Skip to main content

Home/ Socialism and the End of the American Dream/ Group items matching "Security" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Gary Edwards

Why Progressives Don't Understand And Are Enemies Of Liberty | Western Free Press - 0 views

  • For a classical liberal, freedom means that each individual possesses as a human being certain inviolable rights, those being rights to his life, liberty and honestly acquired property. And that human relationships should be based on voluntary consent and mutual agreement. For my interlocutor, freedom means “empowerment” or the ability to do or achieve certain things, without which “freedom” is not complete. These include a minimum or “decent” standard of living and the ability to attain certain potentials in life, which are everyone’s “right” as a member of society.
  • For my fellow conversationalist, society is a shared “community” of human beings each of whom owes certain things to the others, just as the others owe certain things to us. Society might be viewed as an extended family, from this perspective, all the members of which have certain required obligations to support and give assistance to their social “relatives.” I suggested that society is a network of human relationships formed between individuals based upon opportunities for mutual betterment, including both the economic and the cultural in the widest sense, the fundamental foundation of which derives from those essential individual rights.
  • French eighteenth century philosopher, Jean-Jacque Rousseau, who reasoned that man began as savages in the wild threatened by both beast and other men. Everyone entered into a social contract and formed society for mutual safety and betterment by giving up a portion of their complete and unrestrained “freedom” in that earlier setting of savagery for the order and security of shared community. The freedom given up is compensated by safety and the security of mutual aid, including the modern welfare state.
  • ...10 more annotations...
  • British philosopher, John Locke, who argued that rights are not bestowed upon man by government or the community but belong to him by his nature as a human being. Government, in Locke’s social contract, is to provide individuals with a tool for the common defense against the violence of some of their fellow men. The role of government is the securer of liberty by protecting each individual’s rights to his life, liberty and property, and not as a guarantor of a certain standard of living or desired access to various material things.
  • The reason, I said, was that if the government undertook this latter responsibility of “social safety nets” and “positive” access to various other desired states of affairs, it can do so only by imposing through police power an obligation on others to provide the material means that some others are to be guaranteed. By doing so, government would be violating its original purpose for being brought into existence: the protecting of liberty (including people’s property rights to their own honestly earned income and wealth) rather than a violator that takes from some without their consent for the asserted benefits of others.
  • The world is to be reduced to and confined within a narrow corridor of forms of “good behavior” that people will be either penalized for violating or subsidized for doing through government regulation and spending.
  • Progressives Cling to Collectivism Here, in my opinion, are some of the essential issues and dilemmas facing the advocate of individual liberty, free markets, and constitutionally limited government. Too many of our fellow citizens do not believe that individuals have a right to live for themselves. They truly and honestly believe that “society,” “community,” the collective, is something independent of the distinct individuals who comprise it, and for which the individual is morally, politically and legally obligated to serve and sacrifice for. Police power is a legitimate and appropriate tool of enforcing these obligations and duties, if resistance or indifference is experienced among the citizens in the undertaking of these activities.
  • For the “progressive,” government is “society’s” agent to undertake the tasks of “social justice” and “entitlement” that are owed to each member and to which everyone is required to provide their contribution.  Police power is the means by which everyone is made to contribute their “social dues” in the form of either obedience to government regulations or payment of taxes for redistributive purposes.
  • Liberty and the Meaning of Society and the “Social” For the classical liberal or libertarian, on the other hand, government is considered an agency for the protection of each individual’s rights. “Society” is comprised of the networks of relationships and associations formed by individuals and in which they interact for various fulfillments of human happiness and well-being.
  • The purpose of government in the classical liberal or libertarian perspective is to assure the security and protection from private plunder and violence that would disrupt or disturb the peaceful pursuits that individuals find it useful and enjoyable and fulfilling to follow through various and diverse associations of civil society.
  • Furthermore, the interventionist-welfare state undermines people’s personal and financial ability to participate in those acts and associations of benevolence towards others that they are called by their conscience to pursue in the ways they consider best and most likely of success. The redistributive state arrogantly replaces each person’s personal judgment and decision with that of the self-appointing “experts” who claim to speak and know best for society through the coercive arm of government.
  • Matching these ethical issues of the rights of the individual to live and act peacefully for himself as he sees best, the “progressive” often demonstrates a blinding degree of ignorance and misinformation about the workings of a competitive market economy, the nature of the profit and loss system, and the “invisible hand” of competitive cooperation through the peaceful and the voluntarist pursuit of self-interest. He suffers from a confused, garbled, and contradictory grab bag of ideas derived from Marxism, Fabian socialism, nationalism, fascism, and, though it would be radically and vehemently denied, often-subtle forms of racism, as well.
  • Through all the progressive’s rhetoric about “democracy” and “equality” and “social justice” and “diversity,” theirs is a political philosophy and public policy ideology of elitism, hubris, and authoritarianism dominated by the idea and ideal of remaking human beings, human relationships and the structure and order of society into redesigned patterns and shapes that reflect their notion of how people should live, work, associate and earn a living.
  •  
    "Conflicting Meanings of Freedom For a classical liberal, freedom means that each individual possesses as a human being certain inviolable rights, those being rights to his life, liberty and honestly acquired property. And that human relationships should be based on voluntary consent and mutual agreement. For my interlocutor, freedom means "empowerment" or the ability to do or achieve certain things, without which "freedom" is not complete. These include a minimum or "decent" standard of living and the ability to attain certain potentials in life, which are everyone's "right" as a member of society. For my fellow conversationalist, society is a shared "community" of human beings each of whom owes certain things to the others, just as the others owe certain things to us. Society might be viewed as an extended family, from this perspective, all the members of which have certain required obligations to support and give assistance to their social "relatives." I suggested that society is a network of human relationships formed between individuals based upon opportunities for mutual betterment, including both the economic and the cultural in the widest sense, the fundamental foundation of which derives from those essential individual rights. The "Social Contract": Individualist or Collectivist? My dinner companion raised the issue of "the social contract," to which we are all participants and benefactors, he said. He referenced the famous French eighteenth century philosopher, Jean-Jacque Rousseau, who reasoned that man began as savages in the wild threatened by both beast and other men. Everyone entered into a social contract and formed society for mutual safety and betterment by giving up a portion of their complete and unrestrained "freedom" in that earlier setting of savagery for the order and security of shared community. The freedom given up is compensated by safety and the security of mutual aid, including the modern welf
Paul Merrell

Securing Our Digital Economy | Internet Society - 0 views

  • Germany wants G20 leaders to agree to a concrete plan – one that includes affordable Internet access across the world by 2025, common technical standards and a focus on digital learning. Today, the G20 economies, like so many other economies around the world, are digital and interconnected. Digital services have opened up new avenues for sustainable economic growth. But, the digital economy will only continue to thrive and generate opportunities for citizens if the Internet is strong, secure, and trusted. Without this foundation, the global digital economy is at risk. Currently, there are 360 million people that take part in cross-border e-commerce. 28% of output in mature economies is digital. The Internet is set to contribute $6.6 trillion a year, or 7.1% of the total GDP in the G20 countries. And, by 2020, it’s estimated that more than 1 billion users will be added and there will be 30-50 billion additional connected devices. This level of interconnection will only boost the market. However, this cannot happen without a serious commitment by all parties to security and privacy. The truth is that economies can only function within a secure and trusted environment. Which brings us to encryption. Strong encryption is an essential piece to the future of the world’s economy and the Internet Society believes it should be the norm for all online transactions. It allows us to do our banking, conduct local and global business, run our power grids, operate, communications networks, and do almost everything else.
  • Encryption is a technical building block for securing infrastructure, communications and information. It should be made stronger and universal, not weaker. However, rather than being recognized as the way to secure our online transactions or our conversations, all too often the debate focuses on the use of encryption as a way to thwart law enforcement. To undermine the positive role of encryption in the name of security could have devastating consequences. Many great minds have already devoted considerable effort to resolving the conundrum posed by competing public policy objectives: providing security, safety and trust on the one hand, and law enforcement and legitimate policy goals on the other. But, it is time to stop kicking the encryption football up and down the field. Instead, we should recognize that encryption is key to the future digital economy and stop treating it as simply an obstacle to law enforcement. We need to deconstruct the issues faced by law enforcement and policy makers and agree together how we can achieve a trusted digital economy underpinned by encryption. This is the first time the G20 countries are holding a Ministerial on digital matters. It is also the first time that the G20 is inviting non-government stakeholders to contribute to these issues. This is a turning point that should not be missed. All views, including the technical perspective, must be at the table if we are to achieve progress on the G20’s ICT goals. If the G20 countries are serious about strengthening their economies and continuing to deliver economic and social prosperity to their citizens in future, there are three key principles they should endorse and implement immediately:
  • 1. Encryption is an important technical foundation for trust in the digital economy and should be the norm. All users (whether government, business or individual) should use encryption to protect infrastructure, communications and the privacy and integrity of their data. Encryption technologies should be strengthened, not weakened. 2. The security of the digital economy is a shared responsibility that needs the expertise and experience of all stakeholders, across border and across disciplines. It is an urgent need that will require open, inclusive collaboration. 3. Users’ rights should be at the heart of any decisions related to the digital economy. They are both the customers and the contributors to the success of the digital economy. The Internet Society calls for ubiquitous encryption for the Internet. We strongly believe that this is the best foundation for trust in the digital economy, and we urge the G20 nations to stand behind encryption.
Paul Merrell

FBI sharply increases use of Patriot Act provision to collect US citizens' records - Open Channel - 0 views

