Skip to main content

Home/ Socialism and the End of the American Dream/ Group items matching "surveillance-incidents" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Paul Merrell

History of the Federal Judiciary - 0 views

  •  Olmstead v. United States: The Constitutional Challenges of Prohibition Enforcement Historical Documents Dissenting opinion of Justice Louis D. Brandeis in Olmstead v. United States Justice Brandeis’s dissenting opinion is one of the more notable dissents in Supreme Court history. He attempted to define a general right of privacy based on the Fourth and Fifth Amendments. Brandeis had long been interested in the problem of privacy in the modern age; years earlier he and his law partner, Samuel Warren, published what many consider the seminal article on the topic (Samuel Warren & Louis D. Brandeis, “The Right to Privacy,” 4 Harv. L. Rev. 193 (1890)). Brandeis’s opinion in Olmstead attempted to apply to the current era what he said were the principles of the Fourth and Fifth Amendments. Historians often overlook how much his approach draws on the dissenting opinion of Judge Rudkin in the circuit court, but Brandeis himself acknowledged his debt to Rudkin in the text. The quotation about “the form that evil had theretofore taken” referred to the Supreme Court decision in Weems v. United States, in which Justice Joseph McKenna wrote of the need for the Court to apply the general principles of the Constitution to new problems.
  • Moreover, “in the application of a constitution, our contemplation cannot be only of what has been but of what may be.” The progress of science in furnishing the Government with means of espionage is not likely to stop with wire-tapping. Ways may someday be developed by which the Government, without removing papers from secret drawers, can reproduce them in court, and by which it will be enabled to expose to a jury the most intimate occurrences of the home. Advances in the psychic and related sciences may bring means of exploring unexpressed beliefs, thoughts and emotions. “That places the liberty of every man in the hands of every petty officer” was said by James Otis of much lesser intrusions than these. To Lord Camden, a far slighter intrusion seemed “subversive of all the comforts of society.” Can it be that the Constitution affords no protection against such invasions of individual security? . . .
  • In Ex parte Jackson, 96 U.S. 727, it was held that a sealed letter entrusted to the mail is protected by the Amendments. The mail is a public service furnished by the Government. The telephone is a public service furnished by its authority. There is, in essence, no difference between the sealed letter and the private telephone message. As Judge Rudkin said below: “True, the one is visible, the other invisible; the one is tangible, the other intangible; the one is sealed, and the other unsealed, but these are distinctions without a difference.” The evil incident to invasion of the privacy of the telephone is far greater than that involved in tampering with the mails. Whenever a telephone line is tapped, the privacy of the persons at both ends of the line is invaded and all conversations between them upon any subject, and, although proper, confidential and privileged, may be overheard. Moreover, the tapping of one man’s telephone line involves the tapping of the telephone of every other person whom he may call or who may call him. As a means of espionage, writs of assistance and general warrants are but puny instruments of tyranny and oppression when compared with wire-tapping.
  • ...2 more annotations...
  • Time and again, this Court in giving effect to the principle underlying the Fourth Amendment, has refused to place an unduly literal construction upon it. This was notably illustrated in the Boyd case itself. Taking language in its ordinary meaning, there is no “search” or “seizure” when a defendant is required to produce a document in the orderly process of a court’s procedure. “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures,” would not be violated, under any ordinary construction of language, by compelling obedience to a subpoena. But this Court holds the evidence inadmissible simply because the information leading to the issue of the subpoena has been unlawfully secured. . . . The provision against self-incrimination in the Fifth Amendment has been given an equally broad construction. . . .
  • Decisions of this Court applying the principle of the Boyd case have settled these things. Unjustified search and seizure violates the Fourth Amendment, whatever the character of the paper; whether the paper when taken by the federal officers was in the home, in an office, or elsewhere; whether the taking was effected by force, by fraud, or in the orderly process of a court’s procedure. From these decisions, it follows necessarily that the Amendment is violated by the officer’s reading the paper without a physical seizure, without his even touching it; and that use, in any criminal proceeding, of the contents of the paper so examined—as where they are testified to by a federal officer who thus saw the document, or where, through knowledge so obtained, a copy has been procured elsewhere—any such use constitutes a violation of the Fifth Amendment. The protection guaranteed by the Amendments is much broader in scope. The makers of our Constitution undertook to secure conditions favorable to the pursuit of happiness. They recognized the significance of man’s spiritual nature, of his feelings, and of his intellect. They knew that only a part of the pain, pleasure and satisfactions of life are to be found in material things. They sought to protect Americans in their beliefs, their thoughts, their emotions and their sensations. They conferred, as against the Government, the right to be let alone—the most comprehensive of rights and the right most valued by civilized men. To protect that right, every unjustifiable intrusion by the Government upon the privacy of the individual, whatever the means employed, must be deemed a violation of the Fourth Amendment. And the use, as evidence in a criminal proceeding, of facts ascertained by such intrusion must be deemed a violation of the Fifth.
  •  
    The linked opinion is Justice Brandeis' dissent in Olmstead v. U.S., the first Supreme Court decision to approve the use of secret wiretap evidence in a criminal proceeding, even though gathered without a search warrant. The warrant requirement would later be imposed in 1967 by the decision in Katz v. U.S., which established that the Fourth Amendment the privacy of people, not places, reviving the Brandeis dissent to a large degree. Since Katz and the advent of broad government surveillance, Justice Brandeis' dissent is gaining still more attention. 
Paul Merrell

Documents: FBI Spyware Has Been Snaring Extortionists, Hackers for Years | Threat Level | Wired.com - 0 views

  • A sophisticated FBI-produced spyware program has played a crucial behind-the-scenes role in federal investigations into extortion plots, terrorist threats and hacker attacks in cases stretching back at least seven years, newly declassified documents show. As first reported by Wired.com, the software, called a "computer and internet protocol address verifier," or CIPAV, is designed to infiltrate a target’s computer and gather a wide range of information, which it secretly sends to an FBI server in eastern Virginia. The FBI’s use of the spyware surfaced in 2007 when the bureau used it to track e-mailed bomb threats against a Washington state high school to a 15-year-old student. But the documents released Thursday under the Freedom of Information Act show the FBI has quietly obtained court authorization to deploy the CIPAV in a wide variety of cases, ranging from major hacker investigations, to someone posing as an FBI agent online. Shortly after its launch, the program became so popular with federal law enforcement that Justice Department lawyers in Washington warned that overuse of the novel technique could result in its electronic evidence being thrown out of court in some cases. "While the technique is of indisputable value in certain kinds of cases, we are seeing indications that it is being used needlessly by some agencies, unnecessarily raising difficult legal questions (and a risk of suppression) without any countervailing benefit," reads a formerly-classified March 7, 2002 memo from the Justice Department’s Computer Crime and Intellectual Property Section.
  • The documents, which are heavily redacted, do not detail the CIPAV’s capabilities, but an FBI affidavit in the 2007 case indicate it gathers and reports a computer’s IP address; MAC address; open ports; a list of running programs; the operating system type, version and serial number; preferred internet browser and version; the computer’s registered owner and registered company name; the current logged-in user name and the last-visited URL. After sending the information to the FBI, the CIPAV settles into a silent "pen register" mode, in which it lurks on the target computer and monitors its internet use, logging the IP address of every server to which the machine connects. The documents shed some light on how the FBI sneaks the CIPAV onto a target’s machine, hinting that the bureau may be using one or more web browser vulnerabilities. In several of the cases outlined, the FBI hosted the CIPAV on a website, and tricked the target into clicking on a link. That’s what happened in the Washington case, according to a formerly-secret planning document for the 2007 operation. "The CIPAV will be deployed via a Uniform Resource Locator (URL) address posted to the subject’s private chat room on MySpace.com."
  • The software’s primary utility appears to be in tracking down suspects that use proxy servers or anonymizing websites to cover their tracks.
  • ...1 more annotation...
  • The documents appear to settle one of the questions the FBI declined to answer in 2007: whether the bureau obtains search warrants before using the CIPAV, or if it sometimes relies on weaker "pen register" orders that don’t require a showing of probable cause that a crime has been committed. In all the criminal cases described in the documents, the FBI sought search warrants. The records also indicate that the FBI obtained court orders from the Foreign Intelligence Surveillance Court, which covers foreign espionage and terrorism investigations, but the details are redacted. The FBI released 152 heavily-redacted pages in response to Threat Level’s FOIA request, and withheld another 623.
  •  
    The article summarizes many cases in which the CIPAV exploit was used by the FBI. But the article's closing observation that the released documents "whether the bureau obtains search warrants before using the CIPAV" stretches the evidence a bit too far, methinks. If they exist, the FBI very likely would not have produced records of incidents in which it used CIPAV without court authorization. 
Paul Merrell

