Skip to main content

Home/ Socialism and the End of the American Dream/ Group items matching "Police" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Paul Merrell

James Holmes Family Tied To DARPA And Mind Manipulation Work - BlackListedNews.com - 0 views

  • James Holmes, the 24-year old suspect in the mass shooting of Batman "The Dark Knight Rises" movie goers in Aurora, Colorado that left 12 people dead and 58 injured, has had a number of links to U.S. government-funded research centers. Holmes's past association with government research projects has prompted police and federal law enforcement officials to order laboratories and schools with which Holmes has had a past association not to talk to the press about Holmes.
  • The links between the younger and elder Holmes and U.S. government research on creating super-soldiers, human brain-machine interfaces, and human-like robots beg the question: "Was James Holmes engaged in a real-life Jason Bourne TREADSTONE project that broke down and resulted in deadly consequences in Aurora, Colorado?"
Paul Merrell

Britain faces legal challenge over secret US 'kill list' in Afghanistan | World news | The Guardian - 0 views

  • Britain's role in supplying information to an American military "kill list" in Afghanistan is being subjected to legal challenge amid growing international concern over targeted strikes against suspected insurgents and drug traffickers.An Afghan man who lost five relatives in a missile strike started proceedings against the Serious Organised Crime Agency (Soca) and the Ministry of Defence demanding to know details of the UK's participation "in the compilation, review and execution of the list and what form it takes".
  • Soca refused to discuss its intelligence work, but the agency and the MoD said they worked "strictly within the bounds of international law". Its role in the operation to compile a "kill list" was first explained in a report to the US Senate's committee on foreign relations.The report described how a new task force targeting drug traffickers, insurgents and corrupt officials was being set up at Kandahar air field in southern Afghanistan. "The unit will link the US and British military with the DEA [Drug Enforcement Agency], Britain's Serious and Organised Crime Agency, and police and intelligence agencies from other countries." The 31-page report from 2009 acknowledged the precise rules of engagement were classified.
  • The letters to Soca's director general, Trevor Pearce, and the defence secretary, Philip Hammond, point to the Geneva conventions, which say that persons taking no active part in hostilities are protected from "violence to life and person, in particular murder of all kinds".They also draw on the International Committee of the Red Cross, which has said anyone accompanying an organised group who is not directly involved in hostilities "remains civilian assuming support functions".The legal letters, the first step towards seeking judicial review, say "drug traffickers who merely support the insurgency financially could not legitimately be included in the list" under these principles. The lawyers believe that, even if Isaf had targeted the right man, it may have been unlawful for others to have been killed in the missile strike.
  •  
    Potentially important case brewing in the UK on the legality under international law of U.S. drone strikes that kill or injure non-combatants. Should this result in a Royal Commission of Inquiry, we will likely learn far more about U.S. drone strike policies, because Royal Commission's powers to receive and disclose classified information is far broader than available in U.S. courts or in Congress. E.g., much of what we now know about the Bush Administration's true motives for launching the war in Iraq was disclosed in a Royal Commission Inquiry into the Blair administration's reasons for participation in that war. 
Paul Merrell

The U.S. Government And The Sinaloa Cartel - Business Insider - 0 views

  • An investigation by El Universal found that between the years 2000 and 2012, the U.S. government had an arrangement with Mexico's Sinaloa drug cartel that allowed the organization to smuggle billions of dollars of drugs while Sinaloa provided information on rival cartels. Sinaloa, led by Joaquin "El Chapo" Guzman, supplies 80% of the drugs entering the Chicago area and has a presence in cities across the U.S.
  • There have long been allegations that Guzman, considered to be "the world’s most powerful drug trafficker," coordinates with American authorities. But the El Universal investigation is the first to publish court documents that include corroborating testimony from a DEA agent and a Justice Department official. The written statements were made to the U.S. District Court in Chicago in relation to the arrest of Jesus Vicente Zambada-Niebla, the son of Sinaloa leader Ismael "El Mayo" Zambada and allegedly the Sinaloa cartel’s "logistics coordinator."
  • El Universal, citing court documents, reports that DEA agents met with high-level Sinaloa officials more than 50 times since 2000.
  • ...3 more annotations...
  • "The DEA agents met with members of the cartel in Mexico to obtain information about their rivals and simultaneously built a network of informants who sign drug cooperation agreements, subject to results, to enable them to obtain future benefits, including cancellation of charges in the U.S.," reports El Universal, which also interviewed more than one hundred active and retired police officers as well as prisoners and experts. Zambada-Niebla's lawyer claimed to the court that in the late 1990s, Castro struck a deal with U.S. agents in which Sinaloa would provide information about rival drug trafficking organizations while the U.S. would dismiss its case against the Sinaloa lawyer and refrain from interfering with Sinaloa drug trafficking activities or actively prosecuting Sinaloa leadership. "The agents stated that this arrangement had been approved by high-ranking officials and federal prosecutors," Zambada-Niebla lawyer wrote.
  • After being extradited to Chicago in February 2010, Zambada-Niebla argued that he was also "immune from arrest or prosecution" because he actively provided information to U.S. federal agents. Zambada-Niebla also alleged that Operation Fast and Furious was part of an agreement to finance and arm the cartel in exchange for information used to take down its rivals. (If true, that re-raises the issue regarding what Attorney General Eric Holder knew about the gun-running arrangements.)
  • El Universal reported that the coordination between the U.S. and Sinaloa, as well as other cartels, peaked between 2006 and 2012, which is when drug traffickers consolidated their grip on Mexico. The paper concluded by saying that it is unclear whether the arrangements continue. The DEA and other U.S. agencies declined to comment to El Universal.
  •  
    Another chapter in the long-running history of U.S. government participation in drug-smuggling and gun-running. This one breathes new life into the notorious Fast & Furious scandal.
Paul Merrell

The Rutherford Institute :: Life in the Electronic Concentration Camp: The Many Ways That You're Being Tracked, Catalogued and Controlled - 0 views

  • As noted by the Brookings Institution, “For the first time ever, it will become technologically and financially feasible for authoritarian governments to record nearly everything that is said or done within their borders — every phone conversation, electronic message, social media interaction, the movements of nearly every person and vehicle, and video from every street corner.” As the following will show, the electronic concentration camp, as I have dubbed the surveillance state, is perhaps the most insidious of the police state’s many tentacles, impacting almost every aspect of our lives and making it that much easier for the government to encroach on our most vital freedoms, ranging from free speech, assembly and the press to due process, privacy, and property, by eavesdropping on our communications, tracking our movements and spying on our activities.
  • To put it bluntly, we are living in an electronic concentration camp. Through a series of imperceptible steps, we have willingly allowed ourselves to become enmeshed in a system that knows the most intimate details of our lives, analyzes them, and treats us accordingly. Whether via fear of terrorism, narcissistic pleasure, or lazy materialism, we have slowly handed over our information to all sorts of entities, corporate and governmental, public and private, who are now using that information to cow and control us for their profit. As George Orwell warned, “You had to live—did live, from habit that became instinct—in the assumption that every sound you made was overheard, and, except in darkness, every movement scrutinized.” Thus, we have arrived in Orwell’s world. The question now is: will we take a stand and fight to remain free or will we go gently into the concentration camp?
  •  
    Nice beginning inventory of the ways government records its citizenry's every move.  
Paul Merrell

