Skip to main content

Home/ Socialism and the End of the American Dream/ Group items matching "capabilities" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Paul Merrell

Revealed: NSA pushed 9/11 as key 'sound bite' to justify surveillance | Al Jazeera America - 0 views

  • The National Security Agency advised its officials to cite the 9/11 attacks as justification for its mass surveillance activities, according to a master list of NSA talking points. The document, obtained by Al Jazeera through a Freedom of Information Act request, contains talking points and suggested statements for NSA officials (PDF) responding to the fallout from media revelations that originated with former NSA contractor Edward Snowden. Invoking the events of 9/11 to justify the controversial NSA programs, which have caused major diplomatic fallout around the world, was the top item on the talking points that agency officials were encouraged to use. Under the subheading “Sound Bites That Resonate,” the document suggests the statement “I much prefer to be here today explaining these programs, than explaining another 9/11 event that we were not able to prevent.”
  • NSA head Gen. Keith Alexander used a slightly different version of that statement when he testified before Congress on June 18 in defense of the agency’s surveillance programs. Asked to comment on the document, NSA media representative Vanee M. Vines pointed Al Jazeera to Alexander’s congressional testimony on Tuesday, and said the agency had no further comment. In keeping with the themes listed in the talking points, the NSA head told legislators that “it is much more important for this country that we defend this nation and take the beatings than it is to give up a program that would result in this nation being attacked.” Critics have long noted the tendency of senior U.S. politicians and security officials to use the fear of attacks like the one that killed almost 3,000 Americans to justify policies ranging from increased defense spending to the invasion of Iraq.
  • Al Jazeera obtained the 27 pages of talking points from the NSA this week in response to a FOIA request filed June 13. The statements had been prepared for agency officials facing questions from Congress or the media over the revelations contained in classified documents that Snowden leaked to journalists Glenn Greenwald, Barton Gellman and others. A letter accompanying the documents notes that the talking points “are prepared and approved for a speaker to use and do not necessarily represent what the speaker actually said at the event.” The NSA has not yet turned over to Al Jazeera the documents the agency used to prepare the talking points, saying those materials require additional review before they can be released.  The attacks on the World Trade Center and the Pentagon also appear at the top of another talking-points document titled “Media Leaks One Card,” which contains 13 bullet points to explain the rationale behind the surveillance programs. Those points include “First responsibility is to defend the nation” and “NSA and its partners must make sure we connect the dots so that the nation is never attacked again like it was on 9/11.”
  • ...2 more annotations...
  • The master talking points list goes on to explain, under a subheading titled “We Needed to Connect the Dots,” that “post-9/11 we made several changes and added a number of capabilities to enable us to connect the dots.” Continuing revelations from the Snowden documents reveal surveillance on a scale that appears to go far beyond the scope of monitoring potential attackers, however. The agency’s “head of state collection” program, for example, reportedly included the monitoring of German Chancellor Angela Merkel’s mobile phone. The talking points document advises officials to emphasize the word “lawful” when discussing NSA surveillance programs, and to state that “our allies have benefited … just as we have.” “We believe that over 100 nations are capable of collecting signals intelligence or operating a lawful intercept capability that enable them to monitor communications,” the document continued.
  • Critics have called into question the veracity of the claim that NSA surveillance has thwarted more than 50 “potential” attacks. They claim evidence to support such assertions is lacking. NSA officials are advised to respond to questions about any potential civil liberties violations by citing talking points that say there have not been any “willful violations” and that the NSA is committed to “upholding the privacy and civil liberties of the American people.”
  •  
    27 pages of talking points appended to the article, plus a two-page cover letter. It's the scripts for just about everything official that's been coming out of NSA and the Administration. Interesting reading; they cover some things that haven't yet come up.   
Paul Merrell

What America will offer Israel after the nuclear deal | Jewish Telegraphic Agency - 0 views

  • The moment the Iran nuclear deal becomes law, as seems increasingly likely given growing congressional support for the agreement, the focus of the U.S.-Israel conversation will shift to the question of what’s next. What more will Washington do to mitigate the Iranian threat and reassure Israel and other regional allies? For starters, President Barack Obama seems ready to offer an array of security enhancements. Among them are accelerating and increasing defense assistance to Israel over the next decade; increasing the U.S. military presence in the Middle East; stepping up the enforcement of non-nuclear related Iran sanctions; enhancing U.S. interdiction against disruptive Iranian activity in the region; and increasing cooperation on missile defense.
  • Obama in an interview Monday with the Forward attached urgency to confronting Hezbollah and other Iranian proxies. Speaking of Israel, he said, “We can do even more to enhance the unprecedented military and intelligence cooperation that we have with them, and to see, are there additional capabilities that Israel may be able to use to prevent Hezbollah, for example, from getting missiles.” The emphasis on Hezbollah was appropriate, said Uzi Arad, Netanyahu’s national security adviser from 2009 to 2011. “The president on sensing a degree of urgency with Hezbollah sooner rather than later is absolutely right,” Arad said, noting the group’s role as an Iranian proxy in helping prop up the Assad regime in Syria. “It relates to the need to uproot and to neutralize the violent and anti-American and anti-Israel radical group. It is a matter of urgent joint concern.” Arad outlined a number of areas that would enhance Israel’s sense of security in a post-deal environment, including:
  • Israeli Prime Minister Benjamin Netanyahu, not wanting to be seen as endorsing the deal while there’s still a chance Congress could scuttle it, has directed Israeli officials not to engage with U.S. officials on what could be done after the deal is in place. The Israeli envoy to Washington, Ron Dermer, has said that Israel would be ready for discussions only after options to kill the agreement formally known as the Joint Comprehensive Plan of Action are exhausted.
  • ...6 more annotations...
  • Congress has until Sept. 17 to decide whether to allow the deal to proceed. The American Israel Public Affairs Committee, which is leading the opposition to the deal, argued in a memo distributed Monday that U.S. pledges of post-deal security enhancements are inadequate.
  • There also will be an emphasis on keeping any of the tens of billions of dollars to which Iran will gain unfettered access through the sanctions relief from reaching Iran’s proxies.
  • * Maintaining Israel’s qualitative military edge in the region, even as the United States enhances the military capabilities of Arab Persian Gulf allies that, similar to Israel, will be seeking reassurances in the wake of the Iran deal; * Enhancing joint missile defense programs; * Extending the defense assistance memorandum of understanding, which since 2008 has provided Israel with an average of $3 billion in defense assistance per year, for another 10 years (it’s set to expire in 2018), and delivering promised F-35 advanced fighter aircraft to Israel; * Enhancing joint civilian scientific research and development; * Delivering advanced bunker-buster bombs to maintain Israel’s deterrent edge should Iran cheat on or abandon the deal. “Israel should be given this special kind of ordnance so it could have a more effective military option in case of Iranian violations of the agreement,” Arad said, arguing that this would strengthen the agreement by creating a disincentive for Iran to cheat. *A “declaratory” component emphasizing U.S. longstanding commitments to Israel.
  • * Making clear that the U.S. effort to stop the expansion of Islamist terrorism and extremism targets Iranian activities as well as those associated with the Islamic State terrorist group.
  • Obama touched on many of these issues in a letter he sent to Rep. Jerrold Nadler, D-N.Y., on Aug. 19. “It is imperative that, even as we effectively cut off Iran’s pathways to a nuclear weapon through the implementation of the JCPOA, we take steps to ensure that we and our allies and our partners are more capable than ever to deal with Iran’s destabilizing activities and support for terrorism,” Obama said in the letter, which was first obtained by The New York Times. The president specified four areas where cooperation would be enhanced: extending defense assistance for a decade, joint missile defense research, joint efforts to improve tunnel detection (following the advances made by Hamas in its 2014 war with Israel), and “strengthening our efforts to confront conventional and asymmetric threats.” The letter persuaded Nadler to back the deal and should be a salve to Israeli security officials, said Dan Arbell, a former deputy chief of mission at the U.S. Embassy in Washington.
  • Persian Gulf allies would want the reassurances that Israel is receiving as well as specific assurances of assistance in keeping Iran from meddling in Arab affairs, said Michael Eisenstadt, a longtime officer in the U.S. Army Reserve who served in the Middle East. Even with such assurances, Eisenstadt said, Gulf allies would remain concerned that the deal enhances Iran’s stature. “Weapons are Band-Aids on a hemorrhage,” said Eisenstadt, now a fellow at the Washington Institute for Near East Policy. “From the point of view of our allies in the region, we’ve contributed to a lot of the problem” by advancing the Iran deal.
Paul Merrell

Legislative Cyber Threats: CISA's Not The Only One | Just Security - 0 views

  • If anyone in the United States Senate had any doubts that the proposed Cyber Information Sharing Act (CISA) was universally hated by a range of civil society groups, a literal blizzard of faxes should’ve cleared up the issue by now. What’s not getting attention is a CISA “alternative” introduced last week by Sens. Mark Warner (D-Va) and Susan Collins (R-Me). Dubbed the “FISMA Reform Act,” the authors make the following claims about the bill:  This legislation would allow the Secretary of Homeland Security to operate intrusion detection and prevention capabilities on all federal agencies on the .gov domain. The bipartisan bill would also direct the Secretary of Homeland Security to conduct risk assessments of any network within the government domain. The bill would allow the Secretary of Homeland Security to operate defensive countermeasures on these networks once a cyber threat has been detected. The legislation would strengthen and streamline the authority Congress gave to DHS last year to issue binding operational directives to federal agencies, especially to respond to substantial cyber security threats in emergency circumstances.
  • The bill would require the Office of Management and Budget to report to Congress annually on the extent to which OMB has exercised its existing authority to enforce government wide cyber security standards. On the surface, it actually sounds like a rational response to the disastrous OPM hack. Unfortunately, the Warner-Collins bill has some vague or problematic language and non-existent definitions that make it potentially just as dangerous for data security and privacy as CISA. The bill would allow the Secretary of Homeland Security to carry out cyber security activities “in conjunction with other agencies and the private sector” [for] “assessing and fostering the development of information security technologies and capabilities for use across multiple agencies.” While the phrase “information sharing” is not present in this subsection, “security technologies and capabilities” is more than broad — and vague — enough to allow it.
  • The bill would also allow the secretary to “acquire, intercept, retain, use, and disclose communications and other system traffic that are transiting to or from or stored on agency information systems and deploy countermeasures with regard to the communications and system traffic.”
  • ...2 more annotations...
  • The bill also allows the head of a federal agency or department “to disclose to the Secretary or a private entity providing assistance to the Secretary…information traveling to or from or stored on an agency information system, notwithstanding any other law that would otherwise restrict or prevent agency heads from disclosing such information to the Secretary.” (Emphasis added.) So confidential, proprietary or other information otherwise precluded from disclosure under laws like HIPAA or the Privacy Act get waived if the Secretary of DHS or an agency head feel that your email needs to be shared with a government contracted outfit like the Hacking Team for analysis. And the bill explicitly provides for just this kind of cyber threat analysis outsourcing:
  • (3) PRIVATE ENTITIES. — The Secretary may enter into contracts or other agreements, or otherwise request and obtain the assistance of, private entities that provide electronic communication or information security services to acquire, intercept, retain, use, and disclose communications and other system traffic in accordance with this subsection. The bill further states that the content of your communications, will be retained only if the communication is associated with a known or reasonably suspected information security threat, and communications and system traffic will not be subject to the operation of a countermeasure unless associated with the threats. (Emphasis added.) “Reasonably suspected” is about as squishy a definition as one can find.
  •  
    "The bill also allows the head of a federal agency or department "to disclose to the Secretary or a private entity providing assistance to the Secretary…information traveling to or from or stored on an agency information system, notwithstanding any other law that would otherwise restrict or prevent agency heads from disclosing such information to the Secretary."" Let's see: if your information is intercepted by the NSA and stored on its "information system" in Bluffdale, Utah, then it can be disclosed to the Secretary of DHS or any private entity providing him/her with assistance, "notwithstanding any other law that would otherwise restrict or prevent agency heads from disclosing such information to the Secretary." And if NSA just happens to be intercepting every digital bit of data generated or received in the entire world, including the U.S., then it's all in play, "notwithstanding any other law that would otherwise restrict or prevent agency heads from disclosing such information to the Secretary.". Sheesh! Our government voyeurs never stop trying to get more nude pix and videos to view.  
Paul Merrell

