Skip to main content

Home/ Socialism and the End of the American Dream/ Group items matching "Experts" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Paul Merrell

New Cyber-Spying Discovery Points to NSA and the "Five Eyes" - WhoWhatWhy - 0 views

  • here’s yet another tantalizing clue that the National Security Agency and its “Five Eyes” allies are behind a poweful cyber-espionage tool called Regin, used to spy on friend and enemy alike. That’s the conclusion Russian cybersecurity firm Kaspersky drew after examining the source code of Regin and an innocuously-named spying tool called QWERTY. It’s an appropriate monicker. The malware, known as a keylogger,  vacuums up anything typed on a computer keyboard and sends it back to the programmer controlling it. The crucial clue Kaspersky found is that QWERTY “can only operate as part of the Regin platform.” After tracking Regin across 14 countries for years, Kaspersky and technology firm Symantec identified it in November 2014.  At the time, Symantec said Regin’s “capabilities and the level of resources behind [it] indicate that it is one of the main cyberespionage tools used by a nation state.” 
  • Though neither company said it, suspicion immediately arose that the NSA and its allies had created Regin. It immediately drew comparisons with Stuxnet, the joint U.S.-Israeli computer worm used to damage Iranian nuclear centrifuges in Natanz in 2009. Unlike Stuxnet’s narrow mission of sabotage, Regin is designed for spying in a wide set of environments. It hides in plain sight, disguised as ordinary Microsoft software.
  • The new evidence further points to the Five Eyes. The German news magazine Der Spiegel has a trove of documents from NSA whistleblower Edward Snowden, which included the source code. Der Spiegel gave Kaspersky the code to examine: The new analysis provides clear proof that Regin is in fact the cyber-attack platform belonging to the Five Eyes alliance, which includes the U.S., Britain, Canada, Australia and New Zealand. Neither Kaspersky nor Symantec commented directly on the likely creator of Regin. But there can be little room left for doubt regarding the malware’s origin. Der Spiegel pointed to five elements they believe suggest Five Eyes authorship: the presence of QWERTY in Snowden’s files, its use in the Belgacom hack by Britain’s GCHQ, references to the sport of cricket in the code, structural similarities to tools outlined in other Snowden documents, and targets consistent with other Five Eyes tools and campaigns.
  • ...1 more annotation...
  • Regin has been used to spy on telecom providers, financial institutions, energy companies, airlines, research institutes and the hospitality industry, and on European Union officials. The 14 countries found to have been penetrated include Russia, Malaysia, Afghanistan, and Fiji. Even though the trail is hot now, security experts say that Regin is still out there committing wholesale espionage. That’s because parts of it like QWERTY help mask other components. Like any good spy, it’s constantly changing disguises.
Paul Merrell

European Lawmakers Demand Answers on Phone Key Theft - The Intercept - 0 views

  • European officials are demanding answers and investigations into a joint U.S. and U.K. hack of the world’s largest manufacturer of mobile SIM cards, following a report published by The Intercept Thursday. The report, based on leaked documents provided by NSA whistleblower Edward Snowden, revealed the U.S. spy agency and its British counterpart Government Communications Headquarters, GCHQ, hacked the Franco-Dutch digital security giant Gemalto in a sophisticated heist of encrypted cell-phone keys. The European Parliament’s chief negotiator on the European Union’s data protection law, Jan Philipp Albrecht, said the hack was “obviously based on some illegal activities.” “Member states like the U.K. are frankly not respecting the [law of the] Netherlands and partner states,” Albrecht told the Wall Street Journal. Sophie in ’t Veld, an EU parliamentarian with D66, the Netherlands’ largest opposition party, added, “Year after year we have heard about cowboy practices of secret services, but governments did nothing and kept quiet […] In fact, those very same governments push for ever-more surveillance capabilities, while it remains unclear how effective these practices are.”
  • “If the average IT whizzkid breaks into a company system, he’ll end up behind bars,” In ’t Veld added in a tweet Friday. The EU itself is barred from undertaking such investigations, leaving individual countries responsible for looking into cases that impact their national security matters. “We even get letters from the U.K. government saying we shouldn’t deal with these issues because it’s their own issue of national security,” Albrecht said. Still, lawmakers in the Netherlands are seeking investigations. Gerard Schouw, a Dutch member of parliament, also with the D66 party, has called on Ronald Plasterk, the Dutch minister of the interior, to answer questions before parliament. On Tuesday, the Dutch parliament will debate Schouw’s request. Additionally, European legal experts tell The Intercept, public prosecutors in EU member states that are both party to the Cybercrime Convention, which prohibits computer hacking, and home to Gemalto subsidiaries could pursue investigations into the breach of the company’s systems.
  • According to secret documents from 2010 and 2011, a joint NSA-GCHQ unit penetrated Gemalto’s internal networks and infiltrated the private communications of its employees in order to steal encryption keys, embedded on tiny SIM cards, which are used to protect the privacy of cellphone communications across the world. Gemalto produces some 2 billion SIM cards a year. The company’s clients include AT&T, T-Mobile, Verizon, Sprint and some 450 wireless network providers. “[We] believe we have their entire network,” GCHQ boasted in a leaked slide, referring to the Gemalto heist.
  • ...4 more annotations...
  • While Gemalto was indeed another casualty in Western governments’ sweeping effort to gather as much global intelligence advantage as possible, the leaked documents make clear that the company was specifically targeted. According to the materials published Thursday, GCHQ used a specific codename — DAPINO GAMMA — to refer to the operations against Gemalto. The spies also actively penetrated the email and social media accounts of Gemalto employees across the world in an effort to steal the company’s encryption keys. Evidence of the Gemalto breach rattled the digital security community. “Almost everyone in the world carries cell phones and this is an unprecedented mass attack on the privacy of citizens worldwide,” said Greg Nojeim, senior counsel at the Center for Democracy & Technology, a non-profit that advocates for digital privacy and free online expression. “While there is certainly value in targeted surveillance of cell phone communications, this coordinated subversion of the trusted technical security infrastructure of cell phones means the US and British governments now have easy access to our mobile communications.”
  • For Gemalto, evidence that their vaunted security systems and the privacy of customers had been compromised by the world’s top spy agencies made an immediate financial impact. The company’s shares took a dive on the Paris bourse Friday, falling $500 million. In the U.S., Gemalto’s shares fell as much 10 percent Friday morning. They had recovered somewhat — down 4 percent — by the close of trading on the Euronext stock exchange. Analysts at Dutch financial services company Rabobank speculated in a research note that Gemalto could be forced to recall “a large number” of SIM cards. The French daily L’Express noted today that Gemalto board member Alex Mandl was a founding trustee of the CIA-funded venture capital firm In-Q-Tel. Mandl resigned from In-Q-Tel’s board in 2002, when he was appointed CEO of Gemplus, which later merged with another company to become Gemalto. But the CIA connection still dogged Mandl, with the French press regularly insinuating that American spies could infiltrate the company. In 2003, a group of French lawmakers tried unsuccessfully to create a commission to investigate Gemplus’s ties to the CIA and its implications for the security of SIM cards. Mandl, an Austrian-American businessman who was once a top executive at AT&T, has denied that he had any relationship with the CIA beyond In-Q-Tel. In 2002, he said he did not even have a security clearance.
  • AT&T, T-Mobile and Verizon could not be reached for comment Friday. Sprint declined to comment. Vodafone, the world’s second largest telecom provider by subscribers and a customer of Gemalto, said in a statement, “[W]e have no further details of these allegations which are industrywide in nature and are not focused on any one mobile operator. We will support industry bodies and Gemalto in their investigations.” Deutsche Telekom AG, a German company, said it has changed encryption algorithms in its Gemalto SIM cards. “We currently have no knowledge that this additional protection mechanism has been compromised,” the company said in a statement. “However, we cannot rule out this completely.”
  • Update: Asked about the SIM card heist, White House press secretary Josh Earnest said he did not expect the news would hurt relations with the tech industry: “It’s hard for me to imagine that there are a lot of technology executives that are out there that are in a position of saying that they hope that people who wish harm to this country will be able to use their technology to do so. So, I do think in fact that there are opportunities for the private sector and the federal government to coordinate and to cooperate on these efforts, both to keep the country safe, but also to protect our civil liberties.”
  •  
    Watch for massive class action product defect litigation to be filed against the phone companies.and mobile device manufacturers.  In most U.S. jurisdictions, proof that the vendors/manufacturers  knew of the product defect is not required, only proof of the defect. Also, this is a golden opportunity for anyone who wants to get out of a pricey cellphone contract, since providing a compromised cellphone is a material breach of warranty, whether explicit or implied..   
Paul Merrell