NSA's Mideast spying 'intense' amid regional upheaval, say experts - Alarabiya.net English | Front Page - 0 views

  • Leaked documents disclosed earlier this week revealed that the U.S. National Security Agency intercepted 125 billion phone calls and SMS messages in January 2013, many of them originating in the Middle East. The NSA’s attention on the Middle East and the surrounding region is far more “intense than anything comparable in Europe,” according to Matthew Aid, a Washington, DC-based intelligence historian and expert. Strained relations between the United States and Saudi Arabia over resolving the Syrian conflict could be a possible reason for the NSA’s particularly large targeting of Saudi Arabia - over 7.8 billion times in one month – said Aid. Saudi-U.S. tension may have also resulted in Obama’s administration being “quite curious” over the kingdom’s thoughts on Syria, as the countries have consistently disagreed on the issue.
  • Aid, who in 2009 published a history on the NSA entitled “The Secret Sentry: The Untold History of the National Security Agency,” said that most of the former NSA contractor Edward Snowden’s leaks have not focused on the agency’s surveillance in the Middle East. “We’re waiting for that shoe to drop, but it hasn’t,” Aid told Al Arabiya News, stating that leaks by Snowden’s associates have been largely focused “on those countries which will generate immediate reaction in the press and from the governments in question.” Saudi Arabia and Iraq witnessed 7.8 billion wiretapping incidents from the NSA each, while Egypt and Jordan saw 1.8 billion and 1.6 billion respectively, according to Cryptome, a digital library that publishes leaked documents. Additionally, over 1.7 billion wiretapping incidents were recorded in Iran.
  • Commenting on the leaked data, Wesley Wark, a Canada-based global intelligence expert and professor at the University of Ottawa, said that a great majority of the NSA’s vast collection of intercepted data in the region would go unheard.
  • ...2 more annotations...
  • However, the likelihood of the NSA continuing to covertly mine such vast amounts of a possibly valueless data is low, according to Wark. He suspects that the NSA is beginning to confront a “moment of change,” due to internal political pressure in the United States, international outrage, and a possible conclusion drawn from all this that “building haystacks is not the way to find needles.”
  • Aid notes that leaks published on Cryptome do not contain any information on many countries in the Arab region, including Syria, Kuwait, Bahrain, and Qatar. “We’re missing some important parts of the puzzle,” he said. According to Aid, Snowden’s leaks show to a fuller extent the level of U.S. spying in the region. “There’s a lot more to be said [concerning the NSA’s clandestine operations in the Middle East] contained in the Snowden papers, it just hasn’t come out,” he said.
Paul Merrell

Korematsu's Demise? | Just Security - 0 views

  • There’s a lot that’s remarkable about last Tuesday’s Third Circuit decision in Hassan v. City of New York, which Faiza Patel cogently summarized in her post last week. In a nutshell, Hassan involves a challenge to secret intelligence operations carried out by the New York Police Department (NYPD) over the years since September 11 that allegedly targets Muslim communities “based on the false and stigmatizing premise that Muslim religious identity ‘is a permissible proxy for criminality, and that Muslim individuals, businesses, and institutions can therefore be subject to pervasive surveillance not visited upon individuals, businesses, and institutions of any other religious faith or the public at large.'” The district court had tersely granted the City’s motion to dismiss both because it concluded the plaintiffs lacked standing and because, in the alternative, it held that the plaintiffs had failed to overcome the pleading burden articulated by the Supreme Court in Iqbal. But the Third Circuit reversed on both fronts, holding that the plaintiffs’ allegations, if true, were more than enough to establish both that they had suffered an injury in fact sufficient to satisfy Article III standing, and that their equal protection and First Amendment claims were sufficiently plausible to satisfy Iqbal. To be sure, the Third Circuit’s decision is interlocutory — coming at a very preliminary stage in the litigation. But what I want to suggest in the post that follows is that, as much as any other post-September 11 judicial decision, Hassan represents the full-throated repudiation of the Supreme Court’s infamous World War II-era ruling in Korematsu v. United States that has been so long in coming — and so thoroughly overdue.
  • As I’ve written about before, Korematsu reflects two separate — but equally important — constitutional failures. The first failure was the internment policy itself, which we now know (and which the US government knew at the time) to have been a completely unnecessary — if not hysterical — overreaction to hyperbolic and (after Midway, at least) categorically overstated fears of a Japanese invasion of the West Coast. By itself, the camps were a dark stain on the history of civil liberties in the United States — albeit one of many, alas. But the second failure was, historically, the far more significant and unique one — the Supreme Court’s conscious constitutional rationalization of the internment policy, based upon a combination of naïveté on the Justices’ part and the affirmatively misleading (if not downright disingenuous) briefing by the federal government. As Justice Robert H. Jackson understood — and forcefully articulated — in his Korematsu dissent, the real violence to the “rule of law” resulting from the camps was thus not the underlying policy, but rather its validation by the Supreme Court. In his words, “a military commander may overstep the bounds of constitutionality, and it is an incident. But if we review and approve, that passing incident becomes the doctrine of the Constitution.”
  • But we’ve struggled somewhat with the second constitutional failure. The courts have repudiated Korematsu’s conviction; the Office of the Solicitor General has confessed error for its role in perpetuating the government’s misleading case before the Supreme Court; and scholars have suggested that Korematsu itself has become part of the “anti-canon” — the class of Supreme Court decisions so reviled that they are cited, if at all, in support of the wrongness of their holdings. But Korematsu itself remains on the books, as do broader concerns that courts are still vulnerable to Korematsu — style reasoning, i.e., that the need to protect national security might provide legal justification for government conduct that would otherwise be unjustifiable. Indeed, one need look no further than the ongoing debate over the SSCI’s torture report for evidence of the Korematsu mentality being alive and well.
  • ...2 more annotations...
  • That’s why I find the Third Circuit’s analysis in Hassan so significant — not because it allows this particular civil suit to go forward, but because it does so based upon an explicit (and conscious) rejection of Korematsu — style legal reasoning. As Judge Ambro explains, “No matter how tempting it might be to do otherwise, we must apply the same rigorous standards even where national security is at stake. We have learned from experience that it is often where the asserted interest appears most compelling that we must be most vigilant in protecting constitutional rights.” And applying the strict judicial scrutiny that is triggered by government action deemed to be intentionally discriminatory on the basis of religious affiliation, the court proceeds to hold that the NYPD lacked a sufficiently compelling justification for such discriminatory treatment, because even if abstract claims of security necessity could be a compelling government interest, the NYPD’s alleged policy was far too overbroad to survive the narrow tailoring required by strict scrutiny. Thus, quoting directly from Justice Jackson’s Korematsu dissent, Judge Ambro closed his opinion by noting that “Our job is judicial. We ‘can apply only law, and must abide by the Constitution, or [we] cease to be civil courts and become instruments of [police] policy.'”
  • Faiza’s post provides far more detail on the specifics of the Third Circuit’s analysis, and the opinion itself is worth a read. For present purposes, though, it’s this mentality that I find so refreshing — that even when the government invokes the specter of September 11 and the need to prevent future acts of terrorism, courts will not abdicate their responsibility to scrutinize the government’s justifications with care, and to be especially wary of overbroad government programs carried out under the broad guise of “necessity.” Hassan certainly isn’t the first example of this kind of principled judicial decisionmaking in a post-September 11 counterterrorism suit, but it is the one that, at least in my view, most directly confronts — and rejects — the kind of deferential judicial review that was responsible for the second constitutional failure in Korematsu, and all of the pain that followed.
Paul Merrell

