Skip to main content

Home/ Socialism and the End of the American Dream/ Group items matching "started" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Paul Merrell

Another 57 Clinton email threads contain foreign governments' information | Reuters - 0 views

  • A review last month by Reuters of previously released Clinton emails found 30 email threads that the State Department has marked to show they include information shared in confidence by foreign government officials, from prime ministers to spy chiefs.U.S. government regulations examined by Reuters say this sort of information, whether written or spoken, must be classified from the start, and handled through secure, government-controlled channels. The Clinton-Mitchell correspondence is one of 57 email threads found by Reuters in the latest batch of emails released on Monday that the State Department has marked as including the same type of information. In all the 87 email threads examined by Reuters, the State Department has blanked out the confidential information in the public copies, adding the classification code "1.4(B)", denoting foreign government information.This is the only kind of information that presidential executive orders say is "presumed" to likely harm national security if wrongly disclosed. State Department regulations describe it as the "most important category of national security information" its officials encounter.
  • If the State Department's markings are correct, it appears that Clinton and her senior staff routinely did not follow the regulations in the department's Foreign Affairs Manual, which tells employees they "must" safeguard foreign government information by treating it as classified.
Paul Merrell

NSA Will Destroy Archived Metadata When Program Stops - 0 views

  • Four months from now, at the same time that the National Security Agency finally abandons the massive domestic telephone dragnet exposed by whistleblower Edward Snowden, it will also stop perusing the vast archive of data collected by the program. The NSA announced on Monday that it will expunge all the telephone metadata it previously swept up, citing Section 215 of the U.S.A Patriot Act. The program was ruled illegal by a federal appeals court in May. In June, Congress voted to end the program, but gave the NSA until the end of November to phase it out. The historical metadata —  records of American phone calls showing who called who, when, and for how long — will be put out of the reach of analysts on November 29, although technical personnel will have access for three more months. The program started 14 years ago, and operated under rules requiring data be retained for five years, and then destroyed.
  • The only possible hold-up, ironically, would be if any of the civil lawsuits prompted by the program prohibit the destruction of the data. “The telephony metadata” will be “preserved solely because of preservation obligations in pending civil litigation,” the Office of the Director of National Intelligence announced. “As soon as possible, NSA will destroy the Section 215 bulk telephony metadata upon expiration of its litigation preservation obligations.” ACLU staff attorney Alex Abdo told The Intercept his organization is “pleased that the NSA intends to purge the call records it has collected illegally.” But, he added: “Even with today’s pledge, the devil may be in the details.”
Paul Merrell

Energy companies planning more layoffs - Business Insider - 0 views

  • The oil crash is not over. For a few weeks, oil prices climbed and stabilized, and it looked as if the worst of the oil crash were finally ebbing away. After reaching the lows of the year in mid-March, West Texas Intermediate crude oil gained about 50%, steadily climbing, first back to $60 a barrel. But by the first week of July, oil had started to slide again until it finally crashed into a bear market, defined as 20% decline from recent highs. And now energy companies are saying the same things we heard months ago.
  • In a story on Sunday, The Wall Street Journal's Lynn Cook reported that with oil prices hitting new lows, US energy companies were planning to cut more jobs and sell more assets — the same tactics they employed to cope with the first wave of the crash.
  • Morgan Stanley thinks this could be the worst oil crash in 45 years
  • ...1 more annotation...
  • According to The Journal, the drilling giants Halliburton and Baker Hughes have now cut more than twice the number of jobs they disclosed in February — about 27,000 in total. And as we noted last week, Baker Hughes warned in its earnings release that it expected tough market conditions to continue "across all segments" for the rest of 2015. The company also did not forecast a rebound in oil prices.
Paul Merrell

The Angry Arab News Service/وكالة أنباء العربي الغاضب: Syrian rebels and their "artillary of hell" - 0 views

  • This improvised shell (using cylinders of gas) are called "artillery of hell", and are a staple of the indiscriminate shelling by Syrian rebels.  How much accuracy do you think that they have?  Yesterday, in response to advances by Syrian regime troops in Zabadani, Syrian rebels started to shell the hell out of rif Idlib.  How come those shells are not as infamous as barrel bombs (which have been used to Western media acclaim) by Lebanese Army against Nahr Al-Barid refugee camp in 2007.
  •  
    Remember when the White House told us that the Syrian opposition didn't have the technical means to use chemical munitions?
Paul Merrell

The Ron Paul Institute for Peace and Prosperity : Do We Need to Bring Back Internment Camps? - 0 views

  • ast week, Retired General Wesley Clark, who was NATO commander during the US bombing of Serbia, proposed that “disloyal Americans” be sent to internment camps for the “duration of the conflict.” Discussing the recent military base shootings in Chattanooga, TN, in which five US service members were killed, Clark recalled the internment of American citizens during World War II who were merely suspected of having Nazi sympathies. He said: “back then we didn’t say ‘that was freedom of speech,’ we put him in a camp.”   He called for the government to identify people most likely to be radicalized so we can “cut this off at the beginning.” That sounds like “pre-crime”!   Gen. Clark ran for president in 2004 and it’s probably a good thing he didn’t win considering what seems to be his disregard for the Constitution. Unfortunately in the current presidential race Donald Trump even one-upped Clark, stating recently that NSA whistleblower Edward Snowden is a traitor and should be treated like one, implying that the government should kill him.   These statements and others like them most likely reflect the frustration felt in Washington over a 15 year war on terror where there has been no victory and where we actually seem worse off than when we started. The real problem is they will argue and bicker over changing tactics but their interventionist strategy remains the same.   Retired Army Gen. Mike Flynn, who was head of the Defense Intelligence Agency during the US wars in Afghanistan and Iraq, told al-Jazeera this week that US drones create more terrorists than they kill. He said: “The more weapons we give, the more bombs we drop, that just … fuels the conflict.” Still Washington pursues the same strategy while expecting different results.
  •  
    Words from Ron Paul
Paul Merrell

U.S. to defend Syrian rebels with airpower, including from Assad | Reuters - 0 views