From Radio to Porn, British Spies Track Web Users' Online Identities - 0 views

  • HERE WAS A SIMPLE AIM at the heart of the top-secret program: Record the website browsing habits of “every visible user on the Internet.” Before long, billions of digital records about ordinary people’s online activities were being stored every day. Among them were details cataloging visits to porn, social media and news websites, search engines, chat forums, and blogs. The mass surveillance operation — code-named KARMA POLICE — was launched by British spies about seven years ago without any public debate or scrutiny. It was just one part of a giant global Internet spying apparatus built by the United Kingdom’s electronic eavesdropping agency, Government Communications Headquarters, or GCHQ. The revelations about the scope of the British agency’s surveillance are contained in documents obtained by The Intercept from National Security Agency whistleblower Edward Snowden. Previous reports based on the leaked files have exposed how GCHQ taps into Internet cables to monitor communications on a vast scale, but many details about what happens to the data after it has been vacuumed up have remained unclear.
  • Amid a renewed push from the U.K. government for more surveillance powers, more than two dozen documents being disclosed today by The Intercept reveal for the first time several major strands of GCHQ’s existing electronic eavesdropping capabilities.
  • The surveillance is underpinned by an opaque legal regime that has authorized GCHQ to sift through huge archives of metadata about the private phone calls, emails and Internet browsing logs of Brits, Americans, and any other citizens — all without a court order or judicial warrant
  • ...17 more annotations...
  • A huge volume of the Internet data GCHQ collects flows directly into a massive repository named Black Hole, which is at the core of the agency’s online spying operations, storing raw logs of intercepted material before it has been subject to analysis. Black Hole contains data collected by GCHQ as part of bulk “unselected” surveillance, meaning it is not focused on particular “selected” targets and instead includes troves of data indiscriminately swept up about ordinary people’s online activities. Between August 2007 and March 2009, GCHQ documents say that Black Hole was used to store more than 1.1 trillion “events” — a term the agency uses to refer to metadata records — with about 10 billion new entries added every day. As of March 2009, the largest slice of data Black Hole held — 41 percent — was about people’s Internet browsing histories. The rest included a combination of email and instant messenger records, details about search engine queries, information about social media activity, logs related to hacking operations, and data on people’s use of tools to browse the Internet anonymously.
  • Throughout this period, as smartphone sales started to boom, the frequency of people’s Internet use was steadily increasing. In tandem, British spies were working frantically to bolster their spying capabilities, with plans afoot to expand the size of Black Hole and other repositories to handle an avalanche of new data. By 2010, according to the documents, GCHQ was logging 30 billion metadata records per day. By 2012, collection had increased to 50 billion per day, and work was underway to double capacity to 100 billion. The agency was developing “unprecedented” techniques to perform what it called “population-scale” data mining, monitoring all communications across entire countries in an effort to detect patterns or behaviors deemed suspicious. It was creating what it said would be, by 2013, “the world’s biggest” surveillance engine “to run cyber operations and to access better, more valued data for customers to make a real world difference.”
  • A document from the GCHQ target analysis center (GTAC) shows the Black Hole repository’s structure.
  • The data is searched by GCHQ analysts in a hunt for behavior online that could be connected to terrorism or other criminal activity. But it has also served a broader and more controversial purpose — helping the agency hack into European companies’ computer networks. In the lead up to its secret mission targeting Netherlands-based Gemalto, the largest SIM card manufacturer in the world, GCHQ used MUTANT BROTH in an effort to identify the company’s employees so it could hack into their computers. The system helped the agency analyze intercepted Facebook cookies it believed were associated with Gemalto staff located at offices in France and Poland. GCHQ later successfully infiltrated Gemalto’s internal networks, stealing encryption keys produced by the company that protect the privacy of cell phone communications.
  • Similarly, MUTANT BROTH proved integral to GCHQ’s hack of Belgian telecommunications provider Belgacom. The agency entered IP addresses associated with Belgacom into MUTANT BROTH to uncover information about the company’s employees. Cookies associated with the IPs revealed the Google, Yahoo, and LinkedIn accounts of three Belgacom engineers, whose computers were then targeted by the agency and infected with malware. The hacking operation resulted in GCHQ gaining deep access into the most sensitive parts of Belgacom’s internal systems, granting British spies the ability to intercept communications passing through the company’s networks.
  • In March, a U.K. parliamentary committee published the findings of an 18-month review of GCHQ’s operations and called for an overhaul of the laws that regulate the spying. The committee raised concerns about the agency gathering what it described as “bulk personal datasets” being held about “a wide range of people.” However, it censored the section of the report describing what these “datasets” contained, despite acknowledging that they “may be highly intrusive.” The Snowden documents shine light on some of the core GCHQ bulk data-gathering programs that the committee was likely referring to — pulling back the veil of secrecy that has shielded some of the agency’s most controversial surveillance operations from public scrutiny. KARMA POLICE and MUTANT BROTH are among the key bulk collection systems. But they do not operate in isolation — and the scope of GCHQ’s spying extends far beyond them.
  • The agency operates a bewildering array of other eavesdropping systems, each serving its own specific purpose and designated a unique code name, such as: SOCIAL ANTHROPOID, which is used to analyze metadata on emails, instant messenger chats, social media connections and conversations, plus “telephony” metadata about phone calls, cell phone locations, text and multimedia messages; MEMORY HOLE, which logs queries entered into search engines and associates each search with an IP address; MARBLED GECKO, which sifts through details about searches people have entered into Google Maps and Google Earth; and INFINITE MONKEYS, which analyzes data about the usage of online bulletin boards and forums. GCHQ has other programs that it uses to analyze the content of intercepted communications, such as the full written body of emails and the audio of phone calls. One of the most important content collection capabilities is TEMPORA, which mines vast amounts of emails, instant messages, voice calls and other communications and makes them accessible through a Google-style search tool named XKEYSCORE.
  • As of September 2012, TEMPORA was collecting “more than 40 billion pieces of content a day” and it was being used to spy on people across Europe, the Middle East, and North Africa, according to a top-secret memo outlining the scope of the program. The existence of TEMPORA was first revealed by The Guardian in June 2013. To analyze all of the communications it intercepts and to build a profile of the individuals it is monitoring, GCHQ uses a variety of different tools that can pull together all of the relevant information and make it accessible through a single interface. SAMUEL PEPYS is one such tool, built by the British spies to analyze both the content and metadata of emails, browsing sessions, and instant messages as they are being intercepted in real time. One screenshot of SAMUEL PEPYS in action shows the agency using it to monitor an individual in Sweden who visited a page about GCHQ on the U.S.-based anti-secrecy website Cryptome.
  • Partly due to the U.K.’s geographic location — situated between the United States and the western edge of continental Europe — a large amount of the world’s Internet traffic passes through its territory across international data cables. In 2010, GCHQ noted that what amounted to “25 percent of all Internet traffic” was transiting the U.K. through some 1,600 different cables. The agency said that it could “survey the majority of the 1,600” and “select the most valuable to switch into our processing systems.”
  • According to Joss Wright, a research fellow at the University of Oxford’s Internet Institute, tapping into the cables allows GCHQ to monitor a large portion of foreign communications. But the cables also transport masses of wholly domestic British emails and online chats, because when anyone in the U.K. sends an email or visits a website, their computer will routinely send and receive data from servers that are located overseas. “I could send a message from my computer here [in England] to my wife’s computer in the next room and on its way it could go through the U.S., France, and other countries,” Wright says. “That’s just the way the Internet is designed.” In other words, Wright adds, that means “a lot” of British data and communications transit across international cables daily, and are liable to be swept into GCHQ’s databases.
  • A map from a classified GCHQ presentation about intercepting communications from undersea cables. GCHQ is authorized to conduct dragnet surveillance of the international data cables through so-called external warrants that are signed off by a government minister. The external warrants permit the agency to monitor communications in foreign countries as well as British citizens’ international calls and emails — for example, a call from Islamabad to London. They prohibit GCHQ from reading or listening to the content of “internal” U.K. to U.K. emails and phone calls, which are supposed to be filtered out from GCHQ’s systems if they are inadvertently intercepted unless additional authorization is granted to scrutinize them. However, the same rules do not apply to metadata. A little-known loophole in the law allows GCHQ to use external warrants to collect and analyze bulk metadata about the emails, phone calls, and Internet browsing activities of British people, citizens of closely allied countries, and others, regardless of whether the data is derived from domestic U.K. to U.K. communications and browsing sessions or otherwise. In March, the existence of this loophole was quietly acknowledged by the U.K. parliamentary committee’s surveillance review, which stated in a section of its report that “special protection and additional safeguards” did not apply to metadata swept up using external warrants and that domestic British metadata could therefore be lawfully “returned as a result of searches” conducted by GCHQ.
  • Perhaps unsurprisingly, GCHQ appears to have readily exploited this obscure legal technicality. Secret policy guidance papers issued to the agency’s analysts instruct them that they can sift through huge troves of indiscriminately collected metadata records to spy on anyone regardless of their nationality. The guidance makes clear that there is no exemption or extra privacy protection for British people or citizens from countries that are members of the Five Eyes, a surveillance alliance that the U.K. is part of alongside the U.S., Canada, Australia, and New Zealand. “If you are searching a purely Events only database such as MUTANT BROTH, the issue of location does not occur,” states one internal GCHQ policy document, which is marked with a “last modified” date of July 2012. The document adds that analysts are free to search the databases for British metadata “without further authorization” by inputing a U.K. “selector,” meaning a unique identifier such as a person’s email or IP address, username, or phone number. Authorization is “not needed for individuals in the U.K.,” another GCHQ document explains, because metadata has been judged “less intrusive than communications content.” All the spies are required to do to mine the metadata troves is write a short “justification” or “reason” for each search they conduct and then click a button on their computer screen.
  • Intelligence GCHQ collects on British persons of interest is shared with domestic security agency MI5, which usually takes the lead on spying operations within the U.K. MI5 conducts its own extensive domestic surveillance as part of a program called DIGINT (digital intelligence).
  • GCHQ’s documents suggest that it typically retains metadata for periods of between 30 days to six months. It stores the content of communications for a shorter period of time, varying between three to 30 days. The retention periods can be extended if deemed necessary for “cyber defense.” One secret policy paper dated from January 2010 lists the wide range of information the agency classes as metadata — including location data that could be used to track your movements, your email, instant messenger, and social networking “buddy lists,” logs showing who you have communicated with by phone or email, the passwords you use to access “communications services” (such as an email account), and information about websites you have viewed.
  • Records showing the full website addresses you have visited — for instance, www.gchq.gov.uk/what_we_do — are treated as content. But the first part of an address you have visited — for instance, www.gchq.gov.uk — is treated as metadata. In isolation, a single metadata record of a phone call, email, or website visit may not reveal much about a person’s private life, according to Ethan Zuckerman, director of Massachusetts Institute of Technology’s Center for Civic Media. But if accumulated and analyzed over a period of weeks or months, these details would be “extremely personal,” he told The Intercept, because they could reveal a person’s movements, habits, religious beliefs, political views, relationships, and even sexual preferences. For Zuckerman, who has studied the social and political ramifications of surveillance, the most concerning aspect of large-scale government data collection is that it can be “corrosive towards democracy” — leading to a chilling effect on freedom of expression and communication. “Once we know there’s a reasonable chance that we are being watched in one fashion or another it’s hard for that not to have a ‘panopticon effect,’” he said, “where we think and behave differently based on the assumption that people may be watching and paying attention to what we are doing.”
  • When compared to surveillance rules in place in the U.S., GCHQ notes in one document that the U.K. has “a light oversight regime.” The more lax British spying regulations are reflected in secret internal rules that highlight greater restrictions on how NSA databases can be accessed. The NSA’s troves can be searched for data on British citizens, one document states, but they cannot be mined for information about Americans or other citizens from countries in the Five Eyes alliance. No such constraints are placed on GCHQ’s own databases, which can be sifted for records on the phone calls, emails, and Internet usage of Brits, Americans, and citizens from any other country. The scope of GCHQ’s surveillance powers explain in part why Snowden told The Guardian in June 2013 that U.K. surveillance is “worse than the U.S.” In an interview with Der Spiegel in July 2013, Snowden added that British Internet cables were “radioactive” and joked: “Even the Queen’s selfies to the pool boy get logged.”
  • In recent years, the biggest barrier to GCHQ’s mass collection of data does not appear to have come in the form of legal or policy restrictions. Rather, it is the increased use of encryption technology that protects the privacy of communications that has posed the biggest potential hindrance to the agency’s activities. “The spread of encryption … threatens our ability to do effective target discovery/development,” says a top-secret report co-authored by an official from the British agency and an NSA employee in 2011. “Pertinent metadata events will be locked within the encrypted channels and difficult, if not impossible, to prise out,” the report says, adding that the agencies were working on a plan that would “(hopefully) allow our Internet Exploitation strategy to prevail.”
Gary Edwards

