Skip to main content

Home/ Socialism and the End of the American Dream/ Group items matching "publishers" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Paul Merrell

Senator Who Put Pentagon Papers Into Public Record Urges Udall To Do Same With Torture Report - The Intercept - 0 views

  • Article 1, Section 6 of the Constitution establishes an absolute free-speech right for members of Congress on the floor or in committee, even if they are disclosing classified material. It states that “for any Speech or Debate in either House, they shall not be questioned in any other Place.” Within hours of Colorado Senator Mark Udall losing his reelection bid last week, transparency activists were talking about how he should go out with a bang and put the Senate intelligence committee’s torture report into the congressional record.  The report is said to detail shockingly brutal abuse of detainees by the CIA during the George W. Bush administration, as well as rampant deception about the program by top officials. But the Obama White House is refusing to declassify even a summary of the report without major redactions. And Republicans take over the Senate in January.
  • Udall is one of two senators — along with fellow Intelligence Committee member Ron Wyden — who have consistently demanded greater transparency from the intelligence community. If he made the report public on the Senate floor or during a hearing, he couldn’t be prosecuted. The last time any senator did anything nearly so grand was in 1971, when Mike Gravel, two years into his 12 years representing the state of Alaska, entered 4,000 pages of the Pentagon Papers into the congressional record just before the U.S. Supreme Court lifted an injunction on publishing them in the press.
  • Now, Gravel is urging Udall to join the club. “If Udall wants to call me, I can explain this to him,” Gravel, pictured above, said in a phone interview from his home in Burlingame, Calif. Gravel’s recommendation: “What he’d have to do is call a subcommittee meeting like I did, late at night.”
  • ...1 more annotation...
  • Back in 1971, Gravel first tried to read the Papers from the Senate floor. He even got himself rigged up with a colostomy bag so he wouldn’t need to take breaks. But he was stymied by an unexpected procedural move. So he moved to Plan B: He called a late-night subcommittee meeting with almost no notice to the other members. Gravel read some of the Pentagon Papers out loud, but challenged by dyslexia and overcome with emotion, he finally opted for another way: “I asked for unanimous consent to put it in the record of the subcommittee. And there was no one there to object.” Here is amazing unedited footage of that night:
Paul Merrell

California Tells Court It Can't Release Inmates Early Because It Would Lose Cheap Prison Labor | ThinkProgress - 0 views

  • Out of California’s years-long litigation over reducing the population of prisons deemed unconstitutionally overcrowded by the U.S. Supreme Court in 2010, another obstacle to addressing the U.S. epidemic of mass incarceration has emerged: The utility of cheap prison labor. In recent filings, lawyers for the state have resisted court orders that they expand parole programs, reasoning not that releasing inmates early is logistically impossible or would threaten public safety, but instead that prisons won’t have enough minimum security inmates left to perform inmate jobs. The dispute culminated Friday, when a three-judge federal panel ordered California to expand an early parole program. California now has no choice but to broaden a program known as 2-for-1 credits that gives inmates who meet certain milestones the opportunity to have their sentences reduced. But California’s objections raise troubling questions about whether prison labor creates perverse incentives to keep inmates in prison even when they don’t need to be there.
  • The debate centers around an expansive state program to have inmates fight wildfires. California is one of several states that employs prison labor to fight wildfires. And it has the largest such program, as the state’s wildfire problem rapidly expands arguably because of climate change. By employing prison inmates who are paid less than $2 per day, the state saves some $1 billion, according to a recent BuzzFeed feature of the practice. California relies upon that labor source, and only certain classes of nonviolent inmates charged with lower level offenses are eligible for the selective program. They must then meet physical and other criteria. In exchange, they get the opportunity for early release, by earning twice as many credits toward early release as inmates in other programs would otherwise earn, known as 2-for-1 credits. In February, the federal court overseeing California’s prison litigation ordered the state to expand this 2-for-1 program to some other rehabilitation programs so that other inmates who exhibit good behavior and perform certain work successfully would also be eligible for even earlier release.
  • As has been California’s practice in this litigation, California didn’t initially take the order that seriously. It continued to work toward reducing its prison population. In fact, the ballot initiative passed by voters in November to reclassify several nonviolent felonies as misdemeanors will go a long way toward achieving that goal. But it insisted that it didn’t have to do it the way the court wanted it to, because doing so could deplete the state’s source of inmate firefighters. The incentives of this wildfire and other labor programs are seemingly in conflict with the goal of reducing U.S. reliance on mass incarceration. But the federal judges overseeing this litigation were nonetheless sensitive to the state’s need for inmate firefighters. That’s why they ordered the state to offer 2-for-1 credits only to those many inmates who weren’t eligible for the wildfire program. This way, inmates who were eligible would still be incentivized to choose fighting wildfires, while those that weren’t could choose other rehabilitative work programs to reduce their sentence.
  • ...2 more annotations...
  • The Department of Corrections didn’t like this idea, either. It argued that offering 2-for-1 credits to any inmates who perform other prison labor would mean more minimum security inmates would be released earlier, and they wouldn’t have as large of a labor pool. They would still need to fill those jobs by drawing candidates who could otherwise work fighting wildfires, and would be “forced to draw down its fire camp population to fill these vital MSF [Minimum Support Facility] positions.” In other words, they didn’t want to have to hire full-time employees to perform any of the work that inmates are now performing. The plaintiffs had this to say in response: “Defendants baldly assert that if the labor pool for their garage, garbage, and city park crews is reduced, then ‘CDCR would be forced to draw-down its fire camp population to fill these vital MSF positions.’ That is a red herring; Defendants would not be ‘forced’ to do anything. They could hire public employees to perform tasks like garbage collection, garage work and recycling … ”
  • California Attorney General Kamala Harris told BuzzFeed News she was “shocked” to learn that the lawyers in her department had argued against parole credits because they wanted to retain their labor force. “I will be very candid with you, because I saw that article this morning, and I was shocked, and I’m looking into it to see if the way it was characterized in the paper is actually how it occurred in court,” Harris said in an interview with BuzzFeed published late Tuesday. “I was very troubled by what I read. I just need to find out what did we actually say in court.” Harris was referring to the Los Angeles Times’ report on the three-judge panel’s ruling, which included a line referencing that argument. While ThinkProgress does not know what lawyers for the state said in court, the written motions submitted in the litigation make very clear that the state did indeed argue against expanding the early release program on the basis that it would deplete the labor force.
  •  
    In the land of the free and the home of the brave ...j California has been in deep judicial doo-doo because of massive prison overcrowding and years of ignoring federal court orders to drastically reduce its prison population, leading to a Supreme Court decision that basically said, "no more stalling." 
Paul Merrell

Middle East updates / UN nuclear agency needs millions more for Iran monitoring - Middle East Updates Israel News | Haaretz - 0 views

  • 2:53 P.M. Assad: U.S.-led airstrikes not serious or efficient Syrian President Bashar Assad said in remarks published Wednesday that U.S.-led airstrikes targeting Islamic State group militants in his country are neither serious nor efficient, claiming they have failed to produce any tangible results.
  • Assad spoke in a rare interview conducted Nov. 28 in Damascus with Paris Match magazine, his first in months. His comments critical of the U.S. airstrikes appear intended to give the impression that his forces are the most effective in fighting Islamic extremists. "You can't end terrorism with aerial strikes. Troops on the ground that know the land and can react are essential," the magazine quoted Assad as saying. "That is why there haven't been any tangible results in the two months of strikes led by the coalition."
  • 12:47 P.M. Iran has never conducted air strikes against Islamic State in Iraq, official says Iran has not launched any air strikes against Islamic State targets in neighboring Iraq, a senior Iranian official told Reuters on Wednesday. "Iran has never been involved in any air strikes against the Daesh (Islamic State) targets in Iraq. Any cooperation in such strikes with America is also out of question for Iran," the senior official said on condition of anonymity. (Reuters) 6:30 A.M. Iran has conducted airstrikes against ISIS forces in Iraq, a U.S. official confirmed Tuesday.
  • ...3 more annotations...
  • 12:52 P.M. Kerry: U.S.-led efforts against ISIS having a 'significant impact' The U.S.-led coalition has inflicted serious damage on ISIS, carrying out around 1,000 air strikes so far in Iraq and Syria, but the fight against the militants could last years, U.S. Secretary of State John Kerry said on Wednesday. (Reuters) Read the full story
  • Pentagon spokesman Rear Admiral John Kirby was asked by reporters if the U.S. was aware of Iran's involvement over Iraq, following recent media reports of possible strikes by Iranian jets. "We have the indications they have flown these missions in recent days in eastern Iraq," Kirby said in broadcast remarks. The strikes were not coordinated with the U.S., and may be the first time Tehran has launched manned aircraft from inside Iran to strike Islamic State targets in Iraq, Kirby was quoted as saying by the Navy Times. He said the U.S. would not take a position on the flights, saying it was Iraq's airspace and up to Iraq to decide who could fly over it.
  • "We ask that they do those things in keeping with the idea that we don't further inflame sectarian tensions inside Iraq," Kirby said. He said the U.S. was aware that Baghdad has "communications" with Tehran about military activities. Iran has offered help to the coalition against Islamic State but its request was refused by the U.S., which has vowed it would not coordinate with Iran on military actions inside Iraq. Washington is concerned that Iran, which backs the majority Shiite government, will provoke further resentment among Iraq's Sunni minority.
  •  
    Who to believe about what?
Paul Merrell

