Skip to main content

Home/ Socialism and the End of the American Dream/ Group items matching "Police" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Paul Merrell

Spies Infiltrate a Fantasy Realm of Online Games - NYTimes.com - 0 views

  • Not limiting their activities to the earthly realm, American and British spies have infiltrated the fantasy worlds of World of Warcraft and Second Life, conducting surveillance and scooping up data in the online games played by millions of people across the globe, according to newly disclosed classified documents.
  • Fearing that terrorist or criminal networks could use the games to communicate secretly, move money or plot attacks, the documents show, intelligence operatives have entered terrain populated by digital avatars that include elves, gnomes and supermodels. The spies have created make-believe characters to snoop and to try to recruit informers, while also collecting data and contents of communications between players, according to the documents, disclosed by the former National Security Agency contractor Edward J. Snowden. Because militants often rely on features common to video games — fake identities, voice and text chats, a way to conduct financial transactions — American and British intelligence agencies worried that they might be operating there, according to the papers.
  • Online games might seem innocuous, a top-secret 2008 N.S.A. document warned, but they had the potential to be a “target-rich communication network” allowing intelligence suspects “a way to hide in plain sight.” Virtual games “are an opportunity!” another 2008 N.S.A. document declared. But for all their enthusiasm — so many C.I.A., F.B.I. and Pentagon spies were hunting around in Second Life, the document noted, that a “deconfliction” group was needed to avoid collisions — the intelligence agencies may have inflated the threat. The documents, obtained by The Guardian and shared with The New York Times and ProPublica, do not cite any counterterrorism successes from the effort. Former American intelligence officials, current and former gaming company employees and outside experts said in interviews that they knew of little evidence that terrorist groups viewed the games as havens to communicate and plot operations.
  • ...5 more annotations...
  • In the 2008 N.S.A. document, titled “Exploiting Terrorist Use of Games & Virtual Environments,” the agency said that “terrorist target selectors” — which could be a computer’s Internet Protocol address or an email account — “have been found associated with Xbox Live, Second Life, World of Warcraft” and other games. But that document does not present evidence that terrorists were participating in the games. Still, the intelligence agencies found other benefits in infiltrating these online worlds. According to the minutes of a January 2009 meeting, GCHQ’s “network gaming exploitation team” had identified engineers, embassy drivers, scientists and other foreign intelligence operatives to be World of Warcraft players — potential targets for recruitment as agents.
  • The surveillance, which also included Microsoft’s Xbox Live, could raise privacy concerns. It is not clear exactly how the agencies got access to gamers’ data or communications, how many players may have been monitored or whether Americans’ communications or activities were captured. One American company, the maker of World of Warcraft, said that neither the N.S.A. nor its British counterpart, the Government Communications Headquarters, had gotten permission to gather intelligence in its game. Many players are Americans, who can be targeted for surveillance only with approval from the nation’s secret intelligence court. The spy agencies, though, face far fewer restrictions on collecting certain data or communications overseas.
  • “The Sigint Enterprise needs to begin taking action now to plan for collection, processing, presentation and analysis of these communications,” said one April 2008 N.S.A. document, referring to “signals intelligence.” The document added, “With a few exceptions, N.S.A. can’t even recognize the traffic,” meaning that the agency could not distinguish gaming data from other Internet traffic. By the end of 2008, according to one document, the British spy agency, known as GCHQ, had set up its “first operational deployment into Second Life” and had helped the police in London in cracking down on a crime ring that had moved into virtual worlds to sell stolen credit card information. The British spies running the effort, which was code-named Operation Galician, were aided by an informer using a digital avatar “who helpfully volunteered information on the target group’s latest activities.”
  • Even before the American government began spying in virtual worlds, the Pentagon had identified the potential intelligence value of video games. The Pentagon’s Special Operations Command in 2006 and 2007 worked with several foreign companies — including an obscure digital media business based in Prague — to build games that could be downloaded to mobile phones, according to people involved in the effort. They said the games, which were not identified as creations of the Pentagon, were then used as vehicles for intelligence agencies to collect information about the users. Eager to cash in on the government’s growing interest in virtual worlds, several large private contractors have spent years pitching their services to American intelligence agencies. In one 66-page document from 2007, part of the cache released by Mr. Snowden, the contracting giant SAIC promoted its ability to support “intelligence collection in the game space,” and warned that online games could be used by militant groups to recruit followers and could provide “terrorist organizations with a powerful platform to reach core target audiences.”
  • In spring 2009, academics and defense contractors gathered at the Marriott at Washington Dulles International Airport to present proposals for a government study about how players’ behavior in a game like World of Warcraft might be linked to their real-world identities. “We were told it was highly likely that persons of interest were using virtual spaces to communicate or coordinate,” said Dmitri Williams, a professor at the University of Southern California who received grant money as part of the program. After the conference, both SAIC and Lockheed Martin won contracts worth several million dollars, administered by an office within the intelligence community that finances research projects.
  •  
    Coming soon: disclosure of the NSA's public bathroom cams and microphones because people talk there and exchange germs that might have DNA in them that can be used to track terrorists. 
Paul Merrell

Who Is Watching the Watch Lists? - NYTimes.com - 0 views

  • GOVERNMENTS wade into treacherous waters when they compile lists of people who might cause their countries harm. As fears about Japanese-Americans and Communists have demonstrated in the past, predictions about individual behavior are often inaccurate, the motivations for list-making aren’t always noble and concerns about threats are frequently overblown.
  • What’s more, the government refuses to confirm or deny whether someone is on the list, officially called the Terrorist Screening Database, or divulge the criteria used to make the decisions — other than to say the database includes “individuals known or suspected to be or have been engaged in conduct constituting, in preparation for, in aid of, or related to terrorism and terrorist activities.” Even less is known about the secondary watch lists that are derived from the main one, including the no-fly list (used to prevent people from boarding aircraft), the selectee and expanded selectee lists (used to flag travelers for extra screening at airport checkpoints), the TECS database (used to vet people entering or leaving the United States), the Consular Lookout and Support System (used to screen visa applications) and the known or suspected terrorists list (used by law enforcement in routine police encounters). For people who have landed on these lists, the terrorist designation has been difficult to challenge legally — although that may be about to change. On Monday, a lawsuit brought by a traveler seeking removal of her name from the no-fly list, or at least due process to challenge that list, is going to trial in Federal District Court in San Francisco, after almost eight years of legal wrangling.
  • So it might seem that current efforts to identify and track potential terrorists would be approached with caution. Yet the federal government’s main terrorist watch list has grown to at least 700,000 people, with little scrutiny over how the determinations are made or the impact on those marked with the terrorist label.
  • ...1 more annotation...
  • “We’ve tried to get discovery into whether our client has been surveilled and have been shut down on that,” said Elizabeth Pipkin, a lawyer with McManis Faulkner, the firm representing Ms. Ibrahim pro bono. “They won’t answer that question for us.” The government says that revealing this type of information would jeopardize national security. In April, Attorney General Eric H. Holder Jr. asserted to the court “a formal claim of the state secrets privilege” in the case. In another case, Latif v. Holder, 13 American citizens who have been denied boarding on flights are seeking removal of their names from any watch list, as well as the reasons they have been banned and an opportunity to rebut any derogatory information.
Paul Merrell

Congressional oversight of the NSA is a joke. I should know, I'm in Congress | Alan Grayson | Comment is free | theguardian.com - 0 views

  • Despite being a member of Congress possessing security clearance, I've learned far more about government spying on me and my fellow citizens from reading media reports than I have from "intelligence" briefings. If the vote on the Amash-Conyers amendment is any indication, my colleagues feel the same way. In fact, one long-serving conservative Republican told me that he doesn't attend such briefings anymore, because, "they always lie".Many of us worry that Congressional Intelligence Committees are more loyal to the "intelligence community" that they are tasked with policing, than to the Constitution. And the House Intelligence Committee isn't doing anything to assuage our concerns.
  • And why do Generals Alexander and Clapper remain in office, when all the evidence points to them committing the felony of lying to Congress and the American people?
  •  
    Congressman Alan Grayson speaks out on the illusion of Congressional oversight of the U.S. intelligence community. A must-read
Paul Merrell