Tomgram: Michael Klare, Superpower in Distress | TomDispatch - 0 views

  • In response, the Obama administration dispatched thousands of new advisers and trainers and began shipping in piles of new weaponry to re-equip the Iraqi army.  It also filled Iraqi skies with U.S. planes armed with their own munitions to destroy, among other things, some of that captured U.S. weaponry.  Then it set to work standing up a smaller version of the Iraqi army.  Now, skip nearly a year ahead and on a somewhat lesser scale the whole process has just happened again.  Less than two weeks ago, Islamic State militants took Ramadi, the capital of Anbar Province.  Iraqi army units, including the elite American-trained Golden Division, broke and fled, leaving behind -- you’ll undoubtedly be shocked to hear -- yet another huge cache of weaponry and equipment, including tanks, more than 100 Humvees and other vehicles, artillery, and so on. The Obama administration reacted in a thoroughly novel way: it immediately began shipping in new stocks of weaponry, starting with 1,000 antitank weapons, so that the reconstituted Iraqi military could take out future “massive suicide vehicle bombs” (some of which, assumedly, will be those captured vehicles from Ramadi).  Meanwhile, American planes began roaming the skies over that city, trying to destroy some of the equipment IS militants had captured.
  • Notice anything repetitive in all this -- other than another a bonanza for U.S. weapons makers?  Logically, it would prove less expensive for the Obama administration to simply arm the Islamic State directly before sending in the air strikes
  • In any case, what a microcosm of U.S. imperial hubris and folly in the twenty-first century all this training and equipping of the Iraqi military has proved to be.  Start with the post-invasion decision of the Bush administration to totally disband Saddam’s army and instantly eject hundreds of thousands of unemployed Sunni military men and a full officer corps into the chaos of the “new” Iraq and you have an instant formula for creating a Sunni resistance movement.  Then, add in a little extra “training” at Camp Bucca, a U.S. military prison in Iraq, for key unemployed officers, and -- Voilà! -- you’ve helped set up the petri dish in which the leadership of the Islamic State movement will grow.  Multiply such stunning tactical finesse many times over globally and, as TomDispatch regular Michael Klare makes clear today, you have what might be called the folly of the “sole superpower” writ large. Tom
  • ...9 more annotations...
  • Delusionary Thinking in Washington The Desperate Plight of a Declining Superpower By Michael T. Klare
  • Take a look around the world and it’s hard not to conclude that the United States is a superpower in decline. Whether in Europe, Asia, or the Middle East, aspiring powers are flexing their muscles, ignoring Washington’s dictates, or actively combating them. Russia refuses to curtail its support for armed separatists in Ukraine; China refuses to abandon its base-building endeavors in the South China Sea; Saudi Arabia refuses to endorse the U.S.-brokered nuclear deal with Iran; the Islamic State movement (ISIS) refuses to capitulate in the face of U.S. airpower. What is a declining superpower supposed to do in the face of such defiance? This is no small matter. For decades, being a superpower has been the defining characteristic of American identity. The embrace of global supremacy began after World War II when the United States assumed responsibility for resisting Soviet expansionism around the world; it persisted through the Cold War era and only grew after the implosion of the Soviet Union, when the U.S. assumed sole responsibility for combating a whole new array of international threats. As General Colin Powell famously exclaimed in the final days of the Soviet era, “We have to put a shingle outside our door saying, ‘Superpower Lives Here,’ no matter what the Soviets do, even if they evacuate from Eastern Europe.”
  • The problem, as many mainstream observers now acknowledge, is that such a strategy aimed at perpetuating U.S. global supremacy at all costs was always destined to result in what Yale historian Paul Kennedy, in his classic book The Rise and Fall of the Great Powers, unforgettably termed “imperial overstretch.” As he presciently wrote in that 1987 study, it would arise from a situation in which “the sum total of the United States’ global interests and obligations is… far larger than the country’s power to defend all of them simultaneously.”
  • The first of two approaches to this conundrum in Washington might be thought of as a high-wire circus act.  It involves the constant juggling of America’s capabilities and commitments, with its limited resources (largely of a military nature) being rushed relatively fruitlessly from one place to another in response to unfolding crises, even as attempts are made to avoid yet more and deeper entanglements. This, in practice, has been the strategy pursued by the current administration.  Call it the Obama Doctrine.
  • In other words, whoever enters the Oval Office in January 2017 will be expected to wield a far bigger stick on a significantly less stable planet. As a result, despite the last decade and a half of interventionary disasters, we’re likely to see an even more interventionist foreign policy with an even greater impulse to use military force.
  • The first step in any 12-step imperial-overstretch recovery program would involve accepting the fact that American power is limited and global rule an impossible fantasy.
  • Accepted as well would have to be this obvious reality: like it or not, the U.S. shares the planet with a coterie of other major powers -- none as strong as we are, but none so weak as to be intimidated by the threat of U.S. military intervention.
  • Having absorbed a more realistic assessment of American power, Washington would then have to focus on how exactly to cohabit with such powers -- Russia, China, and Iran among them -- and manage its differences with them without igniting yet more disastrous regional firestorms. 
  • fewer military entanglements abroad, a diminishing urge to garrison the planet, reduced military spending, greater reliance on allies, more funds to use at home in rebuilding the crumbling infrastructure of a divided society, and a diminished military footprint in the Middle East.
  •  
    Thanks Marbux! "Think of this as a little imperial folly update -- and here's the backstory.  In the years after invading Iraq and disbanding Saddam Hussein's military, the U.S. sunk about $25 billion into "standing up" a new Iraqi army.  By June 2014, however, that army, filled with at least 50,000 "ghost soldiers," was only standing in the imaginations of its generals and perhaps Washington.  When relatively small numbers of Islamic State (IS) militants swept into northern Iraq, it collapsed, abandoning four cities -- including Mosul, the country's second largest -- and leaving behind enormous stores of U.S. weaponry, ranging from tanks and Humvees to artillery and rifles.  In essence, the U.S. was now standing up its future enemy in a style to which it was unaccustomed and, unlike the imploded Iraqi military, the forces of the Islamic State proved quite capable of using that weaponry without a foreign trainer or adviser in sight."
Paul Merrell

Land Destroyer: NATO's War on Syria Just Got Dirtier - 0 views

  • But even with the West's capitulation in Syria, and months passing without a shred of credible evidence produced, hacks among Western media continue to perpetuate the original narrative. Among these are of course corporate-financier funded think-tanks and propaganda fronts like the Brookings Institution, Foreign Policy Magazine, the Foundation for the Defense of Democracies (FDD), and establishment papers like the Guardian. In the middle of it all is couch-potato self-proclaimed weapons expert, Eliot Higgins, a representation of the West's propaganda 2.0 campaign.  UK-based Higgins lost his job and now spends his days combing social media sites for "evidence" he then analyzes and reports on. The Western media, with its propagandists expelled from Syria and many of its "sources" in Syria exposed in humiliating attempts to fabricate and manipulate evidence, quickly picked Higgins up and elevated his armchair blogging to "expert analysis." Since then, Higgins has joined the already discredited "Syrian Observatory for Human Rights" another UK-based individual, as the basis upon which the West's Syrian narrative spins. 
  • Whitaker is desperately attempting to keep the wheels on the establishment's new propaganda 2.0 vehicle - manipulating social media, much the way Hersh describes intelligence being manipulated, to create any outcome necessary to bolster a predetermined narrative.  What he doesn't address is the fact that Higgins' work almost entirely depends on videos posted online by people he does not know, who may be misrepresenting who they are, what they are posting, and their motivations for doing so - such is the nature of anonymity on the web and why this evidence alone is useless outside of a larger geopolitical context.  Both Whitaker and Higgins, who maintain that the Syrian government was behind the attacks, fail to address another glaring reality. A false flag attack is designed to look like the work of one's enemy. In other words, terrorists in Syria would use equipment, uniforms, weapons, and tactics that would pin the crime on the Syrian government. All Higgins has proved, thus far, is that the superficial details of the operation made for a convincing false flag attack. 
  • Toward the end of Higgin's piece, he, like his friends at the Guardian, attempt to claim Al Nusra, contrary to Hersh's report, are most likely not capable of producing sarin.
  • ...5 more annotations...
  • The e-mails illustrate prior knowledge of chemical weapons falling into the hands of terrorists who fully planned on using them in a false flag operation. Higgins and others had this information, and now, have Seymour Hersh's report as well, yet they still pose the argument that the militants had neither the ability nor the means to carry out the attacks. In fact, it appears that the Western media and underlings like Higgins went out of their way specifically to discredit the notion from even being considered.  In other words, a concerted cover-up.  The e-mails above, and others in the large cache also reveal the possible motivation for these lies. So-called journalists and researchers peddling the West's narrative appear to have a wide range of lucrative offers presented to them, as well as funding for them to continue doing the work they are already involved in. This of course is only the case so long as their narratives mesh with the institutions, corporations, and individuals cutting the checks. 
  • The e-mails reveal multiple correspondences regarding chemical weapons falling into the hands of terrorists aimed at using them in a false flag operation, Higgins' and Van Dyke's mutual "benefactor" located in Virginia, "near DC" (Langley, Virginia?), and job offers for Higgins from NGOs and a defense contractor involving "open source intelligence," the new buzzword used by Higgins and Whitaker in regards to the new form of propaganda they both participate in. 
  • While perhaps Higgins and company missed that CNN report, it is now revealed that at least Higgins, and several other journalists were told by an American contractor on the ground inside of Syria, that militants had gained access to chemical weapons and more importantly, were planning to use them in a false flag attack - this months before the August 21 attack in Damascus.   The Syrian Electronic Army (SEA) has released e-mails this week between American contractor Matthew Van Dyke and members of the Western media, including Higgins. The e-mails indicated that militants had chemical weapons and were planning to use them in an attack to frame the Syrian government - serving as impetus for wider foreign intervention. SEA's emails have been confirmed by Higgins himself in a series of self-incriminating tweets where he goes, point-by-point, attempting to provide explanations for the damning revelations. 
  • Why would Higgins even mention the possibility of a false flag attack, when all that would do is alienate him from the establishment he is so eagerly trying to be a part of? His recent piece in Foreign Policy and the Guardian's ceaseless promotion of his work are favors that demand reciprocation - in the form of toeing the line and selling a narrative Higgins and others know is deceitful.  That Higgins, the Guardian, and Foreign Policy are prepared to throw veteran journalist Seymour Hersh under the bus to protect their interests, gives us a look into the depths of depravity within which this "new" media Whitaker celebrates, operate.  Worst of all for the West, is that the transparency and accountability they claim to uphold, had to be kept in check by the SEA - an organization wanted by the FBI as "terrorists." We would be led to believe by the likes of Whitaker, Higgins, and Van Dyke that the Syrian government and their supporters are the villains, but in their own words and actions we see the truth. 
  • Note: The full extent of SEA's leaked e-mails exposes Van Dyke and the journalists he associates with as utterly depraved, deceitful, unprincipled individuals each driven by untethered greed and narcissism. The e-mails also reveal that "aid ships" are used to bring in weapons and foreign fighters, that the Syrians are almost entirely behind the government and that the so-called revolution was "fake." Van Dyke is exposed as having conspired to kill a man and his entire family over a trivial personal dispute and much, much more. Readers are encouraged to comb through the archives, and to follow SEA on Twitter  @Official_SEA16.
  •  
    "Brown Moses" (Eliot Higgins) has been the principle source of "evidence" that the Assad government used chemical weapons, arguing strenuously that the "rebels" had no such capability. But the Syrian Electronic Army obtained a large number of emails between Higgins and an American mercenary working in Syria showing beyond doubt that Higgins had been put on notice in May 2013 -- months before the sarin gas attack near Damascus in late August -- that the "rebels" had sarin.   Oopsies!
Paul Merrell