  • The United States has decided to allow airstrikes to defend Syrian rebels trained by the U.S. military from any attackers, even if the enemies hail from forces loyal to Syrian President Bashar al-Assad, U.S. officials said on Sunday.The decision by President Barack Obama, which could deepen the U.S. role in Syria's conflict, aims to shield a still-fledging group of Syrian fighters armed and trained by the United States to battle Islamic State militants -- not forces loyal to Assad.But in Syria's messy civil war, Islamic State is only one of the threats to the U.S. recruits. The first batch of U.S.-trained forces deployed to northern Syria came under fire on Friday from other militants, triggering the first known U.S. airstrikes to support them.U.S. officials, speaking on condition of anonymity to confirm details of the decision, first reported by the Wall Street Journal, said the United States would provide offensive strikes to support advances against Islamic State targets. The United States would also provide defensive support to repel any attackers.
  • The Pentagon and the White House declined to discuss the decision on rules of engagement or confirm comments by the unnamed U.S. officials.
  • The U.S. military launched its program in May to train up to 5,400 fighters a year in what was seen as a test of Obama's strategy of getting local partners to combat extremists and keep U.S. troops off the front lines.The training program has been challenged from the start, with many candidates being declared ineligible and some even dropping out.
  •  
    Typical. Authorized leakers announce that Obama has declared war against the democratically-elected government of Syria, then White House officials refuse to confirm it on grounds that a declaration of war is somehow a mere "rule of engagement."  Yet the Constitution holds that only Congress can declare war. 
Paul Merrell

Wiretap Numbers Don't Add Up | Just Security - 0 views

  • Last week, the Administrative Office (AO) of the US Courts published the 2014 Wiretap Report, an annual report to Congress concerning intercepted wire, oral, or electronic communications as required by Title III of the Omnibus Crime Control and Safe Streets Act of 1968. News headlines touted that the number of federal and state wiretaps for 2014 was down 1% for a total of 3,554. Of these, there were few involving encrypted communications; and for those, law enforcement agencies were in most cases able to overcome the encryption. But there is a bigger story that calls into question the accuracy of the all of the prior reports submitted to the AO and the overall data provided to Congress and the public in the Wiretap Reports. Since the Snowden revelations, more and more companies have started publishing “transparency reports” about the number and nature of government demands to access their users’ data. AT&T, Verizon, and Sprint published data for 2014 earlier this year and T-Mobile published its first transparency report on the same day the AO released the Wiretap Report. In aggregate, the four companies state that they implemented 10,712 wiretaps, a threefold difference over the total number reported by the AO. Note that the 10,712 number is only for the four companies listed above and does not reflect wiretap orders received by other telephone carriers or online providers, so the discrepancy actually is larger.
  • So what accounts for the huge gap in reporting? That is a question Congress and the AO should be asking prosecutors and judges who are required by law to make complete and accurate reports of the number of wiretaps conducted each year. Are wiretaps being consistently under­reported to Congress and the public? Based on the data reported by the four major carriers for 2013 and 2014, it certainly would appear to be the case.
Paul Merrell

Watchdog: OPM ignored warnings about online background check system | TheHill - 0 views

  • The Office of Personnel Management (OPM) had known since 2012 about security flaws in its online submission system, roughly three years before the agency finally shut down the system to repair it.“OPM has known about vulnerabilities in the system for years, but has not corrected them,” Michael Esser, the assistant inspector general for audits at the OPM, told a House subcommittee on Wednesday.ADVERTISEMENTIn late June, the OPM said it was suspending the Web-based platform, known as e-QIP, after a security review conducted in the wake of massive hacks at the agency uncovered significant defects.The OPM data breach has likely exposed upwards of 18 million people’s sensitive information and is raising pointed questions about why the agency hasn't moved more expediently over the years to correct glaring problems with its networks.The agency’s inspector general has said OPM officials repeatedly failed to heed its warnings, even refusing to shut down several of its weakest computer systems as recommended.
  • On Wednesday, Esser accused the agency of also not responding to alerts about the e-QIP system, which is used to file the background checks for security clearances.  The agency’s oversight arm detailed 18 security vulnerabilities starting in 2012, he said.“I do not know if those vulnerabilities were related to the reason the system was shut down last week,” Esser added.OPM Director Katherine Archuleta has maintained she always takes into account the watchdog’s recommendations. The agency kept the deficient computer systems running, she said, in order to avoid gaps in delivering employee's paychecks and benefits.
Paul Merrell

Spy Tech Company 'Hacking Team' Gets Hacked | Motherboard - 0 views

  • Sometimes even the cops get robbed. The controversial Italian surveillance company Hacking Team, which sells spyware to governments all around the world, including agencies in Ethiopia, Morocco, the United Arab Emirates, as well as the US Drug Enforcement Administration, appears to have been seriously hacked. Hackers have made 500 GB of client files, contracts, financial documents, and internal emails, some as recent as 2015, publicly available for download. Hacking Team’s spokesperson Eric Rabe did not immediately respond to Motherboard’s calls and email asking for verification that the hacked information is legitimate. Without confirmation from the company itself, it’s difficult to know what percentage of the files are real—however, based on the sheer size of the breach and the information in the files, the hack appears to be authentic. What’s more, the unknown hackers announced their feat through Hacking Team’s own Twitter account.
  • he hackers composed the tweets as if they were written by Hacking Team. “Since we have nothing to hide, we're publishing all our e-mails, files, and source code,” the hackers wrote in a tweet, which included the link to around 500 Gb of files. The hackers also started tweeting a few samples of internal emails from the company. One of the screenshots shows an email dated 2014 from Hacking Team’s founder and CEO David Vincenzetti to another employee. In the email, titled “Yet another Citizen Lab attack,” Vincenzetti links to a report from the online digital rights research center Citizen Lab, at the University of Toronto’s Munk School of Global Affairs, which has exposed numerous cases of abuse from Hacking Team’s clients. Hacking Team has never revealed a list of its clients, and has always and repeatedly denied selling to sketchy governments, arguing that it has an internal procedure to address human rights concerns about prospective customers.
  • It’s unclear exactly how much the hackers got their hands on, but judging from the size of the files, it’s certainly a large collection of internal files. A source who asked to speak anonymously due to the sensitivity of the issue, told me that based on the file names and folders in the leak, the hackers who hit Hacking Team "got everything." A few hours after the initial hack, a list of alleged Hacking Team customers was posted on Pastebin. The list includes past and current customers. Among the most notable, there are a few that were previously unknown, such as the FBI, Chile, Australia, Spain, and Iraq, among others.
  • ...1 more annotation...
  • The breach on Hacking Team comes almost a year after another surveillance tech company, the competing FinFisher, was hacked in a similar way, with a hacker leaking 40 Gb of internal files. FinFisher, like Hacking Team, sells surveillance software to law enforcement agencies across the world. Their software, once surreptitiously installed on a target’s cell phone or computer, can be used to monitor the target’s communications, such as phone calls, text messages, Skype calls, or emails. Operators can also turn on the target’s webcam and exfiltrate files from the infected device.
Paul Merrell