Venezuela, Bolivia offer asylum to U.S. intel leaker Snowden - CNN.com - 1 views

  • Venezuelan President Nicolas Maduro has offered asylum to Edward Snowden, the state-run AVN news agency reported Friday, without offering details. And Bolivia "is willing to give asylum" to the U.S. intelligence leaker, President Evo Morales said Saturday, according to a government statement. The reports came shortly after Nicaraguan President Daniel Ortega said he would grant Snowden asylum in his country "if the circumstances permit." Ortega didn't elaborate on his announcement, made during a speech in Managua, except to say his country is "open and respectful to the right of asylum." "It's clear that that if the circumstances permit it we will gladly receive Snowden and will grant him asylum here in Nicaragua," Ortega said.
  • Meanwhile, an Icelandic lawmaker said Snowden would not get citizenship there, as he had requested, because Iceland's parliament refused to vote on an asylum proposal before ending its current session.
  • Another country that has seemed supportive of Snowden's quest for a new home is Bolivia, whose president has expressed anger at the United States over an incident involving the presidential plane and a rumor about Snowden. Several European countries refused to allow President Evo Morales' plane through their airspace Tuesday because of suspicions Snowden was aboard. With no clear path home available, the flight crew made an emergency landing in Vienna, Austria, where authorities confirmed Snowden was not a passenger. Bolivia's asylum offer is a "fair protest" to the incident, which involved Portugal, Italy, France and Spain, Morales said. Spain has said it did not restrict its airspace during that flight.
  • ...1 more annotation...
  • He put the blame squarely on the United States for the incident. "Message to the Americans: The empire and its servants will never be able to intimidate or scare us," Morales told supporters at El Alto International Airport outside La Paz, where he arrived late Wednesday. "European countries need to liberate themselves from the imperialism of the Americans." Morales said officials should analyze whether to shut the U.S. Embassy in his country. "Without the United States," he said, "we are better politically and democratically." Ecuadorian President Rafael Correa joined Morales in criticizing the United States' role in the situation, and Venezuela's Maduro blamed the CIA for pressuring the European governments to refuse to grant the plane passage.
  •  
    So three potential new homes for Edward Snowden, if he can find a route to one of them between hostile airspaces.
Paul Merrell

Justice for the MH17 victims is what we all need | Oriental Review - 0 views

  • After keeping a meaningful two-month pause in covering the course of investigation of the MH17 tragedy, the international press has suddenly broke into another wave of baseless accusations against “pro-Russia separatists”, triggered by a “secret report” made by the BND (Bundesnachrichtendienst, German foreign intelligence) for the Bundestag Control Committee on October 8, 2014. Ten days later the Spiegel alleged that at the meeting the BND president Gerhard Schindler had provided “satellite images and diverse photo evidence” to back up his case “proving that pro-Russian separatists captured a BUK air defense missile system at a Ukrainian military base and fired a missile on July 17 that exploded in direct proximity to the Malaysian aircraft”. The allegation was immediately caught up by a number of other top international media. On October 20 Alexander Nerad’ko, the director of Russia’s Federal Air Transport Agency, invited the German intelligence to publish documentation demonstrating the involvement of the insurgents or the Ukrainian army in the disaster. Unfortunately, his request is not met till now. Ironically, one day before BND presented its report to Bundestag, the former Dutch Foreign Affairs Minister Frans Timmermans has casually let out that “the body of one passenger was found wearing an oxygen mask”.
  • This piece of information trashes the theory (which we used to hold too) of a shoot down by a surface-to-air missile as in this case the instantaneous depressurization of the MH17 passenger cabin would cause immediate death of all passengers. Both Western and Russian experts understand that serious conclusions on the causes of MH17 tragedy should be based on professional forensic study of the wreckage and damaging elements. All available technical data from Ukrainian dispatch lines, surveillance by Russia and USA, information of the Ukrainian Air Defense and Boeing Corporation should be made available for the International MH17 investigation commission. All other “leakages” are pointless talks and deceitful manipulation of the public opinion. E.g. the British barrister Alexander Mercouris has provided a detailed analysis depicting numerous controversies in the German report (as least in its clauses leaked to the press).
  • The Russian experts has already gathered all available data and released the Incident Report on MH17 tragedy back in mid-August this year. Its full text in English is available here.
  • ...1 more annotation...
  • Of course, there are plenty of parties interested in concealing the real facts about flight MH17. Symptomatically, on August 8, 2014 the Ukraine, the Netherlands, Belgium and Australia signed a non-disclosure agreement on the crash investigation. Procrastination and delaying of an objective investigation by these sides and international organizations raises doubts whether the concerned parties will make public the findings and true circumstances of the crash of the Malaysia Airlines Boeing 777. Are the relatives of those who died in the flight MH17 the only interested people in bringing the real perpetrators of this horrible criminal act to justice?
  •  
    The point using the body found wearing an oxygen mark ruling out a surface to air missile because of instant cabin depressurization is a very strong point. Another sign pointing to the Ukraine fighter jet shooting out the cockpit, instantly killing the cockpit crew through depressurization, but the plane continuing to fly on autopilot for a period of time before the passenger cabin depressurized. 
Paul Merrell

US also eavesdrops on Israel, says former Mossad head | The Times of Israel - 0 views

  • day after it was revealed that the US National Security Agency monitored the private conversations of some 35 world leaders, former head of the Mossad Danny Yatom said Friday that the US listens in on its ally Israel as well.
  • “I can tell you with certain knowledge that [America] has been listening in on its allies, including Israel,” Yatom said, and “not necessarily in [Benjamin] Netanyahu’s tenure” as prime minister. “The US doesn’t really care about anyone [but itself] and the Americans are vehemently denying the incidents,” Yatom told the Israeli daily Maariv on Friday. ”It could very well be that these things [monitoring calls] are happening here [in Israel] too. When the Americans think they need to listen in on someone, they’ll do just that.” Yatom explained that there are two issues around which the Americans are likely spying on Israel — negotiations with Palestinians and the Iranian nuclear program.
  •  
    Ah, the finger-pointing at each other begins.
Paul Merrell

