Skip to main content

Home/ Socialism and the End of the American Dream/ Group items matching "Intercept" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Paul Merrell

iSpy: The CIA Campaign to Steal Apple's Secrets - 0 views

  • ESEARCHERS WORKING with the Central Intelligence Agency have conducted a multi-year, sustained effort to break the security of Apple’s iPhones and iPads, according to top-secret documents obtained by The Intercept. The security researchers presented their latest tactics and achievements at a secret annual gathering, called the “Jamboree,” where attendees discussed strategies for exploiting security flaws in household and commercial electronics. The conferences have spanned nearly a decade, with the first CIA-sponsored meeting taking place a year before the first iPhone was released. By targeting essential security keys used to encrypt data stored on Apple’s devices, the researchers have sought to thwart the company’s attempts to provide mobile security to hundreds of millions of Apple customers across the globe. Studying both “physical” and “non-invasive” techniques, U.S. government-sponsored research has been aimed at discovering ways to decrypt and ultimately penetrate Apple’s encrypted firmware. This could enable spies to plant malicious code on Apple devices and seek out potential vulnerabilities in other parts of the iPhone and iPad currently masked by encryption.
  • The CIA declined to comment for this story. The security researchers also claimed they had created a modified version of Apple’s proprietary software development tool, Xcode, which could sneak surveillance backdoors into any apps or programs created using the tool. Xcode, which is distributed by Apple to hundreds of thousands of developers, is used to create apps that are sold through Apple’s App Store. The modified version of Xcode, the researchers claimed, could enable spies to steal passwords and grab messages on infected devices. Researchers also claimed the modified Xcode could “force all iOS applications to send embedded data to a listening post.” It remains unclear how intelligence agencies would get developers to use the poisoned version of Xcode. Researchers also claimed they had successfully modified the OS X updater, a program used to deliver updates to laptop and desktop computers, to install a “keylogger.”
  • Other presentations at the CIA conference have focused on the products of Apple’s competitors, including Microsoft’s BitLocker encryption system, which is used widely on laptop and desktop computers running premium editions of Windows. The revelations that the CIA has waged a secret campaign to defeat the security mechanisms built into Apple’s devices come as Apple and other tech giants are loudly resisting pressure from senior U.S. and U.K. government officials to weaken the security of their products. Law enforcement agencies want the companies to maintain the government’s ability to bypass security tools built into wireless devices. Perhaps more than any other corporate leader, Apple’s CEO, Tim Cook, has taken a stand for privacy as a core value, while sharply criticizing the actions of U.S. law enforcement and intelligence agencies. “If U.S. products are OK to target, that’s news to me,” says Matthew Green, a cryptography expert at Johns Hopkins University’s Information Security Institute. “Tearing apart the products of U.S. manufacturers and potentially putting backdoors in software distributed by unknowing developers all seems to be going a bit beyond ‘targeting bad guys.’ It may be a means to an end, but it’s a hell of a means.”
Paul Merrell

New Zealand spying on Pacific allies for 'Five Eyes' and NSA, Snowden files show | US news | The Guardian - 0 views

  • The regional surveillance conducted from the base covers Tuvalu, Nauru, Kiribati, Vanuatu and the Solomon Islands. New Caledonia and French Polynesia, both French overseas territories, are also among the listed countries. Although Samoa, Fiji, Tonga and Vanuatu are named, much of their data is now transmitted via undersea cable links that are not susceptible to Waihopai’s intercept satellites. The revelations are particularly likely to test relations between New Zealand and Fiji, the island nation headed by Frank Bainimarama, the army chief-turned-prime minister. Following elections in Fiji in 2014, the countries have moved towards resuming full diplomatic links for the first time since the military coup led by Bainimarama in 2006. Andrew Little, the leader of the NZ opposition Labour party, said that while he accepted the need for security agencies to protect national interests, he was “stunned at the breadth of the information that’s been collected”.
Paul Merrell

The "Snowden is Ready to Come Home!" Story: a Case Study in Typical Media Deceit - The Intercept - 0 views

  • Most sentient people rationally accept that the U.S. media routinely disseminates misleading stories and outright falsehoods in the most authoritative tones. But it’s nonetheless valuable to examine particularly egregious case studies to see how that works. In that spirit, let’s take yesterday’s numerous, breathless reports trumpeting the “BREAKING” news that “Edward Snowden now wants to come home!” and is “now negotiating the terms of his return!” Ever since Snowden revealed himself to the public 20 months ago, he has repeatedly said the same exact thing when asked about his returning to the U.S.: I would love to come home, and would do so if I could get a fair trial, but right now, I can’t. His primary rationale for this argument has long been that under the Espionage Act, the 1917 statute under which he has been charged, he would be barred by U.S. courts from even raising his key defense: that the information he revealed to journalists should never have been concealed in the first place and he was thus justified in disclosing it to journalists. In other words, when U.S. political and media figures say Snowden should “man up,” come home and argue to a court that he did nothing wrong, they are deceiving the public, since they have made certain that whistleblowers charged with “espionage” are legally barred from even raising that defense.
  • Snowden has also pointed out that legal protections for whistleblowers are explicitly inapplicable to those, like him, who are employed by private contractors (rendering President Obama’s argument about why Snowden should “come home” entirely false). One month after Snowden was revealed, Daniel Ellsberg wrote an Op-Ed in the Washington Post arguing that Snowden did the right thing in leaving the U.S. because he would not be treated fairly, and argued Snowden should not return until he is guaranteed a fully fair trial. Snowden has said all of this over and over. In June 2013, when I asked him during the online Guardian chat why he left the U.S. for Hong Kong, he said: “the US Government, just as they did with other whistleblowers, immediately and predictably destroyed any possibility of a fair trial at home . . . That’s not justice, and it would be foolish to volunteer yourself to it if you can do more good outside of prison than in it.” In January 2014, AP reported about a new online chat Snowden gave: “Snowden said returning would be the best resolution. But Snowden said he can’t return because he wouldn’t be allowed to argue at trial that he acted in the public interest when he revealed the National Security Agency’s mass surveillance programs.” In that chat, he said: “Returning to the US, I think, is the best resolution for the government, the public, and myself.”
  • Gingrich: “I think if we can find a way to get him home, get the rest of the documents that he has not leaked . . . it’s worth doing, but I think he’d have to serve jail time, and it’d probably be fairly lengthy. I don’t think the country would tolerate this level of betrayal, not having some very significant jail time — Blitzer: “You say lengthy. What do you think? Gingrich: “I’m not an expert in this, but I’d say more than 10 years.” Where to start? First, Gingrich’s belief that it’s possible to “get the rest of the documents that he has not leaked” is simply adorable. Second, Gingrich is a fascinating choice for CNN to have pontificate on proper punishments given that he is the first House Speaker to ever be punished for ethics violations, for which he was fined $300,000. Third, David Petraeus was just allowed to plead guilty for leaking extremely sensitive secrets — not out of a whistleblowing desire to inform the public but simply to satisfy his mistress — and will almost certainly spend no time in jail; Gingrich, Blitzer, Ignatius and friends would never dare suggest that the General should go to prison (just as DC’s stern law-and-order advocates who demand Snowden’s imprisonment would never dare suggest the same for James Clapper for having lied to Congress).
  • ...1 more annotation...
  • Most important, if you were Snowden, and you constantly heard U.S. political and media elites consigning you to prison for a decade or longer before your trial started, would you remotely believe assurances that you’d get a fair trial? What rational person would ever willingly submit themselves to a penal state that imprisons more of its citizens than any other in the world, run by people with this mentality? And when you examine case studies like this of what U.S. media is not just capable of doing but eager to do — concoct a completely false narrative based on fictitious events and then proceed to spend a full day drawing all sorts of self-serving and propagandistic lessons from it — why would anyone regard what comes spewing forth from them with anything other than extreme suspicion and contempt?
Paul Merrell