Russian Authorities detain two more Suspects in Nemtsov slaying | nsnbc international - 0 views

  • Russian investigative authorities detained two more suspects for their alleged involvement in the murder of Russian politician Boris Nemtsov. The arrests came one day after FSB Chief Alexander Bortnikov announced the arrest of two persons, the discovery of the escape car and the securing of DNA evidence and other evidence. The head of the Security Council of the Russian Federation’s Republic Ingushetia, Albert Barakhayev, informed the press about the arrest of two additional suspects for their alleged involvement in the murder of the Russian politician Boris Nemtsov in Moscow.
  • The head of the North Caucasian republic’s Security Council identified one of the two detainees as Anzor Gubashev who was detained while he was driving from the village of Voznesenovskaya towards the city of Magas. Gubashev had reportedly visited his mother in Voznesenovskaya. Albert Barakhayev did not identify the other detainee by name but said that he is one of Gubashev’s brothers. On Saturday the Chief of the Russian security service FSB, Alexander Bortnikov, announced the arrest of two suspects who were detained for suspicions of having been involved in the murder of Boris Nemtsov. Bortnikov noted that the investigation is ongoing and that the FSB, the Interior Ministry and the Federal Investigative Committee are investigating the possible involvement of other, additional persons. The FSB Chief identified the two suspects as Anzor Gubachev and Zaur Dadayev. The head of the Security Council of Ingushetia noted that members of the suspects’ families originated from Chechnya but moved to the village of Voznesenovskaya in Ingushetia during the 1960s. Albert Barakhayev added that both Gubashev and Dadayev had housing in the Chechen capital Grozny and were living there. Dadayev had served in the North Chechen police for ten years. The spokesman of Russia’s Federal Investigative Committee, Vladimir Mirkhin was earlier quoted by the Russian Tass news agency as saying that the investigation continues to focus on the identification of additional suspects.
  • Investigative authorities secured images from a rooftop camera which had captured the murder of Boris Nemtsov during the night from February 27 to 28. A detailed analysis of the video, reportedly, enabled the investigative authorities to identify the license plate number of the vehicle. The murder took place within a 500 meter radius of the Kremlin, and area which is under heavy camera surveillance. The escape car was reportedly secured along with DNA evidence. Additional information was reportedly attained by analyzing mobile phone traffic near the crime scene.
  • ...2 more annotations...
  • Russia’s Troubled 90s and the Wild East. Boris Nemtsov rose to political fame during the 1990s, which many Russian are looking back upon as “The Wild East”, with oligarchs and criminal gangs filling the void left by a crumbling Soviet Union and a Russia in disarray under the presidency of Boris Yeltsin. Boris Nemtsov was generally liked, even by most of his political opponents. That, even though he was often criticized for his ties to U.S. State Department and CIA Fronts such as the National Endowment for Democracy (NED). Nemtsov was the Co-Chairman of the RPR-Parnas party. His murderer gunned him down with a handgun, firing six shots at Nemtsov at close range. Nemtsov was struck in the back by four of the six projectiles.
  • Considering that all four suspects are considered innocent until a court of law proves, beyond a reasonable doubt, that they have committed or have been involved in the crime; Thus far, the four arrests suggest that the murder could be tied to Chechen and Ingushetian Islamist terrorist networks which are known for having been supported by U.S.’ other Western, as well as Saudi Arabian intelligence networks. U.S. media, including “the fair and balanced FOX” would host so-called “experts” who would pin the murder of Nemtsov directly on Russian President Vladimir Putin without providing a shred of evidence. Similar allegations have been implied by members of the U.S. State Department and the UK administration of PM David Cameron. German Foreign Minister Frank-Walter Steinmeier, for his part, echoed President Putin’s words, demanding a full and transparent investigation while he was warning against “rushing to any conclusions”. President Putin’s first response upon being informed about the assassination was to describe the crime as a provocation. Putin conveyed his condolences to all those who were near to Nemtsov and assured that he would personally assure that there would be a full and transparent investigation to solve the crime.
  •  
    So the dead man worked for CIA, NED, and the U.S. State Dept. That puts a different spin on the situation. As in creating a "martyr" to provoke protests. 
Paul Merrell

US Intel Vets Oppose Brennan's CIA Plan | Consortiumnews - 0 views

  • The original idea of the CIA was to have independent-minded experts assessing both short- and longer-term threats to U.S. national security. Mixing with operations and politics was always a danger, which is now highlighted by CIA Director Brennan’s reorganization, opposed by a group of U.S. intelligence veterans.MEMORANDUM FOR: The PresidentFROM: Veteran Intelligence Professionals for SanitySUBJECT: John Brennan’s Restructuring Plan for CIA
Paul Merrell

