Skip to main content

Home/ Socialism and the End of the American Dream/ Group items matching "Government-Regulations" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Paul Merrell

CIA Assessment on Surviving Secondary Screening - 0 views

  • Today, 21 December 2014, WikiLeaks releases two classified documents by a previously undisclosed CIA office detailing how to maintain cover while travelling through airports using false ID – including during operations to infiltrate the European Union and the Schengen passport control system. This is the second release within WikiLeaks' CIA Series, which will continue in the new year. The two classified documents aim to assist CIA undercover officials to circumvent these systems around the world. They detail border-crossing and visa regulations, the scope and content of electronic systems, border guard protocols and procedures for secondary screenings. The documents show that the CIA has developed an extreme concern over how biometric databases will put CIA clandestine operations at risk – databases other parts of the US government made prevalent post-9/11.
  • The CIA manual "Surviving Secondary", dated 21 September 2011, details what happens in an airport secondary screening in different airports around the world and how to pass as a CIA undercover operative while preserving one's cover. Among the reasons for why secondary screening would occur are: if the traveller is on a watchlist (noting that watchlists can often contain details of intelligence officials); or is found with contraband; or "because the inspector suspects that something about the traveler is not right".
  • The second document in this release, "Schengen Overview", is dated January 2012 and details guidelines for border officials in the EU's Schengen zone and the threats their procedures might pose in exposing the "alias identities of tradecraft-conscious operational travelers", the CIA terminology for US spies travelling with false ID during a clandestine operation. It outlines how various electronic systems within Schengen work and the risks they pose to clandestine US operatives, including the Schengen Information System (SIS), the European fingerprint database EURODAC (European Dactyloscopie) and FRONTEX (Frontières extérieures) – the EU agency responsible for easing travel between member states while maintaining security.
Paul Merrell

M of A - Germany Getting Ready To Divorce U.S. Ally - 0 views

  • From recent talks and discussions in Germany I conclude that the U.S. is losing more and more support and sympathies. The admiration of earlier times has turned into disgust. While a lot of higher politicians and some journalists still cling to some (well paid) myth of U.S. friendship the party base in all political parties as well as the general public has changed its opinion. The NSA spying headlines are only one, though important issue. Consider how you would feel about such an intrusive "ally": German intelligence employee arrested on suspicion of spying for US on Bundestag NSA committee NSA whistleblowers testify in Bundestag inquiry, disclose ‘totalitarian’ surveillance Germany NSA's main target, claims ex-staffer Irked by N.S.A., Germany Cancels Deal With Verizon German parliament drops US telecom firm Verizon over links to NSA spying NSA Turned Germany Into Its Largest Listening Post in Europe Report: NSA targeted German privacy activist NSA targets Tor administrators and people searching for privacy tools, reports claim The German constitution, as interpreted by the constitutional court, defines privacy as a basic human right. That the U.S. is so casually violating the basic human rights of all German citizens is met with utter disgust. Even the paid and trained Atlantic Council (a U.S. lobby) trolls in German news-site comments have problem defending this issue.
  • From recent talks and discussions in Germany I conclude that the U.S. is losing more and more support and sympathies. The admiration of earlier times has turned into disgust. While a lot of higher politicians and some journalists still cling to some (well paid) myth of U.S. friendship the party base in all political parties as well as the general public has changed its opinion. The NSA spying headlines are only one, though important issue. Consider how you would feel about such an intrusive "ally": German intelligence employee arrested on suspicion of spying for US on Bundestag NSA committee NSA whistleblowers testify in Bundestag inquiry, disclose ‘totalitarian’ surveillance Germany NSA's main target, claims ex-staffer Irked by N.S.A., Germany Cancels Deal With Verizon German parliament drops US telecom firm Verizon over links to NSA spying NSA Turned Germany Into Its Largest Listening Post in Europe Report: NSA targeted German privacy activist NSA targets Tor administrators and people searching for privacy tools, reports claim The German constitution, as interpreted by the constitutional court, defines privacy as a basic human right. That the U.S. is so casually violating the basic human rights of all German citizens is met with utter disgust. Even the paid and trained Atlantic Council (a U.S. lobby) trolls in German news-site comments have problem defending this issue.
  • But the NSA spying is not the only problem. The economic breakdown after 2008 clearly had its roots in the United States and is, in Germany, blamed on lax U.S. regulations. And while Germany itself pressed for a change in government in Ukraine the outbreak of violence, the bloody coup and the fighting in the east is considered as "Fuck the EU" U.S. intervention in European affairs. It may still take a decade or more but my sense is that the U.S.-German alliance in on its way to an unfriendly divorce. Something that 15 years ago seemed unthinkable.
Paul Merrell