Maybe Obama's Sanctions on Venezuela are Not Really About His "Deep Concern" Over Suppression of Political Rights - The Intercept - 0 views

  • The White House on Monday announced the imposition of new sanctions on various Venezuelan officials, pronouncing itself “deeply concerned by the Venezuelan government’s efforts to escalate intimidation of its political opponents”: deeply concerned. President Obama also, reportedly with a straight face, officially declared that Venezuela poses “an extraordinary threat to the national security” of the U.S. — a declaration necessary to legally justify the sanctions. Today, one of the Obama administration’s closest allies on the planet, Saudi Arabia, sentenced one of that country’s few independent human rights activists, Mohammed al-Bajad, to 10 years in prison on “terrorism” charges. That is completely consistent with that regime’s systematic and extreme repression, which includes gruesome state beheadings at a record-setting rate, floggings and long prison terms for anti-regime bloggers, executions of those with minority religious views, and exploitation of terror laws to imprison even the mildest regime critics. Absolutely nobody expects the “deeply concerned” President Obama to impose sanctions on the Saudis — nor on any of the other loyal U.S. allies from Egypt to the UAE whose repression is far worse than Venezuela’s. Perhaps those who actually believe U.S. proclamations about imposing sanctions on Venezuela in objection to suppression of political opposition might spend some time thinking about what accounts for that disparity.
  • That nothing is more insincere than purported U.S. concerns over political repression is too self-evident to debate. Supporting the most repressive regimes on the planet in order to suppress and control their populations is and long has been a staple of U.S. (and British) foreign policy. “Human rights” is the weapon invoked by the U.S. Government and its loyal media to cynically demonize regimes that refuse to follow U.S. dictates, while far worse tyranny is steadfastly overlooked, or expressly cheered, when undertaken by compliant regimes, such as those in Riyadh and Cairo (see this USA Today article, one of many, recently hailing the Saudis as one of the “moderate” countries in the region). This is exactly the tactic that leads neocons to feign concern for Afghan women or the plight of Iranian gays when doing so helps to gin up war-rage against those regimes, while they snuggle up to far worse but far more compliant regimes. Any rational person who watched the entire top echelon of the U.S. government drop what they were doing to make a pilgrimage to Riyadh to pay homage to the Saudi monarchs (Obama cut short a state visit to India to do so), or who watches the mountain of arms and money flow to the regime in Cairo, would do nothing other than cackle when hearing U.S. officials announce that they are imposing sanctions to punish repression of political opposition. And indeed, that’s what most of the world outside of the U.S. and Europe do when they hear such claims. But from the perspective of U.S. officials, that’s fine, because such pretenses to noble intentions are primarily intended for domestic consumption.
  • As for Obama’s decree that Venezuela now poses an “extraordinary threat to the national security” of the United States, is there anyone, anywhere, that wants to defend the reasonability of that claim? Think about what it says about our discourse that Obama officials know they can issue such insultingly false tripe with no consequences. But what’s not too obvious to point out is what the U.S is actually doing in Venezuela. It’s truly remarkable how the very same people who demand U.S. actions against the democratically elected government in Caracas are the ones who most aggressively mock Venezuelan leaders when they point out that the U.S. is working to undermine their government. The worst media offender in this regard is The New York Times, which explicitly celebrated the 2002 U.S.-supported coup of Hugo Chavez as a victory for democracy, but which now regularly derides the notion that the U.S. would ever do something as untoward as undermine the Venezuelan government. Watch this short video from Monday where the always-excellent Matt Lee of Associated Press questions a State Department spokesperson this week after she said it was “ludicrous” to think that the U.S. would ever do such a thing:
  • ...2 more annotations...
  • The real question is this: if concern over suppression of political rights is not the real reason the U.S. is imposing new sanctions on Venezuela (perish the thought!), what is? Among the most insightful commentators on U.S. policy in Latin America is Mark Weisbrot of Just Foreign Policy. Read his excellent article for Al Jazeera on the recent Obama decree on Venezuela. In essence, Venezuela is one of the very few countries with significant oil reserves which does not submit to U.S. dictates, and this simply cannot be permitted (such countries are always at the top of the U.S. government and media list of Countries To Be Demonized). Beyond that, the popularity of Chavez and the relative improvement of Venezuela’s poor under his redistributionist policies petrifies neoliberal institutions for its ability to serve as an example; just as the Cuban economy was choked by decades of U.S. sanctions and then held up by the U.S. as a failure of Communism, subverting the Venezuelan economy is crucial to destroying this success. As Weisbrot notes, every country in the hemisphere except for the U.S. and Canada have united to oppose U.S. sanctions on Venezuela. The Community of Latin American and Caribbean States (CELAC) issued a statement in February in response to the prior round of U.S. sanctions on Venezuela that “reiterates its strong repudiation of the application of unilateral coercive measures that are contrary to international law.” This week, the chief of the Union of South American Nations (UNASUR) issued a statement announcing that “UNASUR rejects any external or internal attempt at interference that seeks to disrupt the democratic process in Venezuela.” Weisbrot compares Obama’s decree this week on Venezuela to President Reagan’s quite similar 1985 decree that Nicaragua was a national security threat to the U.S., and notes: “The Obama administration is more isolated today in Latin America than even George W. Bush’s administration was.”
  • If Obama and supporters want the government of Venezuela to be punished and/or toppled because they refuse to comply with U.S. dictates, they should at least be honest about their beliefs so that their true character can be seen. Pretending that any of this has to do with the U.S. Government’s anger over suppression of political opponents — when their closest allies are the world champions at that — should be too insulting of everyone’s intelligence to even be an option.
Paul Merrell

After Brit spies 'snoop' on families' lawyers, UK govt admits: We flouted human rights laws * The Register - 0 views

  • The British government has admitted that its practice of spying on confidential communications between lawyers and their clients was a breach of the European Convention on Human Rights (ECHR). Details of the controversial snooping emerged in November: lawyers suing Blighty over its rendition of two Libyan families to be tortured by the late and unlamented Gaddafi regime claimed Her Majesty's own lawyers seemed to have access to the defense team's emails. The families' briefs asked for a probe by the secretive Investigatory Powers Tribunal (IPT), a move that led to Wednesday's admission. "The concession the government has made today relates to the agencies' policies and procedures governing the handling of legally privileged communications and whether they are compatible with the ECHR," a government spokesman said in a statement to the media, via the Press Association. "In view of recent IPT judgments, we acknowledge that the policies applied since 2010 have not fully met the requirements of the ECHR, specifically Article 8. This includes a requirement that safeguards are made sufficiently public."
  • The guidelines revealed by the investigation showed that MI5 – which handles the UK's domestic security – had free reign to spy on highly private and sensitive lawyer-client conversations between April 2011 and January 2014. MI6, which handles foreign intelligence, had no rules on the matter either until 2011, and even those were considered void if "extremists" were involved. Britain's answer to the NSA, GCHQ, had rules against such spying, but they too were relaxed in 2011. "By allowing the intelligence agencies free rein to spy on communications between lawyers and their clients, the Government has endangered the fundamental British right to a fair trial," said Cori Crider, a director at the non-profit Reprieve and one of the lawyers for the Libyan families. "For too long, the security services have been allowed to snoop on those bringing cases against them when they speak to their lawyers. In doing so, they have violated a right that is centuries old in British common law. Today they have finally admitted they have been acting unlawfully for years."
  • Crider said it now seemed probable that UK snoopers had been listening in on the communications over the Libyan case. The British government hasn't admitted guilt, but it has at least acknowledged that it was doing something wrong – sort of. "It does not mean that there was any deliberate wrongdoing on the part of the security and intelligence agencies, which have always taken their obligation to protect legally privileged material extremely seriously," the government spokesman said. "Nor does it mean that any of the agencies' activities have prejudiced or in any way resulted in an abuse of process in any civil or criminal proceedings. The agencies will now work with the independent Interception of Communications Commissioner to ensure their policies satisfy all of the UK's human rights obligations." So that's all right, then.
  •  
    If you follow the "November" link you'[l learn that yes, indeed, the UK government lawyers were happily getting the content of their adversaries privileged attorney-client communications. Conspicuously, the promises of reform make no mention of what is surely a disbarment offense in the U.S. I doubt that it's different in the UK. Discovery rules of procedure strictly limit how parties may obtain information from the other side. Wiretapping the other side's lawyers is not a permitted from of discovery. Hopefully, at least the government lawyers in the case in which the misbehavior was discovered have been referred for disciplinary action.  
Paul Merrell

