Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged warnings

Rss Feed Group items tagged

Paul Merrell

Putin condemns Turkey after Russian warplane downed near Syria border | World news | Th... - 0 views

  • Vladimir Putin has called Turkey “accomplices of terrorists” and warned of “serious consequences” after a Turkish F-16 jet shot down a Russian warplane on Tuesday morning, the first time a Nato country and Moscow have exchanged direct fire over the crisis in Syria. The Russian president, speaking before a meeting with King Abdullah II of Jordan in Sochi, said the plane had been shot down over Syrian airspace and fell 4km inside Syria. Putin said it was “obvious” the plane posed no threat to Turkey.
  • “Our military is doing heroic work against terrorism … But the loss today is a stab in the back, carried out by the accomplices of terrorists. I can’t describe it in any other way,” he said. Putin suggested the Turks were shielding Islamic State terrorists from Russian attacks, saying: “Do they want to make Nato serve Isis?” Ankara and the Kremlin gave conflicting accounts of the incident, which appears to have occurred in an area near the Turkish-Syrian border straddling Iskenderun and Latakia. The Turkish military said it scrambled two F-16 fighter jets after a plane entered Turkish airspace in the province of Hatay at 9.20am on Tuesday, warning it to leave 10 times in five minutes before shooting it down. A government official said: “In line with the military rules of engagement, the Turkish authorities repeatedly warned an unidentified aircraft that they were 15km or less away from the border. The aircraft didn’t heed the warnings and proceeded to fly over Turkey. The Turkish air forces responded by downing the aircraft.
  • “This isn’t an action against any specific country: our F-16s took necessary steps to defend Turkey’s sovereign territory.” Russia’s defence ministry, in a series of tweets, confirmed that a Russian Su-24 had been shot down, but insisted the plane had never left Syrian airspace and claimed that fire from the ground was responsible. “At all times, the Su-24 was exclusively over the territory of Syria,” the defence ministry said. “The Su-24 was at 6,000 metres and preliminary information suggests it was brought down by fire from the ground. The circumstances are being investigated.” A rebel brigade in Syria said both pilots had been shot dead as they parachuted from the jet. The Turkish TV network CNN Türk reported that one of the pilots was found dead. A graphic video purporting to show a dead Russian pilot has been widely circulated.
  • ...3 more annotations...
  • The UK-based Syrian Observatory for Human Rights said Russian helicopters were combing the crash site area in Jabal al-Turkman in Syria’s northern Latakia province for the pilots, and have apparently blocked wireless communications.
  • Sinan Ülgen, a former Turkish diplomat who is now the chairman of the Edam thinktank in Istanbul, said Tuesday’s incident had been coming for some time. “There were two airspace violations [in the past few weeks], and after that a very high-level Russian military delegation came to Turkey to talk about it, including a top air force official. They apologised for one of the incidents, saying that in that case the Russian pilot didn’t speak the language. So we thought we had an understanding and solved the problem. “So it’s a surprise that it happened since that visit,” said Ülgen. “But it’s not a surprise in terms of Russian strategy. Since the intervention the Russians have been testing the Turkish response at its borders and its rules of engagement. “In this case, the pilot was warned a number of times. First at 13 miles out from the Turkish border, and then at five miles out, which is when Turkish jets scramble. It went past all those thresholds,” he said.
  • Putin said there would be “serious consequences” for Russia-Turkish relations. “We have always treated Turkey as a friendly state. I don’t know who was interested in what happened today, certainly not us. And instead of immediately getting in contact with us, as far as we know, the Turkish side immediately turned to their partners from Nato to discuss this incident, as if we shot down their plane and not they ours.” Turkey opposes Assad and has condemned the Russian intervention for targeting rebels not affiliated with the terror group Islamic State. The latest incident highlights the grave risks of clashes of arms between the various international forces that have intervened in Syria. A coalition led by the US is conducting an campaign against Isis in the country, and American and Russian officials have worked on ensuring there are no clashes between their forces as they pursue their separate campaigns. But the shooting down of the Russian plane is an escalation that leaves open the possibility of a clash between a Nato member and Russia, whose intervention shows an increasing assertiveness in international affairs.
Paul Merrell

War escalating in the Mideast - 0 views

The war in Syria is escalating rapidly; is it too late to prevent that war from engulfing the Mideast and possibly beyond? I'm posting snapshots of multiple reports in a single post today because o...

war & peace Syria Israel Turkey Saudis Lebanon Russia Hisbollah Iraq

started by Paul Merrell on 22 May 13 no follow-up yet
Paul Merrell

White House threatens to veto 9/11 lawsuit bill - CNNPolitics.com - 0 views

  • A bipartisan bill to let families victimized by the 9/11 terrorist attacks sue Saudi Arabia ran into sharp setbacks Monday, as the White House threatened a veto and a GOP senator privately sought to block the measure.The move comes as presidential candidates from both parties are seizing on the legislation to score points with New York voters ahead of Tuesday's critical primary there.And it has pit the likely next Senate Democratic leader, Chuck Schumer of New York, squarely against the Obama administration.The White House and State Department are bluntly warning lawmakers not to proceed with the legislation over fears it could have dramatic ramifications for the United States and citizens living abroad to retaliatory lawsuits. The President lands in Riyadh Wednesday for talks with Saudi Arabia over ISIS and Iran at a time of strained relations between the countries, making the bill's timing that much more sensitive.
  • The stepped-up lobbying against the legislation comes as it is coming up against fresh roadblocks on Capitol Hill, with party leaders learning that a GOP senator is objecting to taking up the bill, according to a source familiar with the legislation. The senator's identity has not yet been revealed publicly.Proponents of the measure, for their part, are beginning to intensify their pressure campaign."If Saudi Arabia participated in terrorism, of course they should be able to be sued," Schumer said Monday. "This bill would allow a suit to go forward and victims of terrorism to go to court to determine if the Saudi government participated in terrorist acts. If the Saudis did, they should pay a price."Speaking to reporters Monday, White House spokesman Josh Earnest fired back, warning that it would jeopardize international sovereignty and put the U.S. at "significant risk" if other countries adopted a similar law."It's difficult to imagine a scenario where the President would sign it," Earnest said.
  • The bill, which Schumer and Senate Majority Whip John Cornyn of Texas are pushing, would prevent Saudi Arabia and other countries alleged to have terrorist ties from invoking their sovereign immunity in federal court.Saudi Arabia has long denied any role in the 9/11 attacks, but victims' families have repeatedly sought to bring the matter to court, only to be rebuffed after the country has invoked legal immunity allowed under current law."It makes minor adjustments to our laws that would clarify the ability of Americans attacked on U.S. soil to get justice from those who have sponsored that terrorist attack," Cornyn said of the bill, which is entitled the Justice Against Sponsors of Terrorism Act.
  • ...2 more annotations...
  • As pressure grows on Congress to let 9/11 victims' families pursue their claims against Saudi Arabia in federal court, Saudi officials are quickly pushing back.In a stark warning to members of Congress, Saudi Foreign Minister Adel al-Jubeir warned lawmakers last month in Washington that his kingdom would sell $750 billion in U.S. assets, including treasury securities, if the measure became law, sources familiar with the matter told CNN. The development was first reported in The New York Times.Cornyn, however, dismissed the threat.
  • Presidential candidates were also unmoved. Ahead of the New York primary, former Secretary of State Hillary Clinton and Vermont Sen. Bernie Sanders quickly sought to align themselves with the Cornyn-Schumer bill.After Clinton said in a Sunday appearance on ABC that she had to study the bill and would not take a position, a spokesman later said she backs the bill.Sanders, in a statement Sunday night, announced that he supports the bill and called on the Obama administration to declassify the 28 pages of the 9/11 report that could implicate Saudi Arabia. Other presidential candidates jumped into the fray, including GOP front-runner Donald Trump.Appearing on the Joe Piscopo Show, a New York radio program, Trump evinced no concern about Saudi Arabia's threat to sell off U.S. assets."Let 'em sell 'em," Trump said. "No big deal."Trump added: "Hey, look, we protect Saudi Arabia. We protect them for peanuts. If we weren't protecting them, they wouldn't be there for a week."
  •  
    Sounds like the bill would also open the doors to suing Israel for 9-11. Could be interesting because that's where much of the evidence points, incliding the all important answer to the question, qui bono (who benefits).  
Gary Edwards