iSpy: The CIA Campaign to Steal Apple's Secrets - 0 views

  • ESEARCHERS WORKING with the Central Intelligence Agency have conducted a multi-year, sustained effort to break the security of Apple’s iPhones and iPads, according to top-secret documents obtained by The Intercept. The security researchers presented their latest tactics and achievements at a secret annual gathering, called the “Jamboree,” where attendees discussed strategies for exploiting security flaws in household and commercial electronics. The conferences have spanned nearly a decade, with the first CIA-sponsored meeting taking place a year before the first iPhone was released. By targeting essential security keys used to encrypt data stored on Apple’s devices, the researchers have sought to thwart the company’s attempts to provide mobile security to hundreds of millions of Apple customers across the globe. Studying both “physical” and “non-invasive” techniques, U.S. government-sponsored research has been aimed at discovering ways to decrypt and ultimately penetrate Apple’s encrypted firmware. This could enable spies to plant malicious code on Apple devices and seek out potential vulnerabilities in other parts of the iPhone and iPad currently masked by encryption.
  • The CIA declined to comment for this story. The security researchers also claimed they had created a modified version of Apple’s proprietary software development tool, Xcode, which could sneak surveillance backdoors into any apps or programs created using the tool. Xcode, which is distributed by Apple to hundreds of thousands of developers, is used to create apps that are sold through Apple’s App Store. The modified version of Xcode, the researchers claimed, could enable spies to steal passwords and grab messages on infected devices. Researchers also claimed the modified Xcode could “force all iOS applications to send embedded data to a listening post.” It remains unclear how intelligence agencies would get developers to use the poisoned version of Xcode. Researchers also claimed they had successfully modified the OS X updater, a program used to deliver updates to laptop and desktop computers, to install a “keylogger.”
  • Other presentations at the CIA conference have focused on the products of Apple’s competitors, including Microsoft’s BitLocker encryption system, which is used widely on laptop and desktop computers running premium editions of Windows. The revelations that the CIA has waged a secret campaign to defeat the security mechanisms built into Apple’s devices come as Apple and other tech giants are loudly resisting pressure from senior U.S. and U.K. government officials to weaken the security of their products. Law enforcement agencies want the companies to maintain the government’s ability to bypass security tools built into wireless devices. Perhaps more than any other corporate leader, Apple’s CEO, Tim Cook, has taken a stand for privacy as a core value, while sharply criticizing the actions of U.S. law enforcement and intelligence agencies. “If U.S. products are OK to target, that’s news to me,” says Matthew Green, a cryptography expert at Johns Hopkins University’s Information Security Institute. “Tearing apart the products of U.S. manufacturers and potentially putting backdoors in software distributed by unknowing developers all seems to be going a bit beyond ‘targeting bad guys.’ It may be a means to an end, but it’s a hell of a means.”
Paul Merrell

Canadian risks prison for not giving up phone's passcode - Yahoo News - 0 views

  • Montreal (AFP) - A Canadian charged for refusing to give border agents his smartphone passcode was expected Thursday to become the first to test whether border inspections can include information stored on devices.Alain Philippon, 38, risks up to a year in prison and a fine of up to Can$25,000 (US$20,000) if convicted of obstruction.He told local media that he refused to provide the passcode because he considered information on his smartphone to be "personal."Philippon was transiting through the port city of Halifax on his way home from a Caribbean vacation on Monday when he was selected for an in-depth exam.
  • "Philippon refused to divulge the passcode for his cell phone, preventing border services officers from their duties," Canada Border Services Agency said in an email.The agency insists that the Customs Act authorizes its officers to examine "all goods and conveyances including electronic devices, such as cell phones and laptops."But, according to legal experts, the issue of whether a traveler must reveal the password for an electronic device at a border crossing has not been tested in court. "(It's) one thing for them to inspect it, another thing for them to compel you to help them," Rob Currie, director of the Law and Technology Institute at Dalhousie University, told public broadcaster CBC.Philippon is scheduled to appear in court on May 12.
Paul Merrell

As Tsarnaev Trial Starts, a Journey into the "Known Unknowns" Begins - WhoWhatWhy - 0 views

  • We are about to witness what may be one of the strangest trials ever. For one thing, the central narrative we’ve been provided of the Boston Marathon bombing makes little sense. Take the defendant’s past. It provides few clues to suggest that Dzhokhar Tsarnaev might have been inclined to commit any sort of mayhem, much less on a massive scale. Even his now-dead, more aggressive older brother, Tamerlan, doesn’t exactly seem like the sort to prepare and detonate bombs to harm large numbers of innocent fellow Bostonians. Furthermore, neither brother is known to have had the expertise to make the explosive devices unleashed at the Marathon, which experts have characterized as sophisticated. They also aren’t known to have the sort of experience or practiced skill with guns or incendiary devices of the sort they’re described as deploying—with ruthless bravado—during a protracted face-off with large numbers of experienced, heavily armed law enforcement officers, some of whom had military training.
Paul Merrell

You Should Really Consider Installing Signal, an Encrypted Messaging App for iPhone - The Intercept - 0 views

  • In the age of ubiquitous government surveillance, the only way citizens can protect their privacy online is through encryption. Historically, this has been extremely difficult for mere mortals; just watch the video Edward Snowden made to teach Glenn Greenwald how to encrypt his emails to see how confusing it gets. But all of this is quickly changing as high-quality, user-friendly encryption software becomes available. App maker Open Whisper Systems took an important step in this direction today with the release of a major new version of its Signal encrypted calling app for iPhones and iPads. The new version, Signal 2.0, folds in support for encrypted text messages using a protocol called TextSecure, meaning users can communicate using voice and text while remaining confident nothing can be intercepted in transit over the internet. That may not sound like a particularly big deal, given that other encrypted communication apps are available for iOS, but Signal 2.0 offers something tremendously useful: peace of mind. Unlike other text messaging products, Signal’s code is open source, meaning it can be inspected by experts, and the app also supports forward secrecy, so if an attacker steals your encryption key, they cannot go back and decrypt messages they may have collected in the past.
  • Signal is also one special place on the iPhone where users can be confident all their communications are always fully scrambled. Other apps with encryption tend to enter insecure modes at unpredictable times — unpredictable for many users, at least. Apple’s iMessage, for example, employs strong encryption, but only when communicating between two Apple devices and only when there is a proper data connection. Otherwise, iMessage falls back on insecure SMS messaging. iMessage also lacks forward secrecy and inspectable source code. Signal also offers the ability for power users to verify the identity of the people they’re talking to, confirming that the encryption isn’t under attack. With iMessage, you just have to take Apple’s word for it. Strong, reliable, predictably-applied encryption is especially important at a time when the world just found out, via a report by The Intercept, that American and British spies hacked into the world’s largest SIM card manufacturer and stole the encryption keys that are used to protect communication between handsets and cell phone towers. With these keys, spies can eavesdrop on phone calls and texts just by passively listening to the airwaves.
  • iPhone users can find Signal here. For Android users, the product is, at the moment, split into two apps: TextSecure for private texting and RedPhone for private voice calls. “We’re working towards a single unified Signal app for Android, iPhone and the desktop,” says Marlinspike. It’s important to keep in mind that no technology is 100 percent secure, and an encrypted messaging app can only be as secure as the device you install it on. Intelligence agencies and other hackers can still exploit security bugs that have not been fixed, known as zero day exploits, to take over smartphones and bypass the encryption that privacy apps employ. But apps like Signal go a long way to making mass surveillance of billions of innocent people infeasible.
Paul Merrell