Fearing 'enemies,' Turkey blocks YouTube | Europe | DW.DE | 28.03.2014 - 0 views

  • First Twitter, now YouTube. The Turkish telecoms authority TIB said the move to was an "administrative measure." But only a few hours before the measure came into force, a rather provocative recording was posted on the site. According to the official view, the audio clip is one of the most flagrant among the many that anonymous opponents of the government have been leaking online over the last few months. It exposes the Islamic-conservative government led by Prime Minister Recep Tayyip Erdogan just before the municipal elections scheduled to take place on March 30. The conversation that was leaked this time is between Foreign Minister Ahmet Davutoglu and several heads of the intelligence service and the military. Participants of the conversation were apparently looking for a reason to go to war with Syria.
  • According to reports from the Turkish newspaper Hürriyet, the Turkish foreign ministry has confirmed the authenticity of the recording and has explained that the conversation took place in the foreign ministry. The ministry also emphasized, however, that the contents of the recording were distorted. In a statement issued by the Ministry of Foreign Affairs this explanation was given: "Monitoring such a meeting of a highly confidential nature which was held at a location such as the office of the foreign minister, where the most sensitive security issues of the state are discussed; and releasing these conversations to the public are a despicable attack, an act of espionage and a very serious crime against the national security of Turkey. This incident reveals the extent the threats of cyber and electronic attacks that Turkey encounters." The statement called the perpetrators "enemies of our state" and said they would be identified and severely punished as soon as possible.
  • But according to the legal expert, another aspect of the problem is at stake here. "This is a case of espionage. The alleged conversation took place in a secure location and it is on a very sensitive topic - the question of whether there should or should not be a war with Syria," he says. Tokuzlu added that the content of the conversation was clearly supposed to be released to the public in order to influence the results of this Sunday's (30.03.2014) local elections. But blocking the whole YouTube site was never an appropriate solution, Tokuzlu maintains. "There is no reason to block entire sites. You could block individual accounts or videos; that would be legitimate in this sort of a case," he said. Tokuzlu also explained that blocking YouTube could not be compared with the move to block Twitter: "The Security Council in Turkey held an emergency meeting. Right after, YouTube was blocked. That shows how important this case is."
  • ...2 more annotations...
  • The Turkish radio and television supervisory board RTÜK banned several Turkish media outlets from spreading the video or communicating its contents. According to the newspaper Hürriyet, the Turkish federal prosecutor's office has already initiated investigations against those responsible for the video. Measures taken too far According to legal expert Bertan Tokuzlu, the recording gives the impression that the government wanted to make trouble internationally, in order to distract the public from internal problems. "If the government wanted to create a reason for war, that is absolutely not in keeping with international legal standards," says Tokuzlu.
  • The recording also mentions Turkish arms deliveries to Syrian opposition groups. "If that is the case and we have a war crime to deal with, then the public has a right to know this information, according to the European Court of Human Rights," Tokuzlu stressed, adding that the Turkish government's reaction to the publication of the conversation was very thin-skinned. "If the recording provides evidence of a war crime, then that might mean the government will be brought before a war crimes tribunal in the near future. That is a delicate subject."
  •  
    This article is from 28 March 2014. The Turkish government a few days ago restored access to YouTube and Twitter, after reports that more than 300,000 Turks had thwarted the ban by learning to use Tor and VPN tunneling, posing a long-term obstacle to Turkish intelligence service surveillance. The Foreign Ministry recording was of the Foreign Minister and other high Turkish officials discussing plans for a false flag attack on Turkey to justify Turkey launching its own direct military attacks on Syria. Because Turkey is a member of NATO, an attack on Turkey triggers the obligations of other NATO member nations to join Turkey's "defense." 
Paul Merrell

F.B.I. Informant Is Tied to Cyberattacks Abroad - NYTimes.com - 0 views

  • An informant working for the F.B.I. coordinated a 2012 campaign of hundreds of cyberattacks on foreign websites, including some operated by the governments of Iran, Syria, Brazil and Pakistan, according to documents and interviews with people involved in the attacks.Exploiting a vulnerability in a popular web hosting software, the informant directed at least one hacker to extract vast amounts of data — from bank records to login information — from the government servers of a number of countries and upload it to a server monitored by the F.B.I., according to court statements.
  • The attacks were coordinated by Hector Xavier Monsegur, who used the Internet alias Sabu and became a prominent hacker within Anonymous for a string of attacks on high-profile targets, including PayPal and MasterCard. By early 2012, Mr. Monsegur of New York had been arrested by the F.B.I. and had already spent months working to help the bureau identify other members of Anonymous, according to previously disclosed court papers.One of them was Jeremy Hammond, then 27, who, like Mr. Monsegur, had joined a splinter hacking group from Anonymous called Antisec. The two men had worked together in December 2011 to sabotage the computer servers of Stratfor Global Intelligence, a private intelligence firm based in Austin, Tex.
  • Shortly after the Stratfor incident, Mr. Monsegur, 30, began supplying Mr. Hammond with lists of foreign websites that might be vulnerable to sabotage, according to Mr. Hammond, in an interview, and chat logs between the two men. The New York Times petitioned the court last year to have those documents unredacted, and they were submitted to the court last week with some of the redactions removed.Continue reading the main story “After Stratfor, it was pretty much out of control in terms of targets we had access to,” Mr. Hammond said during an interview this month at a federal prison in Kentucky, where he is serving a 10-year sentence after pleading guilty to the Stratfor operation and other computer attacks inside the United States. He has not been charged with any crimes in connection with the hacks against foreign countries.
  • ...2 more annotations...
  • according to an uncensored version of a court statement by Mr. Hammond, leaked online the day of his sentencing in November, the target list was extensive and included more than 2,000 Internet domains. The document said Mr. Monsegur had directed Mr. Hammond to hack government websites in Iran, Nigeria, Pakistan, Turkey and Brazil and other government sites, like those of the Polish Embassy in Britain and the Ministry of Electricity in Iraq.
  • The hacking campaign appears to offer further evidence that the American government has exploited major flaws in Internet security — so-called zero-day vulnerabilities like the recent Heartbleed bug — for intelligence purposes. Recently, the Obama administration decided it would be more forthcoming in revealing the flaws to industry, rather than stockpiling them until the day they are useful for surveillance or cyberattacks. But it carved a broad exception for national security and law enforcement operations.
  •  
    Has no one in government ever heard of the concept of leadership by example? Or the Golden Rule?
Paul Merrell

USS Pueblo: LBJ Considered Nuclear Weapons, Naval Blockade, Ground Attacks in Response to 1968 North Korean Seizure of Navy Vessel, Documents Show - 0 views

  • Washington, DC, January 23, 2014 – Forty-six years ago today - well before Edward Snowden was born - the National Security Agency suffered what may still rank as the most significant compromise ever of its code secrets when the American spy ship USS Pueblo was captured by communist forces off the coast of North Korea on January 23, 1968. The U.S. Navy signals intelligence ship was on a mission to intercept radio and electronic transmissions, and apparently sailing in international waters, when North Korean naval units opened fire, then boarded the vessel and took its crew hostage for almost a year, sparking a major international crisis. Beyond the dramatic political ramifications of the seizure and hostage-taking for the Lyndon Johnson administration and U.S. world standing, the incident resulted in the capture of a dozen top secret encryption devices, maintenance manuals, and other code materials. Because it involved actual encryption equipment rather than just papers and briefing materials, the Pueblo affair may have produced a much greater loss than the recent disclosures of former NSA contract employee Edward Snowden.
  • Recently declassified documents posted today by the National Security Archive describe tense U.S. internal reactions to the Pueblo seizure, and include previously withheld high-level political and military deliberations over how to respond to the episode in an atmosphere fraught with the dangers of a superpower conflict. Military contingency plans, which President Lyndon Johnson eventually rejected, included a naval blockade, major air strikes and even use of nuclear weapons against North Korea.
Paul Merrell

New York Times says UK tried to get it to hand over Snowden documents | World news | theguardian.com - 0 views

