Skip to main content

Home/ Socialism and the End of the American Dream/ Group items matching "Snowden" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Paul Merrell

Mohamed Mohamud terrorism conviction upheld as judge rules data collection legal | OregonLive.com - 0 views

  • A federal judge has affirmed the legality of the U.S. government's bulk phone and email data collection of foreign nationals living outside the country in denying an Mohamed Mohamud's motion to dismiss his terrorism conviction. It was the first legal challenge to the government's bulk data-collection program of non-U.S. citizens living overseas after revelations about massive, warrantless surveillance were made public by former National Security Agency employee Edward Snowden. The program also sweeps up information about U.S. citizens who have contact with overseas suspects, but such surveillance has been considered incidental. Lawyers for Mohamud tried to show the program violated his constitutional rights and was more broadly unconstitutional. U.S. District Court Judge Garr King on Tuesday denied that effort. The ruling also upheld Mohamud's conviction on terrorism charges. In his decision, King rejected the argument from Mohamud's attorneys that prosecutors failed to notify Mohamud of information derived under the U.S. Foreign Intelligence Surveillance Act until he was already convicted.
  • King held that Mohamud's most persuasive argument was that, even if the original surveillance were lawful, the subsequent use of that information on a U.S. citizen required a warrant. Previous federal appeals court rulings have said that the government needs a warrant to test pills seized in an unrelated search or to search a computer for more information that the warrant sought. Those rulings, the defense argued, meant King should apply the same standard to the evidence seized. But King disagreed. "I do not find any significant additional intrusion," King wrote. "Thus, subsequent querying of (collected data), even if U.S. person identifiers are used, is not a separate search and does not make (such surveillance) unreasonable under the Fourth Amendment."
  •  
    A disappointing decision by an Oregon federal judge in a criminal case involving NSA surveillance, one of the FBI's invented terrorists. This decision has appeal written all over it. 
Paul Merrell

French Report ISIL Leader Mossad Agent | Veterans Today - 0 views

  • Abu Bakr al-Baghdadi, so-called  ”Caliph,”  the head of ISIL (Islamic State in Iraq and the Levant is, according to sources reputed to originate from Edward Snowden, an actor named Elliot Shimon, a Mossad trained operative. Simon Elliot (Elliot Shimon) aka Al-Baghdadi was born of two Jewish parents and is a Mossad agent. We offer below three translations that want to assert that the Caliph Al-Baghdadi is a full Mossad agent and that he was born Jewish father and mother:
  •  
    Veterans Today is prone to publishing inaccurate sensationalist articles. But I'm bookmarking this one just in case further corroborating information should surface. ISIL itself reeks of being a false flag operation. Its initial training and arming was via U.S. efforts. 
Paul Merrell

Secret Malware in European Union Attack Linked to U.S. and British Intelligence - The Intercept - 0 views

  • Complex malware known as Regin is the suspected technology behind sophisticated cyberattacks conducted by U.S. and British intelligence agencies on the European Union and a Belgian telecommunications company, according to security industry sources and technical analysis conducted by The Intercept. Regin was found on infected internal computer systems and email servers at Belgacom, a partly state-owned Belgian phone and internet provider, following reports last year that the company was targeted in a top-secret surveillance operation carried out by British spy agency Government Communications Headquarters, industry sources told The Intercept. The malware, which steals data from infected systems and disguises itself as legitimate Microsoft software, has also been identified on the same European Union computer systems that were targeted for surveillance by the National Security Agency.
  • The hacking operations against Belgacom and the European Union were first revealed last year through documents leaked by NSA whistleblower Edward Snowden. The specific malware used in the attacks has never been disclosed, however.
Paul Merrell

Congress Is Irrelevant on Mass Surveillance. Here's What Matters Instead. - The Intercept - 0 views