Hacking Team Asks Customers to Stop Using Its Software After Hack | Motherboard - 0 views

  • But the hack hasn’t just ruined the day for Hacking Team’s employees. The company, which sells surveillance software to government customers all over the world, from Morocco and Ethiopia to the US Drug Enforcement Agency and the FBI, has told all its customers to shut down all operations and suspend all use of the company’s spyware, Motherboard has learned. “They’re in full on emergency mode,” a source who has inside knowledge of Hacking Team’s operations told Motherboard.
  • Hacking Team notified all its customers on Monday morning with a “blast email,” requesting them to shut down all deployments of its Remote Control System software, also known as Galileo, according to multiple sources. The company also doesn’t have access to its email system as of Monday afternoon, a source said. On Sunday night, an unnamed hacker, who claimed to be the same person who breached Hacking Team’s competitor FinFisher last year, hijacked its Twitter account and posted links to 400GB of internal data. Hacking Team woke up to a massive breach of its systems.
  • A source told Motherboard that the hackers appears to have gotten “everything,” likely more than what the hacker has posted online, perhaps more than one terabyte of data. “The hacker seems to have downloaded everything that there was in the company’s servers,” the source, who could only speak on condition of anonymity, told Motherboard. “There’s pretty much everything here.” It’s unclear how the hackers got their hands on the stash, but judging from the leaked files, they broke into the computers of Hacking Team’s two systems administrators, Christian Pozzi and Mauro Romeo, who had access to all the company’s files, according to the source. “I did not expect a breach to be this big, but I’m not surprised they got hacked because they don’t take security seriously,” the source told me. “You can see in the files how much they royally fucked up.”
  • ...2 more annotations...
  • For example, the source noted, none of the sensitive files in the data dump, from employees passports to list of customers, appear to be encrypted. “How can you give all the keys to your infrastructure to a 20-something who just joined the company?” he added, referring to Pozzi, whose LinkedIn shows he’s been at Hacking Team for just over a year. “Nobody noticed that someone stole a terabyte of data? You gotta be a fuckwad,” the source said. “It means nobody was taking care of security.”
  • The future of the company, at this point, it’s uncertain. Employees fear this might be the beginning of the end, according to sources. One current employee, for example, started working on his resume, a source told Motherboard. It’s also unclear how customers will react to this, but a source said that it’s likely that customers from countries such as the US will pull the plug on their contracts. Hacking Team asked its customers to shut down operations, but according to one of the leaked files, as part of Hacking Team’s “crisis procedure,” it could have killed their operations remotely. The company, in fact, has “a backdoor” into every customer’s software, giving it ability to suspend it or shut it down—something that even customers aren’t told about. To make matters worse, every copy of Hacking Team’s Galileo software is watermarked, according to the source, which means Hacking Team, and now everyone with access to this data dump, can find out who operates it and who they’re targeting with it.
Paul Merrell

Israel opened up to ridicule over leaked Iran tapes | The National - 0 views

  • Last week, when it became clear he could not muster enough votes in the Senate to block a presidential veto, Israeli prime minister Benjamin Netanyahu let fly a final punch. He observed that “the overwhelming majority of the American public sees eye-to-eye with Israel”, not their president.But many of those ordinary Americans may be surprised to learn that Mr Netanyahu’s policy on Iran has long been viewed as implausible and counter-productive by his own security officials. That verdict was underscored by the latest disclosures from Ehud Barak, who was defence minister through the critical years of Israel’s lobbying for an attack on Iran. Leaked audio tapes of Mr Barak speaking to biographers suggest that he and Mr Netanyahu pressed unsuccessfully on three occasions, between 2010 and 2012, for the Israeli military to launch a strike. Each time, he says, they were foiled either by the military’s failure to come up with a workable plan or by the reticence of fellow ministers as they heard of the likely fallout.
  • The truth is that Mr Netanyahu does not approve of any agreement. He would prefer an intensification of sanctions, forcing Iran to break free of the Non-Proliferation Treaty and conceal its nuclear research from all scrutiny.Then his warnings would sound more compelling, as would his demands that the US lead an attack on Iran.Above all, Mr Netanyahu wishes to prevent a rapprochement between the US and Tehran, one that might weaken Israel’s hold on Washington’s Middle East policy and increase the pressure for a real peace process with the Palestinians. Mr Barak’s leaked comments, meanwhile, have damaged everyone involved. The former defence minister has been publicly rebuked as a blabbermouth, and Mr Netanyahu derided for being so ineffectual his cabinet spurned him at what he claimed to be the most fateful moment in Israel’s history.
  • But the tapes’ enduring significance – whatever embellishments Mr Barak made in the telling – is that they confirm years of intimations from Israel’s security establishment that it stood firm against Mr Netanyahu’s reckless approach on Iran.From Meir Dagan, the former Mossad spy chief, to Gabi Ashkenazi, the former military chief of staff, Israel’s security elite has hinted loudly that it was blocking Mr Netanyahu’s efforts to provoke regional conflagration. Such was the opposition, one may suspect that even Messrs Netanyahu and Barak began to have doubts. Had they truly believed Israel could be saved only by bombing Iran, would they not have moved mountains to win over the cabinet and defence establishment?More likely, Mr Netanyahu concluded some time ago that Israel had no military option against Iran. So why fight a doomed battle on Iran to the bitter end, further damaging Israel’s frayed ties with Washington?
  • ...1 more annotation...
  • Last week Israeli media quoted sources close to Mr Netanyahu saying he knew he would lose from the outset but carried on regardless. The goal was to convince the American public, not Democratic legislators.Mr Netanyahu’s current bluster starts to look like it is aimed less at the nuclear deal than at President Obama himself. Is Mr Netanyahu hoping to turn the Iran issue into a doomsday electoral weapon against the Democrats, helping to clear the path into the White House next year for a Republican?That way, Mr Netanyahu may believe he can still emerge the victor, with a new president prepared to push Iran back into the US line of fire.
  •  
    The Iranian Nukes Myth as an Israel Lobby effort to elect a Republican President in the U.S.?
Paul Merrell