Ukraine bailout could need extra $19bn if conflict continues, warns IMF | World news | The Guardian - 0 views

  • Factories shutting down, industrial heartlands under attack and currency in freefall, contributing to sharp increase in prices
  • Ukraine could need a further $19bn in emergency international funding by the end of next year if there is no resolution to the escalating conflict in the east of the country, the International Monetary Fund (IMF) has warned.
  • The IMF last week approved a $1.4bn (£840m) loan to Ukraine, the second tranche of its $17bn bailout programme agreed in April to stave off default.Ukraine urgently needs IMF loans to support its budget and prop up its faltering currency as its debts come up for repayment. Almost $4bn must be repaid before the end of the year, with $9bn due in 2015.In exchange for IMF aid, Ukraine's government has agreed on sweeping economic reforms, including curbing public-sector wage increases, increasing energy prices to bring them more in line with market values, overhauling banking and currency regulations and tackling chronic graft that has made the country one of the most corrupt in the world.
  • ...1 more annotation...
  • The IMF praised Ukraine's progress, but said risks to the programme had increased. Since mid-July, the conflict has escalated, while Naftogaz, Ukraine's national gas company, and Gazprom, Russia's state energy group, have been locked in a standoff over the price of gas, which until recently the Russians supplied at a hefty discount. The dispute is likely to further increase Ukraine's debts.
Paul Merrell

The $9 Billion Witness: Meet JPMorgan Chase's Worst Nightmare | Rolling Stone - 0 views

  • Meet the woman JPMorgan Chase paid one of the largest fines in American history to keep from talking By Matt Taibbi | November 6, 2014
  • tried to stay quiet, she really did. But after eight years of keeping a heavy secret, the day came when Alayne Fleischmann couldn't take it anymore.  "It was like watching an old lady get mugged on the street," she says. "I thought, 'I can't sit by any longer.'"  Fleischmann is a tall, thin, quick-witted securities lawyer in her late thirties, with long blond hair, pale-blue eyes and an infectious sense of humor that has survived some very tough times. She's had to struggle to find work despite some striking skills and qualifications, a common symptom of a not-so-common condition called being a whistle-blower.
  • Fleischmann is the central witness in one of the biggest cases of white-collar crime in American history, possessing secrets that JPMorgan Chase CEO Jamie Dimon late last year paid $9 billion (not $13 billion as regularly reported – more on that later) to keep the public from hearing. Back in 2006, as a deal manager at the gigantic bank, Fleischmann first witnessed, then tried to stop, what she describes as "massive criminal securities fraud" in the bank's mortgage operations. Thanks to a confidentiality agreement, she's kept her mouth shut since then. "My closest family and friends don't know what I've been living with," she says. "Even my brother will only find out for the first time when he sees this interview." 
  • ...3 more annotations...
  • This past year she watched as Holder's Justice Department struck a series of historic settlement deals with Chase, Citigroup and Bank of America. The root bargain in these deals was cash for secrecy. The banks paid big fines, without trials or even judges – only secret negotiations that typically ended with the public shown nothing but vague, quasi-official papers called "statements of facts," which were conveniently devoid of anything like actual facts. 
  • Six years after the crisis that cratered the global economy, it's not exactly news that the country's biggest banks stole on a grand scale. That's why the more important part of Fleischmann's story is in the pains Chase and the Justice Department took to silence her. She was blocked at every turn: by asleep-on-the-job regulators like the Securities and Exchange Commission, by a court system that allowed Chase to use its billions to bury her evidence, and, finally, by officials like outgoing Attorney General Eric Holder, the chief architect of the crazily elaborate government policy of surrender, secrecy and cover-up. "Every time I had a chance to talk, something always got in the way," Fleischmann says.
  • And now, with Holder about to leave office and his Justice Department reportedly wrapping up its final settlements, the state is effectively putting the finishing touches on what will amount to a sweeping, industrywide effort to bury the facts of a whole generation of Wall Street corruption. "I could be sued into bankruptcy," she says. "I could lose my license to practice law. I could lose everything. But if we don't start speaking up, then this really is all we're going to get: the biggest financial cover-up in history." 
  •  
    Matt Taibbi is back at Rolling Stone, relaunching with a major blockbuster.
Paul Merrell

