Skip to main content

Home/ Socialism and the End of the American Dream/ Group items matching "publishers" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Paul Merrell

UT Documents: Does Obama administration view journalists as Snowden's "accomplices"? It seems so. - 0 views

  • James Clapper, the Director of National Intelligence, appeared today before the Senate Intelligence Committee, his first appearance since outright lying to that Committee last March about NSA bulk collection. In his prepared opening remarks, Clapper said this: Who, in the view of the Obama administration, are Snowden's "accomplices"? The FBI and other official investigators have been very clear with the media that there is no evidence whatsoever that Snowden had any help in copying and removing documents from the NSA. Here, Clapper is referring to "accomplices" as those who can "facilitate the return of the remaining" documents. As Snowden has said, the only ones to whom he has given those documents are the journalists with whom he has worked. As has been publicly reported, the journalists who are in possession of thousands of Snowden documents include myself, Laura Poitras, Barton Gellman/The Washington Post, The New York Times, the Guardian, and ProPublica.
  • Is it now the official view of the Obama administration that these journalists and media outlets are "accomplices" in what they regard as Snowden's crimes? If so, that is a rather stunning and extremist statement. Is there any other possible interpretation of Clapper's remarks? UPDATE: In response to media inquiries about what Clapper meant when he referred to "accomplices", a spokesman for the DNI's office, Shawn Turner, is saying this: "anyone who is assisting Edward Snowden [to] further harm our nation through the unauthorized disclosure of stolen documents." (Turner declined to be more specific when asked if that included journalists.) Turner may be reluctant to admit it, but that essentially dispels all doubt - if there was any - that Clapper was publicly accusing journalists who publish Snowden documents of being "accomplices" in his "crimes". That a top-level Obama official is publicly accusing journalists of criminality for their journalism seems like fairly big (though unsurprising) news. posted by Glenn Greenwald
  •  
    For an analysis of which statutes might be used to criminally prosecute journalists publishing the Snowden materials, see http://blogs.fas.org/secrecy/2014/01/dni-transparency/
Paul Merrell

How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations - The Intercept - 0 views

  • One of the many pressing stories that remains to be told from the Snowden archive is how western intelligence agencies are attempting to manipulate and control online discourse with extreme tactics of deception and reputation-destruction. It’s time to tell a chunk of that story, complete with the relevant documents. Over the last several weeks, I worked with NBC News to publish a series of articles about “dirty trick” tactics used by GCHQ’s previously secret unit, JTRIG (Joint Threat Research Intelligence Group). These were based on four classified GCHQ documents presented to the NSA and the other three partners in the English-speaking “Five Eyes” alliance. Today, we at the Intercept are publishing another new JTRIG document, in full, entitled “The Art of Deception: Training for Online Covert Operations.” By publishing these stories one by one, our NBC reporting highlighted some of the key, discrete revelations: the monitoring of YouTube and Blogger, the targeting of Anonymous with the very same DDoS attacks they accuse “hacktivists” of using, the use of “honey traps” (luring people into compromising situations using sex) and destructive viruses. But, here, I want to focus and elaborate on the overarching point revealed by all of these documents: namely, that these agencies are attempting to control, infiltrate, manipulate, and warp online discourse, and in doing so, are compromising the integrity of the internet itself.
  •  
    Government retaliation for exercise of First Amendment rights by covert destruction of reputations.  
Paul Merrell

The FBI's Own Hostage Crisis - Newsweek - 0 views

  • By  Jeff Stein 0 Share Last Thursday, an urgent call went out from CIA headquarters to the spy agency's director, John Brennan, who was giving a speech to a graduating class at The Farm, the CIA's training facility near Williamsburg, Va. Brennan was warned that the Associated Press and The Washington Post were about to publish the results of a long investigation revealing that Robert Levinson, a retired FBI agent who had gone missing while "on private business" in Iran six years ago, had actually been working for the CIA. A handful of national security reporters in D.C. had known of Levinson's CIA connection for years but agreed to sit on it, accepting the CIA's rationale that publishing the information could endanger the life of Levinson, who was ostensibly pursuing an investigation of cigarette smuggling for a private client when he went missing on Iran's Kish Island in March 2007. Levinson was thought to be in Iranian hands. On Thursday morning, the entreaties of lower ranking CIA officials to the AP and Washington Post not to publish the story were rebuffed. Other high-ranking Obama administration officials, including White House chief of staff Denis McDonough and deputy national security advisor Ben Rhodes, as well as FBI Deputy Director Mark Giuliano, made the same argument to the reporters and their editors. By the time Brennan got his warning from headquarters, however, it was too late to for him to make an appeal. The story, by the AP's Matt Apuzzo and Adam Goldman, who had recently left AP to join The Washington Post, was online.
Paul Merrell

Secret pre-Iraq War talks between Blair and Bush to be published - RT News - 0 views

  • Tony Blair and George Bush exchanged voluminous correspondence prior to the start of military operations in Iraq. Now, the UK is moving to declassify details of the talks for an inquiry into Britain’s involvement in the conflict, British media reported. The release, set for the upcoming year, is expected to include more than 100 documents, described as a collection of notes, records of 200 minutes of ministerial level talks, telephone conversations and private meetings between the British prime minister and American president, The Independent reported. This will give the green light for the Chilcot Iraq Inquiry to publish an account of the conflict, where much attention will be given to decisions made by then Prime Minister Tony Blair. Indeed, the files could play a major part in determining Blair’s historical legacy, which critics say has been stained by the Iraq War. Blair has been criticized for failing to challenge then-US President George W. Bush on Iraq’s alleged weapons of mass destruction, specifically chemical and biological weapons, which a Joint Intelligence Committee report said in September 2002 “could be ready for firing in 45 minutes.”
  • A senior government official predicted the results of the inquiry will not do Blair any favors: "In the new year it seems the Chilcot inquiry is going to be published. Everyone will be assuming: bad hair day for Tony Blair and Jack Straw." Straw served as Blair’s secretary of state.
  • There has been some speculation, however, as to how effective the Iraq Inquiry can hope to be in determining the British government’s - not to mention Tony Blair’s - position on jumping on board George W. Bush’s Iraq war bandwagon. UK officials said their “intention is to be as open as possible,” yet the final decision on what will be released will be made by cabinet secretary, Sir Jeremy Heywood, the same individual who fought against publication of the Blair-Bush correspondence in the first place.
  • ...1 more annotation...
  • In September 2004, Kofi Annan, then UN Secretary General, expressed his views on the invasion, saying, "I have indicated it was not in conformity with the UN Charter. From our point of view, from the Charter point of view, it was illegal." The Chilcot Inquiry, named after its chairman, Sir John Chilcot, who pushed for the release of the classified documents, is expected to be released by the end of 2014.
  •  
    Declassification of these documents has been a years-long battle. It would not surprise me to see them released so heavily redacted that little sense can be made of them. 
Paul Merrell

Bank of England Drops a Bombshell on Parliament: It Shredded Its Crisis Era Records - 0 views

  • Mark Carney, the head of the Bank of England, and other officials from the BOE were put through a five hour marathon of questioning yesterday by Parliament’s Treasury Select Committee covering everything from how long the BOE plans to continue Quantitative Easing (QE), to the potential for Scotland to vote for its independence, to what it knew and when it knew it about the rigging of the Foreign Exchange market by colluding global banks. The bombshell of the day, however, did not occur during the session on the Foreign Exchange scandal, which is stacking up to be a more serious matter than the rigging of the Libor interest rate benchmark which occurred under the nose of the Bank of England and the British Bankers Association. (London now seems to be in competition with itself for the prize of the century for overseeing the rigging of the greatest number of markets.)
  • The bombshell came in the following exchange between the Chair of the Treasury Select Committee, Andrew Tyrie, and a very frightened appearing Paul Fisher, the Executive Director of Markets at the BOE, who has served in that position since 2009. Apparently neither Parliament nor the public knew prior to this exchange that the records of the pre-crisis year of 2007, the financial collapse in 2008, and the monetary policy maneuvers in subsequent years to prevent another Great Depression had been destroyed in one of the world’s most important financial centers; not to mention the fact that critical recordings potentially relevant to the Foreign Exchange probe are also gone.
  • Chairman Tyrie: “The MPC [Monetary Policy Committee] records might be of interest one day to historians about the inception of QE. MPC records used to be recorded and transcribed when the MPC was created. Is that still the case Mr. Fisher?” Paul Fisher: “They are not transcribed. They are still recorded so that the secretariat can go back to check any discrepancies between the minutes and what people may have said. But as far as I know they are not transcribed.” Chairman Tyrie: “And they’re stored?” Paul Fisher: “The recordings are not kept. Once the minutes are published…” Chairman Tyrie: [In a booming, outraged voice] “The recordings are destroyed! Why? Paul Fisher: “Because we have one copy of the minutes; that’s the one that’s published and there are not alternative versions.”
  • ...3 more annotations...
  • Chairman Tyrie: “There are more than one purpose for these. There’s the minutes after a fortnight and there’s the historical value. The Fed Open Market Committee publishes full transcripts of its meetings with a five year delay. Whether it’s a five or ten year delay, certainly these are of huge historical significance. Why aren’t you putting something similar in place?” Paul Fisher: “This goes back to when the Committee first started. They initially did try to make transcripts, unsuccessfully.” Chairman Tyrie: “What do you mean unsuccessfully?” Paul Fisher: “It was very hard to actually physically transcribe the tapes in any way which made any sense in terms of the written material.” Chairman Tyrie: “Is that because you’re shouting and throwing things about. Most organizations manage to transcribe a record. Even the House of Commons manages to do it on a good day.” Paul Fisher: “I’m trying to explain what I know of it. My understanding is that people talking, very free flowing discussion, and they couldn’t make a sensible transcript.”
  • Carney is a former Goldman Sachs banker who went on to become the head of the Bank of Canada, serving in that post during the financial crisis. He is the first non Briton to head the Bank of England in its more than 300-year history. That reality, and his non-British accent, seemed to invite an intensely interrogative style at times during the five hours of questioning yesterday by members of the Treasury Select Committee. Carney remained calm, courteous and professional throughout. It’s clear to anyone paying attention that the BOE is attempting to clone itself into the Fed – as questionable as that idea might be given that the full transcripts that have been released by the Fed for the crisis years show it had blinders on in terms of the depth of the crisis.
  • Now Carney has announced that he is going to create what looks like a clone of the President of the New York Fed (William “Bill” Dudley) through a new Deputy Governor position at the BOE to oversee markets and banking. Good luck with that. As Wall Street On Parade has repeatedly chronicled, avoiding regulatory capture will likely prove as elusive at the BOE as it has at the New York Fed. And given the seismic nature of the market rigging that has gone on in London, this is like putting a Disney-themed band aide on a compound fracture.
Gary Edwards

