suffered a large cyber-attack partially coming from Ukraine. Russia’s Channel One website was temporarily unavailable due to a distributed denial-of-service (DDoS) attack. Meanwhile, Russia-24 TV also said it suffered from a “massive network attack.” According to Itar-Tass, the targeted Russian media have connected attacks to their editorial policy of covering the recent events in Ukraine.
  • An international media company in Kiev said it was visited by unknown people armed with knives, who threatened the employees against working with Russian TV channels, RT editor-in-chief Margarita Simonyan wrote on Twitter. The company, which asked for anonymity citing concerns for own safety, said it could no longer work with RT. Intimidation and threats to journalists have lately become common practice in Ukraine with several Russian journalists coming under attack from radicals, says RT correspondent Marina Kosareva. “We have countless of reports of journalists being attacked by those radicals that we’ve seen on Maidan Square as well,” she said. Kosareva cited as an example an incident on March 5 with a pro-Russian journalist, Sergey Rulev who was beaten up and threatened by Ukrainian nationalists “just because he dared to interview riot police [Berkut].” A correspondent for Russiya-24 TV channel, Artyom Kol said he was repeatedly threatened by ultra-nationalist group Right Sector who placed him on a ‘wanted list’ on February 22.
  • ...2 more annotations...
  • On a number of occasions over the last month, Russian journalists were denied entry into Ukraine. On Saturday a photo-journalist from the Russian daily Kommersant, Vasily Shaposhnikov, who was heading to Kiev, was not allowed into the country.
  • Two days earlier, two Kommersant reporters were taken off the train going from Moscow to the Ukrainian city of Nikolayev. The official reason for not allowing them into the country was that they did not have return tickets with them and a sufficient sum of money. According to the new rules of entry, introduced December 4, each foreign citizen traveling to Ukraine must have with them around 3,000 rubles ($85) per day. On March 7, several Russian TV crews were denied entry into Ukraine at the Donetsk airport, prompting a protest by Russia’s Foreign Ministry.
1More

Transnationalism vs. American Sovereignty « Tammy Bruce - 0 views

  •  
    excerpt: "….Transnationalists want to rewrite the laws of war, do away with the death penalty, restrict gun rights and much more-all without having to win popular majorities or heed American constitutional limits. And these advocates are making major strides under an Obama administration that is itself a hotbed of transnational legal thinking…. To be clear, transnationalism isn't a conspiratorial enterprise. In the legal academy, its advocates have openly stated their aims and means. "International law now seeks to influence political outcomes within sovereign States," Anne-Marie Slaughter, then dean of Princeton's public-affairs school, wrote in an influential 2007 essay. International law, she went on, must expand to include "domestic choices previously left to the determination of national political processes" and be able to "alter domestic politics." The preferred entry point for importing foreign norms into American law is the U.S. court system. The Yale Law School scholar Howard Koh, a transnationalist advocate, has written that "domestic courts must play a key role in coordinating U.S. domestic constitutional rules with rules of foreign and international law." Over the past two decades, activist judges have increasingly cited "evolving" international standards to overturn state laws, and Mr. Koh has suggested that foreign norms can be "downloaded" into American law in this manner…. Ms. Slaughter and Mr. Koh held top posts at the State Department during Mr. Obama's first term, and their tenures coincided with an aggressive push to ratify or recognize as customary law… a host of … progressive causes. For proof that the transnationalist threat isn't merely theoretical, look no further than the European Union…. Today over half of the regulations that affect Europeans' lives are made by administrators in Brussels, not by national legislatures. These regulations include the EU's ban, announced in May, on restau
3More

The NSA Reveals That It Does 20 Million Database Queries Per Month | Techdirt - 0 views

  • As we noted earlier today, the NSA's two key "defenses" of the thousands of abuses and violations of the law that recently came out thanks to a leaked document are that there wasn't "intent" to abuse the system (we had no idea that made illegal things legal...) and, second, that it was such a small percentage of the activity that it's really no big deal. Glenn Greenwald quickly noted that the NSA is actually saying "we collect billion of emails and calls every day, so what's a few thousand privacy violations?" hoping that everyone focuses on the second half of the sentence. But the key point is actually the first half of that sentence. In fact, as we noted in that last post, the NSA's top compliance guy actually revealed a startling fact in his attempt to push the meaningless "ratio" of violations to queries: The official, John DeLong, the N.S.A. director of compliance, said that the number of mistakes by the agency was extremely low compared with its overall activities. The report showed about 100 errors by analysts in making queries of databases of already-collected communications data; by comparison, he said, the agency performs about 20 million such queries each month.
  • Again, the ratio is a meaningless number. You're not declared innocent of murder because you didn't happen to murder someone every other day of your life. But, perhaps more important in this is the revelation of the 20 million queries every single month. Or, approximately 600,000 queries every day. How about 25,000 queries every hour? Or 417 queries every minute? Seven queries every single second. Holy crap, that's a lot of queries. Remember, too, that the NSA has insisted that it doesn't datamine its data collection, which is clearly hogwash. That many queries means they're trolling through that database all the time. Remember how the NSA was trying to play down how often it did queries by saying that only 300 phone numbers had been used to "initiate" a query? Yeah, well, once again, it would appear that the NSA was not being fully forthcoming about these sorts of things. Shocking, I know, but I'd imagine they'd claim it was the "least untruthful" answer they could come up with after having a good week or so to answer the question.
  •  
    Edward Snowden already told us that the query "audits" were only seldom-experienced spot checks. The ratio of problems found to the number of queries is totally meaningless. 
2More

Iran blames US for 'gutting deal's draft,' foiling agreement - Israel News, Ynetnews - 0 views

  • Talks were "definitely not a failure," a Western diplomat said earlier on Monday, but the blame game between
  • Zarif said in remarks on an Iranian TV talk show that he is still hopeful a deal will be reached but insists any agreement must include the lifting of all Western sanctions against the Islamic Republic.
3More