Germany to send intelligence chiefs to U.S. over Merkel allegations - chicagotribune.com - 0 views

  • Germany will send its top intelligence chiefs to Washington next week to seek answers from the White House on allegations that U.S. security officials tapped the mobile phone of Chancellor Angela Merkel.
  • Berlin will dispatch the heads of its foreign intelligence agency BND and of its domestic counterpart, the BfV. Merkel's chief of staff Ronald Pofalla, who is responsible for the intelligence services, may also join them.
  • German Chancellor Angela Merkel demanded on Thursday that the United States strike a "no-spying" agreement with Berlin and Paris by the end of the year, saying alleged espionage against two of Washington's closest EU allies had to be stopped. Speaking after talks with EU leaders that were dominated by allegations that the U.S. National Security Agency had accessed tens of thousands of French phone records and monitored Merkel's private mobile phone, the chancellor said she wanted action from President Barack Obama, not just apologetic words. Germany and France would seek a "mutual understanding" with the United States on cooperation between their intelligence agencies, and other EU member states could eventually take part. "That means a framework for cooperation between the relevant (intelligence) services. Germany and France have taken the initiative and other member states will join," she said.
  • ...4 more annotations...
  • As EU leaders arrived for the two-day summit there was near-universal condemnation of the alleged activities by the NSA, particularly the monitoring of Merkel's mobile phone, a sensitive issue for a woman who grew up in East Germany, living under the Stasi police force and its feared eavesdropping.
  • Some senior German officials, and the German president of the European Parliament, have called for talks between the EU and United States on a free-trade agreement, which began in July, to be suspended because of the spying allegations. Merkel, whose country is one of the world's leading exporters and stands to gain from any trade deal with Washington, said that was not the right path to take, saying the best way forward was to rebuild trust. The series of Snowden-based leaks over the past three months have left Washington at odds with a host of important allies, from Brazil to Saudi Arabia, and there are few signs that the revelations are going to dry up anytime soon.
  • As well as raising questions about the EU-US trade negotiations, the spying furor could also have an impact on data-privacy legislation working its way through the EU. The European Parliament has already opened an inquiry into the effect on Europe of U.S. intelligence activities revealed by former NSA contractor Edward Snowden. It has also led a push for tougher data protection rules and the suspension of a transatlantic data-sharing deal. The Parliament, with 766 members directly elected from the EU's 28 member states, voted this week in favor of an amended package of laws that would greatly strengthen EU data protection rules that date from 1995. The new rules would restrict how data collected in Europe by firms such as Google and Facebook is shared with non-EU countries, introduce the right of EU citizens to request that their digital traces be erased, and impose fines of 100 million euros ($138 million) or more on rule breakers.
  • The United States is concerned the regulations, if they enter into law, will raise the cost of handling data in Europe. Google, Yahoo!, Microsoft and others have lobbied hard against the proposals. Given the spying accusations, France and Germany - the two most influential countries in EU policy - may succeed in getting member states to push ahead on negotiations with the parliament to complete the new data regulations by 2015. For the United States, it could substantially change how data privacy rules are implemented globally.
  •  
    I'd like to have a "no spying" agreement with the Feds too.  
Paul Merrell

EPIC - Spotlight on Surveillance - December 2013 - 0 views

  • The Federal Bureau of Investigation (FBI) is developing a biometric identification database program called "Next Generation Identification" (NGI). When completed, the NGI system will be the largest biometric database in the world. The program is of particular interest to EPIC because of the far-reaching implications for personal privacy and the risks of mass surveillance.[1] The vast majority of records contained in the NGI database will be of US citizens. The NGI biometric identifiers will include fingerprints, iris scans, DNA profiles, voice identification profiles, palm prints, and photographs. The system will include facial recognition capabilities to analyze collected images. Millions of individuals who are neither criminals nor suspects will be included in the database.
  • Many of these individuals will be unaware that their images and other biometric identifiers are being captured. Biometric records collected by various civil service agencies could be added to the system. The NGI system could be integrated with other surveillance technology, such as Trapwire, that would enable real-time image-matching of live feeds from CCTV surveillance cameras. [2] The Department of Homeland Security has expended hundreds of millions of dollars to establish state and local surveillance systems, including CCTV cameras that record the routine activities of millions of individuals. [3] There are an estimated 30 million surveillance cameras in the United States. If NGI system was integrated with CCTV cameras operated by public agencies and private entities, NGI could use facial recognition on images of crowds to identify individuals in public settings, whether or not the police have made the necessary legal showing to compel the disclosure of identification documents. The NGI database will be used for both law enforcement and non-law enforcement purposes. It will be available to law enforcement agencies at the local, state, and federal level. But it will also be available to private entities, unrelated to a law enforcement agency. EPIC’s “Spotlight on Surveillance” project takes a deeper look at this massive surveillance initiative.
Paul Merrell

Obama Issues Threats To Russia And NATO -- Paul Craig Roberts - PaulCraigRoberts.org - 0 views

  • The Obama regime has issued simultaneous threats to the enemy it is making out of Russia and to its European NATO allies on which Washington is relying to support sanctions on Russia. This cannot end well. As even Americans living in a controlled media environment are aware, Europeans, South Americans, and Chinese are infuriated that the National Stasi Agency is spying on their communications. NSA’s affront to legality, the US Constitution, and international diplomatic norms is unprecedented. Yet, the spying continues, while Congress sits sucking its thumb and betraying its oath to defend the Constitution of the United States. In Washington mumbo-jumbo from the executive branch about “national security” suffices to negate statutory law and Constitutional requirements. Western Europe, seeing that the White House, Congress and the Federal Courts are impotent and unable to rein-in the Stasi Police State, has decided to create a European communication system that excludes US companies in order to protect the privacy of European citizens and government communications from the Washington Stasi.
  • The Obama regime, desperate that no individual and no country escape its spy net, denounced Western Europe’s intention to protect the privacy of its communications as “a violation of trade laws.” Obama’s US Trade Representative, who has been negotiating secret “trade agreements” in Europe and Asia that give US corporations immunity to the laws of all countries that sign the agreements, has threatened WTO penalties if Europe’s communications network excludes the US companies that serve as spies for NSA. Washington in all its arrogance has told its most necessary allies that if you don’t let us spy on you, we will use WTO to penalize you. So there you have it. The rest of the world now has the best possible reason to exit the WTO and to avoid the Trans-Pacific and Trans-Atlantic “trade agreements.” The agreements are not about trade. The purpose of these “trade agreements” is to establish the hegemony of Washington and US corporations over other countries. In an arrogant demonstration of Washington’s power over Europe, the US Trade Representative warned Washington’s NATO allies: “US Trade Representative will be carefully monitoring the development of any such proposals” to create a separate European communication network. http://rt.com/news/us-europe-nsa-snowden-549/ Washington is relying on the Chancellor of Germany, the President of France, and the Prime Minister of the UK to place service to Washington above their countries’ communications privacy.
  • It has dawned on the Russian government that being a part of the American dollar system means that Russia is open to being looted by Western banks and corporations or by individuals financed by them, that the ruble is vulnerable to being driven down by speculators in the foreign exchange market and by capital outflows, and that dependence on the American international payments system exposes Russia to arbitrary sanctions imposed by the “exceptional and indispensable country.” Why it took the Russian government so long to realize that the dollar payments system puts countries under Washington’s thumb is puzzling.
  • ...2 more annotations...
  • Now that the Russian government understands that Russia must depart the dollar system in order to protect Russian sovereignty, President Putin has entered into barter/ruble oil deals with China and Iran. However, Washington objects to Russia abandoning the dollar international payment system. Zero Hedge, a more reliable news source than the US print and TV media, reports that Washington has conveyed to both Russia and Iran that a non-dollar oil deal would trigger US sanctions. http://www.zerohedge.com/news/2014-04-04/us-threatens-russia-sanctions-over-petrodollar-busting-deal Washington’s objection to the Russian/Iranian deal made it clear to all governments that Washington uses the dollar-based international payments system as a means of control. Why should countries accept an international payments system that infringes their sovereignty? What would happen if instead of passively accepting the dollar as the means of international payment, countries simply left the dollar system? The value of the dollar would fall and so would Washington’s power. Without the power that the dollar’s role as world reserve currency gives the US to pay its bills by printing money, the US could not maintain its aggressive military posture or its payoffs to foreign governments to do its bidding. Washington would be just another failed empire, whose population can barely make ends meet, while the One Percent who comprise the mega-rich compete with 200-foot yachts and $750,000 fountain pins. The aristocracy and the serfs. That is what America has already become. A throwback to the feudal era. It is only a matter of time before it is universally recognized that the US is a failed state. Let’s pray this recognition occurs before the arrogant inhabitants of Washington blow up the world in pursuit of hegemony over others.
  • Washington’s provocative military moves against Russia are reckless and dangerous. The buildup of NATO air, ground, and naval forces on Russia’s borders in violation of the 1997 NATO-Russian treaty and the Montreux Convention naturally strike the Russian government as suspicious, especially as the buildups are justified on the basis of lies that Russia is about to invade Poland, the Baltic States, and Moldova in addition to Ukraine. These lies are transparent. The Russian Foreign Minister Sergey Lavrov has asked NATO for an explanation, stating: “We are not only expecting answers, but answers that will be based fully on respect for the rules we agreed on.” http://rt.com/news/lavrov-ukraine-nato-convention-069/ Anders Fogh Rasmussen, Washington’s puppet installed as NATO figurehead who is no more in charge of NATO than I am, responded in a way guaranteed to raise Russian anxieties. Rasmussen dismissed the Russian Foreign Minister’s request for explanation as “propaganda and disinformation.” Clearly, what we are experiencing are rising tensions caused by Washington and NATO. These tensions are in addition to the tensions arising from Washington’s coup in Ukraine. These reckless and dangerous actions have destroyed the Russian government’s trust in the West and are moving the world toward war. Little did the protesters in Kiev, called into the streets by Washington’s NGOs, realize that their foolishness was setting the world on a path to armageddon.
Paul Merrell