The "Snowden is Ready to Come Home!" Story: a Case Study in Typical Media Deceit - The Intercept - 0 views

  • Most sentient people rationally accept that the U.S. media routinely disseminates misleading stories and outright falsehoods in the most authoritative tones. But it’s nonetheless valuable to examine particularly egregious case studies to see how that works. In that spirit, let’s take yesterday’s numerous, breathless reports trumpeting the “BREAKING” news that “Edward Snowden now wants to come home!” and is “now negotiating the terms of his return!” Ever since Snowden revealed himself to the public 20 months ago, he has repeatedly said the same exact thing when asked about his returning to the U.S.: I would love to come home, and would do so if I could get a fair trial, but right now, I can’t. His primary rationale for this argument has long been that under the Espionage Act, the 1917 statute under which he has been charged, he would be barred by U.S. courts from even raising his key defense: that the information he revealed to journalists should never have been concealed in the first place and he was thus justified in disclosing it to journalists. In other words, when U.S. political and media figures say Snowden should “man up,” come home and argue to a court that he did nothing wrong, they are deceiving the public, since they have made certain that whistleblowers charged with “espionage” are legally barred from even raising that defense.
  • Snowden has also pointed out that legal protections for whistleblowers are explicitly inapplicable to those, like him, who are employed by private contractors (rendering President Obama’s argument about why Snowden should “come home” entirely false). One month after Snowden was revealed, Daniel Ellsberg wrote an Op-Ed in the Washington Post arguing that Snowden did the right thing in leaving the U.S. because he would not be treated fairly, and argued Snowden should not return until he is guaranteed a fully fair trial. Snowden has said all of this over and over. In June 2013, when I asked him during the online Guardian chat why he left the U.S. for Hong Kong, he said: “the US Government, just as they did with other whistleblowers, immediately and predictably destroyed any possibility of a fair trial at home . . . That’s not justice, and it would be foolish to volunteer yourself to it if you can do more good outside of prison than in it.” In January 2014, AP reported about a new online chat Snowden gave: “Snowden said returning would be the best resolution. But Snowden said he can’t return because he wouldn’t be allowed to argue at trial that he acted in the public interest when he revealed the National Security Agency’s mass surveillance programs.” In that chat, he said: “Returning to the US, I think, is the best resolution for the government, the public, and myself.”
  • Gingrich: “I think if we can find a way to get him home, get the rest of the documents that he has not leaked . . . it’s worth doing, but I think he’d have to serve jail time, and it’d probably be fairly lengthy. I don’t think the country would tolerate this level of betrayal, not having some very significant jail time — Blitzer: “You say lengthy. What do you think? Gingrich: “I’m not an expert in this, but I’d say more than 10 years.” Where to start? First, Gingrich’s belief that it’s possible to “get the rest of the documents that he has not leaked” is simply adorable. Second, Gingrich is a fascinating choice for CNN to have pontificate on proper punishments given that he is the first House Speaker to ever be punished for ethics violations, for which he was fined $300,000. Third, David Petraeus was just allowed to plead guilty for leaking extremely sensitive secrets — not out of a whistleblowing desire to inform the public but simply to satisfy his mistress — and will almost certainly spend no time in jail; Gingrich, Blitzer, Ignatius and friends would never dare suggest that the General should go to prison (just as DC’s stern law-and-order advocates who demand Snowden’s imprisonment would never dare suggest the same for James Clapper for having lied to Congress).
  • ...1 more annotation...
  • Most important, if you were Snowden, and you constantly heard U.S. political and media elites consigning you to prison for a decade or longer before your trial started, would you remotely believe assurances that you’d get a fair trial? What rational person would ever willingly submit themselves to a penal state that imprisons more of its citizens than any other in the world, run by people with this mentality? And when you examine case studies like this of what U.S. media is not just capable of doing but eager to do — concoct a completely false narrative based on fictitious events and then proceed to spend a full day drawing all sorts of self-serving and propagandistic lessons from it — why would anyone regard what comes spewing forth from them with anything other than extreme suspicion and contempt?
Paul Merrell

Fahmy, Baher struggle without IDs, want to 'clear their names' | Cairo Post - 0 views

  • CAIRO: The retrial of Al-Jazeera journalists Mohamed Fahmy and Baher Mohamed was adjourned Sunday to March 19. The court decided to postpone the hearing after eight prosecution witnesses, including national security forces and technical experts, were absent; two of them were fined 500 EGP each for not showing up, and are expected to be present at the court’s next hearing. Since he renounced his Egyptian citizenship in December, Canadian national Fahmy does not have possess identification other than a copy of his passport the court decided to give him at the second retrial hearing Feb. 23. When Fahmy’s defense requested the original passport, which is now among the case exhibits, the court said it wants the Canadian embassy to contact the court officially. “I hope that I do get a passport so I can at least travel locally inside Egypt,” Fahmy told journalists outside the court. He said he will need a recognized ID to live his life normally; rent a car, a hotel room and get married.
Paul Merrell

Fukushima Coverup: Sick US Navy Sailors' Class Action Law Suit, US Government, Doctors Bury Truth about Fukushima Radiation | Global Research - 0 views

  • U.S. Navy sailors exposed to radioactive fallout from the Fukushima nuclear disaster have been falling ill, even as the Defense Department insists that they were not exposed to dangerous levels of radiation. Many of the sailors have now joined in a class action lawsuit against Fukushima operators and builders Tokyo Electric Power Company (Tepco), Toshiba, Hitachi, Ebasco and General Electric. Even if they wanted to — which many do not — the sailors would be unable to sue the Navy. According to a Supreme Court ruling from the 1950s known as the Feres Doctrine, soldiers cannot sue the government for injuries resulting directly from their military service.
  • Yet in the four years since the disaster, at least 500 sailors have fallen ill, and 247 of them have joined the class-action suit. The 100-page legal complaint chronicles their symptoms: an airplane mechanic suffering from unexplained muscle wasting; a woman whose baby was born ill; a sailor told his health problems must be genetic, even though his identical twin is perfectly healthy; and case after case of cancer, internal bleeding, abscesses, thyroid dysfunction and birth defects.
  • The defendants initially claimed that they could not be sued in a U.S. court, so plaintiffs’ attorney Paul Garner asked the sailors to come to a court hearing in San Diego, to offer moral support. Nearly all of them refused, for fear of public attack. Initial plaintiff Lindsey Cooper, for example, had already been mocked by atomic energy experts on CNN and by conservative radio hosts. Others were afraid of being perceived as anti-military, or un-American.
Paul Merrell