The Feds & Media: How the FBI Destroyed Journalism | nsnbc international - 0 views

  • James Comey, director of the Federal Bureau of Investigations (FBI) defended the use of an FBI agent posing as an Associated Press journalist in order to install spyware into the computer of a teenager from Lacy, Washington State.
  • Comey said in an open letter published in mainstream media that the FBI did not “overstep its bounds” while using deceptive tactics during their investigation into the teen who was in communication “online with the” FBI agent.” According to Comey: “An F.B.I. agent communicated online with the anonymous suspect. Relying on an agency behavioral assessment that the anonymous suspect was a narcissist, the online undercover officer portrayed himself as an employee of The Associated Press, and asked if the suspect would be willing to review a draft article about the threats and attacks, to be sure that the anonymous suspect was portrayed fairly.” To entrap the student, the FBI produced a fake news report provided by the FBI agent to the Associated Press regarding a “technology savvy student holds Timberline High School hostage.”
  • The Reporters Committee for Freedom of the Press (RCFP) wrote a letter to Holder and Comey explaining : “The warrant for such action apparently did not mention that the tracker was delivered as an AP article, with an AP byline “and therefore impersonated a news media organization.” Concerned that the FBI not only failed to follow its own guidelines for such activity, but also did not make clear to the judge who signed the warrant or FBI counsel that the software ‘impersonated a media organization or that there were First Amendment concerns at stake’.”
  • ...2 more annotations...
  • The FBI agent made sure the teen saw the article which facilitated the downloading of spyware into the boy’s computer in order to track the child’s online whereabouts. Kathy Best, executive editor of the Seattle Times commented : “The FBI, in placing the name of The Associated Press on a phony story sent to a criminal suspect, crossed a line and undermined the credibility of journalists everywhere – including at The Times.” The FBI maintains that “the operation was aimed at preventing tragedy. We were fortunate that information provided by the public gave us the opportunity to step into a potentially dangerous situation before it was too late.” Kathleen Carroll, executive editor of AP said : “This latest revelation of how the FBI misappropriated the trusted name of the Associated Press doubles our concern and outrage, expressed earlier to Attorney General Eric Holder, about how the agency’s unacceptable tactics undermine AP and the vital distinction between the government and the press.”
  • The RCFP continued in their letter: “The utilization of news media as a cover for delivery of electronic surveillance software is unacceptable. This practice endangers the media’s credibility and creates the appearance that it is not independent of the government. It undermines media organizations’ ability to independently report on law enforcement.” Ironically, the FBI have a program targeting teenagers called, “The FBI Teen Reporter’s Workshop” where “selected” high school students in New York are brought to the FBI field office to “learn about how the FBI interacts with the media. In addition to hearing about the overall mission of the FBI and the mission of the Office of Public Affairs, the teens have the opportunity to meet members of the media and to take photos with FBI equipment.”
Paul Merrell

U.S. AWOL soldier André Shepherd: European Court of Justice Advocate General Reinforces Rights of Refusers - 0 views

  • In the legal case of U.S. AWOL soldier André Shepherd (37) the European Court of Justice Advocate General, Eleanor Sharpton, today published her final opinion. This official statement contains guiding deliberations for the interpretation of the so-called Qualification Directive of the European Union. Amongst other considerations, these rules state that those endangered by prosecution or punishment for refusal to perform military service involving an illegal war or commital of war crimes, should be protected by the European Union. André Shepherd, former U.S. Army helicopter mechanic in the Iraq War, during leave in Germany, left his unit and in 2008, requested asylum in that country. 2011, the German Federal Office for Migration and Refugees refused Shepherd's application. Shepherd's resulting court action challenge resulted in the Munich Administrative Court's asking for the opinion of the European Court in Luxemburg on significant questions concerning the interpretation of the Qualification Directive. The Justice Advocate General came to the following conclusions:
  • - The protection guaranteed by the Qualification Directive is also applicable to soldiers not directly involved in combat, when their duties could support war crimes. The German Federal Office for Migration and Refugees has as yet failed to respect this definition. - Within the asylum application process, a deserter is not obliged to prove that he was or could be involved in war crimes, as the German Federal Office for Migration and Refugees required. Necessary is only the evidence of war crime probability, based on past occurrences. - Even a U.N. mandate for a war, in which the deserter was, or could have been involved, cannot serve as grounds for rejection of his rights as a refugee. - The deserter must prove that he either had already been involved in a military service refusal case, or that for concrete reasons, he could not take advantage of this right. - In deciding the question, whether the military service objector is a member of a social or ethnic group as defined within the framework of E.U. Refugee Rights, the national authority should not only consider the degree and importance of his convictions, but also the degree of discrimination experienced in his own country.
  • - The national authorities must investigate whether the asylum applicant's membership in a social or ethnic group could in probability lead to discriminative treatment as the result of a military court action or even dishonorable discharge.
  •  
    Big one from the Advocate Genereral of the European Court of Justice. The Court nearly always follows the opinion of the Advocate General. So members of the U.S. military may soon be able to desert the U.S. armed forces and find refuge in the E.U., free from fear of extradition by the U.S.   The Court's press release is here. http://goo.gl/nvKpfN (.) That page includes a link to the court's docket where the Advocate General's opinion is found and where the Court's judgment will appear when delivered.
Paul Merrell

Controversies - Insurance Industry Adjusts to Earthquake Risk Caused by Fracking - AllGov - News - 0 views

  • In another sign that fracking is increasingly being acknowledged as a cause of earthquakes, the insurance industry has announced that it is now linking the controversial drilling procedure with seismic activity in establishing its rates. Before insurance companies set their rates for an upcoming year, they turn to the U.S. Geological Survey (USGS) for information on quake activity. Specifically, insurers look at the USGS’s National Seismic Hazard Map, which “predicts where future earthquakes will occur, how often they will occur and how strongly they will shake the ground,” according to the Dallas Morning News. But this map will now take into account earthquakes that occur within the vicinity of fracking wells, the USGS has decided. That means insurance rates may go up in some areas considered more at risk of seismic events because of fracking operations. Between the years 2010 and 2013, central and eastern United States had an average of five times as many quakes per year as between 1970 and 2000. Human activity, including fracking, has been cited by scientists as the cause, according to Dallas Morning News.
  • Last year, USGS connected a 5.7-magnitude quake in Oklahoma to that state’s robust fracking industry. “The observation that a human-induced earthquake can trigger a cascade of earthquakes, including a larger one, has important implications for reducing the seismic risk from wastewater injection,” USGS seismologist and coauthor of the study Elizabeth Cochran said at the time. More than 120 quakes have hit the Dallas area in the past six years, and scientists have cited the work performed at nearby fracking sites as the reason, according to Homeland Security News Wire. Even the Texas Oil & Gas Association agreed that some research into the nexus of fracking and quakes is called for. “The oil and natural gas industry agrees that recent seismic activity warrants robust investigation to determine the precise location, impact and cause or causes of seismic events,” Todd Staples, the association’s president, said in a statement. A study published in the Bulletin of the Seismological Society of America says fracking near Ohio’s Poland Township triggered a previously undiscovered fault. The result was more than 70 earthquakes ranging in magnitude of 2.1 to 3.0, the latter of which was described as “rare” by the experts.
  •  
    Yet another factor to contribute to the piercing of the shale oil bubble in the U.S. economy.The shale oil and gas industry in the U.S. is collapsing because its production costs can not result in profits when the price of oil is so low. Banksters have ended the flow of new well development funding. Shale oil development companies are going bankrupt by the dozens  and tens of thousands of shale oil workers have been laid off.  
Paul Merrell

Tell Congress: My Phone Calls are My Business. Reform the NSA. | EFF Action Center - 0 views