  • The editor of the New York Times, Jill Abramson, has confirmed that senior British officials attempted to persuade her to hand over secret documents leaked by the former National Security Agency contractor Edward Snowden.Giving the newspaper's first official comments on the incident, Abramson said that she was approached by the UK embassy in Washington after it was announced that the New York Times was collaborating with the Guardian to explore some of the files disclosed by Snowden. Among the files are several relating to the activities of GCHQ, the agency responsible for signals interception in the UK."They were hopeful that we would relinquish any material that we might be reporting on, relating to Edward Snowden. Needless to say I considered what they told me, and said no," Abramson told the Guardian in an interview to mark the International Herald Tribune's relaunch as the International New York Times.The incident shows the lengths to which the UK government has gone to try to discourage press coverage of the Snowden leaks. In July, the government threatened to take legal action against the Guardian that could have prevented publication, culminating in the destruction of computer hard drives containing some of Snowden's files.
  • Abramson said the spectacle of angle grinders and drills being used to destroy evidence in a newspaper basement was hard to conceive in the US, where the First Amendment offers free speech guarantees. "I can't imagine that. The only equivalent I can think of is years ago when the New York Times was enjoined by a lower court from publishing the Pentagon papers, but the supreme court came in and overruled that decision. Prior restraint is pretty much unthinkable to me in this country."Abramson has been executive editor of the New York Times, America's largest and most influential newspaper, since 2011. She said that the conversation with the UK's Washington embassy was the extent so far of British attempts to influence the paper's editorial decisions in relation to Snowden.
Paul Merrell

Spying in the German Banana Republic | New Eastern Outlook - 0 views

  • A German spy employed by Bundesnachrichtendienst (BND) was arrested in Berlin in early July 2014. He was charged with handing out the top secret documents to foreign secret services, namely the CIA. A few days later it was announced that  German law enforcement agencies began searching for another US spy that had been stealing information from the The Federal Ministry of Defence.First appeared: http://journal-neo.org/2015/01/21/rus-bananovaya-respublika-germaniya/
  •  
    The incident involving a CIA spy uncovered within the BND ranks was perceived by most Europeans as total nonsense: a total of 218 top secret documents were stolen from BND by a 31-year-old employee Marcus R. over a period of two years while he was cooperating with the "friendly" CIA. The White House was paying  "the loyal agent" according to the "banana republic," rates up to and including 25 thousand euros, omitting glass beads and colored feathers. However, according to the German newspaper Bild, the investigation found out this January that this double agent had provided the US intelligence with a list of 3,500 of BND employees, all who are currently working across the world. This can hardly be regarded as an expression of Washington's friendship towards Germany. However, according to the German newspaper Bild, the investigation found out this January that this double agent had provided the US intelligence with a list of 3,500 of BND employees, all who are currently working across the world. This can hardly be regarded as an expression of Washington's friendship towards Germany.
Paul Merrell

U.S. Military Operations Are Biggest Motivation for Homegrown Terrorists, FBI Study Finds - 0 views

  • A secret FBI study found that anger over U.S. military operations abroad was the most commonly cited motivation for individuals involved in cases of “homegrown” terrorism. The report also identified no coherent pattern to “radicalization,” concluding that it remained near impossible to predict future violent acts. The study, reviewed by The Intercept, was conducted in 2012 by a unit in the FBI’s counterterrorism division and surveyed intelligence analysts and FBI special agents across the United States who were responsible for nearly 200 cases, both open and closed, involving “homegrown violent extremists.” The survey responses reinforced the FBI’s conclusion that such individuals “frequently believe the U.S. military is committing atrocities in Muslim countries, thereby justifying their violent aspirations.” Online relationships and exposure to English-language militant propaganda and “ideologues” like Anwar al-Awlaki are also cited as “key factors” driving extremism. But grievances over U.S. military action ranked far above any other factor, turning up in 18 percent of all cases, with additional cases citing a “perceived war against Islam,” “perceived discrimination,” or other more specific incidents. The report notes that between 2009 and 2012, 10 out of 16 attempted or successful terrorist attacks in the United States targeted military facilities or personnel.
  • The report is titled “Homegrown Violent Extremists: Survey Confirms Key Assessments, Reveals New Insights about Radicalization.” It is dated December 20, 2012. An FBI unit called the “Americas Fusion Cell” surveyed agents responsible for 198 “current and disrupted [homegrown violent extremists],” which the report says represented a fraction of all “pending, U.S.-based Sunni extremist cases” at the time. The survey seems designed to look only at Muslim violent extremism. (The FBI declined to comment.) Agents were asked over 100 questions about their subjects in order to “identify what role, if any,” particular factors played in their radicalization — listed as “known radicalizers,” extremist propaganda, participation in web forums, family members, “affiliation with religious, student, or social organization(s) where extremist views are expressed,” overseas travel, prison or military experience, and “significant life events and/or grievances.” Among the factors that did not “significantly contribute” to radicalization, the study found, were prison time, military service, and international travel. Although, the report notes, “the FBI historically has been concerned about the potential for prison radicalization,” in fact, “survey results indicate incarceration was rarely influential.” The report ends with recommendations that agents focus their attention on web forums, social media, and other online interactions, and step up surveillance of “known radicalizers” and those who contact them.
  • The study echoes previous findings, including a 2011 FBI intelligence assessment, recently released to MuckRock through a public records request, which concluded that “a broadening U.S. military presence overseas” was a motivating factor for a rise in plotted attacks, specifically the wars in Iraq and Afghanistan. That study also found “no demographic patterns” among the plotters. “Insofar as there is an identifiable motivation in most of these cases it has to do with outrage over what is happening overseas,” says John Mueller, a senior research scientist with the Mershon Center for International Security Studies at Ohio State University and co-author of “Chasing Ghosts: The Policing of Terrorism.” “People read news reports about atrocities and become angry,” Mueller said, adding that such reports are often perceived as an attack on one’s own in-group, religion, or cultural heritage. “It doesn’t have to be information from a jihadist website that angers someone, it could be a New York Times report about a drone strike that kills a bunch of civilians in Afghanistan.”
  • ...2 more annotations...
  • Perpetrators of more recent attacks have latched onto U.S. foreign policy to justify violence. The journals of Ahmad Rahami, accused of bombings in Manhattan and New Jersey last month, cited wars in Iraq, Syria, and Afghanistan. In a 911 call, Omar Mateen, who killed 49 people in an Orlando nightclub earlier this year, claimed he acted in retaliation for a U.S. airstrike on an ISIS fighter. Dzhokhar Tsarnaev told investigators that the wars in Iraq and Afghanistan motivated his and his brother’s attack on the Boston Marathon. In many of these cases, pundits and politicians focus on the role of religion, something Marc Sageman, a former CIA officer and author of “Leaderless Jihad: Terror Networks in the Twenty-First Century,” describes as a “red herring,” citing a history of shifting ideologies used to justify terrorist acts.
  • The U.S. government has announced plans to spend millions of dollars on “Countering Violent Extremism” initiatives, which are supposed to involve community members in spotting and stopping would-be extremists. These initiatives have been criticized as discriminatory, because they have focused almost exclusively on Muslim communities while ignoring political motivations behind radicalization. “Politicians try very hard not to talk about foreign policy or military action being a major contributor to homegrown terrorism,” Sageman says, adding that government reticence to share raw data from terrorism cases with academia has hindered analysis of the subject.
Paul Merrell

US-Saudi Plan: Let 9,000 ISIS Fighters Walk Free from Mosul - to Fight in Syria - 0 views