GOP immigration plan devised by Communist Party - 0 views

  • Republican support
  • But why would Republicans get behind such a plan? Some astute political observers advise that when politicians appear to be promoting agendas against their own interest, follow the money.
  • t’s no surprise that the Republicans supporting this thing are the ones with ties to the Chamber of Commerce, not ordinary voters.”
  • ...8 more annotations...
  • But even if big business benefits, the cheap labor advantages are only temporary. Once illegal aliens are fully legalized, businesses will be required to provide just as much in pay and benefits as they pay American workers.
  • In the meantime, however, it is widely assumed those workers will take jobs from American citizens, depress wages and increase unemployment. Moreover, in many key swing states, projected amnesties will swamp the rolls of the unemployed (see table)
  • So, illegal aliens would be granted legal status immediately, but five years down the road, if the fence still isn’t built and e-verify still isn’t being used, then their legal status would be revoked. Given that the Department of Homeland Security is already allegedly ignoring border security –with immigration and customs agents suing their own agency for failing to enforce the law – many voters place little confidence in political promises of future enforcement.
  • In the meantime, Senate and House opponents have been painstakingly highlighting what they consider to be glaring flaws in these proposals: Every single border security provision in the Senate bill, including the hire of 20,000 Border Patrol agents, denying amnesty to criminals, building fences and installing surveillance devices, can be waived by the Homeland Security secretary. Both the House and Senate proposals emphasize the path to citizenship – the centerpiece of communist efforts – while making border security both vague and secondary. Both bills provide a $5,000 incentive for companies to hire the newly legalized illegal aliens instead of Americans, since the aliens would not be subject to the Obamacare coverage mandate.
  • Although politicians and the media have settled on the claim that there are 11 million illegal aliens, the actual number may well be closer to 20 million to 30 million. There were 10 million in 1996, a mere 10 years after Reagan’s amnesty, and it is doubtful only one million more have been added in the ensuing 17 years. Since 1990, Border agents have apprehended on average more than 1 million illegal aliens per year, almost all from Mexico.
  • When the Reagan amnesty became law, the intention was to naturalize only 1.2 million people, but the actual figure turned out to be 2.7 million. Statistics on illegal immigration have longed tended to be underestimated, sometimes vastly so.
  • Thus, current proposals provide a path to citizenship for as many as 20 to 30 million illegal aliens here now, plus relatives who will be brought in through chain migration and at least 75 percent of those who will come in the future – virtually endless amnesty – while efforts to secure the border are almost certain to be insufficient.
  • With polls showing more than two-thirds of Americans don’t believe “immigration laws would be enforced in the future if illegal aliens were given amnesty,” it is clear that passage of the current Republican-backed bill may indeed fulfill the agenda of its communist originators – the creation of a permanent Democrat voting majority, guaranteeing permanent control of the United States government by leftist progressives.
  •  
    Wow.  Documentation up the ying yang .......... "The U.S. Senate's "Gang of Eight" immigration-reform plan, as well as a strikingly similar plan now being backed by Rep. Paul Ryan, R-Wis., and a bi-partisan House "Gang," both offer the "roadmap to citizenship" originally conceived and carefully developed by members of the Communist Party USA working within the Democratic Party and the radical left activist network for the purpose of using amnestied illegals to build a "permanent progressive majority." That is the inescapable conclusion readers will draw after reading the forthcoming book by acclaimed researcher and blogger Trevor Loudon, titled "The Enemies Within: Communists, Socialists and Progressives in the U.S. Congress." Although not yet published, Loudon agreed to allow WND readers to preview one chapter, titled "Latino Immigrants: Tools to Ensure a 'Governing Coalition' for the Left." Ads by Google Marriage Visa Lawyer $195 Get Your Fiance/Spouse to the USA. Free Consultation. (888) 902-9285 EasyFianceVisa.com/SpousalVisa Canadian Rockies By Train Experience the Rockies By Train. Luxury Mountain Travel By Rail TravelAlberta.us/Train In the book, Loudon exhaustively documents the Left's longtime agenda regarding illegal aliens and how its activists have gone about implementing it. He provides irrefutable proof that the entire immigration-reform movement was the brainchild of American communists and that their goal has long been to establish unchallengeable political supremacy. According to Loudon, the Communist Party USA has influenced U.S. policy toward illegals since at least the 1960s. He traces the history, showing how communists and communist-founded organizations slowly built the movement from the ground up. While other groups certainly joined the effort, the communists were always at the center. For example, he tells the story of CPUSA member Bert Corona, the "Communist Father of the 'Immigrants Rights' move
Gary Edwards

XKeyscore: NSA tool collects 'nearly everything a user does on the internet' | World news | theguardian.com - 1 views

  • The latest revelations will add to the intense public and congressional debate around the extent of NSA surveillance programs. They come as senior intelligence officials testify to the Senate judiciary committee on Wednesday, releasing classified documents in response to the Guardian's earlier stories on bulk collection of phone records and Fisa surveillance court oversight.
  • The files shed light on one of Snowden's most controversial statements, made in his first video interview published by the Guardian on June 10
  • "I, sitting at my desk," said Snowden, could "wiretap anyone, from you or your accountant, to a federal judge or even the president, if I had a personal email".
  • ...23 more annotations...
  • US officials vehemently denied this specific claim. Mike Rogers, the Republican chairman of the House intelligence committee, said of Snowden's assertion: "He's lying. It's impossible for him to do what he was saying he could do."
  • But training materials for XKeyscore detail how analysts can use it and other systems to mine enormous agency databases by filling in a simple on-screen form giving only a broad justification for the search. The request is not reviewed by a court or any NSA personnel before it is processed.
  • XKeyscore, the documents boast, is the NSA's "widest reaching" system developing intelligence from computer networks – what the agency calls Digital Network Intelligence (DNI). One presentation claims the program covers "nearly everything a typical user does on the internet", including the content of emails, websites visited and searches, as well as their metadata.
  • Analysts can also use XKeyscore and other NSA systems to obtain ongoing "real-time" interception of an individual's internet activity.
  • Under US law, the NSA is required to obtain an individualized Fisa warrant only if the target of their surveillance is a 'US person', though no such warrant is required for intercepting the communications of Americans with foreign targets.
  • But XKeyscore provides the technological capability, if not the legal authority, to target even US persons for extensive electronic surveillance without a warrant provided that some identifying information, such as their email or IP address, is known to the analyst.
  • One training slide illustrates the digital activity constantly being collected by XKeyscore and the analyst's ability to query the databases at any time.
  • The purpose of XKeyscore is to allow analysts to search the metadata as well as the content of emails and other internet activity, such as browser history, even when there is no known email account (a "selector" in NSA parlance) associated with the individual being targeted.
  • Analysts can also search by name, telephone number, IP address, keywords, the language in which the internet activity was conducted or the type of browser used.
  • One document notes that this is because "strong selection [search by email address] itself gives us only a very limited capability" because "a large amount of time spent on the web is performing actions that are anonymous."
  • Email monitoring
  • One top-secret document describes how the program "searches within bodies of emails, webpages and documents", including the "To, From, CC, BCC lines" and the 'Contact Us' pages on websites".
  • To search for emails, an analyst using XKS enters the individual's email address into a simple online search form, along with the "justification" for the search and the time period for which the emails are sought.
  • One document, a top secret 2010 guide describing the training received by NSA analysts for general surveillance under the Fisa Amendments Act of 2008, explains that analysts can begin surveillance on anyone by clicking a few simple pull-down menus designed to provide both legal and targeting justifications.
  • Once options on the pull-down menus are selected, their target is marked for electronic surveillance and the analyst is able to review the content of their communications:
  • Chats, browsing history and other internet activity
  • Beyond emails, the XKeyscore system allows analysts to monitor a virtually unlimited array of other internet activities, including those within social media.
  • An NSA tool called DNI Presenter, used to read the content of stored emails, also enables an analyst using XKeyscore to read the content of Facebook chats or private messages.
  • The XKeyscore program also allows an analyst to learn the IP addresses of every person who visits any website the analyst specifies.
  • The quantity of communications accessible through programs such as XKeyscore is staggeringly large. One NSA report from 2007 estimated that there were 850bn "call events" collected and stored in the NSA databases, and close to 150bn internet records. Each day, the document says, 1-2bn records were added.
  • William Binney, a former NSA mathematician, said last year that the agency had "assembled on the order of 20tn transactions about US citizens with other US citizens", an estimate, he said, that "only was involving phone calls and emails". A 2010 Washington Post article reported that "every day, collection systems at the [NSA] intercept and store 1.7bn emails, phone calls and other type of communications."
  • The ACLU's deputy legal director, Jameel Jaffer, told the Guardian last month that national security officials expressly said that a primary purpose of the new law was to enable them to collect large amounts of Americans' communications without individualized warrants.
  • "The government doesn't need to 'target' Americans in order to collect huge volumes of their communications," said Jaffer. "The government inevitably sweeps up the communications of many Americans" when targeting foreign nationals for surveillance.
  •  
    "One presentation claims the XKeyscore program covers 'nearly everything a typical user does on the internet' ................................................................. A top secret National Security Agency program allows analysts to search with no prior authorization through vast databases containing emails, online chats and the browsing histories of millions of individuals, according to documents provided by whistleblower Edward Snowden. The NSA boasts in training materials that the program, called XKeyscore, is its "widest-reaching" system for developing intelligence from the internet. The latest revelations will add to the intense public and congressional debate around the extent of NSA surveillance programs. They come as senior intelligence officials testify to the Senate judiciary committee on Wednesday, releasing classified documents in response to the Guardian's earlier stories on bulk collection of phone records and Fisa surveillance court oversight. The files shed light on one of Snowden's most controversial statements, made in his first video interview published by the Guardian on June 10. "I, sitting at my desk," said Snowden, could "wiretap anyone, from you or your accountant, to a federal judge or even the president, if I had a personal email". US officials vehemently denied this specific claim. Mike Rogers, the Republican chairman of the House intelligence committee, said of Snowden's assertion: "He's lying. It's impossible for him to do what he was saying he could do." But training materials for XKeyscore detail how analysts can use it and other systems to mine enormous agency databases by filling in a simple on-screen form giving only a broad justification for the search. The request is not reviewed by a court or any NSA personnel before it is processed. XKeyscore, the documents boast, is the NSA's "widest reaching" system developing intelligence from computer networks - what the agency calls Digital Network Intelligence (DNI). One
  •  
    "But training materials for XKeyscore detail how analysts can use it and other systems to mine enormous agency databases by filling in a simple on-screen form giving only a broad justification for the search. The request is not reviewed by a court or any NSA personnel before it is processed. " Note in that regard that Snowden said in an earlier interview that use of this system rarely was audited and that when audited, the most common request if changes were requested was to beef up the justification for the search. The XScore system puts the lie to just about everything the Administration has claimed about intense oversight by all three branches of federal government and about not reading emails or listening to (Skype) phone calls. The lies keep stacking up in an ever-deepening pile.
Paul Merrell