Did NSA, GCHQ steal the secret key in YOUR phone SIM? It's LIKELY * The Register - 0 views

  • The NSA and Britain's GCHQ hacked the world's biggest SIM card maker to harvest the encryption keys needed to silently and effortlessly eavesdrop on potentially millions of people. That's according to documents obtained by surveillance whistleblower Edward Snowden and leaked to the web on Thursday. "Wow. This is huge – it's one of the most significant findings of the Snowden files so far," computer security guru Bruce Schneier told The Register this afternoon. "We always knew that they would occasionally steal SIM keys. But all of them? The odds that they just attacked this one firm are extraordinarily low and we know the NSA does like to steal keys where it can." The damning slides, published by Snowden's chums at The Intercept, detail the activities of the as-yet unheard-of Mobile Handset Exploitation Team (MHET), run by the US and UK. The group targeted Gemalto, which churns out about two billion SIM cards each year for use around the world, and targeted it in an operation dubbed DAPINO GAMMA.
  • Gemalto's hacking may also bring into question some of its other security products as well. The company supplies chips for electronic passports issued by the US, Singapore, India, and many European states, and is also involved in the NFC and mobile banking sector. It's important to note that this is useful for tracking the phone activity of a target, but the mobile user can still use encryption on the handset itself to ensure that some communications remain private. "Ironically one of your best defenses against a hijacked SIM is to use software encryption," Jon Callas, CTO of encrypted chat biz Silent Circle told The Register. "In our case there's a TCP/IP cloud between Alice and Bob and that can deal with compromised routers along the path as well as SIM issues, and the same applies to similar mobile software."
  • On Wednesday the UK government admitted that its intelligence agencies had in fact broken the ECHR when spying on communications between lawyers and those suing the British state, so GCHQ might want to reconsider that statement.
Paul Merrell

The al Qaeda Files: Bin Laden Documents Reveal a Struggling Organization - The Intercept - 0 views

  • Palm oil cultivation in West Africa, climate change, and how to kill Americans more effectively than cigarettes. These were the issues on Osama bin Laden’s mind in his final years as he struggled to direct the terrorist group’s activities from his hideout in Pakistan, according to newly released files retrieved from the compound where he was killed. Direct communications between the al Qaeda leader and his inner circle were entered as evidence in a terrorism trial recently concluded in Brooklyn, New York, effectively doubling the amount of publicly available documents recovered from bin Laden’s final hideout. Together the newly disclosed documents paint a picture of a man who, despite being holed up for years in his high-walled compound in the garrison town of Abbottabad, Pakistan, maintained a hands-on role managing al Qaeda in the face of a crippling “espionage war” and mounting bureaucratic obstacles. The emergence of the documents marks just the second time since the historic 2011 raid, which ended in the death of bin Laden, that documentary evidence recovered from his compound has been made public; 17 other documents were declassified and released to West Point’s Combating Terrorism Center in 2012.
  • The new documents were entered as evidence in the federal trial of Abid Naseer, a Pakistani national convicted of plotting with al Qaeda to carry out a bomb attack in Manchester, England between 2008 and 2009; Naseer is not mentioned in the documents. U.S. attorneys used the recovered documents to support the testimony of an FBI agent who was present when a team of U.S. Navy SEALs returned bin Laden’s body and the materials they recovered from his compound to a U.S. base in Afghanistan.
  •  
    But are the docs real or forgeries? The evidence that the Abbotabad raid killed bin Laden is beyond thin. 
Paul Merrell

The Orwellian Re-Branding of "Mass Surveillance" as Merely "Bulk Collection" - The Intercept - 0 views

  • Just as the Bush administration and the U.S. media re-labelled “torture” with the Orwellian euphemism “enhanced interrogation techniques” to make it more palatable, the governments and media of the Five Eyes surveillance alliance are now attempting to re-brand “mass surveillance” as “bulk collection” in order to make it less menacing (and less illegal). In the past several weeks, this is the clearly coordinated theme that has arisen in the U.S., UK, Canada, Australia and New Zealand as the last defense against the Snowden revelations, as those governments seek to further enhance their surveillance and detention powers under the guise of terrorism.
  • This manipulative language distortion can be seen perfectly in yesterday’s white-washing report of GCHQ mass surveillance from the servile rubber-stamp calling itself “The Intelligence and Security Committee of the UK Parliament (ISC)”(see this great Guardian Editorial this morning on what a “slumbering” joke that “oversight” body is). As Committee Member MP Hazel Blears explained yesterday (photo above), the Parliamentary Committee officially invoked this euphemism to justify the collection of billions of electronic communications events every day. The Committee actually acknowledged for the first time (which Snowden documents long ago proved) that GCHQ maintains what it calls “Bulk Personal Datasets” that contain “millions of records,” and even said about pro-privacy witnesses who testified before it: “we recognise their concerns as to the intrusive nature of bulk collection.” That is the very definition of “mass surveillance,” yet the Committee simply re-labelled it “bulk collection,” purported to distinguish it from “mass surveillance,” and thus insist that it was all perfectly legal.
  • This re-definition game goes as follows: yes, we vacuum up and store literally as much of the internet as we possibly can. Then we analyze all the data about what you’re doing, with whom you’re speaking, and who your network of associates is. Based on that analysis of all of you and your activities, we then read the communications that we want (with virtually no checks and concealing from you what percentage of it we’re reading), and store as much of the rest of it as technology permits for future trolling. But don’t worry: we’re only reading the Bad People’s emails. So run along then: no mass surveillance here. Just bulk collection! It’s not mass surveillance, but “enhanced collection techniques.”  One of the many facts that made the re-defining of “torture” so corrupt and indisputably invalid was that there was long-standing law making clear that exactly these interrogation techniques used by the U.S. government were torture and thus illegal. The same is true of this obscene attempt to re-define “mass surveillance” as nothing more than mere innocent “bulk collection.”
  • ...2 more annotations...
  • As Caspar Bowden points out, EU law is crystal clear that exactly what these agencies are doing constitutes illegal mass surveillance. From the 2000 decision of the European Court of Human Rights in Amann v. Switzerland, which found a violation of the right to privacy guaranteed by Article 8 of the European Convention on Human Rights and rejected the defense from the government that no privacy violation occurs if the data is not reviewed or exploited: The Court reiterates that the storing of data relating to the “private life” of an individual falls within the application of Article 8 § 1  . . . . The Court reiterates that the storing by a public authority of information relating to an individual’s private life amounts to an interference within the meaning of Article 8. The subsequent use of the stored information has no bearing on that finding (emphasis added). A separate 2000 ruling found a violation of privacy rights even when the government is merely storing records regarding one’s activities undertaken in public (such as attending demonstrations), because “public information can fall within the scope of private life where it is systematically collected and stored in files held by the authorities.” That’s why an EU Parliamentary Inquiry into the Snowden revelations condemned NSA and GCHQ spying in the “strongest possible terms,” pointing out that it was classic “mass surveillance” and thus illegal. That’s the same rationale that led a U.S. federal court to conclude that mass metatdata collection was very likely an unconstitutional violation of the privacy rights in the Fourth Amendment.
  • By itself, common sense should prevent any of these governments from claiming that sweeping up, storing, and analyzing much of the internet – literally examining billions of communications activities every week of entire populations – is something other than “mass surveillance.” Yet this has now become the coordinated defense from the governments in the U.S., the UK, Canada, New Zealand and Australia. It’s nothing short of astonishing to watch them try to get away with this kind of propagnadistic sophistry. (In the wake of our reports with journalist Nicky Hager on GCSB, watch the leader of New Zealand’s Green Party interrogate the country’s flailing Prime Minister this week in Parliament about this completely artificial distinction). But – just as it was stunning to watch media outlets refuse to use the term “torture” because the U.S. Government demanded that it be called something else – this Orwellian switch in surveillance language is now predictably (and mindlessly) being adopted by those nations’ most state-loyal media outlets.
Paul Merrell