Data Pirates of the Caribbean: The NSA Is Recording Every Cell Phone Call in the Bahamas - The Intercept - 0 views

  • The National Security Agency is secretly intercepting, recording, and archiving the audio of virtually every cell phone conversation on the island nation of the Bahamas. According to documents provided by NSA whistleblower Edward Snowden, the surveillance is part of a top-secret system – code-named SOMALGET – that was implemented without the knowledge or consent of the Bahamian government. Instead, the agency appears to have used access legally obtained in cooperation with the U.S. Drug Enforcement Administration to open a backdoor to the country’s cellular telephone network, enabling it to covertly record and store the “full-take audio” of every mobile call made to, from and within the Bahamas – and to replay those calls for up to a month. SOMALGET is part of a broader NSA program called MYSTIC, which The Intercept has learned is being used to secretly monitor the telecommunications systems of the Bahamas and several other countries, including Mexico, the Philippines, and Kenya. But while MYSTIC scrapes mobile networks for so-called “metadata” – information that reveals the time, source, and destination of calls – SOMALGET is a cutting-edge tool that enables the NSA to vacuum up and store the actual content of every conversation in an entire country.
  • All told, the NSA is using MYSTIC to gather personal data on mobile calls placed in countries with a combined population of more than 250 million people. And according to classified documents, the agency is seeking funding to export the sweeping surveillance capability elsewhere. The program raises profound questions about the nature and extent of American surveillance abroad. The U.S. intelligence community routinely justifies its massive spying efforts by citing the threats to national security posed by global terrorism and unpredictable rival nations like Russia and Iran. But the NSA documents indicate that SOMALGET has been deployed in the Bahamas to locate “international narcotics traffickers and special-interest alien smugglers” – traditional law-enforcement concerns, but a far cry from derailing terror plots or intercepting weapons of mass destruction.
  • By targeting the Bahamas’ entire mobile network, the NSA is intentionally collecting and retaining intelligence on millions of people who have not been accused of any crime or terrorist activity. Nearly five million Americans visit the country each year, and many prominent U.S. citizens keep homes there, including Sen. Tom Harkin (D-Iowa), Bill Gates, and Oprah Winfrey.
  • ...12 more annotations...
  • The Intercept has confirmed that as of 2013, the NSA was actively using MYSTIC to gather cell-phone metadata in five countries, and was intercepting voice data in two of them. Documents show that the NSA has been generating intelligence reports from MYSTIC surveillance in the Bahamas, Mexico, Kenya, the Philippines, and one other country, which The Intercept is not naming in response to specific, credible concerns that doing so could lead to increased violence. The more expansive full-take recording capability has been deployed in both the Bahamas and the unnamed country. MYSTIC was established in 2009 by the NSA’s Special Source Operations division, which works with corporate partners to conduct surveillance. Documents in the Snowden archive describe it as a “program for embedded collection systems overtly installed on target networks, predominantly for the collection and processing of wireless/mobile communications networks.”
  • If an entire nation’s cell-phone calls were a menu of TV shows, MYSTIC would be a cable programming guide showing which channels offer which shows, and when. SOMALGET would be the DVR that automatically records every show on every channel and stores them for a month. MYSTIC provides the access; SOMALGET provides the massive amounts of storage needed to archive all those calls so that analysts can listen to them at will after the fact. According to one NSA document, SOMALGET is “deployed against entire networks” in the Bahamas and the second country, and processes “over 100 million call events per day.”
  • When U.S. drug agents need to tap a phone of a suspected drug kingpin in another country, they call up their counterparts and ask them set up an intercept. To facilitate those taps, many nations – including the Bahamas – have hired contractors who install and maintain so-called lawful intercept equipment on their telecommunications. With SOMALGET, it appears that the NSA has used the access those contractors developed to secretly mine the country’s entire phone system for “signals intelligence” –recording every mobile call in the country. “Host countries,” the document notes, “are not aware of NSA’s SIGINT collection.” “Lawful intercept systems engineer communications vulnerabilities into networks, forcing the carriers to weaken,” says Christopher Soghoian, the principal technologist for the American Civil Liberties Union. “Host governments really should be thinking twice before they accept one of these Trojan horses.”
  • The DEA has long been in a unique position to help the NSA gain backdoor access to foreign phone networks. “DEA has close relationships with foreign government counterparts and vetted foreign partners,” the manager of the NSA’s drug-war efforts reported in a 2004 memo. Indeed, with more than 80 international offices, the DEA is one of the most widely deployed U.S. agencies around the globe. But what many foreign governments fail to realize is that U.S. drug agents don’t confine themselves to simply fighting narcotics traffickers. “DEA is actually one of the biggest spy operations there is,” says Finn Selander, a former DEA special agent who works with the drug-reform advocacy group Law Enforcement Against Prohibition. “Our mandate is not just drugs. We collect intelligence.” What’s more, Selander adds, the NSA has aided the DEA for years on surveillance operations. “On our reports, there’s drug information and then there’s non-drug information,” he says. “So countries let us in because they don’t view us, really, as a spy organization.”
  • “I seriously don’t think that would be your run-of-the-mill legal interception equipment,” says the former engineer, who worked with hardware and software that typically maxed out at 1,000 intercepts. The NSA, by contrast, is recording and storing tens of millions of calls – “mass surveillance,” he observes, that goes far beyond the standard practices for lawful interception recognized around the world. The Bahamas Telecommunications Company did not respond to repeated phone calls and emails.
  • The proliferation of private contractors has apparently provided the NSA with direct access to foreign phone networks. According to the documents, MYSTIC draws its data from “collection systems” that were overtly installed on the telecommunications systems of targeted countries, apparently by corporate “partners” cooperating with the NSA. One NSA document spells out that “the overt purpose” given for accessing foreign telecommunications systems is “for legitimate commercial service for the Telco’s themselves.” But the same document adds: “Our covert mission is the provision of SIGINT,” or signals intelligence.
  • According to the NSA documents, MYSTIC targets calls and other data transmitted on  Global System for Mobile Communications networks – the primary framework used for cell phone calls worldwide. In the Philippines, MYSTIC collects “GSM, Short Message Service (SMS) and Call Detail Records” via access provided by a “DSD asset in a Philippine provider site.” (The DSD refers to the Defence Signals Directorate, an arm of Australian intelligence. The Australian consulate in New York declined to comment.) The operation in Kenya is “sponsored” by the CIA, according to the documents, and collects “GSM metadata with the potential for content at a later date.” The Mexican operation is likewise sponsored by the CIA. The documents don’t say how or under what pretenses the agency is gathering call data in those countries. In the Bahamas, the documents say, the NSA intercepts GSM data that is transmitted over what is known as the “A link”–or “A interface”–a core component of many mobile networks. The A link transfers data between two crucial parts of GSM networks – the base station subsystem, where phones in the field communicate with cell towers, and the network subsystem, which routes calls and text messages to the appropriate destination. “It’s where all of the telephone traffic goes,” says the former engineer.
  • When U.S. drug agents wiretap a country’s phone networks, they must comply with the host country’s laws and work alongside their law enforcement counterparts. “The way DEA works with our allies – it could be Bahamas or Jamaica or anywhere – the host country has to invite us,” says Margolis. “We come in and provide the support, but they do the intercept themselves.” The Bahamas’ Listening Devices Act requires all wiretaps to be authorized in writing either by the minister of national security or the police commissioner in consultation with the attorney general. The individuals to be targeted must be named. Under the nation’s Data Protection Act, personal data may only be “collected by means which are both lawful and fair in the circumstances of the case.” The office of the Bahamian data protection commissioner, which administers the act, said in a statement that it “was not aware of the matter you raise.” Countries like the Bahamas don’t install lawful intercepts on their own. With the adoption of international standards, a thriving market has emerged for private firms that are contracted by foreign governments to install and maintain lawful intercept equipment. Currently valued at more than $128 million, the global market for private interception services is expected to skyrocket to more than $970 million within the next four years, according to a 2013 report from the research firm Markets and Markets.
  • If the U.S. government wanted to make a case for surveillance in the Bahamas, it could point to the country’s status as a leading haven for tax cheats, corporate shell games, and a wide array of black-market traffickers. The State Department considers the Bahamas both a “major drug-transit country” and a “major money laundering country” (a designation it shares with more than 60 other nations, including the U.S.). According to the International Monetary Fund, as of 2011 the Bahamas was home to 271 banks and trust companies with active licenses. At the time, the Bahamian banks held $595 billion in U.S. assets. But the NSA documents don’t reflect a concerted focus on the money launderers and powerful financial institutions – including numerous Western banks – that underpin the black market for narcotics in the Bahamas. Instead, an internal NSA presentation from 2013 recounts with pride how analysts used SOMALGET to locate an individual who “arranged Mexico-to-United States marijuana shipments” through the U.S. Postal Service.
  • The presentation doesn’t say whether the NSA shared the information with the DEA. But the drug agency’s Special Operations Divison has come under fire for improperly using classified information obtained by the NSA to launch criminal investigations – and then creating false narratives to mislead courts about how the investigations began. The tactic – known as parallel construction – was first reported by Reuters last year, and is now under investigation by the Justice Department’s inspector general. So: Beyond a desire to bust island pot dealers, why would the NSA choose to apply a powerful collection tool such as SOMALGET against the Bahamas, which poses virtually no threat to the United States? The answer may lie in a document that characterizes the Bahamas operation as a “test bed for system deployments, capabilities, and improvements” to SOMALGET. The country’s small population – fewer than 400,000 residents – provides a manageable sample to try out the surveillance system’s features. Since SOMALGET is also operational in one other country, the Bahamas may be used as a sort of guinea pig to beta-test improvements and alterations without impacting the system’s operations elsewhere. “From an engineering point of view it makes perfect sense,” says the former engineer. “Absolutely.”
  • SOMALGET operates under Executive Order 12333, a Reagan-era rule establishing wide latitude for the NSA and other intelligence agencies to spy on other countries, as long as the attorney general is convinced the efforts are aimed at gathering foreign intelligence. In 2000, the NSA assured Congress that all electronic surveillance performed under 12333 “must be conducted in a manner that minimizes the acquisition, retention, and dissemination of information about unconsenting U.S. persons.” In reality, many legal experts point out, the lack of judicial oversight or criminal penalties for violating the order render the guidelines meaningless. “I think it would be open, whether it was legal or not,” says German, the former FBI agent. “Because we don’t have all the facts about how they’re doing it. For a long time, the NSA has been interpreting their authority in the broadest possible way, even beyond what an objective observer would say was reasonable.” “An American citizen has Fourth Amendment rights wherever they are,” adds Kurt Opsahl, an attorney with the Electronic Frontier Foundation. “Nevertheless, there have certainly been a number of things published over the last year which suggest that there are broad, sweeping programs that the NSA and other government agencies are doing abroad that sweep up the communications of Americans.”
  • Legal or not, the NSA’s covert surveillance of an entire nation suggests that it will take more than the president’s tepid “limits” to rein in the ambitions of the intelligence community. “It’s almost like they have this mentality – if we can, we will,” says German. “There’s no analysis of the long-term risks of doing it, no analysis of whether it’s actually worth the effort, no analysis of whether we couldn’t take those resources and actually put them on real threats and do more good.” It’s not surprising, German adds, that the government’s covert program in the Bahamas didn’t remain covert. “The undermining of international law and international cooperation is such a long-term negative result of these programs that they had to know would eventually be exposed, whether through a leak, whether through a spy, whether through an accident,” he says. “Nothing stays secret forever. It really shows the arrogance of these agencies – they were just going to do what they were going to do, and they weren’t really going to consider any other important aspects of how our long-term security needs to be addressed.”
  •  
    Words fail me.
Paul Merrell