  • The USA PATRIOT Act granted the government powerful new spying capabilities that have grown out of control—but the provision that the FBI and NSA have been using to collect the phone records of millions of innocent people expires on June 1. Tell Congress: it’s time to rethink out-of-control spying. A vote to reauthorize Section 215 is a vote against the Constitution.
  • On June 5, 2013, the Guardian published a secret court order showing that the NSA has interpreted Section 215 to mean that, with the help of the FBI, it can collect the private calling records of millions of innocent people. The government could even try to use Section 215 for bulk collection of financial records. The NSA’s defenders argue that invading our privacy is the only way to keep us safe. But the White House itself, along with the President’s Review Board has said that the government can accomplish its goals without bulk telephone records collection. And the Privacy and Civil Liberties Oversight Board said, “We have not identified a single instance involving a threat to the United States in which [bulk collection under Section 215 of the PATRIOT Act] made a concrete difference in the outcome of a counterterrorism investigation.” Since June of 2013, we’ve continued to learn more about how out of control the NSA is. But what has not happened since June is legislative reform of the NSA. There have been myriad bipartisan proposals in Congress—some authentic and some not—but lawmakers didn’t pass anything. We need comprehensive reform that addresses all the ways the NSA has overstepped its authority and provides the NSA with appropriate and constitutional tools to keep America safe. In the meantime, tell Congress to take a stand. A vote against reauthorization of Section 215 is a vote for the Constitution.
  •  
    EFF has launched an email campagin to press members of Congress not to renew sectiion 215 of the Patriot Act when it expires on June 1, 2015.   Sectjon 215 authorizes FBI officials to "make an application for an order requiring the production of *any tangible things* (including books, records, papers, documents, and other items) for an investigation to obtain foreign intelligence information not concerning a United States person or to protect against international terrorism or clandestine intelligence activities, provided that such investigation of a United States person is not conducted solely upon the basis of activities protected by the first amendment to the Constitution." http://www.law.cornell.edu/uscode/text/50/1861 The section has been abused to obtain bulk collecdtion of all telephone records for the NSA's storage and processing.But the section goes farther and lists as specific examples of records that can be obtained under section 215's authority, "library circulation records, library patron lists, book sales records, book customer lists, firearms sales records, tax return records, educational records, or medical records."  Think of the NSA's voracious appetite for new "haystacks" it can store  and search in its gigantic new data center in Utah. Then ask yourself, "do I want the NSA to obtain all of my personal data, store it, and search it at will?" If your anser is "no," you might consider visiting this page to send your Congress critters an email urging them to vote against renewal of section 215 and to vote for other NSA reforms listed in the EFF sample email text. Please do not procrastinate. Do it now, before you forget. Every voice counts. 
Paul Merrell

Western Spy Agencies Secretly Rely on Hackers for Intel and Expertise - The Intercept - 0 views

  • The U.S., U.K. and Canadian governments characterize hackers as a criminal menace, warn of the threats they allegedly pose to critical infrastructure, and aggressively prosecute them, but they are also secretly exploiting their information and expertise, according to top secret documents. In some cases, the surveillance agencies are obtaining the content of emails by monitoring hackers as they breach email accounts, often without notifying the hacking victims of these breaches. “Hackers are stealing the emails of some of our targets… by collecting the hackers’ ‘take,’ we . . .  get access to the emails themselves,” reads one top secret 2010 National Security Agency document. These and other revelations about the intelligence agencies’ reliance on hackers are contained in documents provided by whistleblower Edward Snowden. The documents—which come from the U.K. Government Communications Headquarters agency and NSA—shed new light on the various means used by intelligence agencies to exploit hackers’ successes and learn from their skills, while also raising questions about whether governments have overstated the threat posed by some hackers.
  • By looking out for hacking conducted “both by state-sponsored and freelance hackers” and riding on the coattails of hackers, Western intelligence agencies have gathered what they regard as valuable content: Recently, Communications Security Establishment Canada (CSEC) and Menwith Hill Station (MHS) discovered and began exploiting a target-rich data set being stolen by hackers. The hackers’ sophisticated email-stealing intrusion set is known as INTOLERANT. Of the traffic observed, nearly half contains category hits because the attackers are targeting email accounts of interest to the Intelligence Community. Although a relatively new data source, [Target Offices of Primary Interest] have already written multiple reports based on INTOLERANT collect. The hackers targeted a wide range of diplomatic corps, human rights and democracy activists and even journalists: INTOLERANT traffic is very organized. Each event is labeled to identify and categorize victims. Cyber attacks commonly apply descriptors to each victim – it helps herd victims and track which attacks succeed and which fail. Victim categories make INTOLERANT interesting: A = Indian Diplomatic & Indian Navy B = Central Asian diplomatic C = Chinese Human Rights Defenders D = Tibetan Pro-Democracy Personalities E = Uighur Activists F = European Special Rep to Afghanistan and Indian photo-journalism G = Tibetan Government in Exile
  • In those cases, the NSA and its partner agencies in the United Kingdom and Canada were unable to determine the identity of the hackers who collected the data, but suspect a state sponsor “based on the level of sophistication and the victim set.” In instances where hacking may compromise data from the U.S. and U.K. governments, or their allies, notification was given to the “relevant parties.” In a separate document, GCHQ officials discuss plans to use open source discussions among hackers to improve their own knowledge. “Analysts are potentially missing out on valuable open source information relating to cyber defence because of an inability to easily keep up to date with specific blogs and Twitter sources,” according to one document. GCHQ created a program called LOVELY HORSE to monitor and index public discussion by hackers on Twitter and other social media. The Twitter accounts designated for collection in the 2012 document:
  • ...3 more annotations...
  • Documents published with this article: LOVELY HORSE – GCHQ Wiki Overview INTOLERANT – Who Else Is Targeting Your Target? Collecting Data Stolen by Hackers – SIDtoday  HAPPY TRIGGER/LOVELY HORSE/Zool/TWO FACE – Open Source for Cyber Defence/Progress NATO Civilian Intelligence Council – Cyber Panel – US Talking Points
  • These accounts represent a cross section of the hacker community and security scene. In addition to monitoring multiple accounts affiliated with Anonymous, GCHQ monitored the tweets of Kevin Mitnick, who was sent to prison in 1999 for various computer and fraud related offenses. The U.S. Government once characterized Mitnick as one of the world’s most villainous hackers, but he has since turned security consultant and exploit broker. Among others, GCHQ monitored the tweets of reverse-engineer and Google employee, Thomas Dullien. Fellow Googler Tavis Ormandy, from Google’s vulnerability research team Project Zero, is featured on the list, along with other well known offensive security researchers, including Metasploit’s HD Moore and James Lee (aka Egypt) together with Dino Dai Zovi and Alexander Sotirov, who at the time both worked for New York-based offensive security company, Trail of Bits (Dai Zovi has since taken up a position at payment company, Square). The list also includes notable anti-forensics and operational security expert “The Grugq.” GCHQ monitored the tweets of former NSA agents Dave Aitel and Charlie Miller, and former Air Force intelligence officer Richard Bejtlich as well as French exploit vendor, VUPEN (who sold a one year subscription for its binary analysis and exploits service to the NSA in 2012).
  • The U.S., U.K. and Canadian governments characterize hackers as a criminal menace, warn of the threats they allegedly pose to critical infrastructure, and aggressively prosecute them, but they are also secretly exploiting their information and expertise, according to top secret documents. In some cases, the surveillance agencies are obtaining the content of emails by monitoring hackers as they breach email accounts, often without notifying the hacking victims of these breaches. “Hackers are stealing the emails of some of our targets… by collecting the hackers’ ‘take,’ we . . .  get access to the emails themselves,” reads one top secret 2010 National Security Agency document. These and other revelations about the intelligence agencies’ reliance on hackers are contained in documents provided by whistleblower Edward Snowden. The documents—which come from the U.K. Government Communications Headquarters agency and NSA—shed new light on the various means used by intelligence agencies to exploit hackers’ successes and learn from their skills, while also raising questions about whether governments have overstated the threat posed by some hackers.
Paul Merrell

'A Line in the Sand' in Fight to Release Thousands of Photos of Prisoner Abuse - The Intercept - 0 views

  • A federal judge is demanding that the government explain, photo-by-photo, why it can’t release hundreds, and perhaps thousands, of pictures showing detainee abuse by U.S. forces at military prison sites in Iraq and Afghanistan. In a courtroom in the Southern District of New York yesterday, Judge Alvin Hellerstein appeared skeptical of the government’s argument, which asserted that the threat of the Islamic State and Al Qaeda exploiting the images for propaganda should override the public’s right to see any of the photos. He was “highly suspicious” of the government’s attempt to declare the whole lot of the photos dangerous. “It’s too easy and too meaningless,” he said. Since 2004, the American Civil Liberties Union has been fighting for the release of photos from military investigations into prisoner abuse beyond those that were leaked from Abu Ghraib. The additional pictures reportedly show sexual assault, soldiers posing with dead bodies, and other offenses. The exact number of photos has not been disclosed in court, though former Senator Joe Lieberman has previously said that there are nearly 2,100.
  • Hellerstein first ordered the government to hand over a subset of the pictures in 2005. President Obama decided to release them in 2009, but Iraqi Prime Minister Nouri al-Maliki and the top American general in Iraq implored him not to. Congress then passed a law amending the Freedom of Information Act to allow the Secretary of Defense to certify that publishing the pictures could put American lives at risk, which then-secretary Robert Gates did. The ACLU continued to fight the issue in court, and last August, Hellerstein ordered that the government needed to justify withholding each picture individually.
Paul Merrell