Susan Lindauer | Veterans Today - 0 views

  •  
    Recently hear former CIA agent Susan Lindauer interviewed on Coast to Coast.  Stunning story.  This page has articles that read like a book about 911. intro: As a U.S. Intelligence Asset, Susan Lindauer covered anti-terrorism at the Iraqi Embassy in New York from 1996 up to the invasion. Independent sources have confirmed that she gave advance warning about the 9/11 attack. She also started talks for the Lockerbie Trial with Libyan diplomats. Shortly after requesting to testify before Congress about successful elements of Pre-War Intelligence, Lindauer became one of the first non-Arab Americans arrested on the Patriot Act as an "Iraqi Agent". She was accused of warning her second cousin, White House Chief of Staff Andrew Card and Secretary of State Colin Powell that War with Iraq would have catastrophic consequences. Gratis of the Patriot Act, her indictment was loaded with "secret charges" and "secret evidence." She was subjected to one year in prison on Carswell Air Force Base in Fort Worth, Texas without a trial or hearing, and threatened with indefinite detention and forcible drugging to shut her up. After five years of indictment without a conviction or guilty plea, the Justice Department dismissed all charges five days before President Obama's inauguration. Lindauer has written a book Extreme Prejudice: The Terrifying Story of the Patriot Act and the Cover Ups of 9/11 and Iraq about her experience.
Paul Merrell

Warning: Get Your Money Out: 'All Legal Bank Deposit Protections Are Now Offi... - 0 views

  • Former money manager Ann Barnhardt, who in November of 2011 made the decision to cease operations of her brokerage firm and return funds to her customers citing “systemic” problems within the entire financial industry, has issued a new warning about the stability of US banks and the safety of individual deposit accounts. The warning, stemming from a recent federal appeals court ruling surrounding customer funds lost during the 2007 collapse of Chicago futures broker Sentinel, indicates that individuals who lose deposited funds because a financial institution improperly manages that money, even if those funds are supposed to be “segregated” from other operations of the firm, are essentially left with no recourse if the firm goes belly-up. According to the court, a misallocation of those customer funds, “is not, on its own, sufficient to rule as a matter of law that Sentinel acted ‘with actual intent to hinder, delay, or defraud’ its customers.”
  • The implications of the ruling, according to Barnhardt, will affect the monies of all private individuals who have seen their deposit accounts wiped out in the collapse of firms like John Corzine’s MF Global and put all deposit account holders in the country at risk should their bank be faced with a financial windstorm: The NFA in collusion with the banksters, government and judiciary have achieved their goal. The entire concept of “customer segregated funds” is officially, completely, legally dead. Guys, it is OVER. I know that many of you are still cowering in normalcy bias, unable to deal with reality, unable to face the world as it is, but you have GOT to snap out of it. The marketplace is DESTROYED. You CANNOT be in these markets. All legal protections are now officially gone.
Gary Edwards

Why we are on the brink of the greatest Depression of all time  | Fox News - 0 views

  •  
    Another one of those must read articles.  This time from -libertarian Wayne Allen Root.  Examining the facts and connecting the dots - big time. "Everywhere from FoxNews.0com to CNBC.com, I suddenly see commentators warning of pe0nding doom, economic collapse, and a new Great Depression. Weslcome to my club. Perhaps America's politicians and economists should have paid attention to an entrepreneur and small businessman that has been warning of economic collapse and a new Great Depression publicly for over two years.  More importantly, none of the current commentaries mention the "why's" of this slow motion economic collapse...beyond the obvious -- mountains of deficit and debt. None of them mention the dysfunctional structure of the current U.S. economy and the massive changes in the work ethic and mindset of the average American.  I am a successful small businessman and a patriot who loves America and always sees its greatness. I am also an optimistic, positive thinker who always sees the glass half full.  But not this time.  This time we are in such deep trouble, the only solution is a radical restructuring of the politicians, the economy, and the way we view personal responsibility versus government handouts. If those changes don't come then we are facing a long decline and the eventual end of America.  The economy is crumbling. The situation is turning more hopeless by the hour. The more government gets involved, the worse it gets. Coincidence? - This time the results are going to be dramatically worse than 1929. This time we are facing The Greatest Depression ever."
Gary Edwards

Doug Hagmann: The Embassy Threat, Proxy War - America Conservative 2 Conservative - 0 views