MEDIA FAIL: Is the West's Coverage of Ukraine a Failure of Nuclear Proportions? - WhoWhatWhy - 0 views

  • Last July, The New York Times declared, “The Ukrainian conflict has gone on far too long, and it has become far too dangerous. There is one man who can stop it — President Vladimir Putin of Russia.” In the intervening months, the media’s assessment of Putin has only grown harsher, with his actions in Ukraine being seen as a possible prelude to a full-scale Russian invasion, along the lines of his 2008 takeover of two provinces in the nation of Georgia. But this analysis is dangerously unbalanced.
  • While Putin has made many missteps in the Ukrainian crisis–and many in Georgia in 2008–the West is far from blameless. If, as the Times asserts, it’s all Putin’s fault, then the U.S. and its allies have few options beyond waiting for him to have a sudden change of heart. But if the West can acknowledge its own mistakes and start to rectify them, that might point the way to resolving the current conflict before it escalates further, even possibly to nuclear threats. In considering options, let’s first look at the perception that Ukraine is a repeat of Putin’s land-grab in Georgia. That in turn has been compared to Hitler’s dismemberment of Czechoslovakia 70 years earlier. This analogy, with its hot-button allusion to the West’s appeasement of Nazi Germany at Munich in 1938, was promoted by, among others, former Secretary of State Hillary Clinton. But in fact, it was one-sided coverage in the mainstream Western media that created the false impression that Putin alone was responsible for the 2008 Russian-Georgian War. Disregarded in this coverage was a finding by European Union investigators that Georgia, backed by the West, had in fact fired the first shots. The EU ultimately found blame on both sides.
  • In Ukraine, Putin has justified his cross-border interventions as required to protect ethnic Russians from threats by hostile neighbors. His stated concerns may be self-serving, but not necessarily as misplaced as Western governments and media make out. Key precipitating events are left out of the narrative. For example, Western media barely covered a May 2, 2014, fire in the Black Sea port city of Odessa, where dozens of pro-Russian separatists were burned alive after they barricaded themselves in a government building to escape a violent Ukrainian mob. Ukrainian nationalists surrounded the building, sang the Ukrainian national anthem, and chanted the equivalent of “Burn, Russians, burn!” while the building went up in flames. An even more egregious failure of American mainstream media coverage in Ukraine came during the February 2014 anti-government demonstrations in Ukraine’s capital of Kiev. When sniper fire killed nearly 100 Ukrainians, Western media repeatedly stated as fact that the shots came from the forces of then-Ukrainian President Viktor Yanukovych, who had tilted toward Russia. Outrage over the deaths fueled calls for Yanukovych’s head, and on February 21 he fled the capital, eventually ending up in southern Russia, where he remains in exile.
  • ...4 more annotations...
  • But virtually ignored by the American mainstream media was a bombshell allegation by Estonian Foreign Minister Urmas Paet. On Feb. 26, 2014, Paet—no friend of Russia’s—said in an intercepted and later authenticated phone call: “There is now stronger and stronger understanding that behind [the] snipers, it was not Yanukovych, but it was somebody from the new coalition.” What Paet called “the new coalition” is essentially the West-leaning Ukrainian government that succeeded Yanukovych. (Please see the full transcript of the conversation here, the most relevant 48 seconds here, and audio of the entire conversation here.) Getting It Right In such conflicts, the truth is one of the first casualties.
  • For an American media outlet willing to tackle this issue, one has to turn to The National Interest, a specialized journal on international relations. Although its parent, The Center for the National Interest, was originally called The Nixon Center—hardly a left-wing group—it recently published “Ukraine Exposed: Kiev’s Authoritarianism” by James Carden, who served as an advisor to the U.S.-Russia Bilateral Presidential Commission at the State Department from 2011 to 2012. Questioning U.S. policy in Ukraine, Carden wrote: From the very start of the Ukraine crisis, Washington’s neoconservative lobby has sought to downplay the less appealing aspects of the government that came to power in Kiev in February. … But examples of the new authoritarianism gripping Kiev have become tougher to miss in recent months … Carden goes on to highlight a case in point. In October, Poroshenko signed a decree establishing October 14 as an official “Day of Ukrainian Defenders” to commemorate the founding of the Ukrainian Insurrectionist Army, known as the UPA, during World War II. Carden then notes:
  • As the historian Halik Kochanski has noted, the UPA worked hand in hand with Poland’s Nazi occupiers, killing, to take but one example, nearly 10,000 Poles over the night of July 11-12, 1943. “A feature of the UPA action,” according to Kochanski, “was its sheer barbarity. They were not content merely to shoot their victims but often tortured them first or desecrated their bodies afterwards.” … Don’t let anyone tell you Russia has a monopoly on “disinformation.” Thus, in its zeal to legitimize Poroshenko’s anti-Russian government in Kiev, the mainstream American media managed to ignore his commemoration of former Ukrainian atrocities. Under the Nuclear Cloud
  • The Risks of Ignorance
Paul Merrell

What's Scarier: Terrorism, or Governments Blocking Websites in its Name? - The Intercept - 0 views