Pro-Russian activists in Kharkov awaiting reinforcements from Donetsk, Lugansk - News - Politics - The Voice of Russia: News, Breaking news, Politics, Economics, Business, Russia, International current events, Expert opinion, podcasts, Video - 0 views

  • Pro-Russian activists who have occupied the building of the Kharkov regional administration are awaiting reinforcements from Donetsk and Lugansk. Pro-Russian protesters entered the building of the Kharkov regional administration on Sunday. It took them ten minutes to get inside. People on the street greeted with cheers and whistle the appearance of a man carrying the Russian flag in a second-floor window. They shouted, "Bravo" and "Police and People Together". Earlier reports said the storm of the Kharkov regional administration began on Sunday night.Read more: http://voiceofrussia.com/news/2014_04_07/Pro-Russian-activists-in-Kharkov-awaiting-reinforcements-from-Donetsk-Lugansk-8201/
Paul Merrell

Donetsk activists proclaim region's independence from Ukraine - RT News - 0 views

  • In the eastern Ukrainian city of Donetsk, a group of activists have declared their region independent from Kiev. This comes after protesters stormed a local government building last night. Mass demonstrations against the country's new leadership started peacefully on Sunday, but the situation quickly escalated. Pro-Russian protesters in Donetsk have seized the local power building, including the headquarters of the Security Service of Ukraine and proclaimed the creation of a People’s Republic of Donetsk. Ukraine’s police and security services have not interfered, although officials in Kiev are threatening punishment for the rioters.
  • Today at 12:20 local time, a session of the people's Council of Donbass (Donetsk region) took place in the main hall of the Regional Council and unanimously voted on a declaration to form a new independent state: the People’s Republic of Donetsk. The Council proclaimed itself the only legitimate body in the region until the regions in southeast Ukraine conduct a general referendum, set to take place no later than May 11. “The Donetsk Republic is to be created within the administrative borders of the Donetsk region. This decision will come into effect after the referendum,” the statement said. The Council in Donetsk issued an address to Russian President Vladimir Putin, asking for deployment of a temporary peacekeeping force to the region.
  • Ukraine’s Ministry of Interior said that last night unknown persons stormed the Security Service of Ukraine building in the city of Lugansk and seized a weapons warehouse there. During the night’s clashes, nine people were reportedly injured.
  • ...3 more annotations...
  • In the city of Kharkov protesters erected barricades around the buildings of the city and the regional administrations and the regional headquarters of Security Service of Ukraine.
  • A demonstration against political repression in Ukraine has also being held in the southern regional center of Odessa.
  • Ukraine’s interim Foreign Minister Andrey Deschitsa announced on Monday that if the situation in the eastern regions escalates, the coup-appointed government in Kiev will take “much harsher” measures than those on the reunion of the Crimea with Russia.
Paul Merrell

Investigation Finds Former Ukraine President Not Responsible For Sniper Attack on Protestors - 0 views

  • A German TV investigation disproves the West's claim that Yanukovych was responsible for killing of dozens of Ukrainian protestors, making this President Obama's WMD moment.
  • Now joining us is Michael Hudson. He is a distinguished research professor of economics at the University of Missouri-Kansas City. His two newest books are The Bubble and Beyond and Finance Capitalism and Its Discontents.
  • The big news is all about the Ukraine. And it's about the events that happened in the shootings on February 20. Late last week, the German television program ARD Monitor, which is sort of their version of 60 Minutes here, had an investigative report of the shootings in Maidan, and what they found out is that contrary to what President Obama is saying, contrary to what the U.S. authorities are saying, that the shooting was done by the U.S.-backed Svoboda Party and the protesters themselves, the snipers and the bullets all came from the Hotel Ukrayina, which was the center of where the protests were going, and the snipers on the hotel were shooting not only at the demonstrators, but also were shooting at their own--at the police and the demonstrators to try to create chaos. They've spoken to the doctors, who said that all of the bullets and all of the wounded people came from the same set of guns. They've talked to reporters who were embedded with the demonstrators, the anti-Russian forces, and they all say yes. All the witnesses are in agreement: the shots came from the Hotel Ukrayina. The hotel was completely under the control of the protesters, and it was the government that did it.
  • ...2 more annotations...
  • So what happened was that after the coup d'état, what they call the new provisional government put a member of the Svoboda Party, the right-wing terrorist party, in charge of the investigation. And the relatives of the victims who were shot are saying that the government is refusing to show them the autopsies, they're refusing to share the information with their doctors, they're cold-shouldering them, and that what is happening is a coverup. It's very much like the film Z about the Greek colonels trying to blame the murder of the leader on the protesters, rather than on themselves. Now, the real question that the German data has is: why, if all of this is front-page news in Germany, front-page news in Russia--the Russian TV have been showing their footage, showing the sniping--why would President Obama directly lie to the American people? This is the equivalent of Bush's weapons of mass destruction. Why would Obama say the Russians are doing the shooting in the Ukraine that's justified all of this anti-Russian furor? And why wouldn't he say the people that we have been backing with $5 billion for the last five or ten years, our own people, are doing the shooting, we are telling them to doing the shooting, we are behind them, and we're the ones who are the separatists?
  • And the president has just--Obama, has just sent naval vessels with atomic weapons into the Black Sea, threatening Putin to wipe out Russia in 20 minutes. He's threatening World War III. Europeans are scared stiff about this because they know that they'll be the first recipients of a Russian retaliation.
Paul Merrell

No U.S. Action, So States Move on Privacy Law - NYTimes.com - 0 views

  • State legislatures around the country, facing growing public concern about the collection and trade of personal data, have rushed to propose a series of privacy laws, from limiting how schools can collect student data to deciding whether the police need a warrant to track cellphone locations.
  • Over two dozen privacy laws have passed this year in more than 10 states, in places as different as Oklahoma and California. Many lawmakers say that news reports of widespread surveillance by the National Security Agency have led to more support for the bills among constituents. And in some cases, the state lawmakers say, they have felt compelled to act because of the stalemate in Washington on legislation to strengthen privacy laws. “Congress is obviously not interested in updating those things or protecting privacy,” said Jonathan Stickland, a Republican state representative in Texas. “If they’re not going to do it, states have to do it.”
Paul Merrell