  •  
    The real story behind Benghazi, Syria and WWIII. excerpt: "Benghazi exposed .... It was shortly after the September 11, 2012 attack in Benghazi that I wrote in explicit detail the actual reason for that attack. Thanks to a highly placed source in the intelligence venue, readers learned the truth ten months before the corporate media finally acknowledged that the compound in Benghazi was the operations center for a large CIA weapons smugglin... where Libya was being used as a weaponsstorage depot to arm the anti-Assad "rebels." The attack at Benghazi was described by this administration and the Clinton State Department as a spontaneous protest over an internet video, although that narrative was proven to be a lie. It was a lie they continued to stick with to hide the fact that the U.S., in conjunction with other NATO allies, were actually doing the work of Saudi Arabia. But why - who benefits? To understand the answer to that question, we must look at what Saudi Arabia is and how the Saudi royals came to power. Much like the U.S., the nation of Saudi Arabia itself is a captured operation, established by a cabal of globalists for the sake of oil. It would be helpful to understand the role Aramco and other oil interests played in the establishment of the Saudi power structure. As the Obama regime continued forward to advance this Saudi-globalist agenda, Russia's Putin warned the U.S. that the insanity of destabilizing Syria was not in their best interests, and certainly not in ours. When the warnings were not heeded, proxy groups for Russia, Syria and Iran, in the form of Ansar al Sharia and AQIM launched a deadly assault on the CIA operations center in Benghazi. The continued pressure of possibly exposing the true nature of the activities in Benghazi, from the illegal arms trafficking in violation of international law to the attack itself, became a serious annoyance to the globalist planners and the Obama subjects to the Saudi royals. The assistanc
Gary Edwards

You Won't BELIEVE What's Going On with Government Spying on Americans - BlackListedNews... - 1 views

  •  
    "New Revelations Are Breaking Every Day" This web page is very well sourced and filled with links where you will get lost for hours. Excellent reference document ............................ Revelations about the breathtaking scope of government spying are coming so fast that it's time for an updated roundup: - Just weeks after NSA boss Alexander said that a review of NSA spying found not even one violation, the Washington Post published an internal NSA audit showing that the agency has broken its own rules thousands of times each year - 2 Senators on the intelligence committee said the violations revealed in the Post article were just the "tip of the iceberg" - Glenn Greenwald notes:  "One key to the WashPost story: the reports are internal, NSA audits, which means high likelihood of both under-counting & white-washing".(Even so, the White House tried to do damage control by retroactively changing on-the-record quotes) - The government is spying on essentially everything we do. It is not just "metadata" … although that is enough to destroy your privacy - The government has adopted a secret interpretation of the Patriot Act which allows it to pretend that "everything" is relevant … so it spies on everyone - NSA whistleblowers say that the NSA collects all of our conversations word-for-word - It's not just the NSA … Many other agencies, like the FBI and IRS - concerned only with domesticissues - spy on Americans as well - The information gained through spying is shared with federal, state and local agencies, and they are using that information to prosecute petty crimes such as drugs and taxes.  The agencies are instructed to intentionally "launder" the information gained through spying, i.e. to pretend that they got the information in a more legitimate way … and to hide that from defense attorneys and judges - Top counter-terror experts say that the government's mass spying doesn't keep us
Paul Merrell

The Day - U.S. alerts foreign services about Snowden documents | News from southeastern... - 0 views

  • U.S. officials are alerting some foreign intelligence services that documents detailing their secret cooperation with the United States have been obtained by former National Security Agency contractor Edward Snowden, according to government officials.Snowden, U.S. officials said, took tens of thousands of documents, some of which contain sensitive material about collection programs against adversaries such as Iran, Russia and China. Some refer to operations that in some cases involve countries not publicly allied with the United States.The process of informing officials in capital after capital about the risk of disclosure is delicate. In some cases, one part of the cooperating government may know about the collaboration while others may not, the officials said. The documents, if disclosed, could compromise operations, officials said.
  • The Office of the Director of National Intelligence is handling the job of informing the other intelligence services, the officials said. ODNI declined to comment.
  • Snowden lifted the documents from a top secret network run by the Defense Intelligence Agency and used by intelligence arms of the Army, Air Force, Navy and Marines, according to sources, who spoke on the condition of anonymity to discuss sensitive matters.Snowden took 30,000 documents that involve the intelligence work of one of the services, the official said. He gained access to the documents through the Joint Worldwide Intelligence Communications System, or JWICS, for top secret/sensitive compartmented information, the sources said.The material in question does not deal with NSA surveillance but primarily with standard intelligence about other countries' military capabilities, including weapons systems-missiles, ships and jets, the officials say.
  • ...1 more annotation...
  • Nonetheless, the military intelligence agencies remain fearful, officials said. The NSA in recent months has provided them with an accounting of the documents it believes Snowden obtained.Intelligence officials said they could discern no pattern to the military intelligence documents taken and said Snowden appeared to harvest them at random. "It didn't seem like he was targeting something specific," the U.S. official said.
  •  
    A bit of comedy here. Our spy agencies will warn collaborating nations but when it comes to Congress or the American public, no warning. 
Paul Merrell

Glenn Greenwald: how the NSA tampers with US-made internet routers | World news | The G... - 0 views

  • The NSA has been covertly implanting interception tools in US servers heading overseas – even though the US government has warned against using Chinese technology for the same reasons, says Glenn Greenwald, in an extract from his new book about the Snowden affair, No Place to Hide
  • For years, the US government loudly warned the world that Chinese routers and other internet devices pose a "threat" because they are built with backdoor surveillance functionality that gives the Chinese government the ability to spy on anyone using them. Yet what the NSA's documents show is that Americans have been engaged in precisely the activity that the US accused the Chinese of doing.
  • The Rogers committee voiced fears that the two companies were enabling Chinese state surveillance, although it acknowledged that it had obtained no actual evidence that the firms had implanted their routers and other systems with surveillance devices. Nonetheless, it cited the failure of those companies to cooperate and urged US firms to avoid purchasing their products
  • ...3 more annotations...
  • The constant accusations became such a burden that Ren Zhengfei, the 69-year-old founder and CEO of Huawei, announced in November 2013 that the company was abandoning the US market. As Foreign Policy reported, Zhengfei told a French newspaper: "'If Huawei gets in the middle of US-China relations,' and causes problems, 'it's not worth it'."
  • But while American companies were being warned away from supposedly untrustworthy Chinese routers, foreign organisations would have been well advised to beware of American-made ones. A June 2010 report from the head of the NSA's Access and Target Development department is shockingly explicit. The NSA routinely receives – or intercepts – routers, servers and other computer network devices being exported from the US before they are delivered to the international customers.The agency then implants backdoor surveillance tools, repackages the devices with a factory seal and sends them on. The NSA thus gains access to entire networks and all their users. The document gleefully observes that some "SIGINT tradecraft … is very hands-on (literally!)".Eventually, the implanted device connects back to the NSA. The report continues: "In one recent case, after several months a beacon implanted through supply-chain interdiction called back to the NSA covert infrastructure. This call back provided us access to further exploit the device and survey the network."
  • Warning the world about Chinese surveillance could have been one of the motives behind the US government's claims that Chinese devices cannot be trusted. But an equally important motive seems to have been preventing Chinese devices from supplanting American-made ones, which would have limited the NSA's own reach. In other words, Chinese routers and servers represent not only economic competition but also surveillance competition.
Paul Merrell