ISIS: Made in Washington, Riyadh - and Tel Aviv by Justin Raimondo -- Antiwar.com - 0 views

  • The Islamic State in Iraq and Syria (ISIS) is being touted as the newest "threat" to the American homeland: hysterics have pointed to Chicago as the locus of their interest, and we are told by everyone from the President on down that if we don’t attack them – i.e. go back into Iraq (and even venture into Syria) to root them out – they’ll soon show up on American shores.
  • If we step back from the hysteria generated by the beheading of US journalist James Foley, what’s clear is that this new bogeyman is the creation of the United States and its allies in the region. ISIS didn’t just arise out of the earth like some Islamist variation on the fabled Myrmidons: they needed money, weapons, logistics, propaganda facilities, and international connections to reach the relatively high level of organization and lethality they seem to have achieved in such a short period of time. Where did they get these assets? None of this is any secret: Saudi Arabia, Qatar, and the rest of the oil-rich Gulf states have been backing them all the way. Prince Bandar al-Sultan, until recently the head of the Kingdom’s intelligence agency – and still the chief of its National Security Council – has been among their biggest backers. Qatar and the Gulf states have also been generous in their support for the Syrian jihadists who were too radical for the US to openly back. Although pressure from Washington – only recently exerted – has reportedly forced them to cut off the aid, ISIS is now an accomplished fact – and how can anyone say that support has entirely evaporated instead of merely going underground?
  • Washington’s responsibility for the success of ISIS is less direct, but no less damning. The US was in a de facto alliance with the groups that merged to form ISIS ever since President Barack Obama declared Syria’s Bashar al-Assad "must go" – and Washington started funding Syrian rebel groups whose composition and leadership kept changing. By funding the Free Syrian Army (FSA), our "vetted" Syrian Islamists, this administration has actively worked to defeat the only forces capable of rooting out ISIS from its Syrian nest – Assad’s Ba’athist government. Millions of dollars in overt aid – and who knows how much covertly? – were pumped into the FSA. How much of that seeped into the coffers of ISIS when constantly forming and re-forming chameleon-like rebel groups defected from the FSA? These defectors didn’t just go away: they joined up with more radical – and militarily effective – Islamist militias, some of which undoubtedly found their way to ISIS. How many ISIS cadres who started out in the FSA were trained and equipped by American "advisors" in neighboring Jordan? We’ll never know the exact answer to that question, but the number is very likely not zero – and this Mother Jones piece shows that, at least under the Clinton-Petraeus duo, the "vetting" process was a joke. Furthermore, Senator Rand Paul (R-Kentucky) may have been on to something when he confronted Hillary with the contention that some of the arms looted from Gaddafi’s arsenals may well have reached the Syrian rebels. There was, after all, the question of where that mysterious "charity ship," the Al Entisar, carrying "humanitarian aid" to the Syrian rebels headquartered in Turkey, sailed from.
  • ...3 more annotations...
  • In a recent public event held at the Aspen Institute, former Israeli ambassador to the US Michael Oren bluntly stated that in any struggle between the Sunni jihadists and their Iranian Shi’ite enemies, the former are the "lesser evil." They’re all "bad guys," says Oren, but "we always wanted Bashar Assad to go, we always preferred the bad guys who weren’t backed by Iran to the bad guys who were backed by Iran." Last year, Sima Shine, Israel’s Minister of Strategic Affairs, declared: "The alternative, whereby [Assad falls and] Jihadists flock to Syria, is not good. We have no good options in Syria. But Assad remaining along with the Iranians is worse. His ouster would exert immense pressure on Iran." None of this should come as much of a surprise to anyone who has been following Israel’s machinations in the region. It has long been known that the Israelis have been standing very close to the sidelines of the Syrian civil war, gloating and hoping for "no outcome," as this New York Times piece put it.
  • Secondly, the open backing by the US of particular Syrian rebel groups no doubt discredited them in the eyes of most Islamist types, driving them away from the FSA and into the arms of ISIS. When it became clear Washington wasn’t going to provide air support for rebel actions on the ground, these guys left the FSA in droves – and swelled the ranks of groups that eventually coalesced into ISIS. Thirdly, the one silent partner in all this has been the state of Israel. While there is no evidence of direct Israeli backing, the public statements of some top Israeli officials lead one to believe Tel Aviv has little interest in stopping the ISIS threat – except, of course, to urge Washington to step deeper into the Syrian quagmire.
  • Israel’s goal in the region has been to gin up as much conflict and chaos as possible, keeping its Islamic enemies divided, making it impossible for any credible challenge to arise among its Arab neighbors – and aiming the main blow at Tehran. As Ambassador Oren so brazenly asserted – while paying lip service to the awfulness of ISIS and al-Qaeda – their quarrel isn’t really with the Arabs, anyway – it’s with the Persians, whom they fear and loathe, and whose destruction has been their number one objective since the days of Ariel Sharon. Why anyone is shocked that our Middle Eastern allies have been building up Sunni radicals in the region is beyond me – because this has also been de facto US policy since the Bush administration, which began recruiting American assets in the Sunni region as the linchpin of the Iraqi "surge." This was part and parcel of the so-called "Sunni turn," or "redirection," in Seymour Hersh’s phrase, which, as I warned in 2006, would become Washington’s chosen strategy for dealing with what they called the "Shia crescent" – the crescent-shaped territory spanning Iran, Iraq, Syria, and parts of Lebanon under Hezbollah’s control, which the neocons began pointing to as the Big New Threat shortly after Saddam Hussein’s defeat.
  •  
    If one were to attempt to write the most damning yet throughly referenced report on U.S. involvement with ISIL, this manuscript would make a very good first draft.  But probably unintentionally, the author gives less credit to Israel than it is due. At least twice (and I think more but would have to check), the Israeli Air Force has struck Syria, destroying Russian heavy weaponry, missiles capable of reaching Israel, being delivered to the Lebanonese Hezbollah in Syria. Hesbollah is fighting side-by-side with the Syrian government forces in Syria. So Israel has had a direct and overt hand in the Syrian war. 
Paul Merrell

​Energy ballet: Iran, Russia and 'Pipelineistan' - RT Op-Edge - 0 views

  • A fascinating nuclear/energy ballet involving Iran, Russia, the US and the EU is bound to determine much of what happens next in the new great game in Eurasia. Let’s start with what’s going on with the Iranian nuclear dossier.
  • As we stand, the gap between the US, Russia, China, Britain, France and Germany on one side, and Iran on the other side, remains very wide. Essentially, the gap that really matters is between Washington and Tehran. And that, unfortunately, translates as a few more months for the vast sabotage brigade – from US neo-cons and assorted warmongers to Israel and the House of Saud – to force the deal to collapse. One of Washington’s sabotage mantras is “breakout capability”; a dodgy concept which boils down to total centrifuge capacity/capability to produce enough enriched uranium for a single nuclear bomb. This implies an arbitrary limit on Iran’s capacity to enrich uranium. The other sabotage mantra forces Iran to shut down the whole of its uranium enrichment program, and on top of it negotiate on its missiles. That’s preposterous; missiles are part of conventional armed forces. Washington in this instance is changing the subject to missiles that might carry the nuclear warheads that Iran does not have. So they should also be banned. Moscow and Beijing see “breakout capability” for what it is; a manufactured issue. While Washington says it wants a deal, Moscow and Beijing do want a deal – stressing it can be respected via strict monitoring.
  • ranian Supreme Leader Ayatollah Khamenei has established his red line on the record, so there should be no misunderstanding; the final nuclear deal must preserve Tehran’s legitimate right to enrich uranium - on an industrial scale – as part of a long-term energy policy. This is what Iranian negotiators have been saying from the beginning. So shutting down uranium enrichment is a non-starter. Sanction me baby one more time Uranium enrichment, predictably, is the key to the riddle. As it stands, Tehran now has more than 19,000 installed enrichment centrifuges. Washington wants it reduced to a few thousand. Needless to add, Israel – which has over 200 nuclear warheads and the missiles to bomb Iran, the whole thing acquired through espionage and illegal arms deals – presses for zero enrichment. In parallel undercurrents, we still have the usual US/Israeli “experts” predicting that Iran can produce a bomb in two to three months while blasting Tehran for “roadblocks” defending its “illicit” nuclear program. At least US National Security Adviser Susan Rice has momentarily shut up.
  • ...4 more annotations...
  • Another key contention point is the Arak heavy-water research reactor. Washington wants it scrapped – or converted into a light-water plant. Tehran refuses, arguing the reactor would only produce isotopes for medicine and agriculture. And then there’s the sanctions hysteria. The UN and the US have been surfing a sanction tidal wave since 2006. Tehran initially wanted those heavy sanctions which amount to economic war lifted as soon as possible; then it settled for a progressive approach. Obama might be able to lift some sanctions – but a US Congress remote-controlled by Tel Aviv will try to keep others for eternity. Here, with plenty of caveats is a somewhat detailed defense of a good deal compared to what may lead towards an apocalyptic road to war.
  • It’s a tragicomedy, really. Washington plays The Great Pretender, faking it full-time that Israel is not a nuclear-armed power while trying to convince the whole planet Israel is entitled to amass as many weapons as it wants while Iran is not allowed to even have conventional means to defend itself. Not to mention that nuclear-armed Israel has threatened and invaded virtually all of its neighbors, while Iran has invaded nothing.
  • As harsh as they really are, sanctions did not force Tehran to kneel and submit. Khamenei has repeatedly said he’s not optimistic about a nuclear deal. What he really wants, much more than a deal, is an improved economy. Now, with the sanctions cracking after the initial Geneva agreement, there is light at the end of the tunnel. Enter turbo-charged Russia-Iran negotiations. They include a power deal worth up to $10 billion, including new thermal and hydroelectric plants and a transmission network.
  • In many overlapping ways, the Iranian nuclear dossier now is like a hall of mirrors. It reflects an unstated Washington dream; unfettered access for US corporations to a virgin market of 77 million, including a well- educated young urban population, plus an energy bonanza for US Big Oil. But in the hall of mirrors there’s also the Iranian projection – as in fulfilling its destiny as the top geopolitical power in Southwest Asia, the ultimate crossroads between East and West. So in a sense the Supreme Leader has it all covered. If Rouhani shines and there is a final nuclear deal, the economic scenario will vastly improve, especially via massive European investment. If Washington scotches the deal over pressure from the usual lobbies, Tehran can always say it exercised all of its “heroic flexibility,” and move on – as in closer and closer integration with both Russia and China.
  •  
    Pepe Escobar
Paul Merrell