UK Cryptographers Call For Publication of Deliberately Weakened Protocols, Products | Threatpost - 0 views

  • A group of cryptographers in the UK has published a letter that calls on authorities in that country and the United States to conduct an investigation to determine which security products, protocols and standards have been deliberately weakened by the countries’ intelligence services. The letter, signed by a number of researchers from the University of Bristol and other universities, said that the NSA and British GCHQ “have been acting against the interests of the public that they are meant to serve.” The appeal comes a couple of weeks after leaked documents from the NSA and its UK counterpart, Government Communications Headquarters, showed that the two agencies have been collaborating on projects that give them the ability to subvert encryption protocols and also have been working with unnamed security vendors to insert backdoors into hardware and software products. Security experts have been debating in recent weeks which products, standards and protocols may have been deliberately weakened, but so far no information has been forthcoming.
  • “By weakening cryptographic standards, in as yet undisclosed ways, and by inserting weaknesses into products which we all rely on to secure critical infrastructure, we believe that the agencies have been acting against the interests of the public that they are meant to serve. We find it shocking that agencies of both the US and UK governments now stand accused of undermining the systems which protect us. By weakening all our security so that they can listen in to the communications of our enemies, they also weaken our security against our potential enemies,” the letter says.
  • Published on Monday, the letter is signed by cryptographers from the University of Bristol, University of London, University of Birmingham, University of Luxembourg, University of Southampton, University of Surrey, University of Kent, Newcastle University and University College London. In it, the researchers call on the relevant authorities to publicly name the products and standards that have been weakened in order to inform users which systems they should avoid. “We call on the relevant parties to reveal what systems have been weakened so that they can be repaired, and to create a proper system of oversight with well-defined public rules that clearly forbid weakening the security of civilian systems and infrastructures. The statutory Intelligence and Security Committee of the House of Commons needs to investigate this issue as a matter of urgency. In the modern information age we all need to have complete trust in the basic infrastructure that we all use,” the letter says.
  • ...1 more annotation...
  • In the weeks since the documents detailing the NSA’s cryptographic capabilities emerged, further details about exactly which protocols the agency can attack successfully and which standards it may have influenced have been scarce. NIST, the U.S. agency that develops technical standards for cryptography, among other things, as denied accusations that the NSA was able to weaken some of the NIST standards. However, at the same time, NIST officials have issued a recommendation that people no longer use one of the encryption standards it previously published.
Paul Merrell

Spies worry over doomsday cache stashed by ex-NSA contractor Snowden | Reuters - 0 views

  • (Reuters) - British and U.S. intelligence officials say they are worried about a "doomsday" cache of highly classified, heavily encrypted material they believe former National Security Agency contractor Edward Snowden has stored on a data cloud. The cache contains documents generated by the NSA and other agencies and includes names of U.S. and allied intelligence personnel, seven current and former U.S. officials and other sources briefed on the matter said.The data is protected with sophisticated encryption, and multiple passwords are needed to open it, said two of the sources, who like the others spoke on condition of anonymity to discuss intelligence matters.The passwords are in the possession of at least three different people and are valid for only a brief time window each day, they said. The identities of persons who might have the passwords are unknown.
  • One source described the cache of still unpublished material as Snowden's "insurance policy" against arrest or physical harm.U.S. officials and other sources said only a small proportion of the classified material Snowden downloaded during stints as a contract systems administrator for NSA has been made public. Some Obama Administration officials have said privately that Snowden downloaded enough material to fuel two more years of news stories."The worst is yet to come," said one former U.S. official who follows the investigation closely.Snowden, who is believed to have downloaded between 50,000 and 200,000 classified NSA and British government documents, is living in Russia under temporary asylum, where he fled after traveling to Hong Kong. He has been charged in the United States under the Espionage Act.Cryptome, a website which started publishing leaked secret documents years before the group WikiLeaks or Snowden surfaced, estimated that the total number of Snowden documents made public so far is over 500.
  • Snowden's revelations of government secrets have brought to light extensive and previously unknown surveillance of phone, email and social media communications by the NSA and allied agencies. That has sparked several diplomatic rows between Washington and its allies, along with civil liberties debates in Europe, the United States and elsewhere.Among the material which Snowden acquired from classified government computer servers, but which has not been published by media outlets known to have had access to it, are documents containing names and resumes of employees working for NSA's British counterpart, the Government Communications Headquarters (GCHQ), sources familiar with the matter said.The sources said Snowden started downloading some of it from a classified GCHQ website, known as GC-Wiki, when he was employed by Dell and assigned to NSA in 2012.
  • ...2 more annotations...
  • Glenn Greenwald, who met with Snowden in Hong Kong and was among the first to report on the leaked documents for the Guardian newspaper, said the former NSA contractor had "taken extreme precautions to make sure many different people around the world have these archives to insure the stories will inevitably be published.""If anything happens at all to Edward Snowden, he has arranged for them to get access to the full archives," Greenwald said in a June interview with the Daily Beast website. He added: "I don't know for sure whether has more documents than the ones he has given me... I believe he does."In an email exchange with Reuters, Greenwald, who has said he remains in contact with Snowden, affirmed his statements about Snowden's "precautions" but said he had nothing to add.Officials believe that the "doomsday" cache is stored and encrypted separately from any material that Snowden has provided to media outlets.
  • Sources familiar with unpublished material Snowden downloaded said it also contains information about the CIA - possibly including personnel names - as well as other U.S. spy agencies such as the National Reconnaissance Office and National Geospatial-Intelligence Agency, which operate U.S. image-producing satellites and analyze their data.U.S. security officials have indicated in briefings they do not know what, if any, of the material is still in Snowden's personal possession. Snowden himself has been quoted as saying he took no such materials with him to Russia.
Gary Edwards

Office Productivity Software Is No Closer To Becoming A Commodity | Forrester Blogs - 0 views

  • We just published a report on the state of adoption of Office 2013 And Productivity Suite Alternatives based on a survey of 155 Forrester clients with responsibility for those investments. The sample does not fully represent the market, but lets us draw comparisons to the results of our previous survey in 2011. Some key takeaways from the data:   One in five firms uses email in the cloud. Another quarter plans to move at some point. More are using Office 365 (14%) than Google Apps (9%).  Just 22% of respondents are on Office 2013. Another 36% have plans to be on it. Office 2013's uptake will be slower than Office 2010 because fewer firms plan to combine the rollout of Office 2013 with Windows 8 as they combined Office 2010 with Windows 7. Alternatives to Microsoft Office show little traction. In 2011, 13% of respondents supported open source alternatives to Office. This year the number is just 5%. Google Docs has slightly higher adoption and is in use at 13% of companies. 
  • Microsoft continues to have a stranglehold on office productivity in the enterprise: Just 6% of companies in our survey give all or some employees an alternative instead of the installed version of Microsoft Office. Most surprising of all, multi-platform support is NOT a priority. Apps on iOS and Android devices were important to 16% of respondents, and support for non-Windows PCs was important to only 11%. For now, most technology decision-makers seem satisfied with leaving employees to self-provision office productivity apps on their smartphones and tablets if they really want them. 
  • Do you think we're getting closer to replacing Microsoft Office in the workplace?
  •  
    Wow, OpenOffice (3%) and Libre Office (2%) are actually losing gound!  In 2011 they had a combined marketshare of 13%.  Google Docs has a 13% marketshare, but i suspect most of those document originate in legacy MSOffice!!!!!  Making Google Drive - Apps a front end for mobile access and back-end backup.  In the middle of this mess, productivity workers struggle with shredded formats and the confusion of highly interactive and data intensive / time-sensitive compound documents going static (pdf) or otherwise disconnected. Intro: "We (Forrester) just published a report on the state of adoption of Office 2013 And Productivity Suite Alternatives based on a survey of 155 Forrester clients with responsibility for those investments. The sample does not fully represent the market, but lets us draw comparisons to the results of our previous survey in 2011. Some key takeaways from the data:   One in five firms uses email in the cloud. Another quarter plans to move at some point. More are using Office 365 (14%) than Google Apps (9%).  Just 22% of respondents are on Office 2013. Another 36% have plans to be on it. Office 2013's uptake will be slower than Office 2010 because fewer firms plan to combine the rollout of Office 2013 with Windows 8 as they combined Office 2010 with Windows 7. Alternatives to Microsoft Office show little traction. In 2011, 13% of respondents supported open source alternatives to Office. This year the number is just 5%. Google Docs has slightly higher adoption and is in use at 13% of companies. "
Paul Merrell