Israel and White House Locked in an Info War Over Iran | The Cable - 0 views

  • The White House and Israel are locked in an information war on Capitol Hill, and right now, Israel may be winning. All week, the Obama administration has provided facts and figures to lawmakers on its sanctions relief proposal to build support for a deal on Iran's nuclear program. But some members in Congress don't trust the data U.S. officials are providing -- they trust conflicting data provided privately by senior Israeli officials. According to multiple Congressional aides, Israeli ambassador to the U.S. Ron Dermer and the American Israel Public Affairs Committee are storming Capitol Hill in an effort to discredit the Obama administration's interim nuclear deal with Iran. The effort coincides with a visit by Israel's Minister of Economy Naftali Bennett, who is also speaking with lawmakers on the Hill. The campaign includes one-on-one briefings with lawmakers that provide data that strays from official U.S. assessments.
  • The wide discrepancies led to a major clash of viewpoints during Wednesday's classified briefing between Secretary of State John Kerry and members of the Senate Banking Committee. One GOP Senate aide said the administration repeatedly shot down data cited by senators provided by Israeli officials. "You'd raise the Israeli perspective and they'd say, that's wrong -- the Israelis don't know what they're talking about," the aide told The Cable."The administration would interrupt, 'that information is inaccurate.'"  One of the senators citing Israeli data was Mark Kirk (R-Ill.), who said Kerry's briefing was "anti-Israeli."
  •  
    The continuing saga of Israeli agents lobbying Congress without registering as foreign agents as required by law, with war or peace hanging in the balance.  The last U.S. administration that attempted to enforce that law against Israeli agents was the Kennedy administration. 
9More

Brazil Looks to Break from U.S.-Centric Internet | TIME.com - 0 views

  • Brazil plans to divorce itself from the U.S.-centric Internet over Washington’s widespread online spying, a move that many experts fear will be a potentially dangerous first step toward fracturing a global network built with minimal interference by governments. President Dilma Rousseff ordered a series of measures aimed at greater Brazilian online independence and security following revelations that the U.S. National Security Agency intercepted her communications, hacked into the state-owned Petrobras oil company’s network and spied on Brazilians who entrusted their personal data to U.S. tech companies such as Facebook and Google. The leader is so angered by the espionage that on Tuesday she postponed next month’s scheduled trip to Washington, where she was to be honored with a state dinner. Internet security and policy experts say the Brazilian government’s reaction to information leaked by former NSA contractor Edward Snowden is understandable, but warn it could set the Internet on a course of Balkanization.
  • “The global backlash is only beginning and will get far more severe in coming months,” said Sascha Meinrath, director of the Open Technology Institute at the Washington-based New America Foundation think tank. “This notion of national privacy sovereignty is going to be an increasingly salient issue around the globe.” While Brazil isn’t proposing to bar its citizens from U.S.-based Web services, it wants their data to be stored locally as the nation assumes greater control over Brazilians’ Internet use to protect them from NSA snooping. The danger of mandating that kind of geographic isolation, Meinrath said, is that it could render inoperable popular software applications and services and endanger the Internet’s open, interconnected structure.
  • The effort by Latin America’s biggest economy to digitally isolate itself from U.S. spying not only could be costly and difficult, it could encourage repressive governments to seek greater technical control over the Internet to crush free expression at home, experts say. In December, countries advocating greater “cyber-sovereignty” pushed for such control at an International Telecommunications Union meeting in Dubai, with Western democracies led by the United States and the European Union in opposition.
  • ...5 more annotations...
  • Rousseff says she intends to push for international rules on privacy and security in hardware and software during the U.N. General Assembly meeting later this month. Among Snowden revelations: the NSA has created backdoors in software and Web-based services. Brazil is now pushing more aggressively than any other nation to end U.S. commercial hegemony on the Internet. More than 80 percent of online search, for example, is controlled by U.S.-based companies. Most of Brazil’s global Internet traffic passes through the United States, so Rousseff’s government plans to lay underwater fiber optic cable directly to Europe and also link to all South American nations to create what it hopes will be a network free of U.S. eavesdropping.
  • More communications integrity protection is expected when Telebras, the state-run telecom company, works with partners to oversee the launch in 2016 of Brazil’s first communications satellite, for military and public Internet traffic. Brazil’s military currently relies on a satellite run by Embratel, which Mexican billionaire Carlos Slim controls. Rousseff is urging Brazil’s Congress to compel Facebook, Google and all companies to store data generated by Brazilians on servers physically located inside Brazil in order to shield it from the NSA. If that happens, and other nations follow suit, Silicon Valley’s bottom line could be hit by lost business and higher operating costs: Brazilians rank No. 3 on Facebook and No. 2 on Twitter and YouTube. An August study by a respected U.S. technology policy nonprofit estimated the fallout from the NSA spying scandal could cost the U.S. cloud computing industry, which stores data remotely to give users easy access from any device, as much as $35 billion by 2016 in lost business.
  • Brazil also plans to build more Internet exchange points, places where vast amounts of data are relayed, in order to route Brazilians’ traffic away from potential interception. And its postal service plans by next year to create an encrypted email service that could serve as an alternative to Gmail and Yahoo!, which according to Snowden-leaked documents are among U.S. tech giants that have collaborated closely with the NSA. “Brazil intends to increase its independent Internet connections with other countries,” Rousseff’s office said in an emailed response to questions from The Associated Press on its plans. It cited a “common understanding” between Brazil and the European Union on data privacy, and said “negotiations are underway in South America for the deployment of land connections between all nations.” It said Brazil plans to boost investment in home-grown technology and buy only software and hardware that meet government data privacy specifications.
  • While the plans’ technical details are pending, experts say they will be costly for Brazil and ultimately can be circumvented. Just as people in China and Iran defeat government censors with tools such as “proxy servers,” so could Brazilians bypass their government’s controls. International spies, not just from the United States, also will adjust, experts said. Laying cable to Europe won’t make Brazil safer, they say. The NSA has reportedly tapped into undersea telecoms cables for decades. Meinrath and others argue that what’s needed instead are strong international laws that hold nations accountable for guaranteeing online privacy.
  • “There’s nothing viable that Brazil can really do to protect its citizenry without changing what the U.S. is doing,” he said. Matthew Green, a Johns Hopkins computer security expert, said Brazil won’t protect itself from intrusion by isolating itself digitally. It will also be discouraging technological innovation, he said, by encouraging the entire nation to use a state-sponsored encrypted email service. “It’s sort of like a Soviet socialism of computing,” he said, adding that the U.S. “free-for-all model works better.”
  •  
    So both Brazil and the European Union are planning to boycott the U.S.-based cloud industry, seizing on the NSA's activities as legal grounds. Under the various GATT series of trade agreements, otherwise forbidden discriminatory actions taken that restrict trade in aid of national security are exempt from redress through the World Trade Organization Dispute Resolution Process. So the NSA voyeurs can add legalizing economic digital discrimination against the U.S. to its score card.
4More