  • The “USA Freedom Act”—the proponents of which were heralding as “NSA reform” despite its suffocatingly narrow scope—died in the august U.S. Senate last night when it attracted only 58 of the 60 votes needed to close debate and move on to an up-or-down vote. All Democratic and independent senators except one (Bill Nelson of Florida) voted in favor of the bill, as did three tea-party GOP Senators (Ted Cruz, Mike Lee, and Dean Heller). One GOP Senator, Rand Paul, voted against it on the ground that it did not go nearly far enough in reining in the NSA. On Monday, the White House had issued a statement “strongly supporting” the bill. The “debate” among the Senators that preceded the vote was darkly funny and deeply boring, in equal measure. The black humor was due to the way one GOP senator after the next—led by ranking intelligence committee member Saxby Chambliss of Georgia (pictured above)—stood up and literally screeched about 9/11 and ISIS over and over and over, and then sat down as though they had made a point.
  • So the pro-NSA Republican senators were actually arguing that if the NSA were no longer allowed to bulk-collect the communication records of Americans inside the U.S., then ISIS would kill you and your kids. But because they were speaking in an empty chamber and only to their warped and insulated D.C. circles and sycophantic aides, there was nobody there to cackle contemptuously or tell them how self-evidently moronic it all was. So they kept their Serious Faces on like they were doing The Nation’s Serious Business, even though what was coming out of their mouths sounded like the demented ramblings of a paranoid End is Nigh cult. The boredom of this spectacle was simply due to the fact that this has been seen so many times before—in fact, every time in the post-9/11 era that the U.S. Congress pretends publicly to debate some kind of foreign policy or civil liberties bill. Just enough members stand up to scream “9/11″ and “terrorism” over and over until the bill vesting new powers is passed or the bill protecting civil liberties is defeated.
  • Eight years ago, when this tawdry ritual was still a bit surprising to me, I live-blogged the 2006 debate over passage of the Military Commissions Act, which, with bipartisan support, literally abolished habeas corpus rights established by the Magna Carta by sanctioning detention without charges or trial. (My favorite episode there was when GOP Sen. Arlen Specter warned that “what the bill seeks to do is set back basic rights by some nine hundred years,” and then voted in favor of its enactment.) In my state of naive disbelief, as one senator after the next thundered about the “message we are sending” to “the terrorists,” I wrote: “The quality of the ‘debate’ on the Senate floor is so shockingly (though appropriately) low and devoid of substance that it is hard to watch.” So watching last night’s Senate debate was like watching a repeat of some hideously shallow TV show. The only new aspect was that the aging Al Qaeda villain has been rather ruthlessly replaced by the show’s producers with the younger, sleeker ISIS model. Showing no gratitude at all for the years of value it provided these senators, they ignored the veteran terror group almost completely in favor of its new replacement. And they proceeded to save a domestic surveillance program clearly unpopular among those they pretend to represent.
  • ...8 more annotations...
  • Ever since the Snowden reporting began and public opinion (in both the U.S. and globally) began radically changing, the White House’s strategy has been obvious. It’s vintage Obama: Enact something that is called “reform”—so that he can give a pretty speech telling the world that he heard and responded to their concerns—but that in actuality changes almost nothing, thus strengthening the very system he can pretend he “changed.” That’s the same tactic as Silicon Valley, which also supported this bill: Be able to point to something called “reform” so they can trick hundreds of millions of current and future users around the world into believing that their communications are now safe if they use Facebook, Google, Skype and the rest. In pretty much every interview I’ve done over the last year, I’ve been asked why there haven’t been significant changes from all the disclosures. I vehemently disagree with the premise of the question, which equates “U.S. legislative changes” with “meaningful changes.” But it has been clear from the start that U.S. legislation is not going to impose meaningful limitations on the NSA’s powers of mass surveillance, at least not fundamentally. Those limitations are going to come from—are now coming from —very different places:
  • All of that illustrates what is, to me, the most important point from all of this: the last place one should look to impose limits on the powers of the U.S. government is . . . the U.S. government. Governments don’t walk around trying to figure out how to limit their own power, and that’s particularly true of empires. The entire system in D.C. is designed at its core to prevent real reform. This Congress is not going to enact anything resembling fundamental limits on the NSA’s powers of mass surveillance. Even if it somehow did, this White House would never sign it. Even if all that miraculously happened, the fact that the U.S. intelligence community and National Security State operates with no limits and no oversight means they’d easily co-opt the entire reform process. That’s what happened after the eavesdropping scandals of the mid-1970s led to the establishment of congressional intelligence committees and a special FISA “oversight” court—the committees were instantly captured by putting in charge supreme servants of the intelligence community like Senators Dianne Feinstein and Chambliss, and Congressmen Mike Rogers and “Dutch” Ruppersberger, while the court quickly became a rubber stamp with subservient judges who operate in total secrecy.
  • There is a real question about whether the defeat of this bill is good, bad, or irrelevant. To begin with, it sought to change only one small sliver of NSA mass surveillance (domestic bulk collection of phone records under section 215 of the Patriot Act) while leaving completely unchanged the primary means of NSA mass surveillance, which takes place under section 702 of the FISA Amendments Act, based on the lovely and quintessentially American theory that all that matters are the privacy rights of Americans (and not the 95 percent of the planet called “non-Americans”). There were some mildly positive provisions in the USA Freedom Act: the placement of “public advocates” at the FISA court to contest the claims of the government; the prohibition on the NSA holding Americans’ phone records, requiring instead that they obtain FISA court approval before seeking specific records from the telecoms (which already hold those records for at least 18 months); and reducing the agency’s “contact chaining” analysis from three hops to two. One could reasonably argue (as the ACLU and EFF did) that, though woefully inadequate, the bill was a net-positive as a first step toward real reform, but one could also reasonably argue, as Marcy Wheeler has with characteristic insight, that the bill is so larded with ambiguities and fundamental inadequacies that it would forestall better options and advocates for real reform should thus root for its defeat.
  • 1) Individuals refusing to use internet services that compromise their privacy.
  • 2) Other countries taking action against U.S. hegemony over the internet.
  • 4) Greater individual demand for, and use of, encryption.
  • 3) U.S. court proceedings.
  • The “USA Freedom Act”—which its proponents were heralding as “NSA reform” despite its suffocatingly narrow scope—died in the august U.S. Senate last night when it attracted only 58 of the 60 votes needed to close debate and move on to an up-or-down vote. All Democratic and independent senators except one (Bill Nelson of Florida) voted in favor of the bill, as did three tea-party GOP Senators (Ted Cruz, Mike Lee, and Dean Heller). One GOP Senator, Rand Paul, voted against it on the ground that it did not go nearly far enough in reining in the NSA. On Monday, the White House had issued a statement “strongly supporting” the bill.
  •  
    Glenn Greenwald on why the death of the USA Freedom Act is actually a Very Good Thing. I couldn't agree more.
Paul Merrell

Is the Government's Aerial Smartphone Surveillance Program Legal? | TIME - 0 views

  • Still, is the Justice Department’s airborne dragnet program legal? The answer is “maybe.” Federal authorities have employed similar tools in the past. The Federal Bureau of Investigation is known to use a surveillance tool called a “stingray,” a portable transceiver that tricks cell phones within a certain area into relaying their locations, not unlike the equipment onboard the Marshals’ aircraft. A government vehicle with a stingray can net hundreds of nearby cell phones’ approximate locations just by driving through a typical neighborhood. The government has said it doesn’t need a probable cause warrant to use stingrays because investigators don’t collect the content of phone calls, just the locations of those phones. Government officials, meanwhile, have said they get court approval to use the devices. Much of the government’s warrantless use of stingray-style technology hinges on a 1979 Supreme Court decision titled Smith v. Maryland. Smith involved law enforcement’s use of a device called a pen register that, when attached to a suspect’s phone line, recorded the numbers of outgoing calls, but not the calls themselves. The Smith decision upheld the warrantless use of such devices because the suspect’s phone company would record the same data picked up by the pen register, and therefore the suspect had no reasonable expectation of privacy when it came to that information. Currently, the law requires a court to approve the use of a pen register, but investigators only have to show that the device’s use is “relevant to an ongoing criminal investigation,” a much weaker standard than a probable cause warrant requires.
  • However, to get back to the Smith decision, wireless carriers do store your location history for several months to several years, information they obtain by keeping a record of the cell towers to which your device connects as you move from place to place. That could mean Americans don’t have a reasonable expectation of privacy over their location data and the Smith precedent applies, making the DoJ’s aerial surveillance program legal. Still, that would be a matter for the courts to decide. “There are a lot of tricky questions whether a stingray or dirtbox operated by the government directly is a pen register, or the Fourth Amendment concerns dismissed by the Supreme Court 35 years ago in Smith v. Maryland are more applicable here,” Fakhoury said.
  • Hanni Fakhoury, an attorney at the pro-privacy Electronic Frontier Foundation, says the Department of Justice could use the Smith precedent as legal justification for the airborne dirtbox program. However, Fakhoury also highlighted a key problem with that argument: Location. Pen registers aren’t intended to pick up location data beyond an area code, whereas the airborne dirtboxes can track a person down to a single building. Many courts, he said, have expressed that location data deserves greater constitutional protection than is afforded to other kinds of information.
  • ...2 more annotations...
  • Civil rights groups are raising serious constitutional questions about the Justice Department’s use of dragnet technology onboard aircraft to collect data from suspects’ cell phones, as reported by the Wall Street Journal Thursday.
  • The Justice Department said it could not confirm or deny the existence of the program. But a department official said that all federal investigations are consistent with federal law and are subject to court approval. That official also said the Marshals Service does not maintain any databases of cell phone information — meaning the program could possibly only be used to track the whereabouts of suspects on a case-by-case basis and that it’s vastly different in nature from the kinds of sweeping government surveillance programs first revealed by Edward Snowden.
  •  
    Smith v. Maryland is a dead precedent for mass surveillance after the Supreme Court's ruling in Riley v. California. It awaits only the judicial coup de grace. 
Paul Merrell