How Government and the Media Equate Political Dissent with "Conspiracy Theories" and "Home Grown Terrorism" | Global Research - 0 views

  • In this age of propaganda and disinformation when mainstream media outlets act as presstitutes for the corporatized federal government, there has been an overt movement in recent years to label dissenters, patriots, government critics and even returning US soldiers from the warfronts as potential homegrown terrorists. For decades the government and co-opted mainstream media’s onetime favorite tactic heavy-handedly used to customarily dismiss their critics was to simply label those exposing government deception as “conspiracy theorists.” However, with distrust mounting amongst Americans toward both their leaders (86% distrust government) and the media (over 60% little or no trust toward media), this strategy is no longer working because so many conspiracies have been proven to be real. With a fascist state worried that its authority is fast slipping away amongst its populace, today the stakes have never been higher. Slander, character assassination and guilt by association are increasingly utilized nowadays as favorite tools to systematically destroy, discredit and demonize those citizens courageous enough to speak the truth exposing government lies, deception, theft and destruction.
  • Raising the stakes from the relative benign label “conspiracy theorist” to “homegrown terrorist” reflects a parallel process the US government has historically employed in manufacturing convenient enemies as needed – Russia and China’s expanding Communism from the 1950’s cold war through the 1980’s, to al Qaeda’s expanding terrorism in the twenty-first century and now back to Russia and China’s expanding imperialism all over again. The vicious cycle locked by design in a forever do-loop as the same subversive strategy remains unchanged throughout the years, only the names and dates change as the government self-servingly sees fit. As long as there are enemy targets to conveniently blame designed to induce fear and elicit support from a dumbed down, brainwashed and powerless American public, war and the military security complex will continue to flourish on a perpetual permanency basis, of course at the expense of humanity both domestically and globally.
Paul Merrell

New federal database will track Americans' credit scores, financial history | Police State USA - 0 views

  • The Federal Housing Finance Agency (FHFA) has given notice of its intent to database a large number of very personal data points on every American who possesses a mortgage — which may include as many as 227 million Americans.   These points include things like financial histories, credit card balances, credit scores, personal demographics, lists of assets and property, family information, and more. Assembled with the help of the the Consumer Finance Protection Bureau, the database’s stated purpose is for research and modeling.  The agencies have been collecting data for modeling for years, but the addition of many new pieces of personally identifiable information is a reversal of previously stated policy.
  • The database will include very specific and personal information on the borrowers and co-borrowers.  According to the Federal Register Notice on April 16, 2014, the database includes: Individual’s name, address, and phone number; Individual’s Social Security Number; Individual’s gender, race, ethnicity, and religion; Individual’s marital status; Individual’s household composition (number and ages of males, females, children); Individual’s household income; Individual’s credit score; Individual’s education records; Individual’s military status/records; Individual’s employment status/records; Individual’s bank account numbers; List of individual’s “financial events in the last few years”; List of individual’s “life events in the last few years”;
  • List of individual’s other assets/wealth; Individual’s current mortgage balance; Individual’s current monthly mortgage payment; Individual’s payment delinquency records; Individual’s bankruptcy records; Individual’s credit card numbers; Individual’s credit card balances; Individual’s credit card charge limit and the highest balance charged; Individual’s minimum payments due on all loans; Attributes of the property (square footage, number of rooms, lot size…); Sale price and down payment of the property; Mortgage information (dates, interest rate, amount, loan servicer…);
  • ...1 more annotation...
  • As one could imagine, a trove of information like this would be an identity thief’s paradise.  As Rep. Randy Neugebauer said to the Washington Examiner, “If someone were to breach that system, they could very easily steal somebody’s identity.” Like so many parts of the federal government, the National Mortgage Database was never authorized by Congress and was certainly not authorized by the constitution.
  •  
    More government Big Data madness.
Paul Merrell

Iraqi officers fired after fleeing militants - 0 views

  • Iraq's premier has fired several top security commanders in a major shake-up as fighting approached Baghdad in a militant onslaught that the UN warned risked breaking up the country.
  • More than a week after insurgents launched their lightning assault, Prime Minister Nouri al-Maliki dismissed several senior officers, including the commander for the northern province of Nineveh, the first to fall.Maliki also ordered that one of them face court-martial for desertion.The dismissals came after soldiers and police fled en masse as insurgents swept into Nineveh's capital Mosul, a city of two million, abandoning their vehicles and uniforms.As officials trumpet a counter-offensive, doubts are growing that Iraq's security forces can hold back the tide.
  • The violence has stoked regional tensions, with Iraq accusing neighbouring Saudi Arabia Tuesday of 'siding with terrorism' and of being responsible for financing the militants.The comments came a day after the Sunni kingdom blamed 'sectarian' policies by Iraq's Shi'ite-led government for triggering the unrest.The prime minister of Iraq's autonomous Kurdish region told the BBC it would be 'almost impossible' for the country to return to how it was before the offensive, and called for Sunni Arabs to be granted an autonomous region of their own.Senior Sunni and Shi'ite political leaders, including Maliki and his rival parliament speaker Osama al-Nujaifi, jointly issued a televised statement pledging continuous dialogue and promising to preserve the country's unity.Alarmed by the collapse of much of the security forces in the face of the militant advance, foreign governments have begun pulling out diplomatic staff.
Paul Merrell

Exclusive: How FBI Informant Sabu Helped Anonymous Hack Brazil | Motherboard - 0 views

  • In early 2012, members of the hacking collective Anonymous carried out a series of cyber attacks on government and corporate websites in Brazil. They did so under the direction of a hacker who, unbeknownst to them, was wearing another hat: helping the Federal Bureau of Investigation carry out one of its biggest cybercrime investigations to date. A year after leaked files exposed the National Security Agency's efforts to spy on citizens and companies in Brazil, previously unpublished chat logs obtained by Motherboard reveal that while under the FBI's supervision, Hector Xavier Monsegur, widely known by his online persona, "Sabu," facilitated attacks that affected Brazilian websites. The operation raises questions about how the FBI uses global internet vulnerabilities during cybercrime investigations, how it works with informants, and how it shares information with other police and intelligence agencies. 
  • After his arrest in mid-2011, Monsegur continued to organize cyber attacks while working for the FBI. According to documents and interviews, Monsegur passed targets and exploits to hackers to disrupt government and corporate servers in Brazil and several other countries. Details about his work as a federal informant have been kept mostly secret, aired only in closed-door hearings and in redacted documents that include chat logs between Monsegur and other hackers. The chat logs remain under seal due to a protective order upheld in court, but in April, they and other court documents were obtained by journalists at Motherboard and the Daily Dot. 
Paul Merrell