Obama confidant's spine-chilling proposal - Salon.com - 0 views

  • Cass Sunstein has long been one of Barack Obama’s closest confidants.  Often mentioned as a likely Obama nominee to the Supreme Court, Sunstein is currently Obama’s head of the Office of Information and Regulatory Affairs where, among other things, he is responsible for “overseeing policies relating to privacy, information quality, and statistical programs.”  In 2008, while at Harvard Law School, Sunstein co-wrote a truly pernicious paper proposing that the U.S. Government employ teams of covert agents and pseudo-”independent” advocates to “cognitively infiltrate” online groups and websites — as well as other activist groups — which advocate views that Sunstein deems “false conspiracy theories” about the Government.  This would be designed to increase citizens’ faith in government officials and undermine the credibility of conspiracists.  The paper’s abstract can be read, and the full paper downloaded, here. Sunstein advocates that the Government’s stealth infiltration should be accomplished by sending covert agents into “chat rooms, online social networks, or even real-space groups.”  He also proposes that the Government make secret payments to so-called “independent” credible voices to bolster the Government’s messaging (on the ground that those who don’t believe government sources will be more inclined to listen to those who appear independent while secretly acting on behalf of the Government).   This program would target those advocating false “conspiracy theories,” which they define to mean: “an attempt to explain an event or practice by reference to the machinations of powerful people, who have also managed to conceal their role.”  Sunstein’s 2008 paper was flagged by this blogger, and then amplified in an excellent report by Raw Story‘s Daniel Tencer.
  • There’s no evidence that the Obama administration has actually implemented a program exactly of the type advocated by Sunstein, though in light of this paper and the fact that Sunstein’s position would include exactly such policies, that question certainly ought to be asked.  Regardless, Sunstein’s closeness to the President, as well as the highly influential position he occupies, merits an examination of the mentality behind what he wrote.  This isn’t an instance where some government official wrote a bizarre paper in college 30 years ago about matters unrelated to his official powers; this was written 18 months ago, at a time when the ascendancy of Sunstein’s close friend to the Presidency looked likely, in exactly the area he now oversees.  Additionally, the government-controlled messaging that Sunstein desires has been a prominent feature of U.S. Government actions over the last decade, including in some recently revealed practices of the current administration, and the mindset in which it is grounded explains a great deal about our political class.  All of that makes Sunstein’s paper worth examining in greater detail.
  • Initially, note how similar Sunstein’s proposal is to multiple, controversial stealth efforts by the Bush administration to secretly influence and shape our political debates.  The Bush Pentagon employed teams of former Generals to pose as “independent analysts” in the media while secretly coordinating their talking points and messaging about wars and detention policies with the Pentagon.  Bush officials secretly paid supposedly “independent” voices, such as Armstrong Williams and Maggie Gallagher, to advocate pro-Bush policies while failing to disclose their contracts.  In Iraq, the Bush Pentagon hired a company, Lincoln Park, which paid newspapers to plant pro-U.S. articles while pretending it came from Iraqi citizens.  In response to all of this, Democrats typically accused the Bush administration of engaging in government-sponsored propaganda — and when it was done domestically, suggested this was illegal propaganda.  Indeed, there is a very strong case to make that what Sunstein is advocating is itself illegal under long-standing statutes prohibiting government ”propaganda” within the U.S., aimed at American citizens: As explained in a March 21, 2005 report by the Congressional Research Service, “publicity or propaganda” is defined by the U.S. Government Accountability Office (GAO) to mean either (1) self-aggrandizement by public officials, (2) purely partisan activity, or (3) “covert propaganda.”  By covert propaganda, GAO means information which originates from the government but is unattributed and made to appear as though it came from a third party.
  • ...10 more annotations...
  • Covert government propaganda is exactly what Sunstein craves.  His mentality is indistinguishable from the Bush mindset that led to these abuses, and he hardly tries to claim otherwise.  Indeed, he favorably cites both the covert Lincoln Park program as well as Paul Bremer’s closing of Iraqi newspapers which published stories the U.S. Government disliked, and justifies them as arguably necessary to combat “false conspiracy theories” in Iraq — the same goal Sunstein has for the U.S.Sunstein’s response to these criticisms is easy to find in what he writes, and is as telling as the proposal itself.  He acknowledges that some “conspiracy theories” previously dismissed as insane and fringe have turned out to be entirely true (his examples:  the CIA really did secretly administer LSD in “mind control” experiments; the DOD really did plot the commission of terrorist acts inside the U.S. with the intent to blame Castro; the Nixon White House really did bug the DNC headquarters).  Given that history, how could it possibly be justified for the U.S. Government to institute covert programs designed to undermine anti-government “conspiracy theories,” discredit government critics, and increase faith and trust in government pronouncements?  Because, says Sunstein, such powers are warranted only when wielded by truly well-intentioned government officials who want to spread The Truth and Do Good — i.e., when used by people like Cass Sunstein and Barack Obama
  • Throughout, we assume a well-motivated government that aims to eliminate conspiracy theories, or draw their poison, if and only if social welfare is improved by doing so. But it’s precisely because the Government is so often not “well-motivated” that such powers are so dangerous.  Advocating them on the ground that “we will use them well” is every authoritarian’s claim.  More than anything else, this is the toxic mentality that consumes our political culture:  when our side does X, X is Good, because we’re Good and are working for Good outcomes.  That was what led hordes of Bush followers to endorse the same large-government surveillance programs they long claimed to oppose, and what leads so many Obama supporters now to justify actions that they spent the last eight years opposing.
  • Consider the recent revelation that the Obama administration has been making very large, undisclosed payments to MIT Professor Jonathan Gruber to provide consultation on the President’s health care plan.  With this lucrative arrangement in place, Gruber spent the entire year offering public justifications for Obama’s health care plan, typically without disclosing these payments, and far worse, was repeatedly held out by the White House — falsely — as an “independent” or “objective” authority.  Obama allies in the media constantly cited Gruber’s analysis to support their defenses of the President’s plan, and the White House, in turn, then cited those media reports as proof that their plan would succeed.  This created an infinite “feedback loop” in favor of Obama’s health care plan which — unbeknownst to the public — was all being generated by someone who was receiving hundreds of thousands of dollars in secret from the administration (read this to see exactly how it worked).In other words, this arrangement was quite similar to the Armstrong Williams and Maggie Gallagher scandals which Democrats, in virtual lockstep, condemned.  Paul Krugman, for instance, in 2005 angrily lambasted right-wing pundits and policy analysts who received secret, undisclosed payments, and said they lack “intellectual integrity”; he specifically cited the Armstrong Williams case.  Yet the very same Paul Krugman last week attacked Marcy Wheeler for helping to uncover the Gruber payments by accusing her of being “just like the right-wingers with their endless supply of fake scandals.”  What is one key difference?  Unlike Williams and Gallagher, Jonathan Gruber is a Good, Well-Intentioned Person with Good Views — he favors health care — and so massive, undisclosed payments from the same administration he’s defending are dismissed as a “fake scandal.”
  • Sunstein himself — as part of his 2008 paper — explicitly advocates that the Government should pay what he calls “credible independent experts” to advocate on the Government’s behalf, a policy he says would be more effective because people don’t trust the Government itself and would only listen to people they believe are “independent.”  In so arguing, Sunstein cites the Armstrong Williams scandal not as something that is wrong in itself, but as a potential risk of this tactic (i.e., that it might leak out), and thus suggests that “government can supply these independent experts with information and perhaps prod them into action from behind the scenes,” but warns that “too close a connection will be self-defeating if it is exposed.”  In other words, Sunstein wants the Government to replicate the Armstrong Williams arrangement as a means of more credibly disseminating propaganda — i.e., pretending that someone is an “independent” expert when they’re actually being “prodded” and even paid “behind the scenes” by the Government — but he wants to be more careful about how the arrangement is described (don’t make the control explicit) so that embarrassment can be avoided if it ends up being exposed.  
  • In this 2008 paper, then, Sunstein advocated, in essence, exactly what the Obama administration has been doing all year with Gruber:  covertly paying people who can be falsely held up as “independent” analysts in order to more credibly promote the Government line.  Most Democrats agreed this was a deceitful and dangerous act when Bush did it, but with Obama and some of his supporters, undisclosed arrangements of this sort seem to be different.  Why?  Because, as Sunstein puts it:  we have “a well-motivated government” doing this so that “social welfare is improved.”  Thus, just like state secrets, indefinite detention, military commissions and covert, unauthorized wars, what was once deemed so pernicious during the Bush years — coordinated government/media propaganda — is instantaneously transformed into something Good.* * * * *What is most odious and revealing about Sunstein’s worldview is his condescending, self-loving belief that “false conspiracy theories” are largely the province of fringe, ignorant Internet masses and the Muslim world.  That, he claims, is where these conspiracy theories thrive most vibrantly, and he focuses on various 9/11 theories — both domestically and in Muslim countries — as his prime example.
  • It’s certainly true that one can easily find irrational conspiracy theories in those venues, but some of the most destructive “false conspiracy theories” have emanated from the very entity Sunstein wants to endow with covert propaganda power:  namely, the U.S. Government itself, along with its elite media defenders. Moreover, “crazy conspiracy theorist” has long been the favorite epithet of those same parties to discredit people trying to expose elite wrongdoing and corruption. Who is it who relentlessly spread “false conspiracy theories” of Saddam-engineered anthrax attacks and Iraq-created mushroom clouds and a Ba’athist/Al-Qaeda alliance — the most destructive conspiracy theories of the last generation?  And who is it who demonized as “conspiracy-mongers” people who warned that the U.S. Government was illegally spying on its citizens, systematically torturing people, attempting to establish permanent bases in the Middle East, or engineering massive bailout plans to transfer extreme wealth to the industries which own the Government?  The most chronic and dangerous purveyors of “conspiracy theory” games are the very people Sunstein thinks should be empowered to control our political debates through deceit and government resources:  namely, the Government itself and the Enlightened Elite like him.
  • It is this history of government deceit and wrongdoing that renders Sunstein’s desire to use covert propaganda to “undermine” anti-government speech so repugnant.  The reason conspiracy theories resonate so much is precisely that people have learned — rationally — to distrust government actions and statements.  Sunstein’s proposed covert propaganda scheme is a perfect illustration of why that is.  In other words, people don’t trust the Government and “conspiracy theories” are so pervasive precisely because government is typically filled with people like Cass Sunstein, who think that systematic deceit and government-sponsored manipulation are justified by their own Goodness and Superior Wisdom.
  • The point is that there are severe dangers to the Government covertly using its resources to “infiltrate” discussions and to shape political debates using undisclosed and manipulative means.  It’s called “covert propaganda” and it should be opposed regardless of who is in control of it or what its policy aims are. UPDATE II:  Ironically, this is the same administration that recently announced a new regulation dictating that “bloggers who review products must disclose any connection with advertisers, including, in most cases, the receipt of free products and whether or not they were paid in any way by advertisers, as occurs frequently.”  Without such disclosure, the administration reasoned, the public may not be aware of important hidden incentives (h/t pasquin).  Yet the same administration pays an MIT analyst hundreds of thousands of dollars to advocate their most controversial proposed program while they hold him out as “objective,” and selects as their Chief Regulator someone who wants government agents to covertly mold political discussions “anonymously or even with false identities.”
  • UPDATE III:  Just to get a sense for what an extremist Cass Sunstein is (which itself is ironic, given that his paper calls for ”cognitive infiltration of extremist groups,” as the Abstract puts it), marvel at this paragraph:
  • So Sunstein isn’t calling right now for proposals (1) and (2) — having Government ”ban conspiracy theorizing” or “impose some kind of tax on those who” do it — but he says “each will have a place under imaginable conditions.”  I’d love to know the “conditions” under which the government-enforced banning of conspiracy theories or the imposition of taxes on those who advocate them will “have a place.”  That would require, at a bare minumum, a repeal of the First Amendment.  Anyone who believes this should, for that reason alone, be barred from any meaningful government position.
  •  
    This is a January 2010 article by Glenn Greenwald. The Sunstein paper referred to was published in 2008 and is at http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1084585  Sunstein left the Obama Administration in 2012 and now teaches law at Harvard. He is the husband of U.S. Ambassador to the U.N. Susan Rice,a notorious neocon.  His paper is scholarly only in format. His major premises have no citations and in at least two cases are straw man logical fallacies that misportray the position of the groups he criticizes. This is "academic" work that a first-year-law student heading for a 1.0 grade point average could make mincemeat of. This paper alone would seem to disqualify him from a Supreme Court nomination and from teaching law. Has he never heard of the First Amendment and why didn't he bother to check whether it is legal to inflict propaganda on the American public? But strange things happen when you're a buddy of an American president. Most noteworthy, however, is that the paper unquestionably puts an advocate of waging psychological warfare against the foreign populations *and* the American public as the head of the White House White House OMB Office of Information and Regulatory Affairs from 2008 through 2012 and on Obama's short list for the Supreme Court. Given the long history of U.S. destabilization of foreign nations via propaganda, of foreign wars waged under false pretenses, of the ongoing barrage of false information disseminated by our federal government, can there be any reasonable doubt that the American public is not being manipulated by false propaganda disseminated by their own government?  An inquiring mind wants to know ...   
Paul Merrell