NSA Claims Iran Learned from Western Cyberattacks - The Intercept - 0 views

  • The U.S. Government often warns of increasingly sophisticated cyberattacks from adversaries, but it may have actually contributed to those capabilities in the case of Iran. A top secret National Security Agency document from April 2013 reveals that the U.S. intelligence community is worried that the West’s campaign of aggressive and sophisticated cyberattacks enabled Iran to improve its own capabilities by studying and then replicating those tactics. The NSA is specifically concerned that Iran’s cyberweapons will become increasingly potent and sophisticated by virtue of learning from the attacks that have been launched against that country. “Iran’s destructive cyber attack against Saudi Aramco in August 2012, during which data was destroyed on tens of thousands of computers, was the first such attack NSA has observed from this adversary,” the NSA document states. “Iran, having been a victim of a similar cyber attack against its own oil industry in April 2012, has demonstrated a clear ability to learn from the capabilities and actions of others.”
  • The document was provided to The Intercept by NSA whistleblower Edward Snowden, and was prepared in connection with a planned meeting with Government Communications Headquarters, the British surveillance agency. The document references joint surveillance successes such as “support to policymakers during the multiple rounds of P5 plus 1 negotiations,” referring to the ongoing talks between the five permanent members of the U.N. Security Council, Germany and Iran to forge an agreement over Iran’s nuclear program. The document suggests that Iran has become a much more formidable cyberforce by learning from the viruses injected into its systems—attacks which have been linked back to the United States and Israel. In June 2012, The New York Times reported that from “his first months in office, President Obama secretly ordered sophisticated attacks on the computer systems that run Iran’s main nuclear enrichment facilities, significantly expanding America’s first sustained use of cyberweapons, according to participants in the program.” As part of that plan, the U.S. and Israel jointly unleashed the Stuxnet virus on Iranian nuclear facilities, but a programming error “allowed it to escape Iran’s Natanz plant and sent it around the world on the Internet.” Israel also deployed a second virus, called Flame, against Iran.
  • Obama ordered cyberattacks despite his awareness that they would likely unleash a wholly new form of warfare between states, similar to the “first use of atomic weapons in the 1940s, of intercontinental missiles in the 1950s and of drones in the past decade,” according to the Times report. Obama “repeatedly expressed concerns that any American acknowledgment that it was using cyberweapons—even under the most careful and limited circumstances—could enable other countries, terrorists or hackers to justify their own attacks.” The NSA’s concern of inadvertently aiding Iran’s cyberattack capabilities is striking given the government’s recent warning about the ability of adversaries to develop more advanced viruses. A top official at the Pentagon’s Defense Advanced Research Projects Agency’s (DARPA) appeared on 60 Minutes this Sunday and claimed that cyberattacks against the U.S. military are becoming more potent. “The sophistication of the attacks is increasing,” warned Dan Kaufman, director of DARPA’s Information Innovation Office.
  •  
    Karma is a bitch. 
Paul Merrell

Court upholds NSA snooping | TheHill - 0 views

  • A district court in California has issued a ruling in favor of the National Security Agency in a long-running case over the spy agency’s collection of Internet records.The challenge against the controversial Upstream program was tossed out because additional defense from the government would have required “impermissible disclosure of state secret information,” Judge Jeffrey White wrote in his decision.ADVERTISEMENTUnder the program — details of which were revealed through leaks from Edward Snowden and others — the NSA taps into the fiber cables that make up the backbone of the Internet and gathers information about people's online and phone communications. The agency then filters out communications of U.S. citizens, whose data is protected with legal defenses not extended to foreigners, and searches for “selectors” tied to a terrorist or other target.In 2008, the Electronic Frontier Foundation (EFF) sued the government over the program on behalf of five AT&T customers, who said that the collection violated the constitutional protections to privacy and free speech.
  • But “substantial details” about the program still remain classified, White, an appointee under former President George W. Bush, wrote in his decision. Moving forward with the merits of a trial would risk “exceptionally grave damage to national security,” he added. <A HREF="http://ws-na.amazon-adsystem.com/widgets/q?rt=tf_mfw&ServiceVersion=20070822&MarketPlace=US&ID=V20070822%2FUS%2Fthehill07-20%2F8001%2Fdffbe72d-f425-4b83-b07e-357ae9d405f6&Operation=NoScript">Amazon.com Widgets</A> The government has been “persuasive” in using its state secrets privilege, he continued, which allows it to withhold evidence from a case that could severely jeopardize national security.   In addition to saying that the program appeared constitutional, the judge also found that the AT&T customers did not even have the standing to sue the NSA over its data gathering.While they may be AT&T customers, White wrote that the evidence presented to the court was “insufficient to establish that the Upstream collection process operates in the manner” that they say it does, which makes it impossible to tell if their information was indeed collected in the NSA program.  The decision is a stinging rebuke to critics of the NSA, who have seen public interest in their cause slowly fade in the months since Snowden’s revelations.
  • The EFF on Tuesday evening said that it was considering next steps and noted that the court focused on just one program, not the totality of the NSA’s controversial operations.“It would be a travesty of justice if our clients are denied their day in court over the ‘secrecy’ of a program that has been front-page news for nearly a decade,” the group said in a statement.“We will continue to fight to end NSA mass surveillance.”The name of the case is Jewel v. NSA. 
  •  
    The article should have mentioned that the decision was on cross-motions for *partial* summary judgment. The Jewel case will proceed on other plaintiff claims. 
Paul Merrell