Netanyahu Makes Quick Pivot From Loss on Iran Deal - The New York Times - 0 views

  • That last move might be a long shot as well, but Mr. Netanyahu has already started saying things his allies like to hear. After his session on Thursday with David Cameron, the British prime minister, Mr. Netanyahu said he was ready to meet with President Mahmoud Abbas of the Palestinian Authority in the occupied West Bank even though it is “a nightmare for my security people.”“I’m willing right now, without any preconditions, any preconditions whatsoever, to sit down with President Abbas and negotiate this peace,” Mr. Netanyahu said. “I’m willing to go to Ramallah,” he added, “or President Abbas can come to Jerusalem, or, for God’s sake, we can take up some of these suggestions for retreats in Sicily or fjords in Norway, whatever. Anytime, anywhere, now, without preconditions.”
  • But Mr. Abbas has long insisted he would resume negotiations only on the basis of the pre-1967 lines that divided Israel from the West Bank and Gaza Strip, among other terms. Senior Palestinian officials have said in recent days that he planned to take an even tougher line at the United Nations General Assembly later this month, moving to dissolve existing political, security and economic agreements with Israel.
Gary Edwards

What Happens Next Will Amaze You - by Maciej Cegłowski - 1 views

  • But there's something very fishy about California capitalism. Investing has become the genteel occupation of our gentry, like having a country estate used to be in England. It's a class marker and a socially acceptable way for rich techies to pass their time. Gentlemen investors decide what ideas are worth pursuing, and the people pitching to them tailor their proposals accordingly. The companies that come out of this are no longer pursuing profit, or even revenue. Instead, the measure of their success is valuation—how much money they've convinced people to tell them they're worth. There's an element of fantasy to the whole enterprise that even the tech elite is starting to find unsettling.
  • We had people like this back in Poland, except instead of venture capitalists we called them central planners. They too were in charge of allocating vast amounts of money that didn't belong to them. They too honestly believed they were changing the world, and offered the same kinds of excuses about why our day-to-day life bore no relation to the shiny, beautiful world that was supposed to lie just around the corner.
  • So what kinds of ideas do California central planners think are going to change the world? Well, right now, they want to build space rockets and make themselves immortal. I wish I was kidding.
  •  
    One of the best reads have had in a long time. Excellent commentary on life, society, the Internet, emerging technologies, privacy and Silicon Valley. A must read if ever there was one. Maciej Cegłowski has also posted a collection of his talks here: http://idlewords.com/talks/
Paul Merrell