  • The FBI has dramatically increased its use of a controversial provision of the Patriot Act to secretly obtain a vast store of business records of U.S. citizens under President Barack Obama, according to recent Justice Department reports to Congress. The bureau filed 212 requests for such data to a national security court last year – a 1,000-percent increase from the number of such requests four years earlier, the reports show. Follow @openchannelblog The FBI’s increased use of the Patriot Act’s “business records” provision — and the wide ranging scope of its requests -- is getting new scrutiny in light of last week’s disclosure that that the provision was used to obtain a top-secret national security order requiring telecommunications companies to turn over records of millions of telephone calls. Advertise | AdChoices Taken together, experts say, those revelations show the government has broadly interpreted the Patriot Act provision as enabling it to collect data not just on specific individuals, but on millions of Americans with no suspected terrorist connections. And it shows that the Foreign Intelligence Surveillance Court  accepted that broad interpretation of the law.
  • “That they were using this (provision) to do mass collection of data is definitely the biggest surprise,” said Robert Chesney, a top national security lawyer at the University of Texas Law School. “Most people who followed this closely were not aware they were doing this.  We’ve gone from producing records for a particular investigation to the production of all records for a massive pre-collection database. It’s incredibly sweeping.”  
  • But little-noticed statements by FBI Director Robert Mueller in recent years – as well as interviews with former senior law enforcement officials – hint at what Chesney calls a largely unnoticed “sea change” in the way the U.S. government collects data for terrorism and other national security investigations.
  • ...5 more annotations...
  • The Patriot Act provision, known as Section 215, allows the FBI to require the production of business records and any other “tangible things” -- including “books, records, papers, documents and other items,” for an authorized terrorism or foreign intelligence investigation. The Patriot Act was a broad expansion of law enforcement powers enacted by Congress with overwhelming bipartisan support in the aftermath of the Sept. 11, 2001, terrorist attacks. In addition to Section 215, other provisions expanded the FBI’s power to issue so-called “national security letters,” requiring individuals and business to turn over a more limited set of records without any court order at all.  Advertise | AdChoices In contrast to standard grand jury subpoenas, material obtained under both Section 215 orders and national security letters must be turned over under so-called “gag orders” that forbid the business or institution that receives the order from notifying its customers or publicly referring to the matter.
  • From the earliest days of the Patriot Act, Section 215 was among the most hotly disputed of its provisions. Critics charged the language – “tangible things” -- was so broad that it would even permit the FBI to obtain library and bookstore records to inspect what citizens were reading.Ashcroft confronted criticismLargely to tamp down those concerns, then-Attorney General John Ashcroft declassified information about the FBI’s use of the provision in September 2003, saying in a statement that “the number of times Section 215 has been used to date is zero.” Ashcroft added that he was releasing the information “to counter the troubling amount of public distortion and misinformation” about Section 215. But in the years since, the FBI’s use of Section 215 quietly exploded, with virtually no public notice or debate. In 2009, as part of an annual report to Congress, the Justice Department reported there had been 21 applications for business records to the Foreign Intelligence Surveillance Court (FISC) under Section 215 – all of which were granted, though nine were modified by the court. (The reports do not explain how or why the orders were modified.) 
  • In 2010, the number of requests jumped to 205 (all again granted, with 176 modified.) In the latest report filed on April 30, the department reported there had been 212 such requests in 2012 – all approved by the court, but 200 of them modified.These sharp increase in the use of Section 215 has drawn little attention until now because the number of national security letters (NSLs) issued by the bureau has been so much greater -- 15,229 in 2012. But FBI Director Mueller, in little-noticed written responses to Congress two years ago, explained that the bureau was encountering resistance from telecommunications companies in turning over “electronic communication transaction” records in response to national security letters.“Beginning in late 2009, certain electronic communications service providers no longer honored NSLs to obtain” records because of what their lawyers cited as “an ambiguity” in the law. (What Mueller didn’t say was this came at a time when all the major telecommunications companies were still facing lawsuits over their cooperation with the government on surveillance programs.) As a result, Mueller said, the FBI had switched over to demanding the same data under Section 215. “This change accounts for a significant increase in the volume of business records requests,” Mueller wrote.
  • Saying they wanted to put an end to “secret law,  eight U.S. senators — led by Sens. Jeff Merkley, D-Ore., and Mike Lee, R-Utah — on Tuesday introduced a bill to require the Justice Department to declassify national security court decisions that have permitted the use of the “business records” provision for such purposes.
  • The motion also asks the court to consider the constitutionality of the “gag order” written into Section 215.“There should be no room for secret law,” said Jameel Jaffer, the ACLU’s deputy legal director, adding that disclosure of the FISC rulings is essential if the debate Obama called for is to take place. “The public has a right to know what limits apply to the government’s surveillance authority, and what safeguards are in place to protect individual privacy.” 
Paul Merrell

HTTPS Deployment Growing by Leaps and Bounds: 2016 in Review | Electronic Frontier Foundation - 0 views

  • This was a great year for adoption of HTTPS encryption for secure connections to websites. HTTPS is an essential technology for security and privacy on the Web, and we've long been asking sites to turn it on to protect their users from spying (and from censorship and tampering with site content). This year, lots of factors came together to make it happen, including ongoing news about surveillance, advances in Web server capacity, nudges from industry, government, and Web browsers, and the Let's Encrypt certificate authority. By some measures, more than half of page loads in Firefox and in Chrome are now secured with HTTPS—the first time this has ever happened in the Web's history. That's right: for the first time ever, most pages viewed on the Web were encrypted! (As another year-in-review post will discuss, browsers are also experimenting with and rolling out stronger encryption technologies to better protect those connections.)
  • Sites large and small took turned on HTTPS in 2016, often using certificates from the Let's Encrypt certificate authority (sometimes with EFF's Certbot software, or a range of other options). In just a single year of broad public availability, Let's Encrypt has now helped enable secure connections for over 21 million websites, most of which never had certificates before.
  • A sizeable part of the growth in HTTPS came from very large hosting providers that decided to make HTTPS a default for sites that they host, including OVH, Wordpress.com, Shopify, Tumblr, Squarespace, and many others. Sites they host, and visitors to those sites, can get a boost in security without having to do anything. (And we're getting ongoing benefits from providers like CloudFlare who made the switch in previous years.) A single hosting provider's decision can result in enabling encryption for hundreds of thousands or millions of customers; we hope others will take the plunge too! U.S. government sites also made significant progress adopting HTTPS this year, responding to the administration's guidance in support of HTTPS—a clear and practical explanation of why secure connections should be the default. A caveat: data from Google shows that use of HTTPS varies significantly from country to country, remaining especially uncommon in Japan. We've also heard that it's still uncommon across much of East and Southeast Asia. Next year, we'll have to find ways to bridge those gaps.
Paul Merrell

TGIF: The Phony Trade-off between Privacy and Security The Future of Freedom Foundation - 0 views

  • Most people take it for granted — because they’ve heard it so many times from politicians and pundits — that they must trade some privacy for security in this dangerous world. The challenge, we’re told, is to find the right “balance.” Let’s examine this.
  • In other words, in the freed market I would find the right “balance” for myself, and you would do the same. One size wouldn’t be deemed to fit all. The market would cater to people with a range of security/privacy concerns, striking the “balance” differently for different people. That’s as it should be. Actually, we can say that there would be no trade-off between privacy and security at all, because the information would be voluntarily disclosed by each individual on mutually acceptable terms. Under those circumstances, it wouldn’t be right to call what the firm does an “intrusion.” But that sort of situation is not what Barack Obama, Mike Rogers, Peter King, and their ilk mean when they tell us that “we” need to find the right balance between security and privacy. They mean they will dictate to us what the alleged balance will be. We will have no real say in the matter, and they can be counted on to find the balance on the “security” side of the spectrum as suits their interests. That’s how these things work.
  • where the state is concerned, you can’t trade off privacy against security because they’re exactly the same thing.
Paul Merrell

Engendering Crises to Justify the National Security State The Future of Freedom Foundation - 0 views

  • The latest issue of Time magazine, one of the very models of the mainstream press, says it all: “NATO’s Back in Business, Thanks to Russia’s Threat to Ukraine.” The basic theme of the article is that we should be thankful that NATO didn’t go out of business when the Cold War ended. Russia’s aggression against Ukraine, the article suggests, proves that keeping NATO in existence was a wise decision. What a crock.
  • The best thing the American people could have ever done is not having embraced the totalitarian-type apparatus known as the national-security state. In the name of fighting communism, it caused America to abandon its founding principles and ideals of liberty and limited government and turned America toward dark side practices that characterize communist and other totalitarian regimes. The next-best thing the American people could have done is having dismantled the national-security state apparatus at the end of the Cold War. The best thing the American people could do today is dismantle, not reform, the national-security state apparatus. That’s a key to restoring a balanced, harmonious, peaceful, moral, free, and prosperous society to our land.
  •  
    Excellent essay that laces together the history of the security state and national "defense."
Gary Edwards