N.S.A. Devises Radio Pathway Into Computers - NYTimes.com - 1 views

  • The National Security Agency has implanted software in nearly 100,000 computers around the world that allows the United States to conduct surveillance on those machines and can also create a digital highway for launching cyberattacks.While most of the software is inserted by gaining access to computer networks, the N.S.A. has increasingly made use of a secret technology that enables it to enter and alter data in computers even if they are not connected to the Internet, according to N.S.A. documents, computer experts and American officials.The technology, which the agency has used since at least 2008, relies on a covert channel of radio waves that can be transmitted from tiny circuit boards and USB cards inserted surreptitiously into the computers. In some cases, they are sent to a briefcase-size relay station that intelligence agencies can set up miles away from the target.
  • The radio frequency technology has helped solve one of the biggest problems facing American intelligence agencies for years: getting into computers that adversaries, and some American partners, have tried to make impervious to spying or cyberattack. In most cases, the radio frequency hardware must be physically inserted by a spy, a manufacturer or an unwitting user.
  • The N.S.A. and the Pentagon’s Cyber Command have implanted nearly 100,000 “computer network exploits” around the world, but the hardest problem is getting inside machines isolated from outside communications.
  • ...8 more annotations...
  • the program, code-named Quantum, has also been successful in inserting software into Russian military networks and systems used by the Mexican police and drug cartels, trade institutions inside the European Union, and sometime partners against terrorism like Saudi Arabia, India and Pakistan, according to officials and an N.S.A. map that indicates sites of what the agency calls “computer network exploitation.”“What’s new here is the scale and the sophistication of the intelligence agency’s ability to get into computers and networks to which no one has ever had access before,” said James Andrew Lewis, the cybersecurity expert at the Center for Strategic and International Studies in Washington. “Some of these capabilities have been around for a while, but the combination of learning how to penetrate systems to insert software and learning how to do that using radio frequencies has given the U.S. a window it’s never had before.”
  • A program named Treasure Map tried to identify nearly every node and corner of the web, so that any computer or mobile device that touched it could be located.
  • Over the past two months, parts of the program have been disclosed in documents from the trove leaked by Edward J. Snowden, the former N.S.A. contractor. A Dutch newspaper published the map of areas where the United States has inserted spy software, sometimes in cooperation with local authorities, often covertly. Der Spiegel, a German newsmagazine, published the N.S.A.'s catalog of hardware products that can secretly transmit and receive digital signals from computers, a program called ANT. The New York Times withheld some of those details, at the request of American intelligence officials, when it reported, in the summer of 2012, on American cyberattacks on Iran.
  • A 2008 map, part of the Snowden trove, notes 20 programs to gain access to big fiber-optic cables — it calls them “covert, clandestine or cooperative large accesses” — not only in the United States but also in places like Hong Kong, Indonesia and the Middle East. The same map indicates that the United States had already conducted “more than 50,000 worldwide implants,” and a more recent budget document said that by the end of last year that figure would rise to about 85,000. A senior official, who spoke on the condition of anonymity, said the actual figure was most likely closer to 100,000.
  • The N.S.A.'s efforts to reach computers unconnected to a network have relied on a century-old technology updated for modern times: radio transmissions.In a catalog produced by the agency that was part of the Snowden documents released in Europe, there are page after page of devices using technology that would have brought a smile to Q, James Bond’s technology supplier.
  • One, called Cottonmouth I, looks like a normal USB plug but has a tiny transceiver buried in it. According to the catalog, it transmits information swept from the computer “through a covert channel” that allows “data infiltration and exfiltration.” Another variant of the technology involves tiny circuit boards that can be inserted in a laptop computer — either in the field or when they are shipped from manufacturers — so that the computer is broadcasting to the N.S.A. even while the computer’s user enjoys the false confidence that being walled off from the Internet constitutes real protection.The relay station it communicates with, called Nightstand, fits in an oversize briefcase, and the system can attack a computer “from as far away as eight miles under ideal environmental conditions.” It can also insert packets of data in milliseconds, meaning that a false message or piece of programming can outrace a real one to a target computer. Similar stations create a link between the target computers and the N.S.A., even if the machines are isolated from the Internet.
  • Computers are not the only targets. Dropoutjeep attacks iPhones. Other hardware and software are designed to infect large network servers, including those made by the Chinese.Most of those code names and products are now at least five years old, and they have been updated, some experts say, to make the United States less dependent on physically getting hardware into adversaries’ computer systems.
  • But the Stuxnet strike does not appear to be the last time the technology was used in Iran. In 2012, a unit of the Islamic Revolutionary Guards Corps moved a rock near the country’s underground Fordo nuclear enrichment plant. The rock exploded and spewed broken circuit boards that the Iranian news media described as “the remains of a device capable of intercepting data from computers at the plant.” The origins of that device have never been determined.
  •  
    Even radio transceivers emplanted in USB jacks. So now to be truly secure, we need not only an air gap but also a Faraday cage protecting the air gap. 
Paul Merrell

Remember when Obama said the NSA wasn't "actually abusing" its powers? He was wrong. - 1 views

  • At a news conference Friday, President Obama insisted that the threat of NSA abuses was mostly theoretical: If you look at the reports, even the disclosures that Mr. Snowden’s put forward, all the stories that have been written, what you’re not reading about is the government actually abusing these programs and, you know, listening in on people’s phone calls or inappropriately reading people’s e-mails. What you’re hearing about is the prospect that these could be abused. Now part of the reason they’re not abused is because they’re — these checks are in place, and those abuses would be against the law and would be against the orders of the FISC [Foreign Intelligence Surveillance Court]. Today our colleague Barton Gellman released new documents that contradicted Obama’s claims. Gellman obtained an audit of the NSA’s compliance record from NSA leaker Snowden earlier this summer. The audit, dated May 2012, counted 2,776 incidents in the preceding 12 months where the agency engaged in “unauthorized collection, storage, access to or distribution of legally protected communications.” The audit only covered issues at NSA facilities in the D.C. and Fort Meade areas.
  • Obama said that wasn’t supposed to happen because it would be “against the orders of the FISC.” So why didn’t the judges on the court catch these abuses? In another story broken by The Post today, the chief of the Foreign Intelligence Surveillance Act (FISA) Court admits he doesn’t actually have the capability to investigate the compliance record of NSA surveillance programs:
  • Under the FISA regime, the government doesn’t have to seek permission for individual surveillance targets. Instead, it seeks FISC approval for broad schemes of surveillance like PRISM and the phone records program. But that makes it extremely difficult for the FISC to check the court’s work, since the NSA can — and, apparently, did — hide misconduct from the court that’s supposedly supervising its activities.
Paul Merrell