  • Forcibly taking down websites deemed to be supportive of terrorism, or criminalizing speech deemed to “advocate” terrorism, is a major trend in both Europe and the West generally. Last month in Brussels, the European Union’s counter-terrorism coordinator issued a memo proclaiming that “Europe is facing an unprecedented, diverse and serious terrorist threat,” and argued that increased state control over the Internet is crucial to combating it. The memo noted that “the EU and its Member States have developed several initiatives related to countering radicalisation and terrorism on the Internet,” yet argued that more must be done. It argued that the focus should be on “working with the main players in the Internet industry [a]s the best way to limit the circulation of terrorist material online.” It specifically hailed the tactics of the U.K. Counter-Terrorism Internet Referral Unit (CTIRU), which has succeeded in causing the removal of large amounts of material it deems “extremist”:
  • In addition to recommending the dissemination of “counter-narratives” by governments, the memo also urged EU member states to “examine the legal and technical possibilities to remove illegal content.” Exploiting terrorism fears to control speech has been a common practice in the West since 9/11, but it is becoming increasingly popular even in countries that have experienced exceedingly few attacks. A new extremist bill advocated by the right-wing Harper government in Canada (also supported by Liberal Party leader Justin Trudeau even as he recognizes its dangers) would create new crimes for “advocating terrorism”; specifically: “every person who, by communicating statements, knowingly advocates or promotes the commission of terrorism offences in general” would be a guilty and can be sent to prison for five years for each offense. In justifying the new proposal, the Canadian government admits that “under the current criminal law, it is [already] a crime to counsel or actively encourage others to commit a specific terrorism offence.” This new proposal is about criminalizing ideas and opinions. In the government’s words, it “prohibits the intentional advocacy or promotion of terrorism, knowing or reckless as to whether it would result in terrorism.”
  • If someone argues that continuous Western violence and interference in the Muslim world for decades justifies violence being returned to the West, or even advocates that governments arm various insurgents considered by some to be “terrorists,” such speech could easily be viewed as constituting a crime. To calm concerns, Canadian authorities point out that “the proposed new offence is similar to one recently enacted by Australia, that prohibits advocating a terrorist act or the commission of a terrorism offence-all while being reckless as to whether another person will engage in this kind of activity.” Indeed, Australia enacted a new law late last year that indisputably targets political speech and ideas, as well as criminalizing journalism considered threatening by the government. Punishing people for their speech deemed extremist or dangerous has been a vibrant practice in both the U.K. and U.S. for some time now, as I detailed (coincidentally) just a couple days before free speech marches broke out in the West after the Charlie Hebdo attacks. Those criminalization-of-speech attacks overwhelmingly target Muslims, and have resulted in the punishment of such classic free speech activities as posting anti-war commentary on Facebook, tweeting links to “extremist” videos, translating and posting “radicalizing” videos to the Internet, writing scholarly articles in defense of Palestinian groups and expressing harsh criticism of Israel, and even including a Hezbollah channel in a cable package.
  • ...2 more annotations...
  • Beyond the technical issues, trying to legislate ideas out of existence is a fool’s game: those sufficiently determined will always find ways to make themselves heard. Indeed, as U.S. pop star Barbra Streisand famously learned, attempts to suppress ideas usually result in the greatest publicity possible for their advocates and/or elevate them by turning fringe ideas into martyrs for free speech (I have zero doubt that all five of the targeted sites enjoyed among their highest traffic dates ever today as a result of the French targeting). But the comical futility of these efforts is exceeded by their profound dangers. Who wants governments to be able to unilaterally block websites? Isn’t the exercise of this website-blocking power what has long been cited as reasons we should regard the Bad Countries — such as China and Iran — as tyrannies (which also usually cite “counterterrorism” to justify their censorship efforts)?
  • s those and countless other examples prove, the concepts of “extremism” and “radicalizing” (like “terrorism” itself) are incredibly vague and elastic, and in the hands of those who wield power, almost always expand far beyond what you think it should mean (plotting to blow up innocent people) to mean: anyone who disseminates ideas that are threatening to the exercise of our power. That’s why powers justified in the name of combating “radicalism” or “extremism” are invariably — not often or usually, but invariably — applied to activists, dissidents, protesters and those who challenge prevailing orthodoxies and power centers. My arguments for distrusting governments to exercise powers of censorship are set forth here (in the context of a prior attempt by a different French minister to control the content of Twitter). In sum, far more damage has been inflicted historically by efforts to censor and criminalize political ideas than by the kind of “terrorism” these governments are invoking to justify these censorship powers. And whatever else may be true, few things are more inimical to, or threatening of, Internet freedom than allowing functionaries inside governments to unilaterally block websites from functioning on the ground that the ideas those sites advocate are objectionable or “dangerous.” That’s every bit as true when the censors are in Paris, London, and Ottawa, and Washington as when they are in Tehran, Moscow or Beijing.
Paul Merrell

The Latest Snowden Leak Is Devastating to NSA Defenders - Conor Friedersdorf - The Atlantic - 0 views

  • Consider the latest leak sourced to Edward Snowden from the perspective of his detractors. The National Security Agency's defenders would have us believe that Snowden is a thief and a criminal at best, and perhaps a traitorous Russian spy. In their telling, the NSA carries out its mission lawfully, honorably, and without unduly compromising the privacy of innocents. For that reason, they regard Snowden's actions as a wrongheaded slur campaign premised on lies and exaggerations. But their narrative now contradicts itself. The Washington Post's latest article drawing on Snowden's leaked cache of documents includes files "described as useless by the analysts but nonetheless retained" that "tell stories of love and heartbreak, illicit sexual liaisons, mental-health crises, political and religious conversions, financial anxieties and disappointed hopes. The daily lives of more than 10,000 account holders who were not targeted are catalogued and recorded nevertheless."
  • I never thought I'd see this day: The founder of Lawfare has finally declared that a national-security-state employee perpetrated a huge civil-liberties violation! Remember this if he ever again claims that NSA critics can't point to a single serious abuse at the agency. Wittes himself now says there's been a serious abuse. The same logic applies to Keith Alexander, James Clapper, Michael Hayden, Stewart Baker, Edward Lucas, John Schindler, and every other anti-Snowden NSA defender. So long as they insist that Snowden is a narcissistic criminal and possible traitor, they have no choice but to admit that the NSA collected and stored intimate photos, emails, and chats belonging to totally innocent Americans and safeguarded them so poorly that a ne'er-do-well could copy them onto thumb drives. 
  • They have no choice but to admit that the NSA was so bad at judging who could be trusted with this sensitive data that a possible traitor could take it all to China and Russia. Yet these same people continue to insist that the NSA is deserving of our trust, that Americans should keep permitting it to collect and store massive amounts of sensitive data on innocents, and that adequate safeguards are in place to protect that data. To examine the entirety of their position is to see that it is farcical. Here's the reality. The NSA collects and stores the full content of extremely sensitive photographs, emails, chat transcripts, and other documents belong to Americans, itself a violation of the Constitution—but even if you disagree that it's illegal, there's no disputing the fact that the NSA has been proven incapable of safeguarding that data. There is not the chance the data could leak at sometime in the future. It has already been taken and given to reporters. The necessary reform is clear. Unable to safeguard this sensitive data, the NSA shouldn't be allowed to collect and store it.
  •  
    Remember Obama's famous, "No one is reading your emails" line. Either he had inadequately investigated the truth of that statement or he was lying. 
Paul Merrell

PA eyes The Hague as Abbas accuses Israel of 'genocide' | The Times of Israel - 0 views

  • he Palestinian Authority moved to join the International Criminal Court in The Hague on Wednesday, accusing Israel of committing genocide against the Palestinians amid Israel’s military campaign to stem rocket fire from the Gaza Strip
  • “It’s genocide — the killing of entire families is genocide by Israel against our Palestinian people,” he told the meeting of Palestinian leadership at his Ramallah bureau. “What’s happening now is a war against the Palestinian people as a whole and not against the [terrorist] factions.” “Shall we recall Auschwitz?” he added.
  • PA President Mahmoud Abbas called a crisis meeting of the Palestinian leadership in the afternoon with the intention of signing paperwork to apply to join the ICC in The Hague and other international organizations. Abbas charged Israel with committing “genocide” in Gaza during its Operation Protective Edge — launched to stem Hamas rocket fire on civilians across Israel — which has so far killed 43 Palestinians.
  • ...2 more annotations...
  • “We know that Israel is not defending itself; it is defending settlements, its main project,” Abbas continued. “We are moving in several ways to stop the Israeli aggression and spilling of Palestinian blood, including talking to Egyptian President [Abdel Fattah] el-Sissi and UN Secretary General Ban Ki-moon.” At the outset of peace negotiations in July 2013 the Palestinians pledged to US Secretary of State John Kerry that they would not apply for membership in international bodies during the nine-month negotiating period in return for the release of 104 Palestinian prisoners held by Israel. On April 1, 2014, Abbas surprised Israel by applying for membership in 15 international bodies and treaties, but had so far refrained from joining more robust organizations such as the International Criminal Court, where Palestinians could seek recourse for alleged Israeli war crimes.
  • Wednesday was the second day of Israel’s Operation Protective Edge. Israeli warplanes have so far hit 550 targets in Gaza. Hamas terrorists have fired 165 rockets into Israel, some of which struck Jerusalem and Tel Aviv and as far away as Hadera and Zichron Yaakov, both about 120 kilometers (75 miles) to the north of the coastal enclave. Palestinian fatalities have included terrorists but also women and children. More than 370 people have been wounded. Israel’s Iron Dome missile defense system has intercepted more than 20 rockets that were heading for residential areas.
  •  
    This is an article in an Israeli newspaper. It omits mentioning that the Palestine Authority only joined the 15 international bodies after Israel had breached the negotiation agreement by refusing to release the last batch of Palestinian prisoners.  The PA in response to Israel's renewed military attacks on Gaza now says it will join the International Criminal Court, where Israeli leaders can be charged with war crimes, with genocide quite deservedly being high on the list of potential charges. However, it's likely that the U.S. would cut off aid to the PA if it files charges against Israeli leaders. Would another nation step in to fill the funding shortfall, e.g., Russia or one of the Gulf Coast states?  Maybe we will find out.
Paul Merrell