From Radio to Porn, British Spies Track Web Users' Online Identities - 0 views

  • HERE WAS A SIMPLE AIM at the heart of the top-secret program: Record the website browsing habits of “every visible user on the Internet.” Before long, billions of digital records about ordinary people’s online activities were being stored every day. Among them were details cataloging visits to porn, social media and news websites, search engines, chat forums, and blogs. The mass surveillance operation — code-named KARMA POLICE — was launched by British spies about seven years ago without any public debate or scrutiny. It was just one part of a giant global Internet spying apparatus built by the United Kingdom’s electronic eavesdropping agency, Government Communications Headquarters, or GCHQ. The revelations about the scope of the British agency’s surveillance are contained in documents obtained by The Intercept from National Security Agency whistleblower Edward Snowden. Previous reports based on the leaked files have exposed how GCHQ taps into Internet cables to monitor communications on a vast scale, but many details about what happens to the data after it has been vacuumed up have remained unclear.
  • Amid a renewed push from the U.K. government for more surveillance powers, more than two dozen documents being disclosed today by The Intercept reveal for the first time several major strands of GCHQ’s existing electronic eavesdropping capabilities.
  • The surveillance is underpinned by an opaque legal regime that has authorized GCHQ to sift through huge archives of metadata about the private phone calls, emails and Internet browsing logs of Brits, Americans, and any other citizens — all without a court order or judicial warrant
  • ...17 more annotations...
  • A huge volume of the Internet data GCHQ collects flows directly into a massive repository named Black Hole, which is at the core of the agency’s online spying operations, storing raw logs of intercepted material before it has been subject to analysis. Black Hole contains data collected by GCHQ as part of bulk “unselected” surveillance, meaning it is not focused on particular “selected” targets and instead includes troves of data indiscriminately swept up about ordinary people’s online activities. Between August 2007 and March 2009, GCHQ documents say that Black Hole was used to store more than 1.1 trillion “events” — a term the agency uses to refer to metadata records — with about 10 billion new entries added every day. As of March 2009, the largest slice of data Black Hole held — 41 percent — was about people’s Internet browsing histories. The rest included a combination of email and instant messenger records, details about search engine queries, information about social media activity, logs related to hacking operations, and data on people’s use of tools to browse the Internet anonymously.
  • Throughout this period, as smartphone sales started to boom, the frequency of people’s Internet use was steadily increasing. In tandem, British spies were working frantically to bolster their spying capabilities, with plans afoot to expand the size of Black Hole and other repositories to handle an avalanche of new data. By 2010, according to the documents, GCHQ was logging 30 billion metadata records per day. By 2012, collection had increased to 50 billion per day, and work was underway to double capacity to 100 billion. The agency was developing “unprecedented” techniques to perform what it called “population-scale” data mining, monitoring all communications across entire countries in an effort to detect patterns or behaviors deemed suspicious. It was creating what it said would be, by 2013, “the world’s biggest” surveillance engine “to run cyber operations and to access better, more valued data for customers to make a real world difference.”
  • A document from the GCHQ target analysis center (GTAC) shows the Black Hole repository’s structure.
  • The data is searched by GCHQ analysts in a hunt for behavior online that could be connected to terrorism or other criminal activity. But it has also served a broader and more controversial purpose — helping the agency hack into European companies’ computer networks. In the lead up to its secret mission targeting Netherlands-based Gemalto, the largest SIM card manufacturer in the world, GCHQ used MUTANT BROTH in an effort to identify the company’s employees so it could hack into their computers. The system helped the agency analyze intercepted Facebook cookies it believed were associated with Gemalto staff located at offices in France and Poland. GCHQ later successfully infiltrated Gemalto’s internal networks, stealing encryption keys produced by the company that protect the privacy of cell phone communications.
  • Similarly, MUTANT BROTH proved integral to GCHQ’s hack of Belgian telecommunications provider Belgacom. The agency entered IP addresses associated with Belgacom into MUTANT BROTH to uncover information about the company’s employees. Cookies associated with the IPs revealed the Google, Yahoo, and LinkedIn accounts of three Belgacom engineers, whose computers were then targeted by the agency and infected with malware. The hacking operation resulted in GCHQ gaining deep access into the most sensitive parts of Belgacom’s internal systems, granting British spies the ability to intercept communications passing through the company’s networks.
  • In March, a U.K. parliamentary committee published the findings of an 18-month review of GCHQ’s operations and called for an overhaul of the laws that regulate the spying. The committee raised concerns about the agency gathering what it described as “bulk personal datasets” being held about “a wide range of people.” However, it censored the section of the report describing what these “datasets” contained, despite acknowledging that they “may be highly intrusive.” The Snowden documents shine light on some of the core GCHQ bulk data-gathering programs that the committee was likely referring to — pulling back the veil of secrecy that has shielded some of the agency’s most controversial surveillance operations from public scrutiny. KARMA POLICE and MUTANT BROTH are among the key bulk collection systems. But they do not operate in isolation — and the scope of GCHQ’s spying extends far beyond them.
  • The agency operates a bewildering array of other eavesdropping systems, each serving its own specific purpose and designated a unique code name, such as: SOCIAL ANTHROPOID, which is used to analyze metadata on emails, instant messenger chats, social media connections and conversations, plus “telephony” metadata about phone calls, cell phone locations, text and multimedia messages; MEMORY HOLE, which logs queries entered into search engines and associates each search with an IP address; MARBLED GECKO, which sifts through details about searches people have entered into Google Maps and Google Earth; and INFINITE MONKEYS, which analyzes data about the usage of online bulletin boards and forums. GCHQ has other programs that it uses to analyze the content of intercepted communications, such as the full written body of emails and the audio of phone calls. One of the most important content collection capabilities is TEMPORA, which mines vast amounts of emails, instant messages, voice calls and other communications and makes them accessible through a Google-style search tool named XKEYSCORE.
  • As of September 2012, TEMPORA was collecting “more than 40 billion pieces of content a day” and it was being used to spy on people across Europe, the Middle East, and North Africa, according to a top-secret memo outlining the scope of the program. The existence of TEMPORA was first revealed by The Guardian in June 2013. To analyze all of the communications it intercepts and to build a profile of the individuals it is monitoring, GCHQ uses a variety of different tools that can pull together all of the relevant information and make it accessible through a single interface. SAMUEL PEPYS is one such tool, built by the British spies to analyze both the content and metadata of emails, browsing sessions, and instant messages as they are being intercepted in real time. One screenshot of SAMUEL PEPYS in action shows the agency using it to monitor an individual in Sweden who visited a page about GCHQ on the U.S.-based anti-secrecy website Cryptome.
  • Partly due to the U.K.’s geographic location — situated between the United States and the western edge of continental Europe — a large amount of the world’s Internet traffic passes through its territory across international data cables. In 2010, GCHQ noted that what amounted to “25 percent of all Internet traffic” was transiting the U.K. through some 1,600 different cables. The agency said that it could “survey the majority of the 1,600” and “select the most valuable to switch into our processing systems.”
  • According to Joss Wright, a research fellow at the University of Oxford’s Internet Institute, tapping into the cables allows GCHQ to monitor a large portion of foreign communications. But the cables also transport masses of wholly domestic British emails and online chats, because when anyone in the U.K. sends an email or visits a website, their computer will routinely send and receive data from servers that are located overseas. “I could send a message from my computer here [in England] to my wife’s computer in the next room and on its way it could go through the U.S., France, and other countries,” Wright says. “That’s just the way the Internet is designed.” In other words, Wright adds, that means “a lot” of British data and communications transit across international cables daily, and are liable to be swept into GCHQ’s databases.
  • A map from a classified GCHQ presentation about intercepting communications from undersea cables. GCHQ is authorized to conduct dragnet surveillance of the international data cables through so-called external warrants that are signed off by a government minister. The external warrants permit the agency to monitor communications in foreign countries as well as British citizens’ international calls and emails — for example, a call from Islamabad to London. They prohibit GCHQ from reading or listening to the content of “internal” U.K. to U.K. emails and phone calls, which are supposed to be filtered out from GCHQ’s systems if they are inadvertently intercepted unless additional authorization is granted to scrutinize them. However, the same rules do not apply to metadata. A little-known loophole in the law allows GCHQ to use external warrants to collect and analyze bulk metadata about the emails, phone calls, and Internet browsing activities of British people, citizens of closely allied countries, and others, regardless of whether the data is derived from domestic U.K. to U.K. communications and browsing sessions or otherwise. In March, the existence of this loophole was quietly acknowledged by the U.K. parliamentary committee’s surveillance review, which stated in a section of its report that “special protection and additional safeguards” did not apply to metadata swept up using external warrants and that domestic British metadata could therefore be lawfully “returned as a result of searches” conducted by GCHQ.
  • Perhaps unsurprisingly, GCHQ appears to have readily exploited this obscure legal technicality. Secret policy guidance papers issued to the agency’s analysts instruct them that they can sift through huge troves of indiscriminately collected metadata records to spy on anyone regardless of their nationality. The guidance makes clear that there is no exemption or extra privacy protection for British people or citizens from countries that are members of the Five Eyes, a surveillance alliance that the U.K. is part of alongside the U.S., Canada, Australia, and New Zealand. “If you are searching a purely Events only database such as MUTANT BROTH, the issue of location does not occur,” states one internal GCHQ policy document, which is marked with a “last modified” date of July 2012. The document adds that analysts are free to search the databases for British metadata “without further authorization” by inputing a U.K. “selector,” meaning a unique identifier such as a person’s email or IP address, username, or phone number. Authorization is “not needed for individuals in the U.K.,” another GCHQ document explains, because metadata has been judged “less intrusive than communications content.” All the spies are required to do to mine the metadata troves is write a short “justification” or “reason” for each search they conduct and then click a button on their computer screen.
  • Intelligence GCHQ collects on British persons of interest is shared with domestic security agency MI5, which usually takes the lead on spying operations within the U.K. MI5 conducts its own extensive domestic surveillance as part of a program called DIGINT (digital intelligence).
  • GCHQ’s documents suggest that it typically retains metadata for periods of between 30 days to six months. It stores the content of communications for a shorter period of time, varying between three to 30 days. The retention periods can be extended if deemed necessary for “cyber defense.” One secret policy paper dated from January 2010 lists the wide range of information the agency classes as metadata — including location data that could be used to track your movements, your email, instant messenger, and social networking “buddy lists,” logs showing who you have communicated with by phone or email, the passwords you use to access “communications services” (such as an email account), and information about websites you have viewed.
  • Records showing the full website addresses you have visited — for instance, www.gchq.gov.uk/what_we_do — are treated as content. But the first part of an address you have visited — for instance, www.gchq.gov.uk — is treated as metadata. In isolation, a single metadata record of a phone call, email, or website visit may not reveal much about a person’s private life, according to Ethan Zuckerman, director of Massachusetts Institute of Technology’s Center for Civic Media. But if accumulated and analyzed over a period of weeks or months, these details would be “extremely personal,” he told The Intercept, because they could reveal a person’s movements, habits, religious beliefs, political views, relationships, and even sexual preferences. For Zuckerman, who has studied the social and political ramifications of surveillance, the most concerning aspect of large-scale government data collection is that it can be “corrosive towards democracy” — leading to a chilling effect on freedom of expression and communication. “Once we know there’s a reasonable chance that we are being watched in one fashion or another it’s hard for that not to have a ‘panopticon effect,’” he said, “where we think and behave differently based on the assumption that people may be watching and paying attention to what we are doing.”
  • When compared to surveillance rules in place in the U.S., GCHQ notes in one document that the U.K. has “a light oversight regime.” The more lax British spying regulations are reflected in secret internal rules that highlight greater restrictions on how NSA databases can be accessed. The NSA’s troves can be searched for data on British citizens, one document states, but they cannot be mined for information about Americans or other citizens from countries in the Five Eyes alliance. No such constraints are placed on GCHQ’s own databases, which can be sifted for records on the phone calls, emails, and Internet usage of Brits, Americans, and citizens from any other country. The scope of GCHQ’s surveillance powers explain in part why Snowden told The Guardian in June 2013 that U.K. surveillance is “worse than the U.S.” In an interview with Der Spiegel in July 2013, Snowden added that British Internet cables were “radioactive” and joked: “Even the Queen’s selfies to the pool boy get logged.”
  • In recent years, the biggest barrier to GCHQ’s mass collection of data does not appear to have come in the form of legal or policy restrictions. Rather, it is the increased use of encryption technology that protects the privacy of communications that has posed the biggest potential hindrance to the agency’s activities. “The spread of encryption … threatens our ability to do effective target discovery/development,” says a top-secret report co-authored by an official from the British agency and an NSA employee in 2011. “Pertinent metadata events will be locked within the encrypted channels and difficult, if not impossible, to prise out,” the report says, adding that the agencies were working on a plan that would “(hopefully) allow our Internet Exploitation strategy to prevail.”
Paul Merrell