Activist Post: 5 Reasons The Latest Report On Syria War Crimes Might Not Be True - 0 views

  • In a recently released and conveniently timed report, complete with references to Nazi Germany and concentration camps, efforts to ramp up support for a “tough line” against Syria at the upcoming Geneva II conference and even possible military intervention, are once again moving into high gear. The report, compiled by three British war crime prosecutors and three “forensic experts” claims that it has demonstrable proof that the Assad government is guilty of torturing and killing over ten thousand people. The report (accessed here) claims to show evidence of physical torture, murder, and starvation. Of course, the Syrian government denies the veracity of the claims of the report and Western media outlets repeat the claims as incontrovertible proof.
  • However, while the final determination of whether or not these claims are accurate is yet to be made, there exist ample reasons to question the assertions made in the report. 1. The Gulf State Feudal Monarchy Qatar is the sponsor of the report. Qatar is, of course, one of the major sponsors of the Syrian invasion (aka the Syrian “rebels”) and has played a massively important role in financing, training, arming, and directing the death squads currently being mopped up by the Assad government. 2. The source of the report. One would be justified in questioning the nature of the report since the sole source of the material comes by virtue of an allegedly “defected Syrian military police officer” who was apparently fine with photographing thousands of dead victims for over a year until now. Regardless of the possibility for such a “moral” conversion, taking information from a “defected” member of government forces once again returns us to the realm of the “activists say” school of journalism – a notorious method used by Western media outlets to promote the side of the death squads and only the side of the death squads as fact in popular reports.
  • 3. Past claims of Assad’s “Crimes Against Humanity.” It is important to remember past experiences with Western claims against Assad for alleged “crimes against humanity,” all of which turned out to have been committed by the death squads, not the Syrian government. From the Houla massacre to the Ghouta chemical weapons attacks, the Syrian government has been exonerated by all credible evidence. The death squads, however, have been proven guilty by virtue of their own video tapes and Youtube accounts, guilty of some of the most horrific acts imaginable. While many innocent people have no doubt been killed in the crossfire between the military and the death squads, the Western media has done everything in its power to place the blood of each and every death inside Syria in the hands of the government. Let us also not forget the other famous Codename, “Curveball,” that played a major role in the initiation of a previous and still ongoing conflict that was later admitted to be a fabrication. Being fooled by the same type of propaganda twice in ten years is indeed a humiliation too great for a country to bear.
  • ...2 more annotations...
  • 4.) Possibility that the death squads could have killed the victims shown in the report. The victims shown in the report have clearly been abused and starved. However, before jumping to conclusions about just how these unfortunate individuals met their fate, perhaps it would be a good idea to look back at the context of the victims. As mentioned earlier, the death squads operating in Syria are no strangers to crimes against humanity, murder, and torture. In fact, they have been both the initiators of such depravity and overwhelmingly the largest proprietors of it. Furthermore, the fact that the victims were starved does not necessarily mean that they were starved by the government. Indeed, it is important to remember that, due to the siege of a number of cities by both the military and the death squads as well as due to death squad cruelty and attempted cordoning off of specific areas, food shortage has been a serious concern in some areas for some time. There is also plentiful evidence of death squad groups killing innocent people and shipping their bodies to the places where cameras are set up, waiting for the recording of the propaganda piece. The Ghouta chemical attack is just one instance in which innocent civilians were captured and killed by the death squads and used as stage props for propaganda purposes.
  • Indeed, it is also important to remember that the death squads themselves are quite adept at keeping prisoners in atrocious conditions. Only a few months back, it was reported that the Syrian military was able to free a number of captive Syrian women from the hands of the death squads who had kept them in captivity in underground tunnels for months on end for the purposes of using them as sex slaves. 5.) The report was conveniently released just two days before the Geneva II Peace Conference meeting on Syria. After the retraction of an invitation to Iran to attend the peace conference, the Qatari-funded report was released just two days before the peace conference was scheduled to take place. With such evidence being studied and analyzed and a report being compiled, to believe that it was only a coincidence that the information was released two days before the conference is absurd. If this evidence was real and of such grave importance why are world leaders only learning of it now? If world leaders knew, why are we only learning of it now? Considering all of the information provided in this article, taken in conjunction with the “convenient” timing of the release of the reports (convenient, at least, for the enemies of Syria), such reports should be taken with a large grain of salt. The Western media has not only been wrong, but has lied on so many occasions in the past, that it cannot be expected to tell the truth now.
Paul Merrell

What The Government Could Do With That Location Data - 0 views

  • Law enforcement is taking advantage of outdated privacy laws to track Americans like never before. New technologies can record your every movement, revealing detailed information about how you choose to live your life. Without the right protections in place, the government can gain access to this information -- and to your private life -- with disturbing ease.
  • As long as it is turned on, your mobile phone registers its position with cell towers every few minutes, whether the phone is being used or not. Since mobile carriers are retaining location data on their customers, government officials can learn a tremendous amount of detailed personal information about you by accessing your location history from your cell phone company, ranging from which friends you're seeing to where you go to the doctor to how often you go to church. The Justice Department and most local police forces can get months' worth of this information, without you ever knowing -- and often without a warrant from a judge.
  •  
    Nicely done 3-minute video produced by the ACLU.
Paul Merrell

Yahoo webcam images from millions of users intercepted by GCHQ | World news | The Guardian - 0 views