Mideast war in March? - 1 views

  • NATO war in Syria in March? Meanwhile, according to the Middle Eastern diplomatic and security officials speaking to WND, the international community is considering launching NATO airstrikes on Assad’s forces as soon as March if the opposition does not make major strides toward ending Assad’s regime. The NATO members, however, have been satisfied with the momentum of the opposition in the last few days, which saw a number of defectors from the Syrian military join the rebels, a move that also precipitated the downfall of Muammar Gadhafi’s regime before the NATO campaign in Libya. Similar to Gadhafi, Assad’s regime has been accused of major human rights violations, including crimes against humanity, in clamping down on a violent insurgency targeting his rule.
  • Mass demonstrations were held in recent weeks in Syrian insurgent strongholds calling for the international NATO coalition in Libya to deploy in Syria. Just yesterday, 50 foreign ministers from Western and Arab nations got together in Tunis to demand that Syria allow aid to be delivered to civilians in the absence of any international force to resolve the conflict. Damascus officials claimed to WND that NATO troops are currently training in Turkey for a Turkish-led NATO invasion of Syria.
  • Any deployment would most likely come under the banner of the same “Responsibility to Protect” global doctrine used to justify the U.S.-NATO airstrikes in Libya.
  • ...3 more annotations...
  • Responsibility to Protect, or Responsibility to Act, as cited by President Obama, is a set of principles, now backed by the United Nations, based on the idea that sovereignty is not a privilege but a responsibility that can be revoked if a country is accused of “war crimes,” “genocide,” “crimes against humanity” or “ethnic cleansing.”
  • George Soros-funded doctrine
  • In his address to the nation in April explaining the NATO campaign in Libya, Obama cited Responsibility to Protect doctrine as the main justification for U.S. and international airstrikes against Libya. The Global Center for Responsibility to Protect is the world’s leading champion of the military doctrine. As WND reported, billionaire activist George Soros is a primary funder and key proponent of the Global Center for Responsibility to Protect. Several of the doctrine’s main founders also sit on boards with Soros.
  •  
    Marbux is right - this report is filled with stunning information! "TEL AVIV - NATO countries are strongly considering the possibility of an international deployment to Syria if the Syrian opposition does not make major advances in the next few weeks, according to informed Middle Eastern diplomatic and security officials. Egyptian security officials, meanwhile, outlined what they said was large scale international backing for the rebels attacking the embattled regime of Syrian President Bashar Assad - including arms and training from the U.S., Turkey, Jordan and Saudi Arabia."
  •  
    One key point is that this article was published on February 24, 2012, long before the false flag sarin gas attack in late August of 2013 that was falsely attributed to the Assad government of Syria. Planning for a Libya-like NATO invasion of Syria was underway long before that attack. And the report gives us the information that the shipment of arms to and training of the Syrian opposition was already underway at that early date, if the report is accurate. All such activities were later confirmed by mainstream media, although I have not found any such reports that provide a beginning date. Hence the value of this report. The report also goes into some detail on the emerging international law norm of Responsibility to Protect ("RTP"), but misses some key aspects. RTP doctrine was an innovation in international law in response to massive genocidal events such as the Rwandan and Srebrenica Massacres. As international law stood before RTP, what happened entirely within the borders of a nation was an aspect of national sovereignty that international law could not interfere with. RTP cracked that barrier, holding that some human rights were so important that they deserved protection by international law, therefore the United Nations Security Council would be empowered to authorize intervention in cases involving wholly domestic genocide, war crimes, ethnic cleansing, and crimes against humanity. But omitted from the article is the fact that it is a doctrine to be exercised only by the U.N. Security Council; individual nations gain no license under the doctrine to launch their own wars to protect the citizens of another nation, whether directly or through proxies such as jihadi mercenaries. Russia has, quite properly in my opinion, vetoed U.S. sponsored draft resolutions based on RTP for Security Council authorization to intervene in Syria, because the U.S. is already an unlawful belligerent in Syria and because the U.S. so severely abused the Security Council's RTP r
Paul Merrell

Hackers Stole Secrets of U.S. Government Workers' Sex Lives - The Daily Beast - 0 views

  • It was already being described as the worst hack of the U.S. government in history. And it just got much worse.A senior U.S. official has confirmed that foreign hackers compromised the intimate personal details of an untold number of government workers. Likely included in the hackers’ haul: information about workers’ sexual partners, drug and alcohol abuse, debts, gambling compulsions, marital troubles, and any criminal activity.Those details, which are now presumed to be in the hands of Chinese spies, are found in the so-called “adjudication information” that U.S. investigators compile on government employees and contractors who are applying for security clearances. The exposure suggests that the massive computer breach at the Office of Personnel Management is more significant and potentially damaging to national security than officials have previously said.
  • Three former U.S. intelligence officials told The Daily Beast that the adjudication information would effectively provide dossiers on current and former government employees, as well as contractors. It gives foreign intelligence agencies a roadmap for finding people with access to the government’s most highly classified secrets.Obama administration officials had previously acknowledged the breach of information that applicants voluntarily disclose on a routine questionnaire, called Standard Form 86, but the theft of the more detailed and wide-ranging adjudication information appears to have gone overlooked.
  • “Whoever compromised the adjudication information is going to have clear knowledge, beyond what’s in the SF86, about who the best targets for espionage are in the United States,” Michael Adams, a computer security expert who served more than two decades in the U.S. Special Operations Command, told The Daily Beast. “This is the most successful cyber attack in the history of the United States,” owing to the amount and quality of the information that was stolen, Adams said. U.S. intelligence officers spend years trying to recruit foreign spies to gather the kinds of details and insights that are contained in adjudication information, one former senior U.S. official said. This official, who requested anonymity, added that adjudication information would give foreign intelligence services “enormous leverage” over U.S. personnel whom they might forcibly interrogate for information or try to recruit.
  • ...4 more annotations...
  • The adjudication process had a broad scope, taking into account the SF86 questionnaire, reports from background investigations, interviews with the applicant's family members and associates, his or her employment history, and for people seeking high-level clearances, the results of polygraph investigations.Seymour said such records “span an employee’s career” and could stretch back as far as 30 years. Officials have said that as many as 18 million people may have been affected by the breach. Asked specifically what information the hackers had obtained, Seymour told lawmakers that she preferred to answer later in a “classified session.” Seymour didn’t specify how many people’s information was stolen. But the OPM oversees background investigations, which comprise a key part of the adjudication process, for more than 90 percent of security clearance applicants, according to the Congressional Research Service. An OPM spokesman didn’t respond to a request for comment in time for publication.
  • A former senior U.S. intelligence official, who asked to remain anonymous, said the OPM breach would cause more damage to national security operations and personnel than the leaks by Edward Snowden about classified surveillance by the National security Agency.“This is worse than Snowden, because at least programs that were running before the leaks could be replaced or rebuilt,” the former official said. “But OPM, that’s the gift that keeps on giving. You can’t rebuild people.”Adjudicators are in a powerful position because in deciding whether to recommend granting a security clearance, they have access to the entire scope of an applicant’s file and are told to make a subjective analysis.“The adjudication process is the careful weighing of a number of variables known as the whole-person concept,” according to official guidelines. “Available, reliable information about the person, past and present, favorable and unfavorable, should be considered in reaching a determination.”
  • By design, adjudication is an invasive process, meant to unearth risk factors including drug and alcohol abuse, extramarital affairs, a history of violence, and other events that speak to a person’s “trustworthiness” and their susceptibility to blackmail or being recruited to spy for a foreign government.For instance, “compulsive gambling is a concern, as it may lead to financial crimes including espionage,” the guidelines say. Adjudicators are told to note “a pattern of compulsive, self-destructive, or high risk sexual behavior,” “relapse after diagnosis of alcohol abuse,” and “emotionally unstable, irresponsible, dysfunctional, violent, paranoid, or bizarre behavior,” among other warning signs in 13 categories. Some of the embarrassing personal details found in some adjudications have been made public. That’s what happens after an applicant who was denied a security clearance launched an appeal.
  • Armed with such intimate details of a person’s worst moments, foreign spies would have unprecedented advantage against their U.S. adversaries. And the news is especially bad for people who hold the highest levels of clearance, which require more rigorous background checks, noted Adams, the computer security expert. “The higher up you go in your sensitivity levels, the more data that’s in your adjudication file,” he said.
Paul Merrell

Pentagon report: scope of intelligence compromised by Snowden 'staggering' | World news | The Guardian - 0 views