New Snowden Docs Indicate Scope of NSA Preparations for Cyber Battle - SPIEGEL ONLINE - 0 views

  • The NSA's mass surveillance is just the beginning. Documents from Edward Snowden show that the intelligence agency is arming America for future digital wars -- a struggle for control of the Internet that is already well underway.
  • The Birth of D Weapons According to top secret documents from the archive of NSA whistleblower Edward Snowden seen exclusively by SPIEGEL, they are planning for wars of the future in which the Internet will play a critical role, with the aim of being able to use the net to paralyze computer networks and, by doing so, potentially all the infrastructure they control, including power and water supplies, factories, airports or the flow of money.
  • From a military perspective, surveillance of the Internet is merely "Phase 0" in the US digital war strategy. Internal NSA documents indicate that it is the prerequisite for everything that follows. They show that the aim of the surveillance is to detect vulnerabilities in enemy systems. Once "stealthy implants" have been placed to infiltrate enemy systems, thus allowing "permanent accesses," then Phase Three has been achieved -- a phase headed by the word "dominate" in the documents. This enables them to "control/destroy critical systems & networks at will through pre-positioned accesses (laid in Phase 0)." Critical infrastructure is considered by the agency to be anything that is important in keeping a society running: energy, communications and transportation. The internal documents state that the ultimate goal is "real time controlled escalation". One NSA presentation proclaims that "the next major conflict will start in cyberspace." To that end, the US government is currently undertaking a massive effort to digitally arm itself for network warfare. For the 2013 secret intelligence budget, the NSA projected it would need around $1 billion in order to increase the strength of its computer network attack operations. The budget included an increase of some $32 million for "unconventional solutions" alone.
  • ...5 more annotations...
  • NSA Docs on Network Attacks and ExploitationExcerpt from the secret NSA budget on computer network operations / Code word GENIE Document about the expansion of the Remote Operations Center (ROC) on endpoint operations Document explaining the role of the Remote Operations Center (ROC) Interview with an employee of NSA's department for Tailored Access Operations about his field of work Supply-chain interdiction / Stealthy techniques can crack some of SIGINT's hardest targets Classification guide for computer network exploitation (CNE) NSA training course material on computer network operations Overview of methods for NSA integrated cyber operations NSA project description to recognize and process data that comes from third party attacks on computers Exploring and exploiting leaky mobile apps with BADASS Overview of projects of the TAO/ATO department such as the remote destruction of network cards iPhone target analysis and exploitation with Apple's unique device identifiers (UDID) Report of an NSA Employee about a Backdoor in the OpenSSH Daemon NSA document on QUANTUMSHOOTER, an implant to remote-control computers with good network connections from unknown third parties
  • NSA Docs on Malware and ImplantsCSEC document about the recognition of trojans and other "network based anomaly" The formalized process through which analysts choose their data requirement and then get to know the tools that can do the job QUANTUMTHEORY is a set of technologies allowing man-on-the-side interference attacks on TCP/IP connections (includes STRAIGHTBIZARRE and DAREDEVIL) Sample code of a malware program from the Five Eyes alliance
  • NSA Docs on ExfiltrationExplanation of the APEX method of combining passive with active methods to exfiltrate data from networks attacked Explanation of APEX shaping to put exfiltrating network traffic into patterns that allow plausible deniability Presentation on the FASHIONCLEFT protocol that the NSA uses to exfiltrate data from trojans and implants to the NSA Methods to exfiltrate data even from devices which are supposed to be offline Document detailing SPINALTAP, an NSA project to combine data from active operations and passive signals intelligence Technical description of the FASHIONCLEFT protocol the NSA uses to exfiltrate data from Trojans and implants to the NSA
  • Part 2: How the NSA Reads Over Shoulders of Other Spies
  • According to top secret documents from the archive of NSA whistleblower Edward Snowden seen exclusively by SPIEGEL, they are planning for wars of the future in which the Internet will play a critical role, with the aim of being able to use the net to paralyze computer networks and, by doing so, potentially all the infrastructure they control, including power and water supplies, factories, airports or the flow of money. During the 20th century, scientists developed so-called ABC weapons -- atomic, biological and chemical. It took decades before their deployment could be regulated and, at least partly, outlawed. New digital weapons have now been developed for the war on the Internet. But there are almost no international conventions or supervisory authorities for these D weapons, and the only law that applies is the survival of the fittest. Canadian media theorist Marshall McLuhan foresaw these developments decades ago. In 1970, he wrote, "World War III is a guerrilla information war with no division between military and civilian participation." That's precisely the reality that spies are preparing for today.
  •  
    Major dump of new Snowden NSA docs by Der Spiegel, with an article by a large team of reporters and computer security experts. Topic: Cyberwar capabilities, now and in the near future. 
Paul Merrell