The Great SIM Heist: How Spies Stole the Keys to the Encryption Castle - 0 views

  • AMERICAN AND BRITISH spies hacked into the internal computer network of the largest manufacturer of SIM cards in the world, stealing encryption keys used to protect the privacy of cellphone communications across the globe, according to top-secret documents provided to The Intercept by National Security Agency whistleblower Edward Snowden. The hack was perpetrated by a joint unit consisting of operatives from the NSA and its British counterpart Government Communications Headquarters, or GCHQ. The breach, detailed in a secret 2010 GCHQ document, gave the surveillance agencies the potential to secretly monitor a large portion of the world’s cellular communications, including both voice and data. The company targeted by the intelligence agencies, Gemalto, is a multinational firm incorporated in the Netherlands that makes the chips used in mobile phones and next-generation credit cards. Among its clients are AT&T, T-Mobile, Verizon, Sprint and some 450 wireless network providers around the world. The company operates in 85 countries and has more than 40 manufacturing facilities. One of its three global headquarters is in Austin, Texas and it has a large factory in Pennsylvania. In all, Gemalto produces some 2 billion SIM cards a year. Its motto is “Security to be Free.”
  • With these stolen encryption keys, intelligence agencies can monitor mobile communications without seeking or receiving approval from telecom companies and foreign governments. Possessing the keys also sidesteps the need to get a warrant or a wiretap, while leaving no trace on the wireless provider’s network that the communications were intercepted. Bulk key theft additionally enables the intelligence agencies to unlock any previously encrypted communications they had already intercepted, but did not yet have the ability to decrypt.
  • Leading privacy advocates and security experts say that the theft of encryption keys from major wireless network providers is tantamount to a thief obtaining the master ring of a building superintendent who holds the keys to every apartment. “Once you have the keys, decrypting traffic is trivial,” says Christopher Soghoian, the principal technologist for the American Civil Liberties Union. “The news of this key theft will send a shock wave through the security community.”
  • ...2 more annotations...
  • According to one secret GCHQ slide, the British intelligence agency penetrated Gemalto’s internal networks, planting malware on several computers, giving GCHQ secret access. We “believe we have their entire network,” the slide’s author boasted about the operation against Gemalto. Additionally, the spy agency targeted unnamed cellular companies’ core networks, giving it access to “sales staff machines for customer information and network engineers machines for network maps.” GCHQ also claimed the ability to manipulate the billing servers of cell companies to “suppress” charges in an effort to conceal the spy agency’s secret actions against an individual’s phone. Most significantly, GCHQ also penetrated “authentication servers,” allowing it to decrypt data and voice communications between a targeted individual’s phone and his or her telecom provider’s network. A note accompanying the slide asserted that the spy agency was “very happy with the data so far and [was] working through the vast quantity of product.”
  • The U.S. and British intelligence agencies pulled off the encryption key heist in great stealth, giving them the ability to intercept and decrypt communications without alerting the wireless network provider, the foreign government or the individual user that they have been targeted. “Gaining access to a database of keys is pretty much game over for cellular encryption,” says Matthew Green, a cryptography specialist at the Johns Hopkins Information Security Institute. The massive key theft is “bad news for phone security. Really bad news.”
  •  
    Remember all those NSA claims that no evidence of their misbehavior has emerged? That one should never take wing again. Monitoring call content without the involvement of any court? Without a warrant? Without probable cause?  Was there even any Congressional authorization?  Wiretapping unequivocally requires a judicially-approved search warrant. It's going to be very interesting to learn the government's argument for this misconduct's legality. 
Paul Merrell

In 2008 Mumbai Attacks, Piles of Spy Data, but an Uncompleted Puzzle - NYTimes.com - 0 views

  • In the fall of 2008, a 30-year-old computer expert named Zarrar Shah roamed from outposts in the northern mountains of Pakistan to safe houses near the Arabian Sea, plotting mayhem in Mumbai, India’s commercial gem.Mr. Shah, the technology chief of Lashkar-e-Taiba, the Pakistani terror group, and fellow conspirators used Google Earth to show militants the routes to their targets in the city. He set up an Internet phone system to disguise his location by routing his calls through New Jersey. Shortly before an assault that would kill 166 people, including six Americans, Mr. Shah searched online for a Jewish hostel and two luxury hotels, all sites of the eventual carnage.
  • But he did not know that by September, the British were spying on many of his online activities, tracking his Internet searches and messages, according to former American and Indian officials and classified documents disclosed by Edward J. Snowden, the former National Security Agency contractor. They were not the only spies watching. Mr. Shah drew similar scrutiny from an Indian intelligence agency, according to a former official briefed on the operation. The United States was unaware of the two agencies’ efforts, American officials say, but had picked up signs of a plot through other electronic and human sources, and warned Indian security officials several times in the months before the attack.
Paul Merrell

Here's How You Can Find Out If The NSA Shared Your Data With British Spies - Forbes - 0 views

  • In the UK earlier this month, human rights groups Liberty and Privacy International were cheered by a tribunal decision that declared GCHQ’s access to NSA spies’ data illegal. Though it was a hollow victory, as the tribunal also declared all current activities, including all those blanket surveillance projects much derided by free speech activists, entirely legal. The practices previously broke the law because the public was unaware of what safeguards were in place for the UK’s access to data from NSA programs like Prism; as soon as Snowden blew everything wide open the snoops had to explain themselves, and that was enough for the tribunal to confirm the legality of GCHQ’s operations. But the case has had one significant effect: anyone can now figure out if their data was illegally shared by the agencies. Privacy International has set up a simple webpage that anyone in the world can sign up to. You can visit the page here.
  • Once the UK Investigatory Powers Tribunal has determined whom was affected, it has to inform them. Though participants should find out whether their data were unlawfully obtained by GCHQ from the millions of private communications hoovered up by the NSA up until December 2014, it won’t be anytime soon. Privacy International warned in its FAQs: “Count on it being many months, and likely years before this action is completed.” And somewhat ironically Privacy International has to collect participant’s information, including their name and email address, to supply the service. They may ask for more information from willing participants once the group has determined if more is required from the IPT. Anyone who wants to submit directly to the tribunal can do so here.
Paul Merrell

The CIA and Signals Intelligence - 0 views

  • The CIA and Signals Intelligence Formerly Top-Secret Multi-Volume History Details Spy Agency’s Conflicts with NSA and Military over SIGINT Role Additional Declassified Documents Describe CIA Domestic and Foreign SIGINT Activity CIA Role Often Put It in Direct Competition with NSA, but Recent Cooperation Made Possible Controversial Exploits Uncovered by Edward Snowden National Security Archive Electronic Briefing Book No. 506
Paul Merrell