Hollande warns of 'total war' if no action taken in Syria | Middle East Eye - 0 views

  • Failure to act in Syria risks stoking a "total war" in the Middle East, French President François Hollande said in a landmark speech to the European Parliament alongside German Chancellor Angela Merkel."What happens in Syria concerns Europe, what happens there will determine the balance of the whole region for a long time," Hollande told European lawmakers in Strasbourg."If we leave these religious clashes between Sunnis and Shias, they will grow. Don't think we will be sheltered, this will be a total war."Hollande, whose country has launched airstrikes against the Islamic State group in Syria, appeared to criticise Russia for its air attacks in support of President Bashar al-Assad's regime."We have to construct in Syria, with all those who can contribute, a political future which gives the Syrian people an alternative to Bashar or Daesh," Hollande said, using another name for IS.
  • Hollande warned that an influx of refugees, many from Syria, could undermine European cohesion if member nations were not unified in their response."There is a humanitarian crisis which we need to confront, with an influx of refugees," he said. "The only solution is a strong Europe."We need not less Europe but more Europe. Europe must affirm itself otherwise we will see the end of Europe, our demise."Merkel echoed Hollande's statement warning of the consequences of unilateral action by member states."In the refugee crisis, we must not succumb to the temptation of falling back into national action. Quite the contrary, now we need more Europe,"  Merkel said."We must see them (migrants) as people, whether they have the prospect of remaining or not. Humanitarian standards of accommodation and claim processing must be upheld."She then went on to say that Europe needs to rewrite its "obsolete" asylum rules to tackle the crisis as European warships went into action against people smugglers in the Mediterranean.
  • "I appeal for a new procedure" to redistribute asylum seekers "fairly" throughout the 28-nation EU bloc, she said. Merkel added: "It is exactly now that we need more Europe. We need courage and cohesion, which Europe has always shown when it was necessary."Germany is Europe's top destination for people fleeing war and misery in the continent's greatest migrant influx since World War II. The EU's richest economy expects between 800,000 and one million newcomers this year alone. German authorities said Wednesday that they had registered around 577,000 asylum seekers in the first nine months of the year, a third of whom claim to be Syrian.
  • ...2 more annotations...
  • The joint address comes as the EU began a military operation to catch migrant traffickers, with European warships patrolling international waters in the Mediterranean to arrest smugglers dubbed the "mafia of the sea".The European Union's foreign policy chief Federica Mogherini announced last month that EUNAVFOR MED, an operation launched to dismantle the network of smugglers abetting the migrant boat crisis, was to enter its second phase.The first phase, which essentially entailed compiling and analysing information on the trafficker networks, has been up and running since June.Six ships are already in place in international waters off the coast of Libya - the departure point for many of the migrant boats - including an Italian aircraft carrier, a French frigate and one British, one Spanish and two German ships.At least three other vessels supplied by the Belgian, British and Slovenian navies are expected to arrive in the area at the end of October to complete the force, which also include four aircraft and 1,318 personnel."We follow the traffickers and want to arrest them and seize their ships," a German captain told AFP, adding that he'll get as close to Libyan waters as he can.Over the past few weeks, EUNAVFOR MED has identified 20 'escort' boats - the type used by traffickers who take the migrants out to sea in fishing boats and dinghies before leaving them and returning to Libya in the escort boat.
  • It could have taken action against all of the 17 Libyan and three Egyptian 'escort' boats spotted, had phase two of the operation already been up and running.On the map, the operation will patrol over 10 areas off the Libyan coast: four along the 12-nautical mile mark which separates international from Libyan waters, and the others further out to sea.According to the proposals, the whole of the north-western coast of Libya from the Tunisian border to Sirte will be on lockdown, apart from an area directly in front of Tripoli, which will be left open to prevent a total maritime blockade.
Paul Merrell

Sixty Days To Beat Ebola, United Nations Warns - 0 views

  • The UN says the ebola outbreak must be controlled within 60 days or else the world faces an "unprecedented" situation for which there is no plan. The United Nations made the stark warning as it warned that the disease "is running faster than us and it is winning the race". Nearly 9,000 cases of ebola have been reported so far in West Africa, including 4,447 deaths.
  • "The WHO advises within 60 days we must ensure 70% of infected people are in a care facility and 70% of burials are done without causing further infection," said Anthony Banbury, the UN's deputy ebola coordinator.
  • "We need to do that within 60 days from 1 October. If we reach these targets then we can turn this epidemic around." But Mr Banbury told the UN Security Council the 70% target was becoming harder to meet as new infections stack up. He urged: "We either stop ebola now or we face an entirely unprecedented situation for which we do not have a plan."
Paul Merrell