The ultimate goal of the NSA is total population control | Antony Loewenstein | Comment is free | theguardian.com - 0 views

  • William Binney is one of the highest-level whistleblowers to ever emerge from the NSA. He was a leading code-breaker against the Soviet Union during the Cold War but resigned soon after September 11, disgusted by Washington’s move towards mass surveillance.On 5 July he spoke at a conference in London organised by the Centre for Investigative Journalism and revealed the extent of the surveillance programs unleashed by the Bush and Obama administrations.
  • “At least 80% of fibre-optic cables globally go via the US”, Binney said. “This is no accident and allows the US to view all communication coming in. At least 80% of all audio calls, not just metadata, are recorded and stored in the US. The NSA lies about what it stores.”The NSA will soon be able to collect 966 exabytes a year, the total of internet traffic annually. Former Google head Eric Schmidt once argued that the entire amount of knowledge from the beginning of humankind until 2003 amount to only five exabytes.Binney, who featured in a 2012 short film by Oscar-nominated US film-maker Laura Poitras, described a future where surveillance is ubiquitous and government intrusion unlimited.“The ultimate goal of the NSA is total population control”, Binney said, “but I’m a little optimistic with some recent Supreme Court decisions, such as law enforcement mostly now needing a warrant before searching a smartphone.”
  • It shows that the NSA is not just pursuing terrorism, as it claims, but ordinary citizens going about their daily communications. “The NSA is mass-collecting on everyone”, Binney said, “and it’s said to be about terrorism but inside the US it has stopped zero attacks.”The lack of official oversight is one of Binney’s key concerns, particularly of the secret Foreign Intelligence Surveillance Court (Fisa), which is held out by NSA defenders as a sign of the surveillance scheme's constitutionality.“The Fisa court has only the government’s point of view”, he argued. “There are no other views for the judges to consider. There have been at least 15-20 trillion constitutional violations for US domestic audiences and you can double that globally.”
  • ...4 more annotations...
  • He praised the revelations and bravery of former NSA contractor Edward Snowden and told me that he had indirect contact with a number of other NSA employees who felt disgusted with the agency’s work. They’re keen to speak out but fear retribution and exile, not unlike Snowden himself, who is likely to remain there for some time.
  • Binney recently told the German NSA inquiry committee that his former employer had a “totalitarian mentality” that was the "greatest threat" to US society since that country’s US Civil War in the 19th century. Despite this remarkable power, Binney still mocked the NSA’s failures, including missing this year’s Russian intervention in Ukraine and the Islamic State’s take-over of Iraq.The era of mass surveillance has gone from the fringes of public debate to the mainstream, where it belongs. The Pew Research Centre released a report this month, Digital Life in 2025, that predicted worsening state control and censorship, reduced public trust, and increased commercialisation of every aspect of web culture.It’s not just internet experts warning about the internet’s colonisation by state and corporate power. One of Europe’s leading web creators, Lena Thiele, presented her stunning series Netwars in London on the threat of cyber warfare. She showed how easy it is for governments and corporations to capture our personal information without us even realising.Thiele said that the US budget for cyber security was US$67 billion in 2013 and will double by 2016. Much of this money is wasted and doesn't protect online infrastructure. This fact doesn’t worry the multinationals making a killing from the gross exaggeration of fear that permeates the public domain.
  • Wikileaks understands this reality better than most. Founder Julian Assange and investigative editor Sarah Harrison both remain in legal limbo. I spent time with Assange in his current home at the Ecuadorian embassy in London last week, where he continues to work, release leaks, and fight various legal battles. He hopes to resolve his predicament soon.At the Centre for Investigative Journalism conference, Harrison stressed the importance of journalists who work with technologists to best report the NSA stories. “It’s no accident”, she said, “that some of the best stories on the NSA are in Germany, where there’s technical assistance from people like Jacob Appelbaum.” A core Wikileaks belief, she stressed, is releasing all documents in their entirety, something the group criticised the news site The Intercept for not doing on a recent story. “The full archive should always be published”, Harrison said.
  • With 8m documents on its website after years of leaking, the importance of publishing and maintaining source documents for the media, general public and court cases can’t be under-estimated. “I see Wikileaks as a library”, Assange said. “We’re the librarians who can’t say no.”With evidence that there could be a second NSA leaker, the time for more aggressive reporting is now. As Binney said: “I call people who are covering up NSA crimes traitors”.
Paul Merrell

Cash, Weapons and Surveillance: the U.S. is a Key Party to Every Israeli Attack - The Intercept - 0 views

  • The U.S. government has long lavished overwhelming aid on Israel, providing cash, weapons and surveillance technology that play a crucial role in Israel’s attacks on its neighbors. But top secret documents provided by NSA whistleblower Edward Snowden shed substantial new light on how the U.S. and its partners directly enable Israel’s military assaults – such as the one on Gaza. Over the last decade, the NSA has significantly increased the surveillance assistance it provides to its Israeli counterpart, the Israeli SIGINT National Unit (ISNU; also known as Unit 8200), including data used to monitor and target Palestinians. In many cases, the NSA and ISNU work cooperatively with the British and Canadian spy agencies, the GCHQ and CSEC. The relationship has, on at least one occasion, entailed the covert payment of a large amount of cash to Israeli operatives. Beyond their own surveillance programs, the American and British surveillance agencies rely on U.S.-supported Arab regimes, including the Jordanian monarchy and even the Palestinian Authority Security Forces, to provide vital spying services regarding Palestinian targets.
  • The new documents underscore the indispensable, direct involvement of the U.S. government and its key allies in Israeli aggression against its neighbors. That covert support is squarely at odds with the posture of helpless detachment typically adopted by Obama officials and their supporters.
  • Each time Israel attacks Gaza and massacres its trapped civilian population – at the end of 2008, in the fall of 2012, and now again this past month – the same process repeats itself in both U.S. media and government circles: the U.S. government feeds Israel the weapons it uses and steadfastly defends its aggression both publicly and at the U.N.; the U.S. Congress unanimously enacts one resolution after the next to support and enable Israel; and then American media figures pretend that the Israeli attack has nothing to do with their country, that it’s just some sort of unfortunately intractable, distant conflict between two equally intransigent foreign parties in response to which all decent Americans helplessly throw up their hands as though they bear no responsibility.
  • ...1 more annotation...
  • “The United States has been trying to broker peace in the Middle East for the past 20 years,” wrote the liberal commentator Kevin Drum in Mother Jones, last Tuesday. The following day, CNN reported that the Obama administration ”agreed to Israel’s request to resupply it with several types of ammunition … Among the items being bought are 120mm mortar rounds and 40mm ammunition for grenade launchers.” The new Snowden documents illustrate a crucial fact: Israeli aggression would be impossible without the constant, lavish support and protection of the U.S. government, which is anything but a neutral, peace-brokering party in these attacks. And the relationship between the NSA and its partners on the one hand, and the Israeli spying agency on the other, is at the center of that enabling.
  •  
    Glenn Greenwald uses Edward Snowden documents to lift the blanket of secrecy off the U.S. Dark State's carnal relationship with the Israeli apartheid government's War on Arabs, and no real surprise here, the Palestinian Authority's role as a key provider of intelligence to both Israel and the U.S. 
Gary Edwards