Island puts its EU Bid on Ice | nsnbc international - 0 views

  • Foreign Minister Sveinsson issued a formal statement, saying that he had informed the current Latvian EU President as well as the European Commission about Island’s decision to withdraw its EU membership application.
  • The application was submitted to the EU six years ago. Gunnar Bragi Sveinsson explained: “The EU and Iceland have discussed the country’s position on the status of its bid to join the European Union. … The government doesn’t intend to resume preparing for EU membership”. The decision didn’t come without forewarning. In January Island’s Prime Minister Sigmundur Davið Gunnlaugsson went on the record about the possible withdrawal of Island’s EU membership application, saying: “Participation in EU talks is not really valid any more. .. Both due to changes in the European Union and because it’s not in line with the policies of the ruling government to accept everything that the last government was willing to accept. Because of that we are back to square one”. The announcement about Island’s withdrawal of its application for EU membership comes as EU-skeptic parties in the Scandinavian neighbor country Denmark complain that their parties are denied access to documents which other parties receive. That is, documents pertaining an upcoming decision about whether Denmark should abolish its reservations about the coordination of Danish and EU law.
  • One of the primary drivers behind Island’s reservations with regard to an EU membership are EU fishing quota which, according to Icelandic fishery experts would be devastating for the Atlantic  island nation’s fishery and related industries. Island is a member of the European Economic Area (EEA), the European Free Trade Association (EFTA) and a member of the Schengen areas. Reservations about a full EU membership are also driven by an increasing EU interference in national sovereignty with regard to legislation, the development of a military column within the EU, lack of transparency, money spent on influencing EU election outcomes by infiltrating social media, corruption and interference into domestic economic and monetary policies such as in Greece.
  • ...1 more annotation...
  • Foreign Minister Sveinsson noted that any future decision about Island’s EU membership would have to be based on the outcome of a referendum. So far, Island is content with its EEA and EFFTA membership.
  •  
    Make that Iceland rather than Island. Why buy a ticket to travel on a sinking ship?
Paul Merrell

BBC News - UK support for China-backed Asia bank prompts US concern - 0 views

  • The US has expressed concern over the UK's bid to become a founding member of a Chinese-backed development bank. The UK is the first big Western economy to apply for membership of the Asian Infrastructure Investment Bank (AIIB). The US has raised questions over the bank's commitment to international standards on governance. "There will be times when we take a different approach," a spokesperson for Prime Minister David Cameron said about the rare rebuke from the US. The AIIB, which was created in October by 21 countries, led by China, will fund Asian energy, transport and infrastructure projects. The UK insisted it would demand the bank adhere to strict banking and oversight procedures. "We think that it's in the UK's national interest," said Mr Cameron's spokesperson.
  • In a statement announcing the UK's intention to join the bank, Mr Osborne said that joining the AIIB at the founding stage would create "an unrivalled opportunity for the UK and Asia to invest and grow together". The hope is that investment in the bank will give British companies an opportunity to invest in the world's fastest growing markets. But the US sees the Chinese effort as a ploy to dilute US control of the banking system, and has persuaded regional allies such as Australia, South Korea and Japan to stay out of the bank. In response to the move, US National Security Council spokesman Patrick Ventrell said: "We believe any new multilateral institution should incorporate the high standards of the World Bank and the regional development banks." "Based on many discussions, we have concerns about whether the AIIB will meet these high standards, particularly related to governance, and environmental and social safeguards," he added.
  • The Financial Times (FT) newspaper reported on Thursday that US officials had complained about the British move. The report cited an unnamed senior US administration official as saying the British decision was taken after "virtually no consultation with the US". "We are wary about a trend toward constant accommodation of China," the newspaper quoted the US official as saying.
  • ...1 more annotation...
  • The founding member countries of the AIIB have agreed the basic parameters that would determine the capital structure of the new bank would be relative gross domestic product. Banking experts have estimated that, if taken at face value, this would give China a 67% shareholding in the new bank. That's significantly different than the Asia Development Bank, which has a similar structure to the World Bank and has been in existence 1966. There, the majority stakes are controlled by Japan and the US.
  •  
    The line comes to mind about rats deserting a sinking ship. 
Paul Merrell

ISIS: The Bombshell Interview to Impeach Obama - 0 views

  • The author found some difficulties in finding a proper title for this post, which is based on a TV interview with the founder of Jihadist movement in Egypt and a former top Al-Qaeda commander. Each line of the interview is a title by itself, each piece of information is more than enough to put tens of western officials and their regional stooges behind bars for long times, those who are acting as the Humanitarian Bastards crying for the suffering of the innocent they only inflicted their suffering. Finally, I decided to post the text of the interview as it is without my usual adding in noting how the western citizens are played by their governments, so I’ll leave you with the interview conducted by pan Arab Al-Maydeen TV with Sheikh Nabeel Naiem,  who was introduced by the TV presenter as: ‘the former founder of Jihad Organization & expert in Islamist groups’, enjoy:
  •  
    Fascinating interview with a founder of al-Qaeda, who explores the various Jihadi movements and armies and their control by the U.S. and Israel. 
Paul Merrell

Use Tor or 'EXTREMIST' Tails Linux? Congrats, you're on the NSA's list * The Register - 0 views

  • Alleged leaked documents about the NSA's XKeyscore snooping software appear to show the paranoid agency is targeting Tor and Tails users, Linux Journal readers – and anyone else interested in online privacy.Apparently, this configuration file for XKeyscore is in the divulged data, which was obtained and studied by members of the Tor project and security specialists for German broadcasters NDR and WDR. <a href="http://pubads.g.doubleclick.net/gampad/jump?iu=/6978/reg_security/front&sz=300x250%7C300x600&tile=3&c=33U7ZK6qwQrMkAACSrTugAAAP1&t=ct%3Dns%26unitnum%3D3%26unitname%3Dwww_top_mpu%26pos%3Dtop%26test%3D0" target="_blank"> <img src="http://pubads.g.doubleclick.net/gampad/ad?iu=/6978/reg_security/front&sz=300x250%7C300x600&tile=3&c=33U7ZK6qwQrMkAACSrTugAAAP1&t=ct%3Dns%26unitnum%3D3%26unitname%3Dwww_top_mpu%26pos%3Dtop%26test%3D0" alt=""></a> In their analysis of the alleged top-secret documents, they claim the NSA is, among other things:Specifically targeting Tor directory servers Reading email contents for mentions of Tor bridges Logging IP addresses used to search for privacy-focused websites and software And possibly breaking international law in doing so. We already know from leaked Snowden documents that Western intelligence agents hate Tor for its anonymizing abilities. But what the aforementioned leaked source code, written in a rather strange custom language, shows is that not only is the NSA targeting the anonymizing network Tor specifically, it is also taking digital fingerprints of any netizens who are remotely interested in privacy.
  • These include readers of the Linux Journal site, anyone visiting the website for the Tor-powered Linux operating system Tails – described by the NSA as "a comsec mechanism advocated by extremists on extremist forums" – and anyone looking into combining Tails with the encryption tool Truecrypt.If something as innocuous as Linux Journal is on the NSA's hit list, it's a distinct possibility that El Reg is too, particularly in light of our recent exclusive report on GCHQ – which led to a Ministry of Defence advisor coming round our London office for a chat.
  • If you take even the slightest interest in online privacy or have Googled a Linux Journal article about a broken package, you are earmarked in an NSA database for further surveillance, according to these latest leaks.This is assuming the leaked file is genuine, of course.Other monitored sites, we're told, include HotSpotShield, FreeNet, Centurian, FreeProxies.org, MegaProxy, privacy.li and an anonymous email service called MixMinion. The IP address of computer users even looking at these sites is recorded and stored on the NSA's servers for further analysis, and it's up to the agency how long it keeps that data.The XKeyscore code, we're told, includes microplugins that target Tor servers in Germany, at MIT in the United States, in Sweden, in Austria, and in the Netherlands. In doing so it may not only fall foul of German law but also the US's Fourth Amendment.
  • ...2 more annotations...
  • The nine Tor directory servers receive especially close monitoring from the NSA's spying software, which states the "goal is to find potential Tor clients connecting to the Tor directory servers." Tor clients linking into the directory servers are also logged."This shows that Tor is working well enough that Tor has become a target for the intelligence services," said Sebastian Hahn, who runs one of the key Tor servers. "For me this means that I will definitely go ahead with the project.”
  • While the German reporting team has published part of the XKeyscore scripting code, it doesn't say where it comes from. NSA whistleblower Edward Snowden would be a logical pick, but security experts are not so sure."I do not believe that this came from the Snowden documents," said security guru Bruce Schneier. "I also don't believe the TAO catalog came from the Snowden documents. I think there's a second leaker out there."If so, the NSA is in for much more scrutiny than it ever expected.
Paul Merrell