Non-Aligned Movement Backs Venezuela against US Sanctions | News | teleSUR - 0 views

  • Presidents meeting at the Non-Aligned Summit in 2012 | Photo: Presidency of India Published 8 February 2015 0 + We Recommend The group of 120 nations issued a statement denouncing the sanctions as an intervention into Venezuelan affairs. The Non-Aligned Movement issued a statement Saturday rejecting the latest set of sanctions imposed by the United States against Venezuelan officials. The 120-nation body described the sanctions as “intended to undermine Venezuela's sovereignty, its political independence and its right to self-determination.” The U.S. government announced a new set of sanctions last week which target former and current Venezuelan officials. The U.S. has justified various rounds of sanctions by claiming corruption and that human rights abuses occurred in the oil-rich county during a wave of opposition violence last year that left 43 dead. However, the Venezuelan government has pointed out the sanctions are politically motivated and that they form part of U.S. plans to oust the country’s elected government, given that the overwhelming majority of the 43 fatalities were caused by right-wing extremists. The Non-Aligned Movement considers the unilateral sanctions a “violation of international law, including the United Nations Charter and the basic principles of international law of relations between states.” Furthermore, the group of nations considered the measure “coercive” and manifested its solidarity with the Venezuelan people and their government.
  • The UNASUR group of South American nations also rejected the sanctions and will launch a probe to evaluate Venezuela's evidence of U.S. meddling in the country’s internal affairs.
Paul Merrell

Former Israeli Opposition Leader Puts Bibi-Boehner Ploy Bluntly « LobeLog - 0 views

  • Yossi Sarid, the former head of Israel’s Meretz Party and leader of the opposition in the Knesset from 2001 to 2003, has just written a very blunt—far too blunt for “acceptable” political discourse in Washington, DC—op-ed published Sunday by Haaretz. Unfortunately, it’s behind a pay wall, so the most I can do is extract a few excerpts. The title is straightforward: “Beware: Republican Jews on the Warpath,” and Sarid, who also served as minister of education under Ehud Barak, doesn’t pull any punches about what Boehner’s fraudulent invitation to Israeli Prime Minister Benjamin Netanyahu is really all about. Now it’s no longer a “crisis in the relationship” that they try to paper over; now it’s no longer just “tensions with the White House” that they’re making every effort to reduce in between meetings; now, it’s an open war with the United States. It’s Sheldon Adelson versus Barack Obama, and Israel is caught in the cross-fire. After Vice President Joe Biden, our greatest friend over there, announced an unspecified trip abroad that will prevent him from being in Congress at the fateful hour, Republican Jewish organizations launched a campaign of intimidation against those lawmakers who had already announced their intent to skip the joint session: Their political fate will be bitter.
  • …Ambassador to Washington Ron Dermer, in the service of his master, is rallying his troops and launching a combined assault on Capitol Hill. Benjamin Netanyahu is determined to show the president once and for all who really rules in Washington, who is the landlord both here and there. … One Matthew Brooks – the executive director of the Republican Jewish Coalition, who does the will of its financial backers – explained over the weekend, “We will commit whatever resources we need to make sure that people are aware of the facts, that given the choice to stand with Israel and Prime Minister Netanyahu in opposition to a nuclear Iran, they chose partisan interests and to stand with President Obama.” Mort Klein, president of the Zionist Organization of America, added unambiguously, “We will, of course, be publicly condemning any Democrats who don’t show up for the speech — unless they have a doctor’s note.” Doctor, this man is sick and urgently needs tranquilizers.
  • … Israel, which until now was a cornerstone of bipartisanship, has become loathsome to its traditional supporters. Benjamin Nitay Netanyahu, the Israeli-American, has made it into something that reeks, even among its longtime supporters. In these very moments, the protocols are being rewritten. Rich Jews are writing them in their own handwriting. They, in their wealth, are confirming with their own signatures what anti-Semites used to slander them with in days gone by: We, the elders of Zion, pull the strings of Congress, and the congressmen are nothing but marionettes who do our will. If they don’t understand our words, they’ll understand our threats. And if in the past, we ran the show from behind the scenes, now we’re doing it openly, from center stage. And if you forget our donations, the wellspring will run dry.
  • ...1 more annotation...
  • You’ll remember that Obama, during an off-the-record meeting with Democratic senators three weeks ago, reportedly appealed to them to resist “donors and others” who opposed a deal with Iran and were pushing for new sanctions legislation that risked sabotaging the nuclear-focused talks with Iran and an eventual deal. Sen. Robert Menendez, who has been pushing for such legislation for more than a year, reportedly replied that he took “personal offense” at Obama’s remarks about donors, apparently interpreting Obama’s comments as suggesting that Menendez’s position was motivated by his desire and need for campaign cash. The New York Times helpfully noted in a profile of Menendez that the New Jersey senator had received $341,170 from hard-line pro-Israel groups over the past seven years, “more than any other Democrat in the Senate.” (In fact, he received more money than any other Senate candidate—Democratic or Republican—in the 2012 elections, while his Republican comrade-in-arms and co-sponsor for sanctions legislation, Illinois Sen. Mark Kirk, has received more campaign cash from pro-Israel political actions committees (PACs) associated with the American Israel Public Affairs Committee (AIPAC) than any other member of Congress over the past decade. And that doesn’t necessarily include all the much-harder-to-track money provided by donors like Adelson, who chairs Brooks’s RJC, through super PACS and other vehicles.)  Indeed, there’s no doubt that Obama’s reference to “donors” touched a very sensitive nerve with Menendez. Sarid, whose op-ed is most unlikely to appear in any mainstream U.S. publication, has now pounded it with a sledgehammer.
  •  
    There it is, finally out in the open. 
Paul Merrell

'Almost All' Opposition Leaders Knew About Venezuelan Coup Plot | News | teleSUR - 0 views

  • In a televised address Saturday night, Venezuela's president Nicolas Maduro revealed new information on the foiled coup attempt against his government, including accusations that the country’s opposition leaders were aware of the plans. “Almost all of the MUD leaders knew about this plan, this ambush, almost all of them, including the four-time losing candidate,” said the Venezuelan leader, referring to opposition presidential candidate, Henrique Capriles Radonski. “I'm not saying all of them were actively involved. But it was a rumor circulating amongst them, that something was about to happen,” Maduro explained. Maduro also said that those detained have confessed to the plot and have provided new information which authorities are investigating. In addition to attempting to bribe officials and politicians with cash and visas to enter the United States, the Venezuelan president expanded on the role played by the U.S. Embassy in the country, saying that the script read by coup plotters in a video they planned to air once the plan had been initiated was crafted by an advisor at the Embassy.
  • Maduro called on U.S. president Barack Obama to stop his officials from meddling in Venezuelan affairs. “In your name, they are organizing coup plots against democratically-elected government, such as Venezuela,” Maduro said. According to Venezuelan intelligence and testimonies, the coup was set have taken place on Feb. 12, one day after opposition leaders Leopoldo Lopez, Maria Corina Machada and Antonio Ledezma published a “Transition” program which outlined measures including the privatization of oil, deregulation of the economy and agreements with International Monetary Fund.. The plan included targetted assassinations and bombing a series of targets – including teleSUR's headquarters in Caracas – while opposition activists staged violent protests in the streets to mark one year since the start of opposition-led protests that claimed 43 lives.
Paul Merrell

European Parliament to investigate CIA's torture and rendition operations in EU | The Bureau of Investigative Journalism - 0 views

  • The European Parliament today voted to investigate the extent of the CIA’s detention, torture and rendition programme in EU countries. The decision comes two months after the US Senate intelligence committee published a redacted summary of its six year investigation into the CIA’s detention and interrogation programme. The European Parliament’s committees on civil liberties, foreign affairs and human rights previously investigated the CIA’s programme in 2006, and they will now resume their inquiry with new details from the Senate’s report. Passing today’s resolution, MEPs said the summary “reveals new facts that reinforce allegations that a number of EU member states… were complicit in the CIA’s secret detention and extraordinary rendition programme, sometimes through corrupt means based on substantial amounts of money provided by the CIA in exchange for their cooperation”. Romania, Poland and Lithuania are widely known to have hosted CIA black sites, along with those in Afghanistan, Thailand and Guantánamo Bay.
  • In the first case of its kind last July, the European Court of Human Rights considered whether Poland had been complicit in the detention and transport of two CIA detainees, Abu Zubaydah andAbd al-Rahim al-Nashiri.
  • The motion passed today also encouraged the release of the report in full, without “excessive and unnecessary” redactions. References to individual countries were redacted in the summary on grounds of national security. Today’s resolution was approved by 363 votes to 290, with 48 abstentions.
  • ...2 more annotations...
  • Poland’s complicity in CIA torture programme confirmed as European Court rejects Warsaw’s appeal
  • CIA torture report: An interactive timeline of who’s who in government January 30, 2015 by Gesbeen Mohammad An aid for people reading the Senate summary report and stories in this Bureau project.
  •  
    The Grand Chamber of the European Court of Human Rights just rejected Poland's request for reconsideration, ending the litigation. 
Paul Merrell