NSA could have accessed Google, Yahoo data through private cable provider - RT USA - 0 views

  • A new analysis of the National Security Agency’s covert eavesdropping operations suggests the private American company that supplies the likes of Google and Yahoo with fiber optic cables might have allowed the NSA to infiltrate those networks. Reporters at the New York Times wrote this week that Level 3 Communications — the Colorado-based internet company that manages online traffic for much of North America, Latin America and Europe — is likely responsible for letting the NSA and its British counterpart silently collect troves of sensitive data from the biggest firms on the web.
  • Nearly one month later, an article published this Monday by Nicole Perlroth and John Markoff at the Times says those interception points could have been approved by Level 3, who owns the cable infrastructure that the majority of America’s web traffic travels through. “People knowledgeable about Google and Yahoo’s infrastructure say they believe that government spies bypassed the big Internet companies and hit them at a weak spot — the fiber-optic cables that connect data centers around the world that are owned by companies like Verizon Communications, the BT Group, the Vodafone Group and Level 3 Communications,” Perlroth and Markoff wrote. “In particular, fingers have been pointed at Level 3, the world’s largest so-called Internet backbone provider, whose cables are used by Google and Yahoo.”
  • In a financial report made by the company and obtained by the paper, however, Level 3 is revealed to have much more of a relationship with the government then one that just involves the occasional compliance order. According to that report, the company announced, “We are party to an agreement with the US Departments of Homeland Security, Justice and Defense addressing the US government’s national security and law enforcement concerns. This agreement imposes significant requirements on us related to information storage and management; traffic management; physical, logical and network security arrangements; personnel screening and training and other matters.”
  • ...1 more annotation...
  • When news of the eavesdropping operation surfaced last month, Christopher Soghoian, a technologist at the American Civil Liberties Union, speculated on Twitter that if Level 3 indeed allowed the government to tap its cables, they’d likely not be covered by the same legal protections in the Foreign Intelligence Surveillance Act, or FISA, that let feds conduct widespread surveillance over private companies’ data. If Level 3 voluntarily let NSA/GCHQ tap Google's data, the immunity available via FISA 702 orders won't apply and they can be sued.
10More

Exclusive: Inside America's Plan to Kill Online Privacy Rights Everywhere | The Cable - 0 views

  • The United States and its key intelligence allies are quietly working behind the scenes to kneecap a mounting movement in the United Nations to promote a universal human right to online privacy, according to diplomatic sources and an internal American government document obtained by The Cable. The diplomatic battle is playing out in an obscure U.N. General Assembly committee that is considering a proposal by Brazil and Germany to place constraints on unchecked internet surveillance by the National Security Agency and other foreign intelligence services. American representatives have made it clear that they won't tolerate such checks on their global surveillance network. The stakes are high, particularly in Washington -- which is seeking to contain an international backlash against NSA spying -- and in Brasilia, where Brazilian President Dilma Roussef is personally involved in monitoring the U.N. negotiations.
  • The Brazilian and German initiative seeks to apply the right to privacy, which is enshrined in the International Covenant on Civil and Political Rights (ICCPR), to online communications. Their proposal, first revealed by The Cable, affirms a "right to privacy that is not to be subjected to arbitrary or unlawful interference with their privacy, family, home, or correspondence." It notes that while public safety may "justify the gathering and protection of certain sensitive information," nations "must ensure full compliance" with international human rights laws. A final version the text is scheduled to be presented to U.N. members on Wednesday evening and the resolution is expected to be adopted next week. A draft of the resolution, which was obtained by The Cable, calls on states to "to respect and protect the right to privacy," asserting that the "same rights that people have offline must also be protected online, including the right to privacy." It also requests the U.N. high commissioner for human rights, Navi Pillay, present the U.N. General Assembly next year with a report on the protection and promotion of the right to privacy, a provision that will ensure the issue remains on the front burner.
  • Publicly, U.S. representatives say they're open to an affirmation of privacy rights. "The United States takes very seriously our international legal obligations, including those under the International Covenant on Civil and Political Rights," Kurtis Cooper, a spokesman for the U.S. mission to the United Nations, said in an email. "We have been actively and constructively negotiating to ensure that the resolution promotes human rights and is consistent with those obligations." But privately, American diplomats are pushing hard to kill a provision of the Brazilian and German draft which states that "extraterritorial surveillance" and mass interception of communications, personal information, and metadata may constitute a violation of human rights. The United States and its allies, according to diplomats, outside observers, and documents, contend that the Covenant on Civil and Political Rights does not apply to foreign espionage.
  • ...6 more annotations...
  • n recent days, the United States circulated to its allies a confidential paper highlighting American objectives in the negotiations, "Right to Privacy in the Digital Age -- U.S. Redlines." It calls for changing the Brazilian and German text so "that references to privacy rights are referring explicitly to States' obligations under ICCPR and remove suggestion that such obligations apply extraterritorially." In other words: America wants to make sure it preserves the right to spy overseas. The U.S. paper also calls on governments to promote amendments that would weaken Brazil's and Germany's contention that some "highly intrusive" acts of online espionage may constitute a violation of freedom of expression. Instead, the United States wants to limit the focus to illegal surveillance -- which the American government claims it never, ever does. Collecting information on tens of millions of people around the world is perfectly acceptable, the Obama administration has repeatedly said. It's authorized by U.S. statute, overseen by Congress, and approved by American courts.
  • "Recall that the USG's [U.S. government's] collection activities that have been disclosed are lawful collections done in a manner protective of privacy rights," the paper states. "So a paragraph expressing concern about illegal surveillance is one with which we would agree." The privacy resolution, like most General Assembly decisions, is neither legally binding nor enforceable by any international court. But international lawyers say it is important because it creates the basis for an international consensus -- referred to as "soft law" -- that over time will make it harder and harder for the United States to argue that its mass collection of foreigners' data is lawful and in conformity with human rights norms. "They want to be able to say ‘we haven't broken the law, we're not breaking the law, and we won't break the law,'" said Dinah PoKempner, the general counsel for Human Rights Watch, who has been tracking the negotiations. The United States, she added, wants to be able to maintain that "we have the freedom to scoop up anything we want through the massive surveillance of foreigners because we have no legal obligations."
  • The United States negotiators have been pressing their case behind the scenes, raising concerns that the assertion of extraterritorial human rights could constrain America's effort to go after international terrorists. But Washington has remained relatively muted about their concerns in the U.N. negotiating sessions. According to one diplomat, "the United States has been very much in the backseat," leaving it to its allies, Australia, Britain, and Canada, to take the lead. There is no extraterritorial obligation on states "to comply with human rights," explained one diplomat who supports the U.S. position. "The obligation is on states to uphold the human rights of citizens within their territory and areas of their jurisdictions."
  • The position, according to Jamil Dakwar, the director of the American Civil Liberties Union's Human Rights Program, has little international backing. The International Court of Justice, the U.N. Human Rights Committee, and the European Court have all asserted that states do have an obligation to comply with human rights laws beyond their own borders, he noted. "Governments do have obligation beyond their territories," said Dakwar, particularly in situations, like the Guantanamo Bay detention center, where the United States exercises "effective control" over the lives of the detainees. Both PoKempner and Dakwar suggested that courts may also judge that the U.S. dominance of the Internet places special legal obligations on it to ensure the protection of users' human rights.
  • "It's clear that when the United States is conducting surveillance, these decisions and operations start in the United States, the servers are at NSA headquarters, and the capabilities are mainly in the United States," he said. "To argue that they have no human rights obligations overseas is dangerous because it sends a message that there is void in terms of human rights protection outside countries territory. It's going back to the idea that you can create a legal black hole where there is no applicable law." There were signs emerging on Wednesday that America may have been making ground in pressing the Brazilians and Germans to back on one of its toughest provisions. In an effort to address the concerns of the U.S. and its allies, Brazil and Germany agreed to soften the language suggesting that mass surveillance may constitute a violation of human rights. Instead, it simply deep "concern at the negative impact" that extraterritorial surveillance "may have on the exercise of and enjoyment of human rights." The U.S., however, has not yet indicated it would support the revised proposal.
  • The concession "is regrettable. But it’s not the end of the battle by any means," said Human Rights Watch’s PoKempner. She added that there will soon be another opportunity to corral America's spies: a U.N. discussion on possible human rights violations as a result of extraterritorial surveillance will soon be taken up by the U.N. High commissioner.
  •  
    Woo-hoo! Go get'em, U.N.
2More