Civil Rights Coalition files FCC Complaint Against Baltimore Police Department for Illegally Using Stingrays to Disrupt Cellular Communications | Electronic Frontier Foundation - 0 views

  • This week the Center for Media Justice, ColorOfChange.org, and New America’s Open Technology Institute filed a complaint with the Federal Communications Commission alleging the Baltimore police are violating the federal Communications Act by using cell site simulators, also known as Stingrays, that disrupt cellphone calls and interfere with the cellular network—and are doing so in a way that has a disproportionate impact on communities of color. Stingrays operate by mimicking a cell tower and directing all cellphones in a given area to route communications through the Stingray instead of the nearby tower. They are especially pernicious surveillance tools because they collect information on every single phone in a given area—not just the suspect’s phone—this means they allow the police to conduct indiscriminate, dragnet searches. They are also able to locate people inside traditionally-protected private spaces like homes, doctors’ offices, or places of worship. Stingrays can also be configured to capture the content of communications. Because Stingrays operate on the same spectrum as cellular networks but are not actually transmitting communications the way a cell tower would, they interfere with cell phone communications within as much as a 500 meter radius of the device (Baltimore’s devices may be limited to 200 meters). This means that any important phone call placed or text message sent within that radius may not get through. As the complaint notes, “[d]epending on the nature of an emergency, it may be urgently necessary for a caller to reach, for example, a parent or child, doctor, psychiatrist, school, hospital, poison control center, or suicide prevention hotline.” But these and even 911 calls could be blocked.
  • The Baltimore Police Department could be among the most prolific users of cell site simulator technology in the country. A Baltimore detective testified last year that the BPD used Stingrays 4,300 times between 2007 and 2015. Like other law enforcement agencies, Baltimore has used its devices for major and minor crimes—everything from trying to locate a man who had kidnapped two small children to trying to find another man who took his wife’s cellphone during an argument (and later returned it). According to logs obtained by USA Today, the Baltimore PD also used its Stingrays to locate witnesses, to investigate unarmed robberies, and for mysterious “other” purposes. And like other law enforcement agencies, the Baltimore PD has regularly withheld information about Stingrays from defense attorneys, judges, and the public. Moreover, according to the FCC complaint, the Baltimore PD’s use of Stingrays disproportionately impacts African American communities. Coming on the heels of a scathing Department of Justice report finding “BPD engages in a pattern or practice of conduct that violates the Constitution or federal law,” this may not be surprising, but it still should be shocking. The DOJ’s investigation found that BPD not only regularly makes unconstitutional stops and arrests and uses excessive force within African-American communities but also retaliates against people for constitutionally protected expression, and uses enforcement strategies that produce “severe and unjustified disparities in the rates of stops, searches and arrests of African Americans.”
  • Adding Stingrays to this mix means that these same communities are subject to more surveillance that chills speech and are less able to make 911 and other emergency calls than communities where the police aren’t regularly using Stingrays. A map included in the FCC complaint shows exactly how this is impacting Baltimore’s African-American communities. It plots hundreds of addresses where USA Today discovered BPD was using Stingrays over a map of Baltimore’s black population based on 2010 Census data included in the DOJ’s recent report:
  • ...2 more annotations...
  • The Communications Act gives the FCC the authority to regulate radio, television, wire, satellite, and cable communications in all 50 states, the District of Columbia and U.S. territories. This includes being responsible for protecting cellphone networks from disruption and ensuring that emergency calls can be completed under any circumstances. And it requires the FCC to ensure that access to networks is available “to all people of the United States, without discrimination on the basis of race, color, religion, national origin, or sex.” Considering that the spectrum law enforcement is utilizing without permission is public property leased to private companies for the purpose of providing them next generation wireless communications, it goes without saying that the FCC has a duty to act.
  • But we should not assume that the Baltimore Police Department is an outlier—EFF has found that law enforcement has been secretly using stingrays for years and across the country. No community should have to speculate as to whether such a powerful surveillance technology is being used on its residents. Thus, we also ask the FCC to engage in a rule-making proceeding that addresses not only the problem of harmful interference but also the duty of every police department to use Stingrays in a constitutional way, and to publicly disclose—not hide—the facts around acquisition and use of this powerful wireless surveillance technology.  Anyone can support the complaint by tweeting at FCC Commissioners or by signing the petitions hosted by Color of Change or MAG-Net.
  •  
    An important test case on the constitutionality of stingray mobile device surveillance.
Paul Merrell