How NSA Can Secretly Aid Criminal Cases | Consortiumnews - 0 views

  • Though the NSA says its mass surveillance of Americans targets only “terrorists,” the spying may turn up evidence of other illegal acts that can get passed on to law enforcement which hides the secret source through a ruse called “parallel construction,” writes ex-CIA analyst Ray McGovern. By Ray McGovern Rarely do you get a chance to ask a just-retired FBI director whether he had “any legal qualms” about what, in football, is called “illegal procedure,” but at the Justice Department is called “parallel construction.” Government wordsmiths have given us this pleasant euphemism to describe the use of the National Security Agency’s illegal eavesdropping on Americans as an investigative tool to pass on tips to law enforcement agencies which then hide the source of the original suspicion and “construct” a case using “parallel” evidence to prosecute the likes of you and me.
  • For those interested in “quaint” things like the protections that used to be afforded us by the Fourth and Fifth Amendments to the Constitution, information about this “parallel construction” has been in the public domain, including the “mainstream media,” for at least a year or so. So, I welcomed the chance to expose this artful practice to still more people with cameras rolling at a large conference on “Ethos & Profession of Intelligence” at Georgetown University on Wednesday, during the Q & A after former FBI Director Robert Mueller spoke. Mueller ducked my question regarding whether he had any “legal qualms” about this “parallel construction” arrangement. He launched into a discursive reply in which he described the various ”authorities” enjoyed by the FBI (and the CIA), which left the clear impression not only that he was without qualms but that he considered the practice of concealing the provenance of illegally acquired tip-off information somehow within those professed “authorities.”
  • Bottom line? Beware, those of you who think you have “nothing to hide” when the NSA scoops up your personal information. You may think that the targets of these searches are just potential “terrorists.” But the FBI, Internal Revenue Service, Drug Enforcement Administration and countless other law enforcement bodies are dipping their cursors into the huge pool of mass surveillance.
  • ...8 more annotations...
  • Former FBI Division Counsel in Minneapolis Coleen Rowley – who, with Jesselyn Radack, Tom Drake and me, visited Snowden in Russia last October – told me of two legal doctrines established many decades ago: the “exclusionary rule” and the rule regarding the “fruit of the poisonous tree.” These were designed to force over-zealous law enforcement officers to adhere to the Constitution by having judges throw out cases derived from improperly obtained evidence. To evade this rule, law enforcement officials who have been on the receiving end of NSA’s wiretap data must conceal what tipped off an investigation.
  • Last week a journalist asked me why I thought Congress’ initial outrage – seemingly genuine in some quarters – over bulk collection of citizens’ metadata had pretty much dissipated in just a few months. What started out as a strong bill upholding Fourth Amendment principles ended up much weakened with only a few significant restraints remaining against NSA’s flaunting of the Constitution? Let me be politically incorrect and mention the possibility of blackmail or at least the fear among some politicians that the NSA has collected information on their personal activities that could be transformed into a devastating scandal if leaked at the right moment. Do not blanch before the likelihood that the NSA has the book on each and every member of Congress, including extramarital affairs and political deal-making. We know that NSA has collected such information on foreign diplomats, including at the United Nations in New York, to influence votes on the Iraq War and other issues important to U.S. “national security.”
  • We also know how the late FBI Director J. Edgar Hoover used much more rudimentary technology a half century ago to develop dossiers on the personal indiscretions of political and ideological opponents. It makes sense that people with access to the NSA’s modern surveillance tools would be sorely tempted to put these new toys to use in support of their own priorities.
  • We cannot escape some pretty dismal conclusions here. Not only have the Executive and Legislative branches been corrupted by establishing, funding, hiding and promoting unconstitutional surveillance programs for over 12 years, but the Judicial branch has been corrupted, too. The discovery process in criminal cases is now stacked in favor of the government through its devious means for hiding unconstitutional surveillance and using it in ways beyond the narrow declared purpose of thwarting terrorism. Moreover, federal courts at the district, appeals and Supreme Court levels have allowed the government to evade legal accountability by insisting that plaintiffs must be able to prove what often is not provable, that they were surveilled through highly secretive NSA means. And, if the plaintiffs make too much progress, the government can always get a lawsuit thrown out by invoking “state secrets.” The Separation of Powers designed by the Constitution’s Framers to prevent excessive accumulation of power by one of the branches has stopped functioning amid the modern concept of “permanent war” and the unwillingness of all but a few hearty souls to challenge the invocation of “national security.” Plus, the corporate-owned U.S. media, with very few exceptions, is fully complicit.
  • The concept of a “United Stasi of America,” coined by Pentagon Papers whistleblower Daniel Ellsberg a year ago, has been given real meaning by the unconstitutional behavior and dereliction of duty on the part of both the George W. Bush and Obama administrations. Just days after the first published disclosure from Snowden, Ellsberg underscored that the NSA, FBI and CIA now have surveillance capabilities that East Germany’s Stasi secret police could scarcely have imagined.
  • Last June, Mathew Schofield of McClatchy conducted an interesting interview of Wolfgang Schmidt, a former lieutenant colonel in the Stasi, in Berlin. With the Snowden revelations beginning to tumble out into the media, Schofield described Schmidt as he pondered the sheer magnitude of domestic spying in the United States.
  • “So much information, on so many people,” says Schmidt who, at that point, volunteers a stern warning for Schofield and the rest of us: “It is the height of naiveté to think that, once collected, this information won’t be used. This is the nature of secret government organizations. The only way to protect the people’s privacy is not to allow the government to collect their information in the first place.”
  • Take note, those of you who may still feel fearless, those of you with “nothing to hide.”
Paul Merrell

Hard choices: Hillary Clinton admits role in Honduran coup aftermath | Al Jazeera America - 0 views

  • The chapter on Latin America, particularly the section on Honduras, a major source of the child migrants currently pouring into the United States, has gone largely unnoticed. In letters to Clinton and her successor, John Kerry, more than 100 members of Congress have repeatedly warned about the deteriorating security situation in Honduras, especially since the 2009 military coup that ousted the country’s democratically elected President Manuel Zelaya. As Honduran scholar Dana Frank points out in Foreign Affairs, the U.S.-backed post-coup government “rewarded coup loyalists with top ministries,” opening the door for further “violence and anarchy.”
  • Despite this, however, both under Clinton and Kerry, the State Department’s response to the violence and military and police impunity has largely been silence, along with continued U.S. aid to Honduran security forces. In “Hard Choices,” Clinton describes her role in the aftermath of the coup that brought about this dire situation. Her firsthand account is significant both for the confession of an important truth and for a crucial false testimony. First, the confession: Clinton admits that she used the power of her office to make sure that Zelaya would not return to office. “In the subsequent days [after the coup] I spoke with my counterparts around the hemisphere, including Secretary [Patricia] Espinosa in Mexico,” Clinton writes. “We strategized on a plan to restore order in Honduras and ensure that free and fair elections could be held quickly and legitimately, which would render the question of Zelaya moot.” This may not come as a surprise to those who followed the post-coup drama closely. (See my commentary from 2009 on Washington’s role in helping the coup succeed here, here and here.) But the official storyline, which was dutifully accepted by most in the media, was that the Obama administration actually opposed the coup and wanted Zelaya to return to office.
  • The question of Zelaya was anything but moot. Latin American leaders, the United Nations General Assembly and other international bodies vehemently demanded his immediate return to office. Clinton’s defiant and anti-democratic stance spurred a downward slide in U.S. relations with several Latin American countries, which has continued. It eroded the warm welcome and benefit of the doubt that even the leftist governments in region offered to the newly installed Obama administration a few months earlier. Clinton’s false testimony is even more revealing. She reports that Zelaya was arrested amid “fears that he was preparing to circumvent the constitution and extend his term in office.” This is simply not true. As Clinton must know, when Zelaya was kidnapped by the military and flown out of the country in his pajamas on June 28, 2009, he was trying to put a consultative, nonbinding poll on the ballot to ask voters whether they wanted to have a real referendum on reforming the constitution during the scheduled election in November. It is important to note that Zelaya was not eligible to run in that election. Even if he had gotten everything he wanted, it was impossible for Zelaya to extend his term in office. But this did not stop the extreme right in Honduras and the United States from using false charges of tampering with the constitution to justify the coup.
  • ...1 more annotation...
  • In addition to her bold confession and Clinton’s embrace of the far-right narrative in the Honduran episode, the Latin America chapter is considerably to the right of even her own record on the region as secretary of state. This appears to be a political calculation. There is little risk of losing votes for admitting her role in making most of the hemisphere’s governments disgusted with the United States. On the other side of the equation, there are influential interest groups and significant campaign money to be raised from the right-wing Latin American lobby, including Floridian Cuban-Americans and their political fundraisers.
Paul Merrell