Tech firms and privacy groups press for curbs on NSA surveillance powers - The Washington Post - 0 views

  • The nation’s top technology firms and a coalition of privacy groups are urging Congress to place curbs on government surveillance in the face of a fast-approaching deadline for legislative action. A set of key Patriot Act surveillance authorities expire June 1, but the effective date is May 21 — the last day before Congress breaks for a Memorial Day recess. In a letter to be sent Wednesday to the Obama administration and senior lawmakers, the coalition vowed to oppose any legislation that, among other things, does not ban the “bulk collection” of Americans’ phone records and other data.
  • We know that there are some in Congress who think that they can get away with reauthorizing the expiring provisions of the Patriot Act without any reforms at all,” said Kevin Bankston, policy director of New America Foundation’s Open Technology Institute, a privacy group that organized the effort. “This letter draws a line in the sand that makes clear that the privacy community and the Internet industry do not intend to let that happen without a fight.” At issue is the bulk collection of Americans’ data by intelligence agencies such as the National Security Agency. The NSA’s daily gathering of millions of records logging phone call times, lengths and other “metadata” stirred controversy when it was revealed in June 2013 by former NSA contractor Edward Snowden. The records are placed in a database that can, with a judge’s permission, be searched for links to foreign terrorists.They do not include the content of conversations.
  • That program, placed under federal surveillance court oversight in 2006, was authorized by the court in secret under Section 215 of the Patriot Act — one of the expiring provisions. The public outcry that ensued after the program was disclosed forced President Obama in January 2014 to call for an end to the NSA’s storage of the data. He also appealed to Congress to find a way to preserve the agency’s access to the data for counterterrorism information.
  • ...3 more annotations...
  • Despite growing opposition in some quarters to ending the NSA’s program, a “clean” authorization — one that would enable its continuation without any changes — is unlikely, lawmakers from both parties say. Sen. Ron Wyden (D-Ore.), a leading opponent of the NSA’s program in its current format, said he would be “surprised if there are 60 votes” in the Senate for that. In the House, where there is bipartisan support for reining in surveillance, it’s a longer shot still. “It’s a toxic vote back in your district to reauthorize the Patriot Act, if you don’t get some reforms” with it, said Rep. Thomas Massie (R-Ky.). The House last fall passed the USA Freedom Act, which would have ended the NSA program, but the Senate failed to advance its own version.The House and Senate judiciary committees are working to come up with new bipartisan legislation to be introduced soon.
  • The tech firms and privacy groups’ demands are a baseline, they say. Besides ending bulk collection, they want companies to have the right to be more transparent in reporting on national security requests and greater declassification of opinions by the Foreign Intelligence Surveillance Court.
  • Some legal experts have pointed to a little-noticed clause in the Patriot Act that would appear to allow bulk collection to continue even if the authority is not renewed. Administration officials have conceded privately that a legal case probably could be made for that, but politically it would be a tough sell. On Tuesday, a White House spokesman indicated the administration would not seek to exploit that clause. “If Section 215 sunsets, we will not continue the bulk telephony metadata program,” National Security Council spokesman Edward Price said in a statement first reported by Reuters. Price added that allowing Section 215 to expire would result in the loss of a “critical national security tool” used in investigations that do not involve the bulk collection of data. “That is why we have underscored the imperative of Congressional action in the coming weeks, and we welcome the opportunity to work with lawmakers on such legislation,” he said.
  •  
    I omitted some stuff about opposition to sunsetting the provisions. They  seem to forget, as does Obama, that the proponents of the FISA Court's expansive reading of section 215 have not yet come up with a single instance where 215-derived data caught a single terrorist or prevented a single act of terrorism. Which means that if that data is of some use, it ain't in fighting terrorism, the purpose of the section.  Patriot Act § 215 is codified as 50 USCS § 1861, https://www.law.cornell.edu/uscode/text/50/1861 That section authorizes the FBI to obtain an iorder from the FISA Court "requiring the production of *any tangible things* (including books, records, papers, documents, and other items)."  Specific examples (a non-exclusive list) include: the production of library circulation records, library patron lists, book sales records, book customer lists, firearms sales records, tax return records, educational records, or medical records containing information that would identify a person." The Court can order that the recipient of the order tell no one of its receipt of the order or its response to it.   In other words, this is about way more than your telephone metadata. Do you trust the NSA with your medical records? 
Paul Merrell

Bureau files ECHR case challenging UK government over surveillance of journalists' communications | The Bureau of Investigative Journalism - 0 views

  • The Bureau of Investigative Journalism is asking a European court to rule on whether UK legislation properly protects journalists’ sources and communications from government scrutiny and mass surveillance. The Bureau’s application was filed with the European Court of Human Rights on Friday. If the court rules in favour of the application it will force the UK government to review regulation around the mass collection of communications data. The action follows concerns about the implications to journalists of some of the revelations that have come out of material leaked by Edward Snowden. These have made it clear that by using mass surveillance techniques and programs such as Tempora government agencies can not only collect, store and scrutinise the content of electronic communications but also analyse masses of metadata – the details about where digital communications such as emails originate and the subject area of those communications. Gavin Millar QC, who is working on the case with the Bureau, believes UK authorities are routinely carrying out such data collection and analysis and says this enables a sophisticated picture to be developed of a journalist’s or organisation’s network of contacts, sources and lines of enquiry as well as materials, subjects and persons of interest to them.
  • The Bureau’s Christopher Hird says: “We understand why the government feels the need to have the power of interception. “But our concern is that the existing regulatory regime to control the interception of communications data – such as phone calls and emails – by organisations such as GCHQ does not provide sufficient safeguards to ensure the protection of journalists’ sources, and as a result is a restriction on the operation of a free press.” The collection of data by authorities is governed in the UK by the Regulation of Investigatory Powers Act, known as RIPA. This is primarily focused on internal communications. Many of the investigations undertaken by Bureau journalists involve foreign sources and stories, which are more vulnerable to interception as RIPA does not provide the same safeguards as it does for internal communications. The Bureau is working with lawyers from Doughty Street chambers and law firm Leigh Day, who have advised that there is little protection or rigorous scrutiny provided by current UK legislation for these “external” communications.
  •  
    Note that this case was filed with the ECHR in September 2014.  Quote from a prior decision of the ECHR involving Dutch journalists and government surveillance that will give UK government a steep hill to climb in persuading the ECHR to give GCHQ a pass:  "…where, as here, a power of the executive is exercised in secret, the risks of arbitrariness are evident. Since the implementation in practice of measures of secret surveillance is not open to scrutiny by the individuals concerned or the public at large, it would be contrary to the rule of law for the legal discretion granted to the executive to be expressed in terms of an unfettered power. Consequently, the law must indicate the scope of any such discretion conferred on the competent authorities and the manner of its exercise with sufficient clarity, having regard to the legitimate aim of the measure in question, to give the individual adequate protection against arbitrary interference."
Paul Merrell