Greek Voters Return Alexis Tsipras to Power in Snap Elections | TIME - 0 views

  • Despite unhappiness with his capitulation to European creditors, Tsipras remains in power after snap elections It was a “victory of the people” said Greek Prime Minister Alexis Tsipras as he was swept back to power following a snap general election on Sunday. Despite his failure to rid Greece of the troika as he’d once promised; and instead, dragging the country into a yet another austerity program, Tsipras told a band of over 2,000 Syriza loyalists near Syntagma Square on Sunday night that “justice had been done.”
  • In comparison to January’s lightning victory for Syriza, and the defiance and righteousness that emerged during the bailout referendum held n July, celebrations were relatively low-key. And no surprise—the government has a mountain of harsh policies to implement, including full reassessment of the welfare system with savings worth 0.5 per cent of GDP, reconstruction of a broken tax collection system and full liberalization of the energy market. Tsipras told the audience that starting on Monday morning he will “fight corruption”—a key strategy plank during the election campaign. Tsipiras lost of some of his strongest comrades in the run up to the election, including the former president of the parliament, Zoe Konstantopoulou who joined several other splitters from Sryiza in a new party called Popular Unity. They were angry about what they saw as Tsipiras’ capitulation to Germany and other creditor nations. But the Prime Minister’s legions of fans remain undeniably behind him. “Tsipras is strong in his game; he’s playing chess and we’re following him”, said 32-year-old Ugur from Athens. “He is a realist, and a leftist; he had to sign the memorandum because we were on the edge and were going to fall over.”
  • “I’m very happy with the result—Syriza is the only party that will support the poor people and workers rights; he’s one of the best politicians to renegotiate the memorandum,” said 50-year-old Kostas Dianis. Although a former communist, some critics say Tsipras can no longer claim to represent the far left; not after his capitulation in Brussels earlier this summer when he agreed to a third bailout worth over $95 billion based on the demands of European creditors. “Tsipras is an agent for capitalism; he is not from the left; he is part of the system, and will continue the system, rather than changing it”, said 32-year-old Yannis; a taxi driver who voted for Syriza in January, but this time voted for the Communist party because “they’re the only ones that say what they mean.” And although Tsipras was unable to free Greece from austerity, as he had initially promised, the alternative left—the MP’s that split from Tsipras earlier this summer, provided few viable alternatives to Greek voters.
  • ...1 more annotation...
  • Though she remains personally popular, the strident Zoe Konstantopoulou didn’t win back her seat after Popular Unity failed to reach the 3 per cent threshold. “The mandate of the people on the 5th of July was a clear ‘No’ to the extortion, the violation of human rights and ‘No’ to austerity”, she told TIME in an interview. Many Greek voters may well have agreed with Konstantopoulou, but they were still willing to give Tsipras a chance. “I voted for Tsipras because the others are worse and they got us into this mess” said 43 year old Elaney Depoli. “People in Greece are depressed from 5 years of austerity; this is the best opportunity to get better results. He signed the memorandum to save Greece, and he is saving Greece.”
  •  
    Sounds like no Grexit before the Greek far left reorganizes in a new party separate from Syrisa. And it may be the Communist Party that leads Greece out from under the tyranny of the Eurozone. That would have an anti-communists in the U.S. State Dept. in a true tizzy and might result in NATO intervention. 
Paul Merrell