Great Privacy Essay: Fourth Amendment Doctrine in the Era of Total Surveillance | CIO - 0 views

  •  
    "'Failing Expectations: Fourth Amendment Doctrine in the Era of Total Surveillance' is a thought-provoking essay written by a Fordham University law professor about how the reasonable expectation test for privacy is failing to protect us. Add into our networked world the third-party doctrine and we have little protection against unreasonable searches and seizures."
  •  
    It doesn't detract substantially from the essay's central thesis, but an important part of the learned professor's heartfelt desires were delivered in a Supreme Court decision just decided, after the essay was published, Reilly v. California, http://www.supremecourt.gov/opinions/13pdf/13-132_8l9c.pdf The Court held in relevant part: "We also reject the United States' final suggestion that officers should always be able to search a phone's call log, as they did in Wurie's case. The Government relies on Smithv. Maryland, 442 U. S. 735 (1979), which held that no warrant was required to use a pen register at telephone company premises to identify numbers dialed by a particular caller. The Court in that case, however, concluded that the use of a pen register was not a "search" at all under the Fourth Amendment. See id., at 745-746. There is no dispute here that the officers engaged in a search of Wurie's cell phone. Moreover, call logs typically contain more than just phone numbers; they include any identifying information that an individual might add, such as the label "my house" in Wurie's case." The effect there was to confine Smith v. Maryland, the foundation of the third-party doctrine, to its particular facts. In other words, the third-party doctrine is now confined to connected telephone numbers, the connect time, and the duration of the call. If any other metadata is gathered, such as location data, the third-party doctrine no longer applies. When you read the rest of the Reilly decision, you see a unanimous Supreme Court shooting down one government defense after another that have been used in the NSA's defense to mass telecommunications surveillance. But most interestingly, the Court unmistakably has laid the groundwork for a later decision drastically cutting back on digital surveillance without a search warrant based on particularized probable cause to believe that evidence of a specific crime has occurred and that the requested sear
Paul Merrell

New leaker disclosing US secrets, government concludes - CNN.com - 0 views

  • The federal government has concluded there's a new leaker exposing national security documents in the aftermath of surveillance disclosures by former NSA contractor Edward Snowden, U.S. officials tell CNN. Proof of the newest leak comes from national security documents that formed the basis of a news story published Tuesday by the Intercept, the news site launched by Glenn Greenwald, who also published Snowden's leaks.
  • The article cites documents prepared by the National Counterterrorism Center dated August 2013, which is after Snowden left the United States to avoid criminal charges. Greenwald has suggested there was another leaker. In July, he said on Twitter "it seems clear at this point" that there was another. Government officials have been investigating to find out that identity.
  • It's not yet clear how many documents the new leaker has shared and how much damage it may cause. So far, the documents shared by the new leaker are labeled "Secret" and "NOFORN," which means it isn't to be shared with foreign government. That's a lower level of classification than most of the documents leaked by Snowden.
Paul Merrell

Israel Intelligence Eavesdropped on Phone Calls By John Kerry - SPIEGEL ONLINE - 0 views

  • SPIEGEL has learned from reliable sources that Israeli intelligence eavesdropped on US Secretary of State John Kerry during Middle East peace negotiations. In addition to the Israelis, at least one other intelligence service also listened in as Kerry mediated last year between Israel, the Palestinians and the Arab states, several intelligence service sources told SPIEGEL. Revelations of the eavesdropping could further damage already tense relations between the US government and Israel. During the peak stage of peace talks last year, Kerry spoke regularly with high-ranking negotiating partners in the Middle East. At the time, some of these calls were not made on encrypted equipment, but instead on normal telephones, with the conversations transmitted by satellite. Intelligence agencies intercepted some of those calls. The government in Jerusalem then used the information obtained in international negotiations aiming to reach a diplomatic solution in the Middle East.
Paul Merrell

ISPs take GCHQ to court in UK over mass surveillance | World news | theguardian.com - 0 views

  • Internet service providers from around the world are lodging formal complaints against the UK government's monitoring service, GCHQ, alleging that it uses "malicious software" to break into their networks.The claims from seven organisations based in six countries – the UK, Netherlands, US, South Korea, Germany and Zimbabwe – will add to international pressure on the British government following Edward Snowden's revelations about mass surveillance of the internet by UK and US intelligence agencies.The claims are being filed with the investigatory powers tribunal (IPT), the court in London that assesses complaints about the agencies' activities and misuse of surveillance by government organisations. Most of its hearings are held at least partially in secret.
  • The IPT is already considering a number of related submissions. Later this month it will investigate complaints by human rights groups about the way social media sites have been targeted by GCHQ.The government has defended the security services, pointing out that online searches are often routed overseas and those deemed "external communications" can be monitored without the need for an individual warrant. Critics say that such a legal interpretation sidesteps the need for traditional intercept safeguards.The latest claim is against both GCHQ, located near Cheltenham, and the Foreign Office. It is based on articles published earlier this year in the German magazine Der Spiegel. That report alleged that GCHQ had carried out an attack, codenamed Operation Socialist, on the Belgian telecoms group, Belgacom, targeting individual employees with "malware (malicious software)".One of the techniques was a "man in the middle" attack, which, according to the documents filed at the IPT, bypasses modern encryption software and "operates by interposing the attacker [GCHQ] between two computers that believe that they are securely communicating with each other. In fact, each is communicating with GCHQ, who collect the communications, as well as relaying them in the hope that the interference will be undetected."The complaint alleges that the attacks were a breach of the Computer Misuse Act 1990 and an interference with the privacy rights of the employees under the European convention of human rights.
  • The organisations targeted, the submission states, were all "responsible and professional internet service providers". The claimants are: GreenNet Ltd, based in the UK, Riseup Networks in Seattle, Mango Email Service in Zimbabwe, Jinbonet in South Korea, Greenhost in the Netherlands, May First/People Link in New York and the Chaos Computer Club in Hamburg.
  • ...1 more annotation...
  • Among the programs said to have been operating were Turbine, which automates the injection of data and can infect millions of machines and Warrior Pride, which enables microphones on iPhones and Android devices to be remotely activated.
Paul Merrell

Congress Is Irrelevant on Mass Surveillance. Here's What Matters Instead. - The Intercept - 0 views