  • • Classified assessment describes impact of leaks as 'grave' • Report does not include specific detail to support conclusions• 12 of 39 heavily redacted pages released after Foia request• Read the full Defense Intelligence Agency report
  • A top-secret Pentagon report to assess the damage to national security from the leak of classified National security Agency documents by Edward Snowden concluded that “the scope of the compromised knowledge related to US intelligence capabilities is staggering”.The Guardian has obtained a copy of the Defense Intelligence Agency's classified damage assessment in response to a Freedom of Information Act (Foia) lawsuit filed against the Defense Department earlier this year. The heavily redacted 39-page report was prepared in December and is titled “DoD Information Review Task Force-2: Initial Assessment, Impacts Resulting from the Compromise of Classified Material by a Former NSA Contractor.”But while the DIA report describes the damage to US intelligence capabilities as “grave”, the government still refuses to release any specific details to support this conclusion. The entire impact assessment was redacted from the material released to the Guardian under a presidential order that protects classified information and several other Foia exemptions.Only 12 pages of the report were declassified by DIA and released. A Justice Department attorney said DIA would continue to process other internal documents that refer to the DIA report for possible release later this year.
  • The classified damage assessment was first cited in a news report published by Foreign Policy on January 9. The Foreign Policy report attributed details of the DIA assessment to House intelligence committee chairman Mike Rogers and its ranking Democrat Dutch Ruppersberger. The lawmakers said the White House had authorized them to discuss the document in order to undercut the narrative of Snowden being portrayed as a heroic whistleblower.The DIA report has been cited numerous times by Rogers and Rusppersberger and other lawmakers who claimed Snowden’s leaks have put US personnel at risk.
  • ...8 more annotations...
  • But details to back up Rogers' claims are not included in the declassified material released to the Guardian.Neither he nor any other lawmaker has disclosed specific details from the DIA report but they have continued to push the “damage” narrative in interviews with journalists and during appearances on Sunday talk shows.
  • The declassified material does not state the number of documents Snowden is alleged to have taken, which Rogers and Ruppersberger have claimed, again citing the DIA’s assessment, was 1.7m. Nor does the declassified portion of the report identify Snowden by name.“[Redacted] a former NSA contractor compromised [redacted] from NSA Net and the Joint Worldwide Intelligence Communications System (JWICS),” the report says. “On 6 June 2013, media groups published the first stories based on this material, and on 9 June 2013 they identified the source as an NSA contractor who had worked in Hawaii.”JWICS is identified as a “24 hour a day network designed to meet the requirements for secure [top-secret/sensitive compartmented information] multi-media intelligence communications worldwide. The Defense Intelligence Agency (DIA) has directed that all Special Security Offices (SSOs) will install the JWICS.”The Washington Post, quoting anonymous sources, reported last October that Snowden “lifted the documents from a top-secret network run by the Defense Intelligence Agency and used by intelligence arms of the Army, Air Force, Navy and Marines.” The Post further claimed that Snowden “took 30,000 documents that involve the intelligence work of one of the services” and that he gained access to the documents through JWICS.
  • A top-secret Pentagon report to assess the damage to national security from the leak of classified National security Agency documents by Edward Snowden concluded that “the scope of the compromised knowledge related to US intelligence capabilities is staggering”. The Guardian has obtained a copy of the Defense Intelligence Agency's classified damage assessment in response to a Freedom of Information Act (Foia) lawsuit filed against the Defense Department earlier this year. The heavily redacted 39-page report was prepared in December and is titled “DoD Information Review Task Force-2: Initial Assessment, Impacts Resulting from the Compromise of Classified Material by a Former NSA Contractor.” But while the DIA report describes the damage to US intelligence capabilities as “grave”, the government still refuses to release any specific details to support this conclusion. The entire impact assessment was redacted from the material released to the Guardian under a presidential order that protects classified information and several other Foia exemptions.
  • Only 12 pages of the report were declassified by DIA and released. A Justice Department attorney said DIA would continue to process other internal documents that refer to the DIA report for possible release later this year. Steven Aftergood, director of the Project on Government Secrecy at the Federation of American Scientists, questioned the decision to withhold specific details. "The essence of the report is contained in the statement that 'the scope of the compromised knowledge related to US intelligence capabilities is staggering'. But all elaboration of what this striking statement means has been withheld," he said. The assessment excluded NSA-related information and dealt exclusively with non-NSA defense materials. The report was distributed to multiple US military commands around the world and all four military branches.
  • The classified damage assessment was first cited in a news report published by Foreign Policy on January 9. The Foreign Policy report attributed details of the DIA assessment to House intelligence committee chairman Mike Rogers and its ranking Democrat Dutch Ruppersberger. The lawmakers said the White House had authorized them to discuss the document in order to undercut the narrative of Snowden being portrayed as a heroic whistleblower. The DIA report has been cited numerous times by Rogers and Rusppersberger and other lawmakers who claimed Snowden’s leaks have put US personnel at risk. In January, Rogers asserted that the report concluded that most of the documents Snowden took "concern vital operations of the US Army, Navy, Marine Corps and Air Force". "This report confirms my greatest fears — Snowden’s real acts of betrayal place America’s military men and women at greater risk. Snowden’s actions are likely to have lethal consequences for our troops in the field," Rogers said in a statement at the time.
  • But details to back up Rogers' claims are not included in the declassified material released to the Guardian. Neither he nor any other lawmaker has disclosed specific details from the DIA report but they have continued to push the “damage” narrative in interviews with journalists and during appearances on Sunday talk shows. The declassified portion of the report obtained by the Guardian says only that DIA “assesses with high confidence that the information compromise by a former NSA contractor [redacted] and will have a GRAVE impact on US national defense”. The declassified material does not state the number of documents Snowden is alleged to have taken, which Rogers and Ruppersberger have claimed, again citing the DIA’s assessment, was 1.7m.
  • No evidence has surfaced to support persistent claims from pundits and lawmakers that Snowden has provided any of the NSA documents he obtained to a “foreign adversary”. Ben Wizner, Snowden’s attorney at the American Civil Liberties Union, said: "This report, which makes unsubstantiated claims about alleged harm to national security, is from December of 2013. Just this month, Keith Alexander admitted in an interview that he doesn’t 'think anybody really knows what he [Snowden] actually took with him, because the way he did it, we don’t have an accurate way of counting'. In other words, the government’s so-called damage assessment is based entirely on guesses, not on facts or evidence."
  • Steven Aftergood, of the Federation of American Scientists, pointed out that the report's finding that the Snowden leaks had a "grave" impact did not follow any of the levels defined in the annex. "That is a bit odd," he said, adding: "Within this hierarchy, it is not clear where 'grave impact' would fall."
Paul Merrell

For sale: Systems that can secretly track where cellphone users go around the globe - The Washington Post - 0 views

  • Makers of surveillance systems are offering governments across the world the ability to track the movements of almost anybody who carries a cellphone, whether they are blocks away or on another continent. The technology works by exploiting an essential fact of all cellular networks: They must keep detailed, up-to-the-minute records on the locations of their customers to deliver calls and other services to them. Surveillance systems are secretly collecting these records to map people’s travels over days, weeks or longer, according to company marketing documents and experts in surveillance technology.
  • The world’s most powerful intelligence services, such as the National Security Agency and Britain’s GCHQ, long have used cellphone data to track targets around the globe. But experts say these new systems allow less technically advanced governments to track people in any nation — including the United States — with relative ease and precision.
  • It is unclear which governments have acquired these tracking systems, but one industry official, speaking on the condition of anonymity to share sensitive trade information, said that dozens of countries have bought or leased such technology in recent years. This rapid spread underscores how the burgeoning, multibillion-dollar surveillance industry makes advanced spying technology available worldwide. “Any tin-pot dictator with enough money to buy the system could spy on people anywhere in the world,” said Eric King, deputy director of Privacy International, a London-based activist group that warns about the abuse of surveillance technology. “This is a huge problem.”
  • ...9 more annotations...
  • Yet marketing documents obtained by The Washington Post show that companies are offering powerful systems that are designed to evade detection while plotting movements of surveillance targets on computerized maps. The documents claim system success rates of more than 70 percent. A 24-page marketing brochure for SkyLock, a cellular tracking system sold by Verint, a maker of analytics systems based in Melville, N.Y., carries the subtitle “Locate. Track. Manipulate.” The document, dated January 2013 and labeled “Commercially Confidential,” says the system offers government agencies “a cost-effective, new approach to obtaining global location information concerning known targets.”
  • tracking systems that access carrier location databases are unusual in their ability to allow virtually any government to track people across borders, with any type of cellular phone, across a wide range of carriers — without the carriers even knowing. These systems also can be used in tandem with other technologies that, when the general location of a person is already known, can intercept calls and Internet traffic, activate microphones, and access contact lists, photos and other documents. Companies that make and sell surveillance technology seek to limit public information about their systems’ capabilities and client lists, typically marketing their technology directly to law enforcement and intelligence services through international conferences that are closed to journalists and other members of the public.
  • Security experts say hackers, sophisticated criminal gangs and nations under sanctions also could use this tracking technology, which operates in a legal gray area. It is illegal in many countries to track people without their consent or a court order, but there is no clear international legal standard for secretly tracking people in other countries, nor is there a global entity with the authority to police potential abuses.
  • (Privacy International has collected several marketing brochures on cellular surveillance systems, including one that refers briefly to SkyLock, and posted them on its Web site. The 24-page SkyLock brochure and other material was independently provided to The Post by people concerned that such systems are being abused.)
  • Verint, which also has substantial operations in Israel, declined to comment for this story. It says in the marketing brochure that it does not use SkyLock against U.S. or Israeli phones, which could violate national laws. But several similar systems, marketed in recent years by companies based in Switzerland, Ukraine and elsewhere, likely are free of such limitations.
  • The tracking technology takes advantage of the lax security of SS7, a global network that cellular carriers use to communicate with one another when directing calls, texts and Internet data. The system was built decades ago, when only a few large carriers controlled the bulk of global phone traffic. Now thousands of companies use SS7 to provide services to billions of phones and other mobile devices, security experts say. All of these companies have access to the network and can send queries to other companies on the SS7 system, making the entire network more vulnerable to exploitation. Any one of these companies could share its access with others, including makers of surveillance systems.
  • Companies that market SS7 tracking systems recommend using them in tandem with “IMSI catchers,” increasingly common surveillance devices that use cellular signals collected directly from the air to intercept calls and Internet traffic, send fake texts, install spyware on a phone, and determine precise locations. IMSI catchers — also known by one popular trade name, StingRay — can home in on somebody a mile or two away but are useless if a target’s general location is not known. SS7 tracking systems solve that problem by locating the general area of a target so that IMSI catchers can be deployed effectively. (The term “IMSI” refers to a unique identifying code on a cellular phone.)
  • Verint can install SkyLock on the networks of cellular carriers if they are cooperative — something that telecommunications experts say is common in countries where carriers have close relationships with their national governments. Verint also has its own “worldwide SS7 hubs” that “are spread in various locations around the world,” says the brochure. It does not list prices for the services, though it says that Verint charges more for the ability to track targets in many far-flung countries, as opposed to only a few nearby ones. Among the most appealing features of the system, the brochure says, is its ability to sidestep the cellular operators that sometimes protect their users’ personal information by refusing government requests or insisting on formal court orders before releasing information.
  • Another company, Defentek, markets a similar system called Infiltrator Global Real-Time Tracking System on its Web site, claiming to “locate and track any phone number in the world.” The site adds: “It is a strategic solution that infiltrates and is undetected and unknown by the network, carrier, or the target.”
  •  
    The Verint company has very close ties to the Iraeli government. Its former parent company Comverse, was heavily subsidized by Israel and the bulk of its manufacturing and code development was done in Israel. See https://en.wikipedia.org/wiki/Comverse_Technology "In December 2001, a Fox News report raised the concern that wiretapping equipment provided by Comverse Infosys to the U.S. government for electronic eavesdropping may have been vulnerable, as these systems allegedly had a back door through which the wiretaps could be intercepted by unauthorized parties.[55] Fox News reporter Carl Cameron said there was no reason to believe the Israeli government was implicated, but that "a classified top-secret investigation is underway".[55] A March 2002 story by Le Monde recapped the Fox report and concluded: "Comverse is suspected of having introduced into its systems of the 'catch gates' in order to 'intercept, record and store' these wire-taps. This hardware would render the 'listener' himself 'listened to'."[56] Fox News did not pursue the allegations, and in the years since, there have been no legal or commercial actions of any type taken against Comverse by the FBI or any other branch of the US Government related to data access and security issues. While no real evidence has been presented against Comverse or Verint, the allegations have become a favorite topic of conspiracy theorists.[57] By 2005, the company had $959 million in sales and employed over 5,000 people, of whom about half were located in Israel.[16]" Verint is also the company that got the Dept. of Homeland security contract to provide and install an electronic and video surveillance system across the entire U.S. border with Mexico.  One need not be much of a conspiracy theorist to have concerns about Verint's likely interactions and data sharing with the NSA and its Israeli equivalent, Unit 8200. 
Gary Edwards