Europe Is Spying on You - The New York Times - 0 views

  • When Edward Snowden disclosed details of America’s huge surveillance program two years ago, many in Europe thought that the response would be increased transparency and stronger oversight of security services. European countries, however, are moving in the opposite direction. Instead of more public scrutiny, we are getting more snooping. Pushed to respond to the atrocious attacks in Paris and Copenhagen and by the threats posed by the Islamic State to Europe’s internal security, several countries are amending their counterterrorism legislation to grant more intrusive powers to security services, especially in terms of mass electronic surveillance.
  • Governments now argue that to guarantee our security we have to sacrifice some rights. This is a specious argument. By shifting from targeted to mass surveillance, governments risk undermining democracy while pretending to protect it.They are also betraying a long political and judicial tradition affording broad protection to privacy in Europe, where democratic legal systems have evolved to protect individuals from arbitrary interference by the state in their private and family life. The European Court of Human Rights has long upheld the principle that surveillance interferes with the right to privacy. Although the court accepts that the use of confidential information is essential in combating terrorist threats, it has held that the collection, use and storage of such information should be authorized only under exceptional and precise conditions, and must be accompanied by adequate legal safeguards and independent supervision. The court has consistently applied this principle for decades when it was called to judge the conduct of several European countries, which were combating domestic terrorist groups.
  • More recently, as new technologies have offered more avenues to increase surveillance and data collection, the court has reiterated its position in a number of leading cases against several countries, including France, Romania, Russia and Britain, condemned for having infringed the right to private and family life that in the interpretation of the court covers also “the physical and psychological integrity of a person.”
  • ...1 more annotation...
  • Last year, the European Court of Justice set limits on telecommunication data retention. By invalidating a European Union directive for its unnecessary “wide-ranging and particularly serious interference with the fundamental right to respect for private life” and personal data, this court reaffirmed the outstanding place privacy holds in Europe. This judgment echoed a 2006 German Constitutional Court ruling that the German police had breached the individual right to self-determination and human dignity after they conducted a computerized search of suspected terrorists. Regrettably, these judgments are often ignored by key decision-makers. Many of the surveillance policies that have recently been adopted in Europe fail to abide by these legal standards. Worse, many of the new intrusive measures would be applied without any prior judicial review establishing their legality, proportionality or necessity. This gives excessive power to governments and creates a clear risk of arbitrary application and abuse.
Paul Merrell

NSA Spied on Israel and US Lawmakers over Iran Deal | News | teleSUR English - 0 views

  • Friendly relations between US and Israel could turn sour over revelations that the NSA tapped Netanyahu, revealing efforts to block the Iran nuclear deal. The U.S. National Security Agency spied on close ally Israel, exposing how Israelis lobbied U.S. authorities to undermine the Iranian nuclear deal, RT reports.   The monitoring came in spite of a U.S. pledge to tone down surveillance of friendly states, while the latest snooping even included some Congress members private conversations. Former Chairman of the House Intelligence Committee Pete Hoekstra called the interceptions an “abuse of power” and called for an investigation into the allegations. “WSJ (Wall Street Journal) report that NSA spied on Congress and Israel communications very disturbing. Actually outrageous. Maybe unprecedented abuse of power,” Hoekstra wrote on his official Twitter account. “NSA and Obama officials need to be investigated and prosecuted if any truth to WSJ reports. NSA loses all credibility. Scary,” he added.
  • Friendly relations between US and Israel could turn sour over revelations that the NSA tapped Netanyahu, revealing efforts to block the Iran nuclear deal. The U.S. National Security Agency spied on close ally Israel, exposing how Israelis lobbied U.S. authorities to undermine the Iranian nuclear deal, RT reports.   The monitoring came in spite of a U.S. pledge to tone down surveillance of friendly states, while the latest snooping even included some Congress members private conversations. Former Chairman of the House Intelligence Committee Pete Hoekstra called the interceptions an “abuse of power” and called for an investigation into the allegations. “WSJ (Wall Street Journal) report that NSA spied on Congress and Israel communications very disturbing. Actually outrageous. Maybe unprecedented abuse of power,” Hoekstra wrote on his official Twitter account. “NSA and Obama officials need to be investigated and prosecuted if any truth to WSJ reports. NSA loses all credibility. Scary,” he added.
  • Massive surveillance has continued under President Barack Obama’s two terms, and the revelations of Edward Snowden in 2013 over the extent of the data harvested from civilians did little to dent the spy agency’s activities, according to the Wall Street Journal. A “protected list” rapidly pulled together by the Obama administration in the wake of the scandal to safeguard its closest allies from monitoring included countries including Germany and France. Israel, however, was not on this list, and was instead placed as NSA’s top monitoring priority, as was Turkey. A senior US official said told the Wall Street Journal, “Going dark on Bibi? Of course we wouldn’t do that,” using Israeli Prime Minister Benjamin Netanyahu’s nickname.
  • ...4 more annotations...
  • As Obama’s administration painstakingly worked toward reaching a nuclear deal with Iran, the NSA tapped communications between Israeli and U.S. lawmakers, revealing the lengths Netanyahu’s government was going to prevent the negotiations from concluding successfully.
  • Yet the White House was unable to use much of the information gleaned from surveillance as it would have been “politically risky:” exposing a “paper trail stemming out from a request.” But, the Wall Street Journal reports that when the NSA was tasked with deciding which information could be shared and which withheld, the agency recognized the conversations they had swept up included U.S. lawmakers, creating an “Oh-s— moment,” an official said, that the NSA was also spying on its own Congress members. The NSA dealt with the sticking point by removing the lawmakers’ names from intelligence reports and any trace of personal information.
  • Republican presidential candidate Ted Cruz said the revelation is “indicative of the Obama Clinton foreign policy and their inability to distinguish their friends from their enemies” and attacked Obama’s stance on Israel.
  • “The Obama administration has been the most hostile and antagonistic to the nation of Israel in our country’s history … it’s not surprising at all that the focus of the Obama administration would be on trying to intercept the communications of our very close friend and ally, Prime Minister Netanyahu,” CBS journalist Alan He reported Cruz as saying on Wednesday. But U.S. commentators have pointed out the irony of NSA “defenders” being scandalized by spying, when they happen to be the subject. “As usual, NSA defenders in Congress only get outraged about spying on Americans when the Americans happen to be them,” said U.S. journalist Trevor Timm.
Paul Merrell