The Government's Secret Plan to Shut Off Cellphones and the Internet, Explained | Conne... - 0 views

  • This month, the United States District Court for the District of Columbia ruled that the Department of Homeland Security must make its plan to shut off the Internet and cellphone communications available to the American public. You, of course, may now be thinking: What plan?! Though President Barack Obama swiftly disapproved of ousted Egyptian President Hosni Mubarak turning off the Internet in his country (to quell widespread civil disobedience) in 2011, the US government has the authority to do the same sort of thing, under a plan that was devised during the George W. Bush administration. Many details of the government’s controversial “kill switch” authority have been classified, such as the conditions under which it can be implemented and how the switch can be used. But thanks to a Freedom of Information Act lawsuit filed by the Electronic Privacy Information Center (EPIC), DHS has to reveal those details by December 12 — or mount an appeal. (The smart betting is on an appeal, since DHS has fought to release this information so far.) Yet here’s what we do know about the government’s “kill switch” plan:
  • What are the constitutional problems? Civil liberties advocates argue that kill switches violate the First Amendment and pose a problem because they aren’t subject to rigorous judicial and congressional oversight. “There is no court in the loop at all, at any stage in the SOP 303 process,” according to the Center for Democracy and Technology. ”The executive branch, untethered by the checks and balances of court oversight, clear instruction from Congress, or transparency to the public, is free to act as it will and in secret.” David Jacobs of EPIC says, “Cutting off communications imposes a prior restraint on speech, so the First Amendment imposes the strictest of limitations…We don’t know how DHS thinks [the kill switch] is consistent with the First Amendment.” He adds, “Such a policy, unbounded by clear rules and oversight, just invites abuse.”
4More

Committee to Protect Journalists issues scathing report on Obama administration | Glenn... - 0 views