Operation AURORAGOLD: How the NSA Hacks Cellphone Networks Worldwide - 0 views

  • In March 2011, two weeks before the Western intervention in Libya, a secret message was delivered to the National Security Agency. An intelligence unit within the U.S. military’s Africa Command needed help to hack into Libya’s cellphone networks and monitor text messages. For the NSA, the task was easy. The agency had already obtained technical information about the cellphone carriers’ internal systems by spying on documents sent among company employees, and these details would provide the perfect blueprint to help the military break into the networks. The NSA’s assistance in the Libya operation, however, was not an isolated case. It was part of a much larger surveillance program—global in its scope and ramifications—targeted not just at hostile countries.
  • According to documents contained in the archive of material provided to The Intercept by whistleblower Edward Snowden, the NSA has spied on hundreds of companies and organizations internationally, including in countries closely allied to the United States, in an effort to find security weaknesses in cellphone technology that it can exploit for surveillance. The documents also reveal how the NSA plans to secretly introduce new flaws into communication systems so that they can be tapped into—a controversial tactic that security experts say could be exposing the general population to criminal hackers. Codenamed AURORAGOLD, the covert operation has monitored the content of messages sent and received by more than 1,200 email accounts associated with major cellphone network operators, intercepting confidential company planning papers that help the NSA hack into phone networks.
  • Karsten Nohl, a leading cellphone security expert and cryptographer who was consulted by The Intercept about details contained in the AURORAGOLD documents, said that the broad scope of information swept up in the operation appears aimed at ensuring virtually every cellphone network in the world is NSA accessible.
  • ...11 more annotations...
  • “Collecting an inventory [like this] on world networks has big ramifications,” Nohl said, because it allows the NSA to track and circumvent upgrades in encryption technology used by cellphone companies to shield calls and texts from eavesdropping. Evidence that the agency has deliberately plotted to weaken the security of communication infrastructure, he added, was particularly alarming. “Even if you love the NSA and you say you have nothing to hide, you should be against a policy that introduces security vulnerabilities,” Nohl said, “because once NSA introduces a weakness, a vulnerability, it’s not only the NSA that can exploit it.”
  • The AURORAGOLD operation is carried out by specialist NSA surveillance units whose existence has not been publicly disclosed: the Wireless Portfolio Management Office, which defines and carries out the NSA’s strategy for exploiting wireless communications, and the Target Technology Trends Center, which monitors the development of new communication technology to ensure that the NSA isn’t blindsided by innovations that could evade its surveillance reach. The center’s logo is a picture of the Earth overshadowed by a large telescope; its motto is “Predict – Plan – Prevent.”
  • The NSA documents reveal that, as of May 2012, the agency had collected technical information on about 70 percent of cellphone networks worldwide—701 of an estimated 985—and was maintaining a list of 1,201 email “selectors” used to intercept internal company details from employees. (“Selector” is an agency term for a unique identifier like an email address or phone number.) From November 2011 to April 2012, between 363 and 1,354 selectors were “tasked” by the NSA for surveillance each month as part of AURORAGOLD, according to the documents. The secret operation appears to have been active since at least 2010.
  • By covertly monitoring GSMA working groups in a bid to identify and exploit security vulnerabilities, the NSA has placed itself into direct conflict with the mission of the National Institute for Standards and Technology, or NIST, the U.S. government agency responsible for recommending cybersecurity standards in the United States. NIST recently handed out a grant of more than $800,000 to GSMA so that the organization could research ways to address “security and privacy challenges” faced by users of mobile devices. The revelation that the trade group has been targeted for surveillance may reignite deep-seated tensions between NIST and NSA that came to the fore following earlier Snowden disclosures. Last year, NIST was forced to urge people not to use an encryption standard it had previously approved after it emerged NSA had apparently covertly worked to deliberately weaken it.
  • The NSA focuses on intercepting obscure but important technical documents circulated among the GSMA’s members known as “IR.21s.” Most cellphone network operators share IR.21 documents among each other as part of agreements that allow their customers to connect to foreign networks when they are “roaming” overseas on a vacation or a business trip. An IR.21, according to the NSA documents, contains information “necessary for targeting and exploitation.” The details in the IR.21s serve as a “warning mechanism” that flag new technology used by network operators, the NSA’s documents state. This allows the agency to identify security vulnerabilities in the latest communication systems that can be exploited, and helps efforts to introduce new vulnerabilities “where they do not yet exist.” The IR.21s also contain details about the encryption used by cellphone companies to protect the privacy of their customers’ communications as they are transmitted across networks. These details are highly sought after by the NSA, as they can aid its efforts to crack the encryption and eavesdrop on conversations.
  • One of the prime targets monitored under the AURORAGOLD program is the London-headquartered trade group, the GSM Association, or the GSMA, which represents the interests of more than 800 major cellphone, software, and internet companies from 220 countries. The GSMA’s members include U.S.-based companies such as Verizon, AT&T, Sprint, Microsoft, Facebook, Intel, Cisco, and Oracle, as well as large international firms including Sony, Nokia, Samsung, Ericsson, and Vodafone. The trade organization brings together its members for regular meetings at which new technologies and policies are discussed among various “working groups.” The Snowden files reveal that the NSA specifically targeted the GSMA’s working groups for surveillance.
  • Last year, the Washington Post reported that the NSA had already managed to break the most commonly used cellphone encryption algorithm in the world, known as A5/1. But the information collected under AURORAGOLD allows the agency to focus on circumventing newer and stronger versions of A5 cellphone encryption, such as A5/3. The documents note that the agency intercepts information from cellphone operators about “the type of A5 cipher algorithm version” they use, and monitors the development of new algorithms in order to find ways to bypass the encryption. In 2009, the British surveillance agency Government Communications Headquarters conducted a similar effort to subvert phone encryption under a project called OPULENT PUP, using powerful computers to perform a “crypt attack” to penetrate the A5/3 algorithm, secret memos reveal. By 2011, GCHQ was collaborating with the NSA on another operation, called WOLFRAMITE, to attack A5/3 encryption. (GCHQ declined to comment for this story, other than to say that it operates within legal parameters.)
  • The extensive attempts to attack cellphone encryption have been replicated across the Five Eyes surveillance alliance. Australia’s top spy agency, for instance, infiltrated an Indonesian cellphone company and stole nearly 1.8 million encryption keys used to protect communications, the New York Times reported in February.
  • The NSA’s documents show that it focuses on collecting details about virtually all technical standards used by cellphone operators, and the agency’s efforts to stay ahead of the technology curve occasionally yield significant results. In early 2010, for instance, its operatives had already found ways to penetrate a variant of the newest “fourth generation” smartphone-era technology for surveillance, years before it became widely adopted by millions of people in dozens of countries. The NSA says that its efforts are targeted at terrorists, weapons proliferators, and other foreign targets, not “ordinary people.” But the methods used by the agency and its partners to gain access to cellphone communications risk significant blowback. According to Mikko Hypponen, a security expert at Finland-based F-Secure, criminal hackers and foreign government adversaries could be among the inadvertent beneficiaries of any security vulnerabilities or encryption weaknesses inserted by the NSA into communication systems using data collected by the AURORAGOLD project.
  • Vines, the NSA spokeswoman, told The Intercept that the agency was committed to ensuring an “open, interoperable, and secure global internet.” “NSA deeply values these principles and takes great care to honor them in the performance of its lawful foreign-intelligence mission,” Vines said.
  • Documents published with this article: AURORAGOLD – Project Overview AURORAGOLD Working Group IR.21 – A Technology Warning Mechanism AURORAGOLD – Target Technology Trends Center support to WPMO NSA First-Ever Collect of High-Interest 4G Cellular Signal AURORAGOLD Working Aid WOLFRAMITE Encryption Attack OPULENT PUP Encryption Attack NSA/GCHQ/CSEC Network Tradecraft Advancement Team
  •  
    Notice that they've cracked even 4G.
Paul Merrell