Deutsche Telekom to follow Vodafone in revealing surveillance | World news | The Guardian - 0 views

  • Germany's biggest telecoms company is to follow Vodafone in disclosing for the first time the number of surveillance requests it receives from governments around the world.Deutsche Telekom, which owns half of Britain's EE mobile network and operates in 14 countries including the US, Spain and Poland, has already published surveillance data for its home nation – one of the countries that have reacted most angrily to the Edward Snowden revelations. In the wake of Vodafone's disclosures, first published in the Guardian on Friday, it announced that it would extend its disclosures to every other market where it operates and where it is legal.A spokeswoman for Deutsche Telekom, which has 140 million customers worldwide, said: "Deutsche Telekom has initially focused on Germany when it comes to disclosure of government requests. We are currently checking if and to what extent our national companies can disclose information. We intend to publish something similar to Vodafone."
  • Bosses of the world's biggest mobile networks, many of which have headquarters in Europe, are gathering for an industry conference in Shanghai this weekend, and the debate is expected to centre on whether they should join Deutsche and Vodafone in using transparency to push back against the use of their technology for government surveillance.Mobile companies, unlike social networks, cannot operate without a government-issued licence, and have previously been reluctant to discuss the extent of their cooperation with national security and law enforcement agencies.But Vodafone broke cover on Friday by confirming that in around half a dozen of the markets in which it operates, governments in Europe and outside have installed their own secret listening equipment on its network and those of other operators.
  •  
    Looks like Vodafone broke a government transparency logjam on government surveillance via digital communications, as to disclosure of raw totals of search warrants by nations other than the U.S. 
Paul Merrell

NSA's Mideast spying 'intense' amid regional upheaval, say experts - Alarabiya.net English | Front Page - 0 views

  • Leaked documents disclosed earlier this week revealed that the U.S. National Security Agency intercepted 125 billion phone calls and SMS messages in January 2013, many of them originating in the Middle East. The NSA’s attention on the Middle East and the surrounding region is far more “intense than anything comparable in Europe,” according to Matthew Aid, a Washington, DC-based intelligence historian and expert. Strained relations between the United States and Saudi Arabia over resolving the Syrian conflict could be a possible reason for the NSA’s particularly large targeting of Saudi Arabia - over 7.8 billion times in one month – said Aid. Saudi-U.S. tension may have also resulted in Obama’s administration being “quite curious” over the kingdom’s thoughts on Syria, as the countries have consistently disagreed on the issue.
  • Aid, who in 2009 published a history on the NSA entitled “The Secret Sentry: The Untold History of the National Security Agency,” said that most of the former NSA contractor Edward Snowden’s leaks have not focused on the agency’s surveillance in the Middle East. “We’re waiting for that shoe to drop, but it hasn’t,” Aid told Al Arabiya News, stating that leaks by Snowden’s associates have been largely focused “on those countries which will generate immediate reaction in the press and from the governments in question.” Saudi Arabia and Iraq witnessed 7.8 billion wiretapping incidents from the NSA each, while Egypt and Jordan saw 1.8 billion and 1.6 billion respectively, according to Cryptome, a digital library that publishes leaked documents. Additionally, over 1.7 billion wiretapping incidents were recorded in Iran.
  • Commenting on the leaked data, Wesley Wark, a Canada-based global intelligence expert and professor at the University of Ottawa, said that a great majority of the NSA’s vast collection of intercepted data in the region would go unheard.
  • ...2 more annotations...
  • However, the likelihood of the NSA continuing to covertly mine such vast amounts of a possibly valueless data is low, according to Wark. He suspects that the NSA is beginning to confront a “moment of change,” due to internal political pressure in the United States, international outrage, and a possible conclusion drawn from all this that “building haystacks is not the way to find needles.”
  • Aid notes that leaks published on Cryptome do not contain any information on many countries in the Arab region, including Syria, Kuwait, Bahrain, and Qatar. “We’re missing some important parts of the puzzle,” he said. According to Aid, Snowden’s leaks show to a fuller extent the level of U.S. spying in the region. “There’s a lot more to be said [concerning the NSA’s clandestine operations in the Middle East] contained in the Snowden papers, it just hasn’t come out,” he said.
Paul Merrell

Popular Security Software Came Under Relentless NSA and GCHQ Attacks - The Intercept - 0 views