Security, the Edward Snowden Way - Datamation - 0 views

  • NoScript NoScript is a free extension for Mozilla-based web browsers, including Firefox. It blocks executable web content by default. This blocking includes JavaScript, Java, Flash and Silverlight. You can whitelist sites if you want to use such content on a site-by-site basis. Or, if you choose, you can make all sites active by default and choose to blacklist sites you think might be dangerous. A visual button tells you if active content has been blocked on the current site.
  • PGP In the first chapter of his book “No Place to Hide,” journalist Glenn Greenwald wrote that Edward Snowden contacted him using the alias “Cincinnatus,” and said he would tell Greenwald some highly newsworthy facts, but only if he installed Pretty Good Privacy (PGP) first. (Greenwald didn’t know the magnitude of the scoop being offered to him and didn’t get around to installing PGP for months, thus delaying the leak.) PGP, of course, is a 23-year-old encryption program that can be used for email, as well as files and other things.
  • Tor Tor is a free application that routes your Internet traffic through a global volunteer network of thousands of relays that play a shell game with your data so your location and Internet travels are concealed. Tor, which used to stand for “The Onion router” in a reference to layers of encryption, encrypts data in multiple layers that prevents snoops from being able to figure out any details about your web travels, such as where you are or what you’re looking at. Tor was developed in part by US government funding as a way to enable citizens in repressive countries to communicate safely. And the NSA has a lot of respect for it. But in a recent controversy, two Carnegie Mellon researchers said they would give a talk at the Black Hat USA 2014 conference next month telling how to identify Tor users inexpensively (for only $3,000). The session was cut from the lineup because university lawyers didn’t approve it. The institute that the researchers work for is funded by the Pentagon, but the Department of Homeland Security said they did not request that the talk be cancelled.
  •  
    "Whether you think NSA whistleblower Edward Snowden is a hero or a traitor, you have to admit: The guy knows how to keep his information secure. The fact that Snowden isn't sitting in Guantanamo right now with ankle cuffs and a bag over his head demonstrates his ability to avoid detection. Snowden spoke at the Hope X conference in New York this month via a Google+ Hangout from Russia, and called on developers to build privacy and security into everyday products. He also hinted that he planned to work on building such technology. If you look into the details of what's been happening with tracking, surveillance, spying, hacking and global cyber industrial espionage, you can see that Snowden is right. We all need a lot better protection from snoops of all stripes. But how does the non-expert get started? One option is to listen to Snowden himself. Over the past year, Snowden has in one format or another, made specific product recommendations. Here are the products Snowden has explicitly recommended since the trove of documents on the NSA has been publicly revealed. (The list is in alphabetical order.) Ghostery Ghostery, made by a company called Evidon, is a browser extension for Chrome, Firefox, Safari and Internet Explorer. It exists for two purposes. The first is to block tracking code, which makes browsing the web both more private and also faster. The second purpose is, somewhat contradictory -- Evidon collects data from you to help advertisers avoid being blocked. It also enables website owners to gain insights into the tracking code deployed on their site by third-party advertising companies. Note that Snowden recommended Ghostery some time ago. But this month, the Electronic Frontier Foundation launched a competing product that I would imagine Snowden would recommend called Privacy Badger."
  •  
    I'd back Snowden in 2016 as a write-in candidate for President.
Paul Merrell

U.S. Military Bans The Intercept - The Intercept - 0 views

  • A portion of an email (redacted and slightly altered to protect the source) sent to staff last week at a U.S. Marine Corps installation directing employees not to read this web site. The U.S. military is banning and blocking employees from visiting The Intercept in an apparent effort to censor news reports that contain leaked government secrets. According to multiple military sources, a notice has been circulated to units within the Army, Navy, Air Force, and Marine Corps warning staff that they are prohibited from reading stories published by The Intercept on the grounds that they may contain classified information. The ban appears to apply to all employees—including those with top-secret security clearance—and is aimed at preventing classified information from being viewed on unclassified computer networks, even if it is freely available on the internet. Similar military-wide bans have been directed against news outlets in the past after leaks of classified information.
  • A directive issued to military staff at one location last week, obtained by The Intercept, threatens that any employees caught viewing classified material in the public domain will face “long term security issues.” It suggests that the call to prohibit employees from viewing the website was made by senior officials over concerns about a “potential new leaker” of secret documents. The directive states: We have received information from our higher headquarters regarding a potential new leaker of classified information.  Although no formal validation has occurred, we thought it prudent to warn all employees and subordinate commands.  Please do not go to any website entitled “The Intercept” for it may very well contain classified material. As a reminder to all personnel who have ever signed a non-disclosure agreement, we have an ongoing responsibility to protect classified material in all of its various forms.  Viewing potentially classified material (even material already wrongfully released in the public domain) from unclassified equipment will cause you long term security issues.  This is considered a security violation.
  • A military insider subject to the ban said that several employees expressed concerns after being told by commanders that it was “illegal and a violation of national security” to read publicly available news reports on The Intercept. “Even though I have a top secret security clearance, I am still forbidden to read anything on the website,” said the source, who spoke on condition of anonymity due to the sensitivity of the subject.  “I find this very disturbing that they are threatening us and telling us what websites and news publishers we are allowed to read or not.”
  • ...2 more annotations...
  • In an emailed statement, Defense Department spokeswoman Lt. Col. Valerie Henderson said that she had not been able to establish whether the DoD had been the source of “any guidance related to your website.” Henderson added, however, that “DoD personnel have an obligation to safeguard classified information. Classified information, whether made public by unauthorized disclosure, remains classified until declassified by an appropriate government authority. DoD is committed to preventing classified information from being introduced onto DoD’s unclassified networks.” Earlier this month, after the publication of two Intercept stories revealing classified details about the vast scope of the government’s watchlisting program, Reuters reported that “intelligence officials were preparing a criminal referral” over the leaks.
  • The ban on The Intercept appears to have come in the aftermath of those stories, representing the latest in a string of U.S. military crackdowns on news websites that have published classified material. Last year, the Army admitted that it was blocking parts of The Guardian’s website after it published secret documents from former National Security Agency contractor Edward Snowden. In 2010, WikiLeaks and several major news organizations were subject to similar measures after the publication of leaked State Department diplomatic files. Flanagan, the Marine Corps spokesman, told The Intercept that The Washington Post was also blocked by some military agencies last year after it published documents from Snowden revealing covert NSA surveillance operations. “Just because classified information is published on a public website, that doesn’t mean military people with Security clearance have the ability to download it,” Flanagan said.
  •  
    Enforced ignorance of the U.S. military. The official reason is a bucket that doesn't hold water. Despite official "classified" status, public is public. Any enemy can read it, so why should our military be barred from doing so. The real reason, I suspect, is protecting morale. 
Paul Merrell

DoD Cut Security Clearances by 15% in Last Two Years - 0 views

  • In a significant retrenchment of the national security bureaucracy, the Department of Defense has reduced the number of employees and contractors who hold security clearances in the past two years by more than 700,000 persons, a cut of 15% in the total security-cleared population in DoD. The previously undisclosed reductions were reported in data provided by DoD to the Office of the Director of National Intelligence. This is the first documented drop in the overall number of security clearances since FY 2010, when the systematic collection of statistical data on clearances began, and it is probably the first major decline in the number of cleared personnel since 9/11. Most of the new reductions involved persons who had been investigated and deemed “eligible” (or “cleared”) for access to classified information but who did not have or need such access in fact. But a sizable 117,000 persons who were “in access” (i.e. who actually did have access to classified information) were also dropped from the clearance rolls between FY 2013 and FY 2015, according to the new statistics. A 2014 report from the Office of Management and Budget recommended reductions in the cleared population since the “growth in the number of clearance-holders increases costs and exposes classified national security information, often at very sensitive levels, to an increasingly large population.” A cut in clearances may also lead indirectly to reduced production of classified information.
  • In the first quarter of FY 2015, following the new reductions, there were 3.9 million DoD personnel (employees and contractors) with security clearances, down from 4.6 million in FY 2013, for a drop of 15.3%. The total number of clearance holders government-wide is about 0.5 million higher than the DoD figure. The new data were disclosed last week in the latest quarterly report on implementation of the Insider Threat Program. The data also indicated that the backlog of Top Secret/SCI clearance holders whose periodic reinvestigations were overdue (or “out of scope”) had been reduced by 63,000. However, there are still 356,000 TS/SCI clearance holders that remain “out of scope” and in need of an updated reinvestigation, according to the DoD data.
  •  
    The Dark State responds to Edward Snowden and Chelsea Manning's disclosures. 
Paul Merrell

National security bill opens the door to expanded control orders and secret evidence | nsnbc international - 0 views