Tacoma, Wash. police use 'Stingray' system to sweep cellphone data | Al Jazeera America - 0 views

  • A Washington state police department just south of Seattle has for years been quietly using controversial surveillance equipment that can collect records of all cellphone calls, text messages and data transfers within a half-mile radius, according to local media. The Stingray surveillance system, deployed by the Tacoma Police Department since 2009, “tricks cellphones into thinking it’s a cell tower and draws in their information,” local news website The Olympian reported Wednesday. The device is reportedly capable of indiscriminate data collection, which worries civil rights advocates. The American Civil Liberties Union (ACLU) said it has identified at least 43 police departments in 18 states that use Stingray equipment. The rights group said on its website that police use of such a device may violate the U.S. Constitution's Fourth Amendment, and with taxpayers’ money.
  • "The result is that police gather the electronic serial numbers and other information about phones, as well as the direction and strength of each phone's signal, allowing precise location tracking,” the ACLU said. “Stingrays can also gather information about people's communications, such as which phone numbers they call. Because we carry our cellphones with us virtually everywhere we go, Stingrays can paint a precise picture of where we are and who we spend time with, including our location in a lover's house, in a psychologist's office or at a political protest." Tacoma Police Department’s Assistant Police Chief Kathy McAlpine said that officers only use Stingray with permission from a judge, and that they do not collect data. “It is used in felony-level crimes to locate suspects wanted for crimes such as homicide, rape, robbery, kidnapping, and narcotics trafficking,” McAlpine said. The department said the device has been used nearly 200 times since June.
  • The Tacoma City Council approved buying an updated version of the equipment in March 2013 on the grounds that it would be used to find improvised explosive devices. McAlpine said they have never used the Stingray to locate such a device. Civil rights groups said they are concerned about the possibility of indiscriminate data collection, and worry that police could store the data of innocent citizens. “They are essentially searching the homes of innocent Americans to find one phone used by one person,” said Christopher Soghoian, principal technologist with the ACLU in Washington, D.C. “It’s like they’re kicking down the doors of 50 homes and searching 50 homes because they don’t know where the bad guy is.” A similar controversy erupted in nearby Seattle last November, when  alternative news website The Stranger reported that a new apparatus capable of geo-locating and tracking the movement of any wireless device that passes it was quietly installed in a Seattle neighborhood.
  • ...1 more annotation...
  • The U.S. Supreme Court unanimously ruled in June that warrantless searches of cellphone data were illegal in most cases. It is unclear how the ruling would apply to such a device that is capable of indiscriminate data collection, but police say it is not used for that purpose.
Paul Merrell

War Is Going Badly for Kiev. Which Makes It All the More Dangerous - Russia Insider - 0 views

  • I have been trying to wait as long as possible to get some facts confirmed, but at this point in time I am confident enough to say that there are numerous and convergent signs that things are going extremely badly for the regime in Kiev. Just look at the following recent headlines:​Kiev urgently summons NATO-Ukraine meeting in BrusselsJunta officers get the right to shoot their man in case of insubordinationKiev introduces state of emergency in Donbass, high alert across UkraineResistance to New Wave of Ukraine Mobilization Has Already BegunPanic in Kiev: Ukrainian forces surrender DonbassClearly, things are not going well *at all* for the Junta.
  • I am generally weary of triumphalism and I always get nervous when I see somebody underestimating the enemy.  Most importantly, we should remember that while the regime in Kiev seems to be suffering major military losses, it still has two options available a false flag operation and declare war with Russia. Option one: false flagThe worse the Junta's military defeats, the higher the risk of a major false flag. Keep in mind that the Kiev Junta despises the east Ukrainian which it considers as "bugs", "insects" and "subhumans" which should be barbecued and that it will have no pity for its own forces if they are defeated or, worse, disloyal. And remember the Nazi slogan about Crimea: "the Crimea will be Ukrainian or empty". We have to assume that the regime in Kiev is capable of anything and, having already shot down a civilian airliner, I would not put it past them to sabotage a nuclear plant or some other very high risk target.
  • Option two: declare with with RussiaNotice, I did not say war "on Russia" because that would make Kiev the aggressor. But the Rada is quite capable tomorrow of declaring Russia an "aggressor state".And if that is not enough, Kiev is absolutely capable of striking (at least a few times) anywhere along the Russian-Ukrainian border (including in Crimea) in order to pull Russia in. Even if Russia does not take the bait and simply rides out the strikes, or if Russia responds with a very minimal amount of force, Kiev will continue to declare the "thousands" of Russian troops have invaded and that Russian "tactical battalion groups" are operating all along the line of contact. There is no way that Kiev will ever admit that its forces have been defeated by local Novorussian resistance fighters. In other words, any defeat of the Junta forces will always be presented as a "Russian aggression against the European choice of the free Ukrainian nation".Folks like Yatseniuk or Turchinov will never just flee like Yanukovich did - before they do that, they will make darn sure to destroy as much of the Ukraine as possible and that happens to be exactly the US plan too: if Uncle Sam cannot have it, neither will anybody else.
  • ...1 more annotation...
  • Things to look very, very bad for Kiev and the current tactical difficulties faced by the regime might well result in an operational level collapse. At which point we can expect all sides except the Novorussians to try to revive some kind of stale and futile "peace process" which the Novorussians will have to accept, except that this time around Russia will probably make more demands then the first time around. Now that Putin has declared that the Junta's army is just "NATO's legion" the mood in Moscow is rather dark and the disgust with Poroshenko and all his lies very widespread. So even if Russia accepts another cease-fire, the Junta will have to pay a price for its failed assault. I think that the loss of Mariupol might be one of the conditions demanded by Russia (at least I hope so).
Paul Merrell

TASS: Military & Defense - Putin: Russia to develop strike systems capable of penetrating any missile defense shield - 0 views

  • Russia will be developing strike systems capable of penetrating any missile defense shield, Russian President Vladimir Putin said on Tuesday. "We’ll be working on the anti-missile defense system as well, but at the first stage, as we have said on many occasions, we’ll also be working on strike systems capable of penetrating any anti-missile defense shield," Putin said at a meeting on the development of the Russian Armed Forces. Putin said the meeting would discuss the development of such weapon systems that would determine the outlook of the Russian Armed Forces for the next decade and will become a response to the challenges confronted by Russia. According to the Russian president, the true goal of the US missile defense shield is to neutralize Russia’s nuclear potential.
  • "The references to the Iranian and North Korean nuclear threats only disguise true plans. And their true purpose is to neutralize the strategic nuclear potential of other nuclear states, except the United States and its allies, first of all, the nuclear potential of our country, Russia," Putin said.
  • The United States and its allies continue building the global missile defense system, the Russian president said. "Moreover, unfortunately, they are not taking into account either our concerns or proposals for cooperation," Putin added. Russia has been assured on many occasions that the European segment of the US missile defense shield is developing in the wake of a threat from Iranian ballistic missiles, the Russian president said. "However, we know that the situation with the Iranian nuclear problem has been settled and the relevant agreements have been signed. Moreover, they have been approved by the relevant parliaments. Nevertheless, the work on anti-missile defense systems is continuing," Putin said. Therefore, the references to the Iranian and North Korean nuclear threats are only a cover for the US true plans, the Russian president said. "And the US true goals are to neutralize the strategic nuclear potential of other nuclear states, except the United States and its allies, first of all, the nuclear potential of our country, Russia. Hence the desire to get decisive supremacy with all ensuing consequences," Putin said. "We have said on many occasions that Russia will take all necessary measures to strengthen the potential of its strategic nuclear forces," the Russian president said.
Gary Edwards

Benghazi explained: Behind the lies - 1 views

  •  
    Maybe the most comprehensive article yet on what really happened in Benghazi.  I should note that years ago Craig B Hulet predicted the tak killing of ghaddafi and the takeover by rebels friendly with the Globalist.  His reasoning was that ADM (Archer Daniel Midland) and Monsanto were buying up all the arrable land in Africa.  Benghazi is the only deep water port capable of handling the ships needed to transfer the food grown on these acres.  Ghadafi had to go before this plan could be put in place.   http://www.craigbhulet.com/ http://www.coasttocoastam.com/show/2012/09/17 http://www.coasttocoastam.com/guest/hulet-craig/41926 excerpt: This is a special supplement of a multi-part interview with a government insider intimately familiar with the events that took place in Benghazi. It is important to note that the information contained in this series was developed from interviews that spanned over 100 hours. My source requested that the following information be written separately due to its importance.
Paul Merrell

Russia to Arm Syria, Despite Israel's Objection - Middle East - News - Israel National News - 0 views

  • Russia clarified on Thursday that it would go ahead with selling S-300 advanced missile systems to Syria, despite a request by Israel to cancel the deal. Speaking to the Lebanese-based Al-Mayadeen television, which is close to the Hizbullah terror group, Russian Foreign Minister Sergei Lavrov said that Russia is “committed to the agreements” signed with Syria regarding the advanced missiles and will “fully carry them out.”
  • An Israeli official told Channel 2 News on Thursday that Netanyahu made it clear to Putin that Israel views the sale of advanced systems to Syria as a “status quo changer” and tried to get him to intervene and halt the deal.
  • Meanwhile, the London-based Arabic-language Al-Quds Al-Arabi newspaper reported Tuesday that advanced Russian missile launchers have already been transferred to President Bashar al-Assad’s regime. According to the report, 200 launchers for advanced anti-aircraft S-300 missiles are already in Syrian hands, and Syrian experts have been fully trained to use the launchers and no longer need Russian supervision.
  •  
    Israel and the U.S. have been loudly protesting Russian sale of advanced anti-aircraft (ground-to-air) missiles to Syria, labeling them as an "ostacle to peace." Well, maybe, an obstacle to kind of peace the U.S. and Israeli governments want. Such missiles are purely defensive, i.e., have no offensive purpose. They are only an obstacle to invasion of Syria's sovereign airspace by foreign air forces. So yes, a "status quo changer," a Syrian capability to knock all but the stealthiest of U.S. aircraft out of the Syrian sky. No replay of the Lybia "no fly zone" game in Syria.
Paul Merrell