German Foreign Minister Warns Against More Russia Sanctions | Atlantic Sentinel - 0 views

  • Germany’s foreign minister, Frank-Walter Steinmeier, warned against imposing more sanctions on Russia in an interview that was published on Friday, saying bringing Russia to its knees would not make Europe safer. “I can only warn against it,” Steinmeier told Der Spiegel. The diplomat pointed out that Russia is already paying the price for invading Ukraine in the form of falling oil prices and a collapsing currency. He argued, “It cannot be in our interest that this spirals out of control.”
  • Earlier in the week, German chancellor Angela Merkel, whose conservatives are the senior partners in the ruling coalition with Steinmeier’s Social Democratic Party, insisted the sanctions would not be weakened. Speaking to lawmakers in Berlin ahead of a meeting with other European leaders in Brussels, Merkel said the territorial integrity of Ukraine had to be restored. “As long as this goal is not achieved, the sanctions will stay,” she said. European Union leaders agreed on Friday to keep existing sanctions in place and said they were ready to “stay the course” if Russia did not pull back from Ukraine.
  •  
    Merkel is still withstanding the pressure from German industrialists to side with the Russians re U.S. sanctions on Russia.
Paul Merrell

Israeli attacks designed to "terrorize" Gaza population, international law experts say ... - 0 views

  • “The civilian population in the Gaza Strip is under direct attack,” dozens of international law experts have warned in a statement laying out numerous Israeli violations of the laws of war, some amounting to war crimes.
  • “Most of the recent heavy bombings in Gaza lack an acceptable military justification and, instead, appear to be designed to terrorize the civilian population,” says the statement, signed by more than 140 international and criminal law scholars, human rights defenders, legal and other experts. Among them are John Dugard and Richard Falk, both former UN special rapporteurs on the human rights situation in the occupied Palestinian territories.
  • “Gaza’s civilian population has been victimized in the name of a falsely construed right to self-defense,” the statement adds. Israel’s illegal attacks include its assault on the Gaza City neighborhood of [Shujaiya], which the statement says “was one of the bloodiest and most aggressive operations ever conducted by Israel in the Gaza Strip, a form of urban violence constituting a total disrespect of civilian innocence.”
  • ...5 more annotations...
  • The statement also points to Israel’s deliberate destruction of the homes of thousands of people and Israel’s practice of giving “warnings” either in the form of smaller projectiles fired at a building, or via text message or telephone. Despite such warnings, “it remains illegal to willfully attack a civilian home without a demonstration of military necessity as it amounts to a violation of the principle of proportionality,” the experts say.
  • “Not only are these ‘warnings’ generally ineffective, and can even result in further fatalities,”the statement notes, “they appear to be a pre-fabricated excuse by Israel to portray people who remain in their homes as ‘human shields.’” “Israel’s illegal policy of absolute closure imposed on the Gaza Strip has relentlessly continued, under the complicit gaze of the international community of States,” the statement says. The statement also denounces “the launch of rockets from the Gaza Strip, as every indiscriminate attack against civilians, regardless of the identity of the perpetrators, is not only illegal under international law but also morally intolerable.”
  • “However,” it adds, “the two parties to the conflict cannot be considered equal, and their actions – once again – appear to be of incomparable magnitude.”
  • Calling for accountability, the statement blames “several UN Member States and the UN” for pressuring de facto Palestinian Authority leader Mahmoud Abbas not to seek “recourse to the International Criminal Court (ICC).” The statement calls on “the Governmental leaders of Palestine” – presumably a reference to Abbas – to ratify the ICC treaty.
  • It also urges the UN Security Council to “exercise its responsibilities in relation to peace and justice by referring the situation in Palestine to the Prosecutor of the ICC” – an action that would require the support of veto-wielding countries such as the US, France and UK, all of which have defended Israel’s assault on Gaza. The full statement and list of signers follow.
Paul Merrell

Warning Merkel on Russian 'Invasion' Intel | Consortiumnews - 0 views

  • Alarmed at the anti-Russian hysteria sweeping Official Washington – and the specter of a new Cold War – U.S. intelligence veterans took the unusual step of sending this Aug. 30 memo to German Chancellor Merkel challenging the reliability of Ukrainian and U.S. media claims about a Russian “invasion.” MEMORANDUM FOR: Angela Merkel, Chancellor of Germany FROM: Veteran Intelligence Professionals for Sanity (VIPS) SUBJECT: Ukraine and NATO We the undersigned are long-time veterans of U.S. intelligence. We take the unusual step of writing this open letter to you to ensure that you have an opportunity to be briefed on our views prior to the NATO summit on Sept. 4-5.
  •  
    Our buddies the Veteran Intelligence Professionals for Sanity (VIPS) are back, this time with a warning for German Chancellor Angela Merkel that John Kerry is lying about Russia invading Ukraine. The NATO Summit kicked off on the 4th; this was published on the 1st. 
Paul Merrell

Secret US cybersecurity report: encryption vital to protect private data | US news | Th... - 0 views