  • Britain's surveillance agency GCHQ, with aid from the US National Security Agency, intercepted and stored the webcam images of millions of internet users not suspected of wrongdoing, secret documents reveal.GCHQ files dating between 2008 and 2010 explicitly state that a surveillance program codenamed Optic Nerve collected still images of Yahoo webcam chats in bulk and saved them to agency databases, regardless of whether individual users were an intelligence target or not.In one six-month period in 2008 alone, the agency collected webcam imagery – including substantial quantities of sexually explicit communications – from more than 1.8 million Yahoo user accounts globally.Yahoo reacted furiously to the webcam interception when approached by the Guardian. The company denied any prior knowledge of the program, accusing the agencies of "a whole new level of violation of our users' privacy".
  • GCHQ does not have the technical means to make sure no images of UK or US citizens are collected and stored by the system, and there are no restrictions under UK law to prevent Americans' images being accessed by British analysts without an individual warrant.The documents also chronicle GCHQ's sustained struggle to keep the large store of sexually explicit imagery collected by Optic Nerve away from the eyes of its staff, though there is little discussion about the privacy implications of storing this material in the first place.
  • "Face detection has the potential to aid selection of useful images for 'mugshots' or even for face recognition by assessing the angle of the face," it reads. "The best images are ones where the person is facing the camera with their face upright."The agency did make efforts to limit analysts' ability to see webcam images, restricting bulk searches to metadata only.However, analysts were shown the faces of people with similar usernames to surveillance targets, potentially dragging in large numbers of innocent people. One document tells agency staff they were allowed to display "webcam images associated with similar Yahoo identifiers to your known target".Optic Nerve was based on collecting information from GCHQ's huge network of internet cable taps, which was then processed and fed into systems provided by the NSA. Webcam information was fed into NSA's XKeyscore search tool, and NSA research was used to build the tool which identified Yahoo's webcam traffic.
  • ...3 more annotations...
  • Optic Nerve, the documents provided by NSA whistleblower Edward Snowden show, began as a prototype in 2008 and was still active in 2012, according to an internal GCHQ wiki page accessed that year.The system, eerily reminiscent of the telescreens evoked in George Orwell's 1984, was used for experiments in automated facial recognition, to monitor GCHQ's existing targets, and to discover new targets of interest. Such searches could be used to try to find terror suspects or criminals making use of multiple, anonymous user IDs.Rather than collecting webcam chats in their entirety, the program saved one image every five minutes from the users' feeds, partly to comply with human rights legislation, and also to avoid overloading GCHQ's servers. The documents describe these users as "unselected" – intelligence agency parlance for bulk rather than targeted collection.One document even likened the program's "bulk access to Yahoo webcam images/events" to a massive digital police mugbook of previously arrested individuals.
  • Programs like Optic Nerve, which collect information in bulk from largely anonymous user IDs, are unable to filter out information from UK or US citizens. Unlike the NSA, GCHQ is not required by UK law to "minimize", or remove, domestic citizens' information from its databases. However, additional legal authorisations are required before analysts can search for the data of individuals likely to be in the British Isles at the time of the search.There are no such legal safeguards for searches on people believed to be in the US or the other allied "Five Eyes" nations – Australia, New Zealand and Canada.
  • The documents also show that GCHQ trialled automatic searches based on facial recognition technology, for people resembling existing GCHQ targets: "[I]f you search for similar IDs to your target, you will be able to request automatic comparison of the face in the similar IDs to those in your target's ID".
Paul Merrell

Mission Creep: When Everything Is Terrorism - 0 views

  • "Once the technology is in place, there will always be the temptation to use it. And it is poor civic hygiene to install technologies that could someday facilitate a police state." Today we're installing technologies of ubiquitous surveillance, and the temptation to use them will be overwhelming.
  •  
    Great quote from Bruce Schneier.
Paul Merrell

Ukraine: Secretive Neo-Nazi Military Organization Involved in Euromaidan Snyper Shootings | Global Research - 0 views

  • An legitimately-elected (said by all international monitors) Ukrainian President, Viktor Yanukovich, has been driven from office, forced to flee as a war criminal after more than three months of violent protest and terrorist killings by so-called opposition. His “crime” according to protest leaders was that he rejected an EU offer of a vaguely-defined associate EU membership that offered little to Ukraine in favor of a concrete deal with Russia that gave immediate €15 billion debt relief and a huge reduction in Russian gas import prices. Washington at that point went into high gear and the result today is catastrophe. A secretive neo-nazi military organization reported linked to NATO played a decisive role in targeted sniper attacks and violence that led to the collapse of the elected government.
  • Snipers began shooting into the crowd on February 22 in Maidan or Independence Square. Panic ensued and riot police retreated in panic according to eyewitnesses. The opposition leader Vitali Klitschko withdrew from the deal, no reason given. Yanukovich fled Kiev.[3] The question unanswered until now is who deployed the snipers? According to veteran US intelligence sources, the snipers came from an ultra-right-wing military organization known as Ukrainian National Assembly – Ukrainian People’s Self-Defense (UNA-UNSO).
  • Strange Ukraine ‘Nationalists’ The leader of UNA-UNSO, Andriy Shkil, ten years ago became an adviser to Julia Tymoshenko. UNA-UNSO, during the US-instigated 2003-2004 “Orange Revolution”, backed pro-NATO candidate Viktor Yushchenko against his pro-Russian opponent, Yanukovich. UNA-UNSO members provided security for the supporters of Yushchenko and Julia Tymoshenko on Independence Square in Kiev in 2003-4.[4] UNA-UNSO is also reported to have close ties to the German National Democratic Party (NDP). [5] Ever since the dissolution of the Soviet Union in 1991 the crack-para-military UNA-UNSO members have been behind every revolt against Russian influence. The one connecting thread in their violent campaigns is always anti-Russia. The organization, according to veteran US intelligence sources, is part of a secret NATO “GLADIO” organization, and not a Ukraine nationalist group as portrayed in western media. [6] According to these sources, UNA-UNSO have been involved (confirmed officially) in the Lithuanian events in the Winter of 1991, the Soviet Coup d’etat in Summer 1991, the war for the Pridnister Republic 1992, the anti-Moscow Abkhazia War 1993, the Chechen War, the US-organized Kosovo Campaign Against the Serbs, and the August 8 2008 war in Georgia. According to these reports, UNA-UNSO para-military have been involved in every NATO dirty war in the post-cold war period, always fighting on behalf of NATO. “These people are the dangerous mercenaries used all over the world to fight NATO’s dirty war, and to frame Russia because this group pretends to be Russian special forces. THESE ARE THE BAD GUYS, forget about the window dressing nationalists, these are the men behind the sniper rifles,” these sources insist. [7]
  • ...1 more annotation...
  • If true that UNA-UNSO is not “Ukrainian” opposition, but rather a highly secret NATO force using Ukraine as base, it would suggest that the EU peace compromise with the moderates was likely sabotaged by the one major player excluded from the Kiev 21 February diplomatic talks—Victoria Nuland’s State Department.[8] Both Nuland and right-wing Republican US Senator John McCain have had contact with the leader of the Ukrainian opposition Svoboda Party, whose leader is openly anti-semitic and defends the deeds of a World War II Ukrainian SS-Galicia Division head.[9] The party was registered in 1995, initially calling itself the “Social National Party of Ukraine” and using a swastika style logo. Svoboda is the electoral front for neo-nazi organizations in Ukraine such as UNA-UNSO.[10]
Paul Merrell

Merkel compared NSA to Stasi in heated encounter with Obama | World news | The Guardian - 0 views

  • In an angry exchange with Barack Obama, Angela Merkel has compared the snooping practices of the US with those of the Stasi, the ubiquitous and all-powerful secret police of the communist dictatorship in East Germany, where she grew up.The German chancellor also told the US president that America's National Security Agency cannot be trusted because of the volume of material it had allowed to leak to the whistleblower Edward Snowden, according to the New York Times.Livid after learning from Der Spiegel magazine that the Americans were listening in to her personal mobile phone, Merkel confronted Obama with the accusation: "This is like the Stasi."The newspaper also reported that Merkel was particularly angry that, based on the disclosures, "the NSA clearly couldn't be trusted with private information, because they let Snowden clean them out."
  • Snowden is to testify on the NSA scandal to a European parliament inquiry next month, to the anger of Washington which is pressuring the EU to stop the testimony.
  • A draft report by a European parliament inquiry into the affair, being presented on Wednesday and obtained by the Guardian, says there has to be a discussion about the legality of the NSA's operations and also of the activities of European intelligence agencies.The report drafted by Claude Moraes, the British Labour MEP heading the inquiry, says "we have received substantial evidence that the operations by intelligence services in the US, UK, France and Germany are in breach of international law and European law".
Paul Merrell