File Says N.S.A. Found Way to Replace Email Program - The New York Times - 0 views

  • When the National Security Agency’s bulk collection of records about Americans’ emails came to light in 2013, the government conceded the program’s existence but said it had shut down the effort in December 2011 for “operational and resource reasons.” While that particular secret program stopped, newly disclosed documents show that the N.S.A. had found a way to create a functional equivalent. The shift has permitted the agency to continue analyzing social links revealed by Americans’ email patterns, but without collecting the data in bulk from American telecommunications companies — and with less oversight by the Foreign Intelligence Surveillance Court.
  • The disclosure comes as a sister program that collects Americans’ phone records in bulk is set to end this month. Under a law enacted in June, known as the U.S.A. Freedom Act, the program will be replaced with a system in which the N.S.A. can still gain access to the data to hunt for associates of terrorism suspects, but the bulk logs will stay in the hands of phone companies.The newly disclosed information about the email records program is contained in a report by the N.S.A.’s inspector general that was obtained by The New York Times through a lawsuit under the Freedom of Information Act. One passage lists four reasons that the N.S.A. decided to end the email program and purge previously collected data. Three were redacted, but the fourth was uncensored. It said that “other authorities can satisfy certain foreign intelligence requirements” that the bulk email records program “had been designed to meet.”The report explained that there were two other legal ways to get such data. One was the collection of bulk data that had been gathered in other countries, where the N.S.A.’s activities are largely not subject to regulation by the Foreign Intelligence Surveillance Act and oversight by the intelligence court. Because of the way the Internet operates, domestic data is often found on fiber optic cables abroad.
  • The N.S.A. had long barred analysts from using Americans’ data that had been swept up abroad, but in November 2010 it changed that rule, documents leaked by Edward J. Snowden have shown. The inspector general report cited that change to the N.S.A.’s internal procedures.The other replacement source for the data was collection under the FISA Amendments Act of 2008, which permits warrantless surveillance on domestic soil that targets specific noncitizens abroad, including their new or stored emails to or from Americans.“Thus,” the report said, these two sources “assist in the identification of terrorists communicating with individuals in the United States, which addresses one of the original reasons for establishing” the bulk email records program.
  • ...2 more annotations...
  • Timothy Edgar, a privacy official in the Office of the Director of National Intelligence in both the George W. Bush and Obama administrations who now teaches at Brown University, said the explanation filled an important gap in the still-emerging history of post-Sept. 11, 2001, surveillance. Advertisement Continue reading the main story Advertisement Continue reading the main story “The document makes it clear that N.S.A. is able to get all the Internet metadata it needs through foreign collection,” he said. “The change it made to its procedures in 2010 allowed it to exploit metadata involving Americans. Once that change was made, it was no longer worth the effort to collect Internet metadata inside the United States, in part because doing so requires N.S.A. to deal with” restrictions by the intelligence court.Observers have previously suggested that the N.S.A.’s November 2010 rules change on the use of Americans’ data gathered abroad might be connected to the December 2011 end of the bulk email records program. Marcy Wheeler of the national security blog Emptywheel, for example, has argued that this was probably what happened.
  • And officials, who spoke on the condition of anonymity to discuss sensitive collection programs, have said the rules change and the FISA Amendments Act helped make the email records program less valuable relative to its expense and trouble. The newly disclosed documents amount to official confirmation.
Paul Merrell

Venezuela Could Sue US Over NSA Industrial Spying - nsnbc international | nsnbc international - 0 views

  • Venezuelan Oil Minister Eulogio del Pino indicated Saturday that the country’s state oil company PDVSA could open a lawsuit in US courts over new revelations of National Security Agency (NSA) spying on top company executives and internal communications.
  • The announcement comes after leaked documents released to TeleSUR last Wednesday by ex-NSA analyst Edward Snowden exposed that US intelligence officials posing as diplomats had hacked PDVSA’s internal network, monitoring the communications of at least 900 employees since 2010, including former company president Rafael Ramirez. “This is unacceptable and we are going to file a claim and seek redress for damages under US law,” stated Del Pino, who is also the current president of PDVSA. “We are evaluating legal actions, not moral ones. Delving into the personal information of our workers, our strategies, our plans, [and] our operations is a violation, that is unacceptable,” the oil minister added, speaking from the Third Summit of Gas-Exporting Nations in Tehran.
  • The comments follow an announcement by President Maduro last week calling for a meeting with the US charge d’affaires in Caracas to review bilateral ties in the wake of the scandal. Speaking on Thursday, US State Department spokesperson John Kirby did not deny the evidence contained in the leaked documents, though he did reject claims that US spy agencies engage in industrial espionage on behalf of US corporations.
Paul Merrell

UK Politicians To Hold 'Emergency Debate' After Spy Tribunal Says GCHQ Is Permitted To Put Them Under Surveillance | Techdirt - 0 views

  • Now we can see what moves legislators to take swift action against domestic surveillance. It all depends on who's being targeted. A long-held "gentleman's agreement" that GCHQ would not spy on members of Parliament (with an exigent circumstances exception, naturally) was found to be not legally-binding by the UK's surveillance oversight tribunal. Today, a panel, headed by Mr Justice Burton, made declarations that the Wilson Doctrine applies only to targeted, and not incidental, interception of Parliamentary communications, but that it has no legal effect, save that in practice the Security and Intelligence Agencies must comply with their own guidance. The Wilson doctrine, implemented by prime minister Harold Wilson in November 1966, lay down the policy of no tapping of the phones of MPs or members of the House of Lords, unless there is a major national emergency, and that any changes to the policy will be reported by the prime minister to Parliament.
  • Once the Parliament members discovered they too could be subjected to GCHQ's "blanket surveillance," they moved quickly. MPs are to hold an emergency debate on the Wilson doctrine, amid fears the convention designed to prevent politicians' communications being spied upon is "dead". [...] Shadow Commons leader Chris Bryant led a successful application in the Commons for an emergency debate in response to Wednesday's judgment. The debate has been allocated up to three hours on Monday, October 19. When it's just the general public and foreign citizens of dozens of nations, politicians generally agree there's a "debate" to be had over dragnet surveillance. The debate then takes place with minimal input from those affected and tends to include large amounts of terrorist fear-mongering and quibbling over how much exactly national security agencies should be allowed to get away with. (As much as possible, usually. Especially when the fear-mongering side has the floor.)
  • When it's those up top discovering they, too, might be subject to the same surveillance they've inflicted on the rest of the nation (and foreigners who have been granted no rights whatsoever), they step all over themselves in their haste to "debate" the side of the issue that states they should continue to be excepted from the laws that apply to everyone else.
Paul Merrell