Secret to Prism program: Even bigger data seizure - 0 views

  • The revelation of Prism this month by the Washington Post and Guardian newspapers has touched off the latest round in a decade-long debate over what limits to impose on government eavesdropping, which the Obama administration says is essential to keep the nation safe. But interviews with more than a dozen current and former government and technology officials and outside experts show that, while Prism has attracted the recent attention, the program actually is a relatively small part of a much more expansive and intrusive eavesdropping effort. Americans who disapprove of the government reading their emails have more to worry about from a different and larger NSA effort that snatches data as it passes through the fiber optic cables that make up the Internet's backbone. That program, which has been known for years, copies Internet traffic as it enters and leaves the United States, then routes it to the NSA for analysis.
  • Whether by clever choice or coincidence, Prism appears to do what its name suggests. Like a triangular piece of glass, Prism takes large beams of data and helps the government find discrete, manageable strands of information. The fact that it is productive is not surprising; documents show it is one of the major sources for what ends up in the president's daily briefing. Prism makes sense of the cacophony of the Internet's raw feed. It provides the government with names, addresses, conversation histories and entire archives of email inboxes.
  • The NSA is prohibited from spying on Americans or anyone inside the United States. That's the FBI's job and it requires a warrant. Despite that prohibition, shortly after the Sept. 11 terrorist attacks, President George W. Bush secretly authorized the NSA to plug into the fiber optic cables that enter and leave the United States, knowing it would give the government unprecedented, warrantless access to Americans' private conversations. Tapping into those cables allows the NSA access to monitor emails, telephone calls, video chats, websites, bank transactions and more. It takes powerful computers to decrypt, store and analyze all this information, but the information is all there, zipping by at the speed of light. "You have to assume everything is being collected," said Bruce Schneier, who has been studying and writing about cryptography and computer security for two decades. The New York Times disclosed the existence of this effort in 2005. In 2006, former AT&T technician Mark Klein revealed that the company had allowed the NSA to install a computer at its San Francisco switching center, a key hub for fiber optic cables.
  • ...11 more annotations...
  • Many of the people interviewed for this report insisted on anonymity because they were not authorized to publicly discuss a classified, continuing effort. But those interviews, along with public statements and the few public documents available, show there are two vital components to Prism's success. The first is how the government works closely with the companies that keep people perpetually connected to each other and the world. That story line has attracted the most attention so far. The second and far murkier one is how Prism fits into a larger U.S. wiretapping program in place for years.
  • The government has said it minimizes all conversations and emails involving Americans. Exactly what that means remains classified. But former U.S. officials familiar with the process say it allows the government to keep the information as long as it is labeled as belonging to an American and stored in a special, restricted part of a computer. That means Americans' personal emails can live in government computers, but analysts can't access, read or listen to them unless the emails become relevant to a national security investigation. The government doesn't automatically delete the data, officials said, because an email or phone conversation that seems innocuous today might be significant a year from now. What's unclear to the public is how long the government keeps the data. That is significant because the U.S. someday will have a new enemy. Two decades from now, the government could have a trove of American emails and phone records it can tap to investigative whatever Congress declares a threat to national security.
  • The Bush administration shut down its warrantless wiretapping program in 2007 but endorsed a new law, the Protect America Act, which allowed the wiretapping to continue with changes: The NSA generally would have to explain its techniques and targets to a secret court in Washington, but individual warrants would not be required. Congress approved it, with Sen. Barack Obama, D-Ill., in the midst of a campaign for president, voting against it.
  • That's one example of how emails belonging to Americans can become swept up in the hunt. In that way, Prism helps justify specific, potentially personal searches. But it's the broader operation on the Internet fiber optics cables that actually captures the data, experts agree. "I'm much more frightened and concerned about real-time monitoring on the Internet backbone," said Wolf Ruzicka, CEO of EastBanc Technologies, a Washington software company. "I cannot think of anything, outside of a face-to-face conversation, that they could not have access to."
  • When the Protect America Act made warrantless wiretapping legal, lawyers and executives at major technology companies knew what was about to happen.
  • For years, the companies had been handling requests from the FBI. Now Congress had given the NSA the authority to take information without warrants. Though the companies didn't know it, the passage of the Protect America Act gave birth to a top-secret NSA program, officially called US-98XN. It was known as Prism. Though many details are still unknown, it worked like this:
  • Facebook said it received between 9,000 and 10,000 requests for data from all government agencies in the second half of last year. The social media company said fewer than 19,000 users were targeted.
  • Every company involved denied the most sensational assertion in the Prism documents: that the NSA pulled data "directly from the servers" of Microsoft, Yahoo, Google, Facebook, AOL and more. Technology experts and a former government official say that phrasing, taken from a PowerPoint slide describing the program, was likely meant to differentiate Prism's neatly organized, company-provided data from the unstructured information snatched out of the Internet's major pipelines. In slide made public by the newspapers, NSA analysts were encouraged to use data coming from both Prism and from the fiber-optic cables. Prism, as its name suggests, helps narrow and focus the stream. If eavesdroppers spot a suspicious email among the torrent of data pouring into the United States, analysts can use information from Internet companies to pinpoint the user. With Prism, the government gets a user's entire email inbox. Every email, including contacts with American citizens, becomes government property. Once the NSA has an inbox, it can search its huge archives for information about everyone with whom the target communicated. All those people can be investigated, too.
  • What followed was the most significant debate over domestic surveillance since the 1975 Church Committee, a special Senate committee led by Sen. Frank Church, D-Idaho, reined in the CIA and FBI for spying on Americans. Unlike the recent debate over Prism, however, there were no visual aids, no easy-to-follow charts explaining that the government was sweeping up millions of emails and listening to phone calls of people accused of no wrongdoing.
  • A few months after Obama took office in 2009, the surveillance debate reignited in Congress because the NSA had crossed the line. Eavesdroppers, it turned out, had been using their warrantless wiretap authority to intercept far more emails and phone calls of Americans than they were supposed to. Obama, no longer opposed to the wiretapping, made unspecified changes to the process. The government said the problems were fixed.
  • Schneier, the author and security expert, said it doesn't really matter how Prism works, technically. Just assume the government collects everything, he said. He said it doesn't matter what the government and the companies say, either. It's spycraft, after all. "Everyone is playing word games," he said. "No one is telling the truth."
  •  
    Associated Press is now doing its job with a masterful overview of NSA capabilities, discussing how NSA scoops up all "backbone" telecommunications, then uses PRISM to narrow down the specific communications they decide to look at. This one is a "must read" article if you're interested in the NSA scandal. It ties a lot of the pieces together.  
Paul Merrell

Shady Companies With Ties to Israel Wiretap the U.S. for the NSA | Threat Level | Wired.com - 0 views

  • In addition to constructing the Stellar Wind center, and then running the operation, secretive contractors with questionable histories and little oversight were also used to do the actual bugging of the entire U.S. telecommunications network. According to a former Verizon employee briefed on the program, Verint, owned by Comverse Technology, taps the communication lines at Verizon, which I first reported in my book The Shadow Factory in 2008. Verint did not return a call seeking comment, while Verizon said it does not comment on such matters. At AT&T the wiretapping rooms are powered by software and hardware from Narus, now owned by Boeing, a discovery made by AT&T whistleblower Mark Klein in 2004. Narus did not return a call seeking comment. What is especially troubling is that both companies have had extensive ties to Israel, as well as links to that country’s intelligence service, a country with a long and aggressive history of spying on the U.S.
  • In fact, according to Binney, the advanced analytical and data mining software the NSA had developed for both its worldwide and international eavesdropping operations was secretly passed to Israel by a mid-level employee, apparently with close connections to the country. The employee, a technical director in the Operations Directorate, “who was a very strong supporter of Israel,” said Binney, “gave, unbeknownst to us, he gave the software that we had, doing these fast rates, to the Israelis.” Because of his position, it was something Binney should have been alerted to, but wasn’t. “In addition to being the technical director,” he said, “I was the chair of the TAP, it’s the Technical Advisory Panel, the foreign relations council. We’re supposed to know what all these foreign countries, technically what they’re doing…. They didn’t do this that way, it was under the table.” After discovering the secret transfer of the technology, Binney argued that the agency simply pass it to them officially, and in that way get something in return, such as access to communications terminals. “So we gave it to them for switches,” he said. “For access.”
  • But Binney now suspects that Israeli intelligence in turn passed the technology on to Israeli companies who operate in countries around the world, including the U.S. In return, the companies could act as extensions of Israeli intelligence and pass critical military, economic and diplomatic information back to them. “And then five years later, four or five years later, you see a Narus device,” he said. “I think there’s a connection there, we don’t know for sure.” Narus was formed in Israel in November 1997 by six Israelis with much of its money coming from Walden Israel, an Israeli venture capital company. Its founder and former chairman, Ori Cohen, once told Israel’s Fortune Magazine that his partners have done technology work for Israeli intelligence. And among the five founders was Stanislav Khirman, a husky, bearded Russian who had previously worked for Elta Systems, Inc. A division of Israel Aerospace Industries, Ltd., Elta specializes in developing advanced eavesdropping systems for Israeli defense and intelligence organizations. At Narus, Khirman became the chief technology officer.
  • ...4 more annotations...
  • A few years ago, Narus boasted that it is “known for its ability to capture and collect data from the largest networks around the world.” The company says its equipment is capable of “providing unparalleled monitoring and intercept capabilities to service providers and government organizations around the world” and that “Anything that comes through [an Internet protocol network], we can record. We can reconstruct all of their e-mails, along with attachments, see what Web pages they clicked on, we can reconstruct their [Voice over Internet Protocol] calls.” Like Narus, Verint was founded by in Israel by Israelis, including Jacob “Kobi” Alexander, a former Israeli intelligence officer. Some 800 employees work for Verint, including 350 who are based in Israel, primarily working in research and development and operations, according to the Jerusalem Post. Among its products is STAR-GATE, which according to the company’s sales literature, lets “service providers … access communications on virtually any type of network, retain communication data for as long as required, and query and deliver content and data …” and was “[d]esigned to manage vast numbers of targets, concurrent sessions, call data records, and communications.”
  • In a rare and candid admission to Forbes, Retired Brig. Gen. Hanan Gefen, a former commander of the highly secret Unit 8200, Israel’s NSA, noted his former organization’s influence on Comverse, which owns Verint, as well as other Israeli companies that dominate the U.S. eavesdropping and surveillance market. “Take NICE, Comverse and Check Point for example, three of the largest high-tech companies, which were all directly influenced by 8200 technology,” said Gefen. “Check Point was founded by Unit alumni. Comverse’s main product, the Logger, is based on the Unit’s technology.”
  • According to a former chief of Unit 8200, both the veterans of the group and much of the high-tech intelligence equipment they developed are now employed in high-tech firms around the world. “Cautious estimates indicate that in the past few years,” he told a reporter for the Israeli newspaper Ha’artez in 2000, “Unit 8200 veterans have set up some 30 to 40 high-tech companies, including 5 to 10 that were floated on Wall Street.” Referred to only as “Brigadier General B,” he added, “This correlation between serving in the intelligence Unit 8200 and starting successful high-tech companies is not coincidental: Many of the technologies in use around the world and developed in Israel were originally military technologies and were developed and improved by Unit veterans.
  • Equally troubling is the issue of corruption. Kobi Alexander, the founder and former chairman of Verint, is now a fugitive, wanted by the FBI on nearly three dozen charges of fraud, theft, lying, bribery, money laundering and other crimes. And two of his top associates at Comverse, Chief Financial Officer David Kreinberg and former General Counsel William F. Sorin, were also indicted in the scheme and later pleaded guilty, with both serving time in prison and paying millions of dollars in fines and penalties. When asked about these contractors, the NSA declined to “verify the allegations made.”
  •  
    So, allegedly a Zionist working in NSA passed NSA's telecommunications data mining software to Israel, was identified, but was never prosecuted. And the Verint CEO is now a fugitive from justice on charges of "fraud, theft, lying, money laundering, and other crimes." What's not to like in having this company processing all of our telephone metadata?
Paul Merrell