Venezuela's foreign minister calls Kerry 'murderer' | Reuters - 0 views

  • Venezuela's foreign minister lambasted U.S. Secretary of State John Kerry on Friday as a "murderer" fomenting unrest that has killed 28 people in the South American OPEC member nation. Since street demonstrations began against President Nicolas Maduro's socialist government in early February, Venezuelan officials have been accusing Washington of stirring the country's worst political troubles in a decade.
  • "Every time we're about to isolate and reduce the violence, Mr. Kerry comes out with a declaration and immediately the street protests are activated," Foreign Minister Elias Jaua said in a speech carried on state TV."Mr. Kerry, we denounce to the whole world, you encourage the violence in Venezuela ... We denounce you as a murderer of the Venezuelan people."
  • But the bitterness and incidents have continued, with Maduro last month expelling three U.S. diplomats he accused of recruiting protesters. Washington responded in kind."In Guatemala, you said to me 'you have to lower the tone'," Jaua added in his speech. "We are not going to lower the tone to any empire until you order your lackeys in Venezuela to cease the violence against the people."Despite the harsh words, pragmatism has continued to trump politics when it comes to oil, with shipments unaffected and the United States remaining Venezuela's main export market.
  • ...1 more annotation...
  • As well as the 28 deaths during the unrest, more than 300 people have been injured. Security forces have arrested nearly 1,300 people, of whom about 100 are still in jail.Maduro says he has seen off a "coup" attempt, and he does not look in danger of being toppled by a "Venezuelan Spring", with the military apparently still behind him.But opponents and rights groups say he has used heavy-handed tactics against opponents, including unnecessary brutality from troops and police on the street. Several dozen detainees have denounced being beaten and other forms of mistreatment.A hard core of mainly student protesters are vowing to stay in the streets until Maduro quits.
Paul Merrell

Attempt to jam Russian satellites carried out from Western Ukraine - RT News - 0 views

  • An attempted radio-electronic attack on Russian television satellites from the territory of Western Ukraine has been recorded by the Ministry of Communications. It comes days after Ukraine blocked Russian TV channels, a move criticized by the OSCE. Russian Ministry of Communications experts identified the exact location in Ukraine of the source of attempted jamming of Russian TV satellites’ broadcast, RIA Novosti news agency reports. The ministry noted that “people who make such decisions” to attack Russian satellites that retransmit TV signals, “should think about the consequences,” Ria reports. The ministry did not share any details of the attack.
  • On Thursday, a number of Russian state TV channels websites suffered a large cyber-attack partially coming from Ukraine. Russia’s Channel One website was temporarily unavailable due to a distributed denial-of-service (DDoS) attack. Meanwhile, Russia-24 TV also said it suffered from a “massive network attack.” According to Itar-Tass, the targeted Russian media have connected attacks to their editorial policy of covering the recent events in Ukraine.
  • An international media company in Kiev said it was visited by unknown people armed with knives, who threatened the employees against working with Russian TV channels, RT editor-in-chief Margarita Simonyan wrote on Twitter. The company, which asked for anonymity citing concerns for own safety, said it could no longer work with RT. Intimidation and threats to journalists have lately become common practice in Ukraine with several Russian journalists coming under attack from radicals, says RT correspondent Marina Kosareva. “We have countless of reports of journalists being attacked by those radicals that we’ve seen on Maidan Square as well,” she said. Kosareva cited as an example an incident on March 5 with a pro-Russian journalist, Sergey Rulev who was beaten up and threatened by Ukrainian nationalists “just because he dared to interview riot police [Berkut].” A correspondent for Russiya-24 TV channel, Artyom Kol said he was repeatedly threatened by ultra-nationalist group Right Sector who placed him on a ‘wanted list’ on February 22.
  • ...2 more annotations...
  • On a number of occasions over the last month, Russian journalists were denied entry into Ukraine. On Saturday a photo-journalist from the Russian daily Kommersant, Vasily Shaposhnikov, who was heading to Kiev, was not allowed into the country.
  • Two days earlier, two Kommersant reporters were taken off the train going from Moscow to the Ukrainian city of Nikolayev. The official reason for not allowing them into the country was that they did not have return tickets with them and a sufficient sum of money. According to the new rules of entry, introduced December 4, each foreign citizen traveling to Ukraine must have with them around 3,000 rubles ($85) per day. On March 7, several Russian TV crews were denied entry into Ukraine at the Donetsk airport, prompting a protest by Russia’s Foreign Ministry.
Gary Edwards