  • It's hardly news that the Obama administration is intensely and, in many respects, unprecedentedly hostile toward the news-gathering process. Even the most Obama-friendly journals have warned of what they call "Obama's war on whistleblowers". James Goodale, the former general counsel of the New York Times during its epic fights with the Nixon administration, recently observed that "President Obama wants to criminalize the reporting of national security information" and added: "President Obama will surely pass President Richard Nixon as the worst president ever on issues of national security and press freedom."Still, a new report released today by the highly respected Committee to Protect Journalists - its first-ever on press freedoms in the US - powerfully underscores just how extreme is the threat to press freedom posed by this administration. Written by former Washington Post executive editor Leonard Downie, Jr., the report offers a comprehensive survey of the multiple ways that the Obama presidency has ushered in a paralyzing climate of fear for journalists and sources alike, one that severely threatens the news-gathering process.The first sentence: "In the Obama administration's Washington, government officials are increasingly afraid to talk to the press."
  • It quotes New York Times national security reporter Scott Shane as saying that sources are "scared to death." It quotes New York Times reporter David Sanger as saying that "this is the most closed, control freak administration I've ever covered." And it notes that New York Times public editor Margaret Sullivan previously wrote that "it's turning out to be the administration of unprecedented secrecy and unprecedented attacks on a free press."Based on all this, Downie himself concludes:The administration's war on leaks and other efforts to control information are the most aggressive I've seen since the Nixon administration, when I was one of the editors involved in The Washington Post's investigation of Watergate. The 30 experienced Washington journalists at a variety of news organizations whom I interviewed for this report could not remember any precedent."And this pernicious dynamic extends far beyond national security: "Ellen Weiss, Washington bureau chief for E.W. Scripps newspapers and stations, said 'the Obama administration is far worse than the Bush administration' in trying to thwart accountability reporting about government agencies." It identifies at least a dozen other long-time journalists making similar observations.
  • The report ends by noting the glaring irony that Obama aggressively campaigned on a pledge to usher in The Most Transparent Administration Ever™. Instead, as the New Yorker's investigative reporter Jane Mayer recently said about the Obama administration's attacks: "It's a huge impediment to reporting, and so chilling isn't quite strong enough, it's more like freezing the whole process into a standstill."
  •  
    Note how Obama is not winning over the press with his legislation to give reporters for mainstream media a special privilege from some types of surveillance. When last I checked, that effort had bogged down in the effort to define "journalist" in a way that did not include every blogger on the planet. Small wonder: the Supreme Court has repeatedly held that there is no constitutional basis for a special protection for journalists *because the lone, anonymous pamphleteer has the same Freedom of the Press that mainstream journalists have.* I rarely make absolute predictions about what courts will do in the future, but this is black-letter First Amendment law. The legislation is doomed to be voided by the courts even if passed. Big, big denial of equal protection by the First Amendment. There is no alternative to ending the government surveillance except forfeiture of our freedoms.   
6More

Why Turkey wanted to provoke war with a 'false flag' terrorist attack on Syria - Stop t... - 0 views

  • A leaked talk by high-ranking Turkish officials reveals them talking about how easy it would be to create a false flag incident, and how they could use that to justify a wide military intervention inside Syria.
  • It was stunning to hear the highest-ranking Turks causally discussing how to provoke a false flag incident that would justify a large military intervention in Syria. This is a big deal because Turkish troops in Syria opens the door to NATO troops in Syria, which drastically expands the conflict. As someone who has spent a number of years living and working in the Middle East, and having been to Syria multiple times, I was encouraged by my colleagues at Casey Research to share my perspective on this.
  • Turkey owns a very small piece of territory inside of Syria that dates back to the Ottoman Empire. This small piece of land is the tomb of Suleyman Shah, a relative of one of the founding Ottomans. It’s guarded by 24 Turkish troops and is considered sovereign Turkish territory. Having Turkish troops in this area is not controversial, as the Syrian government has long agreed to it. The region where this tomb is located has totally fallen out of the Syrian government’s control for many months. And now, the hardcore ISIL group controls the surrounding area. It has threatened the Turkish soldiers and told them to leave. The Turks refused, and that’s why the Turkish government is getting skittish. This is where the leaked tape comes in.
  • ...3 more annotations...
  • The conversation started out with the Turks talking about how they can protect this tomb from ISIL. This is not controversial. I don’t believe the Syrian government would care about the Turks intervening to protect the tomb, since this is an area where it has lost control anyways. Plus, I’d bet the Syrian government would be happy to see the Turks bogged down fighting ISIL militants who’d otherwise be fighting them. However, that was not the end of the conversation. The really sinister part comes when the high-ranking Turks talk about how easy it would be to create a false flag incident involving the tomb, and how they could use that to justify a much wider military intervention inside Syria. Such an incident would be a sort of foot in the door to further military activities inside Syria and would allow the Turks to help their favored rebel groups, which have seen serious setbacks lately.
  • That step would clearly cause them to go to war with the Syrian government and drastically expand the conflict. And once Turkey is involved inside Syria, that opens the door for NATO to be involved. The Erdogan government has staked a huge amount of domestic political capital by supporting the Syrian rebels. They gambled that their favored rebel groups would quickly win and as a result, Turkey would have more geopolitical influence in a post-Assad Syria. It was a losing bet. Turkey’s favored rebels have seriously faltered, and a growing number of Turkish voters have become skeptical of their government’s intervention and the blowback it’s causing. A false flag incident with the tomb would be a way for Erdogan to double down in a desperate attempt to turn things around in Syria. Whoever leaked this conversation clearly timed it to take the wind out the sails of such a strategy.
  • There are only a few people with the capability and motivation to do this. As an ally of the Syrian government, Russian intelligence is at the top of that list. They have leaked similarly shocking private conversations in Ukraine recently. Members of the Turkish military opposed to Erdogan could have also done it. Instead of coming up with a classy way of saying “touché,” the Turkish government responded by throwing a childish fit, futilely trying to block YouTube and Twitter. In this digital age, restricting Internet access, seizing and spying on digital data, and otherwise tampering with an individual’s digital presence have become new tools in the traditional toolbox of desperate governments.
2More

For All the Hype, the Uninsured Rate Is the Same As It Was At The Beginning of Obama's ... - 0 views

  • Obamacare Is All Hype Progressive writer Matt Stoller tweets: For all the hype, the uninsured rate is the same as it was at the beginning of Obama’s term Stoller links to a new Gallup poll which finds: The uninsured rate is now at the lowest level recorded since late 2008.
  •  
    See also the graph on the linked page.
6More