Daesh, Creature of the West - 0 views

  • James Shea, Deputy Assistant Secretary of Emerging Threats at NATO – now that’s a lovely title – recently gave a talk at a private club in London on the Islamic State/Daesh. Shea, as many will remember, made his name as NATO’s spokesman during the NATO war on Yugoslavia in 1999.After his talk Shea engaged in a debate with a source I very much treasure. The source later gave me the lowdown.  According to Saudi intelligence, Daesh was invented by the US government – in Camp Bacca, near the Kuwait border, as many will remember — to essentially finish off the Shiite-majority Nouri al-Maliki government in Baghdad.
  • It didn’t happen this way, of course. Then, years later, in the summer of 2014, Daesh routed the Iraqi Army on its way to conquer Mosul. The Iraqi Army fled. Daesh operatives then annexed ultra-modern weapons that took US instructors from six to twelve months to train the Iraqis in and…surprise! Daesh incorporated the weapons in their arsenals in 24 hours. In the end, Shea frankly admitted to the source that Gen David Petraeus, conductor of the much-lauded 2007 surge, had trained these Sunnis now part of Daesh in Anbar province in Iraq. Saudi intelligence still maintains that these Iraqi Sunnis were not US-trained – as Shea confirmed – because the Shiites in power in Baghdad didn’t allow it. Not true. The fact is the Daesh core – most of them former commanders and soldiers in Saddam Hussein’s army — is indeed a US-trained militia. True to form, at the end of the debate, Shea went on to blame Russia for absolutely everything that’s happening today – including Daesh terror. 
Paul Merrell

The Still-Missing Evidence of Russia-gate - Consortiumnews - 0 views

  • A changing-places moment brought about by Russia-gate is that liberals who are usually more skeptical of U.S. intelligence agencies, especially their evidence-free claims, now question the patriotism of Americans who insist that the intelligence community supply proof to support the dangerous claims about Russian ‘hacking” of Democratic emails especially when some  veteran U.S. government experts say the data would be easily available if the Russians indeed were guilty. One of those experts is William Binney, a former high-level National Security Agency intelligence official who, after his 2001 retirement, blew the whistle on the extraordinary breadth of NSA surveillance programs. His outspoken criticism of the NSA during the George W. Bush administration made him the subject of FBI investigations that included a raid on his home in 2007. Even before Edward Snowden’s NSA whistleblowing, Binney publicly revealed that NSA had access to telecommunications companies’ domestic and international billing records, and that since 9/11 the agency has intercepted some 15 trillion to 20 trillion communications. Snowden has said: “I have tremendous respect for Binney, who did everything he could according to the rules.”
  • I spoke to Binney on Dec. 28 about Russia-gate and a host of topics having to do with spying and America’s expanding national security state.
  • Bernstein: Your expertise was in the Soviet Union and so you must know a lot about bugging.  Do you believe that Russia hacked and undermined our last election?  Can Trump thank Russia for the result? Binney:  We at Veteran Intelligence Professionals for Sanity (VIPS) published an article on this in July.  First of all, if any of the data went anywhere across the fiber optic world, the NSA would know.  Just inside the United States, the NSA has over a hundred tap points on the fiber lines, taking in everything.    Mark Klein exposed some of this at the AT&T facility in San Francisco. This is not for foreigners, by the way, this is for targeting US citizens.  If they wanted only foreigners, all they would have to do was look at the transatlantic cables where they surface on the coast of the United States.  But they are not there, they are distributed among the US population. Bernstein: So if, in fact, the Russians were tapping into DNC headquarters, the NSA would absolutely know about it. Binney: Yes, and they would also have trace routes on where they went specifically, in Russia or anywhere else.  If you remember, about three or four years ago, the Chinese hacked into somewhere in the United States and our government came out and confirmed that it was the Chinese who did it, and it came from a specific military facility in Shanghai.  The NSA had these trace route programs embedded by the hundreds across the US and all around the world.
  • ...3 more annotations...
  • The other data that came out from Guccifer 2.0, a download from the DNC, has been a charade.  It was a download and not a transfer across the Web.  The Web won’t manage such a high speed.  It could not have gotten across the Atlantic at that high speed.  You would have to have high capacity lines dedicated to that in order to do it. They have been playing games with us.  There is no factual evidence to back up any charge of hacking here. Bernstein: So was this a leak by somebody at Democratic headquarters? Binney: We don’t know that for sure, either.  All we know was that it was a local download.  We can likely attribute it to a USB device that was physically passed along.
  • Right now, our government is violating the first, fourth and fifth amendments in various ways.  Mueller did it, Comey did it, they were all involved in violating the Constitution.
  • Bernstein:  There seems to be a new McCarthyite operation around the Russia-gate investigation.  It appears that it is an attempt to justify the idea that Clinton lost because the Russians undermined the election. Binney: I have seen no evidence at all from anybody, including the intelligence community.  If you look at the Intelligence Community Assessment (ICA) report, they state on the first page that “We have high confidence that the Russians did this.”  But when you get toward the end of the report, they basically confess that “our judgment does not imply that we have evidence to back it up.” Bernstein:  It was initially put out that seventeen intelligence agencies found compelling evidence that the Russians hacked into our election.  You’re saying it was actually selected individuals from just three agencies.  Is there anything to the revelations that FBI agents talked about taking action to prevent Trump from becoming president? Binney: It certainly does seem that it is leaning that way, that is was all a frame-up.  It is a sad time in our history, to see the government working against itself internally. Bernstein:  I take it you are not a big supporter of Trump. Binney:  Well, I voted for him.  I couldn’t vote for a warmonger like Clinton.  She wanted to see our planes shooting down Russian planes in Syria.  She advocated for destabilizing Libya, for getting rid of Assad in Syria, she was a strong backer of the war in Iraq.
« First ‹ Previous 541 - 560 of 560
Showing 20 items per page