  • A secret US cybersecurity report warned that government and private computers were being left vulnerable to online attacks from Russia, China and criminal gangs because encryption technologies were not being implemented fast enough. The advice, in a newly uncovered five-year forecast written in 2009, contrasts with the pledge made by David Cameron this week to crack down on encryption use by technology companies.
  • In the wake of the Paris terror attacks, the prime minister said there should be no “safe spaces for terrorists to communicate” or that British authorites could not access. Cameron, who landed in the US on Thursday night, is expected to urge Barack Obama to apply more pressure to tech giants, such as Apple, Google and Facebook, which have been expanding encrypted messaging for their millions of users since the revelations of mass NSA surveillance by the whistleblower Edward Snowden.
  • Cameron said the companies “need to work with us. They need also to demonstrate, which they do, that they have a social responsibility to fight the battle against terrorism. We shouldn’t allow safe spaces for terrorists to communicate. That’s a huge challenge but that’s certainly the right principle”. But the document from the US National Intelligence Council, which reports directly to the US director of national intelligence, made clear that encryption was the “best defence” for computer users to protect private data. Part of the cache given to the Guardian by Snowden was published in 2009 and gives a five-year forecast on the “global cyber threat to the US information infrastructure”. It covers communications, commercial and financial networks, and government and critical infrastructure systems. It was shared with GCHQ and made available to the agency’s staff through its intranet.
  • ...6 more annotations...
  • An unclassified table accompanying the report states that encryption is the “[b]est defense to protect data”, especially if made particularly strong through “multi-factor authentication” – similar to two-step verification used by Google and others for email – or biometrics. These measures remain all but impossible to crack, even for GCHQ and the NSA. The report warned: “Almost all current and potential adversaries – nations, criminal groups, terrorists, and individual hackers – now have the capability to exploit, and in some cases attack, unclassified access-controlled US and allied information systems.” It further noted that the “scale of detected compromises indicates organisations should assume that any controlled but unclassified networks of intelligence, operational or commercial value directly accessible from the internet are already potentially compromised by foreign adversaries”.
  • The report had some cause for optimism, especially in the light of Google and other US tech giants having in the months prior greatly increased their use of encryption efforts. “We assess with high confidence that security best practices applied to target networks would prevent the vast majority of intrusions,” it concluded. Official UK government security advice still recommends encryption among a range of other tools for effective network and information defence. However, end-to-end encryption – which means only the two people communicating with each other, and not the company carrying the message, can decode it – is problematic for intelligence agencies as it makes even warranted collection much more difficult.
  • The previous week, a day after the attack on the Charlie Hebdo office in Paris, the MI5 chief, Andrew Parker, called for new powers and warned that new technologies were making it harder to track extremists. In November, the head of GCHQ, Robert Hannigan, said US social media giants had become the “networks of choice” for terrorists. Chris Soghoian, principal senior policy analyst at the American Civil Liberties Union, said attempts by the British government to force US companies to weaken encryption faced many hurdles.
  • The Guardian, New York Times and ProPublica have previously reported the intelligence agencies’ broad efforts to undermine encryption and exploit rather than reveal vulnerabilities. This prompted Obama’s NSA review panel to warn that the agency’s conflicting missions caused problems, and so recommend that its cyber-security responsibilities be removed to prevent future issues.
  • The memo requested a renewal of the legal warrant allowing GCHQ to “modify” commercial software in violation of licensing agreements. The document cites examples of software the agency had hacked, including commonly used software to run web forums, and website administration tools. Such software are widely used by companies and individuals around the world. The document also said the agency had developed “capability against Cisco routers”, which would “allow us to re-route selected traffic across international links towards GCHQ’s passive collection systems”. GCHQ had also been working to “exploit” the anti-virus software Kaspersky, the document said. The report contained no information on the nature of the vulnerabilities found by the agency.
  • Michael Beckerman, president and CEO of the Internet Association, a lobby group that represents Facebook, Google, Reddit, Twitter, Yahoo and other tech companies, said: “Just as governments have a duty to protect to the public from threats, internet services have a duty to our users to ensure the security and privacy of their data. That’s why internet services have been increasing encryption security.”
Paul Merrell

Canadian Spies Collect Domestic Emails in Secret Security Sweep - The Intercept - 0 views

  • Canada’s electronic surveillance agency is covertly monitoring vast amounts of Canadians’ emails as part of a sweeping domestic cybersecurity operation, according to top-secret documents. The surveillance initiative, revealed Wednesday by CBC News in collaboration with The Intercept, is sifting through millions of emails sent to Canadian government agencies and departments, archiving details about them on a database for months or even years. The data mining operation is carried out by the Communications Security Establishment, or CSE, Canada’s equivalent of the National Security Agency. Its existence is disclosed in documents obtained by The Intercept from NSA whistleblower Edward Snowden. The emails are vacuumed up by the Canadian agency as part of its mandate to defend against hacking attacks and malware targeting government computers. It relies on a system codenamed PONY EXPRESS to analyze the messages in a bid to detect potential cyber threats.
  • Last year, CSE acknowledged it collected some private communications as part of cybersecurity efforts. But it refused to divulge the number of communications being stored or to explain for how long any intercepted messages would be retained. Now, the Snowden documents shine a light for the first time on the huge scope of the operation — exposing the controversial details the government withheld from the public. Under Canada’s criminal code, CSE is not allowed to eavesdrop on Canadians’ communications. But the agency can be granted special ministerial exemptions if its efforts are linked to protecting government infrastructure — a loophole that the Snowden documents show is being used to monitor the emails. The latest revelations will trigger concerns about how Canadians’ private correspondence with government employees are being archived by the spy agency and potentially shared with police or allied surveillance agencies overseas, such as the NSA. Members of the public routinely communicate with government employees when, for instance, filing tax returns, writing a letter to a member of parliament, applying for employment insurance benefits or submitting a passport application.
  • Chris Parsons, an internet security expert with the Toronto-based internet think tank Citizen Lab, told CBC News that “you should be able to communicate with your government without the fear that what you say … could come back to haunt you in unexpected ways.” Parsons said that there are legitimate cybersecurity purposes for the agency to keep tabs on communications with the government, but he added: “When we collect huge volumes, it’s not just used to track bad guys. It goes into data stores for years or months at a time and then it can be used at any point in the future.” In a top-secret CSE document on the security operation, dated from 2010, the agency says it “processes 400,000 emails per day” and admits that it is suffering from “information overload” because it is scooping up “too much data.” The document outlines how CSE built a system to handle a massive 400 terabytes of data from Internet networks each month — including Canadians’ emails — as part of the cyber operation. (A single terabyte of data can hold about a billion pages of text, or about 250,000 average-sized mp3 files.)
  • ...1 more annotation...
  • The agency notes in the document that it is storing large amounts of “passively tapped network traffic” for “days to months,” encompassing the contents of emails, attachments and other online activity. It adds that it stores some kinds of metadata — data showing who has contacted whom and when, but not the content of the message — for “months to years.” The document says that CSE has “excellent access to full take data” as part of its cyber operations and is receiving policy support on “use of intercepted private communications.” The term “full take” is surveillance-agency jargon that refers to the bulk collection of both content and metadata from Internet traffic. Another top-secret document on the surveillance dated from 2010 suggests the agency may be obtaining at least some of the data by covertly mining it directly from Canadian Internet cables. CSE notes in the document that it is “processing emails off the wire.”
  •  
    " CANADIAN SPIES COLLECT DOMESTIC EMAILS IN SECRET SECURITY SWEEP BY RYAN GALLAGHER AND GLENN GREENWALD @rj_gallagher@ggreenwald YESTERDAY AT 2:02 AM SHARE TWITTER FACEBOOK GOOGLE EMAIL PRINT POPULAR EXCLUSIVE: TSA ISSUES SECRET WARNING ON 'CATASTROPHIC' THREAT TO AVIATION CHICAGO'S "BLACK SITE" DETAINEES SPEAK OUT WHY DOES THE FBI HAVE TO MANUFACTURE ITS OWN PLOTS IF TERRORISM AND ISIS ARE SUCH GRAVE THREATS? NET NEUTRALITY IS HERE - THANKS TO AN UNPRECEDENTED GUERRILLA ACTIVISM CAMPAIGN HOW SPIES STOLE THE KEYS TO THE ENCRYPTION CASTLE Canada's electronic surveillance agency is covertly monitoring vast amounts of Canadians' emails as part of a sweeping domestic cybersecurity operation, according to top-secret documents. The surveillance initiative, revealed Wednesday by CBC News in collaboration with The Intercept, is sifting through millions of emails sent to Canadian government agencies and departments, archiving details about them on a database for months or even years. The data mining operation is carried out by the Communications Security Establishment, or CSE, Canada's equivalent of the National Security Agency. Its existence is disclosed in documents obtained by The Intercept from NSA whistleblower Edward Snowden. The emails are vacuumed up by the Canadian agency as part of its mandate to defend against hacking attacks and malware targeting government computers. It relies on a system codenamed PONY EXPRESS to analyze the messages in a bid to detect potential cyber threats. Last year, CSE acknowledged it collected some private communications as part of cybersecurity efforts. But it refused to divulge the number of communications being stored or to explain for how long any intercepted messages would be retained. Now, the Snowden documents shine a light for the first time on the huge scope of the operation - exposing the controversial details the government withheld from the public. Under Canada's criminal code, CSE is no
Paul Merrell