Media Blackout over Syria | Global Research - 0 views

  • On April 6, The London Review of Books published in its online journal Seymour Hersh’s “The Red Line and the Rat Line.” Hersh continues to expose details surrounding the staged August 21 chemical attack incident in Syria, which apparently pretty much everyone in Washington’s intelligence bureaucracy suspected was carried out by the rebels as soon as it happened. Seymour Hersh is a Pulitzer Prize winning journalist whose 40+ years career includes the exposing of the My Lai Massacre  and its cover-up, as well as the Abu Ghraib prison scandal. His December 19 report, “Whose Sarin?” -was his first report to expose the Syria chemical attack hoax based on close contact with US Intelligence officials. While “Whose Sarin” was originally prepared for the Washington Post, the newspaper rejected it and a media blackout followed in American press. Currently, Hersh’s newest investigative findings are going unacknowledged in mainstream US media.
  • Hersh’s report confirms the following: Obama’s push for attack on Syria was halted last minute when evidence that the Syrian government had nothing to do with the August 21 chemical attack became too overwhelming It had been well known to US government officials throughout the summer of 2013 that Turkish PM Erdogan was supporting al-Nusra Front in attempts to manufacture Sarin US military knew of Turkish and Saudi program for bulk Sarin production inside Syria from the spring of 2013 UN inspectors knew the rebels were using chemical weapons on the battlefield since the spring of 2013 As a result of the staged chemical incident, the White House ordered readiness for a “monster strike” on Syria, which included “two B-22 air wings and two thousand pound bombs” -and a target list which included military and civilian infrastructure targets (note: most of these are in densely populated civilian areas)
  • Full military strike was set for September 2 UK defense officials relayed to their American counterparts in the lead up to planned attack: “We’re being set up here.” CIA, MI6, Saudi Arabia, Qatar, and Turkey set up a “rat line” back in 2012 to run Libyan weapons into Syria via Turkey, including MANPADS; the Benghazi consulate was headquarters for the operation Obama OK’ed Turkish-Iranian gold export scam (that went from March 2012 to July 2013) which erupted in a Turkish scandal that nearly brought down the Erdogan government US Intelligence community had immediate doubts about Syrian regime responsibility for Aug. 21 attack, yet “reluctant to contradict the president” US government will not expose continued Turkey support of terrorism simply because “they’re a NATO ally”
  • ...2 more annotations...
  • In addition, last Thursday freelance Middle East journalist Sara Elizabeth Williams broke the story of a CIA/US Military run training camp for Syrian rebels in the Jordanian desert. VICE UK ran her story, “I Learned to Fight Like an American at the FSA Training Camp in Jordan,” yet it too failed to make it across the Atlantic into American reporting. International Syria experts thought her story hugely significant, but it got little attention. Top Syria expert in the US, Joshua Landis, announced on his Twitter account Thursday: “Sara Williams gets the scoop on the top secret FSA Training Camp in Jordan.” This courageous young freelancer revealed, with photos, the ins and outs of this secretive facility -yet the mainstream carefully shielded Americans from knowledge of the explosive report. In email conversation with her this weekend, Williams told me: “The access was tough to get, but I think it was worth the effort: to my mind, it’s important that people know what their government is doing in their name, with their tax dollars.” According to her investigative report:
  • Confirmed: “US-run training camp” for Syrian rebels in Northern Jordan Rebel recruits go “off the grid” while in secretive training camp Rebel fighter: “The Americans who taught us wore military uniforms I did not recognize. We called them by their first names and they spoke English to us.” Camp awash with “American food and American dollars”: recruits eat Kentucky Fried Chicken and live in temporary “pre-fabricated housing” units Recruits sent through intense 40 day program, which includes exercise, training in anti-tank missiles, and boot camp style atmosphere with orders given by US military instructors Upon graduation, US trained insurgents slip back across Syria’s southern border Experts say there are more camps like this one American trained rebel insurgent says: “America is benefiting from the destruction and the killing in order to weaken both sides.”
  •  
    It really says something about mainstream media when a story as explosive as Sy Hersh's new report on Obama's decision to postpone and then cancel military strikes on Syria is ignored by mainstream media. Hersh is one of the most respected of American war and intelligence journalists. 
4More

BBC News - Google and Facebook can be legally intercepted, says UK spy boss - 0 views

  • UK intelligence service GCHQ can legally snoop on British use of Google, Facebook and web-based email without specific warrants because the firms are based abroad, the government has said. Classed as "external communications", such activity can be covered by a broad warrant and intercepted without extra clearance, spy boss Charles Farr said. The policy was revealed as part of a legal battle with campaign group Privacy International (PI). PI labelled the policy "patronising".
  • Charles Farr, director general of the Office for Security and Counter-Terrorism, told PI that Facebook, Twitter, YouTube and web searches on Google - as well as webmail services such as Hotmail and Yahoo - were classified as "external communications", which meant they could be intercepted without the need for additional legal clearance. Internal communications between citizens can only be intercepted when a targeted warrant is issued. Warrants must be signed by a minister and can only be issued when there is suspicion of illegal activity. But when someone searches for something on Google or posts on Facebook they are sending information overseas - constituting an act of external communication that could be collected under a broader warrant which does not need to be signed by a minister, explained Mr Farr in a 48-page written statement.
  • However, he said data collected in this way "cannot be read, looked at or listened to" except in strictly limited circumstances. Mr Farr said there was a "significant distinction" between intercepting material and a person actually reading, looking at or listening it.
  •  
    Well, that should ratchet up the controversy scale in the UK a bit. :-) 
3More

Islamic Jihadis Take Over Second-Biggest City In Iraq ... But Al Qaeda Wasn't Even IN I... - 0 views

  • Here are the number of terror attacks in Iraq between 1979 and 2011 courtesy of the National Consortium for the Study of Terrorism and Responses to Terrorism Global Terrorism Database (part of a joint government-university program on terrorism, is hosted at the University of Maryland):
  • Al Qaeda wasn’t even in Iraq until the U.S. invaded that country. And U.S. policy in Libya is partly responsible for sending an influx of Al Qaeda terrorists – and heavy weapons – into Iraq. And now things are getting a whole lot worse … You may not have heard, but Al Qaeda allies took over the Iraqi city of Fallujah 6 months ago. And today, Al Qaeda-linked extremists in Iraq captured Iraq’s second-biggest city, the major oil center of Mosul.
  • To make matters worse, the army fled, so the militants seized huge caches of U.S. supplied weapons, including humvees:
6More

Pentagon preparing for mass civil breakdown | Nafeez Ahmed | Environment | theguardian.com - 0 views