Ray McGovern Triumphs over State Department | The Dissenter - 0 views

  • If you don’t know Ray McGovern yet, you probably should. You see, Ray just beat down, in court, Hillary Clinton, the State Department, and a small part of Post-Constitutional America.
  • Ray McGovern was put on the State Department’s Diplomatic Security BOLO list– Be On the Look Out– one of a series of proliferating government watch lists. What McGovern did to end up on Diplomatic Security’s dangerous persons list and how he got off the list are a tale of our era, Post-Constitutional America.
  • Ray’s offense was to turn his back on Hillary Clinton, literally. In 2011, at George Washington University during a public event where Clinton was speaking, McGovern stood up and turned his back to the stage. He did not say a word, or otherwise disrupt anything. University cops grabbed McGovern in a headlock and by his arms and dragged him out of the auditorium by force, their actions directed from the side by a man whose name is redacted from public records. Photos of the then-71 year old McGovern taken at the time of his arrest show the multiple bruises and contusions he suffered while being arrested. He was secured to a metal chair with two sets of handcuffs. McGovern was at first refused medical care for the bleeding caused by the handcuffs. It is easy to invoke the words thug, bully, goon. The charges of disorderly conduct were dropped, McGovern was released and it was determined that he committed no crime. But because he had spoken back to power, State’s Diplomatic Security printed up an actual wanted poster citing McGovern’s “considerable amount of political activism” and “significant notoriety in the national media.” Diplomatic Security warned agents should USE CAUTION (their emphasis) when stopping McGovern and conducting the required “field interview.” The poster itself was classified as Sensitive but Unclassified (SBU), one of the multitude of pseudo-secret categories created following 9/11.
  • ...3 more annotations...
  • Subjects of BOLO alerts are considered potential threats to the Secretary of State. Their whereabouts are typically tracked to see if they will be in proximity of the Secretary. If Diplomatic Security sees one of the subjects nearby, they detain and question them. Other government agencies and local police are always notified. The alert is a standing directive that the subject be stopped and seized in the absence of reasonable suspicion or probable cause that he is committing an offense. Stop him for being him. These directives slash across the Fourth Amendment’s prohibitions against unwarranted search and seizure, as well as the First Amendment’s right to free speech, as the stops typically occur around protests.
  • Ray McGovern is not the kind of guy to be stopped and frisked based on State Department retaliation for exercising his First Amendment rights in Post-Constitution America. He sued, and won. The Partnership for Civil Justice Fund took up the case pro bono on Ray’s behalf, suing the State Department. They first had to file a Freedom of Information Act demand to even get ahold of the internal State Department justifications for the BOLO, learning that despite all charges having been dropped against McGovern and despite having determined that he engaged in no criminal activity, the Department of State went on to open an investigation into McGovern, including his political beliefs, activities, statements and associations. The investigative report noted “McGovern does seem to have the capacity to capture a national audience – it is possible his former career with the CIA has the potential to make him ‘attractive’ to the media.” It also cited McGovern’s “political activism, primarily anti-war.” The investigation ran nearly seven months, and resulted in the BOLO.
  • With the documents that so clearly crossed the First Amendment now in hand, the Partnership for Civil Justice Fund went to court. They sought, and won, an injunction against the State Department to stop the Be On the Look-Out alert against McGovern, and to force State to pro-actively advise other law enforcement agencies that it no longer stands. McGovern’s constitutional rights lawsuit against George Washington University, where his arrest during the Clinton speech took place, and the officers who assaulted and arrested him, is ongoing.
Paul Merrell