  • The National Security Agency and its British counterpart, Government Communications Headquarters, have worked to subvert anti-virus and other security software in order to track users and infiltrate networks, according to documents from NSA whistleblower Edward Snowden. The spy agencies have reverse engineered software products, sometimes under questionable legal authority, and monitored web and email traffic in order to discreetly thwart anti-virus software and obtain intelligence from companies about security software and users of such software. One security software maker repeatedly singled out in the documents is Moscow-based Kaspersky Lab, which has a holding registered in the U.K., claims more than 270,000 corporate clients, and says it protects more than 400 million people with its products. British spies aimed to thwart Kaspersky software in part through a technique known as software reverse engineering, or SRE, according to a top-secret warrant renewal request. The NSA has also studied Kaspersky Lab’s software for weaknesses, obtaining sensitive customer information by monitoring communications between the software and Kaspersky servers, according to a draft top-secret report. The U.S. spy agency also appears to have examined emails inbound to security software companies flagging new viruses and vulnerabilities.
  • The efforts to compromise security software were of particular importance because such software is relied upon to defend against an array of digital threats and is typically more trusted by the operating system than other applications, running with elevated privileges that allow more vectors for surveillance and attack. Spy agencies seem to be engaged in a digital game of cat and mouse with anti-virus software companies; the U.S. and U.K. have aggressively probed for weaknesses in software deployed by the companies, which have themselves exposed sophisticated state-sponsored malware.
  • The requested warrant, provided under Section 5 of the U.K.’s 1994 Intelligence Services Act, must be renewed by a government minister every six months. The document published today is a renewal request for a warrant valid from July 7, 2008 until January 7, 2009. The request seeks authorization for GCHQ activities that “involve modifying commercially available software to enable interception, decryption and other related tasks, or ‘reverse engineering’ software.”
  • ...9 more annotations...
  • The NSA, like GCHQ, has studied Kaspersky Lab’s software for weaknesses. In 2008, an NSA research team discovered that Kaspersky software was transmitting sensitive user information back to the company’s servers, which could easily be intercepted and employed to track users, according to a draft of a top-secret report. The information was embedded in “User-Agent” strings included in the headers of Hypertext Transfer Protocol, or HTTP, requests. Such headers are typically sent at the beginning of a web request to identify the type of software and computer issuing the request.
  • According to the draft report, NSA researchers found that the strings could be used to uniquely identify the computing devices belonging to Kaspersky customers. They determined that “Kaspersky User-Agent strings contain encoded versions of the Kaspersky serial numbers and that part of the User-Agent string can be used as a machine identifier.” They also noted that the “User-Agent” strings may contain “information about services contracted for or configurations.” Such data could be used to passively track a computer to determine if a target is running Kaspersky software and thus potentially susceptible to a particular attack without risking detection.
  • Another way the NSA targets foreign anti-virus companies appears to be to monitor their email traffic for reports of new vulnerabilities and malware. A 2010 presentation on “Project CAMBERDADA” shows the content of an email flagging a malware file, which was sent to various anti-virus companies by François Picard of the Montréal-based consulting and web hosting company NewRoma. The presentation of the email suggests that the NSA is reading such messages to discover new flaws in anti-virus software. Picard, contacted by The Intercept, was unaware his email had fallen into the hands of the NSA. He said that he regularly sends out notification of new viruses and malware to anti-virus companies, and that he likely sent the email in question to at least two dozen such outfits. He also said he never sends such notifications to government agencies. “It is strange the NSA would show an email like mine in a presentation,” he added.
  • The NSA presentation goes on to state that its signals intelligence yields about 10 new “potentially malicious files per day for malware triage.” This is a tiny fraction of the hostile software that is processed. Kaspersky says it detects 325,000 new malicious files every day, and an internal GCHQ document indicates that its own system “collect[s] around 100,000,000 malware events per day.” After obtaining the files, the NSA analysts “[c]heck Kaspersky AV to see if they continue to let any of these virus files through their Anti-Virus product.” The NSA’s Tailored Access Operations unit “can repurpose the malware,” presumably before the anti-virus software has been updated to defend against the threat.
  • The Project CAMBERDADA presentation lists 23 additional AV companies from all over the world under “More Targets!” Those companies include Check Point software, a pioneering maker of corporate firewalls based Israel, whose government is a U.S. ally. Notably omitted are the American anti-virus brands McAfee and Symantec and the British company Sophos.
  • As government spies have sought to evade anti-virus software, the anti-virus firms themselves have exposed malware created by government spies. Among them, Kaspersky appears to be the sharpest thorn in the side of government hackers. In the past few years, the company has proven to be a prolific hunter of state-sponsored malware, playing a role in the discovery and/or analysis of various pieces of malware reportedly linked to government hackers, including the superviruses Flame, which Kaspersky flagged in 2012; Gauss, also detected in 2012; Stuxnet, discovered by another company in 2010; and Regin, revealed by Symantec. In February, the Russian firm announced its biggest find yet: the “Equation Group,” an organization that has deployed espionage tools widely believed to have been created by the NSA and hidden on hard drives from leading brands, according to Kaspersky. In a report, the company called it “the most advanced threat actor we have seen” and “probably one of the most sophisticated cyber attack groups in the world.”
  • Hacks deployed by the Equation Group operated undetected for as long as 14 to 19 years, burrowing into the hard drive firmware of sensitive computer systems around the world, according to Kaspersky. Governments, militaries, technology companies, nuclear research centers, media outlets and financial institutions in 30 countries were among those reportedly infected. Kaspersky estimates that the Equation Group could have implants in tens of thousands of computers, but documents published last year by The Intercept suggest the NSA was scaling up their implant capabilities to potentially infect millions of computers with malware. Kaspersky’s adversarial relationship with Western intelligence services is sometimes framed in more sinister terms; the firm has been accused of working too closely with the Russian intelligence service FSB. That accusation is partly due to the company’s apparent success in uncovering NSA malware, and partly due to the fact that its founder, Eugene Kaspersky, was educated by a KGB-backed school in the 1980s before working for the Russian military.
  • Kaspersky has repeatedly denied the insinuations and accusations. In a recent blog post, responding to a Bloomberg article, he complained that his company was being subjected to “sensationalist … conspiracy theories,” sarcastically noting that “for some reason they forgot our reports” on an array of malware that trace back to Russian developers. He continued, “It’s very hard for a company with Russian roots to become successful in the U.S., European and other markets. Nobody trusts us — by default.”
  • Documents published with this article: Kaspersky User-Agent Strings — NSA Project CAMBERDADA — NSA NDIST — GCHQ’s Developing Cyber Defence Mission GCHQ Application for Renewal of Warrant GPW/1160 Software Reverse Engineering — GCHQ Reverse Engineering — GCHQ Wiki Malware Analysis & Reverse Engineering — ACNO Skill Levels — GCHQ
Paul Merrell

Obama Visits Jamaica, Urges Caribbean Nations to Break from PetroCaribe | venezuelanalysis.com - 0 views

  • US President Barack Obama arrived today in Jamaica as part of an ongoing effort to persuade the island and its neighbors to reduce dependency on Venezuela’s bilateral PetroCaribe program.As the first active US president to visit Jamaica in 33 years, the primary goal of Mr. Obama’s trip will be to develop, in coordination with the World Bank, an investment plan in the Caribbean’s energy sector. Vice-president Joe Biden has alleged that PetroCaribe, founded by Hugo Chavez in 2005, is being used as a “tool of coercion” against the region by the South American nation. For almost a decade, Venezuela has shipped fuel to 18 nations in the Caribbean and Central America with favorable terms for payment, such as low-interest loans, while investing in community projects including hospitals, schools, highways, and homeless shelters.
  • Last week, the Bolivarian government, through the Petrocaribe initiative, donated US$16 million to help the government of St. Kitts and Nevis provide for former sugar industry workers.In January, Biden gathered Caribbean heads of state in Washington as part of his Caribbean Energy Security Initiative, which he claims is seeking clean energy solutions for small island governments. However, the focus of the event was less about environmentalism and more about breaking away from Venezuelan trade.“Whether it’s the Ukraine or the Caribbean, no country should be able to use natural resources as a tool of coercion against any other country,” he told the leaders in attendance.Last month, US Secretary of State John Kerry warned of “strategic damage” on Venezuela’s part which could cause “a serious humanitarian crisis in our region.”
  • According to a Miami Herald report published on March 26th, Venezuela has halved subsidized shipments of crude oil to Cuba and other PetroCaribe member nations from 400,000 barrels per day in 2012, to 200,000 barrels per day.The article, which claimed to cite a Barclay’s Bank report, has since been refuted by the Venezuelan government. Venezuelan Foreign Affairs Minister Delcy Rodriguez insisted last week that the information was “not true,” and was being published in a concerted effort to discredit PetroCaribe.
  • ...1 more annotation...
  • Maintaining that the organization remains “pretty strong” despite sliding oil prices and a contracting economy, Rodriguez said a “war” is being waged against the socialist program, because it “brings solutions to poor people.”
  •  
    It seems the banksters are truly upset with Venezuela's leaders for failure to be in hock to the IMF and for spreading their natural resoices and wealth amongst the poor. 
Paul Merrell

Vodafone reveals existence of secret wires that allow state surveillance | Business | The Guardian - 0 views