  • Judging by both the words, and deeds of the Obama White House and its political ‘diplomatic’ appointees led by perfidious John Kerry and caustic Samantha Power – all evidence to date points to the US wanting to escalate its war on Syria – while happily baiting a military confrontation, and ‘World War‘ scenario with Russia and its allies in the process.  If this latest leak is indeed true – and time will certainly tell whether or not it is, it would constitute one of the most egregious violations of both US and international law – by the United States government and its theocratic dictator partner in Saudi Arabia. Washington’s own anti-terror legislation expressly forbids colluding to provide logistical or material support for terrorist groups, and this US-Saudi venture would be the latest in a long list of violations…
  • Here’s what makes this a potential shocker: the operation allows for safe passage for 9,000 ISIS fighters on the proviso that they are transferred from Iraq to eastern Syria in order to help US plans for “regime change” there.  “At the time of the assault, coalition aircraft would strike only on a pre-agreed detached buildings in the city, which are empty, the source said.” “According to him [the source], the plan of Washington and Riyadh also provides that the rebels move from Mosul to Syria for the attack on the government-controlled town of troops.” Essentially, Washington and Saudi Arabia, will allow 9,000 ISIS (Islamic State) fighter FREE passage into Syria if they agree to join Washington’s “regime change” operations there. This could also include, “… eastern regions of Syria to follow a major offensive operation, which involves the capture of Deir ez-Zor and Palmyra,” the source added. Before you write this story off as some ornate Russian psychological operation, consider the long trend arch. The US along with its generous Gulf sidekicks, have already established a solid track record of aiding and abetting ISIS – not just in Syria, but in Iraq too. The record shows that the US is guilty on a number of counts…
  • If the Mosul leak is true, then it wouldn’t be the first time that the US has provided cover in the military pantomime the world has come to know as “the fight against ISIS.” When large ISIS convoys crossed the Syrian desert to invade and occupy the ancient Syrian city of Palmyra in May 2015, the US ‘Coalition’ airforce did nothing, and allowed ISIS to take and destroy part of the world’s great historic cultural heritage, along with the murder of scores of innocent civilians. Professor Tim Anderson from Sydney University states: “U.S. weapons with Israeli ammunition were used by Islamic State group when taking over Palmyra. The extremists also had U.S. military rations.” “The U.S., which since 2014 claimed to be conducting a war against ISIS in Iraq and Syria, and which had air power and sophisticated surveillance of the region, did nothing to stop the huge ISIS advance on Palmyra.” The US isn’t even shy about its laissez-faire policy with ISIS in the field, with the New York Times openly boasting, “Any airstrikes against Islamic State militants in and around Palmyra would probably benefit the forces of President Bashar al-Assad. So far, United States-led airstrikes in Syria have largely focused on areas far outside government control, to avoid the perception of aiding a leader whose ouster President Obama has called for.”
  • ...4 more annotations...
  • More importantly however, is what kind of message an US statement like that sends to ISIS, as well as Al Nusra and other terrorist brigades inside Syria, which is basically, “we do not need to worry about US air strikes, only Syrian Army and Russian strikes.” This situation really sums up the utter fraud and contempt of the US deception in Syria, and it’s no surprise that the Russian Foreign Ministry are reticent to extend themselves any more where the US is concerned. Then, in March 2016, when ISIS fled Palmyra, back across the desert towards Deir ez-Zor and Raqqa – the great and powerful US ‘Coalition’ airforce actually helped ISIS in a number of ways, including allowing them free passage once more. In late August, we were told that the Turkish Army, alongside “allied Syrian rebels” (terrorist group Faylaq al-Sham) backed by the US air cover, invaded Syria in order to capture the “ISIS-held” town of Jarabulus, Syria, this supposedly to cut off ISIS’s last open route into Turkey. But what happened to ISIS? The NYT even admitted that, “… it appeared that most of the militants had fled without a fight.” Here, ISIS appears to have been given advanced warning – by either US or Turkish intelligence, as they left the contested town of Jarabulus quietly, but in droves. In reality, Turkey twisted this operation in order to attack and degrade Kurdish militias including the US-backed artificial construct called the Syrian Democratic Forces (SDF), and pro-Kurdish People’s Protection Units (YPG) and Kurdish Democratic Union Party (PYD), the Syrian affiliate of the militant Kurdistan Workers’ Party (PKK) in Iraq and Turkey – all of whom are meant to be fighting ISIS. Instead, they are now busy dodging Turkish artillery rounds. Confusing, yes, but true nonetheless.
  • It’s also common knowledge now, that top of the line US weaponry is being used by ISIS, both in Iraq, in Afghanistan and in Syria as well. In fact, if not for US weapons and supplies (along with US air intervention, or noninterventions), ISIS would have struggled to maintain many of the strategic positions it enjoys today. For the last 3 years, US officials have been dodging this issue, and when they do admit this is true, their patronizing party line is that, “this must be a mistake, if they do have US weapons, we didn’t mean it.” As if the world was born yesterday. Perhaps the most flagrant violation by the US-led forces in aiding and abetting ISIS took place on Sept 17, 2016, when the US-led Coalition bombed Syrian Army positions outside of Deir ez-Zor near al-Tharda Mountain, killing some 80 soldiers and injuring 100 more.  As if by design, an ISIS offensive began immediately following the US massacre of Syrian soldiers. Clearly, this bold move by the Pentagon paved the way for a major ISIS advance. To any normal observer, the US attack was a belligerent act of war that effective destroyed an already fragile bilateral ceasefire agreement, and yet the US response was to somehow blame Russia for calling an emergency UNSC meeting to discuss the incident. Judging by this response, it’s pretty clear that US wants to see the Syrian Conflict carry on for a while, and it will need groups like ISIS to make that happen.
  • The other problem with Washington’s hollow righteousness in the Middle East is that there are key members of the US-led “Coalition” who are financing ISIS, Al Nusra Front, Nour al Din Zinki, and Arar al Sham (all ‘moderate’ terrorists we’re told) militants in Syria, Iraq and beyond. This fact was recently admitted by former US Secretary of State and Democratic candidate Hillary Clinton, as revealed in this week’s batch of Wikileaks emails. Clinton writes: “While this military/para-military operation is moving forward, we need to use our diplomatic and more traditional intelligence assets to bring pressure on the governments of Qatar and Saudi Arabia, which are providing clandestine financial and logistic support to ISIL and other radical Sunni groups in the region.”  Add to that the multiple exposures over the last 3 years of the US CIA illegally trafficking lethal arms to Al Nusra and other terrorists through covert operations like Timber Sycamore. Still, US and NATO member state officials and their media gatekeepers continue to deny it and play dumb, rather than come clean that the United States and its ‘partners’ in the region are helping, not hindering ISIS terrorism. Some might ask: why would they do a thing like that? By now, the answer should be simple, but threefold:
  • ISIS is still one of Washington’s best hope for continuing instability, and “regime change” in Syria. The existence of ISIS in Syria and Iraq guarantees that Washington can invite itself to the party.  The ISIS brand has been a boon for the global military industrial complex and all of its bottom-feeder businesses and ‘security’ contract firms. What’s so comical yet even more tragic, is how prominent the topic of “ISIS” factors into all of the vapid ‘national security’ debates and media panels in this year’s US Presidential election, and in the dumbed-down ‘coverage’ of the delusional US mainstream media, led by Pentagon surrogate CNN, and hopeless FOX News. Judging by their prosaic ‘coverage’, neither the networks, nor Hillary Clinton or Donald Trump have the slightest clue of what the reality on the ground is. Instead we here, “My ISIS plan is better than yours!” The US political conversation has gone beyond ridiculousness. The corps of US military and CIA media spokesman aren’t much better. The sad part is some of them do know what is really happening, but would rather lie to the American public. With so much double dealing, who can you trust? Certainly not anyone in Washington. More on the White House’s latest dangerous proposition….
Paul Merrell