As Wall Street Sinks Global Markets, China's Economic Policies Build Independence & Immunity - 0 views

  • The recent economic “correction” in the U.S. markets, which saw stocks drop back down from recent record-highs, has begun to spread to the east, reaching the stock exchanges in Tokyo, Taiwan and Shanghai. While all three of these markets depend, to some extent, on the performance of Wall Street, one is likely to emerge stronger as the U.S. market corrects itself. Many Western economic analysts — such as those at the pillar of U.S. financial journalism, Bloomberg — have continued to predict future financial downturns would be caused by Chinese debt, or the country’s massive “shadow” economy (or, more specifically, low level loans that aren’t tightly regulated by the central government). This latest downturn, however, shows once again that Wall Street is still the primary factor in sinking global markets. China has been faced with — and continued to grow throughout — a previous U.S.-triggered global recession just under a decade ago. While the current condition of the markets is nothing like the end of 2008, there is still the same fear in the West that China is somehow on the brink of catastrophe. Yet China pulled through the Great Recession, despite a huge decrease in demand for Chinese export goods. Beijing presided over GDP growth only falling below 8 percent in the last quarter of 2008 and first of 2009 and made a faster recovery than any Western nation.
  • China is obviously in a position much different now from that of 2008. Now — as a clear competitor with the U.S. in key economic sectors such as cutting-edge technology, and playing a unifying role for a large portion of the global population — Beijing is making even more major domestic economic reforms and preparing to project its new prosperity outward. In order to better understand how China is likely not just to survive any fluctuations in the U.S. market but also to thrive, it is best to understand both how China managed to recover from the last recession faster than any other country and the new economic policies of President Xi Jinping, which will harness the power of the world’s largest planned economy in its march into the future.
Paul Merrell

CryptoRouble: Russia Announces First State-Backed Cryptocurrency - 0 views

  • Russian President Vladimir Putin has made history today, when he endorsed the creation of a soon to be unveiled CryptoRouble, the world’s first cryptocurrency endorsed by a state. Russian monetary experts and political leaders have recently begun engaging in a debate which pitted monetary conservatives against monetary radicals. Most Russian officials agreed that allowing the use of western designed (though not western state endorsed) cryptocurrencies such as Bitcoin, was not compatible with Russian financial security concerns. China, for example, reached a similar conclusion about existing cryptocurrencies. In Russia, the debate then quickly evolved into to a question over what role if any, a government and central bank should have in respect of cryptocurrencies. Conservatives argued that the entire process of blockchain cryptocurrency technology should not be accepted as a legal alternative to traditional state issued notes, while radicals argued for the creation and regulation of a uniquely Russian cryptocurremcy. The radials have clearly won and appear to have been embraced by President Putin.
« First ‹ Previous 221 - 228 of 228
Showing 20 items per page