American Democracy is Owned by the Rich | Al Jazeera America - 1 views

  • Two new studies by political scientists offer compelling evidence that the rich use their wealth to control the political system and that the U.S. is a democratic republic in name only. In a study of Senate voting patterns, Michael Jay Barber found that “senators’ preferences reflect the preferences of the average donor better than any other group.” In a similar study of the House of Representatives, Jesse H. Rhodes and Brian F. Schaffner found that, “millionaires receive about twice as much representation when they comprise about 5 percent of the district’s population than the poorest wealth group does when it makes up 50 percent of the district.” In fact, the increasing influence of the rich over Congress is the leading driver of polarization in modern politics, with the rich using the political system to entrench wealth by pushing for tax breaks and blocking redistributive policies.
  • At the turn of the decade, political scientists Larry Bartels, Jacob Hacker and Martin Gilens wrote several incredibly influential important books arguing, persuasively, that the preferences of the rich were better represented in Congress than the poor. After the books were published, there was a flurry of research arguing that they had overstated their case. Critics alleged two key defects in Bartels’ and Gilens’ arguments. First, because polling data on the super-wealthy were sparse, it was difficult to prove that there were large differences in opinion. Political scientists often rely on composite measures of policy liberalism, but since the poor tend to be more economically liberal but socially conservative, the differences between the poor and moderately rich can often be obscured. Second, there was no way to show that influence of the wealthy was caused directly by the influence of money. It might well be that the rich are simply opinion leaders or are more likely to vote.
  • Recent research offers compelling answers to these criticisms. The new evidence adds credence to the Bartels-Gilens-Hacker view that money is corrupting American politics. By using a massive database of ideology that includes the super wealthy, Schaffner and Rhodes found that “members of Congress are much more responsive to the wealthy than to their poor constituents.” However, this difference is not equal between both parties; rather, Democrats are far more responsive to the poor than Republicans. (This is not surprising; other research supports this claim.) They find that both parties strongly favor the upper-middle class, those with $100,000 to $300,000 in wealth. But Republicans are not only more responsive to the rich, but particularly to rich donors. Schaffner and Rhodes argue that, “campaign donations, but not voter registration or participation in primary or general election, may help explain the disproportionate influence of the wealthy among Republican representatives.” Barber’s study is the first to directly examine the policy preferences of the donor class. Barber sent 20,500 letters to people who contributed to 22 Senate elections in 2012 and asked about various policy questions. This allowed Barber to examine the differences in representation between donors and non-donors. His finding: Donors’ preferences tend to be far better represented than non-donors’. The chart below measures the ideological differences between various groups, with 0 indicating a perfect fit. The data show that Senators are almost perfectly aligned with their donors, but rather distant from voters.
  • ...5 more annotations...
  • In fact, politicians are almost perfectly aligned with donors, but less aligned with partisans (people who voted for the Senator and share party affiliation), supporters (people who voted for the Senator) and voters in general. He Barber also finds that donors tend to be far more extreme in their views (see chart below). For instance, while about sixty percent of non-donor Republicans oppose the Affordable Care Act, opposition among donors is “almost unanimous.” Barber also notes that donors tend to be far more extreme than non-donors (see chart). (This is supported by other studies).
  • Such data could explain the rising polarization of Congress, as politicians increasingly respond to their donors, rather than to voters. Political scientists Walter J. Stone and Elizabeth N. Simas have found that challengers raise more money when they take extreme positions, which helps explain why incumbent representatives tend to be more partisan than departing representatives. It certainly explains the intransigence of the last two Congresses: Republicans, who are responding to their rich donor base, are incentivized to oppose any action, particularly those supporting Obama, lest they lose funding. Since Senators have to raise approximately $3,300 a day every year for six years to remain viable, they will inevitably have to succumb to the power of money if they wish to be reelected. This research raises the disturbing thought that our political system is no longer representative. As Barber notes, about half of all donors are from out of state, meaning that politicians are no longer responsive to their voters (though they are slightly more during election years). Given that only .22 percent of Americans made a donation of more than $200 (the level Barber studies) in 2014, we have power evidence that America is now a government of the one percent — indeed, of the one-fifth of one percent.
  • This disturbing trend affects politics at all levels. At the state level, political scientists Gerald Wright and Elizabeth Rigby found that state party platforms are far more influenced by the rich than the poor. Elsewhere, Barber found evidence that presidents are more responsive to donors than non-donors. Recently Griffin and Newman found representation gaps between whites and people of color as well as low-income voters. This finding is supported by Christopher Ellis, who found that donors were better represented than non-donors (although using a less comprehensive method than Barber). In a frank moment, U.S. Sen. Chris Murphy (D – Conn.) said, “I talked a lot more about carried interest inside of that call room than I did in the supermarket.” He’s correct: Donors tending to be far richer and wealthier than non-donors (see chart).
  • There are still unanswered questions. It is possible that politicians cast ideological votes to appease donors and partisans (for instance, the vain attempt to repeal the Affordable Care Act dozens of times), while also working to benefit the poor and middle class through less visible means. This might explain why political journalists, who often focus on major legislation, miss the distributional impacts of political appointments and regulatory action. It may be that politicians work to maximize votes, and then political donations follow (though there is strong evidence this isn’t the case). Either way, the most up-to-date evidence strongly suggests that money is distorting our system, and that evidence appears to be growing stronger by the day.
  • The solution, as a recent Demos report suggests, is to help reformist candidates gather donations with a public matching system. Since voters who are non-donors are less ideological, the solution is to balance out the political distortions from the donor class by turning these non-donors into donors. Citizens United has only increased the stranglehold of moneyed interests on our political system, and is daily choking the life of our democracy. Only by restoring influence to all voters will our republic be restored.
Paul Merrell

The Spy Cables: A glimpse into the world of espionage - Al Jazeera English - 0 views

  • A digital leak to Al Jazeera of hundreds of secret intelligence documents from the world's spy agencies has offered an unprecedented insight into operational dealings of the shadowy and highly politicised realm of global espionage. Over the coming days, Al Jazeera's Investigative Unit is publishing The Spy Cables, in collaboration with The Guardian newspaper.
  • Spanning a period from 2006 until December 2014, they include detailed briefings and internal analyses written by operatives of South Africa's State Security Agency (SSA). They also reveal the South Africans' secret correspondence with the US intelligence agency, the CIA, Britain's MI6, Israel's Mossad, Russia's FSB and Iran's operatives, as well as dozens of other services from Asia to the Middle East and Africa.
  • Among the revelations, the Spy Cables disclose how: Israel's Mossad told its allies that Iran was not working to produce nuclear weapons just a month after Prime Minister Benjamin Netanyahu warned it was barely a year from being able to do so; The CIA made attempts to contact Hamas directly despite the US government listing the Palestinian group as a "terrorist organisation"; Britain's MI6 sought South African help in an operation to recruit a North Korean official who had previously refused their cash; and South African and Ethiopian spies struggled to "neutralise" an assassination plot targeting a leading African diplomat.
  • ...6 more annotations...
  • Mossad contradicted Netanyahu on Iran nuclear programme The Spy Cables A glimpse into the world of espionage Spy Cables South African spies wary of Iran operations Spy Cables expose 'desperate' US approach to Hamas Israeli cable reveals S Africa missile theft cover-up The Spy Cables - Al Jazeera English Yazidis battle ISIL Disaster 'made us stronger' Spy Cables Abbas and Israel ally against 2009 UN probe Cables describe British attempt to recruit N Korean spy The Rise of the Oligarchs
  • Unlike the Edward Snowden documents that focus on electronic signals intelligence, commonly referred to in intelligence circles as "SIGINT", the Spy Cables deal with human intelligence, or "HUMINT".
  • Rather than chronicling spy-movie style tales of  ruthless efficiency of intelligence agencies, they offer an unprecedented glimpse into the daily working lives of people whose jobs are kept secret from the public.
  • The Spy Cables also reveal that in many cases, intelligence agencies are over-classifying information and hiding behind an unnecessary veil of secrecy. This harms the ability of a democratic society to either consent to the activities of their intelligence agencies or provide adequate checks and balances to their powers.
  • Spy Cables expose 'desperate' US approach to Hamas Leaked documents also show Mossad lobbying South Africa against Goldstone Report, claiming Abbas shared their stance.
  • Spy Cables: South African spies wary of Iran operations Leaked documents describe Tehran working to counter sanctions by using front companies and official channels.
Paul Merrell

Feds identify suspected 'second leaker' for Snowden reporters - Yahoo News - 0 views