Pakistan TV Exposes bin Laden Killing Hoax and Documentary Exposes 9/11 Official Story - PaulCraigRoberts.org - 0 views

  • Review of “September 11 – The New Pearl Harbor.”  A documentary by Massimo Mazzucco. David Ray Griffin There have been several good films and videos about 9/11. But the new film by award-winning film-maker Massimo Mazzucco is in a class by itself. For those of us who have been working on 9/11 for a long time, this is the film we have been waiting for. Whereas there are excellent films treating the falsity of particular parts of the official account, such as the Twin Towers or WTC 7, Mazzucco has given us a comprehensive documentary treatment of 9/11, dealing with virtually all of the issues. There have, of course, been films that treated the fictional official story as true. And there are films that use fictional stories to portray people’s struggles after starting to suspect the official story to be false. But there is no fiction in Mazzucco’s film – except in the sense that it clearly and relentlessly exposes every part of the official account as fictional.
  • Because of his intent at completeness, Mazzucco has given us a 5-hour film. It is so fascinating and fast-paced that many will want to watch it in one sitting. But this is not necessary, as the film, which fills 3 DVDs, consists of 7 parts, each of which is divided into many short chapters. These 7 parts treat Air Defence, The Hijackers, The Airplanes, The Pentagon, Flight 93, The Twin Towers, and Building 7. In each part, after presenting facts that contradict the official story, Mazzucco deals with the claims of the debunkers (meaning those who try to debunk the evidence provided by the 9/11 research community). The Introduction, reflecting the film’s title, deals with 12 uncanny parallels between Pearl Harbor and September 11. The film can educate people who know nothing about 9/11 (beyond the official story), those with a moderate amount of knowledge about the various problems with the official story, and even by experts. (I myself learned many things.) Mazzucco points out that his film covers 12 years of public debate about 9/11. People who have been promoting 9/11 truth for many of these years will see that their labors have been well-rewarded: There is now a high-quality, carefully-documented film that dramatically shows the official story about 9/11 to be a fabrication through and through. This is truly the film we have been waiting for.
  • Availability: The film is freely available to the world at: 1. The film-maker’s own website, complete with detailed index: http://www.luogocomune.net/site/modules/sections/index.php?op=viewarticle&artid=167 2. On YouTube: http://www.youtube.com/watch?v=O1GCeuSr3Mk
  •  
    High praise from David Ray Griffin. I watched the whole thing. Incredibly well-done debunking of those who attempt to defend the "official" version of what happened on 9-11.
Paul Merrell

The ultimate goal of the NSA is total population control | Antony Loewenstein | Comment is free | theguardian.com - 0 views

  • William Binney is one of the highest-level whistleblowers to ever emerge from the NSA. He was a leading code-breaker against the Soviet Union during the Cold War but resigned soon after September 11, disgusted by Washington’s move towards mass surveillance.On 5 July he spoke at a conference in London organised by the Centre for Investigative Journalism and revealed the extent of the surveillance programs unleashed by the Bush and Obama administrations.
  • “At least 80% of fibre-optic cables globally go via the US”, Binney said. “This is no accident and allows the US to view all communication coming in. At least 80% of all audio calls, not just metadata, are recorded and stored in the US. The NSA lies about what it stores.”The NSA will soon be able to collect 966 exabytes a year, the total of internet traffic annually. Former Google head Eric Schmidt once argued that the entire amount of knowledge from the beginning of humankind until 2003 amount to only five exabytes.Binney, who featured in a 2012 short film by Oscar-nominated US film-maker Laura Poitras, described a future where surveillance is ubiquitous and government intrusion unlimited.“The ultimate goal of the NSA is total population control”, Binney said, “but I’m a little optimistic with some recent Supreme Court decisions, such as law enforcement mostly now needing a warrant before searching a smartphone.”
  • It shows that the NSA is not just pursuing terrorism, as it claims, but ordinary citizens going about their daily communications. “The NSA is mass-collecting on everyone”, Binney said, “and it’s said to be about terrorism but inside the US it has stopped zero attacks.”The lack of official oversight is one of Binney’s key concerns, particularly of the secret Foreign Intelligence Surveillance Court (Fisa), which is held out by NSA defenders as a sign of the surveillance scheme's constitutionality.“The Fisa court has only the government’s point of view”, he argued. “There are no other views for the judges to consider. There have been at least 15-20 trillion constitutional violations for US domestic audiences and you can double that globally.”
  • ...4 more annotations...
  • He praised the revelations and bravery of former NSA contractor Edward Snowden and told me that he had indirect contact with a number of other NSA employees who felt disgusted with the agency’s work. They’re keen to speak out but fear retribution and exile, not unlike Snowden himself, who is likely to remain there for some time.
  • Binney recently told the German NSA inquiry committee that his former employer had a “totalitarian mentality” that was the "greatest threat" to US society since that country’s US Civil War in the 19th century. Despite this remarkable power, Binney still mocked the NSA’s failures, including missing this year’s Russian intervention in Ukraine and the Islamic State’s take-over of Iraq.The era of mass surveillance has gone from the fringes of public debate to the mainstream, where it belongs. The Pew Research Centre released a report this month, Digital Life in 2025, that predicted worsening state control and censorship, reduced public trust, and increased commercialisation of every aspect of web culture.It’s not just internet experts warning about the internet’s colonisation by state and corporate power. One of Europe’s leading web creators, Lena Thiele, presented her stunning series Netwars in London on the threat of cyber warfare. She showed how easy it is for governments and corporations to capture our personal information without us even realising.Thiele said that the US budget for cyber security was US$67 billion in 2013 and will double by 2016. Much of this money is wasted and doesn't protect online infrastructure. This fact doesn’t worry the multinationals making a killing from the gross exaggeration of fear that permeates the public domain.
  • Wikileaks understands this reality better than most. Founder Julian Assange and investigative editor Sarah Harrison both remain in legal limbo. I spent time with Assange in his current home at the Ecuadorian embassy in London last week, where he continues to work, release leaks, and fight various legal battles. He hopes to resolve his predicament soon.At the Centre for Investigative Journalism conference, Harrison stressed the importance of journalists who work with technologists to best report the NSA stories. “It’s no accident”, she said, “that some of the best stories on the NSA are in Germany, where there’s technical assistance from people like Jacob Appelbaum.” A core Wikileaks belief, she stressed, is releasing all documents in their entirety, something the group criticised the news site The Intercept for not doing on a recent story. “The full archive should always be published”, Harrison said.
  • With 8m documents on its website after years of leaking, the importance of publishing and maintaining source documents for the media, general public and court cases can’t be under-estimated. “I see Wikileaks as a library”, Assange said. “We’re the librarians who can’t say no.”With evidence that there could be a second NSA leaker, the time for more aggressive reporting is now. As Binney said: “I call people who are covering up NSA crimes traitors”.
Paul Merrell