  • A US Department of Defense (DoD) research programme is funding universities to model the dynamics, risks and tipping points for large-scale civil unrest across the world, under the supervision of various US military agencies. The multi-million dollar programme is designed to develop immediate and long-term "warfighter-relevant insights" for senior officials and decision makers in "the defense policy community," and to inform policy implemented by "combatant commands." Launched in 2008 – the year of the global banking crisis – the DoD 'Minerva Research Initiative' partners with universities "to improve DoD's basic understanding of the social, cultural, behavioral, and political forces that shape regions of the world of strategic importance to the US."
  • According to Prof David Price, a cultural anthropologist at St Martin's University in Washington DC and author of Weaponizing Anthropology: Social Science in Service of the Militarized State, "when you looked at the individual bits of many of these projects they sort of looked like normal social science, textual analysis, historical research, and so on, but when you added these bits up they all shared themes of legibility with all the distortions of over-simplification. Minerva is farming out the piece-work of empire in ways that can allow individuals to disassociate their individual contributions from the larger project."Prof Price has previously exposed how the Pentagon's Human Terrain Systems (HTS) programme - designed to embed social scientists in military field operations - routinely conducted training scenarios set in regions "within the United States." Citing a summary critique of the programme sent to HTS directors by a former employee, Price reported that the HTS training scenarios "adapted COIN [counterinsurgency] for Afghanistan/Iraq" to domestic situations "in the USA where the local population was seen from the military perspective as threatening the established balance of power and influence, and challenging law and order."
  • Last year, the DoD's Minerva Initiative funded a project to determine 'Who Does Not Become a Terrorist, and Why?' which, however, conflates peaceful activists with "supporters of political violence" who are different from terrorists only in that they do not embark on "armed militancy" themselves. The project explicitly sets out to study non-violent activists
  • ...3 more annotations...
  • Twitter posts and conversations will be examined "to identify individuals mobilised in a social contagion and when they become mobilised."
  • One war-game, said Price, involved environmental activists protesting pollution from a coal-fired plant near Missouri, some of whom were members of the well-known environmental NGO Sierra Club. Participants were tasked to "identify those who were 'problem-solvers' and those who were 'problem-causers,' and the rest of the population whom would be the target of the information operations to move their Center of Gravity toward that set of viewpoints and values which was the 'desired end-state' of the military's strategy."Such war-games are consistent with a raft of Pentagon planning documents which suggest that National Security Agency (NSA) mass surveillance is partially motivated to prepare for the destabilising impact of coming environmental, energy and economic shocks.
  • Minerva is a prime example of the deeply narrow-minded and self-defeating nature of military ideology. Worse still, the unwillingness of DoD officials to answer the most basic questions is symptomatic of a simple fact – in their unswerving mission to defend an increasingly unpopular global system serving the interests of a tiny minority, security agencies have no qualms about painting the rest of us as potential terrorists.
1More

Syria hands over last of declared chemical weapons - Washington Times - 0 views

  • The organization charged with overseeing the destruction of Syria’s chemical weapons program says the last of the country’s acknowledged stockpile has been handed over.Organization for the Prohibition of Chemical Weapons director general Ahmet Uzumcu said Monday the final 8 percent of the 1,300-ton stockpile has been loaded onto ships in the Syrian port of Latakia. Uzumcu was speaking at a press conference in The Hague.
5More

Edward Snowden was targeted by Russian spies 6 years BEFORE he exposed US secrets - Mir... - 0 views

  • Ex-KGB Major Boris Karpichkov said spies from Russia’s SVR intelligence service posing as ­diplomats tricked Snowden into ­seeking asylum in Russia
  • Russian spies had whistleblower Edward Snowden in their sights SIX YEARS before he exposed US secrets, reports the Sunday People.Moscow believed the cyber wizard working for the CIA in Geneva was ripe for defection in 2007 and opened a file on him, says a KGB defector.But secret agents did not swoop until last year when Snowden, 30, fled to Hong Kong with 1.7 million top secret documents which he leaked to the media.Ex-KGB Major Boris Karpichkov said spies from Russia’s SVR intelligence service posing as ­diplomats tricked Snowden into ­seeking asylum in Russia.And when the turncoat went there the information was leaked to ­provoke the US into cancelling his passport , so restricting his movements, said Karpichkov.
  • “He wasn’t a Russian spy before he went to Moscow . But death threats have frightened him."These threats were a carefully planned operation by the Russian security services to make Snowden stay in Russia.“Snowden cannot leave Moscow even if he wanted as the Americans have cancelled his passport.”He was admitted to the country on a 12-month renewable visa.But Karpichkov said Snowden’s flight to Moscow was deliberately leaked by the Russians to provoke the Americans into just such an action.
  • ...1 more annotation...
  • Last week the Sunday People ­revealed how Snowden has given so much away about how our GCHQ eavesdroppers gather information on Islamist killers that officials have been forced to set up new procedures.This week it has emerged that GCHQ staff named by Snowden have made plans to rush their partners and kids to safety should they become targets for terrorists.A senior Whitehall source told us: “Parts of the radar have gone dark and that is very worrying. Snowden has committed the worst kind of treachery.”Karpichkov agreed.He said: “There is no doubt he has put Britain and America in grave danger.”
  •  
    To say I am dubious is a gross understatement. From the publication of his first leaked document, the western military intelligence/industrial complex has been attempting to kill the messenger rather than address the message. The meme that he defected to the Russians has been making the rounds for months, but without any supporting allegations, ignoring that his stay in Russia while in transit to Ecuador was the result of the U.S. pulling his passport. Now we have a story in a British yellow-journalism tabloid fairly infamous for publishing hoaxes that meets that criticism, Suddenly, we are told by a former KGB officer that Russian intelligence maneuvered the U.S. into pulling Snowden's passport while Snowden was on layover in Moscow during his travel from Hong Kong to South America.  But the public opinion polls have been moving in the civil libertarians' direction so an escalation in the quality of attacks on Snowden has been entirely predictable. And of course the article ends with an ad hominem "treachery attack on Snowden attributed to GCHQ and an anonymous "senior Whitehall source."  It will be interesting to see what Snowden and Glenn Greenwald have to say about this. If you're interested in the background of the ex-KBG officer, the following Google query will get you lots of information: +kgb +"boris karpichkov" -Snowden  
7More