US, China reach cyberespionage agreement | ITworld - 0 views

  • The U.S. and China have reached their first ever cybercrime and cyberespionage agreement, but the deal is quite general and how it will translate into actions is still unclear.Leaders of both countries announced the deal in Washington on Friday after two days of top-level talks, but both dodged questions on specific hacking incidents or the indictment last year by the U.S. of five Chinese military hackers for cybercrimes."We have agreed that neither the U.S. or the Chinese government will conduct or knowingly support cyber-enabled theft of intellectual property, including trade secrets or other confidential business information for commercial advantage," President Obama said at a White House news conference.And that appears to be the main thrust of the agreement -- government-sponsored cyberespionage for the economic gain of companies. It doesn't cover government espionage and is pretty specific in its definition but, as President Obama indicated: It's a start.
Paul Merrell

Transatlantic Trade and Investment Partnership (TTIP) Negotiations Fall Apart Following Mass Protest in the EU | Global Research - Centre for Research on Globalization - 0 views

  • Back in January the EU Commission published their response to the consultation on TTIP and it was found that 97% of the 150,000 responses opposed the trade deal. These respondents represented the general public. The biggest petition in the EU’s history was then presented that contained the signatures of 2 million citizens (now nearly 3 million) opposed to TTIP. Both were rejected as were proposals even for a simple hearing of the European Citizens Initiative. Then in April this year, thousands of protestors took to the streets of cities all over Europe as unelected officials of the EU Commission continue to ignore the concerns of its citizens. In June, fellow MEPs from many political parties who are also opposed to TTIP joined Ukip in standing, shouting, booing and clapping to show their dissatisfaction with proceedings. MEPs were due to set out their first formal position on TTIP since negotiations started two years ago and the meeting descended into chaos (video). The meeting was then stopped by the commissioners. Meanwhile David Cameron has persistently attempted to call out those working to derail the deal. Cameron has accused critics of inventing false scare stories whilst urging business chiefs to help make the case to overcome sustained attacks from left-wing opponents and warned Britain would “rue the day if we miss this opportunity” to open up transatlantic markets.
  • Cameron, who (increasingly) seldom listens to the general public or elected members of parliament representing the electorate will no doubt use all his powers to get this deal though to redeem himself after being called incompetent by his own military generals and by the Obama administration over Syria. In sharp comparison, both Paris and Berlin want the Investor State Dispute Settlement mechanism (ISDS) of TTIP removed from the transatlantic trade treaty currently being negotiated with Washington. This is a game changer. Matthias Fekl, the French Secretary of State for Foreign Trade, told EurActiv France that he would “never allow private tribunals in the pay of multinational companies to dictate the policies of sovereign states, particularly in certain domains like health and the environment”. That was back in January. Nine months later and France has now reinforced that message and gone one big step forward. In an interview with Sud-Ouest, Matthias Fekl threatened to “call a complete halt” to the TTIP negotiations if things do not change. EurActiv France reports. America has shown no desire to change any of the major issues that have been challenged. Fekl told the French newspaper that he believes the “total lack of transparency” in the Transatlantic Trade and Investment Partnership (TTIP) negotiations poses a “democratic problem”.
  • Fekl, the Minister of State for Foreign Trade called on the United States to show “reciprocity” in the negotiations. “American members of parliament have access to a much higher number of documents than we do in Europe,” he said. The German people are now taking a stand and now it is being reported in the USA that sentiment is going against the deal – “It is entirely possible that the U.S. could seek to conclude the deal in the next few years only to find that European governments are unwilling to risk the ire of their voters”. Matthias Fekl, explained that, ever since the negotiations began in 2013, “These negotiations have been and are being conducted in a total lack of transparency,” and that France has, as of yet, received “no serious offer from the Americans.” The reasons for this stunning public rejection had probably already been accurately listed more than a year ago. Jean Arthuis, a member of the European Parliament, and formerly France’s Minister of Economy and Finance, headlined in Le Figaro, on 10 April 2014, “7 good reasons to oppose the transatlantic treaty”. There is no indication that the situation has changed since then, as regards the basic demands that President Obama is making. Arthuis said at that time, that he was opposed to;
  • ...3 more annotations...
  • Private arbitration of disputes between States and businesses. Such a procedure is strictly contrary to the idea that I have of the      sovereignty of States. … Any questioning of the European system of appellations of origin. According to the US proposal, there would be a non-binding register, and only for wines and spirits. Such a reform would kill many European local products, whose value is based on their certified origin. Signing of an agreement with a power that legalizes widespread and systematic spying on my fellow European citizens and European businesses. As long as the agreement does not protect the personal data of European and US citizens, it cannot be signed. Allowing the United States proposal of a transatlantic common financial space, who adamantly refuse a common regulation of finance, and they refuse to abolish systematic discrimination by the US financial markets against European financial services. The questioning of European health protections. We do not want our animals treated with growth hormones nor products derived from GMOs, or chemical decontamination of meat, or of genetically modified seeds or non-therapeutic antibiotics in animal feed.
  • The signing of an agreement if it does not include the end of the US monetary dumping. Since the abolition of the gold convertibility of the dollar and the transition to the system of floating exchange rates, the dollar is both American national currency and the main unit for exchange reserves in the world. The Federal Reserve then continually practices monetary dumping, by influencing the amount of dollars available to facilitate exports from the United States. As things now stand, America’s monetary weapon has the same effect as customs duties against every other nation. [And he will not sign unless it’s removed.] Allow the emerging digital services in Europe to be swept up by US giants such as Google, Amazon or Netflix. They’re giant absolute masters in tax optimization, which make Europe a “digital colony.”
  • France is now considering “all options including an outright termination of negotiations” says France’s Trade Minister.
Paul Merrell