BBC News - Ebola deaths mount in Sierra Leone and Liberia - 0 views

  • High numbers of new cases of the Ebola virus are being reported in Sierra Leone and Liberia, with 19 deaths over three days this week, the UN's World Health Organization (WHO) says. Such figures showed that it was a race against time to control the epidemic in Sierra Leone, medical charity MSF said.
  • Medecins Sans Frontieres said its teams in eastern Sierra Leone were "racing against time to stop the spread of the disease". "We're under massive time pressure: the longer it takes to find and follow up with people who have come in contact with sick people, the more difficult it will be to control the outbreak," MSF emergency co-ordinator Anja Wolz said in a statement. "We still have no idea how many villages are affected. I'm afraid we've only seen the tip of the iceberg." The disease creates fear within communities and sick people are often stigmatised so experts believe the key to stopping the spread of the virus is to make sure affected communities understand it better.
  • "Families can be driven out of their villages, and sick people can be cast out to die on their own," said Ms Wolz. The WHO gathers data on confirmed, probable and suspected cases and deaths in Guinea, Liberia and Sierra Leone. So far in the West African outbreak there have been 888 cases.
  •  
    Ebola is one of the nastiest killers on earth. Whenever it appears, you need to keep an eye out for government involvement. Ebola at least was one of the biological warfare agents weaponized by the U.S. Army's CBW freaks at Ft. Detrick, Maryland. Although the U.S. officially renounced biological warfare, At least a couple of African outbreaks were strongly suspected of being Army CBW tests. 
Paul Merrell

WASHINGTON: CIA admits it broke into Senate computers; senators call for spy chief's ouster | National Security & Defense | McClatchy DC - 0 views

  • An internal CIA investigation confirmed allegations that agency personnel improperly intruded into a protected database used by Senate Intelligence Committee staff to compile a scathing report on the agency’s detention and interrogation program, prompting bipartisan outrage and at least two calls for spy chief John Brennan to resign.“This is very, very serious, and I will tell you, as a member of the committee, someone who has great respect for the CIA, I am extremely disappointed in the actions of the agents of the CIA who carried out this breach of the committee’s computers,” said Sen. Saxby Chambliss, R-Ga., the committee’s vice chairman.
  • The rare display of bipartisan fury followed a three-hour private briefing by Inspector General David Buckley. His investigation revealed that five CIA employees, two lawyers and three information technology specialists improperly accessed or “caused access” to a database that only committee staff were permitted to use.Buckley’s inquiry also determined that a CIA crimes report to the Justice Department alleging that the panel staff removed classified documents from a top-secret facility without authorization was based on “inaccurate information,” according to a summary of the findings prepared for the Senate and House intelligence committees and released by the CIA.In other conclusions, Buckley found that CIA security officers conducted keyword searches of the emails of staffers of the committee’s Democratic majority _ and reviewed some of them _ and that the three CIA information technology specialists showed “a lack of candor” in interviews with Buckley’s office.
  • The inspector general’s summary did not say who may have ordered the intrusion or when senior CIA officials learned of it.Following the briefing, some senators struggled to maintain their composure over what they saw as a violation of the constitutional separation of powers between an executive branch agency and its congressional overseers.“We’re the only people watching these organizations, and if we can’t rely on the information that we’re given as being accurate, then it makes a mockery of the entire oversight function,” said Sen. Angus King, an independent from Maine who caucuses with the Democrats.The findings confirmed charges by the committee chairwoman, Sen. Dianne Feinstein, D-Calif., that the CIA intruded into the database that by agreement was to be used by her staffers compiling the report on the harsh interrogation methods used by the agency on suspected terrorists held in secret overseas prisons under the George W. Bush administration.The findings also contradicted Brennan’s denials of Feinstein’s allegations, prompting two panel members, Sens. Mark Udall, D-Colo., and Martin Heinrich, D-N.M., to demand that the spy chief resign.
  • ...7 more annotations...
  • Another committee member, Sen. Ron Wyden, D-Ore., and some civil rights groups called for a fuller investigation. The demands clashed with a desire by President Barack Obama, other lawmakers and the CIA to move beyond the controversy over the “enhanced interrogation program” after Feinstein releases her committee’s report, which could come as soon as next weekMany members demanded that Brennan explain his earlier denial that the CIA had accessed the Senate committee database.“Director Brennan should make a very public explanation and correction of what he said,” said Sen. Carl Levin, D-Mich. He all but accused the Justice Department of a coverup by deciding not to pursue a criminal investigation into the CIA’s intrusion.
  • “I thought there might have been information that was produced after the department reached their conclusion,” he said. “What I understand, they have all of the information which the IG has.”He hinted that the scandal goes further than the individuals cited in Buckley’s report.“I think it’s very clear that CIA people knew exactly what they were doing and either knew or should’ve known,” said Levin, adding that he thought that Buckley’s findings should be referred to the Justice Department.A person with knowledge of the issue insisted that the CIA personnel who improperly accessed the database “acted in good faith,” believing that they were empowered to do so because they believed there had been a security violation.“There was no malicious intent. They acted in good faith believing they had the legal standing to do so,” said the knowledgeable person, who asked not to be further identified because they weren’t authorized to discuss the issue publicly. “But it did not conform with the legal agreement reached with the Senate committee.”
  • Feinstein called Brennan’s apology and his decision to submit Buckley’s findings to the accountability board “positive first steps.”“This IG report corrects the record and it is my understanding that a declassified report will be made available to the public shortly,” she said in a statement.“The investigation confirmed what I said on the Senate floor in March _ CIA personnel inappropriately searched Senate Intelligence Committee computers in violation of an agreement we had reached, and I believe in violation of the constitutional separation of powers,” she said.It was not clear why Feinstein didn’t repeat her charges from March that the agency also may have broken the law and had sought to “thwart” her investigation into the CIA’s use of waterboarding, which simulates drowning, sleep deprivation and other harsh interrogation methods _ tactics denounced by many experts as torture.
  • Buckley’s findings clashed with denials by Brennan that he issued only hours after Feinstein’s blistering Senate speech.“As far as the allegations of, you know, CIA hacking into, you know, Senate computers, nothing could be further from the truth. I mean, we wouldn’t do that. I mean, that’s _ that’s just beyond the _ you know, the scope of reason in terms of what we would do,” he said in an appearance at the Council on Foreign Relations.White House Press Secretary Josh Earnest issued a strong defense of Brennan, crediting him with playing an “instrumental role” in the administration’s fight against terrorism, in launching Buckley’s investigation and in looking for ways to prevent such occurrences in the future.Earnest was asked at a news briefing whether there was a credibility issue for Brennan, given his forceful denial in March.“Not at all,” he replied, adding that Brennan had suggested the inspector general’s investigation in the first place. And, he added, Brennan had taken the further step of appointing the accountability board to review the situation and the conduct of those accused of acting improperly to “ensure that they are properly held accountable for that conduct.”
  • The allegations and the separate CIA charge that the committee staff removed classified documents from the secret CIA facility in Northern Virginia without authorization were referred to the Justice Department for investigation.The department earlier this month announced that it had found insufficient evidence on which to proceed with criminal probes into either matter “at this time.” Thursday, Justice Department officials declined comment.
  • In her speech, Feinstein asserted that her staff found the material _ known as the Panetta review, after former CIA Director Leon Panetta, who ordered it _ in the protected database and that the CIA discovered the staff had it by monitoring its computers in violation of the user agreement.The inspector general’s summary, which was prepared for the Senate and the House intelligence committees, didn’t identify the CIA personnel who had accessed the Senate’s protected database.Furthermore, it said, the CIA crimes report to the Justice Department alleging that panel staffers had removed classified materials without permission was grounded on inaccurate information. The report is believed to have been sent by the CIA’s then acting general counsel, Robert Eatinger, who was a legal adviser to the interrogation program.“The factual basis for the referral was not supported, as the author of the referral had been provided inaccurate information on which the letter was based,” said the summary, noting that the Justice Department decided not to pursue the issue.
  • Christopher Anders, senior legislative counsel with the American Civil Liberties Union, criticized the CIA announcement, saying that “an apology isn’t enough.”“The Justice Department must refer the (CIA) inspector general’s report to a federal prosecutor for a full investigation into any crimes by CIA personnel or contractors,” said Anders.
  •  
    And no one but the lowest ranking staffer knew anything about it, not even the CIA lawyer who made the criminal referral to the Justice Dept., alleging that the Senate Intelligence Committee had accessed classified documents it wasn't authorized to access. So the Justice Dept. announces that there's insufficient evidence to warrant a criminal investigation. As though the CIA lawyer's allegations were not based on the unlawful surveillance of the Senate Intelligence Committee's network.  Can't we just get an official announcement that Attorney General Holder has decided that there shall be a cover-up? 
Paul Merrell