Court to rule on cellphone privacy : SCOTUSblog - 0 views

  • Moving into another conflict between technology and privacy, the Supreme Court agreed on Friday afternoon to rule on police authority to search the contents of a cellphone they take from an individual they have arrested.  The Court accepted for review a state case and a federal case, involving differing versions of hand-held telephone capacity.
  • Both of the new cases on cellphone privacy involve the authority of police, who do not have a search warrant, to examine the data that is stored on a cellphone taken from a suspect at the time of arrest.  The two cases span the advance in technology of cellphones:  the government case, Wurie, involves the kind of device that is now considered old-fashioned — the simple flip phone.  The Riley case involves the more sophisticated type of device, which functions literally as a hand-held computer, capable of containing a great deal more personal information. The state case involves a San Diego man, David Leon Riley, convicted of shooting at an occupied vehicle, attempted murder, and assault with a semi-automatic weapon.  Riley was not arrested at the time of the shooting incident in August 2009; instead, he was arrested later, after he was stopped for driving with expired license plates.   Police seized the cellphone he was carrying at the time of his arrest, and twice examined its contents, without a warrant. The data turned up evidence identifying him as a gang member out to kill members of a rival gang.  Other contents included a photo of him with a red car seen at the shooting site.  Police were then able to trace calls, leading to a trail of evidence pointing to Riley as a participant in the shooting.  No one positively identified him, but the data from the cellphone search was put before the jury, which convicted him of all three counts.  He has been sentenced to fifteen years to life in prison.
  • Riley’s petition had posed a general question about whether the Fourth Amendment allowed police without a warrant to search “the digital contents of an individual’s cellphone seized from the person at the time of arrest.”  In granting review, the Court said it would only rule on this issue: “Whether evidence admitted at [his] trial was obtained in a search of [his] cellphone that violated [his] Fourth Amendment rights.” The government case involves a South Boston man, Brima Wurie.  In 2007, a police officer saw him make an apparent drug sale out of his car.  The officer confronted the buyer, turning up two bags of crack cocaine. He partially identified his drug source. Officers followed Wurie from the scene, and arrested him.  He was then taken to a police station, where the officers retrieved two cellphones.   One of the phones was receiving repeated calls from a number identified as Wurie’s home.  The officers checked the phone’s call log.  They traced him to his house.  The officers deemed the fact that he had cellphones with him as an indication that he carried out drug dealing with the use of such a device. He was convicted of being a felon who had a gun and ammunition, distributing crack cocaine, and possessing the crack with intent to distribute it  He sought to block the use of the evidence taken from his cellphone, but that failed.  He was convicted on all charges, and has been sentenced to 262 months in prison.
  • ...1 more annotation...
  • Although the two cases raise the same constitutional issue, the Court did not consolidate them for review, so presumably there will be separate briefing and argument on each.  They probably would be argued one after the other, however.  The Court did not expedite the briefing schedule, but they still are expected to be heard in April.
Paul Merrell

Eric Schmidt and Jared Cohen says Google data now protected from government spying - DailyWebJournal - DailyWebJournal - 0 views

  • Google’s Eric Schmidt and Jared Cohen were wide-ranging session at SXSW today and they revealed that Google’s data is now safely protected from the prying eyes of government organizations. In the last few days Google upgraded its security measure following revelations that Britain’s GCHQ had intercepted data being transmitted between Google datacenters, Schmidt said that his company’s upgrades following the incident left him “pretty sure that information within Google is now safe from any government’s prying eyes.” In addition to increased encryption, which Google has discussed publicly to a media, Schmidt said the company had made further undisclosed improvements to its security in recent months.
Paul Merrell

Switzerland Furious About Snowden's Charge That the CIA Conducts Economic Espionage Against Formerly Secret Swiss Banks - Hit & Run : Reason.com - 0 views

  • One of the many lurid details in The Guardian’s remarkable interview with NSA whistleblower Edward Snowden was his account of what initially prompted him to leak: By 2007, the CIA stationed him with diplomatic cover in Geneva, Switzerland. His responsibility for maintaining computer network security meant he had clearance to access a wide array of classified documents. That access, along with the almost three years he spent around CIA officers, led him to begin seriously questioning the rightness of what he saw. He described as formative an incident in which he claimed CIA operatives were attempting to recruit a Swiss banker to obtain secret banking information. Snowden said they achieved this by purposely getting the banker drunk and encouraging him to drive home in his car. When the banker was arrested for drunk driving, the undercover agent seeking to befriend him offered to help, and a bond was formed that led to successful recruitment. "Much of what I saw in Geneva really disillusioned me about how my government functions and what its impact is in the world," he says. "I realised that I was part of something that was doing far more harm than good."
  • Given that the U.S. has waged a long and mostly successful campaign to rid the world of the scourge of Swiss banking privacy, an effort that largely culminated in an agreement signed just last Friday, the long-beleagured Swiss are a bit put out by the allegation that American spooks were thumbling the scale. Here’s Swiss Info: "What is really very serious is that [US] agents are active on foreign territory, and violate the laws of the country where they are," former Swiss parliamentarian and prosecutor Dick Marty told public radio on Monday.  "This is not the first time they have done this, and I must say that they have been spoiled by the Swiss. For too long Switzerland has tolerated CIA agents doing more or less whatever they wanted on our territory." Other quotes in the article are more hesitant; most express weariness at a world subjected to Washington's rules. Meanwhile, GenevaLunch.com reports that the Snowden disclosure "could not come at a worse time for the Swiss government, trying to convince parliament to back its emergency plan that would allow Swiss banks to turn over data on tax evaders to the US government." It really is remarkable, and not nearly remarked upon enough, how the United States of America just imposes its international legal preferences upon the world, then exempts itself from those rules as necessary.
Paul Merrell

CIA sued over Senate spying | TheHill - 0 views

  • A Washington-based privacy organization is suing the CIA to obtain details about how it spied on Senate staffers.The Electronic Privacy Information Center (EPIC) filed a Freedom of Information Act lawsuit to obtain the agency inspector general’s report on the spying incident, it announced on Thursday.ADVERTISEMENTTo date, the CIA has yet to release the full details of how five agency staffers “improperly accessed” committee files and records on a network used by the Senate Intelligence Committee. Instead, the agency released a one-page unclassified summary of the report in July.
  • The organization first filed a FOIA request to obtain the watchdog report nearly two months ago, but has yet to receive a response, it said.By law, a federal agency is supposed to respond to a FOIA request within 20 business days. It is supposed to respond to a request to expedite the response — which EPIC also asked for — within 10 days.
Paul Merrell

Dutch MH17 Investigation Omits US "Intel". Fabrications and Omissions Supportive of US-NATO Agenda Directed against Russia | Global Research - 0 views