Edward Snowden Is On Twitter: @Snowden - 0 views

  • Edward Snowden isn’t just a hashtag anymore. The NSA whistleblower joined Twitter on Tuesday, using the @snowden Twitter handle. Snowden, who has lived in Russia since turning over a trove of top-secret documents to reporters more than two years ago, has remained in the public eye thanks to frequent appearances and interviews using video links and sometimes even robots. But joining the Twitterverse establishes him even more firmly as a major figure in the public discourse about surveillance and privacy that he jump-started in June 2013.
  • s of shortly after the launch of his new Twitter account, Snowden was only following one other account: @NSAGov. But @NSAGov was not — at least not officially — following him back. Here is his first Tweet: Can you hear me now? — Edward Snowden (@Snowden) September 29, 2015 UPDATE at 4:25 p.m. ET: Within four hours, Snowden had gained more than half a million followers, and tweeps around the world took notice: Today @Snowden joined Twitter, and here's the world's response. pic.twitter.com/d6HgVvdRsf — Twitter (@twitter) September 29, 2015
Paul Merrell

Over 1,000 ISIS and Al Nusra Militants Surrender To Syrian Army In Last 24 Hours | Global Research - Centre for Research on Globalization - 0 views

  • The development came after President Bashar al-Assad in a televised address in July pardoned all soldiers who have fled the army, saying that his words served as a general decree to relevant officials. Hundreds of gunmen have been laying down their weapons and turning themselves in to authorities in areas across the country. This number seems to be on the rise as the army has been making steady gains in the battlefield against the terrorist groups, recapturing an increasing number of regions, including strategic sites, which helped cut off many of the militants’ supply routes and forced them to surrender or run away. Also in the past 24 hours, the Syrian air raids destroyed concentration centers of the ISIL, al-Nusra Front and other terrorist groups in Hama and Idlib. The Syrian warplanes conducted airstrikes against positions of ISIL and the so-called Jeish al-Fath terrorists in the countryside of Hama and Idlib.
  • The airstrikes hit positions of the ISIL terrorists in al-Rahjan village, 50 km to the Northeast of Hama City, destroying a number of terrorists’ vehicles with all arms, ammunition and equipment on board. The airstrikes also hit positions of al-Nusra Front and other terrorist groups in Aqrab village in the Southwestern countryside of Hama, killing scores of terrorists. A number of vehicles belonging to Jeish al-Fath terrorists were also destroyed in airstrikes in Abdin village in the countryside of Ma’aret al-Nu’aman in Idlib countryside. Meantime, the Syrian fighter jets pounded hideouts of the Takfiri militants in the countryside of Homs. The Syrian air raids destroyed Takfiri terrorists’ hideouts and vehicles in al-Qaryatain, al-Sa’an, and in the vicinity of al-Sha’er field in Homs countryside.
  • Also, the Syrian army conducted military operations against the foreign-backed Takfiri militants in Aleppo province, leaving hundreds of them killed and injured. Hundreds of terrorists were killed or wounded in Aleppo City and its countryside in the past 24 hours, a military source said. Elsewhere, at least 28 militant fighters of the ISIL terrorist group were killed during clashes with the Kurdish forces in the Northeastern Syrian province of Hasaka.
  • ...1 more annotation...
  • Also, gunmen from the Jeish al-Fath coalition of extremist groups are pulling out their forces from Idlib and other towns in Northwestern Syria. The radical group started moving towards the Turkish border on Saturday after having experienced “the efficiency of the Russian aerospace forces’ strikes,” the As-Safir Arabic-language daily reported. The coalition is led by al-Nusra terrorist group, the Syrian branch of al-Qaeda, which is sponsored by Saudi Arabia, Turkey and Qatar. The group seized the Idlib province this spring. The report said field commanders fear at any moment the attack of Syrian forces supported by Russian warplanes on the key town of Jisr al-Shugour, on the Lattakia-Aleppo highway.
Paul Merrell

Syria crisis: Nato renews pledge amid Russia 'escalation' - BBC News - 0 views

  • But a Saudi government official told the BBC that in response to the Russian air strikes in Syria, it was stepping up its supply of weaponry to three anti-Assad rebel groups there.The official said the Free Syrian Army, Jaysh al-Fatah and Southern Front would get increased supplies of modern, high-powered weaponry, including guided anti-tank weapons.
  • The Russian air strikes had "weakened" IS, Syrian Army Chief of Staff Gen Ali Abdullah Ayoub said on Thursday, enabling the army to start a "big attack" to retake towns and villages.Heavy fighting was reported in areas of Idlib, Hama and Latakia provinces, where a coalition of rebels that includes the Nusra Front operates.Government-backed troops had moved into the key Ghab plain area, the UK-based Syrian Observatory for Human Rights monitoring group said.
« First ‹ Previous 521 - 540 of 749 Next › Last »
Showing 20 items per page