  • The FBI has identified an employee of a federal contracting firm suspected of being the so-called "second leaker" who turned over sensitive documents about the U.S. government's terrorist watch list to a journalist closely associated with ex-NSA contractor Edward Snowden, according to law enforcement and intelligence sources who have been briefed on the case. The FBI recently executed a search of the suspect's home, and federal prosecutors in Northern Virginia have opened up a criminal investigation into the matter, the sources said.
  • vestigative website co-founded by Glenn Greenwald, the reporter who first published sensitive NSA documents obtained from Snowden. Headlined "Barack Obama's Secret Terrorist-Tracking System, by the Numbers," the story cited a classified government document showing that nearly half the people on the U.S. government's master terrorist screening database had "no recognized terrorist affiliation."
  • The story, co-authored by Jeremy Scahill and Ryan Devereaux, was accompanied by a document "obtained from a source in the intelligence community" providing details about the watch-listing system that were dated as late as August 2013, months after Snowden fled to Hong Kong and revealed himself as the leaker of thousands of top secret documents from the NSA. This prompted immediate speculation that there was a "second leaker" inside the U.S. intelligence community providing material to Greenwald and his associates.
Paul Merrell

Edward Snowden: A 'Nation' Interview | The Nation - 0 views

  • Snowden: That’s the key—to maintain the garden of liberty, right? This is a generational thing that we must all do continuously. We only have the rights that we protect. It doesn’t matter what we say or think we have. It’s not enough to believe in something; it matters what we actually defend. So when we think in the context of the last decade’s infringements upon personal liberty and the last year’s revelations, it’s not about surveillance. It’s about liberty. When people say, “I have nothing to hide,” what they’re saying is, “My rights don’t matter.” Because you don’t need to justify your rights as a citizen—that inverts the model of responsibility. The government must justify its intrusion into your rights. If you stop defending your rights by saying, “I don’t need them in this context” or “I can’t understand this,” they are no longer rights. You have ceded the concept of your own rights. You’ve converted them into something you get as a revocable privilege from the government, something that can be abrogated at its convenience. And that has diminished the measure of liberty within a society.
  • From the very beginning, I said there are two tracks of reform: there’s the political and the technical. I don’t believe the political will be successful, for exactly the reasons you underlined. The issue is too abstract for average people, who have too many things going on in their lives. And we do not live in a revolutionary time. People are not prepared to contest power. We have a system of education that is really a sort of euphemism for indoctrination. It’s not designed to create critical thinkers. We have a media that goes along with the government by parroting phrases intended to provoke a certain emotional response—for example, “national security.” Everyone says “national security” to the point that we now must use the term “national security.” But it is not national security that they’re concerned with; it is state security. And that’s a key distinction. We don’t like to use the phrase “state security” in the United States because it reminds us of all the bad regimes. But it’s a key concept, because when these officials are out on TV, they’re not talking about what’s good for you. They’re not talking about what’s good for business. They’re not talking about what’s good for society. They’re talking about the protection and perpetuation of a national state system. I’m not an anarchist. I’m not saying, “Burn it to the ground.” But I’m saying we need to be aware of it, and we need to be able to distinguish when political developments are occurring that are contrary to the public interest. And that cannot happen if we do not question the premises on which they’re founded. And that’s why I don’t think political reform is likely to succeed. [Senators] Udall and Wyden, on the intelligence committee, have been sounding the alarm, but they are a minority.
  • The Nation: Every president—and this seems to be confirmed by history—will seek to maximize his or her power, and will see modern-day surveillance as part of that power. Who is going to restrain presidential power in this regard? Snowden: That’s why we have separate and co-equal branches. Maybe it will be Congress, maybe not. Might be the courts, might not. But the idea is that, over time, one of these will get the courage to do so. One of the saddest and most damaging legacies of the Bush administration is the increased assertion of the “state secrets” privilege, which kept organizations like the ACLU—which had cases of people who had actually been tortured and held in indefinite detention—from getting their day in court. The courts were afraid to challenge executive declarations of what would happen. Now, over the last year, we have seen—in almost every single court that has had this sort of national-security case—that they have become markedly more skeptical. People at civil-liberties organizations say it’s a sea change, and that it’s very clear judges have begun to question more critically assertions made by the executive. Even though it seems so obvious now, it is extraordinary in the context of the last decade, because courts had simply said they were not the best branch to adjudicate these claims—which is completely wrong, because they are the only nonpolitical branch. They are the branch that is specifically charged with deciding issues that cannot be impartially decided by politicians. The power of the presidency is important, but it is not determinative. Presidents should not be exempted from the same standards of reason and evidence and justification that any other citizen or civil movement should be held to.
  • ...14 more annotations...
  • The Nation: Explain the technical reform you mentioned. Snowden: We already see this happening. The issue I brought forward most clearly was that of mass surveillance, not of surveillance in general. It’s OK if we wiretap Osama bin Laden. I want to know what he’s planning—obviously not him nowadays, but that kind of thing. I don’t care if it’s a pope or a bin Laden. As long as investigators must go to a judge—an independent judge, a real judge, not a secret judge—and make a showing that there’s probable cause to issue a warrant, then they can do that. And that’s how it should be done. The problem is when they monitor all of us, en masse, all of the time, without any specific justification for intercepting in the first place, without any specific judicial showing that there’s a probable cause for that infringement of our rights.
  • Since the revelations, we have seen a massive sea change in the technological basis and makeup of the Internet. One story revealed that the NSA was unlawfully collecting data from the data centers of Google and Yahoo. They were intercepting the transactions of data centers of American companies, which should not be allowed in the first place because American companies are considered US persons, sort of, under our surveillance authorities. They say, “Well, we were doing it overseas,” but that falls under a different Reagan-era authority: EO 12333, an executive order for foreign-intelligence collection, as opposed to the ones we now use domestically. So this one isn’t even authorized by law. It’s just an old-ass piece of paper with Reagan’s signature on it, which has been updated a couple times since then. So what happened was that all of a sudden these massive, behemoth companies realized their data centers—sending hundreds of millions of people’s communications back and forth every day—were completely unprotected, electronically naked. GCHQ, the British spy agency, was listening in, and the NSA was getting the data and everything like that, because they could dodge the encryption that was typically used. Basically, the way it worked technically, you go from your phone to Facebook.com, let’s say—that link is encrypted. So if the NSA is trying to watch it here, they can’t understand it. But what these agencies discovered was, the Facebook site that your phone is connected to is just the front end of a larger corporate network—that’s not actually where the data comes from. When you ask for your Facebook page, you hit this part and it’s protected, but it has to go on this long bounce around the world to actually get what you’re asking for and go back. So what they did was just get out of the protected part and they went onto the back network. They went into the private network of these companies.
  • The Nation: The companies knew this? Snowden: Companies did not know it. They said, “Well, we gave the NSA the front door; we gave you the PRISM program. You could get anything you wanted from our companies anyway—all you had to do was ask us and we’re gonna give it to you.” So the companies couldn’t have imagined that the intelligence communities would break in the back door, too—but they did, because they didn’t have to deal with the same legal process as when they went through the front door. When this was published by Barton Gellman in The Washington Post and the companies were exposed, Gellman printed a great anecdote: he showed two Google engineers a slide that showed how the NSA was doing this, and the engineers “exploded in profanity.” Another example—one document I revealed was the classified inspector general’s report on a Bush surveillance operation, Stellar Wind, which basically showed that the authorities knew it was unlawful at the time. There was no statutory basis; it was happening basically on the president’s say-so and a secret authorization that no one was allowed to see. When the DOJ said, “We’re not gonna reauthorize this because it is not lawful,” Cheney—or one of Cheney’s advisers—went to Michael Hayden, director of the NSA, and said, “There is no lawful basis for this program. DOJ is not going to reauthorize it, and we don’t know what we’re going to do. Will you continue it anyway on the president’s say-so?” Hayden said yes, even though he knew it was unlawful and the DOJ was against it. Nobody has read this document because it’s like twenty-eight pages long, even though it’s incredibly important.
  • The big tech companies understood that the government had not only damaged American principles, it had hurt their businesses. They thought, “No one trusts our products anymore.” So they decided to fix these security flaws to secure their phones. The new iPhone has encryption that protects the contents of the phone. This means if someone steals your phone—if a hacker or something images your phone—they can’t read what’s on the phone itself, they can’t look at your pictures, they can’t see the text messages you send, and so forth. But it does not stop law enforcement from tracking your movements via geolocation on the phone if they think you are involved in a kidnapping case, for example. It does not stop law enforcement from requesting copies of your texts from the providers via warrant. It does not stop them from accessing copies of your pictures or whatever that are uploaded to, for example, Apple’s cloud service, which are still legally accessible because those are not encrypted. It only protects what’s physically on the phone. This is purely a security feature that protects against the kind of abuse that can happen with all these things being out there undetected. In response, the attorney general and the FBI director jumped on a soap box and said, “You are putting our children at risk.”