  • The “USA Freedom Act”—the proponents of which were heralding as “NSA reform” despite its suffocatingly narrow scope—died in the august U.S. Senate last night when it attracted only 58 of the 60 votes needed to close debate and move on to an up-or-down vote. All Democratic and independent senators except one (Bill Nelson of Florida) voted in favor of the bill, as did three tea-party GOP Senators (Ted Cruz, Mike Lee, and Dean Heller). One GOP Senator, Rand Paul, voted against it on the ground that it did not go nearly far enough in reining in the NSA. On Monday, the White House had issued a statement “strongly supporting” the bill. The “debate” among the Senators that preceded the vote was darkly funny and deeply boring, in equal measure. The black humor was due to the way one GOP senator after the next—led by ranking intelligence committee member Saxby Chambliss of Georgia (pictured above)—stood up and literally screeched about 9/11 and ISIS over and over and over, and then sat down as though they had made a point.
  • So the pro-NSA Republican senators were actually arguing that if the NSA were no longer allowed to bulk-collect the communication records of Americans inside the U.S., then ISIS would kill you and your kids. But because they were speaking in an empty chamber and only to their warped and insulated D.C. circles and sycophantic aides, there was nobody there to cackle contemptuously or tell them how self-evidently moronic it all was. So they kept their Serious Faces on like they were doing The Nation’s Serious Business, even though what was coming out of their mouths sounded like the demented ramblings of a paranoid End is Nigh cult. The boredom of this spectacle was simply due to the fact that this has been seen so many times before—in fact, every time in the post-9/11 era that the U.S. Congress pretends publicly to debate some kind of foreign policy or civil liberties bill. Just enough members stand up to scream “9/11″ and “terrorism” over and over until the bill vesting new powers is passed or the bill protecting civil liberties is defeated.
  • Eight years ago, when this tawdry ritual was still a bit surprising to me, I live-blogged the 2006 debate over passage of the Military Commissions Act, which, with bipartisan support, literally abolished habeas corpus rights established by the Magna Carta by sanctioning detention without charges or trial. (My favorite episode there was when GOP Sen. Arlen Specter warned that “what the bill seeks to do is set back basic rights by some nine hundred years,” and then voted in favor of its enactment.) In my state of naive disbelief, as one senator after the next thundered about the “message we are sending” to “the terrorists,” I wrote: “The quality of the ‘debate’ on the Senate floor is so shockingly (though appropriately) low and devoid of substance that it is hard to watch.” So watching last night’s Senate debate was like watching a repeat of some hideously shallow TV show. The only new aspect was that the aging Al Qaeda villain has been rather ruthlessly replaced by the show’s producers with the younger, sleeker ISIS model. Showing no gratitude at all for the years of value it provided these senators, they ignored the veteran terror group almost completely in favor of its new replacement. And they proceeded to save a domestic surveillance program clearly unpopular among those they pretend to represent.
  • ...8 more annotations...
  • Ever since the Snowden reporting began and public opinion (in both the U.S. and globally) began radically changing, the White House’s strategy has been obvious. It’s vintage Obama: Enact something that is called “reform”—so that he can give a pretty speech telling the world that he heard and responded to their concerns—but that in actuality changes almost nothing, thus strengthening the very system he can pretend he “changed.” That’s the same tactic as Silicon Valley, which also supported this bill: Be able to point to something called “reform” so they can trick hundreds of millions of current and future users around the world into believing that their communications are now safe if they use Facebook, Google, Skype and the rest. In pretty much every interview I’ve done over the last year, I’ve been asked why there haven’t been significant changes from all the disclosures. I vehemently disagree with the premise of the question, which equates “U.S. legislative changes” with “meaningful changes.” But it has been clear from the start that U.S. legislation is not going to impose meaningful limitations on the NSA’s powers of mass surveillance, at least not fundamentally. Those limitations are going to come from—are now coming from —very different places:
  • All of that illustrates what is, to me, the most important point from all of this: the last place one should look to impose limits on the powers of the U.S. government is . . . the U.S. government. Governments don’t walk around trying to figure out how to limit their own power, and that’s particularly true of empires. The entire system in D.C. is designed at its core to prevent real reform. This Congress is not going to enact anything resembling fundamental limits on the NSA’s powers of mass surveillance. Even if it somehow did, this White House would never sign it. Even if all that miraculously happened, the fact that the U.S. intelligence community and National Security State operates with no limits and no oversight means they’d easily co-opt the entire reform process. That’s what happened after the eavesdropping scandals of the mid-1970s led to the establishment of congressional intelligence committees and a special FISA “oversight” court—the committees were instantly captured by putting in charge supreme servants of the intelligence community like Senators Dianne Feinstein and Chambliss, and Congressmen Mike Rogers and “Dutch” Ruppersberger, while the court quickly became a rubber stamp with subservient judges who operate in total secrecy.
  • There is a real question about whether the defeat of this bill is good, bad, or irrelevant. To begin with, it sought to change only one small sliver of NSA mass surveillance (domestic bulk collection of phone records under section 215 of the Patriot Act) while leaving completely unchanged the primary means of NSA mass surveillance, which takes place under section 702 of the FISA Amendments Act, based on the lovely and quintessentially American theory that all that matters are the privacy rights of Americans (and not the 95 percent of the planet called “non-Americans”). There were some mildly positive provisions in the USA Freedom Act: the placement of “public advocates” at the FISA court to contest the claims of the government; the prohibition on the NSA holding Americans’ phone records, requiring instead that they obtain FISA court approval before seeking specific records from the telecoms (which already hold those records for at least 18 months); and reducing the agency’s “contact chaining” analysis from three hops to two. One could reasonably argue (as the ACLU and EFF did) that, though woefully inadequate, the bill was a net-positive as a first step toward real reform, but one could also reasonably argue, as Marcy Wheeler has with characteristic insight, that the bill is so larded with ambiguities and fundamental inadequacies that it would forestall better options and advocates for real reform should thus root for its defeat.
  • 1) Individuals refusing to use internet services that compromise their privacy.
  • 2) Other countries taking action against U.S. hegemony over the internet.
  • 4) Greater individual demand for, and use of, encryption.
  • 3) U.S. court proceedings.
  • The “USA Freedom Act”—which its proponents were heralding as “NSA reform” despite its suffocatingly narrow scope—died in the august U.S. Senate last night when it attracted only 58 of the 60 votes needed to close debate and move on to an up-or-down vote. All Democratic and independent senators except one (Bill Nelson of Florida) voted in favor of the bill, as did three tea-party GOP Senators (Ted Cruz, Mike Lee, and Dean Heller). One GOP Senator, Rand Paul, voted against it on the ground that it did not go nearly far enough in reining in the NSA. On Monday, the White House had issued a statement “strongly supporting” the bill.
  •  
    Glenn Greenwald on why the death of the USA Freedom Act is actually a Very Good Thing. I couldn't agree more.
Paul Merrell

Wall Street is Taking Over America's Pension Plans - The Intercept - 0 views

  • Coverage of the midterm elections has, understandably, focused on the shift in political power from Democrats toward Republicans. But behind the scenes, another major story has been playing out. Wall Street spent upwards of $300M to influence the election results. And a key part of its agenda has been a plan to move more and more of the $3 trillion dollars in unguarded government pension funds into privately managed, high-fee investments — a shift that may well constitute the biggest financial story of our generation that you’ve never heard of.
  • But Wall Street’s agenda goes beyond any one election cycle. It has been fighting to turn public pensions into private profits for quite some time, steering retirement nest eggs into investments that are complex, charge hefty fees, and that generate big profits for management firms. And it has been succeeding. Of the $3 trillion in public assets currently in pension funds throughout the country, almost a quarter of that has already found its way into so-called “alternative investments” like hedge funds, private equity and real estate. That translates to roughly $660 billion of public money now under private management, invested in assets that are often arcane and opaque but that offer high management and placement fees to Wall Street financiers.
  • If all this wasn’t egregious enough, a huge preponderance of evidence suggests that this massive transfer of wealth from public to private management is having a corrupting effect on the political process. Sirota’s reporting seems to have particularly touched a nerve with New Jersey Governor Chris Christie, who has described Sirota as “a hack” and “not a journalist”. It’s not difficult to see why Christie isn’t a fan. Earlier this year, Sirota wrote that… 43 financial firms managing New Jersey pension money have spent a total of $11.6 million on contributions to New Jersey politicians… Many of those donations have gone directly to Gov. Christie’s election campaign … Additionally, many of the contributions came either just before or just after the Christie administration awarded the firms multi-million-dollar pension management contracts. Those 43 firms ended up managing around $14 billion dollars of state pension money, a take that serves as a timeless reminder of the great rewards that can derive from catering to the needs of receptive politicians.
  • ...1 more annotation...
  • Christie’s tenure as New Jersey governor has been particularly emblematic of the extent of Wall Street’s reach into the public sphere. Among other things, he installed a private equity investor as the state’s pension overseer and publicly lied about the manner in which pension fund investment decisions are made. Ironically enough, he’s defended these practices in his own state while criticizing Democrats for utilizing them through his position as chair of the Republican Governor’s Association.
« First ‹ Previous 321 - 340 of 373 Next › Last »
Showing 20 items per page