Land Destroyer: America's Covert Re-Invasion of Iraq - 0 views

  • mage: ISIS clearly did not materialize spontaneously within Iraq, it hasclearly redeployed from its NATO-sponsored destruction of Syria to northern Iraq, perhaps in an attempt to justify a NATO incursion and thecreation of a buffer zone straddling Syrian, Iraqi, and even possibly Iranian territory with the goal of targeting Iran directly with ISIS.   June 13, 2014 (Tony Cartalucci - LD) - Heavily armed, well funded, and organized as a professional, standing army, the forces of the Islamic State of Iraq and Syria (ISIS) swept southward into Iraq from Turkey and northeastern Syria, taking the cities of Mosul and Tikrit, and now threaten the Iraqi capital city of Baghdad itself. The United States was sure to prop up two unfounded narratives - the first being that US intelligence agencies, despite assets in Iraq and above it in the form of surveillance drones, failed to give warning of the invasion, and that ISIS is some sort of self-sustaining terror organization carving out a "state" by "robbing banks" and collecting "donations" on Twitter. The Wall Street Journal in its report, "Iraqi Drama Catches U.S. Off Guard," stated: The quickly unfolding drama prompted a White House meeting Wednesday of top policy makers and military leaders who were caught off guard by the swift collapse of Iraqi security forces, officials acknowledged.
  • mage: ISIS has convoys of brand new matching Toyota's the samevehicles seen among admittedly NATO-armed terrorists operatingeverywhere from Libya to Syria, and now Iraq. It is a synthetic, state-sponsored regional mercenary expeditionary force.
  • The question remains, if a Lebanese newspaper knew ISIS was on the move eastward, why didn't the CIA? The obvious answer is the CIA did know, and is simply feigning ignorance at the expense of their reputation to bait its enemies into suspecting the agency of  incompetency rather than complicity in the horrific terroristic swath ISIS is now carving through northern Iraq. Described extensively in the full New Eastern Outlook Journal (NEO) report, "NATO’s Terror Hordes in Iraq a Pretext for Syria Invasion," the United States, Turkey, Saudi Arabia, and Qatar, have funded and armed terrorists operating in Syria for the past 3 years to the tune of hundreds of millions of dollars - coincidentally the same amount that ISIS would require to gain primacy among militant groups fighting in Syria and to mobilize forces capable of crossing into Iraq and overwhelming Baghdad's national defenses.
  • ...4 more annotations...
  • a 3-year ongoing CIA program (here, here, and here) all along the Turkish-Syrian border to "monitor" and "arm" "moderate" militants fighting the Syrian government, the US claims it was caught "by surprise." If drones and CIA operatives operating in ISIS territory weren't enough to detect the impending invasion, perhaps the CIA should have just picked up a newspaper.Indeed, the Lebanon Daily Start in March 2014 reported that ISIS openly withdrew its forces from Latakia and Idlib provinces in western Syria, and redeployed them in Syria's east - along the Syrian-Iraqi border. The article titled, "Al-Qaeda splinter group in Syria leaves two provinces: activists," stated explicitly that: On Friday, ISIS – which alienated many rebels by seizing territory and killing rival commanders – finished withdrawing from the Idlib and Latakia provinces and moved its forces toward the eastern Raqqa province and the eastern outskirts of the northern city of Aleppo, activists said.
  • The NEO report includes links to the US Army’s West Point Countering Terrorism Center reports, “Bombers, Bank Accounts and Bleedout: al-Qa’ida’s Road In and Out of Iraq,” and “Al-Qa’ida’s Foreign Fighters in Iraq,” which detail extensively the terror network used to flood Iraq with foreign terrorists, weapons, and cash to fuel an artificial "sectarian war" during the US occupation, and then turned over to flood Syria with terrorists in the West's bid to overthrow the government in Damascus. What's ISIS Doing in Iraq? The NEO report would also post Seymour Hersh's 2007 article, "The Redirection," documenting over the course of 9 pages US, Saudi, and Israeli intentions to create and deploy sectarian extremists region-wide to confront Iran, Syria, and Hezbollah in Lebanon. Hersh would note that these "sectarian extremists" were either tied to Al Qaeda, or Al Qaeda itself. The ISIS army moving toward Baghdad is the final manifestation of this conspiracy, a standing army operating with impunity, threatening to topple the Syrian government, purge pro-Iranian forces in Iraq, and even threatening Iran itself by building a bridge from Al Qaeda's NATO safe havens in Turkey, across northern Iraq, and up to Iran's borders directly. Labeled "terrorists" by the West, grants the West plausible deniability in its creation, deployment, and across the broad spectrum of atrocities it is now carrying out.  
  • It is a defacto re-invasion of Iraq by Western interests - but this time without Western forces directly participating - rather a proxy force the West is desperately attempting to disavow any knowledge of or any connection to. However, no other explanation can account for the size and prowess of ISIS beyond state sponsorship. And since ISIS is the clear benefactor of state sponsorship, the question is, which states are sponsoring it? With Iraq, Syria, and Iran along with Lebanese-based Hezbollah locked in armed struggle with ISIS and other Al Qaeda franchises across the region, the only blocs left are NATO and the GCC (Saudi Arabia and Qatar in particular).
  • With the West declaring ISIS fully villainous in an attempt to intervene more directly in northern Iraq and eastern Syria, creating a long desired "buffer zone" within which to harbor, arm, and fund an even larger terrorist expeditionary force, Syria, Iraq, Iran, and others are offered an opportunity to preempt Western involvement and to crush the ISIS - cornering and eliminating NATO-GCC's expeditionary force while scoring geopolitical points of vanquishing Washington's latest "villain." Joint Iraq-Iranian operations in the north and south of ISIS's locations, and just along Turkey's borders could envelop and trap ISIS to then be whittled down and destroyed - just as Syria has been doing to NATO's proxy terrorist forces within its own borders.Whatever the regional outcome may be, the fact is the West has re-invaded Iraq, with a force as brutal, if not worse than the "shock and awe" doctrine of 2003. Iraq faces another difficult occupation if it cannot summon a response from within, and among its allies abroad, to counter and crush this threat with utmost expediency.
« First ‹ Previous 161 - 180 of 267 Next › Last »
Showing 20 items per page