  • The Nation: Is there a potential conflict between massive encryption and the lawful investigation of crimes? Snowden: This is the controversy that the attorney general and the FBI director were trying to create. They were suggesting, “We have to be able to have lawful access to these devices with a warrant, but that is technically not possible on a secure device. The only way that is possible is if you compromise the security of the device by leaving a back door.” We’ve known that these back doors are not secure. I talk to cryptographers, some of the leading technologists in the world, all the time about how we can deal with these issues. It is not possible to create a back door that is only accessible, for example, to the FBI. And even if it were, you run into the same problem with international commerce: if you create a device that is famous for compromised security and it has an American back door, nobody is gonna buy it. Anyway, it’s not true that the authorities cannot access the content of the phone even if there is no back door. When I was at the NSA, we did this every single day, even on Sundays. I believe that encryption is a civic responsibility, a civic duty.
  • The Nation: Some years ago, The Nation did a special issue on patriotism. We asked about a hundred people how they define it. How do you define patriotism? And related to that, you’re probably the world’s most famous whistleblower, though you don’t like that term. What characterization of your role do you prefer? Snowden: What defines patriotism, for me, is the idea that one rises to act on behalf of one’s country. As I said before, that’s distinct from acting to benefit the government—a distinction that’s increasingly lost today. You’re not patriotic just because you back whoever’s in power today or their policies. You’re patriotic when you work to improve the lives of the people of your country, your community and your family. Sometimes that means making hard choices, choices that go against your personal interest. People sometimes say I broke an oath of secrecy—one of the early charges leveled against me. But it’s a fundamental misunderstanding, because there is no oath of secrecy for people who work in the intelligence community. You are asked to sign a civil agreement, called a Standard Form 312, which basically says if you disclose classified information, they can sue you; they can do this, that and the other. And you risk going to jail. But you are also asked to take an oath, and that’s the oath of service. The oath of service is not to secrecy, but to the Constitution—to protect it against all enemies, foreign and domestic. That’s the oath that I kept, that James Clapper and former NSA director Keith Alexander did not. You raise your hand and you take the oath in your class when you are on board. All government officials are made to do it who work for the intelligence agencies—at least, that’s where I took the oath.
  • The Nation: Creating a new system may be your transition, but it’s also a political act. Snowden: In case you haven’t noticed, I have a somewhat sneaky way of effecting political change. I don’t want to directly confront great powers, which we cannot defeat on their terms. They have more money, more clout, more airtime. We cannot be effective without a mass movement, and the American people today are too comfortable to adapt to a mass movement. But as inequality grows, the basic bonds of social fraternity are fraying—as we discussed in regard to Occupy Wall Street. As tensions increase, people will become more willing to engage in protest. But that moment is not now.
  • The Nation: You really think that if you could go home tomorrow with complete immunity, there wouldn’t be irresistible pressure on you to become a spokesperson, even an activist, on behalf of our rights and liberties? Indeed, wouldn’t that now be your duty? Snowden: But the idea for me now—because I’m not a politician, and I do not think I am as effective in this way as people who actually prepare for it—is to focus on technical reform, because I speak the language of technology. I spoke with Tim Berners-Lee, the guy who invented the World Wide Web. We agree on the necessity for this generation to create what he calls the Magna Carta for the Internet. We want to say what “digital rights” should be. What values should we be protecting, and how do we assert them? What I can do—because I am a technologist, and because I actually understand how this stuff works under the hood—is to help create the new systems that reflect our values. Of course I want to see political reform in the United States. But we could pass the best surveillance reforms, the best privacy protections in the history of the world, in the United States, and it would have zero impact internationally. Zero impact in China and in every other country, because of their national laws—they won’t recognize our reforms; they’ll continue doing their own thing. But if someone creates a reformed technical system today—technical standards must be identical around the world for them to function together.
  • As for labeling someone a whistleblower, I think it does them—it does all of us—a disservice, because it “otherizes” us. Using the language of heroism, calling Daniel Ellsberg a hero, and calling the other people who made great sacrifices heroes—even though what they have done is heroic—is to distinguish them from the civic duty they performed, and excuses the rest of us from the same civic duty to speak out when we see something wrong, when we witness our government engaging in serious crimes, abusing power, engaging in massive historic violations of the Constitution of the United States. We have to speak out or we are party to that bad action.
  • The Nation: Considering your personal experience—the risks you took, and now your fate here in Moscow—do you think other young men or women will be inspired or discouraged from doing what you did? Snowden: Chelsea Manning got thirty-five years in prison, while I’m still free. I talk to people in the ACLU office in New York all the time. I’m able to participate in the debate and to campaign for reform. I’m just the first to come forward in the manner that I did and succeed. When governments go too far to punish people for actions that are dissent rather than a real threat to the nation, they risk delegitimizing not just their systems of justice, but the legitimacy of the government itself. Because when they bring political charges against people for acts that were clearly at least intended to work in the public interest, they deny them the opportunity to mount a public-interest defense. The charges they brought against me, for example, explicitly denied my ability to make a public-interest defense. There were no whistleblower protections that would’ve protected me—and that’s known to everybody in the intelligence community. There are no proper channels for making this information available when the system fails comprehensively.
  • The government would assert that individuals who are aware of serious wrongdoing in the intelligence community should bring their concerns to the people most responsible for that wrongdoing, and rely on those people to correct the problems that those people themselves authorized. Going all the way back to Daniel Ellsberg, it is clear that the government is not concerned with damage to national security, because in none of these cases was there damage. At the trial of Chelsea Manning, the government could point to no case of specific damage that had been caused by the massive revelation of classified information. The charges are a reaction to the government’s embarrassment more than genuine concern about these activities, or they would substantiate what harms were done. We’re now more than a year since my NSA revelations, and despite numerous hours of testimony before Congress, despite tons of off-the-record quotes from anonymous officials who have an ax to grind, not a single US official, not a single representative of the United States government, has ever pointed to a single case of individualized harm caused by these revelations. This, despite the fact that former NSA director Keith Alexander said this would cause grave and irrevocable harm to the nation. Some months after he made that statement, the new director of the NSA, Michael Rogers, said that, in fact, he doesn’t see the sky falling. It’s not so serious after all.
  • The Nation: You also remind us of [Manhattan Project physicist] Robert Oppenheimer—what he created and then worried about. Snowden: Someone recently talked about mass surveillance and the NSA revelations as being the atomic moment for computer scientists. The atomic bomb was the moral moment for physicists. Mass surveillance is the same moment for computer scientists, when they realize that the things they produce can be used to harm a tremendous number of people. It is interesting that so many people who become disenchanted, who protest against their own organizations, are people who contributed something to them and then saw how it was misused. When I was working in Japan, I created a system for ensuring that intelligence data was globally recoverable in the event of a disaster. I was not aware of the scope of mass surveillance. I came across some legal questions when I was creating it. My superiors pushed back and were like, “Well, how are we going to deal with this data?” And I was like, “I didn’t even know it existed.” Later, when I found out that we were collecting more information on American communications than we were on Russian communications, for example, I was like, “Holy shit.” Being confronted with the realization that work you intended to benefit people is being used against them has a radicalizing effect.
  • The Nation: We have a sense, or certainly the hope, we’ll be seeing you in America soon—perhaps sometime after this Ukrainian crisis ends. Snowden: I would love to think that, but we’ve gone all the way up the chain at all the levels, and things like that. A political decision has been made not to irritate the intelligence community. The spy agencies are really embarrassed, they’re really sore—the revelations really hurt their mystique. The last ten years, they were getting the Zero Dark Thirty treatment—they’re the heroes. The surveillance revelations bring them back to Big Brother kind of narratives, and they don’t like that at all. The Obama administration almost appears as though it is afraid of the intelligence community. They’re afraid of death by a thousand cuts—you know, leaks and things like that.
  • The Nation: You’ve given us a lot of time, and we are very grateful, as will be The Nation’s and other readers. But before we end, any more thoughts about your future? Snowden: If I had to guess what the future’s going to look like for me—assuming it’s not an orange jumpsuit in a hole—I think I’m going to alternate between tech and policy. I think we need that. I think that’s actually what’s missing from government, for the most part. We’ve got a lot of policy people, but we have no technologists, even though technology is such a big part of our lives. It’s just amazing, because even these big Silicon Valley companies, the masters of the universe or whatever, haven’t engaged with Washington until recently. They’re still playing catch-up. As for my personal politics, some people seem to think I’m some kind of archlibertarian, a hyper-conservative. But when it comes to social policies, I believe women have the right to make their own choices, and inequality is a really important issue. As a technologist, I see the trends, and I see that automation inevitably is going to mean fewer and fewer jobs. And if we do not find a way to provide a basic income for people who have no work, or no meaningful work, we’re going to have social unrest that could get people killed. When we have increasing production—year after year after year—some of that needs to be reinvested in society. It doesn’t need to be consistently concentrated in these venture-capital funds and things like that. I’m not a communist, a socialist or a radical. But these issues have to be 
addressed.
  •  
    Remarkable interview. Snowden finally gets asked some questions about politics. 
Paul Merrell