Welcome to Post-Constitution America - Peter Van Buren - 0 views

  • On July 30, 1778, the Continental Congress created the first whistleblower protection law, stating “that it is the duty of all persons in the service of the United States to give the earliest information to Congress or other proper authority of any misconduct, frauds, or misdemeanors committed by any officers or persons in the service of these states.”
  • Two hundred thirty-five years later, on July 30, 2013, Bradley Manning was found guilty on 20 of the 22 charges for which he was prosecuted, specifically for “espionage” and for videos of war atrocities he released, but not for “aiding the enemy.”
  • Days after the verdict, with sentencing hearings in which Manning could receive 136 years of prison time ongoing, the pundits have had their say. The problem is that they missed the most chilling aspect of the Manning case: the way it ushered us, almost unnoticed, into post-Constitutional America.
  • ...22 more annotations...
  • As at Guantanamo, rules of evidence reaching back to early
  • During the months of the trial, the U.S. military refused to release official transcripts of the proceedings. Even a private courtroom sketch artist was barred from the room. Independent journalist and activist Alexa O’Brien then took it upon herself to attend the trial daily, defy the Army, and make an unofficial record of the proceedings by hand. Later in the trial, armed military police were stationed behind reporters listening to testimony. Above all, the feeling that Manning’s fate was predetermined could hardly be avoided. After all, President Obama, the former Constitutional law professor, essentially proclaimed him guilty back in 2011 and the Department of Defense didn’t hesitate to state more generally that “leaking is tantamount to aiding the enemies of the United States.”
  • And so to Bradley Manning. As the weaponry and technology of war came home, so did a new, increasingly Guantanamo-ized definition of justice. This is one thing the Manning case has made clear. As a start, Manning was treated no differently than America’s war-on-terror prisoners at Guantanamo and the black sites that the Bush administration set up around the world. Picked up on the “battlefield,” Manning was first kept incommunicado in a cage in Kuwait for two months with no access to a lawyer. Then, despite being an active duty member of the Army, he was handed over to the Marines, who also guard Guantanamo, to be held in a military prison in Quantico, Virginia. What followed were three years of cruel detainment, where, as might well have happened at Gitmo, Manning, kept in isolation, was deprived of clothing, communications, legal advice, and sleep. The sleep deprivation regime imposed on him certainly met any standard, other than Washington’s and possibly Pyongyang’s, for torture. In return for such abuse, even after a judge had formally ruled that he was subjected to excessively harsh treatment, Manning will only get a 112-day reduction in his eventual sentence. Eventually the Obama administration decided Manning was to be tried as a soldier before a military court. In the courtroom, itself inside a military facility that also houses NSA headquarters, there was a strikingly gulag-like atmosphere.  His trial was built around secret witnesses and secret evidence; severe restrictions were put on the press -- the Army denied press passes to 270 of the 350 media organizations that applied; and there was a clear appearance of injustice. Among other things, the judge ruled against nearly every defense motion.
  • “What constitutes due process in this case is a due process in war.”
  • Given all this, it is small comfort to know that Manning, nailed on the Espionage Act after multiple failures in other cases by the Obama administration, was not convicted of the extreme charge of “aiding the enemy.”
  • Obama administration lawyers went on to claim the legal right to execute U.S. citizens without trial or due process and have admitted to killing four Americans. Attorney General Eric Holder declared that “United States citizenship alone does not make such individuals immune from being targeted.”
  • As if competing for an Orwellian prize, an unnamed Obama administration official told the Washington Post,
  • English common law were turned upside down. In Manning’s case, he was convicted of espionage, even though the prosecution did not have to prove either his intent to help another government or that harm was caused; a civilian court had already paved the way for such a ruling in another whistleblower case. In addition, the government was allowed to label Manning a “traitor” and an “anarchist” in open court, though he was on trial for neither treason nor anarchy.
  • Similarly, full-spectrum spying is not considered to violate the Fourth Amendment and does not even require probable cause.
  • Justice can be twisted and tangled into an almost unrecognizable form and then used to send a young man to prison for decades.
  • Government officials concerned over possible wrongdoing in their departments or agencies who “go through proper channels” are fired or prosecuted.
  • Government whistleblowers are commanded to return to face justice, while law-breakers in the service of the government are allowed to flee justice. CIA officers who destroy evidence of torture go free, while a CIA agent who blew the whistle on torture is locked up.
  • Thanks to the PATRIOT Act, citizens, even librarians, can be served by the FBI with a National Security Letter (not requiring a court order) demanding records and other information, and gagging them from revealing to anyone that such information has been demanded or such a letter delivered.
  • Citizens may be held without trial, and denied their Constitutional rights as soon as they are designated “terrorists.” Lawyers and habeas corpus are available only when the government allows.
  • The war on whistleblowers is metastasizing into a war on the First Amendment.
  • People may now be convicted based on secret testimony by unnamed persons.
  • Military courts and jails can replace civilian ones.
  • An Obama administration Insider Threat Program requires federal employees (including the Peace Corps) to report on the suspicious behavior of coworkers.
  • Claiming its actions lawful while shielding the “legal” opinions cited, often even from Congress, the government can send its drones to assassinate its own citizens.
  • One by one, the tools and attitudes of the war on terror, of a world in which the “gloves” are eternally off, have come home.
  • The comic strip character Pogo’s classic warning -- “We have met the enemy and he is us” -- seems ever less like a metaphor.
  • According to the government, increasingly we are now indeed their enemy.
  •  
    Well written and researched article describing what it means to live in a post-Constitutional America.  Chilling facts with a cold but obvious conclusion.
Paul Merrell

Exclusive: U.S. directs agents to cover up program used to investigate Americans - chicagotribune.com - 0 views

  • WASHINGTON (Reuters) - A secretive U.S. Drug Enforcement Administration unit is funneling information from intelligence intercepts, wiretaps, informants and a massive database of telephone records to authorities across the nation to help them launch criminal investigations of Americans. Although these cases rarely involve national security issues, documents reviewed by Reuters show that law enforcement agents have been directed to conceal how such investigations truly begin - not only from defense lawyers but also sometimes from prosecutors and judges. The undated documents show that federal agents are trained to "recreate" the investigative trail to effectively cover up where the information originated, a practice that some experts say violates a defendant's Constitutional right to a fair trial. If defendants don't know how an investigation began, they cannot know to ask to review potential sources of exculpatory evidence - information that could reveal entrapment, mistakes or biased witnesses.
  • The unit of the DEA that distributes the information is called the Special Operations Division, or SOD. Two dozen partner agencies comprise the unit, including the FBI, CIA, NSA, Internal Revenue Service and the Department of Homeland Security. It was created in 1994 to combat Latin American drug cartels and has grown from several dozen employees to several hundred. Today, much of the SOD's work is classified, and officials asked that its precise location in Virginia not be revealed. The documents reviewed by Reuters are marked "Law Enforcement Sensitive," a government categorization that is meant to keep them confidential. "Remember that the utilization of SOD cannot be revealed or discussed in any investigative function," a document presented to agents reads. The document specifically directs agents to omit the SOD's involvement from investigative reports, affidavits, discussions with prosecutors and courtroom testimony. Agents are instructed to then use "normal investigative techniques to recreate the information provided by SOD."
  • A spokesman with the Department of Justice, which oversees the DEA, declined to comment. But two senior DEA officials defended the program, and said trying to "recreate" an investigative trail is not only legal but a technique that is used almost daily.
  • ...2 more annotations...
  • A former federal agent in the northeastern United States who received such tips from SOD described the process. "You'd be told only, ‘Be at a certain truck stop at a certain time and look for a certain vehicle.' And so we'd alert the state police to find an excuse to stop that vehicle, and then have a drug dog search it," the agent said. "PARALLEL CONSTRUCTION" After an arrest was made, agents then pretended that their investigation began with the traffic stop, not with the SOD tip, the former agent said. The training document reviewed by Reuters refers to this process as "parallel construction." The two senior DEA officials, who spoke on behalf of the agency but only on condition of anonymity, said the process is kept secret to protect sources and investigative methods. "Parallel construction is a law enforcement technique we use every day," one official said. "It's decades old, a bedrock concept." A dozen current or former federal agents interviewed by Reuters confirmed they had used parallel construction during their careers. Most defended the practice; some said they understood why those outside law enforcement might be concerned.
  • Today, the SOD offers at least three services to federal, state and local law enforcement agents: coordinating international investigations such as the Bout case; distributing tips from overseas NSA intercepts, informants, foreign law enforcement partners and domestic wiretaps; and circulating tips from a massive database known as DICE. The DICE database contains about 1 billion records, the senior DEA officials said. The majority of the records consist of phone log and Internet data gathered legally by the DEA through subpoenas, arrests and search warrants nationwide. Records are kept for about a year and then purged, the DEA officials said. About 10,000 federal, state and local law enforcement agents have access to the DICE database, records show. They can query it to try to link otherwise disparate clues. Recently, one of the DEA officials said, DICE linked a man who tried to smuggle $100,000 over the U.S. southwest border to a major drug case on the East Coast.
Paul Merrell