  • The absence of America’s so-called “intelligence” regarding the downing of Malaysia Airlines MH17 over Ukraine in a 34 page Dutch Safety Board preliminary report raises serious questions about the credibility and legitimacy of both America’s political agenda, and all agencies, organizations, and political parties currently behind it. The report titled, “Preliminary Report: Crash involving Malaysia Airlines Boeing 777-200 flight MH17″ (.pdf), cites a wide variety of evidence in its attempt to determine the cause of flight MH17′s crash and to prevent similar accidents or incidents from occurring again in the future. Among this evidence includes the cockpit voice recorder (CVR), the flight data recorder (FDR), analysis of recorded air traffic control (ATC) surveillance data and radio communication, analysis of the meteorological circumstances, forensic examination of the wreckage (if recovered and possible foreign objects if found), results of the pathological investigation, and analysis of the in-flight break up sequence.
  • Satellite images are referenced in regards to analyzing the crash site after the disaster, however, no where in the report is mentioned any evidence whatsoever of satellite images of missile launchers, intelligence from the United States regarding missile launches, or any information or evidence at all in any regard suggesting a missile had destroyed MH17. In fact, the report concludes by stating: This report is preliminary. The information must necessarily be regarded as tentative and subject to alternation or correction if additional evidence becomes available. Further work will at least include the following areas of interest to substantiate the factual information regarding:
  • The report specifically mentions information collected from Russia, including air traffic control and radar data – both of which were publicly shared by Russia in the aftermath of the disaster. The report also cites data collected from Ukraine air traffic controllers. The United States however, apart from providing technical information about the aircraft itself considering it was manufactured in the US, provided absolutely no data in any regard according to the report.
  • ...3 more annotations...
  • Had the US actually possessed any credible information to substantiate its claims that MH17 was shot down by a missile, such evidence surely would have been submitted to and included in the Dutch Safety Board’s preliminary reporting. That it is predictably missing confirms what commentators, analysts, and politicians around the world had long since suspected – the West’s premature conclusions regarding MH17′s demise were driven by a political agenda, not a factually based search for the truth. The evidence that MH17 was shot down by a missile as the West insisted is missing because it never existed in the first place. That the Dutch Safety Board possesses such a vast amount of information but is still unable to draw anything but the most tentative conclusions, exposes the alleged certainty of Western pundits and politicians in the hours and days after MH17′s loss as an utterly irresponsible, politically motivated, exploitation of tragedy at best, and at worst, exposing the West – NATO in particular – as possible suspects in a crime they clearly stood the most to benefit from.
  • In the wake of the MH17 tragedy, the West would rush through a series of sanctions against Russia as well as justify further military aid for the regime in Kiev, Ukraine and the literal Neo-Nazi militant battalions serving its pro-Western agenda amid a brutal civil war raging in the country’s eastern most provinces. With sanctions in hand, and the war raging on in earnest, the MH17 disaster dropped entirely out of Western narratives as if it never occurred. Surely if the West had solid evidence implicating eastern Ukrainian rebels and/or Russia, the world would never have heard the end of the MH17 disaster until the truth was fully aired before the public. When Dutch investigators published their preliminary report, the West merely reiterated its original claims, simply imposing their contradictory nature upon the report – most likely believing the public would never actually read its 34 pages. For example, Reuters in a report titled, “Malaysia: Dutch report suggests MH-17 shot down from ground,” would brazenly claim:
  • Malaysia Airlines flight MH17 broke apart over Ukraine due to impact from a large number of fragments, the Dutch Safety Board said on Tuesday, in a report that Malaysia’s prime minister and several experts said suggested it was shot down from the ground. The title of Reuters’ propaganda piece directly contradicts its first paragraph which reveals “experts,” not the actual Dutch Safety Board report, claimed it was “shot down from the ground,” while the report itself says nothing of the sort. The experts cited by Reuters in fact had no association whatsoever with the preliminary report and instead are the same mainstay of cherry picked commentators the West constantly defers to while building up and perpetuating utterly fabricated narratives to advance its agenda globally.
Paul Merrell

Tomgram: Nick Turse, How "Benghazi" Birthed the New Normal in Africa | TomDispatch - 0 views

  • Amid the horrific headlines about the fanatical Islamist sect Boko Haram that should make Nigerians cringe, here’s a line from a recent Guardian article that should make Americans do the same, as the U.S. military continues its “pivot” to Africa: “[U.S.] defense officials are looking to Washington’s alliance with Yemen, with its close intelligence cooperation and CIA drone strikes, as an example for dealing with Boko Haram.” In fact, as the latest news reports indicate, that “close” relationship is proving something less than a raging success.  An escalating drone campaign against al-Qaeda in the Arabian Peninsula (AQAP) has resulted in numerous dead “militants,” but also numerous dead Yemeni civilians -- and a rising tide of resentment against Washington and possibly support for AQAP.  As the Washington-Sana relationship ratchets up, meaning more U.S. boots on the ground, more CIA drones in the skies, and more attacks on AQAP, the results have been dismal indeed: only recently, the U.S. embassy in the country’s capital was temporarily closed to the public (for fear of attack), the insurgents launched a successful assault on soldiers guarding the presidential palace in the heart of that city, oil pipelines were bombed, electricity in various cities intermittently blacked out, and an incident, a claimed attempt to kidnap a CIA agent and a U.S. Special Operations commando from a Sana barbershop, resulted in two Yemeni deaths (and possibly rising local anger).  In the meantime, AQAP seems ever more audacious and the country ever less stable.  In other words, Washington’s vaunted Yemeni model has been effective so far -- if you happen to belong to AQAP.
  • One of the poorer, less resource rich countries on the planet, Yemen is at least a global backwater.  Nigeria is another matter.  With the largest economy in Africa, much oil, and much wealth sloshing around, it has a corrupt leadership, a brutal and incompetent military, and an Islamist insurgency in its poverty-stricken north that, for simple bestiality, makes AQAP look like a paragon of virtue.  The U.S. has aided and trained Nigerian “counterterrorism” forces for years with little to show.  Add in the Yemeni model with drones overhead and who knows how the situation may spin further out of control.  In response to Boko Haram’s kidnapping of 276 young women, the Obama administration has already sent in a small military team (with FBI, State Department, and Justice Department representatives included) and launched drone and "manned surveillance flights," which may prove to be just the first steps in what one day could become a larger operation.  Under the circumstances, it’s worth remembering that the U.S. has already played a curious role in Nigeria’s destabilization, thanks to its 2011 intervention in Libya.  In the chaos surrounding the fall of Libyan autocrat Muammar Qaddafi, his immense arsenals of weapons were looted and soon enough AK-47s, rocket-propelled grenades, and other light weaponry, as well as the requisite pick-up trucks mounted with machine guns or anti-aircraft guns made their way across an increasingly destabilized region, including into the hands of Boko Haram.  Its militants are far better armed and trained today thanks to post-Libyan developments.
  • All of this, writes Nick Turse, is but part of what the U.S. military has started to call the “new normal” in Africa.  The only U.S. reporter to consistently follow the U.S. pivot to that region in recent years, Turse makes clear that every new African nightmare turns out to be another opening for U.S. military involvement.  Each further step by that military leads to yet more regional destabilization, and so to a greater urge to bring the Yemeni model (and its siblings) to bear with... well, you know what effect.  Why doesn’t Washington?
  • ...1 more annotation...
  • The U.S. Military’s New Normal in Africa A Secret African Mission and an African Mission that’s No Secret By Nick Turse What is Operation New Normal? 
  •  
    With the kidnaped girls in Nigeria, the lid is beginning to come off the U.S. military's pivot to Africa, with violence exacerbated by the flood of weapons flowing from Libya and lately, funding from Qatar. The Washington Post has finally noticed that blowback from our military intervention throughout Africa is occurring. But TomDispatch's Nick Turse is the only western journalist who has been nipping at AFRICOM's heels, for more than a year, with a steady flow of leaked documents and hard-hitting reporting. If you are interested in backtracking this emerging regional war the U.S. has instigated in resource-rich Africa to send the Chinese government's investments in Africa packing, do a TomDispatch site search for "nick turse".      
‹ Previous 21 - 40 of 47 Next ›
Showing 20 items per page