  • On Thursday, Attorney-General George Brandis introduced a new national security bill into the Senate. This is the fifth tranche of national security legislation to be introduced into parliament since July 2014.
  • This bill includes a host of new measures designed to address the evolving threat posed by terrorism. These include: a new offence of advocacy of genocide; amendments to the control order regime, so it applies to persons 14 years and older, and new measures to monitor controlees; and clarification of the basis for issuing a preventative detention order. But the bill’s most concerning aspect is the proposal to expand the secrecy provisions available to courts in control order proceedings. Keeping national security information secret in court Since 2004, legislation has been in place to deal with information that is likely to prejudice national security in federal court proceedings. This legislation created a special closed hearing procedure to determine whether national security information could be disclosed in court and, if so, in what form. This process regulates disclosure between the parties – that is, who gets to see what.
  • The bill expands this by creating special provisions that allow the court to consider sensitive material that the controlee and legal representative have not seen in proceedings to impose, confirm or vary a control order. It provides that a court can consider all of the information: contained in an original source document in control order proceedings, even where the controlee and their legal representative have been provided with only a redacted or summarised form of the document; contained in an original source document in control order proceedings, even where the controlee and their legal representative have not been provided with any information contained in the original source document; and provided by a witness, even where the information provided by the witness is not disclosed to the controlee or their legal representative. The bill’s effect is to allow secret evidence into control order proceedings.
  • ...1 more annotation...
  • “Secret evidence” is that which is not disclosed to an affected party and their legal representative. It is not new. A successful claim of public interest immunity, for example, results in secret material being excluded from the evidence presented in court. What is new in the anti-terror context is legislation that allows the courts to rely on secret evidence in control order proceedings.
  •  
    Australia, along with the UK, cotinues its steady march to the right on national security matters. The admissibility of secret evidence in judicial proceedings is antithetical to notions of Due Process and a fair trial, as well as to public oversight of judicial proceedings.  
Paul Merrell

UN Security Council Plans Declaration of War Against ISIS - 0 views

  • Russia's resolution for the creating of an international anti-ISIS coalition has been tabled by the U.N. Security Council because it calls for cooperation with Assad (which of course is “unacceptable”). But France has now proposed a similar resolution, and it's likely to pass: World powers are poised to forge a single resolution at the United Nations Security Council to declare a common war against Isis and “eradicate” jihadists in Iraq and Syria, The Independentunderstands.The attacks in Paris as well as the downing of the Russian jet over the Sinai Peninsula have galvanised a hitherto divided Security Council. And a new reality exists: with its alleged execution this week of a Chinese national, Isis has now slaughtered citizens of all five permanent Security Council members.
  • French officials said they were formally submitting a draft resolution to the Security Council, pushing aside a competing draft offered by Russia earlier this week. It could be adopted as early as Friday or over the weekend. The French manoeuvre reflected confidence that its resolution would not provoke Russian or Chinese vetoes and would thus win approval. The text, shared with the The Independent, calls on member states “with the capacity to do so” to “take all necessary measures, in compliance with international law, in particular international human rights, refugee and humanitarian law, on the territory under the control of Isil [Isis] in Syria and Iraq, to redouble and co-ordinate their efforts to prevent and suppress terrorist acts committed specifically by Isil… and to eradicate the safe haven they have established in Iraq and Syria”.We are in favor of any international, multilateral effort to erradicate psychos with guns. But if this resolution passes, will the U.S. stop “accidentally” delivering weapons to ISIS? Curious minds want to know. 
Paul Merrell

Iraq Seeks To Cancel Security Agreement With US, Will Invite Russia To Fight ISIS | Zero Hedge - 0 views

  • Now, in the latest example of just how tenuous Washington’s grip on the region has become, the Iraqi parliament's Security and Defense Committee is calling for the review and cancellation of Baghdad’s Security agreement with the US.  “The government and parliament need to review the agreement signed with the United States on Security because the United States does not seriously care about its fulfillment,” committee member Hamid al-Mutlaq, a senior Sunni lawmaker told Sputnik on Wednesday. “We demand that it be annulled,” he added. 
  • and in the fight against terrorism in Iraq," another committee member said earlier this week.  Recall that this is precisely what we said would happen once we learned in September that Russia, Iran, Iraq, and Syria had set up a joint intelligence sharing cell in Baghdad. It was clear from the beginning that Tehran saw an opportunity to consolidate its power in Iraq and preserve its influence in Syria by convincing Vladimir Putin that Russia could replace the US as Mid-East superpower puppet master by helping Tehran to defeat the insurgency in Syria and boot the US from Iraq once and for all. Moscow will of course get a warm reception from Iraqi lawmakers thanks to the fact that many MPs are loyal to Iran.  This makes sense logistically as well. Once the Russians and Iranians have retaken Aleppo (which admittedly is taking a while), they can push east towards Raqqa and from there, move straight across the border, effectively pinching ISIS between an advance from the west and Iran’s Shiite militias already operating in Iraq. Of course that will entail some measure of cooperation with the US, France, Britain, and, once in Iraq, the Peshmerga. It is at that point that Washington’s resolve when it comes to preserving whatever charade is being perpetrated in Raqqa will be put to the ultimate test.  In the meantime, it will be interesting to see how the US responds to a move by Baghdad to nullify the security agreement.
  • It now appears that the stage is set for Baghdad to claim that the US, like Turkey, is illegitimately occupying the country (again). If Iraq nullifies the security agreement and moves to invite the Russians into the country, the US will be forced to either pack up and leave, cooperate with Moscow, or fight for the right to preserve American influence. 
Paul Merrell

Cut Social Security & Veterans' Benefits? Cut the Pentagon Instead | Common Dreams - 0 views

  • If, like most Americans, you prefer to cut what Secretary of Defense Chuck Hagel has called the "bloated" Pentagon budget instead of cutting Social Security and veterans' benefits, you have even more reason to rejoice. Because at this political juncture, everyone in America who says "no cuts to Social Security or veterans' benefits" is effectively saying "cut the bloated Pentagon budget," whether they do so explicitly or not. If the "grand bargain" is killed and Social Security and veterans' benefits are spared - apparently these are all the same political event - then the Pentagon budget will be cut instead. And that means that at long last, we're effectively having the "guns vs. butter" debate in the United States that we have been so long denied. And that's not all. We have a new way to talk about the Pentagon budget, that every American can easily grasp. We can talk about the Pentagon budget by using the President's proposed cuts to Social Security and veterans' benefits as the unit of measurement.
  • According to the Congressional Budget Office, the President's proposal to use the "chained CPI" to calculate cost of living increases would save the government $127 billion over ten years by cutting Social Security and $36 billion over ten years by cutting "programs affecting veterans and the poorest elderly and disabled." That's a grand total of $163 billion over ten years from hitting seniors, veterans, and the disabled. So, now we have a new unit of measurement for talking about the Pentagon budget. Anything in the Pentagon budget that costs $163 billion over ten years costs as much as President Obama proposes to save by hitting seniors, veterans, and the disabled. Let us consider just three examples.
  • The key takeaway from all these numbers is that compared to the bloated Pentagon budget, the proposed savings from whacking seniors, veterans, and the disabled are chump change, not worth bothering with. The crucial thing to remember in all this is that none of us needs to come up with a specific plan to replace cuts to Social Security and veterans benefits with Pentagon cuts. Cutting the Pentagon budget instead - the sequester - is the default option, the status quo. All we have to do if we prefer Pentagon cuts to cuts in Social Security and veterans benefits is to kill the grand bargain. The Pentagon can then propose what mix of ending the war in Afghanistan, buying fewer or cheaper fighter planes, cutting contracting, closing foreign military bases, and retiring expensive generals it prefers to stay within its new budget. And then we can decide if we're ok with that, or prefer something else.
Gary Edwards

The twilight of America - Melanie Phillips - 1 views

  •  
    Ms. Phillips describes the three new Obama appointments and what it means to the future of America:   excerpt: "Barack Obama has now proposed filling the three positions in the US administration most concerned with the security of the nation and the defence of the free world, those at State, Defence and the CIA, by three men who have all taken up positions which can only strengthen those who threaten the security of America and the survival of the free world.  " "Hagel, Brennan and Kerry, are all examples of post-Vietnam demoralisation syndrome - the deeply pessimistic belief that America cannot and should not fight to defend its security and values anywhere in the world; that if bad people are defeated in war only worse people will ever take their place; and that therefore the best strategy for America is to buy them all off, pull up the drawbridge and retreat into a self-delusional isolation.   These are people who are the living embodiment of civilisational exhaustion and decline. In any healthy society, they would be considered marginal, third-rate figures characterised variously by moral spinelessness, stupidity and knuckle-dragging prejudice. Yet not only has Obama put such people forward to manage the security of America, at a time when Iran  is racing to build its nuclear bomb and Islamic radicals are destroying lives and freedom across the world and making headway into the west -- in part because of the policies of Obama himself; even more stunningly, the American liberal media, along with timid or ideologically partisan US Jewish leaders, remain silent about these astoundingly destructive appointments because it is Obama who is making them. "
Paul Merrell

Netanyahu scandals reflect corruption at the heart of Israeli society - Mondoweiss - 0 views