U.S. military confirms rebels had sarin - 1 views

  • As part of the Obama administration’s repeated insistence – though without offering proof – that the recent sarin gas attack near Damascus was the work of the Assad regime, the administration has downplayed or denied the possibility that al-Qaida-linked Syrian rebels could produce deadly chemical weapons. However, in a classified document just obtained by WND, the U.S. military confirms that sarin was confiscated earlier this year from members of the Jabhat al-Nusra Front, the most influential of the rebel Islamists fighting in Syria. The document says sarin from al-Qaida in Iraq made its way into Turkey and that while some was seized, more could have been used in an attack last March on civilians and Syrian military soldiers in Aleppo.
  • The document, classified Secret/Noforn – “Not for foreign distribution” – came from the U.S. intelligence community’s National Ground Intelligence Center, or NGIC, and was made available to WND Tuesday. It revealed that AQI had produced a “bench-scale” form of sarin in Iraq and then transferred it to Turkey. A U.S. military source said there were a number of interrogations as well as some clan reports as part of what the document said were “50 general indicators to monitor progress and characterize the state of the ANF/AQI-associated Sarin chemical warfare agent developing effort.” “This (document) depicts our assessment of the status of effort at its peak – primarily research and procurement activities – when disrupted in late May 2013 with the arrest of several key individuals in Iraq and Turkey,” the document said. “Future reporting of indicators not previously observed would suggest that the effort continues to advance despite the arrests,” the NGIC document said.
  • This seizure followed a chemical weapons attack in March on the Khan al-Assal area of rural Aleppo, Syria. In that attack, some 26 people and Syrian government forces were killed by what was determined to be sarin gas, delivered by a rocket attack. The Syrian government called for an investigation by the United Nations. Damascus claimed al-Qaida fighters were behind the attack, also alleging that Turkey was involved. “The rocket came from a place controlled by the terrorists and which is located close to the Turkish territory,” according to a statement from Damascus. “One can assume that the weapon came from Turkey.” The report of the U.S. intelligence community’s NGIC reinforces a preliminary U.N. investigation of the attack in Aleppo which said the evidence pointed to Syrian rebels. It also appears to bolster allegations in a 100-page report on an investigation turned over to the U.N. by Russia. The report concluded the Syrian rebels – not the Syrian government – had used the nerve agent sarin in the March chemical weapons attack in Aleppo.
  • ...7 more annotations...
  • The May 2013 seizure occurred when Turkish security forces discovered a two-kilogram cylinder with sarin gas while searching homes of Syrian militants from the al-Qaida-linked Jabhat al-Nusra Front following their initial detention. The sarin gas was found in the homes of suspected Syrian Islamic radicals detained in the southern provinces of Adana and Mersia. Some 12 suspected members of the al-Nusra Front were arrested. At the time, they were described by Turkish special anti-terror forces as the “most aggressive and successful arm” of the Syrian rebels. In the seizure, Turkish anti-terror police also found a cache of weapons, documents and digital data. At the time of the arrest, the Russians called for a thorough investigation of the detained Syrian militants found in possession of sarin gas.
  • While the contents of the report have yet to be released, sources tell WND the documentation indicates that deadly sarin poison gas was manufactured in a Sunni-controlled region of Iraq and then transported to Turkey for use by the Syrian opposition, whose ranks have swelled with members of al-Qaida and affiliated groups. The documentation that the U.N. received from the Russians indicated specifically that the sarin gas was supplied to Sunni foreign fighters by a Saddam-era general working under the outlawed Iraqi Baath party leader, Izzat Ibrahim al-Douri. Al-Douri was a top aide to Saddam Hussein before he was deposed as Iraqi president. The sarin nerve gas used in the Allepo attack, sources say, had been prepared by former Iraqi Military Industries Brig. Gen. Adnan al-Dulaimi. It then was supplied to Baath-affiliated foreign fighters of the Sunni and Saudi Arabian-backed al-Nusra Front in Aleppo, with Turkey’s cooperation, through the Turkish town of Antakya in Hatay Province. The source who brought out the documentation now in the hands of the U.N. is said to have been an aide to al-Douri. Al-Dulaimi was a major player in Saddam’s chemical weapons production projects, the former aide said. Moreover, Al-Dulaimi has been working in the Sunni-controlled region of northwestern Iraq where the outlawed Baath party now is located and produces the sarin.
  • The NGIC depiction of the variety of sarin as “bench-scale” reinforces an analysis by terrorism expert Yossef Bodansky, who said the recent findings on the chemical weapons attack of Aug. 21 on the outskirts of Damascus, Syria, was “indeed a self-inflicted attack” by the Syrian opposition to provoke U.S. and military intervention in Syria.
  • The terrorism expert said that the jihadist movement has technologies which have been confirmed in captured jihadist labs in both Turkey and Iraq, as well as from the wealth of data recovered from al-Qaida in Afghanistan in 2001 and 2002. He added that the projectiles shown by the opposition, which were tested by U.N. inspectors, are not standard weapons of the Syrian army.
  • Now, a former analyst for the Central Intelligence Agency, Ray McGovern, similarly backs the claim that the Syrian rebels perpetrated the poison gas attack on Aug. 21 McGovern was one of a number of veteran intelligence professionals who recently signed a letter to Obama saying that Damascus wasn’t behind the Aug. 21 chemical attack. As WND recently reported, former U.S. intelligence analysts claim current intelligence analysts have told them Assad was not responsible for the Aug. 21 poison gas attack, saying there was a “growing body of evidence” that reveals the incident was a pre-planned provocation by the Syrian opposition.
  • “Initial meetings between senior opposition military commanders and Qatari, Turkish and U.S. intelligence officials took place at the converted Turkish military garrison in Antakya, Hatay Province, now used as the command center and headquarters of the Free Syrian Army and their foreign sponsors,” the analysts said.
  • The VIPS memo to Obama reinforces separate videos, which show foreign fighters associated with the Syrian opposition firing artillery canisters of poison gas. One video shows Nadee Baloosh, a member of an al-Qaida-affiliated group Rioyadh al-Abdeen, admitting to the use of chemical weapons. In the video clip, al-Abdeen, who is in the Latakia area of Syria, said his forces used “chemicals which produce lethal and deadly gases that I possess.”
Paul Merrell