  • Vodafone, one of the world's largest mobile phone groups, has revealed the existence of secret wires that allow government agencies to listen to all conversations on its networks, saying they are widely used in some of the 29 countries in which it operates in Europe and beyond.The company has broken its silence on government surveillance in order to push back against the increasingly widespread use of phone and broadband networks to spy on citizens, and will publish its first Law Enforcement Disclosure Report on Friday. At 40,000 words, it is the most comprehensive survey yet of how governments monitor the conversations and whereabouts of their people.The company said wires had been connected directly to its network and those of other telecoms groups, allowing agencies to listen to or record live conversations and, in certain cases, track the whereabouts of a customer. Privacy campaigners said the revelations were a "nightmare scenario" that confirmed their worst fears on the extent of snooping.
  • Vodafone's group privacy officer, Stephen Deadman, said: "These pipes exist, the direct access model exists."We are making a call to end direct access as a means of government agencies obtaining people's communication data. Without an official warrant, there is no external visibility. If we receive a demand we can push back against the agency. The fact that a government has to issue a piece of paper is an important constraint on how powers are used."Vodafone is calling for all direct-access pipes to be disconnected, and for the laws that make them legal to be amended. It says governments should "discourage agencies and authorities from seeking direct access to an operator's communications infrastructure without a lawful mandate".
  • In America, Verizon and AT&T have published data, but only on their domestic operations. Deutsche Telekom in Germany and Telstra in Australia have also broken ground at home. Vodafone is the first to produce a global survey.
  • ...2 more annotations...
  • Peter Micek, policy counsel at the campaign group Access, said: "In a sector that has historically been quiet about how it facilitates government access to user data, Vodafone has for the first time shone a bright light on the challenges of a global telecom giant, giving users a greater understanding of the demands governments make of telcos. Vodafone's report also highlights how few governments issue any transparency reports, with little to no information about the number of wiretaps, cell site tower dumps, and other invasive surveillance practices."
  • Snowden, the National Security Agency whistleblower, joined Google, Reddit, Mozilla and other tech firms and privacy groups on Thursday to call for a strengthening of privacy rights online in a "Reset the net" campaign.Twelve months after revelations about the scale of the US government's surveillance programs were first published in the Guardian and the Washington Post, Snowden said: "One year ago, we learned that the internet is under surveillance, and our activities are being monitored to create permanent records of our private lives – no matter how innocent or ordinary those lives might be. Today, we can begin the work of effectively shutting down the collection of our online communications, even if the US Congress fails to do the same."
  •  
    The Vodafone disclosures will undoubtedly have a very large ripple effect. Note carefully that this is the first major telephone service in the world to break ranks with the others and come out swinging at secret government voyeur agencies. Will others follow. If you follow the links to the Vodafone report, you'll find a very handy big PDF providing an overview of the relevant laws in each of the customer nations. There's a cute Guardian table that shows the aggregate number of warrants for interception of content via Vodafone for each of those nations, broken down by content type. That table has white-on-black cells noting where disclosure of those types of surveillance statistics are prohibited by law. So it is far from a complete picture, but it's a heck of a good start.  But several of those customer nations are members of the E.U., where digital privacy rights are enshrined as human rights under an EU-wide treaty. So expect some heat to roll downhill on those nations from the European treaty organizations, particularly the European Court of Human Rights, staffed with civil libertarian judges, from which there is no appeal.     
Paul Merrell

Cartoon shows Israeli PM flying plane into World Trade Center - UPI.com - 0 views

  • A political cartoon published Thursday by Hebrew daily Haaretz incited international controversy with its depiction of Prime Minister Benjamin Netanyahu piloting a plane labeled "Israel" toward a tower flying the American flag, intended to evoke the September 11, 2001 terrorist attacks on the World Trade Center. Amos Biderman, the artist who authored the comic, told The Times of Israel the image was intended to imply Netanyahu is leading the country to "a disaster in Israel-US relations on the scale of 9/11," pointing to the Prime Minister's "arrogance" and his handling of settlement construction in Jerusalem as poor diplomacy. The cartoon was composed and published in response to an article in The Atlantic Tuesday that quoted an anonymous source inside the White House as calling Netanyahu a "chicken[expletive]" criticizing the Prime Minister as "cowardly" for his handling of relations with Palestine.White House Press Secretary Josh Earnest said those comments do not reflect the administration's views on Israel and Netanyahu defended himself during a public appearance the following day, saying he is concerned with Israeli interests.
  • Diplomatic relations between the U.S. and Israel have been deteriorating in recent years as Israel has struggled and at times failed to navigate its troubled relationship with Palestine without alienating the international community.The announcement of plans to construct a settlement of 1000 homes for Israelis in a section of Jerusalem considered territory claimed by Palestinians against the Obama administration's objections further strained relations already fraught with tension. Despite its timeliness, however, Biderman's lampoon was not well received on social media, with commenters calling the comic "tasteless" and "revolting" and "filth."
  •  
    The note of irony here comes from the considerable amount of evidence pointing to Israeli Mossad involvement in the 9-11 attacks. 
Paul Merrell

Pentagon report: scope of intelligence compromised by Snowden 'staggering' | World news | The Guardian - 0 views

  • • Classified assessment describes impact of leaks as 'grave' • Report does not include specific detail to support conclusions• 12 of 39 heavily redacted pages released after Foia request• Read the full Defense Intelligence Agency report
  • A top-secret Pentagon report to assess the damage to national security from the leak of classified National Security Agency documents by Edward Snowden concluded that “the scope of the compromised knowledge related to US intelligence capabilities is staggering”.The Guardian has obtained a copy of the Defense Intelligence Agency's classified damage assessment in response to a Freedom of Information Act (Foia) lawsuit filed against the Defense Department earlier this year. The heavily redacted 39-page report was prepared in December and is titled “DoD Information Review Task Force-2: Initial Assessment, Impacts Resulting from the Compromise of Classified Material by a Former NSA Contractor.”But while the DIA report describes the damage to US intelligence capabilities as “grave”, the government still refuses to release any specific details to support this conclusion. The entire impact assessment was redacted from the material released to the Guardian under a presidential order that protects classified information and several other Foia exemptions.Only 12 pages of the report were declassified by DIA and released. A Justice Department attorney said DIA would continue to process other internal documents that refer to the DIA report for possible release later this year.
  • The classified damage assessment was first cited in a news report published by Foreign Policy on January 9. The Foreign Policy report attributed details of the DIA assessment to House intelligence committee chairman Mike Rogers and its ranking Democrat Dutch Ruppersberger. The lawmakers said the White House had authorized them to discuss the document in order to undercut the narrative of Snowden being portrayed as a heroic whistleblower.The DIA report has been cited numerous times by Rogers and Rusppersberger and other lawmakers who claimed Snowden’s leaks have put US personnel at risk.
  • ...8 more annotations...
  • But details to back up Rogers' claims are not included in the declassified material released to the Guardian.Neither he nor any other lawmaker has disclosed specific details from the DIA report but they have continued to push the “damage” narrative in interviews with journalists and during appearances on Sunday talk shows.
  • The declassified material does not state the number of documents Snowden is alleged to have taken, which Rogers and Ruppersberger have claimed, again citing the DIA’s assessment, was 1.7m. Nor does the declassified portion of the report identify Snowden by name.“[Redacted] a former NSA contractor compromised [redacted] from NSA Net and the Joint Worldwide Intelligence Communications System (JWICS),” the report says. “On 6 June 2013, media groups published the first stories based on this material, and on 9 June 2013 they identified the source as an NSA contractor who had worked in Hawaii.”JWICS is identified as a “24 hour a day network designed to meet the requirements for secure [top-secret/sensitive compartmented information] multi-media intelligence communications worldwide. The Defense Intelligence Agency (DIA) has directed that all Special Security Offices (SSOs) will install the JWICS.”The Washington Post, quoting anonymous sources, reported last October that Snowden “lifted the documents from a top-secret network run by the Defense Intelligence Agency and used by intelligence arms of the Army, Air Force, Navy and Marines.” The Post further claimed that Snowden “took 30,000 documents that involve the intelligence work of one of the services” and that he gained access to the documents through JWICS.
  • A top-secret Pentagon report to assess the damage to national security from the leak of classified National Security Agency documents by Edward Snowden concluded that “the scope of the compromised knowledge related to US intelligence capabilities is staggering”. The Guardian has obtained a copy of the Defense Intelligence Agency's classified damage assessment in response to a Freedom of Information Act (Foia) lawsuit filed against the Defense Department earlier this year. The heavily redacted 39-page report was prepared in December and is titled “DoD Information Review Task Force-2: Initial Assessment, Impacts Resulting from the Compromise of Classified Material by a Former NSA Contractor.” But while the DIA report describes the damage to US intelligence capabilities as “grave”, the government still refuses to release any specific details to support this conclusion. The entire impact assessment was redacted from the material released to the Guardian under a presidential order that protects classified information and several other Foia exemptions.
  • Only 12 pages of the report were declassified by DIA and released. A Justice Department attorney said DIA would continue to process other internal documents that refer to the DIA report for possible release later this year. Steven Aftergood, director of the Project on Government Secrecy at the Federation of American Scientists, questioned the decision to withhold specific details. "The essence of the report is contained in the statement that 'the scope of the compromised knowledge related to US intelligence capabilities is staggering'. But all elaboration of what this striking statement means has been withheld," he said. The assessment excluded NSA-related information and dealt exclusively with non-NSA defense materials. The report was distributed to multiple US military commands around the world and all four military branches.
  • The classified damage assessment was first cited in a news report published by Foreign Policy on January 9. The Foreign Policy report attributed details of the DIA assessment to House intelligence committee chairman Mike Rogers and its ranking Democrat Dutch Ruppersberger. The lawmakers said the White House had authorized them to discuss the document in order to undercut the narrative of Snowden being portrayed as a heroic whistleblower. The DIA report has been cited numerous times by Rogers and Rusppersberger and other lawmakers who claimed Snowden’s leaks have put US personnel at risk. In January, Rogers asserted that the report concluded that most of the documents Snowden took "concern vital operations of the US Army, Navy, Marine Corps and Air Force". "This report confirms my greatest fears — Snowden’s real acts of betrayal place America’s military men and women at greater risk. Snowden’s actions are likely to have lethal consequences for our troops in the field," Rogers said in a statement at the time.
  • But details to back up Rogers' claims are not included in the declassified material released to the Guardian. Neither he nor any other lawmaker has disclosed specific details from the DIA report but they have continued to push the “damage” narrative in interviews with journalists and during appearances on Sunday talk shows. The declassified portion of the report obtained by the Guardian says only that DIA “assesses with high confidence that the information compromise by a former NSA contractor [redacted] and will have a GRAVE impact on US national defense”. The declassified material does not state the number of documents Snowden is alleged to have taken, which Rogers and Ruppersberger have claimed, again citing the DIA’s assessment, was 1.7m.
  • No evidence has surfaced to support persistent claims from pundits and lawmakers that Snowden has provided any of the NSA documents he obtained to a “foreign adversary”. Ben Wizner, Snowden’s attorney at the American Civil Liberties Union, said: "This report, which makes unsubstantiated claims about alleged harm to national security, is from December of 2013. Just this month, Keith Alexander admitted in an interview that he doesn’t 'think anybody really knows what he [Snowden] actually took with him, because the way he did it, we don’t have an accurate way of counting'. In other words, the government’s so-called damage assessment is based entirely on guesses, not on facts or evidence."
  • Steven Aftergood, of the Federation of American Scientists, pointed out that the report's finding that the Snowden leaks had a "grave" impact did not follow any of the levels defined in the annex. "That is a bit odd," he said, adding: "Within this hierarchy, it is not clear where 'grave impact' would fall."
Paul Merrell