  •       Israeli prime minister Benjamin Netanyahu is in danger of being brought down, possibly soon, over what initially appears to be little more than an imprudent taste for Cuban cigars and pink champagne. In truth, however, the allegations ensnaring Netanyahu reveal far more than his personal flaws or an infatuation with the high life. They shine a rare light on the corrupt nexus between Israel’s business, political and media worlds, compounded by the perverse influence of overseas Jewish money. Of the two police investigations Netanyahu faces (there are more in the wings), the one known as Case 1000, concerning gifts from businessmen worth hundreds of thousands of dollars, is most likely to lead to his downfall. But it is the second investigation, Case 2000, and the still-murky relationship between the two cases, that more fully exposes the rot at the heart of Israel’s political system. This latter case hinges on a tape recording in which Netanyahu plots with an Israeli newspaper tycoon to rig media coverage in his favor. Leads from both cases suggest that Netanyahu may have been further meddling, together with his billionaire friends, in the shadowy world of international espionage.
  • Netanyahu’s appetite for a free lunch has been common knowledge in Israel since his first term as prime minister in the late 1990s. Then, he was twice investigated for fraud, though controversially charges were not brought in either case. Police discovered along the way that he and his wife, Sara, had horded many of the gifts he received during state visits. More than 100 were never recovered. The clarifications that were issued more than 15 years ago, as a result of those investigations, make it hard for Netanyahu to claim now that he did not understand the rules. According to justice ministry advice in 2001, government and state officials cannot keep gifts worth more than $100 without risking violating Israeli law. The gifts Netanyahu received from one of the Israeli businessmen involved in Case 1000, Hollywood film producer Arnon Milchan, amounted to as much as $180,000. Netanyahu has argued that these presents, ranging from cigars to jewelry, were expressions of a close friendship rather than bribes to him in his capacity as prime minister. The problem, however, is that Netanyahu appears to have reciprocated by using his position as head of the Israeli government to lobby John Kerry, the then U.S. secretary of state, to gain Milchan a 10-year U.S. residency visa. He may have done more.
  • Also being investigated are his family’s ties to a friend of Milchan’s, Australian billionaire James Packer, who made his fortune in the media and gambling industries. Packer has similarly lavished gifts on the Netanyahu family, especially Yair, Netanyahu’s eldest son. At the same time, Packer, now a neighbor of the Netanyahus in the coastal town of Caesarea, has been seeking permanent residency and the enormous benefits that would accrue with tax status in Israel. As a non-Jew, Packer should have no hope of being awarded residency. There are suspicions that Netanyahu may have been trying to pull strings on the Australian’s behalf. Many of these gifts were apparently not given freely. The Netanyahus asked for them. Indicating that Netanyahu knew there might be legal concerns, he used code words – “leaves” for cigars and “pinks” for champagne – to disguise his orders to Milchan. Police are reported to be confident, after questioning Netanyahu three times, that they have enough evidence to indict him. If they do, Netanyahu will be under heavy pressure to resign.
  • ...5 more annotations...
  • Yossi Cohen was appointed head of the Mossad a year ago, after a government vetting committee accepted that he had no personal ties to Netanyahu. But Cohen forgot to mention that he is extremely close to Netanyahu’s high-flying friends – connections that are now under investigation. Milchan set up a global security firm in 2008 called Blue Sky International, stuffed with Israeli security veterans. Packer soon became a partner. They developed close ties to Cohen, first while he was a senior official at the Mossad and later when he headed Israel’s national security council. Before Cohen was appointed head of Mossad in December 2015, the pair had hoped to recruit him to their cyber-security operations. Cohen received several gifts from Packer, in violation of Israeli government rules, including a stay at one of his luxury hotels. A source speaking to Haaretz said Blue Sky had “more than [a] direct line” to Netanyahu. They “would pull him out from anywhere, at any time, on any occasion.” According to Haaretz’s military analyst, Amir Oren, the new disclosures raise serious questions about whether Milchan and Packer twisted Netanyahu’s arm to parachute Cohen into the post over the favored candidate. In return, Packer may have been hoping that Cohen would authorise exceptional Israeli residency for him, classifying him as a security asset.
  • From Hollywood to Mossad Cases 1000 and 2000 share at least one figure in common. Milchan gave Netanyahu extravagant gifts over many years, but he is also reported to have acted as go-between, bringing arch-enemies Netanyahu and Mozes together. Milchan has his own financial stake in the media, in his case a holding in the Channel 10 TV station. In addition, Milchan introduced Netanyahu to sympathetic businessmen, including his friend Packer, to discuss taking the ailing Yedioth media group off Mozes’ hands. Only last October he arranged for media mogul Rupert Murdoch’s son, Lachlan, to fly to Israel for one night for a secret meeting with Netanyahu. Milchan is undoubtedly at the centre of the shadowy world of power and finance that corrupts public life in Israel. Not only is Milchan a highly influential Hollywood figure, having produced more than 100 films, but he has admitted that he is a former Mossad agent. He used his Hollywood connections to help make arms deals and secure parts for Israel’s nuclear weapons program. One can only wonder whether Milchan was not effectively set up in his Hollywood career as a cover for his Mossad activities. But Milchan, it seems, is still wielding influence in Israel’s twilight world of security.
  • eyond this, one one can only speculate about how Cohen’s indebtedness to Milchan, Packer and Netanyahu might have influenced his decisions as head of the Mossad. It was only a few years ago that the former Mossad chief, Meir Dagan, was reported to have wrestled furiously with Netanyahu to stop him launching a military strike on Iran. Prosecution drags feet It is unclear for the time being whether the revelations are drawing to a close or will lead deeper into Israel’s twin netherworlds of financial corruption and security. But what has emerged so far should be enough to finish off Netanyahu as prime minister. Whether it does so may depend on the extent of Israel’s compromised legal system. Attorney general Avichai Mendelblit was appointed by Netanyahu and is a political ally. He appears to have been dragging his feet as much as possible to slow down the police investigation, if not sabotage it. But the weight of evidence is looking like it may prove too overwhelming. As political analyst Yossi Verter observed: “There’s no way that a police commissioner … appointed [by Netanyahu] and a cautious attorney general, who in the past was part of his close circle and one of his loyalists, would be putting him through the seven circles of hell if they weren’t convinced that there’s a solid basis for indictment and conviction.” The next question for Netanyahu is whether he will step down if indicted. He should, if Olmert’s example is followed. But his officials are citing a 1993 high court ruling that allows a cabinet minister under indictment to remain in office. Certainly if Netanyahu chooses to stay on, his decision would be appealed to the court again. However, the judges may be reluctant to oust a sitting prime minister. The court of public opinion is likely to be decisive in that regard. A recent poll shows few Israelis believe Netanyahu is innocent of the allegations. Some 54 per cent think he broke the law, while only 28 believe him. Opinion, however, is split evenly on whether he should resign.
  • If past experience is any measure, Netanyahu will try to turn public opinion his way by increasing friction with the Palestinians and exploiting the international arena, especially his relations with the Trump administration. He may be expected to encourage Trump at the very least to posture more stridently against Iran. Nonetheless, most observers assume Netanyahu is doomed – it is simply a matter of when. The odds are on an indictment in late spring, followed by elections in the fall, say Israeli analysts. At this stage, none of his political rivals wants to be seen stabbing Netanyahu in the back. Most are keeping quiet. But behind the scenes, political leaders are hurrying to forge new alliances and extract political concessions while Netanyahu is wounded.
  • Who might succeed Netanyahu? Yair Lapid, of the centre-right Yesh Atid, is heading the polls, but that may in part reflect the disarray in Netanyahu’s Likud party. In a sign of where the deeper currents in Israeli society are leading, a Maariv poll last week showed that settler leader Naftali Bennett would win an election if he were to head the Likud. Netanyahu now needs the help of all the powerful friends he can muster. His biggest ally, U.S. casino magnate Sheldon Adelson, may not be among them. After the revelations that Netanyahu was conspiring against him with Mozes, Adelson has cut back on Israel Hayom’s circulation and is reported to be offering less favorable coverage of the Netanyahus. That could prove the final straw, sealing Netanyahu’s fate.
Paul Merrell

Tomgram: Alfred McCoy, It's About Blackmail, Not National Security | TomDispatch - 0 views