And The Benghazi Media Circus Plays On… | Global Research - 0 views

  • A recent article written by this writer for Global Research posted last Saturday – “The Benghazi Scandal Is Obama’s Watergate But Worse” – was written in an effort to seek and uncover the truth. Accurate reporting on major world events is a challenge in today’s world where propaganda and disinformation are mainstream media norms and where virtually all major players in American politics simply lie through their teeth every time they open their mouths in constant effort to look good and cover up the truth. The American public knows this pathetic and sobering fact that deception has come to rule in the world of both politics and the media. People today neither believe their newscasters nor their political leaders. That is why examining the content of the tidal wave of assertions and opinions spewing forth from politicians and pundits in the aftermath of the latest Benghazi revelations must be taken with a grain of salt. Again, truth in today’s world is hard to come by. But as an investigative reporter, presenting a brief overview of recent comments and statements for any informed citizen to process and digest seems a worthwhile and important enterprise.
  • A timeline of recently unfolding events: On 10/12/12 exactly one month after the Benghazi incident, the legal conservative group Judicial Watch filed a Freedom of Information Act request seeking documents related to the Benghazi attack on September 11th, 2012 that killed the US Ambassador to Libya Christopher Stevens and three other Americans. Obama, who had campaigned on a promise of transparency in the criminal wake of the Bush regime, has proven to be anything but open and transparent. Having to sue the US government for access to the records, on April 18th, 2014, a full year and a half later, the Obama administration’s stonewalling ultimately failed and Judicial Watch successfully got hold of 41 State Department Benghazi related documents. Emails between high level White House officials discussing damage control strategies in the immediate aftermath of the Benghazi assault were released last week. Jubilant Republicans are now calling one of those emails their “smoking gun,” believing it is so incriminating that it will do in their would-be opponent Hillary Clinton from potentially competing in the 2016 presidential election.
  • The newly declassified email written by Obama’s then Deputy Strategic Communications Adviser Ben Rhodes specifically directed then UN Ambassador Susan Rice in preparation for her Sunday morning talk show appearances on September 16th, 2012 to explain the administration’s take on what it knew of the Benghazi murders. Rhodes advised Rice to attribute the Benghazi uprising as “rooted in an Internet video, and not a failure of policy,” pushing talking points designed to bolster Obama’s presidential image as a cool-as-a-cucumber-under-fire kind of wise and benevolent leader and statesman. The major emphasis of the email instructed Rice to blame the bogus anti-Moslem video as inciting a spontaneous protest like in other countries in the region that apparently grew violently out of control, of course all the while knowing that that was a boldface lie. This crucial piece of evidence proves that President Obama and Secretary of State Hillary Clinton both knew that the video did not cause the attack but that they chose to willfully deceive the American public in order to protect their own political careers and hence was born the infamously never ending Benghazi cover-up. Obama and Hillary withheld this damning email evidence even from the House Oversight Committee led by Congressman Darrel Issa (R-CA) requesting all documents pertaining to Benghazi more than a year ago. With the presidential election less than two months away at the time of the attack, Obama and Hillary were determined at all cost to keep hidden from Americans the real truth of criminal Benghazi activity they were guilty of engaging in during the months leading up to the attack. Last Thursday an angry Issa subpoenaed current Secretary of State John Kerry to appear before the committee on May 21st to further explain why those critical State Department records recently given to Judicial Watch were not among the 3200 documents originally handed over to his committee well over a year ago.
  • ...9 more annotations...
  • Investigative reporter Kenneth R. Timmerman as author of a new forthcoming book entitled ‘Dark Forces: The Truth About What Happened in Benghazi’ states: We know that orders were issued, then recalled, to deploy a 50-man Special Forces unit from Croatia that could have reached Benghazi within hours.Timmerman concludes that to date no documents revealing the person who ordered that unit to stand down have yet to surface.
  • Within hours of the general’s testimony came rebukes from both the senior Republican and Democrat on the powerful House Armed Services Committee making claims backing the administration’s that the military was incapable of responding in time to assist the ill-fated Americans in Benghazi. Because they represent the military in Congress that had already drawn the conclusion that nothing tactically could have been done to save the four Americans, they were quick to rebut the general’s testimony. Yet the day before 9/11 every year since 9/11/01 including on 9/10/11, the president meets with top military and security personnel to ensure that US embassies around the globe are bolstered with much needed extra security for 9/11 readiness. Yet the Benghazi compound was so insecure despite repeated requests, both Obama and the military apparently failed to have any military units on standby that could reach Benghazi to be of service on the night of 9/11/12. And this comes after intelligence sources have been reporting insufficient security at the Benghazi embassy compound.
  • Another disclosure at last Thursday’s House Oversight Committee hearing further damaging the credibility and actions of the Obama administration came from retired Air Force General Robert Lovell who at the time of Benghazi was in Germany serving as the senior African Command deputy director for intelligence. Lovell testified, “We should have sent help,” adding that the White House decision not to attempt military assistance due to the time factor was unacceptable. Lovell also stated unequivocally that the military knew that the Benghazi attack had nothing to do with the video falsely used by the administration to explain away the tragedy. The ex-general felt his military should have intervened and was waiting all night long for the call that never came from his bosses in Washington. Clearly he feels a sense of remorse and regret over the passivity imposed on him by his commander-in-chief Obama and State Department head Clinton.
  • Meanwhile, last week in a heated exchange with ABC correspondent Jon Karl a visibly agitated White House Press Secretary Jay Carney insisted that Rhodes’ email was not related to Benghazi at all but referred to the Moslem protests generally taking place in the region in response to the video. The next day Fox reporter Ed Henry engaged Carney on the same issue, eliciting the same haranguing reaction. All this appears to be yet more desperate lies in a feeble attempt to cover his bosses’ Obama and Hillary’s asses called criminal guilt, and by so doing committing his own. Carney had been among the original recipients of Rhodes’ email. Carney further explained that the same Rhodes talking points echoed those delivered earlier to Congress and the White House by deputy CIA director Mike Morell who a month ago claimed he received no pressure or influence from anyone in the Obama administration in coming up with his version of what most likely transpired on 9/11/12 based on all CIA intelligence sources available at the time. Yet on his own Morell admitted to toning down the intelligence reports leading up to the Benghazi attack purposely so as to not appear to be an “I told you so” gesture that would offend Hillary and her State Department. That said, Hillary’s underling and rising star Victoria Nuland (the later promoted to profanity-speaking Assistant Secretary of State who played such a key role in the recent US backed fascist Ukrainan coup) objected to Morell’s talking points that in her mind leaned too heavily toward blaming her boss and their State Department for insufficient security at the Benghazi compound. Her words:
  • Why do we want Hill to start fingering Ansar Al Sharia [the known al Qaeda affiliated attackers that murdered the four Americans], when we aren’t doing that ourselves until we have the investigation results…and the penultimate point could be abused by Members to beat the State Department for not paying attention to Agency warnings so why do we want to feed that?… Concerned.Observe how the exclusive focus of all post-Benghazi interdepartmental correspondence from Rhodes’ to Morell’s to Nuland’s all center on appearance and potential perception to avoid CYA blame. Furthest down on their priority list is honest and truthful disclosure and self-accountability. Again, the name of the game in the world of politics is passing the buck whenever possible to minimize potential heat that comes with looking bad and maximizing looking good by any means or lies necessary. Benghazi perfectly illustrates all of this.
  • Based on the information finally coming to light all last week, last Friday House Speaker John Boehner (R-OH) called for a special select committee not unlike the one for Watergate to further investigate Benghazi. Representative Trey Gowdy (SC-R) has already been selected as its lead investigator. This grandstanding ploy seems a bit superfluous and redundant since the House Oversight Committee has ostensibly been trying to get to the bottom of Benghazi for nearly a year and a half, albeit thus far ineffective in its results, no help from the State Department’s prior email omissions. Not only is Benghazi the hot topic buzzing here in America, on that same day last Friday, more bullets was buzzing in Benghazi as well. Nine police security soldiers were gunned down by, you guessed it, the same murderers still remaining at large that were behind the 9/11/12 Benghazi attack – the militant group the US has for years labeled an al Qaeda affiliated terrorist organization Ansar al-Sharia. After massacring 31 peaceful demonstrators protesting outside the militants’ headquarters last June, last week’s massacre is a powerful statement showing that the terrorists are still in charge in Benghazi and immune from any accountability from the US installed puppet government either in Tripoli or Washington. They remain free men at large despite Obama’s promise to hunt them down and bring them to justice.
  • The senior Democratic House Intel Committee Representative Adam Schiff (D-CA) typifies the partisan Obama-Hillary politics games of each side racing to the media to point fingers at each other in their same old, same old blame game. On Sunday Schiff stated he does not want any Democrats to participate in the newly forming select committee that the Republican House Speaker Boehner has just recently called for, already naming its GOP chair. That is simply a game the Dems will refuse to play. Why? Because Republicans cannot make them. Sound familiar? Perhaps your 7-year old child might employ this same game strategy. Insider Dems like former White House advisor turned ABC analyst (and another original recipient of Rhodes’ infamous email) David Plouffe conveniently took to ABC’s Sunday morning On This Week with George Stephanopoulos crying foul even louder with their familiar “conspiracy” chant they customarily use to discredit any criticism leveled at the Obama administration. His cries reaching desperation this week accuse a “very loud, delusional minority” of Republicans of an obsessive politics game over Benghazi. Another all too familiar grade school tactic, whatever misbehavior you are accused of, simply accuse your enemy of the same offense, an old early childhood trick that you never need outgrow in the world of politics.
  • Still another indignant reaction hardcore defenders of Hillary and Obama are now quick to cite are the thirteen embassy attacks that occurred as so called “Benghazi’s on Bush’s watch” when not a peep was ever heard from the press. This straw house strategy is designed to show how Republicans and Fox News are hypocritical in their obsession to find dirt on Benghazi where they deny any exists. Yet this accusation seems to omit one very significant fact. Not one of those embassy attacks during the Bush regime resulted in any murdered Americans, much less four of them and one being a US Ambassador, something that has not happened in the last 32 years before Benghazi. The media circus demonizing partisan politics players on both sides epitomizes why the US government is so utterly broken, horribly dysfunctional, morally bankrupt and totally ineffective in addressing any and all of the most pressing problems facing America and the world today. The blame game is all they know. Yet in all their exaggeration, lies, name calling and finger pointing, not one of them is even addressing the pink elephant in the room.
  • Obama, Hillary and then CIA Director retired General Betrayus Petraeus were/are international gun running criminal outlaws of the worst kind, working with the very same al Qaeda terrorist bunch that murdered those four nearly forgotten Americans. US tax dollars were/are going into the pockets of Ansar al-Sharia and al Qaeda mercenaries that looted Muammar Kaddafi’s gold cache and enormous weapon arsenal that included chemical weapons as well as surface to air missiles. And Obama, Petraeus and 2016 presidential heir apparent Hillary were in deep over their heads under Hillary and Stevens’ State Department cover, shipping them from Benghazi through Turkey to Syria to covertly fight a war by proxy against Assad’s government forces. After more than three bloody years, to this day the US is still bent on destroying another sovereign nation posing absolutely no security threat to America. These are the war crimes constantly being committed by Obama, Petraeus and Hillary and their lies upon lies are unraveling at an accelerated clip with each passing month. Thus, expect to see more desperate acts of aggression from desperate despots who know that their jig is up. Yet desperate despots do not care how many humans they will take down with them. But justice for these longtime perpetrators of multiple crimes against humanity will be served in the end.
Paul Merrell

Donetsk People's Republic asks Moscow to consider its accession into Russia - RT News - 0 views

  • Donetsk People's Republic has proclaimed itself a sovereign state and has asked Moscow to consider its accession into Russia, the Republic’s council said.
  • In Lugansk Region 96.2 percent of voters supported the region’s self-rule, according to the final figures announced by the local election commission. The Kremlin’s press service has issued a statement, saying: “Moscow respects the will of the people in Donetsk and Lugansk and hopes that the practical realization of the outcome of the referendums will be carried out in a civilized manner.” It stressed the necessity of a “dialogue between representatives of Kiev, Donetsk and Lugansk.” At the same time, both the EU and US dismissed the ballots in eastern Ukraine as illegal. In the two weeks prior to the referendum, Kiev intensified the military operation in southeastern Ukraine. May 9 became one of the bloodiest days in the weeks of the operation. It has been confirmed that nine people were killed and another 49 injured during the armed assault of Kiev’s army on Mariupol’s Police HQ. Driven by reports of shooting, residents, then mostly celebrating WWII Victory Day, flocked to the scene. The Kiev fighters opened fire on civilians.
  •  
    Two more regions in the industrial heart of Ukraine vote for independence and request to accede to the Russian Federation. The Kremlin statement seems to be saying in effect, "now we've got more leverage in negotiating with the U.S. for establishment of a Ukraine republic with semi-autonomous regions." Putin has already suggested that Russia would invade the Southeast Ukraine if the Kiev coup government continues its violence in that region. The big question, though, is whether Obama will order NATO to invade the Ukraine to "protect" it from Vladimir Putin. This is more and more developing into a situation of "I hope one side blinks before a NATO/Russian war begins." The U.S. War Party wants NATO bases in the Ukraine to establish a barrier to a growing unified European/Asian market and angling to wean Europe from Asian natural gas (in favor of future U.S. natural gas produced by fracking techniques. Ukraine is a Pipelinestan superhighway for transport of central Asian natural gas to European markets. 
Paul Merrell