Ex-IAEA Chief Warns on Using Unverified Intel to Pressure Iran « LobeLog - 0 views

  • In a critique of the handling of the Iran file by the International Atomic Energy Agency, former IAEA Director General Han Blix has called for greater skepticism about the intelligence documents and reports alleging Iranian nuclear weapons work and warned that they may be used to put diplomatic pressure on Tehran. In an interview with this writer in his Stockholm apartment late last month, Blix, who headed the IAEA from 1981 to 1997, also criticized the language repeated by the IAEA under its current director general, Yukiya Amano, suggesting that Iran is still under suspicion of undeclared nuclear activity. Blix, who clashed with US officials when he was head of the United Nations Monitoring, Verification and Inspection Commission (UNMOVIC) on weapons of mass destruction in Iraq from 2000 to 2003, said he has long been skeptical of intelligence that has been used to accuse Iraq and Iran of having active nuclear-weapons programs. “I’ve often said you have as much disinformation as information” on alleged weaponization efforts in those countries, Blix said.
  • Referring to the allegations of past Iranian nuclear weapons research that have been published in IAEA reports, Blix said, “Something that worries me is that these accusations that come from foreign intelligence agencies can be utilized by states to keep Iran under suspicion.” Such allegations, according to Blix, “can be employed as a tactic to keep the state in a suspect light—to keep Iran on the run.” The IAEA, he said, “should be cautious and not allow itself to be drawn into such a tactic.” Blix warned that compromising the independence of the IAEA by pushing it to embrace unverified intelligence was not in the true interests of those providing the intelligence. The IAEA Member States providing the intelligence papers to the IAEA “have a long-term interest in an international service that seeks to be independent,” said Blix. “In the Security Council they can pursue their own interest, but the [IAEA] dossier has to be as objective as possible.”
  • In 2005, the George W. Bush administration gave the IAEA a large cache of documents purporting to derive from a covert Iranian nuclear weapons research and development program from 2001 to 2003. Israel provided a series of documents and intelligence reports on alleged Iranian nuclear weapons work in 2008 and 2009. Blix’s successor as IAEA director general, Mohamed ElBaradei, recalled in his 2011 memoirs having doubts about the authenticity of both sets of intelligence documents. ElBaradei resisted pressure from the United States and its European allies in 2009 to publish an “annex” to a regular IAEA report based on those unverified documents. But Amano agreed to do so, and the annex on “possible military dimensions” of the Iranian nuclear program was published in November 2011. During the current negotiations with Iran, the P5+1 (US, UK, Russia, China, France plus Germany) has taken the position that Iran must explain the intelligence documents and reports described in the annex.
  • ...3 more annotations...
  • Blix said he is “critical” of the IAEA for the boilerplate language used in its reports on Iran that the Agency is “not in a position to provide credible assurances about the absence of undeclared nuclear material and activities….” Blix added that it is “erroneous” to suggest that the IAEA would be able to provide such assurances if Iran or any other state were more cooperative. As head of UNMOVIC, Blix recalled, “I was always clear that there could always be small things in a big geographical area that can be hidden, and you can never guarantee completely that there are no undeclared activities.” “In Iraq we didn’t maintain there was nothing,” he said. “We said we had made 700 inspections at 500 sites and we had not seen anything.” Blix emphasized that he was not questioning the importance of maximizing inspections, or of Iran’s ratification of the Additional Protocol. “I think the more inspections you can perform the smaller the residue of uncertainty,” he said.
  • The provenance of the largest part of the intelligence documents—the so-called “laptop documents”—was an unresolved question for years after they were first reported in 2004 and 2005. But former senior German foreign office official Karsten Voigt confirmed in 2013 that the Iranian exile opposition group, the Mujahedeen E-Khalq (MEK), gave the original set of documents to the German intelligence service (BND) in 2004. The MEK has been reported by Seymour Hersh, Connie Bruck, and a popular history of the Mossad’s covert operations to have been a client of Israel’s foreign intelligence agency, the Mossad, serving to “launder” intelligence that Mossad did not want to have attributed to Israel. Blix has been joined by two other former senior IAEA officials in criticizing the agency for its uncritical presentation of the intelligence documents cited in the November 2011 annex. Robert Kelley, the head of the Iraq team under both Blix and ElBaradei, and Tariq Rauf, the former head of the Agency’s Verification and Security Policy Coordination Office, have written that the annex employed “exaggeration, innuendo and careful choice of words” in presenting intelligence information from an unidentified Member State of the IAEA on the alleged cylinder at the Parchin military facility.
  • n a critique of the handling of the Iran file by the International Atomic Energy Agency, former IAEA Director General Han Blix has called for greater skepticism about the intelligence documents and reports alleging Iranian nuclear weapons work and warned that they may be used to put diplomatic pressure on Tehran. In an interview with this writer in his Stockholm apartment late last month, Blix, who headed the IAEA from 1981 to 1997, also criticized the language repeated by the IAEA under its current director general, Yukiya Amano, suggesting that Iran is still under suspicion of undeclared nuclear activity. Blix, who clashed with US officials when he was head of the United Nations Monitoring, Verification and Inspection Commission (UNMOVIC) on weapons of mass destruction in Iraq from 2000 to 2003, said he has long been skeptical of intelligence that has been used to accuse Iraq and Iran of having active nuclear-weapons programs. “I’ve often said you have as much disinformation as information” on alleged weaponization efforts in those countries, Blix said.
Paul Merrell

See for yourself: Aerial and panoramic views show devastation in Gaza | The Electronic Intifada - 0 views

  • A total of 2,168 people were killed, 521 of them children, during Israel’s 51-day bombardment of the Gaza Strip that ended in a ceasefire agreement on 26 August. Such images help us to understand the reality behind the shocking statistics about the physical destruction: 108,000 people have had their homes destroyed or severely damaged and will need permanent rehousing, according to the UN Office for the Coordination of Humanitarian Affairs (UN OCHA). As the ceasefire allows for more in-depth assessments “it is clear that the scale of damage is unprecedented, with approximately 13 percent of the housing stock affected,” UN OCHA says. “Five percent of the housing stock is uninhabitable – an estimated 18,000 housing units have been either destroyed or severely damaged.” This on top of a shortage of 71,000 housing units before the Israeli attack. Since there is no functioning airport in Gaza and Israel controls the skies, many people have wondered how the aerial video was taken. Another video published by MediaTown in March shows the company’s crew demonstrating their use of a quadcopter remote control aircraft similar to this one to make a video:
  • The photojournalist Lewis Whyld created the “The Gaza War Map,” a website that allows the viewer to see panoramic scenes of various places in Gaza.
  • The viewer can select and virtually stand in any of 20 sites in Gaza from Rafah in the south to Beit Hanoun in the north and see a 360-degree view of the destruction all around. Short of being in Gaza it is an effective way to get a sense of the scale of devastation Israeli bombing has caused. Try it yourself.
  • ...3 more annotations...
  • The United Nations Institute for Training and Research (UNITAR) has published a series of satellite images showing areas of Gaza before and after the Israeli bombardment. Such maps are used by international agencies to make overall damage assessments. For instance, using satellite images, the UN estimated that as of 25 July, the Israeli bombardment had completely destroyed 700 structures and severely damaged 316 others in (a “structure” might be an individual house or an entire apartment block with a number of individual units) in the eastern Gaza City districts of Shujaiya, Tuffah and Shaaf (see the PDF below).
  • For instance, using satellite images, the UN estimated that as of 25 July, the Israeli bombardment had completely destroyed 700 structures and severely damaged 316 others in (a “structure” might be an individual house or an entire apartment block with a number of individual units) in the eastern Gaza City districts of Shujaiya, Tuffah and Shaaf (see the PDF below).
  • UN OCHA has published another invaluable resource, the Gaza Crisis Atlas. Viewable online, it contains numerous maps and satellite images with neighborhood-by-neighborhood information about the destruction in Gaza.
  •  
    No blood and gore in any of these. Just a useful collection of video, satellite photos, and maps of the aftermath of summer 2014's Israeli military devastation of Gaza, the world's most densely populated area. Some of the satellite photos have before and after views of the destruction. The only worse devastation of urban areas that I have seen are photos of Dresden and Berlin at the end of World War II. So much for Israel's claims of careful targeting using precision methods of delivery. Wide areas of utter devastation. Using weapons and funds provided by the U.S.  I'm thinking about launching a political action for the U.S. to pay for Gaza reconstruction and humanitarian relief and to deduct that expense from Israel's annual $3 billion in U.S. military aid.  Contrary to widely republished Israeli propaganda, Israel, not Hamas, started this mess. http://america.aljazeera.com/opinions/2014/7/israel-hamas-palestiniansconflictunitedstatesinternationallaw.html  see also Adam Horowitz and Phil Weiss, Claim that Hamas killed 3 teens is turning out to be the WMD of Gaza onslaught, Mondoweiss (26 July 2014),
« First ‹ Previous 41 - 60 of 635 Next › Last »
Showing 20 items per page