Jeremy Hammond Sentenced To 10 Years In Prison - 0 views

  • NEW YORK -- Convicted hacker Jeremy Hammond was sentenced Friday to 10 years in prison for stealing internal emails from the global intelligence firm Stratfor.
  • Hammond, 28, has a lengthy criminal record for his protests both online and off against targets like the 2004 Republican National Convention and pro-Iraq War activists. But stealing Stratfor files as part of the online hacking collective Anonymous gave him a new level of notoriety. In May, he pleaded guilty to one conspiracy charge for hacking the Texas-based private intelligence firm Strategic Forecasting, or Stratfor. The security breach resulted in the theft of employee emails and account information for approximately 860,000 Stratfor subscribers and clients, including information from 60,000 credit cards. Although Hammond did not use the credit cards himself, he urged supporters to use them to make donations to charities. The resulting fraudulent charges led to headaches for nonprofits and for the private individuals who had their phone numbers and email addresses exposed. The government charges originally added up to 30 years in prison, but Hammond took a plea deal for violating the Computer Fraud and Abuse Act, a federal anti-hacking law also used to prosecute internet freedom activist Aaron Swartz. He admitted to hacking several other websites, including the Arizona Department of Public Safety, Special Forces Gear, the Boston Police Patrolmen's Association, and the sheriff's office in Jefferson County, Ala.
  • Nearly 5 million emails obtained in the Stratfor hack were turned over to WikiLeaks by Hammond and published as the “Global Intelligence Files.” They revealed domestic spying on activists, including Occupy Wall Street. The resulting media publicity led some, including 4,000 online petition backers and Pentagon Papers leaker Daniel Ellsberg, to hail him as a whistleblower. But to the federal government, he was little more than a common thief. “While he billed himself as fighting for an anarchist cause, in reality, Jeremy Hammond caused personal and financial chaos for individuals whose identities and money he took and for companies whose businesses he decided he didn’t like," United States Attorney Preet Bharara said in a May statement. On Friday, Hammond, who has been in detention for 20 months, struck back. While apologizing to the innocent people who had their personal information exposed as a result of his leaks, he lashed out at the FBI, and Hector Xavier Monsegur, an informant widely known by his online name "Sabu." For months, Hammond claimed, Sabu guided him as he hacked the Stratfor website and thousands more around the world.
  • ...1 more annotation...
  • Before being cut off by U.S. District Court Judge Loretta Preska, Hammond claimed that foreign government targets included Turkey, Brazil and Iran. Preska had already imposed a protective order preventing the release of the countries' names, which were in Hammond's statement as well as in sentencing paperwork. The government had disputed his claims involving the countries, and Preska responded by ordering that their names be redacted. She cut Hammond off in court Friday before he was able to list all of the countries in violation of the order.
  •  
    Jeremy Hammond draws the maximum 10-year sentence. 
Paul Merrell

Exclusive: John McAfee vows to make Internet 'impossible to hack' in Silicon Valley return | McClatchy - 0 views

  • Anti-virus software pioneer John McAfee, who buried himself in the sand to hide from police in Belize, faked a heart attack in a Guatemalan detention center and admits playing the "crazy card," says he's now ready for his next adventure: a return to Silicon Valley. At age 67, McAfee is promising to launch a new cybersecurity company that will make the Internet safer for everyone. "My new technology is going to provide a new type of Internet, a decentralized, floating and moving Internet that is impossible to hack, impossible to penetrate and vastly superior in terms of its facility and neutrality. It solves all of our security concerns," McAfee said in an interview with the San Jose Mercury News.
Paul Merrell

New Snowden docs show U.S. spied during G20 in Toronto - Politics - CBC News - 0 views

  • Top secret documents retrieved by U.S. whistleblower Edward Snowden show that Prime Minister Stephen Harper's government allowed the largest American spy agency to conduct widespread surveillance in Canada during the 2010 G8 and G20 summits.
  • The briefing notes, stamped "Top Secret," show the U.S. turned its Ottawa embassy into a security command post during a six-day spying operation by the National Security Agency while U.S. President Barack Obama and 25 other foreign heads of government were on Canadian soil in June of 2010. The covert U.S. operation was no secret to Canadian authorities.
  • Notably, the secret NSA briefing document describes part of the U.S. eavesdropping agency's mandate at the Toronto summit as "providing support to policymakers." Documents previously released by Snowden, a former NSA contractor who has sought and received asylum in Russia, suggested that support at other international gatherings included spying on the foreign delegations to get an unfair advantage in any negotiations or policy debates at the summit. It was those documents that first exposed the spying on world leaders at the London summit. More recently, Snowden's trove of classified information revealed Canada's eavesdropping agency had hacked into phones and computers in the Brazilian government's department of mines, a story that touched off a political firestorm both in that country and in Ottawa.
  • ...5 more annotations...
  • The secret documents do not reveal the precise targets of so much espionage by the NSA — and possibly its Canadian partner — during the Toronto summit. But both the U.S. and Canadian intelligence agencies have been implicated with their British counterpart in hacking the phone calls and emails of foreign politicians and diplomats attending the G20 summit in London in 2009 — a scant few months before the Toronto gathering of the same world leaders.
  • The spying at the Toronto summit in 2010 fits a pattern of economic and political espionage by the powerful U.S. intelligence agency and its partners such as Canada. That espionage was conducted to secure meeting sites and protect leaders against terrorist threats posed by al-Qaeda but also to forward the policy goals of the United States and Canada. The G20 summit in Toronto had a lot on its agenda that would have been of acute interest to the NSA and Canada.
  • The world was still struggling to climb out of the great recession of 2008. Leaders were debating a wide array of possible measures including a global tax on banks, an idea strongly opposed by both the U.S. and Canadian governments. That notion was eventually scotched. The secret NSA documents list all the main agenda items for the G20 in Toronto — international development, banking reform, countering trade protectionism, and so on — with the U.S. snooping agency promising to support "U.S. policy goals." Whatever the intelligence goals of the NSA during the Toronto summit, international security experts question whether the NSA spying operation at the G20 in Toronto was even legal.
  • "If CSEC tasked NSA to conduct spying activities on Canadians within Canada that CSEC itself was not authorized to take, then I am comfortable saying that would be an unlawful undertaking by CSEC," says Craig Forcese, an expert in national security at University of Ottawa's faculty of law. By law, CSEC cannot target anyone in Canada without a warrant, including world leaders and foreign diplomats at a G20 summit. But, the Canadian eavesdropping agency is also prohibited by international agreement from getting the NSA to do the spying or anything that would be illegal for CSEC.
  • The NSA warns the more likely security threat would come from "issue-based extremists" conducting acts of vandalism. They got that right. Protest marches by about 10,000 turned the Toronto G20 into an historic melee of arrests by more than 20,000 police in what would become one of the largest and most expensive security operations in Canadian history. By the time the tear gas had cleared and the investigations were complete, law enforcement agencies stood accused of mass-violations of civil rights. Add to that dubious legacy illegal spying by an American intelligence agency with the blessing of the Canadian government.
« First ‹ Previous 281 - 300 of 440 Next › Last »
Showing 20 items per page