DOJ Seeks Removal Of Restrictions On Computer Search Warrants - 0 views

  • The Justice Department recently submitted proposed new rules on the procedures and practices of the department’s agencies and bureaus. Among the suggested changes is a modification of the Federal Rules of Criminal Procedure Rule 41(b), which empowers a federal court to issue a warrant allowing the federal government to conduct a search of a computer or computer network involved in a criminal investigation. Under current regulations, a warrant issued by a federal court is only valid in that court’s district. As there are 94 federal judicial districts, investigating a widespread attack may require either petitioning dozens of district courts or acting extrajudicially by not seeking a warrant. An extrajudicial investigation, however, cannot be used if criminal convictions are sought, as evidence gathered in this manner is not typically admissible in court. The Justice Department is seeking to make remote access warrants to search, seize and copy electronic information valid for all federal districts.
  • The Justice Department argues that due to the sophistication of cyber-criminals, an offending computer or computer cluster can sit in a district separate from the district where the hackers that infected the target computer anonymously are and separate from the investigators’ district. “Criminals are using multiple computers in many districts simultaneously as part of complex criminal schemes, and effectively investigating and disrupting these schemes often requires remote access to Internet-connected computers in many different districts,” wrote then-acting Assistant Attorney General Mythili Raman in a September letter to the Advisory Committee on the Criminal Rules. “Botnets are a significant threat to the public: they are used to conduct large-scale denial of service attacks, steal personal and financial data, and distribute malware designed to invade the privacy of users of the host computers,” Raman continued. In the letter, Raman cited an investigation of a child porn site that uses The Onion Router Network, or Tor, to anonymize its traffic. The Justice Department argues that it knows the site’s hosting server location, but without a warrant local to the server, the department is prevented from retrieving the server’s user records — including IP and MAC addresses. In most cases, however, law enforcement do not know the physical location of the site’s server, making it impossible to request a specific warrant.
  • In these cases, the Justice Department could request a blanket warrant. This would allow the department to set up a “zero-day” attack on the server — an attack exploiting a manufacturer-unknown or -permitted security flaw, allowing access to the system’s operating software. However, a Texas judge denied the FBI access to such a warrant, saying the Justice Department’s use of “zero-day” attacks in its investigation exposes the public and the target to unknown risks. One typical type of a “zero-day” attack is an infected email that could affect a large number of innocent people if the target used a public computer to access his email. The FBI planned to install a Remote Administration Tool, or RAT, which would distribute such emails in a partially-targeted spam mail distribution. Last year, Federal Magistrate Judge Stephen Smith of the Houston Division of the Southern District of Texas ruled that this was a gross overreach of investigatory intrusion, blocking the plan temporarily. A “zero-day” attack has the potential to activate and control the targeted computer’s peripherals, such as webcams and microphones.
  • ...2 more annotations...
  • Following this ruling, based on the assumptions that federal law enforcement fundamentally act in good faith and that there may be a legitimate need for remote exploitation of computer data, the Justice Department sought to introduce changes to the rules that would overcome Smith’s objections. The proposed change to Rule 41(b) would allow magistrate judges “… to issue a warrant to use remote access to search electronic storage media and to seize electronically stored information located within or outside that district.” The Justice Department has indicated that it wants warrants permitting multiple computers to be searched at the same time, as well as permission to search all of the email and social media accounts accessible from a single computer. Such access would constitute a violation of the Electronic Communications Privacy Act, as the government, under the act, must make demonstrate probable cause to each targeted service provider and obtain and serve a warrant for each service provider. A warrant to search every account active on a computer would be actively bypassing the act’s numerous safeguards.
  • Privacy advocates fear that this rule change would allow prosecutors and the Justice Department to seek out magistrates likely to give them their requested warrants, creating a situation in which the federal government could have a “warrant shop” with just one judge for the whole of the nation. In light of allegations of federal government over-policing — including revelations of aggressive domestic and international electronic spying by the FBI and the National Security Agency — many advocates argue that an examination of the federal government’s commitment to the Fourth Amendment is needed. “The proposed amendment would significantly expand the government’s authority to conduct remote searches of electronic storage media,” the American Civil Liberties Union wrote in a memorandum early last month. “It would also expand the government’s power to engage in computer hacking in the course of criminal investigations, including through the use of malware and other techniques that pose a risk to internet security and that raise Fourth Amendment and policy concerns. “In light of these concerns, the ACLU recommends that the Advisory Committee exercise extreme caution before granting the government new authority to remotely search individuals’ electronic data.” The rules are scheduled to be discussed at the meeting of the Judiciary’s Committee on Rules of Practice and Procedure later this month.
  •  
    The proposed rule change is at pp. 499-501 here. http://www.uscourts.gov/uscourts/RulesAndPolicies/rules/Agenda%20Books/Standing/ST2014-05.pdf#page499 (very large PDF).  This is not just about the government being granted permission to exploit vulnerabilities unknown to the computer owner; the issue arose in a case where the government sought judicial permission to implant a Trojan Horse in a suspect's computer. Moreover, the proposed rule goes far beyond the confines of that case, purporting to authorize the government to skip merrily along searching computers not specified in the warrant, along the purported botnet. To put the icing on the cake, the government wants to be relieved from the requirement that they apply for a warrant in the district in which the computer to be searched is located. ("Oh, Goody! Let's start shopping around for the judges we like instead of the ones we are now required to persuade. What? The Mississippi judge refused to sign the warrant? Oh well, let's try it with that other judge we like, the one in Gnome, Alaska.") In other words, what the government seeks is authority for "general warrants," the very evil that the 4th Amendment was designed to outlaw. Even more outrageously, the proposed rule provides in part: "For a warrant to use remote access to search electronic storage media and seize or copy electronically stored information, the officer must make reasonable efforts to serve a copy of the warrant on the person whose property *was* searched or whose information *was* seized or copied. Service may be accomplished by any means, including electronic means, reasonably calculated to reach that person." Not the use of the past tense "was." So after they have drained your computer of all its data, they may permissibly install a batch file that will display a copy of the warrant on your monitor the next time you boot your computer. With a big red lipstick imprint of a kiss imprinted in the warrant's bottom margin, no doubt
  •  
    The proposed rule change is at pp. 499-501 here. http://www.uscourts.gov/uscourts/RulesAndPolicies/rules/Agenda%20Books/Standing/ST2014-05.pdf#page499 (very large PDF).  This is not just about the government being granted permission to exploit vulnerabilities unknown to the computer owner; the issue arose in a case where the government sought judicial permission to implant a Trojan Horse in a suspect's computer. Moreover, the proposed rule goes far beyond the confines of that case, purporting to authorize the government to skip merrily along searching computers not specified in the warrant, along the purported botnet. To put the icing on the cake, the government wants to be relieved from the requirement that they apply for a warrant in the district in which the computer to be searched is located. In other words, what the government seeks is authority for "general warrants," the very evil that the 4th Amendment was designed to outlaw. Even more outrageously, the proposed rule provides in part: "For a warrant to use remote access to search electronic storage media and seize or copy electronically stored information, the officer must make reasonable efforts to serve a copy of the warrant on the person whose property *was* searched or whose information *was* seized or copied. Service may be accomplished by any means, including electronic means, reasonably calculated to reach that person." Not the use of the past tense "was." So after they have drained your computer of all its data, they may permissibly install a batch file that will display a copy of the warrant on your monitor the next time you boot your computer. With a big red lipstick imprint of a kiss imprinted at the bottom.  To be continued after this is intially posted to Diigo so the content isn't cut off.   
« First ‹ Previous 301 - 320 of 440 Next › Last »
Showing 20 items per page