Revelations of German Pilot: Shocking Analysis of the "Shooting Down" of Malaysian MH17. "Aircraft Was Not Hit by a Missile" | Global Research - 1 views

  • First, I was amazed at how few photos can be found from the wreckage with Google. All are in low resolution, except one: The fragment of the cockpit below the window on the pilots side. This image, however, is shocking. In Washington, you can now hear views expressed of a “potentially tragic error / accident” regarding MH 017. Given this particular cockpit image it does not surprise me at all. Entry and exit impact holes of projectiles in the cockpit area
  • I recommend to click on the little picture to the left. You can download this photo as a PDF in good resolution. This is necessary, because that will allow you understand what I am describing here. The facts speak clear and loud and are beyond the realm of speculation: The cockpit shows traces of shelling! You can see the entry and exit holes. The edge of a portion of the holes is bent inwards. These are the smaller holes, round and clean, showing the entry points most likely that of a 30 millimeter caliber projectile. The edge of the other, the larger and slightly frayed exit holes showing shreds of metal pointing produced by the same caliber projectiles. Moreover, it is evident that at these exit holes of the outer layer of the double aluminum reinforced structure are shredded or bent – outwardly! Furthermore, minor cuts can be seen, all bent outward, which indicate that shrapnel had forcefully exited through the outer skin from the inside of the cockpit. The open rivets are are also bent outward.
  • In sifting through the available images one thing stands out: All wreckage of the sections behind the cockpit are largely intact, except for the fact that only fragments of the aircraft remained . Only the cockpit part shows these peculiar marks of destruction. This leaves the examiner with an important clue. This aircraft was not hit by a missile in the central portion. The destruction is limited to the cockpit area. Now you have to factor in that this part is constructed of specially reinforced material. This is on account of the nose of any aircraft having to withstand the impact of a large bird at high speeds. You can see in the photo, that in this area significantly stronger aluminum alloys were being installed than in the remainder of the outer skin of the fuselage. One remembers the crash of Pan Am over Lockerbie. It was a large segment of the cockpit that due to the special architecture survived the crash in one piece. In the case of flight MH 017 it becomes abundantly clear that there also an explosion took place inside the aircraft.
  • ...1 more annotation...
  • So what could have happened? Russia recently published radar recordings, that confirm at least one Ukrainian SU 25 in close proximity to MH 017. This corresponds with the statement of the now missing Spanish controller ‘Carlos’ that has seen two Ukrainian fighter aircraft in the immediate vicinity of MH 017. If we now consider the armament of a typical SU 25 we learn this: It is equipped with a double-barreled 30-mm gun, type GSh-302 / AO-17A, equipped with: a 250 round magazine of anti-tank incendiary shells and splinter-explosive shells (dum-dum), arranged in alternating order. The cockpit of the MH 017 has evidently been fired at from both sides: the entry and exit holes are found on the same fragment of it’s cockpit segment! Now just consider what happens when a series of anti-tank incendiary shells and splinter-explosive shells hit the cockpit. These are after all designed to destroy a modern tank. The anti-tank incendiary shells partially traversed the cockpit and exited on the other side in a slightly deformed shape. (Aviation forensic experts could possibly find them on the ground presumably controlled by the Kiev Ukrainian military; the translator). After all, their impact is designed to penetrate the solid armor of a tank. Also, the splinter-explosive shells will, due to their numerous impacts too cause massive explosions inside the cockpit, since they are designed to do this. Given the rapid firing sequence of the GSh-302 cannon, it will cause a rapid succession of explosions within the cockpit area in a very short time. Remeber each of these is sufficient to destroy a tank.
« First ‹ Previous 321 - 340 of 399 Next › Last »
Showing 20 items per page