  • For more than six months, Edward Snowden’s revelations about the National Security Agency (NSA) have been pouring out from the Washington Post, the New York Times, the Guardian, Germany’s Der Spiegel, and Brazil’s O Globo, among other places.  Yet no one has pointed out the combination of factors that made the NSA’s expanding programs to monitor the world seem like such a slam-dunk development in Washington.  The answer is remarkably simple.  For an imperial power losing its economic grip on the planet and heading into more austere times, the NSA’s latest technological breakthroughs look like a bargain basement deal when it comes to projecting power and keeping subordinate allies in line -- like, in fact, the steal of the century.  Even when disaster turned out to be attached to them, the NSA’s surveillance programs have come with such a discounted price tag that no Washington elite was going to reject them.
  • What exactly was the aim of such an unprecedented program of massive domestic and planetary spying, which clearly carried the risk of controversy at home and abroad? Here, an awareness of the more than century-long history of U.S. surveillance can guide us through the billions of bytes swept up by the NSA to the strategic significance of such a program for the planet’s last superpower. What the past reveals is a long-term relationship between American state surveillance and political scandal that helps illuminate the unacknowledged reason why the NSA monitors America’s closest allies. Not only does such surveillance help gain intelligence advantageous to U.S. diplomacy, trade relations, and war-making, but it also scoops up intimate information that can provide leverage -- akin to blackmail -- in sensitive global dealings and negotiations of every sort. The NSA’s global panopticon thus fulfills an ancient dream of empire. With a few computer key strokes, the agency has solved the problem that has bedeviled world powers since at least the time of Caesar Augustus: how to control unruly local leaders, who are the foundation for imperial rule, by ferreting out crucial, often scurrilous, information to make them more malleable.
  • Once upon a time, such surveillance was both expensive and labor intensive. Today, however, unlike the U.S. Army’s shoe-leather surveillance during World War I or the FBI’s break-ins and phone bugs in the Cold War years, the NSA can monitor the entire world and its leaders with only 100-plus probes into the Internet’s fiber optic cables. This new technology is both omniscient and omnipresent beyond anything those lacking top-secret clearance could have imagined before the Edward Snowden revelations began.  Not only is it unimaginably pervasive, but NSA surveillance is also a particularly cost-effective strategy compared to just about any other form of global power projection. And better yet, it fulfills the greatest imperial dream of all: to be omniscient not just for a few islands, as in the Philippines a century ago, or a couple of countries, as in the Cold War era, but on a truly global scale. In a time of increasing imperial austerity and exceptional technological capability, everything about the NSA’s surveillance told Washington to just “go for it.”  This cut-rate mechanism for both projecting force and preserving U.S. global power surely looked like a no-brainer, a must-have bargain for any American president in the twenty-first century -- before new NSA documents started hitting front pages weekly, thanks to Snowden, and the whole world began returning the favor.
  • ...12 more annotations...
  • As the gap has grown between Washington’s global reach and its shrinking mailed fist, as it struggles to maintain 40% of world armaments (the 2012 figure) with only 23% of global gross economic output, the U.S. will need to find new ways to exercise its power far more economically. As the Cold War took off, a heavy-metal U.S. military -- with 500 bases worldwide circa 1950 -- was sustainable because the country controlled some 50% of the global gross product. But as its share of world output falls -- to an estimated 17% by 2016 -- and its social welfare costs climb relentlessly from 4% of gross domestic product in 2010 to a projected 18% by 2050, cost-cutting becomes imperative if Washington is to survive as anything like the planet’s “sole superpower.” Compared to the $3 trillion cost of the U.S. invasion and occupation of Iraq, the NSA’s 2012 budget of just $11 billion for worldwide surveillance and cyberwarfare looks like cost saving the Pentagon can ill-afford to forego. Yet this seeming “bargain” comes at what turns out to be an almost incalculable cost. The sheer scale of such surveillance leaves it open to countless points of penetration, whether by a handful of anti-war activists breaking into an FBI field office in Media, Pennsylvania, back in 1971 or Edward Snowden downloading NSA documents at a Hawaiian outpost in 2012.
  • In October 2001, not satisfied with the sweeping and extraordinary powers of the newly passed Patriot Act, President Bush ordered the National Security Agency to commence covert monitoring of private communications through the nation's telephone companies without the requisite FISA warrants. Somewhat later, the agency began sweeping the Internet for emails, financial data, and voice messaging on the tenuous theory that such “metadata” was “not constitutionally protected.” In effect, by penetrating the Internet for text and the parallel Public Switched Telephone Network (PSTN) for voice, the NSA had gained access to much of the world’s telecommunications. By the end of Bush’s term in 2008, Congress had enacted laws that not only retrospectively legalized these illegal programs, but also prepared the way for NSA surveillance to grow unchecked. Rather than restrain the agency, President Obama oversaw the expansion of its operations in ways remarkable for both the sheer scale of the billions of messages collected globally and for the selective monitoring of world leaders.
  • By 2012, the centralization via digitization of all voice, video, textual, and financial communications into a worldwide network of fiber optic cables allowed the NSA to monitor the globe by penetrating just 190 data hubs -- an extraordinary economy of force for both political surveillance and cyberwarfare.
  • With a few hundred cable probes and computerized decryption, the NSA can now capture the kind of gritty details of private life that J. Edgar Hoover so treasured and provide the sort of comprehensive coverage of populations once epitomized by secret police like East Germany’s Stasi. And yet, such comparisons only go so far. After all, once FBI agents had tapped thousands of phones, stenographers had typed up countless transcripts, and clerks had stored this salacious paper harvest in floor-to-ceiling filing cabinets, J. Edgar Hoover still only knew about the inner-workings of the elite in one city: Washington, D.C.  To gain the same intimate detail for an entire country, the Stasi had to employ one police informer for every six East Germans -- an unsustainable allocation of human resources. By contrast, the marriage of the NSA’s technology to the Internet’s data hubs now allows the agency’s 37,000 employees a similarly close coverage of the entire globe with just one operative for every 200,000 people on the planet
  • Through the expenditure of $250 million annually under its Sigint Enabling Project, the NSA has stealthily penetrated all encryption designed to protect privacy. “In the future, superpowers will be made or broken based on the strength of their cryptanalytic programs,” reads a 2007 NSA document. “It is the price of admission for the U.S. to maintain unrestricted access to and use of cyberspace.” By collecting knowledge -- routine, intimate, or scandalous -- about foreign leaders, imperial proconsuls from ancient Rome to modern America have gained both the intelligence and aura of authority necessary for dominion over alien societies. The importance, and challenge, of controlling these local elites cannot be overstated. During its pacification of the Philippines after 1898, for instance, the U.S. colonial regime subdued contentious Filipino leaders via pervasive policing that swept up both political intelligence and personal scandal. And that, of course, was just what J. Edgar Hoover was doing in Washington during the 1950s and 1960s.
  • Indeed, the mighty British Empire, like all empires, was a global tapestry woven out of political ties to local leaders or “subordinate elites” -- from Malay sultans and Indian maharajas to Gulf sheiks and West African tribal chiefs. As historian Ronald Robinson once observed, the British Empire spread around the globe for two centuries through the collaboration of these local leaders and then unraveled, in just two decades, when that collaboration turned to “non-cooperation.” After rapid decolonization during the 1960s transformed half-a-dozen European empires into 100 new nations, their national leaders soon found themselves the subordinate elites of a spreading American global imperium. Washington suddenly needed the sort of private information that could keep such figures in line. Surveillance of foreign leaders provides world powers -- Britain then, America now -- with critical information for the exercise of global hegemony. Such spying gave special penetrating power to the imperial gaze, to that sense of superiority necessary for dominion over others.  It also provided operational information on dissidents who might need to be countered with covert action or military force; political and economic intelligence so useful for getting the jump on allies in negotiations of all sorts; and, perhaps most important of all, scurrilous information about the derelictions of leaders useful in coercing their compliance.
  • In late 2013, the New York Times reported that, when it came to spying on global elites, there were “more than 1,000 targets of American and British surveillance in recent years,” reaching down to mid-level political actors in the international arena. Revelations from Edward Snowden’s cache of leaked documents indicate that the NSA has monitored leaders in some 35 nations worldwide -- including Brazilian president Dilma Rousseff, Mexican presidents Felipe Calderón and Enrique Peña Nieto, German Chancellor Angela Merkel, and Indonesia’s president Susilo Bambang Yudhoyono.  Count in as well, among so many other operations, the monitoring of “French diplomatic interests” during the June 2010 U.N. vote on Iran sanctions and “widespread surveillance” of world leaders during the Group 20 summit meeting at Ottawa in June 2010. Apparently, only members of the historic “Five Eyes” signals-intelligence alliance (Australia, Canada, New Zealand, and Great Britain) remain exempt -- at least theoretically -- from NSA surveillance. Such secret intelligence about allies can obviously give Washington a significant diplomatic advantage. During U.N. wrangling over the U.S. invasion of Iraq in 2002-2003, for example, the NSA intercepted Secretary-General Kofi Anan’s conversations and monitored the “Middle Six” -- Third World nations on the Security Council -- offering what were, in essence, well-timed bribes to win votes. The NSA’s deputy chief for regional targets sent a memo to the agency’s Five Eyes allies asking “for insights as to how membership is reacting to on-going debate regarding Iraq, plans to vote on any related resolutions [..., and] the whole gamut of information that could give U.S. policymakers an edge in obtaining results favorable to U.S. goals.”
  • Indicating Washington’s need for incriminating information in bilateral negotiations, the State Department pressed its Bahrain embassy in 2009 for details, damaging in an Islamic society, on the crown princes, asking: “Is there any derogatory information on either prince? Does either prince drink alcohol? Does either one use drugs?” Indeed, in October 2012, an NSA official identified as “DIRNSA,” or Director General Keith Alexander, proposed the following for countering Muslim radicals: “[Their] vulnerabilities, if exposed, would likely call into question a radicalizer’s devotion to the jihadist cause, leading to the degradation or loss of his authority.” The agency suggested that such vulnerabilities could include “viewing sexually explicit material online” or “using a portion of the donations they are receiving… to defray personal expenses.” The NSA document identified one potential target as a “respected academic” whose “vulnerabilities” are “online promiscuity.”
  • Just as the Internet has centralized communications, so it has moved most commercial sex into cyberspace. With an estimated 25 million salacious sites worldwide and a combined 10.6 billion page views per month in 2013 at the five top sex sites, online pornography has become a global business; by 2006, in fact, it generated $97 billion in revenue. With countless Internet viewers visiting porn sites and almost nobody admitting it, the NSA has easy access to the embarrassing habits of targets worldwide, whether Muslim militants or European leaders. According to James Bamford, author of two authoritative books on the agency, “The NSA's operation is eerily similar to the FBI's operations under J. Edgar Hoover in the 1960s where the bureau used wiretapping to discover vulnerabilities, such as sexual activity, to ‘neutralize’ their targets.”
  • Indeed, whistleblower Edward Snowden has accused the NSA of actually conducting such surveillance.  In a December 2013 letter to the Brazilian people, he wrote, “They even keep track of who is having an affair or looking at pornography, in case they need to damage their target's reputation.” If Snowden is right, then one key goal of NSA surveillance of world leaders is not U.S. national security but political blackmail -- as it has been since 1898. Such digital surveillance has tremendous potential for scandal, as anyone who remembers New York Governor Eliot Spitzer’s forced resignation in 2008 after routine phone taps revealed his use of escort services; or, to take another obvious example, the ouster of France’s budget minister Jérôme Cahuzac in 2013 following wire taps that exposed his secret Swiss bank account. As always, the source of political scandal remains sex or money, both of which the NSA can track with remarkable ease.
  • By starting a swelling river of NSA documents flowing into public view, Edward Snowden has given us a glimpse of the changing architecture of U.S. global power. At the broadest level, Obama’s digital “pivot” complements his overall defense strategy, announced in 2012, of reducing conventional forces while expanding into the new, cost-effective domains of space and cyberspace. While cutting back modestly on costly armaments and the size of the military, President Obama has invested billions in the building of a new architecture for global information control. If we add the $791 billion expended to build the Department of Homeland Security bureaucracy to the $500 billion spent on an increasingly para-militarized version of global intelligence in the dozen years since 9/11, then Washington has made a $1.2 trillion investment in a new apparatus of world power.
  • So formidable is this security bureaucracy that Obama’s recent executive review recommended the regularization, not reform, of current NSA practices, allowing the agency to continue collecting American phone calls and monitoring foreign leaders into the foreseeable future. Cyberspace offers Washington an austerity-linked arena for the exercise of global power, albeit at the cost of trust by its closest allies -- a contradiction that will bedevil America’s global leadership for years to come. To update Henry Stimson: in the age of the Internet, gentlemen don't just read each other’s mail, they watch each other’s porn. Even if we think we have nothing to hide, all of us, whether world leaders or ordinary citizens, have good reason to be concerned.
« First ‹ Previous 41 - 60 of 2322 Next › Last »
Showing 20 items per page