Yemen as Vietnam or Afghanistan | Consortiumnews - 0 views

  • Yemen as Vietnam or Afghanistan April 1, 2015 With U.S. intelligence help, Saudi Arabia has launched air strikes into Yemen and wants Egypt and Pakistan to invade, threatening to turn a long-simmering civil war into a regional conflict, a scenario that reminded retired U.S. diplomat William R. Polk of his work for President Kennedy on an earlier Yemeni war.By William R. PolkAs the events unfold with the Saudi and Egyptian engagement in Yemen, I was reminded of my discussion with Egypt’s President Gamal Abdel Nasser on “his” Yemen war, sometimes called the North Yemen Civil War that began in 1962, became a stalemate and finally ended in 1970. As Mark Twain may have said, “history doesn’t repeat but sometimes it rhymes.” The rhymes, at least, seem unmistakable.In the course of our first lengthy talk on Yemen, Nasser (rather angrily) replied to one of my comments, “you don’t think I will win the war, do you?”
  • “No, Mr. President,” I replied, “I don’t.”
  • “Well,” Nasser retorted, “you American’s think you know all about everything, and you don’t even have any of your people in Sanaa and none up in the north where the fighting is going on. You don’t know anything about Yemen.” Then, without thinking of the implication, I suppose, he said, ” You should go see.”“Mr. President,” I quickly said. “I regard that as an invitation.” Impolitely, I then stood up. He looked at me with narrow, angry eyes. He obviously had not meant what I had inferred.“All right, go see,” he said. “I will give instructions that you can go anywhere you want, talk to anyone you want, see everything..”“But, of course, I cannot even get there without your help,” I said.“You can have my plane.”Rather off-handedly and not warmly, we shook hands. I said goodbye and rushed back to our embassy and wrote an “eyes only” message to  President John Kennedy. I did not want it scattered around our government so I prevailed upon the CIA station chief to send it by his rather more restricted route. It was encrypted and sent in three batches. Before the second batch got sent, a reply came back: “go.”
  • ...2 more annotations...
  • s I was leaving, Nasser took me out to my car and even opened the car door for me. His guards were as astonished as I was, Apparently, he had never before done this. As we shook hands, he said, “Well, Bill, where are you off to this time?”“This time, Mr. President, I am not going to tell you!”He burst out laughing as did I. We did not meet again but our frankness and respect later enabled me to work out the 1970 ceasefire on Suez with him shortly before his death.
  • It is hard to believe that history now seems to be repeating with Egypt and Saudi Arabia again engaged in a counter-guerrilla war in Yemen! For Nasser, it was Egypt’s Vietnam. Will the new Yemen war be Egypt’s (and Saudi Arabia’s) Afghanistan? I think it is very likely. All of the signs point in that direction.And, as I have laid out in numerous essays on Afghanistan, Iraq, Syria, Somalia, Mali and Algeria, and in my little book Violent Politics, guerrilla wars are almost never “won” but usually drain the supposedly dominant power of its wealth, moral position and political unity.
Paul Merrell

DHS Seeks Increase in Domestic HUMINT Collection - 0 views

  • The Department of Homeland Security aims to increase its domestic human intelligence collection activity this year, the Department recently told Congress. In a question for the record from a September 2014 congressional hearing, Rep. Paul C. Broun (R-GA) asked:  “Do we currently have enough human intelligence capacity–both here in the homeland and overseas–to counter the threats posed by state and non-state actors alike?” The Department replied, in a response published in the full hearing volume last month (at p. 64): “DHS is working on increasing its human intelligence-gathering capabilities at home and anticipates increasing its field collector/reporter personnel by 50 percent, from 19 to approximately 30, during the coming year.” “We are also training Intelligence Officers in State and major urban area fusion centers to do intelligence reporting. This will increase the human intelligence capability by additional 50–60 personnel.” The projected increase in DHS HUMINT collection activity was not specifically mentioned in the Department’s FY 2015 budget request.
  • Human intelligence collection in this context does not necessarily mean that the Department is running spies under cover. According to a 2009 report from the Congressional Research Service (footnote 38), “For purposes of DHS intelligence collection, HUMINT is used to refer to overt collection of information and intelligence from human sources. DHS does not, generally, engage in covert or clandestine HUMINT.” In any case, “The DHS Intelligence Enterprise has increased intelligence reporting, producing over 3,000 reports in fiscal year 2014,” DHS also told Rep. Broun. A June 2014 report from the Government Accountability Office found fault with some of that reporting, which is generated by the DHS Office of Intelligence and Analysis (I&A). “I&A customers had mixed views on the extent to which its analytic products and services are useful,” GAO found. See DHS Intelligence Analysis: Additional Actions Needed to Address Analytic Priorities and Workforce Challenges, GAO report GAO-14-397, June 2014. DHS concurred with the resulting GAO recommendations.
Paul Merrell

Britain Used Spy Team to Shape Latin American Public Opinion on Falklands - The Intercept - 0 views

  • Faced with mounting international pressure over the Falkland Islands territorial dispute, the British government enlisted its spy service, including a highly secretive unit known for using “dirty tricks,” to covertly launch offensive cyberoperations to prevent Argentina from taking the islands. A shadowy unit of the British spy agency Government Communications Headquarters (GCHQ) had been preparing a bold, covert plan called “Operation QUITO” since at least 2009. Documents provided to The Intercept by National Security Agency whistleblower Edward Snowden, published in partnership with Argentine news site Todo Notícias, refer to the mission as a “long-running, large scale, pioneering effects operation.” At the heart of this operation was the Joint Threat Research and Intelligence Group, known by the acronym JTRIG, a secretive unit that has been involved in spreading misinformation.
  • The British government, which has continuously administered the Falkland Islands — also known as the Malvinas — since 1833, has rejected Argentine and international calls to open negotiations on territorial sovereignty. Worried that Argentina, emboldened by international opinion, may attempt to retake the islands diplomatically or militarily, JTRIG and other GCHQ divisions were tasked “to support FCO’s [Foreign and Commonwealth Office’s] goals relating to Argentina and the Falkland Islands.” A subsequent document suggests the main FCO goal was to “[prevent] Argentina from taking over the Falkland Islands” and that new offensive cyberoperations were underway in 2011 to further that end. Tensions between the two nations, which fought a war over the small archipelago in the South Atlantic Ocean in 1982, reached a boil in 2010 with the British discovery of large, offshore oil and gas reserves potentially worth billions of dollars.
  • While the full extent of JTRIG’s tactics used in the Falklands mission is unclear, the scope of JTRIG’s approved capabilities offers an idea of what may have been done. The group, first revealed last year by NBC News and The Intercept, has developed various techniques — including “false flag” operations, sexual “honey traps,” and implanting computer viruses — to collect intelligence, plant propaganda and diminish or discredit opponents. As reported in The Intercept last year, JTRIG “has developed covert tools to seed the internet with false information, including the ability to manipulate the results of online polls, artificially inflate pageview counts on web sites, ‘amplif[y]’ sanctioned messages on YouTube,” and plant false Facebook wall posts for “entire countries.” According to a study of the group by the U.K.’s Defence Science and Technology Laboratory (DSTL), “the language of JTRIG’s operations is characterized by terms such as ‘discredit,’ promote ‘distrust,’ ‘dissuade,’ ‘deceive,’ ‘disrupt,’ ‘delay,’ ‘deny,’ ‘denigrate/degrade,’ and ‘deter.’” The unit’s activities generally break down into two symbiotic categories: online Human Intelligence, or HUMINT, and “effects operations.” Online HUMINT is the collection of information on human targets through passive tracking or overt interaction with a target through an alias. These operations may sometimes be in support of, or in conjunction with, covert MI-6 agents on the ground.
  • ...2 more annotations...
  • Effects operations are used to disseminate deception and disruption online. A full catalog of JTRIG’s capabilities as of 2012 can be seen here. Operation QUITO, the group’s operation to support the Foreign Office’s “goals relating to Argentina and the Falkland Islands” is called a “pioneering effects operation.” That operation, still in the planning stages, had undergone “a significant amount of prep work” and was “almost complete” as of 2009.
  • GCHQ’s mission regarding the Falkland Islands also appears to extend beyond just Argentina and involve regional leaders and attitudes. A November 2011 workshop on “Mission Driven Access” gathered staff to “build on pioneering work already done” and tried to develop new ideas for real world scenarios. One such scenario: “GCHQ has consistently underperformed on Brazil, with growing concerns that [South] American attitudes on the Falklands are swinging behind Argentina. A forthcoming Ministerial visit to Chile provides an opportunity to counter the trend. The Foreign Office are looking for advice.”
« First ‹ Previous 541 - 560 of 635 Next › Last »
Showing 20 items per page