18 Signs That The Global Economic Crisis Is Accelerating As We Enter The Last Half Of 2014 - 0 views

  • #1 The Bank for International Settlements has issued a new report which warns that "dangerous new asset bubbles" are forming which could potentially lead to another major financial crisis.  Do the central bankers know something that we don't, or are they just trying to place the blame on someone else for the giant mess that they have created? #2 Argentina has missed a $539 million debt payment and is on the verge of its second major debt default in 13 years. #3 Bulgaria is desperately trying to calm down a massive run on the banks that threatens of spiral out of control. #4 Last month, household loans in the eurozone declined at the fastest rate ever recorded.  Why are European banks holding on to their money so tightly right now? #5 The number of unemployed jobseekers in France has just soared to another brand new record high.
  • #6 Economies all over Europe are either showing no growth or are shrinking.  Just check out what a recent Forbes article had to say about the matter... Italy’s economy shrank by 0.1% in the first three months of 2014, matching the average of the three previous quarters. After expanding 0.6% in Q2 2013, France recorded zero growth. Portugal shrank 0.7%, following positive numbers in the preceding nine months. While figures weren’t available for Greece and Ireland in Q1, neither country is showing progress. Greek GDP dropped 2.5% in the final three months of last year, and Ireland limped ahead at 0.2%. #7 A few days ago it was reported that consumer prices in Japan are rising at the fastest pace in 32 years.
  • #8 Household expenditures in Japan are down 8 percent compared to one year ago. #9 U.S. companies are drowning in massive amounts of debt, but the corporate debt bubble in China is so bad that the amount of corporate debt in China has actually now surpassed the amount of corporate debt in the United States. #10 One Chinese auditor is warning that up to 80 billion dollars worth of loans in China are backed by falsified gold transactions.  What will that do to the price of gold and the stability of Chinese financial markets as that mess unwinds? #11 The unemployment rate in Greece is currently sitting at 26.7 percent and the youth unemployment rate is 56.8 percent.
  • ...2 more annotations...
  • #12 67.5 percent of the people that are unemployed in Greece have been unemployed for over a year. #13 The unemployment rate in the eurozone as a whole is 11.8 percent - just a little bit shy of the all-time record of 12.0 percent. #14 The European Central Bank is so desperate to get money moving through the system that it has actually introduced negative interest rates. #15 The IMF is projecting that there is a 25 percent chance that the eurozone will slip into deflation by the end of next year. #16 The World Bank is warning that "now is the time to prepare" for the next crisis. #17 The economic conflict between the United States and Russia continues to deepen.  This has caused Russia to make a series of moves away from the U.S. dollar and toward other major currencies.  This will have serious ramifications for the global financial system as time rolls along.
  • #18 Of course the U.S. economy is struggling right now as well.  It shrank at a 2.9 percent annual rate during the first quarter of 2014, which was much worse than anyone had anticipated.
Paul Merrell

Google warns of US government 'hacking any facility' in the world | Technology | The Gu... - 0 views

  • Google is boldly opposing an attempt by the US Justice Department to expand federal powers to search and seize digital data, warning that the changes would open the door to US “government hacking of any facility” in the world. In a strongly worded submission to the Washington committee that is considering the proposed changes, Google says that increasing the FBI’s powers set out in search warrants would raise “monumental and highly complex constitutional, legal and geopolitical concerns that should be left to Congress to decide”. The search giant warns that under updated proposals, FBI agents would be able to carry out covert raids on servers no matter where they were situated, giving the US government unfettered global access to vast amounts of private information.
  • In particular, Google sounds the alarm over the FBI’s desire to “remotely” search computers that have concealed their location – either through encryption or by obscuring their IP addresses using anonymity services such as Tor. Those government searches, Google says, “may take place anywhere in the world. This concern is not theoretical. ... [T]he nature of today’s technology is such that warrants issued under the proposed amendment will in many cases end up authorizing the government to conduct searches outside the United States.”
  • The Justice Department itself has tried to assuage anxieties about its proposed amendment. In its comment to the committee, DoJ officials say that federal agents would only request the new type of warrants where there was “probable cause to search for or seize evidence, fruits, or instrumentalities of crime”. But civil liberties and legal groups remain unconvvinced, insisting that the language is so vaguely worded that it would have draconian and global implications. In its submission, the American Civil Liberties Union said that the proposed changes could violate the fourth amendment of the US constitution, which bans unreasonable searches and seizures. The ACLU’s principal technologist, Christopher Soghoian, said: “The government is seeking a troubling expansion of its power to surreptitiously hack into computers, including using malware. Although this proposal is cloaked in the garb of a minor procedural update, in reality it would be a major and substantive change that would be better addressed by Congress.”
  •  
    Fourth Amendment: "The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and *particularly* describing *the place to be searched,* and the persons or things to be seized." The Justice Department proposed amendment to the rules would abolish the emphasized portion of the Amendment, substituting in its place the "general warrant" that the Amendment was intended to forbid. I'm coming to realize more and more that it's my own government, not terrorists™, that needs more surveillance.  
‹ Previous 21 - 40 of 642 Next › Last »
Showing 20 items per page