Strike capability just got real | Marc Goldberg | Ops & Blogs | The Times of Israel - 0 views

  • The importance of the new arms deal between Israel and the United States cannot be overstated. The arrival of an as yet undisclosed number of KC-135 aerial refuelling aircraft will give the Israeli Air Force (IAF) the range to attack any target in Iran that it deems necessary in order to suppress the Iranian nuclear program.
  • In absolute terms the tankers on their own ensure that the IAF can reach every target in Iran that they need to, everything is in range. What they don’t do is increase the destructive power of the ordnance that their F-15s and F-16s can carry. Any strike that would be launched is likely to be launched at targets that were built with defense in mind. Essentially meaning that a large part of them is underground. Although the much vaunted BLU-109 bunker buster bombs are on their way into the inventory of the IAF they are able to penetrate six feet of reinforced concrete whereas, for example, the Natanz nuclear plant is built under 22 meters of dirt as well as eight meters of reinforced concrete and in a facility that is about 100,000 square meters in size. Now multiply those problems by at least another 20 facilities that need to be attacked, probably more and the scale of the challenge still involved in destroying the Iranian program becomes clear.
  • No attack on Iran can take place without Israeli boots on the ground! What’s really interesting is that the announcement of the imminent arrival of the V-22 Osprey into the inventory of the IAF came almost as an aside to the news of the KC-135s
  • ...1 more annotation...
  • With the Osprey the IDF will gain the capability to transport troops and their equipment to the target zone in sufficient numbers not merely to conduct the reconnaissance that they are already carrying out but to launch direct action attacks. Although it’s unlikely that the IDF has the power to stop the Iranian nuclear programme dead in its tracks, it does have the power to set it back a long way. 
Paul Merrell

Reassured by NSA's Internal Procedures? Don't Be. They Still Don't Tell the Whole Story. | Electronic Frontier Foundation - 0 views

  • Yesterday, the Guardian released two previously-classified documents describing the internal "minimization" and "targeting" procedures used by the NSA to conduct surveillance under Section 702. These procedures are approved by the Foreign Intelligence Surveillance Court (FISC) on an annual basis and are supposed to serve as the bulwark between the NSA's vast surveillance capabilities and the private communications of Americans. As we noted earlier today, the procedures, themselves, aren't reassuring: far too much discretion is retained by NSA analysts, the procedures frequently resolve doubt in favor of collection, and information is obtained that could otherwise never be obtained without a warrant. Which would be bad enough, if it were the end of the story. But it's not.
  • Unless the government substantially changed the procedures between August 2010 and October 2011, these are the very procedures that the FISC eventually found resulted in illegal and unconstitutional surveillance. In October 2011, the FISC issued an 86-page opinion finding that collection carried out under the NSA's classified minimization procedures was unconstitutional. The opinion remains secret, but it is very likely that yesterday's leaked NSA documents show the very minimization procedures the Director of National Intelligence admitted the FISC had found resulted in surveillance that was “unreasonable under the Fourth Amendment" and "circumvented the spirit of the law." And for good reason: the procedures are unconstitutional. They allow for the government to obtain and keep huge amounts of information it could never Constitutionally get without a warrant based on probable cause. As we explained, the procedures are designed such that the NSA will routinely fail to exclude or remove United States persons' communications, and the removal of those communications are wholly entrusted to the "reasonable discretion" of an analyst.  
  • Yesterday, the Guardian released two previously-classified documents describing the internal "minimization" and "targeting" procedures used by the NSA to conduct surveillance under Section 702. These procedures are approved by the Foreign Intelligence Surveillance Court (FISC) on an annual basis and are supposed to serve as the bulwark between the NSA's vast surveillance capabilities and the private communications of Americans. As we noted earlier today, the procedures, themselves, aren't reassuring: far too much discretion is retained by NSA analysts, the procedures frequently resolve doubt in favor of collection, and information is obtained that could otherwise never be obtained without a warrant. Which would be bad enough, if it were the end of the story. But it's not. The targeting and minimization documents released yesterday are dated a few months after the first publicly known scandal over the new FAA procedures: In April 2009, the New York Times reported that Section 702 surveillance had “intercepted the private e-mail messages and phone calls of Americans . . . on a scale that went beyond the broad legal limits established by Congress." In June 2009, the Times reported that members of Congress were saying NSA's "recent intercepts of the private telephone calls and e-mail messages of Americans are broader than previously acknowledged." Rep. Rush Holt described the problems as "so flagrant that they can't be accidental."
  • ...2 more annotations...
  • Presumably, following these "flagrant" abuses (and likely in response to the Congressional criticism of the original procedures), the government refined the procedures. The documents released yesterday are the "improved" targeting and minimization procedures, which appear to have been reused the following year, in 2010, in the FISC's annual certification. But these amended procedures still didn't stop illegal spying under Section 702. Unless the government substantially changed the procedures between August 2010 and October 2011, these are the mimization rules that the FISC eventually found to result in illegal and unconstitutional surveillance. In October 2011, the FISC issued an 86-page opinion finding that collection carried out under the NSA's minimization procedures was unconstitutional. The opinion remains secret, but it is likely that yesterday's leaked NSA documents show the very procedures the Director of National Intelligence admitted had been found to result in surveillance that was “unreasonable under the Fourth Amendment" and "circumvented the spirit of the law." And for good reason: the procedures are unconstitutional.
  • EFF has been litigating to uncover this critical FISC opinion through the Freedom of Information Act and to uncover the "secret law" the government has been hiding from the American public. And EFF isn't alone in fighting for the release of these documents. A bipartisan coalition of Senators just announced legislation that would require the Attorney General to declassify significant FISC opinions, a move they say would help put an end to precisely this kind of "secret law."
Gary Edwards

Treaties as Law of the Land - United States Constitution - 0 views

  •  
    "Treaties as Law of the Land" Intro: Treaty commitments of the United States are of two kinds. In the language of Chief Justice Marshall in 1829: "A treaty is, in its nature, a contract between two nations, not a legislative act. It does not generally effect, of itself, the object to be accomplished; especially, so far as its operation is intraterritorial; but is carried into execution by the sovereign power of the respective parties to the instrument." "In the United States, a different principle is established. Our constitution declares a treaty to be the law of the land. It is, consequently, to be regarded in courts of justice as equivalent to an act of the legislature, whenever it operates of itself, without the aid of any legislative provision. But when the terms of the stipulation import a contract-when either of the parties engages to perform a particular act, the treaty addresses itself to the political, not the judicial department; and the legislature must execute the contract, before it can become a rule for the Court."270 To the same effect, but more accurate, is Justice Miller's language for the Court a half century later, in the Head Money Cases: "A treaty is primarily a compact between independent nations. It depends for the enforcement of its provisions on the interest and the honor of the governments which are parties of it.... But a treaty may also contain provisions which confer certain rights upon the citizens or subjects of one of the nations residing in the territorial limits of the other, which partake of the nature of municipal law, and which are capable of enforcement as between private parties in the courts of the country."271"
Paul Merrell

MI5 feared GCHQ went 'too far' over phone and internet monitoring | UK news | The Observer - 0 views

  • Senior figures inside British intelligence have been alarmed by GCHQ's secret decision to tap into transatlantic cables in order to engage in the bulk interception of phone calls and internet traffic.According to one source who has been directly involved in GCHQ operations, concerns were expressed when the project was being discussed internally in 2008: "We felt we were starting to overstep the mark with some of it. People from MI5 were complaining that they were going too far from a civil liberties perspective … We all had reservations about it, because we all thought: 'If this was used against us, we wouldn't stand a chance'."The Guardian revealed on Friday that GCHQ has placed more than 200 probes on transatlantic cables and is processing 600m "telephone events" a day as well as up to 39m gigabytes of internet traffic. Using a programme codenamed Tempora, it can store and analyse voice recordings, the content of emails, entries on Facebook, the use of websites as well as the "metadata" which records who has contacted who. The programme is shared with GCHQ's American partner, the National Security Agency.
  • Interviews with the UK source and the NSA whistleblower Edward Snowden raise questions about whether the programme:■ Exploits existing law which was passed by parliament without any anticipation that it would be used for this purpose.■ For the first time allows GCHQ to process bulk internal UK traffic which is routed overseas via these cables.■ Allows the NSA to engage in bulk intercepts of internal US traffic which would be forbidden in its own territory.■ Functions with no effective oversight.
  • The source claimed that even the conventional warrant system has been distorted – whereas police used to ask for a warrant before intercepting a target's communications, they will now ask GCHQ to intercept the target's communications and then use that information to seek a warrant.There is a particular concern that the programme allows GCHQ to break the boundary which stopped it engaging in the bulk interception of internal UK communications. The Ripa requirement that one end of a communication must be outside the UK was a significant restriction when it was applied to phone calls using satellites, but it is no longer effective in the world of fibre-optic cables. "The point is that this is an island," the source said. "Everything comes and goes – nearly everything – down fibre-optic cables. You make a mobile phone call, it goes to a mast and then down into a fibre-optic cable, under the ground and away. And even if the call is UK to UK, it's very likely – because of the way the system is structured – to go out of the UK and come back in through these fibre-optic channels."
  • ...4 more annotations...
  • Internet traffic is also liable to be routed internationally even if the message is exchanged between two people within the UK. "At one point, I was told that we were getting 85% of all UK domestic traffic – voice, internet, all of it – via these international cables."
  • There are similar concerns about the role of the NSA. It could have chosen to attach probes to the North American end of the cables and documents shown to the Guardian by Edward Snowden suggest that key elements of the Tempora filtering process were designed by the NSA. Instead, the NSA agency has exported its computer programs and 250 of its analysts to operate the system from the UK.Initial inquiries by the Guardian have failed to explain why this has happened, but US legislators are likely to want to check whether the NSA has sought to bypass legal or policy requirements which restrict its activity in the US. This will be particularly sensitive if it is confirmed that Tempora is also analysing internal US traffic.The UK source challenges the official justification for the programme; that it is necessary for the fight against terrorism and serious crime: "This is not scoring very high against those targets, because they are wise to the monitoring of their communications. If the terrorists are wise to it, why are we increasing the capability?
  • Defenders insist that the mass of data is heavily filtered by the programme so that only that relating to legitimate targets is analysed.However, there are doubts about the effectiveness of this. First, according to the UK source, "written definitions for targeting and filtering are very elastic. They are wide open to interpretation." The target areas defined by the Ripa certificates are secret.Second, there is further room for interpretation when human analysts become involved in using the filtered intelligence to produce what are known as "contact chains". "Here is target A. But who is A talking to? Now we're into B and C and D." If analysts believe it is proportional, they can look at all the traffic – content and metadata – relating to all of the target's contact." GCHQ audits a sample of its analysts' work – believed to be 5% every six months – but even the statistical results of these audits are also secret.
  • Beyond the detail of the operation of the programme, there is a larger, long-term anxiety, clearly expressed by the UK source: "If there was the wrong political change, it could be very dangerous. All you need is to have the wrong government in place. It is capable of abuse because there is no independent scrutiny."
« First ‹ Previous 41 - 60 of 386 Next › Last »
Showing 20 items per page